text
stringlengths
32k
189k
timestamp
stringlengths
20
20
url
stringlengths
15
660
I definitely wanted to type a simple word so as to express gratitude to you for all of the stunning suggestions you are showing on this website. My time-consuming internet lookup has at the end of the day been recognized with high-quality strategies to go over with my colleagues. I ‘d tell you that we website visitors actually are very lucky to dwell in a fine site with many lovely people with beneficial hints. I feel extremely blessed to have encountered the web page and look forward to some more thrilling moments reading here. Thanks again for a lot of things. Thanks a lot for providing individuals with such a breathtaking possiblity to discover important secrets from this blog. It can be very pleasing and jam-packed with a good time for me and my office colleagues to search your website no less than three times in a week to see the new things you have. And definitely, I’m so usually impressed with your fabulous knowledge served by you. Certain two ideas in this article are completely the most suitable we have all ever had. My wife and i have been absolutely more than happy John could round up his survey through the precious recommendations he made while using the web page. It is now and again perplexing to just possibly be giving out procedures which usually many people might have been selling. We do understand we have the writer to be grateful to because of that. The most important illustrations you’ve made, the easy web site navigation, the friendships you make it possible to instill – it is many extraordinary, and it’s really facilitating our son in addition to us believe that that concept is pleasurable, which is certainly unbelievably fundamental. Thank you for everything! I want to express appreciation to the writer for bailing me out of this circumstance. Just after researching through the world wide web and finding principles which were not beneficial, I thought my entire life was over. Living without the presence of solutions to the difficulties you’ve solved all through this review is a crucial case, and the kind that would have in a wrong way affected my career if I hadn’t noticed your web blog. The competence and kindness in playing with every item was vital. I don’t know what I would have done if I hadn’t come upon such a stuff like this. I’m able to now relish my future. Thanks a lot so much for this impressive and results-oriented guide. I won’t be reluctant to propose the website to any individual who needs and wants recommendations on this issue. I want to show some thanks to the writer just for rescuing me from this type of scenario. Just after scouting through the internet and seeing strategies that were not helpful, I assumed my life was well over. Existing without the presence of approaches to the difficulties you’ve solved as a result of your website is a critical case, as well as those which might have negatively affected my career if I hadn’t come across your web site. Your good knowledge and kindness in touching all areas was excellent. I’m not sure what I would’ve done if I had not come across such a thing like this. It’s possible to now look ahead to my future. Thanks a lot very much for the skilled and sensible guide. I won’t hesitate to propose the blog to anybody who needs support on this topic. I needed to draft you this bit of word to help thank you over again for these superb secrets you have featured on this site. This has been really surprisingly generous with you giving publicly all many people might have offered for sale as an e-book in making some profit on their own, primarily since you might well have done it if you considered necessary. The smart ideas likewise acted to become great way to understand that most people have the identical eagerness like my personal own to know the truth very much more regarding this problem. I am sure there are some more fun occasions in the future for those who examine your website. I not to mention my guys appeared to be analyzing the best thoughts on your web page and then then developed a terrible suspicion I never expressed respect to you for those techniques. Most of the young boys ended up so very interested to study them and already have sincerely been taking advantage of them. I appreciate you for indeed being simply accommodating and also for opting for variety of perfect areas most people are really desperate to know about. My personal sincere apologies for not expressing gratitude to you sooner. I definitely wanted to write down a small comment to say thanks to you for all of the fabulous techniques you are sharing at this site. My time consuming internet search has now been honored with reasonable suggestions to talk about with my co-workers. I ‘d state that that we readers are rather blessed to be in a remarkable site with so many special people with useful suggestions. I feel somewhat lucky to have seen your entire web pages and look forward to some more fun minutes reading here. Thanks once more for a lot of things. I precisely desired to appreciate you yet again. I am not sure the things I could possibly have created in the absence of the actual tips shared by you concerning such question. It absolutely was a real depressing difficulty in my circumstances, nevertheless finding out your professional technique you solved it made me to weep for fulfillment. I will be happier for your assistance and as well , believe you are aware of a powerful job you are doing educating the rest all through your site. I’m certain you haven’t met all of us. I enjoy you because of all your efforts on this site. My aunt really likes making time for internet research and it’s really simple to grasp why. I hear all concerning the dynamic form you provide precious techniques through your blog and therefore attract participation from people about this article so my simple princess is undoubtedly understanding a lot of things. Take advantage of the remaining portion of the year. You’re the one conducting a pretty cool job. Thank you a lot for providing individuals with a very terrific opportunity to check tips from this blog. It’s usually very pleasurable plus packed with a great time for me personally and my office colleagues to visit your site at minimum three times a week to study the fresh tips you have got. And lastly, I’m also at all times fascinated with the dazzling knowledge served by you. Some two points in this article are particularly the best we have ever had. I wish to show my appreciation to the writer for rescuing me from this particular circumstance. Because of looking throughout the online world and obtaining strategies which are not powerful, I figured my life was well over. Existing devoid of the solutions to the problems you’ve sorted out as a result of your good guide is a serious case, as well as the kind that could have negatively affected my entire career if I had not encountered the blog. Your actual expertise and kindness in maneuvering all areas was precious. I am not sure what I would have done if I had not come across such a point like this. I am able to at this time look forward to my future. Thanks a lot so much for this reliable and results-oriented guide. I will not hesitate to suggest the website to any person who will need support about this subject. I must show my appreciation for your generosity supporting folks who actually need guidance on in this situation. Your personal dedication to getting the message all through had become extremely productive and has frequently encouraged some individuals much like me to arrive at their ambitions. Your entire informative information can mean so much to me and substantially more to my peers. Many thanks; from each one of us. I want to show appreciation to this writer for rescuing me from this type of matter. As a result of looking out throughout the world-wide-web and getting concepts that were not pleasant, I figured my life was done. Being alive without the presence of answers to the difficulties you have sorted out through your entire guide is a critical case, and ones which could have badly affected my career if I had not noticed your web site. Your actual capability and kindness in maneuvering all the pieces was vital. I am not sure what I would’ve done if I hadn’t come across such a solution like this. I can also now relish my future. Thank you very much for your professional and sensible guide. I will not hesitate to suggest your web site to any individual who ought to have care about this subject matter. I want to voice my love for your generosity in support of individuals that absolutely need guidance on your subject. Your very own commitment to passing the solution around ended up being remarkably powerful and has regularly allowed people much like me to attain their endeavors. Your amazing valuable report indicates a great deal a person like me and a whole lot more to my mates. Thanks a ton; from all of us. I have to get across my gratitude for your generosity giving support to all those that actually need assistance with this one situation. Your special dedication to passing the message all over had been quite informative and have continually allowed those much like me to achieve their goals. Your entire helpful recommendations can mean a great deal a person like me and even more to my peers. Thanks a lot; from all of us. I as well as my buddies ended up digesting the best procedures located on the blog and so before long I had an awful suspicion I had not thanked the web site owner for them. All of the women happened to be certainly stimulated to read all of them and already have honestly been taking advantage of those things. We appreciate you genuinely so thoughtful and for choosing certain outstanding guides millions of individuals are really desperate to discover. My very own sincere regret for not saying thanks to you sooner. Thank you a lot for providing individuals with an extremely marvellous possiblity to read in detail from this website. It’s usually so enjoyable and as well , full of a good time for me and my office colleagues to search your blog more than thrice weekly to learn the fresh guidance you have got. And lastly, we are actually motivated concerning the special knowledge you give. Certain 3 facts in this posting are completely the simplest we have all ever had. Thanks a lot for providing individuals with a very pleasant possiblity to check tips from here. It really is so sweet and packed with a good time for me personally and my office colleagues to visit your web site at the least thrice in one week to learn the new stuff you have got. And lastly, I’m certainly fascinated with all the terrific techniques served by you. Selected 3 ideas on this page are certainly the very best we have all had. I simply wanted to develop a simple note so as to appreciate you for those marvelous ways you are giving out on this site. My rather long internet research has at the end of the day been paid with pleasant suggestions to go over with my close friends. I ‘d claim that many of us visitors actually are unequivocally fortunate to dwell in a superb site with so many lovely individuals with great plans. I feel very much grateful to have discovered your web page and look forward to tons of more excellent minutes reading here. Thank you once again for a lot of things. I precisely needed to thank you so much once again. I do not know the things that I could possibly have followed without the secrets contributed by you over my industry. It absolutely was a traumatic difficulty for me, nevertheless being able to view the specialized style you solved it forced me to jump for joy. I’m just happier for your advice and trust you are aware of an amazing job you’re putting in training the others using your webblog. More than likely you’ve never come across all of us. I wish to show appreciation to the writer just for bailing me out of this particular instance. Because of looking out through the world wide web and coming across notions that were not powerful, I assumed my entire life was done. Being alive without the strategies to the problems you’ve fixed by means of your good site is a serious case, as well as ones which might have badly affected my entire career if I hadn’t encountered your site. Your own ability and kindness in playing with a lot of stuff was useful. I don’t know what I would’ve done if I hadn’t encountered such a solution like this. I can at this point relish my future. Thanks very much for your skilled and effective guide. I will not hesitate to suggest your web sites to any person who needs and wants assistance about this topic. My wife and i ended up being now comfortable Michael could complete his preliminary research because of the precious recommendations he had out of the web page. It is now and again perplexing to simply possibly be giving away ideas that many many others may have been trying to sell. And we all recognize we now have the blog owner to give thanks to for this. The entire illustrations you made, the straightforward site menu, the relationships you can assist to instill – it is everything incredible, and it’s letting our son and us imagine that this theme is fun, and that’s quite indispensable. Many thanks for everything! Thanks so much for providing individuals with an exceptionally splendid possiblity to read in detail from this website. It is usually so excellent plus full of a great time for me personally and my office co-workers to search the blog minimum thrice a week to learn the fresh tips you have. And indeed, I’m just usually motivated with your unbelievable advice you serve. Selected 1 facts in this posting are surely the finest I have had. Thank you a lot for giving everyone remarkably remarkable opportunity to read articles and blog posts from here. It can be so great and also full of fun for me personally and my office peers to search your blog at least three times per week to find out the fresh guidance you will have. And definitely, I’m actually satisfied for the gorgeous secrets you give. Certain 3 tips in this post are certainly the most beneficial we have had. I genuinely enjoy examining on this site, it contains wonderful blog posts. “The living is a species of the dead and not a very attractive one.” by Friedrich Wilhelm Nietzsche. I precisely desired to thank you very much once again. I’m not certain what I could possibly have done in the absence of the basics provided by you concerning such concern. It actually was a real frustrating issue in my view, nevertheless spending time with this specialised style you managed it forced me to weep over fulfillment. I will be happier for your work and then hope you realize what a powerful job you have been putting in teaching men and women through the use of a web site. Probably you’ve never encountered any of us. I precisely needed to thank you very much once again. I am not sure the things I would’ve implemented without those pointers provided by you regarding that problem. This has been an absolute intimidating dilemma in my circumstances, nevertheless being able to see the very skilled style you handled the issue made me to weep with delight. Now i’m grateful for the advice and then wish you really know what a powerful job your are getting into training people thru a web site. Probably you have never come across any of us. Thanks for all your hard work on this web site. Kate take interest in doing research and it’s easy to understand why. We notice all concerning the powerful mode you give very useful solutions via your website and as well increase response from the others on that subject then our favorite simple princess has always been understanding so much. Take advantage of the remaining portion of the new year. You are performing a splendid job. Thanks a lot for providing individuals with a very terrific opportunity to check tips from this website. It is usually so ideal and as well , packed with a great time for me personally and my office peers to search your web site more than three times a week to read the newest items you have got. And of course, I am also actually amazed concerning the eye-popping tips you give. Certain 3 ideas on this page are ultimately the most suitable I’ve had. I wish to show some appreciation to the writer just for bailing me out of such a crisis. Because of researching through the internet and getting basics which are not helpful, I was thinking my entire life was over. Existing devoid of the solutions to the difficulties you’ve sorted out by way of the short article is a crucial case, as well as the ones which could have negatively damaged my career if I had not come across your web site. Your own competence and kindness in maneuvering every item was excellent. I’m not sure what I would’ve done if I hadn’t come across such a subject like this. I’m able to now look ahead to my future. Thanks so much for this expert and sensible guide. I will not hesitate to suggest your web blog to anyone who will need tips about this topic. I precisely wanted to thank you very much again. I do not know the things I would have tried without the type of pointers contributed by you relating to that concern. It had become an absolute daunting setting for me personally, nevertheless observing a well-written approach you processed the issue forced me to leap over happiness. I am thankful for your assistance and then sincerely hope you are aware of an amazing job you are always putting in instructing many people with the aid of your site. Most probably you’ve never met any of us. Thank you a lot for giving everyone remarkably nice possiblity to read critical reviews from here. It is often so pleasant plus stuffed with fun for me and my office mates to search your site nearly 3 times per week to find out the latest issues you have got. And of course, I’m just usually impressed with your mind-boggling advice you serve. Certain two facts in this posting are surely the most efficient we’ve had. I wish to express my appreciation to this writer for bailing me out of this particular matter. Right after looking throughout the world wide web and obtaining notions which are not pleasant, I assumed my entire life was gone. Living without the presence of solutions to the problems you have solved through your entire short article is a serious case, as well as those which might have in a wrong way affected my entire career if I had not noticed the blog. Your personal knowledge and kindness in controlling every item was valuable. I’m not sure what I would have done if I had not encountered such a subject like this. I can also now relish my future. Thanks very much for your reliable and sensible guide. I will not be reluctant to suggest the website to any individual who should receive recommendations about this subject. I want to point out my admiration for your kind-heartedness giving support to individuals who should have assistance with this particular concern. Your very own dedication to getting the message all over turned out to be unbelievably advantageous and have in most cases allowed professionals just like me to arrive at their ambitions. Your entire interesting useful information signifies a great deal a person like me and somewhat more to my peers. With thanks; from each one of us. I’m just writing to make you know of the remarkable experience my girl enjoyed browsing your webblog. She discovered many pieces, which included what it is like to have a wonderful teaching mood to have other folks very easily comprehend a variety of tricky issues. You really surpassed my desires. Many thanks for presenting such productive, trustworthy, explanatory and in addition unique thoughts on the topic to Jane. I am also commenting to make you understand what a brilliant experience my child developed using the blog. She discovered several issues, with the inclusion of what it’s like to have a great helping style to let a number of people clearly completely grasp chosen grueling subject areas. You actually surpassed my expectations. Many thanks for rendering the essential, dependable, informative and also fun guidance on that topic to Ethel. I precisely wanted to thank you very much once more. I am not sure the things I would’ve implemented in the absence of the actual creative concepts contributed by you concerning that field. This has been a real frustrating setting in my circumstances, however , viewing the expert style you treated the issue forced me to weep with fulfillment. I am thankful for this service and in addition have high hopes you know what a great job your are undertaking instructing the mediocre ones via your web blog. I am sure you have never got to know any of us. I am commenting to let you know of the outstanding experience my friend’s girl encountered visiting your web site. She figured out so many issues, with the inclusion of what it’s like to have a great helping character to get certain people with no trouble gain knowledge of a variety of extremely tough topics. You truly exceeded our expected results. Thanks for presenting the good, safe, revealing and in addition cool guidance on the topic to Tanya. I really wanted to construct a quick remark in order to appreciate you for some of the remarkable facts you are placing here. My particularly long internet look up has at the end been honored with high-quality insight to go over with my family. I ‘d suppose that most of us readers actually are undeniably endowed to be in a notable place with many perfect individuals with interesting techniques. I feel extremely happy to have come across the webpages and look forward to plenty of more excellent minutes reading here. Thanks a lot again for a lot of things. Thanks for all of the efforts on this blog. My mother loves participating in research and it’s easy to understand why. My spouse and i know all concerning the lively way you deliver effective guides by means of this web site and as well as improve response from visitors on that theme and our girl is really understanding so much. Have fun with the remaining portion of the year. Your conducting a dazzling job. My husband and i were now contented that Raymond could round up his homework while using the ideas he came across while using the web site. It is now and again perplexing to just always be making a gift of points other folks could have been trying to sell. We really fully understand we have the blog owner to give thanks to because of that. Most of the illustrations you’ve made, the easy web site navigation, the relationships you aid to foster – it is most great, and it’s leading our son in addition to our family understand this idea is amusing, and that is highly indispensable. Many thanks for everything! I not to mention my pals came going through the good hints located on your web page while suddenly got an awful suspicion I had not expressed respect to the website owner for those strategies. All the boys ended up as a consequence very interested to read them and already have honestly been taking pleasure in these things. Thanks for actually being really accommodating as well as for picking out these kinds of nice subject matter millions of individuals are really eager to understand about. Our own sincere apologies for not expressing appreciation to sooner. I am just commenting to let you understand of the superb experience my girl developed reading through yuor web blog. She noticed some things, including what it’s like to have an ideal teaching nature to have folks clearly learn chosen specialized things. You truly surpassed readers’ expectations. Many thanks for coming up with the necessary, dependable, edifying and also unique tips about this topic to Jane. wsnqnvhoslo,This website truly has alll of the information and facts I wanted about this subject and didn?t know who to ask. My spouse and i were quite relieved Michael managed to finish off his reports while using the ideas he got from your web site. It is now and again perplexing to just possibly be releasing thoughts that other folks might have been making money from. We really take into account we now have the website owner to appreciate for that. The type of illustrations you have made, the straightforward blog navigation, the relationships your site help engender – it is many sensational, and it’s really helping our son and our family reckon that the idea is exciting, which is certainly extremely serious. Thank you for the whole lot! I am just writing to make you know of the incredible experience my wife’s child enjoyed visiting your site. She picked up several details, including what it’s like to have an amazing coaching spirit to get a number of people quite simply fully understand several tricky things. You really did more than people’s desires. Many thanks for producing these great, healthy, informative as well as easy thoughts on the topic to Tanya. I wanted to create you that bit of note to be able to thank you so much as before on the magnificent advice you’ve provided in this case. It was certainly shockingly generous of people like you to grant without restraint exactly what most people could have distributed for an electronic book in making some profit on their own, mostly since you could possibly have tried it if you considered necessary. These thoughts additionally worked to be the easy way to be sure that other individuals have similar desire like mine to realize much more when considering this problem. I’m certain there are millions of more pleasurable occasions in the future for individuals who discover your blog post. I precisely wanted to appreciate you yet again. I’m not certain the things that I would have followed in the absence of the solutions revealed by you concerning that theme. It has been the troublesome condition in my view, however , discovering your expert style you managed that forced me to leap with delight. I am happy for your work as well as have high hopes you comprehend what a powerful job you were providing teaching most people through the use of a site. Most probably you’ve never come across all of us. My spouse and i were quite cheerful when Albert managed to complete his homework using the ideas he got using your blog. It is now and again perplexing just to be giving for free tips which people today may have been trying to sell. Therefore we acknowledge we have the writer to appreciate for that. All of the illustrations you’ve made, the simple web site menu, the friendships you help foster – it is mostly wonderful, and it is making our son and our family do think the situation is enjoyable, and that’s exceptionally important. Thank you for the whole lot! I wish to show appreciation to this writer for bailing me out of this type of circumstance. After researching throughout the internet and finding recommendations which are not productive, I thought my life was gone. Being alive without the strategies to the difficulties you have fixed by way of your good site is a critical case, as well as ones that might have adversely affected my entire career if I had not discovered the blog. Your own talents and kindness in controlling all the pieces was excellent. I’m not sure what I would have done if I had not encountered such a subject like this. I’m able to at this moment look ahead to my future. Thanks for your time so much for the reliable and amazing help. I won’t think twice to suggest your blog post to anybody who requires support on this subject. I am also commenting to make you understand of the brilliant encounter my friend’s daughter encountered using your web site. She even learned a good number of details, not to mention how it is like to possess an awesome coaching character to have a number of people easily master specified very confusing things. You undoubtedly did more than her expectations. Thank you for offering those warm and helpful, dependable, edifying and also unique tips on the topic to Lizeth. I precisely needed to appreciate you once again. I am not sure the things that I would have carried out without those aspects shown by you over such a area of interest. It had become an absolute frustrating situation for me, nevertheless finding out a professional avenue you managed the issue made me to leap for joy. Now i’m happy for your assistance and thus have high hopes you recognize what a great job your are putting in training the mediocre ones thru your web site. I am certain you have never encountered all of us. I’m just commenting to let you be aware of what a incredible experience our girl had checking your web site. She picked up many things, including what it is like to have a marvelous giving character to get other folks clearly completely grasp a number of advanced topics. You truly did more than visitors’ desires. Thanks for showing these powerful, trustworthy, educational and in addition cool guidance on that topic to Ethel. I actually wanted to compose a small remark so as to say thanks to you for these awesome points you are writing at this website. My incredibly long internet research has at the end been compensated with extremely good insight to share with my pals. I ‘d mention that we site visitors actually are unequivocally endowed to be in a fantastic site with very many outstanding professionals with valuable solutions. I feel rather privileged to have encountered your webpages and look forward to really more enjoyable times reading here. Thank you once again for all the details. I would like to express some appreciation to you just for rescuing me from this type of scenario. Because of surfing throughout the online world and finding basics which are not powerful, I assumed my entire life was gone. Existing without the strategies to the issues you’ve solved all through your guide is a critical case, and the kind that could have in a wrong way affected my entire career if I hadn’t come across your website. The mastery and kindness in dealing with a lot of things was precious. I’m not sure what I would’ve done if I had not discovered such a subject like this. I’m able to now look ahead to my future. Thanks so much for your professional and result oriented help. I will not think twice to recommend your web site to anybody who requires care about this subject matter. A lot of thanks for your entire effort on this web page. Ellie take interest in doing research and it’s really easy to see why. My partner and i hear all regarding the powerful method you present valuable tips and tricks by means of this web blog and in addition attract contribution from visitors on the topic then my daughter is undoubtedly learning a great deal. Take pleasure in the rest of the year. You’re the one carrying out a powerful job. My spouse and i felt very comfortable when Ervin could carry out his investigation through the precious recommendations he discovered from your own web pages. It’s not at all simplistic to just happen to be giving freely information that many people could have been making money from. So we take into account we have got the blog owner to be grateful to for that. The specific illustrations you’ve made, the easy website navigation, the friendships you will aid to instill – it is all terrific, and it is leading our son in addition to the family know that that issue is fun, and that’s pretty mandatory. Many thanks for everything! I as well as my pals were actually going through the best information found on your web site then the sudden I had an awful suspicion I had not thanked the blog owner for those strategies. All of the young men were definitely as a consequence happy to read them and already have quite simply been taking pleasure in these things. I appreciate you for turning out to be indeed considerate and then for picking this kind of good subject areas millions of individuals are really needing to learn about. Our own sincere apologies for not expressing appreciation to you earlier. I in addition to my pals were looking through the good recommendations located on the blog and so at once I had an awful feeling I never thanked the website owner for those secrets. These people are already happy to learn all of them and have in effect unquestionably been using those things. Thank you for getting so helpful and for deciding upon varieties of useful information millions of individuals are really eager to be informed on. Our honest apologies for not expressing appreciation to earlier. My husband and i ended up being relieved Jordan could finish off his survey through your ideas he made through the web site. It is now and again perplexing just to be making a gift of tips many people might have been selling. We really keep in mind we’ve got you to thank for this. The most important illustrations you have made, the simple blog navigation, the relationships you can give support to instill – it’s got all extraordinary, and it’s aiding our son and our family reckon that the subject is awesome, and that’s really serious. Many thanks for all the pieces! I just wanted to develop a simple note in order to thank you for all the lovely pointers you are giving out on this site. My long internet look up has at the end of the day been recognized with awesome concept to go over with my relatives. I ‘d assume that most of us visitors are undeniably endowed to exist in a superb community with so many wonderful individuals with beneficial tips and hints. I feel truly grateful to have discovered your entire weblog and look forward to some more amazing times reading here. Thanks again for all the details. I precisely needed to say thanks once more. I am not sure what I would have worked on in the absence of these aspects shown by you about such a field. It absolutely was a real frustrating dilemma for me personally, however , observing the specialized avenue you solved the issue took me to weep for delight. Now i am happy for the help and have high hopes you find out what a great job that you’re accomplishing teaching some other people all through your web site. I am certain you’ve never met all of us. Thanks a lot for giving everyone such a nice chance to check tips from this website. It’s always very beneficial and jam-packed with a great time for me and my office colleagues to search the blog at least thrice in 7 days to read through the newest tips you have got. And indeed, we are always contented for the very good tips you serve. Some 4 facts in this posting are ultimately the most impressive we’ve ever had. Needed to put you this very little note to say thank you as before for your nice methods you’ve discussed here. It has been simply extremely open-handed with you to deliver extensively precisely what many people would’ve advertised as an ebook in making some cash for themselves, particularly considering that you could possibly have done it if you ever decided. The suggestions in addition acted as a great way to realize that other people online have similar dreams like my own to understand very much more with regards to this matter. I believe there are numerous more pleasant instances in the future for people who take a look at your blog post. I simply wanted to say thanks again. I do not know what I might have worked on without the strategies documented by you over that subject matter. It was actually a real alarming circumstance for me personally, nevertheless encountering this professional way you resolved it forced me to weep over gladness. Extremely grateful for this advice and believe you find out what an amazing job you happen to be getting into teaching many others all through your websites. Most likely you have never encountered any of us. I’m also commenting to let you understand what a really good discovery my girl enjoyed using your site. She learned lots of issues, which include what it’s like to possess an incredible helping mood to let other people just thoroughly grasp specified complicated subject areas. You undoubtedly did more than people’s desires. Many thanks for displaying the helpful, trustworthy, edifying and in addition fun tips on that topic to Tanya. I have to show my love for your generosity in support of men and women who actually need assistance with this niche. Your special commitment to getting the solution all-around appears to be certainly advantageous and have frequently encouraged those like me to attain their pursuits. Your personal invaluable tips and hints entails a lot a person like me and still more to my peers. Thanks a ton; from each one of us. I am only writing to make you understand what a really good encounter my friend’s princess encountered browsing yuor web blog. She realized a lot of details, including what it is like to have an excellent teaching mood to have certain people clearly completely grasp some tricky matters. You really surpassed our desires. Thank you for delivering the priceless, safe, edifying and in addition fun tips about that topic to Evelyn. I’m just commenting to make you understand what a brilliant discovery my cousin’s princess went through visiting your webblog. She came to find some issues, most notably what it’s like to possess a very effective giving heart to get most people really easily fully grasp various impossible subject areas. You really did more than our expected results. Thank you for displaying such essential, safe, revealing and easy tips about that topic to Tanya. I want to show thanks to you for bailing me out of this type of matter. Because of surfing around throughout the the net and obtaining ways that were not productive, I believed my life was over. Existing without the strategies to the issues you’ve sorted out through your main report is a crucial case, as well as the kind which may have badly affected my entire career if I had not encountered your site. Your own personal expertise and kindness in taking care of all things was precious. I’m not sure what I would’ve done if I hadn’t discovered such a thing like this. It’s possible to at this time relish my future. Thanks so much for your skilled and result oriented help. I won’t be reluctant to recommend the blog to any person who ought to have counselling about this matter. Thanks a lot for providing individuals with an exceptionally brilliant chance to read in detail from this site. It really is very useful and also packed with fun for me personally and my office colleagues to visit your blog no less than 3 times per week to read the newest items you have. And definitely, we are usually pleased with all the outstanding hints you serve. Selected 2 areas in this post are easily the finest we have all ever had. Thanks a lot for giving everyone an extraordinarily splendid chance to read from this web site. It can be very excellent and as well , stuffed with a good time for me and my office peers to visit the blog nearly thrice per week to see the fresh guides you have. And of course, I’m so always contented with all the effective hints you give. Some two ideas on this page are truly the most impressive we have had. My spouse and i ended up being peaceful when Peter managed to finish up his reports through the precious recommendations he obtained through your weblog. It’s not at all simplistic just to possibly be making a gift of key points which people may have been selling. We keep in mind we’ve got the website owner to be grateful to for that. The most important explanations you made, the simple web site menu, the friendships your site aid to engender – it’s many fantastic, and it’s really facilitating our son and our family believe that that topic is brilliant, which is certainly very mandatory. Thank you for the whole thing! I actually wanted to type a word to express gratitude to you for those nice recommendations you are placing here. My extensive internet search has at the end been paid with useful facts and strategies to exchange with my friends and classmates. I ‘d say that we site visitors are unquestionably blessed to exist in a superb place with many perfect people with very beneficial ideas. I feel rather happy to have discovered your website page and look forward to tons of more awesome moments reading here. Thanks once again for everything. I definitely wanted to write down a simple comment to say thanks to you for the superb techniques you are placing here. My time-consuming internet look up has now been compensated with good quality concept to share with my friends and classmates. I ‘d admit that many of us visitors are extremely fortunate to dwell in a magnificent community with so many perfect professionals with great points. I feel quite lucky to have seen your weblog and look forward to plenty of more exciting times reading here. Thank you once again for everything. My wife and i have been so joyful Chris managed to carry out his studies with the ideas he made out of your blog. It’s not at all simplistic just to happen to be making a gift of secrets and techniques that some others could have been selling. And we all consider we now have the writer to be grateful to because of that. All of the illustrations you made, the simple blog menu, the relationships you can make it easier to promote – it’s got most unbelievable, and it’s really making our son in addition to us feel that this subject matter is brilliant, which is certainly especially fundamental. Thank you for the whole thing! I am commenting to make you understand of the fabulous encounter our girl had visiting your web site. She discovered so many pieces, which include what it’s like to possess a very effective helping mood to make the others effortlessly learn several very confusing topics. You undoubtedly exceeded her expectations. Thanks for distributing these necessary, trusted, edifying and in addition easy tips on the topic to Emily. I in addition to my friends came checking the good guides from your site while before long got an awful suspicion I had not thanked the website owner for those tips. Most of the young men appeared to be totally very interested to learn all of them and have now certainly been having fun with them. Thank you for genuinely quite kind and also for picking such quality issues most people are really eager to be informed on. My very own sincere regret for not saying thanks to you earlier. Artist, writer, theorist and composer Yasunao Tone presents new work embracing artificial intelligence.
2019-04-24T21:45:49Z
http://loudplace.com/sammy-hagar-circle/
MOSCOW 27 December Russia's defence minister, Sergei Ivanov, has moved one step further in his plan to reorganise Russia's shipbuilding industry, with an announcement that three holding companies for the country's shipyards will be created. One is to consolidate the military yards of St Petersburg; a second to unify the civil shipbuilders and a third to be located in the Russian Far East, where there is currently just one yard at work: the Amur Shipbuilding Plant in Blagoveschensk. According to Ivanov, "it is important for us not to lose our position in the construction of ships of various classes on the Pacific coast". In August, President Vladimir Putin publicly ordered a new state programme to reinvigorate shipbuilding, and gave Ivanov the assignment. "Our niches where we are most competitive in the world markets of shipbuilding," Putin said, according to the Kremlin transcript, "should be selected." Referring to military shipbuilding as a "serious niche" in the market, Putin also added: "we do not need to compete with the Chinese and South Koreans [to build] large-capacity vessels, such as tankers. But for us, there are certain advantages, including in the field of high technologies." Moscow maritime sources told Fairplay they see no commercial benefit to the existing yards from the restructuring. Captain Mikhail Nenashev of the industry lobby the All-Russian Movement of Fleet Support, told Fairplay "no details were announced so far". ICT, former owner of the big Baltic Plant in St Petersburg, commented that Ivanov's announcement shows there is a plan, "but nothing more." MNP, the biggest ship-building group on the Volga River, added that Ivanov's announcement was news to them, and that "nobody is negotiating with us on this matter”. MIAMI 22 December – Carnival Corp has conceded that its fledging Costa Asia division is off to a poor start and that changes are ahead. The China programme launched in Shanghai in July with the Costa Allegra, which has repositioned as scheduled to Hong Kong for the winter. “We’re finding the Chinese market to be difficult,” admitted Carnival chief financial officer Gerald Cahill during yesterday’s conference call, adding: “The ship is underperforming our expectations, with larger than expected losses and lower net revenue yield.” As Carnival chairman Micky Arison put it: “We always knew we’d be making an investment to educate ourselves [in the Chinese market], but our investment is a little more than we expected – maybe more than a little.” Carnival chief operating officer Howard Frank concluded: “We’ve pretty much got the product right; the response from the Chinese passengers has been very good. But the issue is market penetration and getting support from the distribution system.” To compensate, Frank said that itinerary modifications would be made in 2007 and new passenger source markets would be tapped. “The plan is to stay the course,” he affirmed. FORT LAUDERDALE 22 December – Fort Lauderdale’s population is expected to temporarily grow 25% tomorrow as more than 46,000 cruise passengers disembark from 13 vessels at Port Everglades. This breaks the port's original record set three years ago said port director Phillip Allen in a statement, noting the previous record was set on 21 December 2003 when 15 cruise ships docked simultaneously. Adding “holiday cruises to the Caribbean are always popular this time of year, but this year is exceptional because Port Everglades will be hosting larger ships than ever before, including the immense Queen Mary 2.” In addition to the Cunard Line’s QM2, other vessels calling are Carnival Cruise Lines’ Carnival Liberty, Costa Cruises’ Costa Magica, Discovery Cruise Line’s Discovery Sun, Holland America Line’s Volendam and Zuiderdam, Imperial Majesty Cruise Line’s Regal Empress, Princess Cruises’ Sea Princess and Star Princess, Royal Caribbean International’s Enchantment of the Seas and Radiance of the Seas, Seabourn Cruise Line’s Seabourn Pride and SeaEscape Cruises’ Island Adventure. MIAMI 22 December – Carnival Corp is committed to growing its German joint venture with TUI using newbuilding tonnage, assuming a final deal is struck. Speaking during yesterday’s conference call, Carnival chairman Micky Arison explained that given TUI Cruises’ strong potential for premium pricing, it was decided not to shift older tonnage into the line, but rather to stick with newbuildings from the onset. “If we went into this with older ships, that by its very nature would require us to start the brand with discounted prices and we don’t want to do that,” he said, adding that Carnival “has had discussions with a number of yards on the TUI ship [to be delivered in 2010], subject to a finalised agreement with TUI”. The new TUI vessel’s design will be “very different” from AIDA’s ‘club ship’ concept, he continued, “and will be much closer to a traditional cruise product, but very much geared toward German clientele”. Carnival chief operating officer Howard Frank noted that the German cruise market is twice the size of the UK’s, yet Germany currently has only one brand, versus 6-7 in England. “We always knew we’d need other brands in Germany,” said Arison. MIAMI 21 December – Carnival Corp raked in record profits this year, but concedes that Caribbean booking difficulties now extend through the first half of 2007. Carnival reported net income of $416M during 4Q06, up from $336M in 4Q05, and full-year 2006 profits of $2.28Bn, versus $2.25Bn in 2005. After more exceptional earnings growth in 2004 and 2005, the more “modest” earnings increase this year was due to a $210M hike in fuel costs combined with a drop in Caribbean pricing on “hurricane fears and a challenging economic environment”, said chairman Micky Arison. Adjusted for currency, net revenue yields increased 0.8% in 4Q06 and 1.5% for full-year 2006. Commenting on 2007, Arison said bookings remain strong for European cruise brands and North American brands outside the Caribbean. However, pricing in the Caribbean [for 1H2007] “is still under pressure”, he said, adding that “the strength of the upcoming ‘Wave Season’ will have a significant effect on 2007 revenue yields”. Currently, Carnival predicts currency-adjusted net revenue yields will fall 2% in 1Q07 and end flat to slightly down for full-year 2007. Capacity will increase 8.4% next year, while net cruise costs are expected to remain steady. BOSTON 21 December – Even as the governor of Massachusetts signed off on two new offshore LNG terminals, one of the facilities’ owners pledged to hire US merchant mariners to operate its tankers – and the platform. On Tuesday, Gov Mitt Romney approved construction of the Northeast Gateway and Neptune terminals, which will be built 11km and 21km respectively off Gloucester, Mass. With the Republican governor’s approval, the only remaining hurdle is approval by the US Maritime Administration, and MarAd boss Sean Connaughton said yesterday that a decision can be expected by the end of February. During the conference call when Connaughton announced the timeline, he and representatives of Suez LNG – developer of the Neptune project – revealed that Suez will seek to hire US seafarers and graduating cadets from American maritime academies to staff the tankers that will call at the platform. “Our company works everyday to be a pacesetter within the LNG industry,” said Joseph McKechnie, senior vice-president of shipping for Suez LNG. His company is working closely with the Massachusetts Maritime Academy and the US Merchant Marine Academy in training cadets to work aboard LNG tankers and platforms, he said. Suez currently owns four tankers and has three on charter, and the fleet is projected to grow by 15% to 20% annually McKechnie said. Stricter rules on carrying vegetable oils in bulk by ship are among the changes introduced by amendments to the International Convention for the Prevention of Pollution from Ships, 1973, as modified by the Protocol of 1978 relating thereto (MARPOL 73/78), which enter into force on 1 January 2007. The revised Annex II regulations on carriage of noxious liquid substances carried in bulk (including chemicals and vegetable oils) introduce significant changes to the way certain products may be transported, in order to protect the marine environment from harm. Revised Annex I regulations on carriage of oil by ship update and re-order the regulations as well as introducing some new rules. In addition, a number of amendments to the International Convention for the Safety of Life at Sea (SOLAS) also enter into force on 1 January 2007. The revised MARPOL Annex I Regulations for the prevention of pollution by oil incorporates the various amendments adopted since MARPOL entered into force in 1983, including the amended regulation 13G (regulation 20 in the revised annex) and regulation 13H (regulation 21 in the revised annex) on the phasing-in of double hull requirements for oil tankers. It also separates, in different chapters, the construction and equipment provisions from the operational requirements and makes clear the distinctions between the requirements for new ships and those for existing ships. The revision provides a more user-friendly, simplified Annex I. * Regulation 22 Pump-room bottom protection: on oil tankers of 5,000 tonnes deadweight and above constructed on or after 1 January 2007, the pump-room shall be provided with a double bottom. * Regulation 23 Accidental oil outflow performance - applicable to oil tankers delivered on or after 1 January 2010; construction requirements to provide adequate protection against oil pollution in the event of stranding or collision. The revised Annex II Regulations for the control of pollution by noxious liquid substances in bulk includes a new four-category categorization system for noxious and liquid substances. * Other Substances: substances which have been evaluated and found to fall outside Categories X, Y or Z because they are considered to present no harm to marine resources, human health, amenities or other legitimate uses of the sea when discharged into the sea from tank cleaning of deballasting operations. The discharge of bilge or ballast water or other residues or mixtures containing these substances are not subject to any discharge requirements of MARPOL Annex II. The revised annex includes a number of other significant changes. Improvements in ship technology, such as efficient stripping techniques, has made possible significantly lower permitted discharge levels of certain products which have been incorporated into Annex II. For ships constructed on or after 1 January 2007, the maximum permitted residue in the tank and its associated piping left after discharge will be set at a maximum of 75 litres for products in categories X, Y and Z - compared with previous limits which set a maximum of 100 or 300 litres, depending on the product category. Alongside the revision of Annex II, the marine pollution hazards of thousands of chemicals have been evaluated by the Evaluation of Hazardous Substances Working Group, giving a resultant GESAMP Hazard Profile which indexes the substance according to its bio-accumulation; bio-degradation; acute toxicity; chronic toxicity; long-term health effects; and effects on marine wildlife and on benthic habitats. As a result of the hazard evaluation process and the new categorization system, vegetable oils which were previously categorized as being unrestricted will now be required to be carried in chemical tankers. The revised Annex includes, under regulation 4 Exemptions, provision for the Administration to exempt ships certified to carry individually identified vegetable oils, subject to certain provisions relating to the location of the cargo tanks carrying the identified vegetable oil. An MEPC resolution, MEPC.148(54) Guidelines for the transport of vegetable oils in deep tanks or in independent tanks specially designed for the carriage of such vegetable oils on board dry cargo ships, allows general dry cargo ships that are currently certified to carry vegetable oil in bulk, to continue to carry these vegetable oils on specific trades. The guidelines also take effect on 1 January 2007. An amended International Bulk Chemical Code (IBC Code) reflecting the changes to MARPOL Annex II, also enters into force on 1 January 2007. The amendments incorporate revisions to the categorization of certain products relating to their properties as potential marine pollutants, as well as revisions to ship type and carriage requirements following their evaluation by the Evaluation of Hazardous Substances Working Group. * New SOLAS regulation II-1/3-7 to require ship construction drawings to be maintained on board and ashore. * New SOLAS regulation II-1/3-8 concerning towing and mooring equipment. The regulation will require all ships to be provided with arrangements, equipment and fittings of sufficient safe working load to enable the safe conduct of all towing and mooring operations associated with the normal operation of the ship. * New SOLAS regulation II-1/23-3 concerning water level detectors in the cargo hold(s) on new single hold cargo ships other than bulk carriers. * Amendment to SOLAS regulation II-1/31 concerning machinery control to restrict the application of propulsion control automation systems to new ships only. In addition, amendments to the Guidelines on the enhanced programme of inspections during surveys of bulk carriers and oil tankers (resolution A.744(18)), as amended) enter into force on 1 January 2007. The amendments incorporate some elements of the Condition Assessment Scheme (CAS) required for certain single hull tankers under MARPOL Annex I and include re-organization of the guidelines to include a new section on survey guidelines for the inspection of double hull tankers. DELHI 20 December – India's steel ministry has asked the finance ministry to remove the 5% import duty on junk ships to breathe life back into the dying shipbreaking industry. Imports of old ships into India attract a basic duty of 5% and countervailing duty (CVD) of 16%, exactly the same duty structure as for imports of finished steel. Bangladesh has cornered all large ships for breaking with a simple duty structure: a fixed duty of Tk1,000 takka ($14.45) and nil value-added tax (VAT), as against 10% basic duty and 15% VAT for finished steel imports. Pravin Nagarsheth, president of the Indian shipbreakers' association, said the Bangladesh government has helped local breakers with a viable duty regime, whereas India's duty structures have pushed the industry to the brink of complete shutdown. Bangladesh has demolished over 4.6MDWT during the first 11 months of 2006, way ahead of India's 1MDWT. Other shipbreaking nations including China (0.2MDWT) and Pakistan (0.2MDWT) have also seen tonnage drop drastically. "The Bangladesh shipbreaking industry has thrived on the country's increased demand for steel, and insufficient supply from primary steel producers," said an Alang-based breaker. MANILA 20 December – Shipbuilders in the Philippines have received government backing, with a new directive signed by the President to encourage employment in shipyards and protecting employers’ rights. Executive Order 588, signed by President Gloria Macapagal-Arroyo, seeks to strengthen the shipbuilding and repair sector by providing incentives for skills training under the country’s new investment programme. The presidential order was apparently sparked by Hanjin HI and Construction’s recent investment in a $1Bn yard in Subic Bay Freeport. The project is predicted to attract about 15,000 job opportunities. EO 588 also recognises shipyards’ rights to guard `trade secrets’ and urges them to adopt measures to protect building formulas, strategies and other controversial programmes and information. “There is a need to attract and maintain much-needed investments for the development of the shipbuilding and ship repair sectors in view of its significance to the country’s economic output … and its potential to open vast opportunities for employment and skills training for Filipinos,” the order said. MIAMI 19 December – Pricing for cruising’s "bread and butter" Caribbean itineraries continues to fall, according to a new survey by AG Edwards analyst Tim Conder. The survey – which independently monitors forward rates offered by Carnival and Royal Caribbean – found that Caribbean pricing for both 1Q07 and 2Q07 is “still eroding” and “continues to modestly weaken”. Meanwhile, 2Q07 Alaskan pricing is “flattish”, while rates for European and other non-Caribbean itineraries “remain solid”. The analyst noted that Caribbean weakness is persisting in spite of the mild 2006 hurricane season and the delayed implementation of new US passport requirements. “Our data indicates weakness is more skewed toward the shorter Caribbean and entry-level cruise brands,” he said, implying that the problem is “likely related to mortgage interest rates impacting consumers’ share of spending available for cruises”. Conder added that a mild Northeast winter could dampen “escape-to-the-Caribbean cabin-fever demand” and that early indications for the 2007 Wave Season were “not positive”. On the plus side, Conder noted that fuel prices have fallen 3-5% since the last quarterly guidance from Carnival and Royal Caribbean. As a result, 2007 results could show positive year-on-year cost comparisons. A raft of new international standards for passenger ship safety were adopted when IMO’s Maritime Safety Committee (MSC) met in Istanbul, Turkey, for its 82nd session from 29 November to 8 December 2006. Other important issues on the MSC agenda included the further development of goal-based standards and discussion of security and facilitation issues related to the carriage of containers by ships. The MSC Vice-Chairman, Mr. Neil Ferrer of the Philippines, chaired the session, following the untimely death of Mr. Igor Ponomarev, Chairman of the MSC and Permanent Representative of the Russian Federation to IMO. The package of amendments to SOLAS adopted at the session were the result of a comprehensive review of passenger ship safety initiated in 2000 with the aim of assessing whether the current regulations were adequate, in particular for the large passenger ships now being built. The work in developing the new and amended regulations has based its guiding philosophy on the dual premise that the regulatory framework should place more emphasis on the prevention of a casualty from occurring in the first place and that future passenger ships should be designed for improved survivability so that, in the event of a casualty, persons can stay safely on board as the ship proceeds to port. time for orderly evacuation and abandonment, including requirements for the essential systems that must remain operational in case any one main vertical zone is unserviceable due to fire. The amendments are expected to enter into force on 1 July 2010. The MSC adopted amendments to SOLAS chapter II-2 and to the International Code for Fire Safety Systems (FSS Code) to strengthen the fire protection arrangements in relation to cabin balconies on passenger vessels. The amendments were developed in response to the fire aboard the cruise ship Star Princess, while on passage between Grand Cayman and Montego Bay, Jamaica, in March of this year. The fire began on an external balcony and spread over several decks. The amendments to SOLAS chapter II-2 are aimed at ensuring that existing regulations 4.4 (Primary deck coverings), 5.3.1.2 (Ceilings and linings), 5.3.2 (Use of combustible materials) and 6 (Smoke generation potential and toxicity) are also applied to cabin balconies on new passenger ships. For existing passenger ships, relevant provisions require that furniture on cabin balconies be of restricted fire risk unless fixed water-spraying systems, fixed fire detection and fire alarm systems are fitted and that partitions separating balconies be constructed of non-combustible materials, similar to the provisions for new passenger ships. The amendments are expected to enter into force on 1 July 2008. The MSC adopted an amendment to SOLAS regulation III/19.3.3.4 concerning provisions for the launch of free-fall lifeboats during abandon-ship drills. The amendment will allow, during the abandon-ship drill, for the lifeboat to either be free-fall launched with only the required operating crew on board, or lowered into the water by means of the secondary means of launching without the operating crew on board, and then manoeuvred in the water by the operating crew. The aim is to prevent accidents with lifeboats occurring during abandon-ship drills. The amendment is expected to enter into force on 1 July 2008. The MSC adopted the Performance standard for protective coatings of dedicated seawater ballast tanks on all new ships and of double-side skin spaces of bulk carriers, which will be made mandatory by way of amendments to SOLAS regulations II-1/3-2, also adopted at the session. The SOLAS amendments are expected to enter into force on 1 July 2008 and the performance standard will apply to ships for which the building contract is placed on or after 1 July 2008; or, in the absence of a building contract, the keels of which are laid on or after 1 January 2009, or the delivery of which is on or after 1 July 2012. amendments to the FSS Code relating to fire extinguishers, specifically portable foam applicators; fixed foam fire-extinguishing systems; fixed-pressure water-spraying and water-mist fire-extinguishing systems, fixed fire detection and fire alarm systems for cabin balconies. Entry into force on 1 July 2008. amendments to the International Life-Saving Appliance Code (LSA Code), including those related to life rafts, life boats and rescue boats, particularly in relation to stowage and release mechanisms. Entry into force on 1 July 2008. amendments to the International Code for the Construction and Equipment of Ships Carrying Dangerous Chemicals in Bulk (IBC Code), relating to fire protection and fire extinction, and the revised chapters 17 (Summary of minimum requirements), 18 (List of products to which the code does not apply) and 19 (Index of Products Carried in Bulk). Entry into force on 1 January 2009. amendments to the International Code for the Construction and Equipment of Ships Carrying Liquefied Gases in Bulk (IGC Code), to update the references to SOLAS regulations and to add two more chemicals to the list of products in chapter 19 (Summary of minimum requirements). Entry into force on 1 July 2008. amendments to the International Codes of Safety for High-Speed Craft (1994 HSC Code and the 2000 HSC Code), to update them in line with relevant SOLAS amendments and, in the case of the 2000 HSC Code, to revise requirements relating to testing and calculations for buoyancy, stability and subdivision. Entry into force on 1 July 2008. amendments to the Protocol of 1988, relating to the International Convention for the Safety of Life at Sea, 1974, to include in the Record of equipment for the relevant safety certificate an entry regarding the long-range identification and tracking system. Entry into force on 1 July 2008. amendments to the Protocol of 1988 relating to the International Convention on Load Lines, 1966, including amendments of a reference in regulation 22 (Scuppers, inlets and discharges) and an amendment in regulation 39 (Minimum bow height and reserve buoyancy). Entry into force on 1 July 2008. amendments to the Dynamically Supported Craft (DSC) Code to update it in line with relevant amendments to SOLAS. Will become effective on 1 July 2008. amendments to the Gas Carrier (GC) Code, to update it in line with certain fire safety requirements in SOLAS. Will become effective on 1 July 2008. amendments to the Revised recommendation on testing of life-saving appliances (resolution MSC.81(70)), including revisions to prototype tests for lifebuoys, lifejackets, immersion suits, anti-exposure suits and thermal protective aids, liferafts, lifeboats, rescue boats and fast rescue boats, launching and embarkation appliances, position-indicating lights for life-saving appliances and hydrostatic release units; and revisions to production and installation tests for survival craft, launching and stowage arrangements. The amendments will become effective on 1 July 2008. The Committee agreed that the International Mobile Satellite Organization (IMSO) was the appropriate Organization to undertake the oversight of future satellite service providers in the global maritime distress and safety system (GMDSS) and invited IMSO to undertake that role forthwith. In essence, the MSC would determine the criteria, procedures and arrangements for evaluating and recognizing satellite services for participation in the GMDSS, while services recognized by the Committee would be subject to oversight by IMSO. The MSC instructed the Sub-Committee on Radiocommunications, Search and Rescue (COMSAR 11) to redraft resolution A.888(21) Criteria for the provision of mobile-satellite communication systems in the GMDSS, to reflect the decisions and to submit it to MSC 83 with a view to adoption by the 25th IMO Assembly. COMSAR 11 was also invited to finalize any corresponding amendments to SOLAS chapter IV. The MSC re-established the Working Group on Goal-based Standards and further progressed the work on the issue. The Committee has worked on the basis of a prescriptive approach for GBS for provisions for hull construction for bulk carriers and oil tankers and of a safety level approach for all other ship types. With regard to the GBS for bulk carriers and oil tankers, the MSC has already agreed on a five-tier system, consisting of goals (Tier I), functional requirements (Tier II), verification of compliance criteria (Tier III), technical procedures and guidelines, classification rules and industry standards (Tier IV) and codes of practice and safety and quality systems for shipbuilding, ship operation, maintenance, training, manning, etc. (Tier V). Tier I goals and Tier II functional requirements have already been agreed in principle. Following consideration of the matter, the MSC approved the Plan for the pilot project on trial application of the Tier III verification process using the IACS Common Structural Rules (CSR) and agreed that the nomination of candidates for the Pilot Panel should be open to all, while the selection of members by the MSC Chairman, in consultation with the Secretariat, would assure that the Panel would be balanced. The objective of the pilot project is to conduct a trial application of Tier III for oil tankers and bulk carriers with the intention of validating the Tier III verification framework, identifying shortcomings and making proposals for improvement. The MSC agreed to include ergonomic principles as functional requirements in Tier II, and the Group prepared revised Tier II functional requirements. The MSC noted that the Group agreed on a revised version of the Ship Construction File (SCF) and that the SCF, as a result of GBS, could become an independent mandatory requirement under SOLAS chapter II-1 and not part of the classification rules. However, most of the content in the file would emerge from the application of classification rules. A correspondence group on GBS for oil tankers and bulk carriers was established, to monitor the pilot project and disseminate information on its progress and to develop draft SOLAS amendments for the incorporation of GBS for oil tankers and bulk carriers in SOLAS chapter II-1. A Correspondence Group on the Safety Level Approach was established, to progress work to determine the current safety level in a holistic high-level manner, divided by ship types, in order to develop Tier I goals by: distinguishing ship types in a clear manner resulting in definitions of generic ship types for the purpose of statistical analysis; determining time windows to be used for historical data when establishing statistics for risk categories; and reviewing available statistical data. The Group will also consider the linkage between formal safety assessment (FSA) and GBS and consider the tier structure so far agreed for GBS for oil tankers and bulk carriers for use in the safety level approach. Both groups will submit a report to MSC 83, scheduled for October 2007, which will also consider the report of the pilot project with the IACS CSR. The MSC approved a circular on Interim Guidance on voluntary self-assessment by Companies and company security officers (CSOs) for ship security. The MSC also approved amendments to the Revised recommendations on the safe transport of dangerous cargoes and related activities in port areas (MSC/Circ.675), to include provisions intended to address the security of the transport of dangerous goods by sea. It also approved amendments to the IMO/ILO/UNECE Guidelines for packing of cargo transport units (MSC/Circ.787) to broaden the scope of the guidelines to address the need for vigilance and the need for security procedures to be developed and followed by all concerned. The latter amendments will be forwarded to ILO and the UNECE for their consideration and approval. The MSC began consideration of issues relating to the security aspects of the operation of ships which do not fall within the scope of SOLAS chapter XI-2 and the ISPS Code (including cargo ships of less than 500 gross tonnage which travel on international routes). The Committee agreed that non-SOLAS vessels shared the same operational environment as ships which fall within the scope of application of SOLAS chapter XI-2 and the ISPS Code and the operations of the former affect the security of the latter. Thus, it was necessary to address the security aspects of the operation of non-SOLAS ships in a systematic and analytical manner, so as to achieve a tangible enhancement of the global security net which the provisions of SOLAS chapter XI-2 and the ISPS Code were seeking to establish. It was agreed also that any guidelines developed should be non-mandatory and that their application should be under the purview of the individual Contracting Governments concerned and proportionate to the assessed levels of threat and risk. A correspondence group was established to undertake a study to determine the scope of the issues and threats involved and to develop recommendatory guidelines on measures to enhance maritime security to complement measures required by SOLAS chapter XI-2 and the ISPS Code, which could be utilized by Contracting Governments and/or Administrations at their own discretion. In relation to closed cargo transport units and containers, the Committee and the Facilitation Committee established a Joint MSC/FAL Working Group which met during the MSC session and began work on container and supply chain security, with a view to ensuring that the right balance is struck between enhanced security and the facilitation of maritime traffic. The Group, in its work, took into account the SAFE Framework of Standards to secure and facilitate global trade (the SAFE Framework of Standards) and the Authorized Economic Operator Guidelines, adopted by the World Customs Organization (WCO) in June 2005 and June 2006, respectively. The SAFE Framework of Standards was developed by WCO in response to a request from the 2002 SOLAS Conference which adopted SOLAS chapter XI-2 and the ISPS Code. The Joint Working Group held initial discussions on the need to develop any relevant amendments to the SOLAS and/or FAL Conventions concerning closed cargo transport units and freight containers, to enhance maritime security whilst at the same time facilitating the movement of cargo. The MSC urged all member delegations and observers to consult with their experts in all aspects of the security and facilitation of maritime cargo and to submit their proposals on the security and facilitation of the movement of closed cargo transport units and of freight containers to the next session of the Facilitation Committee (FAL 34), for consideration by the next session of the joint MSC/FAL Working Group. The MSC made progress on the development of the technical specifications of the components of the Long-Range Identification and Tracking (LRIT) System, including the technical specifications for the International LRIT Data Exchange, the International LRIT Data Centre and for communication within the LRIT System network; protocols for the development testing of the LRIT System and for the testing of the integration into the system of new LRIT data centres; and guidance on setting up and maintaining the Data Distribution Plan. It was agreed that the ad hoc Working Group on engineering aspects of LRIT should be reconvened to further develop the draft technical specifications; update the required technical documents; prepare a technical costing and billing standard for LRIT; consider technical issues and develop technical criteria to be taken into account when establishing the International LRIT Data Centre and the International LRIT Data Exchange; liaise with the IMO Secretariat regarding consistency, security and other aspects of the Data Distribution Plan with the technical specifications; and ensure that the testing documents completely address the Performance Standards. The Group is scheduled to meet in the week before the Sub-Committee on Radiocommunications, Search and Rescue (COMSAR 11, scheduled for 12-16 February 2007), and COMSAR was also instructed to consider issues relating to LRIT, particularly matters other than the specific engineering aspects. In considering the role of performance review and audit of certain aspects of the LRIT system, the MSC appointed the International Mobile Satellite Organization (IMSO) as the LRIT Co-ordinator. The new regulation on LRIT, which is included in SOLAS chapter V on Safety of Navigation, was adopted at the last MSC session in May, along with related performance standards. LRIT will be introduced as a mandatory requirement for the following ships on international voyages: passenger ships, including high-speed craft; cargo ships, including high-speed craft, of 300 gross tonnage and upwards; and mobile offshore drilling units. If accepted by 1 July 2007, the regulation is expected to enter into force on 1 January 2008 and will apply to ships constructed on or after 31 December 2008 with a phased-in implementation schedule for ships constructed before 31 December 2008. LRIT is intended to be operational with respect to the transmission of LRIT information by ships as from 31 December 2008. The Joint MSC/MEPC Working Group on Human Element met during the session to consider human element issues. The Group reviewed the report of the Inter-Industry Working Group (IIWG) and the Human Factors Task Group (HFTG), established to study the reported incidents of explosions on chemical and product carriers and agreed that it was difficult to draw conclusive analysis from existing casualty reports due to the lack of human element considerations during these investigations, such as investigators asking the relevant questions to determine if the human element was a contributing factor in the casualty. Nonetheless, the industry’s review of its procedures and guidelines was a very positive step towards addressing the issue. Member States were urged to provide reports of casualty investigations to the Sub-Committee on Flag State Implementation (FSI) expeditiously, with a view to arriving at constant and consistent analysis to ensure that such accidents and incidents do not recur. It was agreed that there was a need to review and strengthen requirements for Dangerous Cargo Endorsements (DCEs) and proposals were invited with regards to the need for extending the requirements for DCEs to operational shore staff including terminal personnel and cargo surveyors. The Sub-Committee on Standards of Training and Watchkeeping (STW) was invited to review the requirements leading to DCEs for seafarers, under its agenda item “Comprehensive review of the STCW Convention and the STCW Code”. The Human Element Working Group also considered the report of the Group of Independent Experts (GIE) established by the Secretary-General to analyze the impact of the ISM Code and its effectiveness in the enhancement of safety of life at sea and protection of the marine environment. The Committee agreed with the recommendations made by the GIE, in particular that: guidelines for Administrations should be revised to make them more effective and user-friendly; and guidelines and associated training should be developed to assist companies and seafarers in improving the implementation of the Code. It also agreed that the results of the study should be given wide publicity across the industry. In discussing the GIE’s conclusions, the MSC agreed that the paperwork that supports ISM compliance should be proportionate to the size, type and operation of the company; concise and user-friendly; and relevant to the operations related to safety and environmental protection. The Committee noted that the industry had identified common areas between the ISM and ISPS Codes and that resolution A.852(20) on Guidelines for a structure of an integrated system of contingency planning for shipboard emergencies, may provide guidance to handle or manage common areas of the ISM and ISPS Codes. It was noted that, in order to properly motivate seafarers, companies should take into account feedback from shipboard personnel, including the outcome of shipboard safety committees to improve their operations and procedures relating to safety and environmental protection and it was essential for the company to respond in a constructive and timely fashion to any feedback received from seafarers operating the safety management system (SMS). Since seafarers are integral to the effective operation of the SMS, they should, therefore, be involved in the development and improvement of the system in order to ensure that the manuals are proportionate, concise and relevant. The MSC agreed there was a need to encourage companies and seafarers to document and record information on near misses and hazardous situations in order to understand the precursors to events that were detrimental to safety and the marine environment. It invited Member Governments, intergovernmental and non-governmental organizations in consultative status to submit proposals to the next session of the Joint MSC/MEPC Working Group on the Human Element, which is scheduled to be reconvened at MEPC 56 (9 to 13 July 2007). The list of Parties deemed to be giving full and complete effect to the provisions of the International Convention on Standards of Training, Certification and Watchkeeping for Seafarers (STCW), 1978, as amended, was updated when the Secretary-General submitted his report on those countries whose reports of independent evaluations had been completed since the previous MSC meeting. The list of confirmed Parties to the STCW convention now has 117 Parties. (MSC.1/Circ.1164/Rev.2). adopted revised Guidelines for the prevention and suppression of the smuggling of drugs, psychotropic substances and precursor chemicals on ships (previously resolution A.872(20)). The revised guidelines will be put forward to the Facilitation Committee for adoption at its next session. LIMASSOL 18 December – Louis Cruise Lines has agreed to charter its 15,781-gt, 928-berth veteran Orient Queen to Germany-based Hansa Kreuzfahrten and Delphin Kreuzfahrten for 140 days with immediate effect. The charter runs until 7 May 2007 and will incorporate a round-the-world trip departing from Piraeus. A spokesman at Louis told Fairplay the charter of the 1968-built ship had become available because a previous charter to an English company for a 31-day period (30 March to 29 April 2007) had fallen through because the charterer had been unable to fulfill its contractual obligations. He believed the English charter was to serve as a floating hotel during the cricket World Cup in the West Indies. The news came on the very morning that the English cricket team lost a match in Australia, but it was not known whether this had a bearing on the cancellation of charter. LONDON 18 December – South Korean shipbuilders have taken the top five places in the latest listing of yards and their order backlogs from Clarksons, the London-based shipping services provider. Hyundai Heavy Industries remains well ahead with 13.47M compensated gross tons - which measures the level of shipbuilding output - followed by Samsung with 9.23M CGT, Daewoo (7.6M CGT), Hyundai Mipo (4.06M CGT) and Hyundai Samho (3.06M CGT). The top ten included two Chinese yards (with Dalian New Shipyard at 2.74M CGT) and one Japanese yard. A spokesman from Korea Shipbuilders' Association commented that Chinese and Japanese rivals would find it hard to overtake Korean yards because the Koreans are regularly winning orders for high-value LNG carriers. MARIEHAMN 18 December – Birka Cruises, part of the Finnish short cruise and freight ferry group Birka Line, is to axe 27 jobs on its 34,758-gt cruise vessel Birka Paradise to trim costs. Starting early next year, the ship’s cabins will be cleaned up during turn around in Stockholm by contracted shore-based personnel rather than the ship’s own staff. The company said in late October it wants to save between euro2.5M-3.0M (up to $3.9M) a year by streamlining its administration, marketing and on board operations. The number of passengers increased by 27% in the nine months to 30 September and yields rose 3%, but this has not been enough to improve the financial performance of Birka Paradise as expected, which has forced the company to seek cost savings. The group made a 3Q06 pre-tax profit of euro1.24M, an increase from euro1.08M in the same period a year earlier. The company has forecast tough trading conditions in the Swedish short cruise market, while its six freight ferries have staged a stable performance. MIAMI 18 December – Carnival Cruise Lines (CCL) has exercised its outstanding option at Fincantieri for a sister to its largest post-Panamax newbuilding ever. Carnival Corp firmed its order for a second 130,000-gt, 3,652-passenger vessel for the CCL brand to be delivered by the Monfalcone yard in summer 2010, at a price of euro565M ($739M). The option, which was due to expire on 31 December, was part of Carnival Corp’s multi-brand $2Bn-plus order last December. The first sister ship in the new class of larger CCL post-Panamaxes is due to enter service in autumn 2009. Despite the fact that the pending CCL option was denominated in euros, analysts such as UBS’s Robin Farley had previously predicted it would be exercised. Last week, Carnival Corp exercised its option for a second 92,700-gt, 2,260-passenger Costa Crociere newbuilding to be built at Fincantieri’s Marghera yard for delivery in March 2010. However, Carnival Corp decided to "extend" its option for an additional 86,000-gt, 2,044-passenger Holland America Line vessel (an option originally due to expire on 31 December). Carnival Corp currently operates 81 ships worldwide, with 19 newbuildings now firmed up for delivery between March 2007 and summer 2010 – 13 of those at Fincantieri. WASHINGTON, DC 15 December – US Customs will require much more information about the contents of US-bound containers as what is called the “10+2” is rolled out next year. Customs & Border Protection Commissioner Ralph Basham told a small gathering of reporters yesterday that the added data, needed to identify high-risk shipments, will be rolled out gradually but will be in place by the end of summer. His remarks to the media came after he told about 700 importers and other trade executives at the annual CBP trade symposium that he “wants to be sure that all the issues that impact your business are resolved before we go to full compliance." Addressing fears that the added data might be used against shippers, Basham said the information “will not be used for compliance purposes.” Fairplay suggested that ocean carriers would like to share in that information so they would know what they are carrying. Basham’s deputy, Michael Mullen, responded by saying the new data will be for law enforcement purposes only and will not be shared with the industry. Mullen, assistant commissioner over the Office of International Affairs and Trade Relations, said the new data will be collected by third-party “fusion centres” and funnelled to CBP’s targeting centres for evaluation. The information newly required will include detailed data on contents, shippers, recipients, eventual buyers, consolidators, ports transited and more. World Shipping Council president Chris Koch told the group the 10+2 scheme will be challenging to implement but said it is “absolutely the thing to do”. As to a lack of information sharing with the industry, he told Fairplay: “that’s fine” as long as the government ensures the boxes are safe. HAMBURG 15 December – German entrepreneur Günter Herz has emerged as the winner in the takeover race for Germanischer Lloyd. Shareholders representing over 40% of GL’s share capital officially agreed to sell their stakes to Herz at a meeting in Hamburg today. Others were still deciding to sign sale contracts as the shareholder meeting came to a close, attendants reported. Acceptance might rise to around 60% eventually, some believe. Herz’s bid, which was promoted by GL’s board all the way, valued the German society at around euro550M ($724M) while French rival Bureau Veritas offered around euro500M. GL's management praised the agreement as an amicable “Hamburg solution” that will cement the class society’s independence. “This is the best solution for all our maritime and industrial clients who can now continue to rely on our high safety and quality standards,” said executive board member Rainer Schöndube. After five turbulent weeks in which GL’s management struggled hard to keep the group’s shareholders at it, the society can now “concentrate on its actual day-to-day work again”, he said. MIAMI and HANOVER, Germany, Dec. 15. Carnival Corporation & plc , the largest cruise vacation group in the world, and TUI AG, the world's largest tour operator, today announced the signing of a letter of intent to form a joint venture company to develop, market and operate two cruise brands - Carnival's existing AIDA Cruises and a new TUI Cruises brand - both designed for the German-speaking holiday market. AIDA, the German affiliate of Costa Crociere S.p.A., is currently the market leader in Germany with its "club resort" cruise concept aimed at younger, more active passengers. AIDA currently operates a four-ship fleet, with four additional ships under construction at Germany's Meyer Werft shipyard and scheduled for delivery between 2007 and 2010. Under the proposed joint venture agreement, a new TUI Cruises brand, which will target a different segment of the German cruise market, will be developed. It is expected that the first TUI branded ship, with an estimated 3,000 passenger berths, will be delivered in spring of 2010. The new joint venture company will be managed under the direction of Pier Luigi Foschi, chairman and CEO of Carnival's Costa Cruises unit, who currently oversees Carnival's German operations, including AIDA. Michael Thamm, president of AIDA Cruises, based in Rostock, Germany, will become president of the new joint venture company. Under the proposed transaction, TUI will initially purchase five percent of the joint venture in 2007 and is expected to purchase another 20 percent in 2010. For purposes of this transaction, AIDA's business was valued at euro 1.9 billion for inclusion in the joint venture, which will be formed with euro 600 million of indebtedness. The purchase price will be paid to Carnival in cash at the closing of each transaction based on a net equity value of euro 1.3 billion. When the initial five percent purchase closes in 2007, Carnival expects to record a pre-tax gain of approximately euro 60 million ($80 million). Another gain will be recorded under U.S. accounting principles at the time of closing of the subsequent 20 percent purchase in 2010. Apart from the aforementioned gains, Carnival expects the transaction to be neutral to earnings on an annualized basis for the 12-month period following the transaction closing. "TUI is a highly diversified and experienced company in the European travel and tourism sector and has extensive brand awareness throughout Europe, particularly in Germany," said Micky Arison, Carnival Corporation & plc chairman and CEO. "By combining TUI's strengths with Carnival's tremendous experience in building, operating and marketing cruise ships, we are creating an excellent platform for growth in the rapidly expanding German cruise market." Added Dr. Michael Frenzel, CEO of TUI AG, "With AIDA Cruises, Carnival has already set up a successful and profitable model in the German cruise market. By entering into this joint venture and benefiting from Carnival's unrivaled expertise, we are able to put the TUI Cruises brand on water. Together, AIDA and TUI Cruises will provide ideal offers to an even larger potential of cruise customers in this commercially highly interesting segment." The transaction is expected to close in the first half of 2007 pending approval of both companies boards of directors, all necessary regulatory approvals, customary due diligence and the execution of definitive agreements. Carnival Corporation & plc is the largest cruise vacation group in the world, with a portfolio of cruise brands in North America, Europe and Australia, comprised of Carnival Cruise Lines, Holland America Line, Princess Cruises, Seabourn Cruise Line, Windstar Cruises, AIDA Cruises, Costa Cruises, Cunard Line, Ocean Village, P&O Cruises, Swan Hellenic, and P&O Cruises Australia. Together, these brands operate 81 ships totaling approximately 144,000 lower berths with 18 new ships scheduled to enter service between March 2007 and spring 2010. Carnival Corporation & plc also operates the leading tour companies in Alaska and the Canadian Yukon, Holland America Tours and Princess Tours. Traded on both the New York and London Stock Exchanges, Carnival Corporation & plc is the only group in the world to be included in both the S&P 500 and the FTSE 100 indices. The TUI Group is the European market leader in tourism and one of the top five players in global container shipping. The tour operators of TUI trade in 17 European countries and in 2005 sold the Group's products to around 21 million customers. TUI encompasses all in all about 3,200 travel agencies, 7 airlines with more than 100 aircraft and 35 incoming agencies. Its hotel portfolio is made up of 279 hotels with approximately 164,000 beds in 30 countries. TUI provides its customers with complete holidays from a single source - from booking in a TUI travel agency, flights with one of the World of TUI airlines, accommodation in the Group's own hotels and customer-care by the Group's own incoming agencies. Through its wholly owned subsidiary Hapag-Lloyd, headquartered in Hamburg, Germany, TUI operates one of the world's leading container shipping companies with more than 140 container ships. Under the brands of Hapag-Lloyd in Germany and Thomson in the UK, TUI also operates a fleet of nine cruise liners. The Hapag-Lloyd cruise ship division is the leading "premium and luxury cruise" tour operator in German-speaking countries. The four cruise liners including the 5-star-plus "MS Europa" are at home on all the world's oceans. In the 2005 financial year, more than 60,000 employees achieved a turnover of more than EUR 19 billion. Over 70 percent of this was generated by the tourism division. MIAMI 14 December – Celebrity Cruises is wasting no time in bringing Pullmantur’s younger ships to the US market, confirming the second transfer from the Spanish fleet. Parent Royal Caribbean Cruises Ltd will shift Pullmantur’s 710-passenger, 30,277gt Blue Moon (ex-R7) to Celebrity sub-brand Celebrity Expeditions in October 2007, when it will be renamed Celebrity Quest. Previously, RCCL had announced that sister ship Blue Dream (ex-R6) would be transferred to Celebrity next May and be renamed Celebrity Journey. The Celebrity Expeditions brand also has a third ship, the 2,842gt Celebrity Xpedition (ex-Sun Bay I), which sails the Galapagos. Both the Celebrity Journey and Quest will undergo extensive drydockings (valued at $35M combined) during which 32 suites will be added to each vessel, among other enhancements. The Celebrity Journey will sail Bermuda cruises next summer, then be repositioned to South America, while the Celebrity Quest will inaugurate with a season of longer Caribbean and Panama Canal cruises next winter. In addition to shifting the two Pullmantur vessels to Celebrity, RCCL is transferring Celebrity’s 1990-built Zenith to Pullmantur. MOSCOW 14 December – Gazprom, Russia’s state-owned gas giant, is to acquire shareholding control of the Sakhalin-2 gas and LNG project from Royal Dutch Shell, Mitsui and Mitsubishi, following the resumption last week of negotiations with Shell. The outcome has been widely reported, but the terms are still under negotiation, according to Dmitri Medvedev, chief of the Kremlin staff and chairman of the Gazprom board. Russian reports suggest that Gazprom will not pay cash up front. Instead, it will reportedly defer payment for its stake until the project starts operation, and cash is generated from LNG shipments and sales. This suggests that the takeover will oblige Shell to accept an audit of its actual project costs, instead of its estimated $22Bn in capital expenditure; and that the income that would otherwise have flowed to Shell under the old production sharing agreement will be diverted to Gazprom, and then paid to Shell for shares. Neither side is keen to acknowledge publicly what price has been tabled. This was clearly one of the sticking-points when Russian energy minister Victor Khristenko said early this week that the talks were “difficult”. MADRID 14 December – Loyola de Palacio, the Spanish minister who served as deputy president of the European Commission and transport commissioner between 1999 and 2004, died in Madrid yesterday. She was 56 and had been suffering from cancer. De Palacio will be remembered as strong, determined and committed to European values. She was rarely shifted from her course of action and was often described as “implacable”. In October 2003 she scolded EU member states for lacking the political will to find solutions to deal with maritime disasters, and warned that she was considering legal action against governments whose response to the requirement to implement safety legislation had been apathetic. That came after she had driven through a proposal to make maritime pollution a criminal offence on the grounds that the existing civil liability regime for pollution by ships “do not provide sufficient financial disincentives to ship owners … to behave in the most responsible way.” Her hard-line views on the imprisonment of Prestige captain Apostolos Mangouras won her few friends in shipping circles, while her port reform initiative was viewed by insiders in Brussels as a something of a “personal mission”. The determination to bring in unprecedented levels of regulation was handed on to her successor, Jacques Barrot, at the end of 2004. LONDON 13 December – EU shipping will be more competitive if international rather than regional solutions are adopted, say the International Chamber of Shipping and International Shipping Federation in their joint response to the EU’s future maritime policy green paper. Although the two organisations welcome the document’s recognition of the importance of international regulation, there are concerns about proposals to increase the co-ordination of member states’ positions at IMO and ILO; and about proposed changes to UNCLOS, freedom of navigation within the Economic Exclusion Zone and the right of third-country ship operators to engage in trade between ports in EU member state. In addition, ICS and ISF call for greater emphasis on the sound environmental performance of shipping in comparison to other commercial transport modes “and the extent to which shipping is part of the solution rather than the problem with regard to concerns about global warming.” The ICS/ISF submission can be downloaded from www.marisec.org (click on ‘industry submissions’). LONDON 13 December – Ship agents' and brokers' association FONASBA has been granted consultative status with the IMO, although formal endorsement will not take place until the next IMO assembly. FONASBA president Mario Fróio said the move was in recognition of the role agents and brokers play in the safe and efficient transport of goods by sea, and that agency members in particular are becoming more closely involved in issues such as ship and port security and vessels reporting, which come under the aegis of IMO. A statement from the Federation said that until now agents and brokers had no means of contributing to the discussions within IMO or of putting their knowledge and experience at the disposal of the UN agency in developing regulation that was effective and appropriate. Fróio, who heads up Brazil's Federação Nacional das Agências Navegação Maritima in Santos, took over as president at the recent FONASBA gathering in Morocco. He paid tribute to his predecessors, Umberto Masucci and Philip Wood, for guiding the application through. SINGAPORE 13 December – After years of deliberation, the Republic of Vietnam will officially become a member of the World Trade Organization (WTO) on 11 January. "In principle, it is a good move," said an official from Ho Chi Minh City-based Falcon Shipping, the Vinalines subsidiary that owns and operates a diversified fleet of about 11 vessels. He told Fairplay the inclusion will give greater market access for Vietnamese light industries and their products. "Container movement is certainly going to benefit as a result of wider trade." Among other areas, the removal of quota and tariffs on Vietnamese imports will significantly help the Vietnamese garment industry. WTO membership will give nations aggrieved by unfair trading practices the opportunity can take their case before a tribunal, while it also offers a framework for increasing the network of forwarding agents for Vietnamese shipping lines. Last month, NYK Line acquired a stake in Vietnam Ocean Shipping Agency, hoping to benefit from Vietnam's new status. MIAMI, Dec 12, 2006 / Carnival Corporation & plc (NYSE: CCL; LSE) (NYSE: CUK) today announced that it has exercised an option for a new 92,700-ton cruise ship for Italian cruise operator Costa Cruises. Additionally, the company has extended the option for a previously announced 86,000-ton ship for Holland America Line. The new Costa ship, which is scheduled for delivery in March 2010, will have 2,260 lower passenger berths and will be built by Italian shipbuilder Fincantieri at its Marghera shipyard at an all-in cost of approximately 420 million euros. It will be a sister ship to a previously announced 92,700-ton Costa vessel which is scheduled to enter service in spring 2009. With today's announcement, Costa has four new ships on order with a combined capacity of 10,520 lower berths. Once those vessels are introduced, the Costa fleet will have a total of 15 ships. "Europe is one of the world's fastest growing cruising areas and Costa is the region's preeminent cruise operator. Continuing to invest in new ship construction will enable Costa to maintain its leadership position within the region while providing new and innovative on-board facilities and features for its guests," said Micky Arison, Carnival Corporation & plc chairman and CEO. Added Pier Luigi Foschi, chairman and CEO of Costa Cruises, "With this new ship order, Costa reaffirms its long-term successful association with Fincantieri and its continued role in the development of the Italian economy. We expect this new ship to be highly popular with its many innovative facilities, including a double-deck-high magradome, Samsara spa, Samsara on- board life style concept and other state-of-the-art features." Carnival is also extending the option for a new 2,044-passenger Holland America Line ship which, if the option is exercised, would be built by Fincantieri and enter service in late 2010. The 86,000-ton Panamax vessel would be the second in the line's new Signature class. The first in the series, the Eurodam, will be delivered in June 2008. With the addition of the new Costa ship, Carnival Corporation & plc has 18 new ships on order, 12 of which are being built by Fincantieri. Giuseppe Bono, chief executive officer of Fincantieri, added, "This new order, which is a further endorsement of our role as reference builder for the Carnival group and our position as the sector's world leader, marks for both Costa and ourselves the successes of the past and the important achievements which we shall reach together." He added, "This order, which extends our shipyards' workload until 2010, confirms once again that our company can rely on a sound financial framework." ITALIAN cruise operator Costa Crociere, has exercised an option with Fincantieri for the construction of a new 92,700-gt cruise ship. The vessel, which is scheduled for delivery in March 2010, will be built at Fincantieri’s Marghera shipyard, at an all-in cost of about $556M. The vessel will have 2,260 lower passenger berths and a total of 1,130 cabins, (772 of which will have private verandas) that being the highest percentage of veranda cabins in the Costa fleet. It will be the sister ship of another 92,700-gt vessel, already announced, also to be built in Marghera and scheduled to enter service in spring 2009. LIVERPOOL 12 December – The acquisition of a 49% stake in Peel Ports by Deutsche Bank’s RREEF Pan European Infrastructure Fund has been approved by the European Commission. The deal, which poses no monopoly issues, was cleared under the EU’s simplified process for reviewing mergers and was seen as presenting no problems on competition grounds. While no price for the deal has been released, estimates understand it to be around £700M ($1.37Bn). Peel Ports is the UK’s second largest port operator owning Liverpool, Clydeport, Heysham, the Medway ports and the Manchester Ship Canal. DELHI 12 December – India and Pakistan will sign a revised shipping protocol on Thursday in New Delhi that will enable vessels registered in one or other country to carry third-party cargo from ports in both states. Pakistan’s port and shipping minister Babar Khan Ghauri will sign the amended shipping protocol. The protocol will restore direct shipping links between the two neighbours after a lapse of 35 years. It is expected to give an impetus to ship owning in Pakistan and help it to win a share of the 4.5M-tonnes of cargo handled each year by Indian ports. Both countries initiated moves to amend the protocol in 2003. The Indian cabinet last month approved the proposed amendments to the protocol whereas Islamabad gave its approval about eight months ago. Shipping sources consider the amendment as an important move as it will increase the volume of trade and eventually bring down shipping rates. Recently Pakistan added 200 more items to the list of imports from India, and trade sources believe that once shipping links are restored the bilateral trade volume will soar from $1.2Bn to $2Bn, besides accelerating private sector participation in the shipping sector. NARVIK 12 December – Hurtigruten, the Norwegian passenger shipping company, has sold two old ships for a total of about $17M. The 1982-built Narvik of 6,257gt, which has been deployed on the service between Bergen and Kirkenes along the west coast of Norway, has been sold to the Young Seafarers’ Christian Association for NK62M ($10M). The sale will generate a profit of about NK20M. The 1975-built Jupiter has been sold to undisclosed Asian interests for about $7M. The ship has been used as a floating hotel after it was taken out of the service of Fjord Line, a now defunct subsidiary. Hurtigrute will book a loss of about NK17M from the sale. The company says one further coastal express vessel will be sold in a move to harmonise the fleet that resulted from the merger of OVDS and TFDS earlier this year. MADRID 12 December – Spanish ship owners have renewed their attempt to encourage the government to support short-sea shipping after the finance ministry rejected proposed amendments to the state budget for 2007. According to shipowners’ association Anave, amendments included incentives for road hauliers who used short-sea services and funding for ‘motorways of the sea’ projects’. The proposed changes would have cost euro8M ($10.5M) and were initially presented by the Catalan conservative party (CiU), but failed to win support in either the parliament or senate. In a comment published this week, Anave said the shipping projects – which the association claims would have benefited the maritime sector – would now be delayed for a year. The owners have called on the public works ministry to present the amendments to parliament early next year for inclusion in the 2008 state budget. HAMBURG 11 December – Germanischer Lloyd shareholders willing to sell are now seeing their shares’ market value spiral up, as Bureau Veritas attempts to outbid the other suitors. The French class society announced today that it will submit an improved offer in time for its meeting with GL shareholders scheduled for 18 December in Hamburg. In particular it aims to outrival the friendly takeover-bid by Hamburg businessman Gunter Herz, who has made an unconditional offer for up to 100% of GL’s shares. Unlike BV, whose offer comes with various strings attached, Herz is prepared to buy the shares without first going through a due diligence process. However, BV’s chances seem to have increased again after GL shareholders refused to decide for the Herz offer at a meeting in Hamburg at the end of last week. The French class society has underlined its intention to concentrate all decision-making functions of the combined marine business in the Hansestadt. “And the alliance will provide a vital incentive to create new jobs, so fears about job losses are completely unwarranted”, said BV chief executive Frank Piedelièvre. SEOUL 12 December – South Korea, which is one of the leading importers of LNG in Asia, is estimated to import up to 32M tonnes of liquefied natural gas by 2015. Last year, Korea imported 25M tonnes of LNG. Power utility Korea Gas Corp and steelmaker Posco account for the bulk of the imports. Together they are estimated to import up to 22M tonnes in 2007. The study was published by Korea Gas Corp, which was tasked by lawmaker Cho Jung Shik of the ruling Uri Party. Newbuilding and ship owner sources told Fairplay that at least 10 additional LNG ships would be needed to meet the projected rise in imports. MIAMI 12 December - Carnival Corporation has confirmed that it is in discussions with TUI, but rebutted reports in German media that negotiations involve an exclusive distribution deal for AIDA. German tour operator TUI is parent of container line Hapag Lloyd. In a statement, Carnival admitted that “discussions are continuing”, but stressed that “the nature of the discussions has been incorrectly reported”. Carnival maintained that talks “do not involve exclusive distribution of any of Carnival’s cruise products”, adding that AIDA is “completely satisfied with its present distribution model” (as the german brand of Costa Crociere) . Carnival said that it will immediately announce details should current discussions lead to an agreement with TUI refusing to comment further on the issue. MIAMI, Dec. 11 /PRNewswire-FirstCall/ -- Carnival Corporation & plc (NYSE: CCL; LSE) (NYSE: CUK) has confirmed that it has held discussions with TUI AG (TUIGn.DE) and that those discussions are continuing. However, the nature of the discussions has been incorrectly reported by various German media as they do not involve exclusive distribution of any of Carnival's cruise products. The company's very successful AIDA brand, which serves the German market, is completely satisfied with its present distribution model and appreciates the support that it receives from its travel agent partners. Should current discussions lead to an agreement with TUI AG, Carnival Corporation & plc will immediately announce details of the agreement. However, until that time, the company will not comment further. Together, these brands operate 81 ships totaling approximately 144,000 lower berths with 17 new ships scheduled to enter service between March 2007 and spring 2010. Carnival Corporation & plc also operates the leading tour companies in Alaska and the Canadian Yukon, Holland America Tours and Princess Tours. Traded on both the New York and London Stock Exchanges, Carnival Corporation & plc is the only group in the world to be included in both the S&P 500 and the FTSE 100 indices. MIAMI 11 December – Hurricane forecasters, whose prognostications missed the mark in 2006, are again projecting an active storm season for 2007. Forecasters in the US and UK now say at least 14 storms are expected in the Atlantic, including seven hurricanes – three of which should reach Category 3 on the Saffir-Simpson scale. Colorado State University climatologist William Gray was the first to reveal his projections and those were followed closely by UK-based Tropical Storm Risk. "Despite a fairly inactive 2006 hurricane season, we believe that the Atlantic basin is in an active hurricane cycle,'' Gray said, noting that the cycle may last as long as 20 years before entering a calmer period. Gray and colleague Phillip Klotzbach said there is a 64% chance that a major storm will strike the US mainland, compared with the 50-year average of 52%, adding that both the East and Gulf coasts have a 40% chance of being hit. Tropical Storm Risk scientists forecast 16 named storms, nine of which will become hurricanes and four of those being intense hurricanes with three of the tropical storms and two hurricanes are predicted to hit the US. Predictions for 2006 called for upwards of 16 or 17 storms, but far fewer formed and no hurricanes actually struck the Atlantic coast. MIAMI 11 December – Royal Caribbean’s Freedom of the Seas, the world’s largest cruise ship, has delayed its next departure after repeated outbreaks of norovirus. According to a statement by RCCL, the US Centres for Disease Control (CDC) officially recommended that the vessel not sail as scheduled on 10 December, and that it instead undergo additional sanitising. RCCL said it will follow the CDC recommendation, departing on 12 December on a shortened five-day cruise to Jamaica and Labadee, Haiti. On its 26 November to 3 December voyage, 338 of the Freedom’s 3,823 passengers and 43 of its 1,400 crew suffered gastrointestinal illness. On the subsequent 3-10 December cruise, 97 of the 3,907 passengers and 11 crew members fell ill. In addition to special cleaning in co-ordination with CDC before tomorrow’s departure, heightened sanitation procedures will be in place throughout this week’s cruise. Beyond the Freedom of the Seas situation, more than 100 passengers and crew were also reported to have become ill aboard Princess Cruises’ Sun Princess, which returned to Port Everglades this weekend. It appears increasingly likely that 2006 will end up as the worst year ever for norovirus, with 34 outbreaks so far and additional incidents being reported on a weekly basis. DUBAI 11 December – DP World has sold its US terminal assets to the American International Group (AIG) Global Investment Group, which will operate the former P&O ports terminals under a newly-created subsidiary. The purchase price was not disclosed, but DPW was reported to be asking for $700M. “With the sale of the US assets, we have concluded the process and our commitment to the American people that we began in March 2006. Meanwhile, we continue to expand globally in response to our customers’ needs,” DPW chief executive Mohammed Sharaf said in a statement. EDPW chairman Sultan Ahmed Bin Sulayem added that “while we are disappointed to be exiting the US market, the price we received was fair. We are pleased that POPNA will have a strong owner in AIG and wish them well for the future.” AIG is the world’s largest insurer and was not among the finalists speculated upon by the media over the past weeks as DPW finalised the bidding process. DPW was forced to sell the marine terminal concessions in the ports of New York/New Jersey, Philadelphia, Baltimore, Miami, Tampa and New Orleans, coupled with stevedoring operations in 16 locations along the East and Gulf Coasts and a passenger terminal in New York City it acquired as part of the $6.8Bn purchase of P&O ports global operations. HAMBURG 08 December – Germanischer Lloyd shareholders have asked for more time and more information about the class society’s business prospects as yet another takeover bid was made for GL. A meeting of 90% of GL’s 50 shareholders in Hamburg made no decisions about the hostile euro500M ($657M) takeover bid from France’s Bureau Veritas or the friendly takeover offer made yesterday by German multi-millionaire businessman Gunter Herz, the main shareholder in German sportsware giant Puma. “The shareholders have asked the executive board for more detailed information about future business developments,” GL said in a statement. “In another meeting in the next week, the shareholders will have a concrete examination of the future outlook.” Meanwhile, another friendly takeover bid for GL was submitted today by Germany’s TÜV SÜD, a large company whose main business is annual technical roadworthiness inspections of automobiles on behalf of the German government. A TÜV SÜD spokesman said the company had on Friday submitted a bid for 50.1% of GL. “We made the bid on the request of GL, this is not a bluff,” he said. Both GL and TÜV SÜD are involved in similar technical standard certification, he said. GL would be integrated into the other company as an independent division. AMSTERDAM 08 December – Authorities in the Dutch port of Amsterdam have been criticised by a local inquiry for their role in a chain of events that led to 10 people dying and thousands falling ill in the Ivory Coast. An Amsterdam municipal inquiry has collectively blamed four agencies for allowing the tanker Probo Koala (now re-named Gulf Jash) to leave port in July, bearing unprocessed slops that were offloaded in the Ivorian port of Abidjan, taken away by truck and dumped on landfill sites in residential areas. The dumped material caused widespread casualties. An Ivorian inquiry has implicated Ivorian authorities and the haulage company in the scandal. The Amsterdam inquiry says that while Marpol regulations permitted the tanker to leave as it did, the slops were "hazardous" and should have been treated. It recommends strengthening Dutch law in providing one authority to oversee future such operations. Dutch-based commodity trader Trafigura chartered the tanker but maintains its slops were not the cause of the casualties. The company's founder and regional manager both remain in prison in the Ivory Coast while police determine if they are to be charged. SEOUL 08 December – South Korea’s largest shipping line, Hanjin Shipping, will transfer container terminals in Taiwan and Japan to another Hanjin entity to fund a ship expansion drive. The move is expected to raise $320M, according to a source, and the money will be used to buy five 10,000teu vessels and also spent on operating costs. Hanjin Shipping will transfer its terminals at Tokyo, Osaka and Kaoshiung to Hanjin Pacific, a venture it co-owns with Macquarie Korea Opportunities Fund. Under the 60/40 operating regime, Hanjin will retain control of the terminals.The ships have already been ordered from Samsung Heavy Industries and will be used to cater for rising cargo demand. HAMBURG 07 December – German multi-millionaire businessman Günter Herz has made a takeover offer for Germanischer Lloyd that has been described by the classification society as “friendly”. Herz is a major shareholder in giant German sportsware firm Puma and part of the family that owns Tchibo, one of Europe’s largest coffee companies. Herz is offering “significantly above” the euro500M offered by French class society Bureau Veritas, says Rainer Kutzner, head of Herz’s investment company. Herz, who lives in Hamburg where GL is based, regarded the bid by Bureau Veritas as unwelcome and he wanted GL to remain independent, Kutzer said. “The Germanischer Lloyd executive board welcomes the initiative from Mr Herz and is currently examining the details of the offer,” GL said in a statement. The offer will be put before a meeting of GL shareholders scheduled for Friday, although the meeting was unlikely to take a decision on the bid. MUMBAI 06 December – The Indian government has decided not to amend the Merchant Shipping Act to allow foreign officers to be employed on Indian flagged vessels. Indian ship owners, facing a shortage of trained officers for their ships, had asked the government to lift the ban on employment of foreign officers on Indian-registered vessels operating in domestic trades. They argued that a large number of Indian officers had been encouraged to work on foreign vessels through better pay and tax incentives; Indian companies could not compete. However, the government has responded that the shortage only relates to senior officers such as captains and chief engineers, and wasn’t as acute as the owners claim. The government says it is confident the shortage can be eased by raising the standard of training in the country’s maritime institutes and by training more officers.
2019-04-20T21:21:02Z
http://rubendotmaritime.blogspot.com/2006/12/
The present invention aims at providing a data processing system which can realize a variety of process. A secondary memory cassette 31 includes a connector 32 which can be connected to both a primary memory cassette 21 or a processing device body, and address transfer circuit 39 which judges whether the connector has been connected to the primary memory cassette 21 based upon the connection state of the connector and outputs an address transfer signal, and a memory 38 which outputs data corresponding to the address transfer signal and the address signal supplied from connector 32. The primary memory cassette 21 includes a mask ROM 28, a connector 22 for connection with the processing device body, and a connector 24 which can be connected with the secondary memory cassette 31. A predetermined pin of connector 24 is connected to a ground. When primary memory cassette 21 is connected with secondary memory cassette 31, signal Sa becomes level L, so that address transfer circuit 39 changes the memory allocation of ROM 38. This application ia continuation-in-part of patent application Ser. No. 08/324,349 to Naka, entitled Two Part Cartridge System for Use with Game Console, filed in Oct. 17, 1994 now abandoned. The present invention relates to a data processing system comprising a processing apparatus which conducts the processing of information such as the execution of programs and the use of data by installing a memory cassette therein with programs and data stored thereon, a memory cassette structure used for this system and the data processing method of this system. These types of data processing systems are known as comprising a memory cassette with programs and data stored thereon, and an operator (processing device) having a connector for connection to this memory cassette, and executing the cassette programs by connection of such memory cassette to this connector. A typical data processing system of this kind is a system for game machines. As is well known, game machines execute game programs by installation of a memory cassette therein with programs and data for various games stored thereon. Generally provided game machines further comprise a game machine body for using such data, and a controller giving various operating commands (operating signals) to the game machine body, which enables indication of the processed matter inside the game machine body on television receivers and the like. These kinds of memory cassettes are constructed so as to have a connector on one side of the box-shaped cassette body and to comprise a ROM and its peripheral circuits inside the cassette body. A memory cassette with this kind of structure has a substantially constant cassette body volume, thereby inevitably determining the storage capacity of the ROM. This determines the capacity of programs storable in the ROM, leading to demand for greater program capacity. Therefore, a compact connector provided on the body of the memory cassette offers a game machine which enables the installation of a new compact ROM cassette on this compact connector. This game machine is constructed such as to enable the installation of a memory cassette with a compact connector provided thereon in the game machine body. By installing a compact ROM on the compact connector of the memory cassette, it is possible to use the data stored in the compact ROM with the game machine body. However, these game machines merely use the data in the compact ROM cassette without any change in the development of the game itself, which would not completely satisfy demands for development of a variety of games. The development of various games and realization of other various processes require a large amount of programs and a great memory capacity for storing a great amount of programs. However, conventional game machines had the disadvantage that the memory capacity of the cassette body was inevitably limited in consideration of transportation, handling or price, etc. Further, conventional game machines could not re-use games developed in the past inside new game programs, so that the non-use of old programs led to the waste of development steps, the ROM and other resources spent for the development of such program. Therefore, the present invention aims at solving these problems by providing a data processing system which can realize a variety of processes and which can effectively use resources. Another purpose is to provide a novel memory cassette structure for use with this system. In order to overcome these problems, the data processing system according to claim 1 is a data processing system comprising a processing device body for performing the process based on the stored contents of memory cassettes, a primary memory cassette which is connectable to said processing device body, and, a secondary memory cassette which is connectable to either said primary memory cassette or said processing device body, wherein when either the primary memory cassette or the secondary memory cassette is connected to the processing device body, data is read from such memory cassette in a first address range, and wherein when the processing device body is connected to the primary memory cassette which is then connected to the secondary memory cassette, data is read in a wider address range, which includes a second address range which does not overlap with the first address range. The memory cassette according to claim 2 is a memory cassette which is said secondary memory cassette used for said data processing system according to claim 1, comprising a connector which is electrically connectable to either a connector of said primary memory cassette or said processing device body, a connection state judging circuit which judges by the connection state of the connector whether the connector has been connected to the primary memory cassette and outputs an address transfer signal corresponding to such connection state, and, a memory for outputting data corresponding to the address transfer signal supplied from the connection state judging circuit and to the address signal supplied from the connector. The memory cassette according to claim 3 is a memory cassette according to claim 2, wherein when said connection state judging circuit judges that said connector has been connected to said primary memory cassette, the connection state judging circuit outputs said address transfer signal in order to transfer the address range for reading data from the memory to said second address range which does not overlap with said first address range for reading the data from the memory of the primary memory cassette. The memory cassette according to claim 4 is a memory cassette according to claim 2, wherein when the signal logic of one predetermined pin of a plurality of pins constituting said connector becomes a predetermined signal logic, said connection state judging circuit judges that the connector has been connected to another memory cassette. The memory cassette according to claim 5 is a memory cassette which is said primary memory cassette used for said data processing system according to claim 1 and which is connectable to the memory cassette according to claims 2, 3 and 4 as said secondary memory cassette, comprising a first connector which is electrically connectable to said processing device body, a memory for outputting data corresponding to an address signal supplied from the processing device body when connected to the processing device body via the first connector, and, a second connector which is connectable to the secondary memory cassette and which is provided so that the address signal supplied from the processing device body via the first connector is transmittable, wherein one predetermined pin of a plurality of pins constituting the second connector is retained at a predetermined signal logic. The memory cassette according to claim 6 is a memory cassette which is said secondary memory cassette used for said data processing system according to claim 1, comprising a connector which is electrically connectable to a connector of said primary memory cassette, and a memory for outputting data corresponding to an address signal supplied from the connector, wherein one predetermined pin of a plurality of pins constituting the connector is retained at a predetermined signal logic. The memory cassette according to claim 7 is a memory cassette which is said primary memory cassette used for said data processing system according to claim 1, and which is connectable to said memory cassette according to claim 6 as said secondary memory cassette, comprising a first connector which is electrically connectable to said processing device body a second connector which is connectable to the secondary memory cassette and which is provided so that an address signal supplied from the processing device body via the first connector is transmittable a connection state judging circuit which judges by the connection state of the second connector whether the secondary memory cassette has been connected to the second connector and outputs an address transfer signal corresponding to such connection state, and a memory for outputting data corresponding to the address transfer signal supplied from the connection state judging circuit and to the address signal supplied from the first connector. The memory cassette according to claim 8 is a memory cassette according to claim 7, wherein when said connection state judging circuit judges that said second connector has been connected to said secondary memory cassette, said connection state judging circuit outputs said address transfer signal in order to transfer the address range for reading data from the memory of such primary memory cassette to said second address range which does not overlap with said first address range for reading data from the memory of the secondary memory cassette. The memory cassette according to claim 9 is a memory cassette according to claim 7, wherein when the signal logic of one predetermined pin of a plurality of pins constituting said second connector becomes a predetermined signal logic, said connection state judging circuit judges that the connector has been connected to said secondary memory cassette. The memory cassette according to claim 10 is a memory cassette which is said secondary memory cassette used for said data processing system according to claim 1, comprising a connector which is electrically connectable to said primary connector, and a memory for outputting data corresponding to said address signal supplied from the connector, wherein a lead extending from one predetermined pin of a plurality of pins constituting the connector is connected to a chip select terminal of the memory. The memory cassette according to claim 11 is a memory cassette which is said primary memory cassette used for said data processing system according to claim 1, and which is connectable to the memory cassette according to claim 10 as said secondary memory cassette, comprising a first connector which is electrically connectable to said processing device body, a second connector which is connectable to the secondary memory cassette and which is provided such that said address signal supplied from the processing device body via the first connector is transmittable, a connection state judging circuit which, based on a certain address signal supplied from the first connector, outputs a first chip select signal which becomes effective when the address signal is within said first address range, and outputs a second chip select signal which becomes effective when the address signal is within said second address range to a predetermined pin of the second connector, and a memory for outputting data corresponding to the first chip select signal supplied from the connection state judging circuit and to the address signal supplied from the first connector. The memory cassette according to claim 12 is a memory cassette according to one of claims 5, 7, 8, 9 or 11, wherein the memory cassette has a three-dimensional construction comprising two opposing faces, and said first connector and said second connector are provided on the opposing faces, respectively. The data processing method according to claim 13 is a data processing method employing a processing device body performing the process based on the stored contents of memory cassettes, a primary memory cassette which is connectable to said processing device body, and a secondary memory cassette which is connectable to either the primary memory cassette or the processing device body, wherein when it is judged that either the primary memory cassette or the secondary memory cassette is connected to the processing device body, data is read from such memory cassette in said first address range, and wherein when it is judged that the processing device body is connected to the primary memory cassette which is then connected to the secondary memory cassette, data is read in a wider address range, which includes said second address range which does not overlap with the first address range. Therefore, as it is possible to use the primary and secondary memory cassettes alone or jointly, the demands for a variety of game developments are satisfied. Further, by the use of two memory cassettes, it is possible to use programs using a large amount of memory capacity. Moreover, as it is possible to re-use old games, the effect is achieved that the steps of development, ROM and other resources for such game are effectively utilized. FIG. 1 A perspective view of the structure of an embodiment of the data processing system according to the present invention and the memory cassette used for this system. FIG. 2 A block diagram of the circuits of a primary memory cassette and a secondary memory cassette to be used such embodiment. FIG. 3 A block diagram of the address transfer circuit of such embodiment. FIG. 4 A view describing the relation between the address values of the primary and secondary memory cassette according to such embodiment, respectively, and the address value when both cassettes are fitted together. FIG. 5 A flow chart describing the operation of the game machine body according to such embodiment. FIG. 6 A view describing the memory map when both cassettes according to such embodiment are fitted together. FIG. 7 A view of another construction of the primary and secondary memory cassettes according to such embodiment. FIG. 8 A view describing the memory map when both cassettes according to such embodiment are fitted together. FIG. 9 A view describing the primary and secondary memory cassette according to such embodiment. FIG. 10 A block view of the decoder circuit according to such embodiment. FIG. 11 A view describing the memory map of each of the memory cassettes according to such embodiment. FIG. 12 A view describing the operation of the embodiment according to the present invention. FIG. 1 is a perspective view of an embodiment of the data processing system according to the present invention and the memory cassette structure used for this system. The data processing system indicated in FIG. 1 has as its composing elements a game machine body 11, a primary memory cassette 21 and a secondary memory cassette 31. On connector 12 of game machine body 11, a connector 22 of primary cassette 21 may be installed as shown by arrow X, and a connector 32 of secondary cassette 31 may be installed as shown by arrow Y. Further, on the surface of body 23 of primary memory cassette 21 which is opposite to connector 22 (shown as the upper surface), connector 24 is arranged which is identical to connector 12 provided on game machine body 11, and enables the installation of connector 32 of secondary cassette 31 on connector 24 as shown by arrow Z. When connector 22 of primary memory cassette 21 is installed on connector 12 of game machine body 11 as shown by arrow X, and connector 32 of secondary memory cassette 31 is installed on connector 24 of primary cassette 21 as shown by arrow Z, game machine body 11 is in a state to be able to use the game programs of both the primary cassette 21 and the secondary cassette 31. For enabling use of the programs of both memory cassettes 21, 31 with game machine body 11, a structure is provided on the interior of such primary memory cassette 21 or secondary memory cassette 31 for sharing addresses. This structure becomes operative when connector 22 of primary cassette 21 is installed on connector 12 of such game machine body 11 and connector 32 of secondary cassette 31 is installed on connector 24 of primary cassette 21. In this way, one of the addresses of the memory address ranges of memory cassettes 21, 31 is transferred and used. Now, each element of such data processing system will be described in detail. As shown in the drawings, game machine body 11 of the present embodiment has a parallelepiped shape wherein the length is somewhat smaller than the width and the height is around 1/20 of the length. Connector 12 is provided on the upper surface of this 3-dimensional body, and switch 13 is provided on the left lower side of the upper surface, as shown. Primary memory cassette 21 comprises a thin parallelepiped housing 23. Connector 22 is provided on bottom 26 of this housing 25, and on the upper surface 27 (the face opposite to said bottom face) of this housing 25, connector 24 is provided which has the same structure as connector 12 of game machine body 11 is provided. Further, secondary cassette 31 comprises a thin parallelepiped housing 35, and connector 32 is provided on bottom 36 of housing 35. This structure enables the installation of connector 32 of secondary cassette 31 on connector 12 of game machine body 11 and to connector 24 of the primary cassette 21, too. FIG. 2 is a circuit diagram of the primary and the secondary memory cassette used in an embodiment of the system relating to the present invention. In FIG. 2, the circuit system of primary memory cassette 21 comprises a connector 22, a connector 24 and a mask ROM 28. Those connectors 22 and connectors 24 which have the same pin numbers are connected to each other as signal wires for address Ad, data Dt and control signal Ct. The wiring for address Ad, data Dt and control signal Ct is constructed so as to be connected to mask ROM 28. Further, at primary memory cassette 21, connector 24 with a predetermined pin number is connected to the grounding electrode. When connector 32 of secondary cassette 31 is connected with connector 24 of primary cassette 21, it comes into contact with the grounding electrode of connector 24. A pin inside connector 24 is grounded. Accordingly, the signals taken from a pin of this connector 24 are signals Sa indicating connection of secondary cassette 31 to primary cassette 21. Further, in the circuit system of secondary cassette 31, a connector 32, a mask ROM 38 and an address transfer circuit 39 as a connection state judging means are arranged. Address Ad, data Dt and control signal Ct, respectively, of connector 32 with a predetermined pin number is connected to a predetermined pin of mask ROM 38, and address Ad and control signal Ct and signal Sa are connected to a predetermined electrode of address transfer circuit 39. The address transfer signals generated by address transfer circuit 39 are supplied to the address changing input terminal of mask ROM 38. FIG. 3 is a circuit diagram indicating an example of the structure of such address transfer circuit 39. In FIG. 3, address transfer circuit 39 comprises a decoder 391 which forms first chip select signal CSa or second chip select signal CSb based on a certain memory address Ad and a certain memory control signal Ct, and a selector circuit 392 which generates signals for transferring the memory address based on chip select signal CSa, CSb from decoder 391 and signal Sa which indicates the connection of primary cassette 21 with secondary cassette 31, and is constructed as follows. In decoder 391, the wires are arranged so that address Ad and control signal Ct may be supplied to the decoder. The wiring allows supply of chip select signals CSa, CSb generated by decoder 391 to A, B terminals of selector circuit 392. Further, wires are arranged for supply of signal Sa to selection terminal A/B of selector circuit 392. Also, the output terminal Y of selector circuit 392 is connected to the address transfer terminal of mask ROM 38. Now, the operations of such embodiment will be described with reference to FIGS. 4-6 based on FIGS. 1-3. FIG. 4 indicates the operation when primary and secondary memory cassette are fitted together, and describes the relation between the individual address values of the primary and secondary memory cassette, and the address value when both cassettes are fitted together. FIG. 5 (1) is a flow chart for describing the movements when only the secondary memory cassette is connected to the game machine body, and FIG. 5 (2) is a flow chart for describing the movements when only the primary memory cassette is connected to the game machine body. FIG. 6 describes the memory map when both cassettes are fitted together. First, as shown in FIG. 4(c), primary memory cassette 21 normally stores its program data B from address 00000H (H indicates the hexadecimal system) to 1FFFFH. In the same way, as shown in FIG. 4(b), secondary memory cassette 31 normally stores its program data A from address 00000H to 1FFFFH. The installation of only primary memory cassette 21 in game machine body 11 as shown by arrow X results in a state in which game machine body 11 and primary memory cassette 21 are electrically connected via connector 12 and connector 22. When in this state power source is input by turning switch 13 of game machine body 11 on, game machine body 11 principally commences with address 0000H and processes 10 the necessary program data, etc. (FIG. 5 (2) Step 200), and immediately judges the existence of any program data, etc. at and after address 20000H (Step 201). This judgment is conducted as follows. Assuming the output of game machine body 11 of address Ad is 200000H and predetermined control signal Ct is output, one only needs to judge whether any information may be obtained as data Dt. In this case, even if address Ad and control signal Ct as above are input to mask ROM 28, no data are output from mask ROM 28 to data Dt. Therefore, game machine body 11 judges that program data do not exist at and after address 200000H (FIG. 5 (2) Step 201; NO), so it will operate using only the program data B stored from address 00000H to address 1FFFFH of primary memory cassette 21 (FIG. 5 (2) Step 202). In the same way, when installing only secondary cassette 31 in game machine body 11 as shown by arrow Y (FIG. 1), a state is provided so that game machine body 11 and secondary cassette 31 are electrically connected via connector 12 and connector 32. In this state, when power flows by turning switch 13 of game machine body 11 on (FIG. 5 (1) Step 101), game machine body 11 will operate only with program data A stored from 00000H to 1FFFFFH of "secondary cassette 3" (FIG. 5 (1) Step 102). Next, primary memory cassette 21 is installed in game machine body 11 as shown by arrow X in FIG. 1, and additionally, secondary memory cassette 31 is installed on primary memory cassette 21 as shown by arrow Z. In this case, game machine body 11 and primary memory cassette 21 are electrically connected via connector 12 and connector 22, and primary memory cassette 21 and secondary memory cassette 31 are electrically connected via connector 24 and connector 32. Now, when switch 13 of game machine body 11 is switched on and power flows through, signal Sa indicating connection state becomes "L," given to address transfer circuit 39 of secondary memory cassette 31 via connector 24 and connector 32. Game machine body 11 processes here the necessary program data (vector) commencing basically with the execution from address 0000H (Step 200). Thereby, game machine body 11 judges whether there is any program data from address 200000H and onwards (Step 201). Therefor, game machine body 11 makes address Ad to addresses from 200000H on, gives control signal Ct, and judges whether there is any information as data Dt. When address Ad and control signal Ct are input to address transfer circuit 39, address transfer circuit 39 is based on address Ad and control signal Ct and forms chip select signal CSb with decoder 391. The chip select signal CSb is given to mask ROM 38 via select circuit 392, as signal Sa indicating connection state indicates "L." Thereby, the address of mask ROM 38 is transferred from 200000H to 2FFFFFH. Then, when primary memory cassette 21 and secondary memory cassette 31 are fitted together, the address of mask ROM 28 of primary memory cassette 21 is, as shown in FIG. 4(a) and FIG. 6, still from 00000H to 1FFFFFH, but the address of mask ROM 38 of secondary memory cassette 31 is allotted from 200000H to 2FFFFFH. As the address of secondary memory cassette 31 has been transferred as above, the designation of an address from 200000H onwards by game machine body 11 leads to the output of information of such address from mask ROM 38 to the data wires. In other words, when game machine body 11 finds some kind of information at the designated address in Step 201, it determines that program data exists at and after address 200000H (Step 201; YES), and, thereafter, game machine body 11 operates using program data B stored from address 00000H to 1FFFFFH in primary memory cassette 21 and program data A stored from address 200000H to 3FFFFFH in secondary memory cassette 31 (Step 203). In other words, when game machine body 11 judges that primary memory cassette 21 and secondary memory cassette 31 have been fitted together, it can access these freely, as described above. Further, in such state where primary memory cassette 21 and secondary memory cassette 31 are fitted together, the program area exists from 00000H to xxxxxH, and the data area exists from xxxxxxH to 1FFFFF in primary memory cassette 21, as indicated in FIG. 6. At the secondary memory cassette 31, the program area exists from 200000H to xxxxxH and the data area from xxxxxxH to 3FFFFF, as indicated in FIG. 6. According to the embodiment above, it is possible to use primary memory cassette 21 and secondary memory cassette 31 alone or fitted (connected) together, satisfying various demands for the development of a variety of games. Further, as two memory cassettes may be used at the same time, a large amount of program capacity may be used. Moreover, by installing a secondary memory cassette on the primary memory cassette, old games can be used again, providing the advantage of effectively using the development steps for the games, the ROM and other resources. FIG. 7 shows another exemplary construction of a primary and secondary memory cassette used in an embodiment of the present invention. Same composing elements in FIG. 7 as in FIG. 2 are indicated by identical reference numbers. The circuit system of primary memory cassette 21 comprises connector 22, connector 24, mask ROM 28 and address transfer circuit 29 as the circuit judging the connection state, and the wires with the same pin numbers at connector 22 and 24 are connected as signal wires for address Ad, data Dt and control signal Ct. The wiring for such address Ad, data Dt and control signal Ct is constructed such to be connected to mask ROM 28. Further, address Ad and control signal Ct and signal Sa are connected to a predetermined electrode of address transfer circuit 29, and the address transfer signals generated by this address transfer circuit 29 are supplied to the address changing input terminal of mask ROM 28. The address transfer circuit 29 has the same circuit construction as address transfer circuit 39 shown in FIG. 3. Further, the circuit system of secondary memory cassette 31 comprises connector 32 and mask ROM 38. Address Ad, data Dt and controls signal Ct of such connector 32 with predetermined pin numbers, which have the predetermined pin numbers of connector 32 to be connected to predetermined pins of mask ROM 38, is constructed such to be connected to the grounding electrode. The operations of this embodiment will be explained with reference to FIGS. 5, 8 based on FIGS. 1, 3 and 7. FIG. 8 explains the memory map when both cassettes are fitted together. First, primary memory cassette 21 and secondary memory cassette 31 individually store program data B and A from address 00000H to 1FFFFH alone, as described above. Then, when only secondary memory cassette 31 is installed in game machine body 11 as shown by arrow Y (FIG. 1), then game machine body 11 will, as described above, operate based only on program data A stored from 00000H to 1FFFFFH of "secondary memory cassette 31" (FIG. 5, Step 101, 102). In the same way, when only primary memory cassette 21 is installed in game machine body 11 as shown by arrow X (FIG. 1), game machine body will, as described above, commence with then operation from address 00000H and process the necessary program data (Step 200), then immediately judge the existence of program data from address 200000H on (Step 201), and operate based only on program data B stored from address 00000H to 1FFFFH (Step 202). Next, primary memory cassette 21 is installed in game machine body 11 in accordance with arrow X, and further, secondary memory cassette 31 is installed on primary memory cassette 21 in accordance with arrow Z. In this case, game machine body 11 and primary memory cassette 21 are electrically connected via connector 12 and connector 22, and, further, primary memory cassette 21 and secondary memory cassette 31 are electrically connected via connector 24 and connector 32. In this state, power flows through by switching switch 13 of game machine body 11 to on, signal Sa indicating connection state becomes "L" and this signal Sa is given to address transfer circuit 29 of primary memory cassette 21 via connector 32 and connector 24. Accordingly, when game machine body 11 outputs control signal Ct by using address Ad at and after address 200000H, address transfer signals are output from address transfer circuit 29 to mask ROM 28. Through this address transfer signal, the address of mask ROM 28 is transferred and the address of mask ROM 28 moves from 200000H to 3FFFFFH, as shown in FIG. 8. At this point, game machine body 11 processes the necessary program data (vector) by commencing basically with the operation from 0000H, but by compulsorily transferring the vector of primary memory cassette 21 to address 00000H of secondary memory cassette 31, it is possible continue operating program A of secondary memory cassette 31. Then, game machine body 11 judges the existence of programs at address 200000H and onwards (Step 201; YES). This judgment is made by determining whether information is output at data Dt when address Ad from address 200000H on is output and control signal Ct is output. When such address Ad and control signal Ct is input to address transfer circuit 29, address transfer circuit 29 generates chip select signals based on address Ad and control signal Ct, generates address transfer signals from these chip select signals and signal Sa indicating connection state ("L,") and gives this to mask ROM 28. Thereby, as the address allotted to mask ROM 28 is transferred from 200000H to 3FFFFFH, the fitting together of primary memory cassette 21 and secondary memory cassette 31 results in the address of mask ROM 28 of primary memory cassette 21 being transferred from 200000H to 3FFFFFH, and that of mask ROM 38 of secondary memory cassette 31 from 00000H to 1FFFFFH, as indicated in FIG. 8. As the address of primary memory cassette 21 has been transferred as above, the designation of an address at 200000H and onwards by game machine body 11, the information of such address is output from mask ROM 28 to data Dt. Therefore, at game machine body 11, when information is acquired at a certain address as above, the judgment is that there is program data at 200000H and onwards (Step 201; YES), and afterwards, game machine body 11 will operate by using both the program data B stored from address 200000H to 3FFFFFH in primary memory cassette 21, and the program data A stored from 200000H to 3FFFFFH in secondary memory cassette 31 (Step 203). In other words, game machine body 11 may, as described above, access both cassettes freely when it has judged that both primary memory cassette 21 and secondary memory cassette 31 have been installed. Further, in such state of installed primary memory cassette 21 and secondary memory cassette 31, primary memory cassette 21 has, as shown in FIG. 8, its program area from address 200000H to xxxxxxH, and its data area from xxxxxxH to 3FFFFF. Secondary memory cassette 31 has, as shown in FIG. 8, its program area from 00000H to xxxxxH, and its data area from xxxxxH to 1FFFFF. FIG. 9 illustrates another embodiment of the primary and secondary memory cassette used in the present invention. The embodiment of FIG. 9 differs from that of FIG. 7 in that chip select signal *Cs (* indicates the inversion of CS) is supplied from game machine body 11 to decoder 40 via connector 22, and a predetermined address is supplied to decoder 40. Another difference to the embodiment of FIG. 7 is that chip select signal CSa and chip select signal CSb is generated by decoder 40, and the electric wiring is arranged so that such chip select signal CSa is supplied to mask ROM 28 and chip select signal CSb is supplied to mask ROM 38 of secondary memory cassette 31 via the predetermined pin number portion of connector 24 and the same pin number portion of connector 32. The other construction is the same as in FIG. 7. The same reference numbers are attached to the portions which are identical in FIG. 9 and FIG. 7. FIG. 10 is a view of a circuit indicating an example of the concrete construction of the decoder. As shown in FIG. 10, decoder 40 is composed of two NAND circuits 401, 402 and two inverted circuits 403, 404, and has the following connection state. An electric connection allows address *ax (in this case, * indicates the inversion of ax) to be directly given to one input terminal of NAND circuit 401 and one input terminal of NAND circuit 402 via inverted circuit 403. Further, an electric connection allows chip select signal *CS sent from game machine body 11 via connector 12 and connector 22 of primary memory cassette 21 to be input to the other input terminals of NAND circuits 401, 402 via inverted circuit 404. Chip select signal CSa is output from the output terminal of NAND circuit 401, and chip select signal CSb is output from the output terminal of NAND circuit 402, respectively. This embodiment allows the single or joint use of primary memory cassette 21 and secondary memory cassette 31, satisfying demands for development of a variety of games. Further, the use of two memory cassettes allows the use of a large program capacity. It also has the advantage of using the steps of development, ROM and other resources of such game effectively, as it is possible to use old games again. This embodiment will be explained in detail with reference to FIGS. 9, 10, 11 and 12. FIG. 11 describes the memory map arranged by the embodiment of FIG. 9. FIG. 12 is an explanation for using the operation of such embodiment. Game machine body 11 can output address *ax used for switching of primary memory cassette 21 or secondary memory cassette 31, and can also output chip select signal *CS. In this state, as shown in FIG. 12, when address *ax is "L" ("0"), and chip select signal *CS output from game machine body 11 is "L" ("0"), both input terminals of NAND circuit 401 become "H" ("1."). Thereby, the output of NAND circuit 401 becomes "L" ("0."). As one input terminal of NAND circuit 402 is "L" ("0,") the output of NAND circuit 402 becomes "H" ("1."). In other words, chip select signal CSa will be output from decoder 40. Thereby, game machine body 11 will use the programs, etc. stored in primary memory cassette 21. This leads to the use of addresses 00000H to 1FFFFFH in primary memory cassette 21, as shown in FIG. 11. In this case, regardless of whether primary memory cassette 21 is installed in game machine body 11 alone or whether a secondary memory cassette 31 is installed on (fitted together with) primary memory cassette 21 installed in game machine body 11, game machine body 11 will use the programs in primary memory cassette 21. On the other hand, as shown in FIG. 12, if a certain address *ax (in this case, using for example the 6th data Dt in 200000H) becomes "H" ("1,") and chip select signal *CS output from game machine body 11 becomes "L" ("0,") both input terminals of NAND circuit 402 become "H" ("1,") so that the output of NAND circuit 402 becomes "L" ("0."). Further, as one input terminal of NAND circuit 401 is "L" ("0,") the output of NAND circuit 401 becomes "H" ("1."). Then, chip select CSb will be output from decoder 40. This leads to game machine body 11 being unable to access with primary memory cassette 21, only being able to access with secondary memory cassette 31. Then, address Ad is from 200000H to 3FFFFFH, so that game machine body 11 is able to use the programs, etc. stored in secondary memory cassette 31. As shown in FIG. 11, hereby used is the address of secondary memory cassette 31 which has been transferred from 200000H to 3FFFFFH. Further, when chip select signal *CS is "H" ("1,") the output terminals of NAND circuits 401, 402 of decoder 40 will both output "H" ("1,") regardless of the value of address *ax, so that both primary memory cassette 21 and secondary memory cassette 31 are not accessible. Further, the installation of secondary memory cassette 31 alone in game machine body 11 leads to input of chip select signal *CS directly to mask ROM 38 of secondary memory cassette 31, so that secondary memory cassette 31 will use the addresses from 00000H to 1FFFFFH. According to this embodiment, primary memory cassette 21 and secondary memory cassette 31 are used alone or jointly, satisfying demands for a variety of game developments. Further, as two memory cassettes can be used, a large program capacity can be used. Further, as it is possible to use old games again, there is the advantage that the steps of development, ROM and other resources of such game are used effectively. Further, in the present embodiment, the circuit for judging the connection state may be provided at the game machine body, i.e. at the side of the processing device body, too. wherein, in a second state, the first connector is connected to the second connector and the third connector is connected to the fourth connector. 2. The apparatus of claim 1 wherein, in the first state, an address signal is transmitted from the processing device to the connected memory cassette and, in response thereto, data identified by the first range of memory addresses of the connected memory cassette memory is output to the processing device. d. in response to the address transfer signal, the memory addresses identifing the data of the secondary memory are shifted to a second range of memory addresses, the second range not equal in value to the first range, and data identified by the second range of memory addresses is output from the second memory cassette to the processing device. 4. The apparatus of claim 1, wherein the fourth connector comprises a plurality of pins. 5. The apparatus of claim 4, wherein one predetermined pin of the plurality of pins provides signal logic to the connection state judging circuit to indicate whether the fourth connector is connected to the third connector. 6. The apparatus of claim 1, wherein the connection state judging circuit is formed as a part of the primary memory cassette. 7. The apparatus of claim 1, wherein the connection state judging circuit is formed as a part of the secondary memory cassette. 8. The apparatus of claim 1, wherein the connection state judging circuit comprises a decoder and a selector circuit. outputting data identified by the first range of memory addresses of the connected memory cassette memory to the processing device in response to the transmitting of the address signal. outputting data identified by the second range of memory addresses of the secondary memory cassette to the processing device. 12. The method of claim 9, wherein the fourth connector comprises a plurality of pins. 13. The method of claim 12 further comprising the step of providing signal logic on one predetermined pin of the plurality of pins to the connection state judging circuit to indicate whether the fourth connector is connected to the third connector. 14. The method of claim 9, further comprising the step of forming the connection state judging circuit as a part of the primary memory cassette. 15. The method of claim 9, further comprising the step of forming the connection state judging circuit as a part of the secondary memory cassette. Action Reply--The Ultimate Backup Cartridge, Instruction Manual, pp. 1-24, Datal Electronics, 1988. Logan, Ian, Spectrum Micro Drive Book, pp. 1-7, Melbourne House Publishers, 1983. ZZAP| Magazine, A Newsfield Publication, vol. 42, Oct. 1988. ZZAP| Magazine, A Newsfield Publication, vol. 45, Jan. 1989.
2019-04-24T04:55:07Z
https://patents.google.com/patent/US5941775
JULIUS MASON: Good morning, ladies and gentlemen, and welcome to the post-round Ryder Cup news conference. I'm Julius Mason, the Senior Director of Communications and Media Relations for the PGA of America. We are joined today by some very special people that I'd like to introduce right now. First in the front row over here, the Vice President of the PGA of America, Mr. Jim Remy; the Secretary of the PGA of America, Mr. Alan Woronowski, and from Palm Beach Gardens, Florida, the CEO of the PGA of America, Mr. Joe Steranka. At this time I'd like to turn the microphone over to the President of the PGA of America from the 500 Club in Phoenix, Arizona, Mr. Brian Whitcomb. BRIAN WHITCOMB: Thank you, Julius, and good morning, everybody. First of all, our heart felt thank you for your coverage of the 90th PGA Championship, and through your pens and lenses you've created interest in this great game and as the President of the PGA of America, I thank each and every one of you. Moving on, we are 39 days from the 37th playing of The Ryder Cup at Louisville, Kentucky at Valhalla. This is the first time in the post-PGA Championship where we are announcing the first eight members of the 12-member team and we will wait for our captain to make that decision on the other four participants as we go on. But we are so proud as the PGA of America, and in the interest of the game and our Captain, Paul Azinger. He has done a remarkable job of leading the American efforts to date, and of course we all know what a great competitor and fierce competitor Paul is, and I can't think of anybody to lead our team more appropriately than Paul Azinger. So with that, it gives me great pleasure and honor to introduce the United States Captain of The Ryder Cup, Paul Azinger. CAPTAIN PAUL AZINGER: Thank you. Thanks, Brian. Julius, thanks. Well, we've got eight players established, and I'm really happy that I don't have to pick four players this morning, I can tell you that. It would have been very difficult to know what to do. If you want -- do you want me to just talk about the eight guys that are on the team? JULIUS MASON: Give us some personality thoughts. CAPTAIN PAUL AZINGER: Well, Phil Mickelson had a pretty good week this week and ends up leading the points list. Tiger Woods would be leading the points list, but unfortunately for all of us he's not going to be able to be there. Phil is a good friend of mine and arguably I think one of the best players that's ever lived, with 34 wins and three major titles. We're going to have a great time. I've already sought a lot of Phil's input with respect to course setup and we've talked about picks already. Stewart Cink is another good friend of mine, tremendous player, absolutely bombs the ball. I think he has a pretty good match-play record, as well. I'm really excited for Kenny Perry to be on the team, being from Kentucky and I think we all are pretty familiar with Kenny Perry. He's established goals for himself, and you know, he unfortunately had to withdraw this week, I guess he had a scratched cornea, I don't know what that feels like; I don't know how hard that is to recover from. But I'm excited about Kenny Perry being on the team. I've known Kenny for a long time. We used to play against each other on the mini-tours. And Jim Furyk, who I was able to spend a little time with this week, one of the most consistent players America has to offer, U.S. Open Champion and terrific player, terrific match-play player. The next generation, fifth on our list, is going to be Anthony Kim, young and very exciting to watch. Looks to me like he has a really good attitude. You see him smiling a lot. I really have liked him for some time. I did an outing with him earlier in the year. I have gotten to know Anthony Kim a little bit and he's got a terrific personality and game to go with it. Nice to see Justin Leonard on the team. He has a lot of heart and a lot of moxy, I consider Justin a good friend of mine, as well. Terrific putter, terrific ball-striker. He's going to be fun to have on this team. Ben Curtis, of course, played terrific yesterday. Part of the reason this system was set up the way it was was to reward guys for the major championships, the four biggest championships we play. I've had my eye on Ben Curtis for a long time and I really believe that Ben Curtis is going to add a lot to this team. So I could not be more excited for him. I have not talked to him yet, and it's going to be kind of like a consolation prize a little bit for him. He played terrific this week. He didn't lose the PGA, Padraig Harrington went out and won it and Ben played terrific all the way to the end. The last guy is Boo Weekley, we all know his personality, and he is considered one of best ball-striker's on tour. I've gotten to know Boo a little bit, he's really funny and I actually may ban everybody from the press room except Boo Weekley, but we'll see how that works out. That's our eight guys, so I think the selection process has worked so far. I'm really excited about who we have on the team. The next three weeks are going to be really important for the remainder of the PGA TOUR because as I look at it right now anybody can get on this team. I have some really good friends that play this TOUR that are out there with chances to get on this team, and there's a bunch of guys who I don't know, at all, who have an opportunity to get on this team, and some of them are close. So I'll do what's best for us, what's best for the American Ryder Cup Team, which is best for the United States of America. I'll look beyond friendships, and just try to do what's right and get the best players on this team. So putting friendships aside, I will just reach out to the players that I think are the most confident and playing the best. Ladies and gentlemen before we go to Q&A, I'd like to invite a couple of players to join us via telephone. Justin, if you're out there listening, how about saying good morning to your captain, and by the way, welcome back to the Ryder Cup. JUSTIN LEONARD: Good morning. Thank you, Captain Azinger and I'm very excited to be on this team. This has been a goal of mine for about nine years, and it's taken me a little longer for me to reach it than I'd like, but now that I'm back on the team, I've certainly played a couple, but I feel like I'm going to bring a little bit of -- not quite youth, but you know, maybe a little perspective on it that some of the other guys may not have. JULIUS MASON: Thank you, Justin. If you can stay with us for a couple more minutes because we might have some questions for you. I'd like to also welcome Ryder Cup rookie, Boo Weekley with us. Boo, say hello to your captain. Good morning. BOO WEEKLEY: Good morning, Captain Azinger. CAPTAIN PAUL AZINGER: How you doing, Boo? BOO WEEKLEY: I'm doing good. It's a little early here. I want to thank y'all, too, man, this has been a dream come true for me in the last two years being able to come out here and play, and last year I got to represent the United States at the World Cup and actually got to feel the tension of what it's like to be a part of something. I think I'm with Justin, on bringing something to the team that might just overturn that slide that we've been on. CAPTAIN PAUL AZINGER: Well, I just want everybody to know and understand, that the selection process is probably the most difficult selection process that players have ever had to endure and go through. The top eight guys have really earned their spot and they have done it because they have played well this year and played well under pressure. For many of them, The Ryder Cup was forefront on their mind. So I'm real happy with the eight guys and I'm real happy that Boo Weekley is going to be a part of the team, and Justin Leonard, and I just appreciate both of you guys showing up this morning and being on the phone with us. JULIUS MASON: Boo, if you can hang tight, also, we're going to go to Q&A right now. Q. The first few guys that you named, that you talked about and said they were close friends of yours, how important is that? You obviously seem to put some importance in the fact that they are friends. Do you, and why is that so? CAPTAIN PAUL AZINGER: Well, actually I consider every player on this team a friend. I feel like it's important, because I want to share input. I don't want them to feel uncomfortable with me in any way, shape or form, and I don't think anybody will. I just want us to all be able to come together, have each other's back and try to step up a little bit. We lost the best players in the game, today, Tiger Woods, and we are all going to have to step up. We are going to take on an underdog role in this Ryder Cup for the first time in a long time, even on paper, when you look at the strength of the European squad. So we are going to have everything to gain here, and what we are going to try to do, what I would like to do is have everything come together and have each other's back. I plan on getting input from the two guys on the phone, as well as the other six guys that are not on the phone that qualified for this team, so that we can make four good picks. So I think to have a relationship with the players is important. Q. Given the European's performance in this tournament, the PGA has never been their domain, just how much more of an underdog are you now, and can you use that to your advantage in any way? CAPTAIN PAUL AZINGER: Well, I think the pressure, really, would be on them a little more than maybe it's going to be on us. We're playing on our home soil, and, you know, for the first time in a long time, Europe is going to have kind of everything to lose here in these matches. It's usually the other way around. Even though they won five of the last six, somehow they just seem to come in as the underdog, I don't know how that works. This time I think it's clear that we are the underdogs going into these matches. I figured that somebody from Europe was going to play really well this week. There are several guys coming back from a really great Ryder Cup in 2004 and you figured there was going to be good recall on their behalf and sure enough there they were and Sergio and Padraig were on the winning Ryder Cup Team here in 2004. Q. Is Boo still on the phone? Q. Boo, Doug Ferguson here. Wanted to ask you, you had no chance of, obviously, winning the tournament here, nor were you a complete lock to finish in the top eight. How much was that weighing on your mind when you went out and shot that fine round of 66 yesterday? BOO WEEKLEY: It was pretty heavy. I mean, after that morning round of finishing up, I really was just like, we've got to go out and play some good golf. We have got to show them that we want to be a part of it and that we can play under pressure and that we can play against all odds. You know, you're out there playing 36 holes or 30 holes, however many holes you played, it shows that, hey, you know, you've got the backbone to go out there and do it, and I wanted to prove it, and I know I could. Q. Justin, if you could just kind of talk about what it was like to be known for all these years almost specifically for making that big putt at Brookline, but also bittersweet because you have not had a chance to make another memory since then. JUSTIN LEONARD: Well, it's been bittersweet until here in the last few weeks. I felt like I had a great chance to make the team. It's nice to be known for something good like that, and to be a part of a couple Ryder Cup teams and to be a part of a winning Ryder Cup Team, and that's the last -- the last memory I have of it personally. So hopefully I can bring some of that into the locker room and the team room, and just have a positive influence on the event and especially on the guys on the team and on Captain Azinger. CAPTAIN PAUL AZINGER: Wait a minute, I want to make sure that all of the players watching me on the GOLF CHANNEL refer to me as Captain Azinger like Justin has done so far, and Boo. Q. Admiral Azinger. If I'm doing my math right, you've got three rookies, and as Justin just said, he's not been in this dance for about nine years. Could you again sort of give us your thoughts on experience versus new blood, especially when experience might be negative scar tissue? CAPTAIN PAUL AZINGER: Well, I really figured we would have seven rookies on this team. I could pick four rookies and have seven rookies on this team. I've said all along that experience, while being very important, anybody who has played Ryder Cup in the last 12 years, I mean, we've lost five of the last six Ryder Cups, so most of their experiences are bad experiences. So it's not like experience is going to be a great help. So I'm looking for guys that are playing well, it's as simple as that. And if it's an experienced player playing well, then I think that's fantastic. Q. There seems to be a lot of players leading up to this that point to the Presidents Cup and the success the U.S. has had in the Presidents Cup and repeatedly they say it's fun and Jack just has fun and it's not so serious. How do you as a captain go about getting that through to your players and say, in the end, it's just a golf tournament. CAPTAIN PAUL AZINGER: Well, it looked like The Presidents Cup team got off to a great start, and they were ahead 5 1/2 to a 1/2 or something the first morning, so of course they are going to be looking like they are having fun. When you're winning, you're having fun and when you're losing, you're not having fun. I think the American Ryder Cup teams have gotten along famously the last several Ryder Cups. I believe they had a lot of fun in the team room and all that, but when you're behind, early, and we've been behind early a lot, you know, you're not having fun. The other team is having fun. So it's important to get off to a good start. But in the end, what's fun about it, there's nothing fun about trying to win the golf tournament. It's fun after you've won. It's a grind. So everybody on this team I think gets along and knows each other pretty well, and you can't help it when 12 guys start getting together and hanging out together, they are having fun. When you're ahead, you're having more fun. I did ask the question to several players, did you get off to a great start because you were more relaxed, or were you more relaxed because you got off to a great start at that Presidents Cup. I think I got a blend of answers, but it could be that they got off to a great start because they were more relaxed. So I think it goes both ways. But you know, the reality is that you're on a big stage and there's going to be a lot of pressure, and I think if all you want to focus on is having fun, then when you get to the first tee, you start to panic, like, "Oh, my gosh." So there needs to be a blend there. I believe that preparation and focusing on the process is what's important, and getting to know the golf course is important, and you know what, I'm not holding anybody's hand this week. I've said that all along; these are all big boys. They are all professionals. They are great at what they do. They don't need to be motivated. I mean, they are all fantastic players. Our focus isn't going to be to have fun, I can promise you that. We will have fun because that's just what comes naturally. Our focus is going to be just to prepare, to get to know the golf course, to try to find any advantage or edge that we can, and just do this as a team. Q. Successive American captains in recent times have expressed bafflement as to the outcome of the matches, why the matches went the way they did. Now, without disclosing your strategy, do you think you've hit on something, some explanation for this, or some way of righting what you believe has gone wrong in the past? CAPTAIN PAUL AZINGER: I don't know. All I'm trying to do here is what I feel is right. I felt like there was some glaring observations for me as to what needed to be done, and changing the selection process was the first thing. This is a very difficult selection process. These players made it based on, for the most part, a one-year selection system, the four majors, counting last year. I just felt like a more current system was important. We've got that in place. These are the best players America has to offer right here. They have played well this year, and they should be confident and proud of what they have accomplished. They get to represent the United States of America because of the way they have played this year. I'm really grateful I didn't have to make four picks this morning. I can assure you it would have been very difficult and honestly I wouldn't know what to do, if I had to sit back right now and say, these are the four guys, I could have gotten burned by it, because there's three weeks after this tournament that I get to pick. Hopefully the four picks will fall right in my lap and it will be obvious. I don't think it will be that way I think picking four guys will be difficult. In the end I think changing the way we pick the team is going to be different there's though super motivational speech you can give to a guy who is playing poorly to get him to play better and I've said all along, I don't think I can say anything stupid enough to screw a guy up who is playing well. So we'll see how that plays out. Q. A few guys left here, 10 through 17or 18, left here kind of wounded. Will you make a few calls this week? CAPTAIN PAUL AZINGER: I may make some calls. I probably will make a couple phone calls, anyway. This is a hard golf course. I played it. I made the cut and endured four days of this golf course, so I think we are all licking our wounds a little bit. And I'm not going to put a whole lot of weight on what happened yesterday or what happened the first two days. You know, a couple guys who are, let's say Woody Austin and Hunter Mahan played terrible the first two days, but I can throw that away if they play decent any of the next three weeks, I'll have my eyes on them, as well as anybody else. Q. I think it's fair to say that Europe in the past have really been given great boosts at times when they have taken points from Tiger Woods, because of the figure that he is in the game and it's offered a degree of momentum to European matches. Do you see something similar being available to you now if your players can get anything from Padraig Harrington, given that he's won the last two majors, and it could be argued that he's the hottest player in the world right now? CAPTAIN PAUL AZINGER: Yeah, that's a possibility. There's no doubt that beating Tiger Woods could give them a boost, and has given Europe a boost. Maybe our team kind of looks up and goes, "Oh my gosh, Tiger's losing"; that's a possibility. We'll see. The difficult thing at Ryder Cup is that you can't really necessarily target an individual because you know when they are going to tee off; we don't know when Padraig is going to tee off. If somebody happens to beat Padraig, I'm sure it would give us a boost. Q. Justin, since 1999, you've been in a couple of major hunts on Sunday. You've won and lost a couple of golf tournaments, but has there been anything like the experience and the nerves and the pressure that you felt in '99 at Brookline? JUSTIN LEONARD: No, I've never experienced anything like that. You know, I've played a couple of Presidents Cups since then, but it's just not the same. I'm looking forward to getting back to that. There are some great memories because of the success that we had on Sunday, but there's nothing like those butterflies on the first tee of your first match in a Ryder Cup. There's nothing like it. Q. And for Boo, playing in the World Cup and representing the country is different than playing for yourself, but have you ever been in a situation where you felt like the nerves just seemed overwhelming? BOO WEEKLEY: No, sir. Like they were saying earlier, it's just golf. You've got to go out there and play your best, and you go out there and play your best and that's all you've got that day, or that week. It's not like you just go out and chop it up just for the fun of it. Q. Is the underdog role important, and do you envision some kind of "Win one for the Gipper" speech for Tiger? CAPTAIN PAUL AZINGER: Well, I don't think the underdog role is important. I just think it's obvious that we are going to be the underdogs coming into these matches. So whether we can play off that or not, I don't know. But win one for the Gipper, I don't know, we'll see. Depends on a lot of things. I'm looking forward to calling the Gipper and I want the Gipper's input on what's going on here and how Tiger feels. I respect Tiger Woods a lot. I hate that he's not going to be hanging out with us during that week. I would have loved to have spent time with Tiger and I would have loved to have been his captain. I would have loved to pound him in ping-pong, but I'm not going to be able to do that. So I'm going to have to pound on Boo and Justin. Q. Kind of a tie-in to all these Tiger Woods questions. Leaders often look to find positives in potential negative situations. Have you been able to find any positives in the fact that you're not going to have Tiger Woods on your team? CAPTAIN PAUL AZINGER: I don't see any positives not having Tiger Woods on the team. I just feel like it puts us in a very difficult spot. You know, he's arguably the greatest golfer who has ever lived, really; in the end, he probably will become that. So to not have him on our team, if you want to paint a positive scenario for that, go ahead and try. I don't see one yet. Q. Why was Ben Curtis on your radar screen? Because he doesn't seem to have been really on anyone else's from a TV perspective, press perspective, public, what-have-you, over the last three or four years. CAPTAIN PAUL AZINGER: There's just something about Ben Curtis that I've always liked. I like the fact that he won the British Open and he came back, having kind of a down spell in his career and came back and won those two tournaments in that one year, and I just saw a lot of heart in Ben Curtis. I just feel like he's got that kind of demeanor that you need on The Ryder Cup team. You need really a bunch of different type of personalities for a Ryder Cup Team to blend, and Ben Curtis, a little more stoic, a little more subdued, but I like his personality. I just feel like he's that type of guy that's going to kind of just put his head down and barrel on. I've always had my eye on him and I was hoping he played well at some point so I could either pick him or he'd make the team, and he's done it. Q. Given how well this new system appears to have worked, in hindsight, do you think four picks is really necessary? CAPTAIN PAUL AZINGER: Well, that's a good question. You know, I think what we are going to do really right now is continue the selection process as if it didn't end this week, but as if it would end in three weeks so that I can look at the Top-12 guys and maybe make a choice just based on that. If I really believe the system is exactly like I think it is, that it's going to produce the best 12 players; and if I have a hunch or anything other than that, I can go outside of what would be the new Top-12. So, you know, maybe not. I don't know. I like -- if you look down that list, I like the next four guys a lot. It's a good question. Did I answer it? (Laughing) Sorry. CAPTAIN PAUL AZINGER: No, I didn't say that. I said that's the only thing I ever choked for, prestige and cash, and I don't know about anybody else. Q. And you said you wanted to put emphasis on majors and this is the last major before you have to make four picks and you have two players that played arguably pretty poorly yesterday, in big situations, Rocco and J.B. Holmes. How do you discount that after saying the things you've said about the situations they were in and the biggest major there was this year? CAPTAIN PAUL AZINGER: Well, Rocco was back in the pack and he played poorly. I don't know what happened. I haven't talked to Rocco. I don't know why he played the way he did yesterday. I'm not that concerned about it. I know how Rocco hits it day-in and day-out. If either one of those two guys play well the next three weeks, well, you know, I have a lot of confidence in both of them. I feel for J.B. Holmes. He had the pressure on him all week and he just got off to a horrendous start. I don't know how he tripled the first hole, but I can't think of a worse way to start on a golf course that is just frightfully difficult. Once you get behind the 8-ball and you have that kind of aggression, that kind of power game, you start thinking birdies, and then all of a sudden you short-side yourself and start making bogeys and it begins to snowball. If ever there was a golf course you could discount a poor round, this would be the one. Would I have liked both of them to have played better? Of course. There's three weeks to go. I like both of them a lot. So I don't think that you can say that Rocco choked yesterday, and I really don't think J.B. has any choke in him. Q. For Boo and for Justin, Captain Azinger has talked about not having any bonding or any kind of team sessions. Will you guys -- a lot of changes to Valhalla, will you try to get there? Will you try to feel the place out? And Justin, you played there in the 2000 PGA, what do you remember about Valhalla? JUSTIN LEONARD: I remember quite a bit about it. I remember it changed a little bit from, I think it was '96 to 2000. I remember some beautiful green complexes, pretty straightforward off the tee. I am going to try and go for at least a day and play the golf course, and just kind of refamiliarize myself with everything there. But I remember it being a good golf course. I think it will be a great golf course for match play, for an event like The Ryder Cup. There's some exciting holes. There's four par 5s, you know, some good risk/reward holes. And it doesn't really seem to favor a certain type of game or certain style of game. So I think it will be a great venue for the event, and I'm looking forward to getting back. JULIUS MASON: Same question to Boo. Have you ever played Valhalla and will you try to get there before the 37th Ryder Cup? BOO WEEKLEY: No, I've never played it and I will try to get there some time to play it, just to get my eyes looking at it and see what's going on with it. And I hear there's so many things that have changed, just talking with some of the guys. I hope to get there, but if I don't, I'll have to see it when I get there, you know. CAPTAIN PAUL AZINGER: I'll just add to that. I just feel like there's really not enough time to ask the players to go in together as a team. The week off before the matches, I feel for each individual player, they should respond however they want. If they want to go play Valhalla, they can. But I felt like to organize all 12 of us to go in there and play. As a team, is unnecessary, and these guys, as I said before, they are big boys and I know how they prepare, but they are 12 guys and I want them to be ready when they show up. There's practice rounds, we get to play there on Tuesday, Wednesday, Thursday. Valhalla is not a difficult course to learn. But somehow you have a little more peace of mind if you roll in there early and play Valhalla. It's up to each individual to do as they see fit and they may want to go in there together with a couple other players. One thing I would like, if they can play a little alternate-shot with their buddies at home, that's fun to do. I used to try to play alternate-shot. We all know how to play best-ball. I used to play alternate-shot at home with a couple of my friends who were pros and put something on the line just to kind of get a sense of what that feels like. Q. Have you or will you study the makeup of the past teams that have not been successful, sort of look at the trends of the matches, the turning points, the key factors that might have led to their defeat, and if you do, how do you factor all that in? CAPTAIN PAUL AZINGER: I'm not really going to look at how all that went down. Those last two Ryder Cups were so lopsided, I don't think there was any significant, defining moment. I know in 2002, I was on the losing team there and Curtis was the captain, and personally, I thought Curtis did a terrific job, but there was just nothing we could have done on Sunday in any scenario to win that Ryder Cup. They made two-thirds more birdies or something than we did. It was a crazy amount of birdies. I don't know if there was a scenario that would have changed the outcome there. What I will do is try to gather some statistics and data and maybe let that pertain to who I want to pick. But for the most part, it's a different selection process. The team is a different makeup. This is going to be a pretty confident group of players that's coming in there, and like Boo said, we are really just going to go play golf. I don't want to overanalyze it, and try to keep it simple for the most part. And let's just try to figure out who wants to play with who and is there anyone you want to play with, and is there anyone on the team that you don't want to play with and I'll try not to put you with that person. Q. Having been on the last winning team and having watched the three defeats since, is there anything you noticed that was different, whether it be clutch putting or maybe just Europe playing better, anything that you saw that might have made a difference? JUSTIN LEONARD: Well, just the last two Ryder Cups, I think it's pretty obvious that the Europeans just out-played our team. Whether it's making clutch putts, chipping in, or all of the little things that you have to do, but we've just been out-played. I think our goal and Captain Zinger's goal is to get 12 guys that are ready to play and that are playing well at the time, and with the new selection process we have a much better chance of making that happen. Q. Just want to get your thoughts on Sergio, pretty much locking up a spot on their team. He had been outside their little floating window and he, of course, has been pretty much a giant killer for them for -- it seems like forever. CAPTAIN PAUL AZINGER: Well, yeah, Sergio's played amazingly well in Ryder Cup. He holes putts all over the place. I don't know what else you can say about the guy. He just seems to rise to the occasion at Ryder Cup. So anybody who plays Sergio García has a great opportunity to knock him down, to beat him. I think any time anyone beats Sergio or Padraig at this next Ryder Cup should probably give the team a boost. He's really hard to beat for various reasons. Maybe it's that Spanish heritage or something. Between he, Jose, and Seve, they probably have more points than anybody. Q. You've been a Ryder Cup Captain for awhile now, over a year obviously, and it's only about two months from now that you'll be looking back at everything. Have you thought about the whole process and what it's been like, and realizing that there's not much left before you're not The Ryder Cup captain? CAPTAIN PAUL AZINGER: You know, I have thought about it. It's coming on really fast now. I've enjoyed being the captain. I haven't played much, so I haven't -- this week was unbelievable, all of the people, "Go captain, bring back the Cup, bring back the Cup." It is going to be over in a couple of months, and I'm going to look back and reflect. I've got a lot of stuff that I've written down and there's been a lot of stuff that's gone on that nobody knows about. You know, we'll see how it turns out. There's a lot more to it, being the captain, than I thought there was going to be. There's lots of little things that you don't realize and you don't think about. I never thought about designing the clothes. I never thought about deciding what we were going to eat. I've tried to surround myself with people that I feel can help me. I've tried to -- Olin Browne, I feel like he's very active and has the respect of all the players, and he knows the players, and I've gotten a lot of phone calls from Olin Browne. We've spent lots of time on the phone together. Not a lot of time seeing Olin this year because I haven't played much, but I value his input and his perspective. He's really smart and articulate. And Dave and Raymond bring a lot of experience, and they understand match play. And there is a difference between stroke play and match play. But I've got a few other people that are helping me behind the scenes that nobody really knows about, so I'm just trying to surround myself with people that I think can be a great benefit to me, and I'm looking at a lot of different aspects as to how to approach this. I think the captain is consumed by what's going on, and obsesses it; I've been losing sleep over all this, and in the meantime, the players are just trying to grind it out each week and then The Ryder Cup has been in the back of their mind and they just show up. I had no perspective of what the captain went through leading up to the matches. I just played golf to the best of my ability, and The Ryder Cup was part of the bonus prize. Q. It seems like every year there's a little bit of volatility on the U.S. roster, other than Tiger, Phil, Stewart Cink and Furyk, they seem to be around every year. The Europeans have a larger core of guys that just move along and play six, seven, eight Ryder Cups before they are done, it seems. Do you have an explanation on why they seem to be able to hold their core together, and is that a big benefit for them in the long run? CAPTAIN PAUL AZINGER: I believe it is a benefit. They somehow have a way of keeping the same guys on the team. Their selection process is pretty good. They are using five off their Money List and five off the World Rankings and they cover the ground with their overlaps there and the two picks. They seem to have a tremendous knack for getting the most players that are on form for these matches and it's a big part of the reason that they have been able to win these matches. They have a system and it works well. One of the things we have tried to do is correct a selection process that was not giving us our best players -- I shouldn't say that. We have had tremendous players in these matches but they weren't necessarily red hot coming in. Some of the players in the past Ryder Cups were making it based on the previous year's performance. I don't want to take anything away from those guys. I think in the end you have to look at the European players and say that they played fantastic. If you look at the highlights of the last two or three or four Ryder Cups, all the great highlights seem to be coming from the Europeans, the putts, the shots holed in from the fairways, it seems to be going their way. Q. Could I ask you how impressed you were with Padraig Harrington's performance yesterday, and do you think he goes into The Ryder Cup with what he's done over the last few months with a target on his back, and does it make it all the better for you to try to beat him? BOO WEEKLEY: Yeah, I mean, that's our goal. I want to beat anybody I tee it up against and it doesn't matter whether it's match play or stroke play. It would be an honor to beat him, you know, just like Sergio, he's a giant killer. I'll ready to go out now and play either one of them. It don't matter who Paul puts me against and I think Justin might feel the same way. He's got a target on his back, yes, sir. JUSTIN LEONARD: Yeah, to shoot 8-under par over the weekend on this golf course is almost unimaginable. So, you know, pretty incredible performance, and especially coming after winning the Open just three weeks ago. You know, I mean, I don't know about a target on his back, but he's certainly their best player right now, and I look forward to the challenge. All of the matches are hard to win. You have to play great golf to win, and to beat those guys, you might have to play just a little bit better than that, but I think it's a challenge that we're up for. Q. You said something a minute ago that raises an important question. What exactly are you going to eat, and how much input do you get from Boo Weekley on that? CAPTAIN PAUL AZINGER: Yeah, I'll think about Boo a little bit. I'm looking for some -- I don't know, do you like fried catfish and fried chicken and all that, Boo, with grits and stuff like that? BOO WEEKLEY: Throw some frog legs and alligators and stuff like that would be good. CAPTAIN PAUL AZINGER: We're good. Kentucky, I think the chef there can cook just about anything. Honestly, I think we are going to kind of go for comfort foods, but to me grits are comfort foods, so we'll go for some grits and cheese eggs in the morning, some cereal choices. I like the idea of having some fried chicken, boy, sounds good to me. I know Boo will like that, and I think even Justin will go for fried chicken. I don't know about Cink and Furyk are health food nuts, so they may avoid that. I don't know what Anthony Kim will eat. Mickelson will eat anything. I've seen him eat. (Laughter). JULIUS MASON: I'd like to thank 2008 United States Ryder Cup Team members Justin Leonard and Boo Weekley for joining us this morning. A reminder to everybody that Captain Azinger will round out his 12-member squad on September 2 at ten o'clock in the morning in New York where he will make his four captain's selections. Ladies and gentlemen, we'll see you in Louisville. Thank you.
2019-04-20T03:14:57Z
http://www.asapsports.com/show_conference.php?id=51531
Since admission to trading on AIM in 2006, the Company has adopted the UK Corporate Governance Code and at its Board meeting on 27June 2018, the Board of the Company resolved to apply the UK Corporate Governance Code, published by the Financial Reporting Council, as revised in July 2018 (the "Code"). The Code sets standards for good practice in relation to board leadership and effectiveness, remuneration, accountability and relations with shareholders. The provisions of the Code (the 2018 version of which the Board has resolved to adopt prior to it taking effect for Premium Listed Main Market Companies on 1 January 2019) which apply to Quadrise Fuels International plc are set out below. Effective and entrepreneurial board promoting sustainable success, generating value for shareholders and contributing to wider society. Establish the company’s purpose, values & strategy. Directors to act with integrity and promote the desired culture. Ensure necessary resources to meet objectives and measure performance. Establish framework of controls which enable risk to be assessed and managed. Ensure effective engagement with and encourage participation from shareholders and stakeholders. Workforce policies and practices are consistent with the company’s values and support long term sustainable success. Workforce able to raise matters of concern. Chair responsible for board effectiveness. Promote a culture of openness and debate, facilitate constructive board relations and contribution of non-exec directors. Ensure accurate, timely and clear information. Appropriate combination of exec and non-exec (particularly independent) directors so that no one individual or group dominates. A clear division between board and company leadership. Non-exec directors to have sufficient time to meet responsibilities and provide constructive challenge, strategic guidance, specialist advice and hold executive management to account. A formal, rigorous and transparent procedure to board appointment. Establish a succession plan for board and senior management, based on merit and objective criteria. Promote diversity of gender, social and ethnic backgrounds, cognitive and personal strengths. The annual board evaluation to consider its composition, diversity and effective working together. Individual evaluation to demonstrate whether each director continues to contribute effectively. Establish formal and transparent policies and procedures to ensure independence and effectiveness of internal and external audit functions. Satisfy itself on integrity of financial and narrative statements. Present a fair, balanced and understandable assessment of company’s position and prospects. 15. Establish procedures to manage risk, oversee internal controls and determine nature and extent of principal risks in achieving its long-term strategic objectives. Policies and practices designed to support strategy and promote long-term sustainable success. Executive remuneration aligned to purpose and values and clearly linked to successful delivery of company’s long-term strategy. A formal and transparent procedure for developing policy on executive remuneration should be established. No director involved in deciding their own remuneration. Directors to exercise independent judgement and discretion when authorising remuneration outcomes, taking account of company and individual performance and wider circumstances. This statement appears on page 23 in our 2018 Annual Report. Since its original listing in April 2006, Quadrise Fuels International has applied strict corporate governance principles in all our endeavours. As an example, each year the Board has (albeit informally) tested itself against the then applicable UK Corporate Governance Code, and endeavoured to act on any perceived deficiencies. With the implementation of the new AIM company corporate governance changes, effective 28 September 2018, it was without hesitation that the Board chose to apply the Code as revised in July of that year. We have provided details of the Code on our website and explain where we comply, and if not, why and if appropriate what corrective steps we are taking to address any deficiencies. This information will be reviewed each year and our website will disclose the review date. As Executive Chairman, it is my duty together with my fellow Board members to promote and apply good standards of corporate governance throughout our organisation. The Company is privileged to have a highly experienced Board, setting clear values and strategy in our annual Business Plan, adopting the highest standards of integrity whilst promoting a hands-on, friendly but professional culture. 2018 was not without considerable disappointments to ourselves and shareholders. Nevertheless, through a series of meetings with major shareholders, and the introduction of investor conference calls (29 March, 11 June, 1 August, 18 December 2018), we have endeavoured to keep shareholders fully informed (within the usual disclosure constraints) on the Company's strategic development plans. The Company maintains a comprehensive suite of policies and practices appropriate for our size and stage of development. Each of these is reviewed and signed off by at least one nominated executive or non-executive director with considerable prior experience of the subject matter. The executive team frequently consult the chairmen of the audit and compensation committees on planning, finance, legal and human resource matters. In May and June each year the Board undertakes a structured risk assessment and the outcomes of this are incorporated in the annual Business Plan and the associated financial modelling. I trust these few examples illustrate that the Company has a healthy approach to oversight on behalf of all shareholders and that high standards of corporate governance are inherent in our culture. I and my fellow directors enjoyed meeting you at the AGM on 30 November 2018. we plan to hold further investor conference calls during 2019 and would be delighted to discuss any element of our governance standards on these calls. In accordance with AIM Rule 26, the following describes how the Company complies with the Code and where it departs from the Code together with an explanation of the reasons for doing so. The MSAR® technology has many environmental benefits as reported elsewhere on the company's website https://www.quadrisefuels.com/msar-technology/the-benefits-of-msar and in this way has considerable potential to contribute to wider society. Our mission is to be the world’s leading oil-in-water emulsion fuels company, providing best available technology, solutions, services and MSAR® synthetic fuel oil products for our major, market-leading customers. Our strategy is to work with leading global companies in the refining, shipping and power-generation markets to develop, simultaneously, the capacity to both produce and consume MSAR® emulsion fuels on a commercial scale and world-wide. The Quadrise team of twelve employees and directors can be described as tightly coherent and highly motivated with a very clear sense purpose. The Company is privileged to have a highly experienced Board, setting values and strategy in our annual Business Plan, and adopting the highest standards of integrity whilst promoting a hands-on, friendly but professional culture. For further information refer to Provisions 2 and 8. Ensure necessary resources to meet objectives and measure performance. Establish framework of controls which enable risk to be assessed and managed. We will continue to reduce where appropriate within the business, without impacting our ability to deliver our business development plans, including the required research and development support. During the 2018 financial year the majority of the directors voluntarily deferred a significant proportion of their salaries/fees, and this has continued into the new financial year. Refer to Provisions 28: Assessment of Risks, and 29: Internal Controls, as well as the disclosures under Principles I and O. A successful AGM was held on 30 November 2018 with some 68 shareholders in attendance. During 2018, through a series of meetings with major shareholders, and the introduction of investor conference calls (29 March, 11 June, 1 August, 18 December) with in excess of 100 shareholders on each call, the executive team has endeavoured to keep shareholders fully informed (within the usual disclosure constraints) on the Company's strategic development plans. Refer to Provisions 4, 5, 6 and 7 for further information. As a small and coherent organisation, the Company is quickly alerted to any practices that are inconsistent with our values and drive towards long-term sustainable success. The Company nevertheless prides itself in having in place all of the standard procedures of a much larger corporation, together with a wealth of experience on the Board to address any workforce concerns. During the induction programme, new employees are encouraged to bring forward any concerns at any time including use of a Whistleblowing Policy. Refer to further disclosures in Provisions 2, 5 and 6. Provision 1: Opportunities and risks to future success. The Chairman's Statement in the 2018 Annual Report describes the MSAR® market opportunities in the power generation and marine bunker fuel sectors. The risks associated with our endeavours are amply illustrated by the disappointments of the Production to Combustion” trial project in KSA, and the suspension and then termination of the marine fuel trial by Maersk. Principal Business Risks are more fully covered on Page 11 in the Annual Report. Notwithstanding the challenges faced in our key markets, the Board firmly believes in the sustainability of the Company's business model. Progress will not always be smooth, but we are well positioned to capitalise on past experience and the significant opportunities that we see going forwards, such as the potential of the agreements with JGC Corporation and Freepoint Commodities. The Company would not be able to attract the attention of partners of this calibre without clear evidence of its standards of corporate governance. The Company does not formally assess and monitor culture – this being a small organisation, where any deviation from policy, practices and behaviour at odds with the Company's purpose and values would become quickly apparent to management. The Quadrise team can be described as coherent and highly professional with a very clear sense of purpose. Team meetings are held weekly where project progress is reviewed and remedial action taken. The performance of all employees is assessed annually together with a discussion on career development plans. The remuneration scheme for all employees includes the potential award of bonuses and options subject to company and personal performance. Refer to Disclosure under Principle D and Provision 7. At the 2018 AGM, five ordinary resolutions and one special resolution were carried by at least 75% voting in favour. This provision did not therefore apply. Being a small organisation with 12 employees, it is relatively straightforward for the Company to consider and respond to views put forward from the workforce and other key stakeholders. In view of this, the Company does not have a director appointed from the workforce, a formal workforce advisory panel or a designated non-executive director to engage with the workforce. During the induction programme, new employees are encouraged to bring forward any concerns at any time including use of a Whistleblowing Policy. If appropriate the chairman of the compensation committee would be asked to investigate and seek external advice should this be necessary. Both executive and non-executive directors meet and consult major shareholders within the usual disclosure constraints to surface and manage any potential conflicts of interest. Any related party transactions are reported in Note 22 to the financial results. The Board works hard to resolve any concerns about the management of the company and the operation of the Board. On occasions a director will request that the Board minutes record his divergent opinion from the majority view. A resigning non-executive director would be encouraged to provide a written statement to the chair if his resignation resulted from such a concern. Chair responsible for board effectiveness. Promote a culture of openness and debate, facilitate constructive board relations and contribution of non-exec directors. Ensure accurate, timely and clear information. Appropriate combination of exec and non-exec (particularly independent) directors so that no one individual or group dominates. A clear division between board and company leadership. Quadrise is privileged to have a highly qualified and practiced Board of directors of an unusual level of seniority and standing given the Company's moderate size and still early stage of development. Refer to Director Profiles on page 14 of the Annual Report. The non-executive directors have a level of experience and gravitas that ensures a culture of openness and debate and provide the necessary challenge, guidance and advice. Detailed board papers are prepared a week ahead of meetings. For further information refer to Provision 8: Divergent opinions, Provision 10: Independence, Provision 15: Demands on time, and Provisions 16: Company Secretary. With an Executive Chairman, there is not a clear division between board and company leadership. This is seen as appropriate for the Company at this time, though this will be reviewed as the Company progresses its development plans. Refer to Provision 9. Ensure policies, processes, information, time and resources required to function effectively and efficiently. The Company has a digital Policies and Procedures Directory comprising some 100 policies in 22 business categories. The Policies and Procedures are intentionally kept very short so that these are easy to refer to and are "living" documents. Of note, each of these is reviewed and signed off by at least one nominated director (executive or non-executive) who is required to have considerable prior experience of the subject matter. Refer to Provision 29. QFI has a comprehensive disaster recovery plan which is tested on a regular basis. Expenditure and other authorities are subject to a tight Authorities Matrix, reviewed regularly by the Audit Committee. The Company has implemented a GDPR policy and has online training facilities for Bribery and Corruption, GDPR and General Data Protection. Completion of this training is compulsory for all employees and directors. Mike Kirk is Executive Chairman of the Company and therefore the roles of chair and senior executive of the company are exercised by the same individual. This is seen as appropriate for the Company at this time, though this will be reviewed as the Company progresses its development plans. The profiles and experience of the non-executive directors are provided on Page 14 of the Annual Report. Mr Dilip Shah is closely associated with significant shareholders and is not considered independent. There are no circumstances that might cause the Board to question Mr Philip Snaith's independence, and he has the appropriate experience as a former senior executive of the Royal Dutch Shell Group to chair the compensation committee. Mr Hemant Thanawala stepped down from his role as Finance Director in August 2017 and became a non-executive director. He is a significant shareholder and has share options, and was an executive director of the Company from 2006 to 2017. As a result, Mr Thanawala, cannot be formally considered independent. However, Mr Thanawala, provides valuable input to the company and the board in a manner consistent with being an independent director. He retired by rotation at the 2018 AGM and was re-elected. Non-executive director Laurence Mutch is also a Director of Laurie Mutch & Associates Limited, which has in the past provided consulting services to the Group. The total fees charged for the 2018 financial year amounted to £nil (2017: £30k). He is a shareholder and holds options in the Company, and has been a director since 2006. Mr Mutch has clearly indicated that these potential impairments do not and have not hindered his ability to be independent and after careful consideration the Board believes him to be independent. He was a former senior finance director of the Royal Dutch Shell Group and has the appropriate and current experience to chair the audit committee. He retired by rotation at the 2018 AGM and was re-elected. In view of its size, the Company has not appointed a Senior Independent Director. This will be reviewed as the Company progresses its development plans. On the appointment of Executive Directors refer to Principle J. As discussed under Provision 41, the Compensation Committee reviews the performance of the Company and that of the Executive Chairman against previously determined corporate performance targets adopted by the Board. The non-executive directors meet frequently without the Executive Chairman to discuss any performance concerns. During the 2018 financial year, the Board comprised the Executive Chairman, Chief Operating Officer and the Finance Director (until 10 August 2017) as executive Directors and three non-executive Directors (four from 10 August 2017) who are independent of management. At each Annual General Meeting, one third of the Directors who are subject to retirement by rotation shall retire from office provided that if their number is more than three, but not a multiple thereof, then the number nearest to but not exceeding one-third shall retire. Appropriate Directors’ and Officers’ liability insurance has been arranged by the Company. In addition to his role as Executive Chairman, Mike Kirk is Chairman of Portsmouth Water and Chair of VIVID Housing. Laurence Mutch is also a non-executive director and chairman of the audit committee at Georgian Mining, an AIM company. Hemant Thanawala and Dilip Shah have other disclosed external appointments. These positions have been disclosed to the Board and do not impact the time they need to commit to the Company. In Audrey Clarke the Company has a highly experienced Company Secretary and, for example, both the chairman of the compensation committee and the chairman of the audit committee are in regular contact to seek her guidance. The Board Nominations Committee is chaired by Mike Kirk and comprises Mike Kirk and Laurence Mutch. There is indeed a formal, rigorous and transparent procedure to board appointments with the use of external recruitment advisers as may be necessary. Refer to Provision 20. In view of its small size the Board does not have a formal succession plan, and this will be put in place as the Company progresses its development plans. The Board is keen to promote diversity as the Company develops. Board and committees to have a combination of skills, experience and knowledge. Review length of service of the board with membership regularly refreshed. Refer to Director Profiles in the Annual Report page 14. Each of the members of the Audit Committee has considerable financial experience. The members of the Audit and Compensation Committees formerly held senior executive positions in large organisations. External guidance is used in setting remuneration policy guidelines. Two of the directors have been on the Board for 12 years (since listing in April 2006). Whilst this is at odds with regularly refreshing the Board, their experience is highly valued by shareholders when the directors retire by rotation and are then re-elected. Refer to Provisions 18 and 19. An annual appraisal is undertaken of the contribution of each director, and the effectiveness of the Board and its committees. This involves the completion of a confidential evaluation matrix with 10 contribution attributes, together with an opportunity to propose improvements on board and committee performance. These are returned to the Company's Nomad and a consolidated review is provided to the Executive Chairman for review by the Board. Refer to "Evaluation of the board "under Provisions 21, 22 and 23 below. The Executive Chairman oversees an annual evaluation of all employees with targets set for the following year. The Compensation Committee undertakes an evaluation of the Company's performance and that of the Executive Chairman. Refer to Provision 41. In accordance with the Company's Articles of Association, at each Annual General Meeting, one third of the Directors who are subject to retirement by rotation shall retire from office provided that if their number is more than three, but not a multiple thereof, then the number nearest to but not exceeding one-third shall retire. The Company did not make any new appointments to the Board during the year and did not therefore appoint an external search consultant. Provisions 21, 22 and 23: Evaluation of the board. The Board did not use the services of an external evaluator during the year. However, under the direction of the Nominations Committee, the Board recently evaluated its performance, the contribution of each of the directors and the effectiveness of the committees by way of a confidential survey completed by each director. The Company's Nomad, Cenkos Securities plc (formerly Smith & Williamson), aggregated the results and have provided a summary to the Executive Chairman for review by the Board. Refer to the Corporate Governance Statement on pages 22 to 29 in the Annual Report. In view of its size the Company does not have an internal audit function. However, the Audit Committee is closely consulted on the drafting of the Annual Report and of course is integral to the preparation of the 2018 annual results. The Committee has considerable governance, control and finance experience. Refer to "The work of the Audit Committee" under Provisions 24, 25 and 26. Establish procedures to manage risk, oversee internal controls and determine nature and extent of principal risks in achieving its long-term strategic objectives. QFI performs a structured risk assessment on an annual basis. This involves a review of the probability and impact of adverse events in each operational unit. This culminates in the preparation of a risk dashboard for consideration by the Board. This is followed by a documented risk mitigation strategy that is subsequently incorporated into the annual Business Plan. Refer also to Provision 28: Assessment of the Company's Risks and Provision 29: Risk Management and Internal Control systems. The Audit Committee is chaired by Laurence Mutch and comprises Philip Snaith, Laurence Mutch and Hemant Thanawala, all of whom have recent and relevant financial experience and have competence in the oil sector. The chairman of the committee provides a written or detailed verbal report as necessary of every Audit Committee meeting at the next board meeting. The committee meets at least twice a year and is responsible for monitoring the integrity of the financial statements of the Company, keeping under review the scope and results of the audit, its cost effectiveness and the independence and objectivity of the auditors. The committee provides advice on whether the annual report and accounts are fair, balanced and understandable. Due to the size of the Company, there is currently no internal audit function, although the committee has oversight responsibility for public reporting, overall good governance and the Company’s internal controls. The committee annually assists management in the formal and robust assessment of the Company's risks. Other members of the Board, as well as the auditors, are invited to attend the Audit Committee meetings as and when appropriate. The significant issues considered relating to the 2018 financial statements were Going Concern, the Valuation of Intangible Assets and Management override of controls. The subject of Going Concern is covered in the Strategic Report on Page 11 in the Annual Report, in the Auditors Report on Page 30 and in Note 3 to the Financial Statements. The Valuation of Intangible Assets is addressed in the Auditors Report on Page 32 and in Note 2.9 to the Financial Statements. An internal audit function is not appropriate at this time given the Company's current size, but in view of this, the Audit Committee and the Auditors view the risk of management override of controls a significant issue. In making their assessment the Auditors considered specifically the controls over journals, any indication of unusual transactions and any evidence of bias in the estimates made by management. The Auditors conclusion was that there is no evidence of inappropriate management override of controls, and the Audit Committee endorsed this conclusion. Following a selection process conducted by the Audit Committee, Crowe U.K. LLP were appointed as auditors on 23 May 2011, and are reappointed each year by ordinary resolution put before the AGM. The committee has not identified any issues with regards to integrity, objectivity and independence of the Auditors and therefore consider them to be independent. The Board is responsible for the direction and overall performance of the Group with emphasis on policy and strategy, financial results and major operational issues. In addition, the Board is responsible for preparing the annual report and accounts, and considers this annual report and accounts, taken as a whole, to be fair, balanced and understandable, and that it provides the information necessary for shareholders to assess the company’s position, performance, business model and strategy. Each year in the second quarter, the Audit Committee assists the Executive Team in a structured zero-based re-assessment of the Company's emerging and principal risks. This is conducted for each project and organisational level including the Company's research and development facility, QRF, and then aggregated for the Company as a whole. The risk level is determined by its probability, impact on the Company, and whether the risk has increased or decreased over the last 12 months. A summary of "Principal Risks and Uncertainties" is reviewed at a board meeting. Subsequently a Risk Mitigation Strategy and Action Plan is incorporated into the annual Business Planning exercise conducted in June. The Risk Strategy and Action Plan is reviewed each year by the auditors who consider this to be a robust assessment to be regularly monitored. Provision 29: Risk Management and Internal Control systems. The Board is responsible for the effectiveness of the Group’s internal control system and is supplied with information to enable it to discharge its duties. Internal control systems are designed to meet the particular needs of the Group and to manage rather than eliminate the risk of failure to meet business objectives and can only provide reasonable and not absolute assurance against material misstatement or loss. The Company has a digital Policies and Procedures Directory comprising some 100 policies in 22 business categories. The Policies and Procedures are intentionally kept short so that these are easy to refer to and are "living" documents. Of note, each of these is reviewed and signed off by at least one nominated director (executive or non-executive) who is required to have considerable prior experience of the subject matter. Expenditure and other authorities are subject to a tight Authorities Matrix, reviewed regularly by the Audit Committee. QFI has a comprehensive disaster recovery plan which is tested on a regular basis. The Board has established a Bribery Policy, signed by all Directors and employees, to achieve compliance with the UK Bribery Act 2010, which came into effect on 1st July 2011. Agreements with third parties contain statements that the Company and its associates are required to adhere at all times to the UK Bribery Act 2010. The Company has recently implemented a GDPR policy and has online training facilities for Bribery and Corruption, GDPR and General Data Protection. Completion of this training is compulsory for all employees and directors. The subject of Going Concern is covered in the Strategic Report on Page 11 of the Annual Report, in the Auditors Report on Page 30 and in Note 3 to the Financial Statements. Refer to the Report on Directors' Remuneration in the Annual Report page 20. With reference to Provision 41, the Compensation Committee reviews remuneration policy on an annual basis to assess its effectiveness, and on behalf of the Board conducts performance appraisals of the Company and the Executive Chairman each year. External guidance is sought as necessary in setting the terms of senior executive compensation. Refer to Provision 35: Remuneration Consultant. In consultation with the Executive Chairman, the committee prepares corporate targets for formal adoption by the Board to determine the award of bonuses and / or options. These are clearly linked to the delivery of long term objectives and corporate strategy. Refer also to Provision 37: Compensation Committee discretion. The Compensation Committee is chaired by Philip Snaith and comprises Philip Snaith, Laurence Mutch and Hemant Thanawala. The chairman of the committee provides a written or detailed verbal report as necessary of every compensation committee meeting at the next Board Meeting. Philip Snaith served on the committee prior to taking over as chairman. The Board determines the remuneration of the non-executive directors and no Director participates in discussions about his own remuneration. Hemant Thanawala holds share options resulting from his prior role as Finance Director. Laurence Mutch and Dilip Shah have been awarded share options for exceptional services to the Company. At this time the committee does not make use of a remuneration consultant but the committee does make use of independent remuneration surveys when these become readily available. Options are granted by board resolution in line with one or more of the three QFI Share Option Schemes, a Schedule 5 Enterprise Management Incentive Share Option Plan (“EMIP”), a Schedule 4 Company Share Option Plan (“CSOP”) and an Unapproved Share Option Plan (“USOP”). The award of options is tightly linked to the delivery of long-term objectives and corporate strategy. The views of shareholders are taken into consideration. Only basic salary is pensionable and pension contribution rates for executive directors are in line with those for other staff. The contracts for executive directors have no fixed end date. In view of the disappointing performance of the past year, no bonuses or share options were awarded to the Executive Team. The committee works within the framework of a regularly reviewed compensation policy approved by the Board. It meets at least twice a year and conducts performance appraisals of the Company and the Executive Chairman against previously determined corporate performance targets adopted by the Board. External guidance is sought as necessary in setting the terms of senior executive compensation including the award of bonuses and / or options. In determining executive director compensation, the committee places considerable importance on proportionality, clearly linking remuneration to the delivery of long-term objectives and corporate strategy. In view of the disappointing performance of the past year, no bonuses or share options were awarded to the Executive Team. In designing remuneration policy, the committee has endeavoured to incorporate the principles of clarity, simplicity, and predictability. As an external measure, the committee refers to remuneration surveys of AIM companies of similar size and complexity, when these are readily available. Shareholder views on compensation have been expressed at the AGM and in other meetings, and the committee has taken these and the company's performance into account in its deliberations. The Report on Directors' Remuneration is on Page 20 of the Annual Report.
2019-04-23T14:39:33Z
https://www.quadrisefuels.com/investor-relations/corporate-governance-statement
2007-05-24 Assigned to LEGACY EMANUEL HOSPITAL & HEALTH CENTER reassignment LEGACY EMANUEL HOSPITAL & HEALTH CENTER ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DUMAN, HEATHER M., NAIR, BALA, WARD, W. KENNETH, WOOD, MICHAEL D. Electrochemical systems for measuring an analyte concentration, and correcting any surplus or deficiency in the measured concentration. More specifically, systems for measuring an analyte level in a fluid with an implantable sensor, processing the measurements with an algorithm, and determining an appropriate fluid infusion rate in response to the measurements. This application claims priority under 35 U.S.C. § 119(e) and all applicable international law to U.S. Provisional Patent Application Ser. No. 60/834,279 filed Jul. 28, 2006, which is incorporated herein by reference in its entirety for all purposes. The invention generally relates to electrochemical systems for measuring an analyte concentration and correcting any surplus or deficiency in the measured concentration. More specifically, the invention relates to systems for measuring an analyte level in a fluid with an implantable sensor, processing the measurements with an algorithm, and determining an appropriate fluid infusion rate in response to the measurements. Maintaining appropriate analyte levels in the bloodstream of mammals, including humans, is extremely important, and failure to do so can lead to serious health problems and even death. For example, in diabetic patients, malfunction of the pancreas can lead to uncontrolled blood glucose levels, possibly resulting in hypoglycemic or hyperglycemic shock. To compensate for this and to maintain an appropriate blood glucose level, diabetics must receive timely and correct doses of insulin. Similarly, many other analytes commonly are measured in the blood of humans and in other fluids, for the purpose of determining an appropriate response to any measured surplus or deficiency of the analyte. One method of measuring an analyte concentration in the blood of a mammal is to use an implantable sensor to measure the concentration, and a number of previous patented inventions relate to various aspects of such sensors. U.S. Pat. No. 5,711,861 to Ward et al. claims a disc-shaped sensor device having multiple anode/cathode pairs of electrodes for taking redundant analyte measurements. U.S. Pat. No. 6,212,416 to Ward et al. adds a coating to the sensor to inhibit formation of collagen or to enhance the sensitivity of the sensor in the presence of the analyte, and claims multiple redundant sensors (as opposed to a single sensor with multiple electrode pairs). U.S. Pat. No. 6,466,810 to Ward et al. claims a sensor with a single cathode and a plurality of anodes on each side, to provide redundant measurements without requiring multiple cathodes. Once analyte measurements have been obtained with a sensor—whether the sensor is implantable or otherwise—a response often must be determined, typically in the form of a fluid infusion rate to alter the analyte concentration to a more desirable level. The infused fluid may contain the analyte itself, or it may contain a substance the presence of which affects the analyte level. For example, if the measured analyte is glucose, the infused fluid may contain glucose, or it may contain insulin. Typically, an algorithm is used to determine a fluid infusion rate from analyte measurements, and several such algorithms are known. For example, a glucose-controlled insulin infusion system incorporating a proportional derivative (PD) method is disclosed in U.S. Pat. No. 4,151,845 to Clemens. U.S. Pat. No. 6,558,351 to Steil et al. claims an insulin infusion system using a proportional integral derivative (PID) algorithm that takes a patient's history of glucose levels into account when determining the infusion rate, by integrating the difference between the measured glucose level and the desired glucose level from some prior time up to the present. U.S. Pat. No. 6,740,072 to Starkweather et al. adjusts the parameters of the insulin infusion algorithm dynamically in response to exercise, sleep, and other external events. However, despite the use of various algorithms to determine a response to a measured analyte concentration, no algorithm has been developed that takes into account both current and prior analyte levels in a manner that adequately reflects the dynamic nature of the measured concentration. In the case of glucose measurements and insulin infusion, for example, none of the previously developed algorithms are able to simulate completely the normal insulin response of a healthy pancreas. Thus, a need exists for an improved system for measuring an analyte concentration, processing the measurements using an algorithm that adequately takes into account the dynamics of the analyte, and determining a response. FIG. 1 is a partially cut-away perspective view of an analyte sensor. FIG. 2 is a cross-sectional view of the sensor shown in FIG. 1. FIG. 3 is a schematic flow chart of an analyte monitoring system, including an analyte sensor, electronics, telemetry, and computing components. FIG. 3A is a schematic drawing of a system for sensing analyte levels and delivering an appropriate amount of a modulating substance. FIG. 4 is a graph illustrating results of a closed loop insulin infusion experiment in rats. FIG. 5 is a table comparing glucose levels in rats before and after insulin infusion. FIG. 6 shows a graph plotting glucose oscillations versus time in a single animal. FIG. 7 is a graph showing a gain schedule zone diagram. FIG. 8 is a graph showing pancreatic response profiles using three different algorithms. The present disclosure generally relates to systems for measuring an analyte level in a fluid with an implantable sensor, processing the measurements with an algorithm, and determining an appropriate fluid infusion rate in response to the measurements. The disclosed sensors generally are suitable for implantation into a mammal, and may include various features such as multiple anode/cathode pairs of electrodes for taking redundant glucose measurements, coatings to inhibit formation of collagen or to enhance the sensitivity of the sensor in the presence of glucose, and/or a single cathode with a plurality of anodes on each side, to provide redundant signals without requiring multiple cathodes. The disclosed algorithms use current and previous analyte values, and current and previous analyte rates of change, to determine an appropriate fluid infusion rate in response. These algorithms weigh more recent analyte values and analyte rates of change more heavily than more remote values and rates of change. This disclosure refers to an algorithm having these characteristics as a “Fading Memory Proportional Derivative” (FMPD) algorithm. This section describes a particular embodiment of an analyte sensor suitable for use with the present invention, and a commensurate monitoring system embodiment suitable for use with the disclosed sensor. FIGS. 1 and 2 illustrate a disc-shaped glucose sensor having two opposing faces, each of which has an identical electrode configuration. Alternatively, a disc-shaped sensor may be used in which an electrode configuration is provided on only one side of the sensor. One of the faces can be seen in the partially cut-away perspective view in FIG. 1. Sensor 18 includes a disc-shaped body 20. On planar face 21 of sensor 18, four platinum anodes 22 are symmetrically arranged around a centrally disposed silver chloride cathode 24. Each anode 22 is covered by an enzyme layer 25 including the active enzyme glucose oxidase and stabilizing compounds such as glutaraldehyde and bovine serum albumin (BSA). A semi-permeable membrane layer 26 covers all of the electrodes and individual enzyme layers. The thickness and porosity of membrane layer 26 is carefully controlled so as to limit diffusion and/or transport of the analyte of interest (in this embodiment, glucose) from the surrounding fluid into the anode sensing regions. The mechanism of selective transport of the analyte of interest through the membrane may involve one or more of the following principles: molecular size exclusion, simple mass transfer, surface tension phenomena, or chemically mediated processes. FIG. 2 shows a cross-section of sensor 18. Sensor 18 has a plane of symmetry SS, which is normal to the plane of the figure. Under face 31 of sensor 18, anodes 32 are spaced equidistantly apart from cathode 34. Enzyme layers 35 cover anodes 32. A semi-permeable membrane 36, preferably PPX or CAR, covers the enzyme layers and electrodes. Each of anodes 22 and 32 are connected to a common anode wire 33 that leads out of the sensor for electrical connection to an electrometer. Similarly each of cathodes 24 and 34 are connected to a common cathode lead 38, which leads out of sensor 18 for electrical connection to the electrometer. FIG. 3 shows schematically how an implantable analyte sensor (in this embodiment, a glucose sensor) may be connected in a glucose monitoring system 120. Electrodes in sensor 122 are polarized by polarizing circuit 124. Polarization of the sensor electrodes may be constant or pulsed. However, experiments have shown improvement in sensor performance stability, i.e. in maintaining sensitivity and minimizing drift, when polarization is pulsed. For example, polarization of the sensing electrodes may be pulsed alternatively on and off at intervals of 15 milliseconds. Polarization also may be alternated, i.e. the charge of each electrode may be switched at regular intervals. Sensor 122 is connected to electrometer 126, which is configured to sense small changes in electric current, and to translate electric current measurements into voltage signals. Voltage signals from electrometer 126 are telemetry conditioned at 128, and conveyed to a transmitter 130 for radio transmission. All of the components within box 132 may be implanted into the patient as a single unit. Externally, radio signals from transmitter 130, which in this embodiment are indicative of glucose concentrations in the patient's blood, are transmitted to a receiver 134. Receiver 134 may be connected to a monitor 136 for data monitoring. The same receiver computer, or another computer 138, may be used to analyze the raw data and to generate glucose concentration information. A printer 140 may be connected to computer 138 and configured to generate hard copies of the analyzed data. FIG. 3A shows a flow chart illustrating a system for correcting analyte concentrations in a mammal. Sensor 120 is a sensor configured to detect electrochemical characteristics in a bodily fluid such as blood, indicative of analyte concentration. For example, sensor 120 may use an enzyme such as glucose oxidase to detect changes in glucose concentration. Alternatively, sensor 120 may use enzymes such as cholesterol oxidase or other enzymes to detect concentrations of other analytes. Sensor 120 transmits data to processor 142. Processor 142 uses a fading memory algorithm to calculate an appropriate response such as an amount of insulin to deliver for normalizing an abnormal glucose concentration. Processor 42 communicates instructions to delivery device 144 resulting in delivery of the corrective substance to the patient. Any one, two, or all of the components including sensor 120, processor 142, and delivery device 144 may be positioned inside or outside the patient. ZPE=historical steepness coefficient for proportional error. DE′(t i)=K DE ×W DE(t i)×DE(t i) (3). W DE(t)=e −Z DE t (5). The normalizing factor 1/n is provided in equation (1) to compensate for the fact that making the measurement interval smaller (say, every one minute instead of every 5 or 10 minutes) will increase the number of terms, and thus make the sum of the weighted terms in equation (1) larger. However, in an alternate embodiment, this factor may equivalently be incorporated into any of the elements appearing in equations (2) or (3), so that its appearance in equation (1) is somewhat arbitrary. In the embodiment represented by equations (4) and (5), the values of the steepness coefficients ZPE and ZDE determine the rate of exponential decay of the weight factors, and thus, along with the values of the gain coefficients KPE and KDE, determine the relative weights of the various terms in the sum of equation (1). Thus, by varying the magnitudes of ZPE and ZDE, one can vary the degree to which the history of analyte values—in the form of the proportional error and the derivative error—are utilized. More specifically, smaller values of ZPE and ZDE result in a more slowly decaying weight function, so that the past history of the analyte's behavior being taken into greater consideration, whereas larger values of ZPE and ZDE result in a more rapidly decaying weight function, so that the past history is given less weight. The values of the steepness coefficients ZPE and ZDE relative to each other also may be adjusted to change the relative importance of the history of the proportional error versus the history of the derivative error. For example, if ZDE is chosen to be larger than ZPE, the derivative error weight will decay more rapidly than the proportional error weight, so that less of the history of the derivative error will be taken into account in comparison to the history of the proportional error. Conversely, by choosing ZPE larger than the ZDE, less of the history of the proportional error will be taken into account in comparison to the history of the derivative error. Other embodiments of an FMPD algorithm may display similar, but non-exponential behavior. For example, the weights of the terms in equation (1) may decrease linearly or polynomically backward in time, rather than exponentially. Generally, FMPD algorithms are characterized by the time-dependent weight of the terms that determine the rate of fluid infusion—with more remote terms being weighed less heavily than more recent terms—rather than by the precise functional dependence of those terms on time. The values of the gain coefficients KPE and KDE affect the overall weight of the proportional error relative to the weight of the derivative error, irrespective of the values of the steepness coefficients ZPE and ZDE. Thus, a large value of KPE relative to the value of KDE leads to a greater weighting of all of the proportional errors compared to the derivative errors, independent of the manner in which the weights of the various errors change over time. This section describes several examples of systems using analyte sensor systems and/or FMPD algorithms such as those described in Sections I and II above. In order to create a model of Type 1 diabetes, Sprague-Dawley rats (Charles River Labs, Charles River, Mass., 01887) weighing 300-500 grams were given 200 mg/kg of alloxan. Only animals whose subsequent blood ketone values were greater than 1.5 mM (i.e. those considered to have Type 1 diabetes) were included in the study. Animals were treated every day with one or two subcutaneous injections of Lantus (Insulin Glargine, Aventis, Bridgewater, N.J., 08807) and/or Regular insulin (Novo-Nordisk, Copenhagen). Rats underwent closed loop studies for six hours while on a homeothermic blanket (Harvard Apparatus, Holliston, Mass.) under anesthesia (1.5-2.5% isoflurane with 40% oxygen and 1 L/min medical air). Venous access was created by placing a 26 g catheter in the saphenous vein. The tip of the animal's tail was nicked to measure blood glucose concentration every five minutes throughout the study. Measurements were made with two hand held glucose meters (Sure Step, Johnson & Johnson Lifescan, Milipitas, Calif., 95035; AccuChek, Roche Diagnostics, Indianapolis, Ind., 46038), the mean value of which was used to calculate the insulin infusion rate. A thirty minute baseline preceded initiation of the FMPD algorithm-based insulin infusion. The insulin was diluted, one unit of Regular insulin (Novo, Copenhagen) per one ml saline. The diluted insulin was placed in a syringe pump (PHD 2000, Harvard Apparatus, Holliston, Mass.) and infused into the saphenous vein catheter. The mean of the blood glucose at each five minute reading was entered into the FMPD algorithm. Insulin infusion rates calculated by the FMPD were followed for the final five-and-a-half hours of the study. In addition to steady state assessments, dynamic aspects of closed loop control were also examined. These aspects included the oscillations of glucose level during the final 240 minutes of the closed loop control study. After identification of peaks and valleys, we then calculated the frequencies of oscillations in all studies and examined the degree to which the oscillations were convergent (decreasing amplitudes over time) or divergent (increasing amplitudes). During closed loop control, in an ideal situation, oscillations of glucose should be of small amplitude and should not increase over time. Students' unpaired t tests were used for comparisons, and data are presented as mean+SEM. A level of 0.05 was used as the criterion for significance. Results of closed loop studies are shown in FIG. 4, which portrays mean (+standard error of the mean) data for blood glucose measurements and insulin infusion rates for 6 diabetic rats. The FMPD algorithm was used to control blood glucose in these animals. A low rate basal insulin infusion was given such that insulin infusion persisted even when glucose was slightly lower than the set-point of 100 mg/dl. See also FIG. 5, which shows that the final glucose level was much lower than the initial glucose level in all animals. The final glucose level averaged 118+2.0 mg/dl (minutes 240-360). The amplitude of oscillations (distance from peak to valley) averaged 10.7+2.9%. In terms of assessing whether oscillations converged or diverged over the course of the final 4 hours of the study, we compared amplitude data during early control in minutes 120-235 with later control in minutes 240-360. An example in one animal of the oscillations during the final four hours of the study is shown in FIG. 6. There was a tendency for glucose values to converge, rather than to diverge during closed loop control. The oscillation frequency averaged 0.79 cycles per hour. By analysis if the foregoing results, it can be understood that the FMPD algorithm is a novel closed loop insulin control algorithm that utilizes a time-related weighting of proportional and derivative glucose data. The weighting function can be thought of as a fading memory of glucose levels and trends, and is based on the fact that the islet's physiological response to glucose utilizes current information and a fading memory of previous information. Animal studies showed that blood glucose was very well controlled during the closed loop control studies. This comparison demonstrates that, in the setting of venous glucose sampling and venous insulin delivery, this method enhances glucose control without causing undue hypoglycemia. In the situation in which there is a greater efferent delay or greater afferent delay, a less aggressive approach (using lower gain parameters) may be necessary to minimize the risk of hypoglycemia. One of the potential problems with a closed loop system of glucose control is that there can be a delay of the action of the infused insulin. For example, if one gives insulin by subcutaneous infusion, its action is much slower (due to the need for insulin to be absorbed before its action can be exerted) than if one gives the insulin intravenously. When a delay exists, it raises the possibility of overcorrection hypoglycemia. For example, assume that glucose is rising and that accordingly, the calculated insulin infusion rate also rises. However, let us assume that there is also a delay in the action of insulin in terms of its effect to reduce glucose level. The potential problem is that the algorithm will continue to increase the insulin infusion rate and that by the time the insulin finally acts, there will be a great deal of insulin that has been administered. Accordingly, the glucose can fall to very low values, a problem termed overcorrection hypoglycemia. One method of reducing the chance of experiencing overcorrection hypoglycemia is to rapidly reduce (or discontinue) the insulin infusion rate as soon as glucose begins to fall (or even as soon as the rate of rise of glucose declines towards zero). Such adjustments can be termed gain scheduling, that is making an adjustment during the algorithm utilization based on results obtained during closed loop control. Gain scheduling is a method that can be included in many types of algorithms. Gain scheduling essentially adjusts the gain parameters of the control algorithm such that desired responses can be obtained according to different ongoing results. Gain parameters are adjusted based on decision rules that utilize functions of input and output parameters. When considering the extremes of blood glucose levels, hypoglycemia is acutely more serious than hyperglycemia. If hypoglycemia is severe enough, coma, seizures or death may occur. The effects of hyperglycemia on the body are inherently slower and less of a problem from an acute (immediate) stand point. For these reasons, a quicker response to falling glucose in comparison to rising glucose may be desirable. Such a quick response may be accomplished by gain scheduling so that the response to rising and falling glucose levels are different. There are many possible methods of employing such gain scheduling. One such method defines zones using inverse polynomial curve fitting, as shown in FIG. 7. In FIG. 7, each zone indicates the need for a specific action by the algorithm. For example, let us assume that the current glucose concentration is 160 mg/dl. If the goal is 100 mg/dl, then the PE=60 mg/dl (and the X axis, PE+40, is 100 mg/dl). If the glucose concentration is rising and the specific DE is 2, then the data pair falls into the green zone. Data within the green zone indicates that the computed insulin infusion rate (R) will not be altered (since there is a very low risk for hypoglycemia). If on the other hand, the PE remains at 60 (PE+40=100) and the DE is equal to −2, the data fair falls into the orange zone, indicating that there is a risk for hypoglycemia. Data pairs in the orange zone indicate that the ZPE coefficient must be multiplied by a factor (chosen in one embodiment to be 2), thereby reducing the historical contribution, which in turn reduces the sum of the PE′ terms, which then reduces the overall infusion rate R. Another illustrative example of gain scheduling is one in which PE remains unchanged and DE is −4. This would be the case, for example, if glucose concentration were falling rapidly. The data pair in this case falls into the red zone. Data pairs in the red zone indicate that the ZPE coefficient is multiplied by a greater factor (chosen in one embodiment to be 4), further reducing the historical contribution, and thus further reducing the overall infusion rate R. In the situation in which PE remains unchanged and DE is −6, the data pair falls into the Off zone, which means that the infusion rate R is immediately turned off. Use of the zone diagram illustrated in FIG. 7, which utilizes gain scheduling, is a cautionary measure to respond quickly to declining glucose values during closed loop control in order to reduce the risk for hypoglycemia. Persons skilled in the art will understand that other, similar methods of gain scheduling can be utilized with an FMPD algorithm. For the algorithm as described above, if the glucose level remains at the goal, there is no proportional and no derivative error, and therefore no insulin will be infused. Let us assume that the goal is set at 100 mg/dl. It is known that the normal pancreatic islet cells continue to secrete insulin even thought glucose concentration may be equal or below 80 mg/dl. So, if the glucose goal is set at a level above the normal set point of the pancreatic islet cells, a basal insulin infusion rate may be added to the algorithm. If the goal is set a lower value and is similar to the true pancreatic set point, a separate basal insulin infusion will not be needed. The use of proportional error (PE) and derivative error (DE) terms as used in glucose control has been discussed by others for use in an artificial pancreas, and algorithms incorporating these two errors have been termed proportional derivative (PD) algorithms. For example, a glucose-controlled insulin infusion system incorporating a PD method is disclosed in U.S. Pat. No. 4,151,845 to Clemens. Glucose history may be incorporated into an algorithm for determining a response by using a Proportional, Integral, Derivative (PID) method, which incorporates an integral term into the algorithm. Steil, et al. disclosed the use of a PID algorithm in an artificial pancreas in U.S. Pat. No. 6,558,351. The PID algorithm can be summarized as follows. Assume that in the situation of serial glucose measurements, one plots the proportional error (current glucose concentration minus the glucose goal) on the ordinate and the time over which the measurements were made on the abscissa. The area under the curve from time x to time y is the integral, and this term provides some information about the history of the glucose values. The FMPD algorithm of the present disclosure does not incorporate an integral term in the algorithm, and can be distinguished from PID algorithms quite readily. In FMPD algorithms, a time-weighting method is used for the analyte proportional error and the analyte derivative error. For both the proportional error and the derivative error, analyte values that are more recent are weighted more heavily than more remote values, and the degree to which more recent values are weighted more heavily than more remote values can be varied. In other words, the algorithm can be made to increase its response to prior events (but never so much that it responds to remote data more than more recent data). In the specific context of an artificial pancreas, the FMPD algorithms of the present disclosure also can be compared to a PID algorithm in terms of how each reflects the normal physiology of pancreatic islet function. In terms of designing a closed loop artificial pancreas algorithm, it should be emphasized that the normal islet response to glucose comes to a plateau over time despite the presence of continued steady hyperglycemia. For example, in perifused islets and in non-diabetic humans who undergo hyperglycemic glucose clamps, insulin secretion typically begins to plateau within a two hour period despite a continued elevation of glucose. The time-related decrease in response is somewhat dependent on the degree of hyperglycemia; there may be less of a plateau with marked hyperglycemia. At any rate, after many hours, there is little or no continued rise in insulin secretion despite the persistence of hyperglycemia. In an artificial pancreas system based on a PID algorithm, the integral factor responds to the duration of glucose elevation in a linear manner. That is, the magnitude of the insulin delivery rate is directly proportional to the length of time that the glucose concentration remains elevated. In a PID system, if glucose remains elevated at a constant level, the integral component will continue to rise in a linear fashion, rather than reach a plateau. To compare the pancreatic response modeled by proportional derivative without fading memory (PD), PID without fading memory, and FMPD algorithms, we performed computations which simulated a hyperglycemic glucose clamp. The glucose values at every minute of the clamp profile were submitted to three algorithms: PD, PID and FMPD. The resulting insulin responses are shown in FIG. 8, which demonstrates that, like the normal physiologic response, all three algorithms demonstrate a biphasic response to elevated glucose. For both the PD and the PID algorithms, the first phase exists only at the instant when glucose level changed. More specifically, the FMPD algorithm produces a first phase response that persists even after the instantaneous glucose rise. For the PD algorithm, the second phase insulin release is constant (unlike the normal situation, it does not rise). The PID algorithm produces a more realistic second phase in which the insulin infusion rate rises; however, the PID second phase continuously ramps up for the duration of the elevation of glucose concentration. This is because the integral action continues to add to the total insulin dose for as long as the glucose is above the set-point. The fading memory algorithm also produces an increasing second phase, but it reaches a plateau after a period of time, depending on the magnitude of the WPE parameter. The FMPD algorithm in the present invention simulates the physiological situation of reaching a plateau by applying a fading memory of glucose data to the proportional and derivative components. The invention is based on the fact that the islet's physiological response to glucose is based on current information in addition to a fading memory of previous information. In another variation of the described methods, glucagon, or another substance capable of increasing glucose levels, is administered as glucose levels fall to avoid or attenuate hypoglycemia. As described above, insulin is delivered (intravenously, subcutaneously or intraperitoneally) based on the proportional error, the derivative error, as modified based on history (past proportional and derivative error calculations), which we refer to as “fading memory”. In some instances if the glucose level starts out high, a relatively large dose of insulin is administered based on the algorithm. This may cause an overcorrection resulting in hypoglycemia several hours after giving the high dose of subcutaneous insulin. It is generally not practical or effective merely to turn off the insulin to avoid overcorrection hypoglycemia because subcutaneous insulin has a long delay before it is absorbed and its effect may last for hours after it is given. Overcorrection hypoglycemia is typically not a problem when insulin is administered intravenously because its onset and offset is relatively rapid. However, when insulin is administered subcutaneously resulting in a rapid decline in glucose concentration, glucagon, or some other agent capable of increasing blood glucose levels (glucagon-like agent), or small volumes of concentrated glucose itself (for example 15-50% dextrose) may be adminstered subcutaneously. Glucagon is an endogenous hormone that all mammals secrete from the pancreas. Glucagon is a linear peptide of 29 amino acids. Its primary sequence is almost perfectly conserved among vertebrates, and it is structurally related to the secretin family of peptide hormones. Glucagon is synthesized as proglucagon and proteolytically processed to yield glucagon within alpha cells of the pancreatic islets. Proglucagon is also expressed within the intestinal tract, where it is processed not into glucagon, but to a family of glucagon-like peptides (enteroglucagon). In contrast to insulin, subcutaneous glucagon has a faster onset and offset. Studies have shown glucagon onset five to ten minutes after subcutaneous delivery, whereas insulin onset may take hours after subcutaneous delivery. Therefore it can be used effectively as a “rescue treatment” when the glucose level is declining rapidly. This has proven beneficial in animal studies to minimize overcorrection hypoglycemia. For example, to avoid overcorrection hypoglycemia, glucagon, a glucagon-like agent, or some form of glucose itself, may be administered when blood glucose concentration is 100 mg/dl and falling rapidly. The calculation for dosing glucagon in a closed loop system is similar to that of insulin, except in reverse. The amount of glucagon given should be based on the proportional error. Assume a set point of 100 mg/dl, more glucagon is delivered if the glucose level is 60 than if the glucose level is 90. The amount of glucagon delivered should also be based on the derivative error (again the goal of the derivative error is 0—flat). In other words, if glucose is declining at 6 mg/dl per min, then one should give more glucagon than if it is declining at 1 mg/dl per minute. The fading memory factor is less important relative to the derivative error for glucagon administration, but is more useful relative to the proportional error. Therefore, preferably, a fading memory calculation is used, as described with respect to insulin delivery, for administering glucagon, mainly with respect to the proportional error, while considering none or only a short history relative to the derivative error. In other words, it will typically be useful to consider a longer history for the proportional error than for the derivative error. For example, assume patient A has had a glucose concentration slope of 1 for at least forty five minutes, and currently has a glucose concentration of 80 mg/dl; patient B has had a glucose concentration slope of 1 for only a short period, and currently has a glucose concentration of 80. Patient A has a higher risk of hypoglycemia than patient B, but perhaps not a lot higher. Both patients have a glucose concentration falling at the same rate, and both patients are nearing hypoglycemia. However, if the glucose level (proportional error) is unchanged compared to thirty minutes ago when glucagon was administered, then more glucagon should be administered immediately. The disclosure set forth above may encompass multiple distinct inventions with independent utility. Although each of these inventions has been disclosed in its preferred form(s), the specific embodiments thereof as disclosed and illustrated herein are not to be considered in a limiting sense, because numerous variations are possible. The subject matter of the inventions includes all novel and nonobvious combinations and subcombinations of the various elements, features, functions, and/or properties disclosed herein. The following claims particularly point out certain combinations and subcombinations regarded as novel and nonobvious. Inventions embodied in other combinations and subcombinations of features, functions, elements, and/or properties may be claimed in applications claiming priority from this or a related application. Such claims, whether directed to a different invention or to the same invention, and whether broader, narrower, equal, or different in scope to the original claims, also are regarded as included within the subject matter of the inventions of the present disclosure. a fluid delivery system configured to infuse fluid into the user in a manner based at least partially on the processor output signal. 2. The infusion system of claim 1, wherein the analyte is glucose. 3. The infusion system of claim 1, wherein the fluid contains insulin. 4. The infusion system of claim 1, wherein the sensor includes a disc-shaped body having two opposing sides, each opposing side having a cathode and a plurality of anodes. 5. The infusion system of claim 1, wherein the sensor includes a disc-shaped body having two opposing sides, a cathode and a plurality of anodes positioned on one of the sides. 6. The infusion system of claim 1, further comprising a membrane semi-permeable to the analyte covering at least a portion of the sensor. 7. The infusion system of claim 6, further comprising an enzyme layer disposed between the sensor and the membrane. 8. The infusion system of claim 1, further comprising a transmitter electrically coupled to the sensor, wherein the transmitter is configured to receive the sensor output signal, to convert the sensor output signal into the processor input signal, and to transmit the processor input signal to the processor. determining the fluid infusion rate based at least partially on the processor output signal. infusing the fluid into the user at the determined fluid infusion rate. 11. The method of claim 9, wherein the analyte is glucose. 12. The method of claim 11, wherein the fluid contains insulin. delivering the fluid containing insulin into the user. delivering a glucose-increasing substance to the user when the user's glucose concentration is falling at a rate above a pre-determined threshold, and the user's glucose concentration has fallen below a pre-determined threshold level. 15. The method of claim 14, wherein the glucose-increasing substance is selected from the following: (a) glucagon, (b) glucagon-like agent, (c) glucose, and (d) dextrose, and mixtures thereof. 16. The method of claim 9, further comprising receiving the sensor output signal at a transmitter electrically coupled to the sensor, converting the sensor output signal to the processor input signal with the transmitter, and transmitting the processor input signal to the processor with the transmitter. 17. The method of claim 9, wherein determining the fluid infusion rate also is based on at least one of the following traits of the user: insulin sensitivity, age, body weight, usual total daily insulin dose, or physical adiposity. 18. The method of claim 9, wherein determining the fluid infusion rate also is based on at least one of the following traits of the user: diet, or physical activity level. prior analyte derivative errors, wherein more recent prior analyte derivative errors are weighted more heavily than more remote prior analyte derivative errors. 20. The method of claim 19, wherein the algorithm uses a linear weighting system. 21. The method of claim 19, wherein the algorithm uses a nonlinear weighting system. 22. The method of claim 19, wherein the analyte is glucose and the fluid contains insulin. 23. The method of claim 22, wherein delivering fluid to the mammal includes delivering insulin to the mammal with an insulin delivery device located outside the body of the mammal. 24. The method of claim 22, wherein delivering fluid to the mammal includes delivering insulin to the mammal with an insulin delivery device implanted inside the body of the mammal. Monnier et al. 2008 Glycemic variability: the third component of the dysglycemia in diabetes. Is it important? How to measure it?
2019-04-24T15:19:02Z
https://patents.google.com/patent/US20080027301A1/en
Beatty, S.J. and Morgan, D.L. (2019) A “cray‐zy” dam solution for an iconic species. Frontiers in Ecology and the Environment, 17 (3). p. 184. Beatty, S.J., Tweedley, J.R., Cottingham, A., Ryan, T., Williams, J., Lynch, K. and Morgan, D.L. (2018) Entrapment of an estuarine fish associated with a coastal surge barrier can increase the risk of mass mortalities. Ecological Engineering, 122 . pp. 229-240. García-Díaz, P., Kerezsy, A., Unmack, P.J., Lintermans, M., Beatty, S.J., Butler, G.L., Freeman, R., Hammer, M.P., Hardie, S., Kennard, M.J., Morgan, D.L., Pusey, B.J., Raadik, T.A., Thiem, J.D., Whiterod, N.S., Cassey, P., Duncan, R.P. and Pysek, P. (2018) Transport pathways shape the biogeography of alien freshwater fishes in Australia. Diversity and Distributions, 24 (10). pp. 1405-1415. Tweedley, J.R., Hallett, C.S. and Beatty, S.J. (2017) Baseline survey of the fish fauna of a highly eutrophic estuary and evidence for its colonisation by Goldfish (Carassius auratus). International Aquatic Research, 9 (3). pp. 259-270. Norman, B.M., Whitty, J.M., Beatty, S.J., Reynolds, S.D. and Morgan, D.L. (2017) Do they stay or do they go? Acoustic monitoring of whale sharks at Ningaloo Marine Park, Western Australia. Journal of Fish Biology, 91 (6). pp. 1713-1720. Beatty, S.J., Allen, M.G., Whitty, J.M., Lymbery, A.J., Keleher, J.J., Tweedley, J.R., Ebner, B.C. and Morgan, D.L. (2017) First evidence of spawning migration by goldfish (Carassius auratus); implications for control of a globally invasive species. Ecology of Freshwater Fish, 26 (3). pp. 444-455. Morgan, D.L., Ebner, B.C., Allen, M.G., Gleiss, A.C., Beatty, S.J. and Whitty, J.M. (2017) Habitat use and site fidelity of neonate and juvenile green sawfish Pristis zijsron in a nursery area in Western Australia. Endangered Species Research, 34 . pp. 235-249. Beatty, S.J. and Morgan, D.L. (2017) Rapid proliferation of an endemic galaxiid following eradication of an alien piscivore (Perca fluviatilis) from a reservoir. Journal of Fish Biology, 90 (3). pp. 1090-1097. Beatty, S., Allen, M., Lymbery, A., Jordaan, M.S., Morgan, D., Impson, D., Marr, S., Ebner, B. and Weyl, O.L.F. (2017) Rethinking refuges: Implications of climate change for dam busting. Biological Conservation, 209 . pp. 188-195. Norman, B.M., Holmberg, J.A., Arzoumanian, Z., Reynolds, S.D., Wilson, R.P., Robertson, D., Pierce, S.J., Gleiss, A.C., de la Parra, R., Galvan, B., Ramirez-Macias, D., Robinson, D., Fox, S., Graham, R., Rowat, D., Potenski, M., Levine, M.N., Mckinney, J.A., Hoffmayer, E., Dove, A.D.M., Hueter, R., Ponzo, A., Araujo, G., Aca, E., David, D., Rees, R., Duncan, A., Rohner, C.A., Prebble, C.E.M., Hearn, A., Acuna, D., Berumen, M.L., Vázquez, A., Green, J., Bach, S.S., Schmidt, J.V., Beatty, S.J. and Morgan, D.L. (2017) Undersea Constellations: The Global Biology of an Endangered Marine Megavertebrate Further Informed through Citizen Science. BioScience, 67 (12). pp. 1029-1043. Morgan, D.L., Somaweera, R., Gleiss, A.C., Beatty, S.J. and Whitty, J.M. (2017) An upstream migration fought with danger: freshwater sawfish fending off sharks and crocodiles. Ecology, 98 (5). pp. 1465-1467. Ebner, B.C., Morgan, D.L., Kerezsy, A., Hardie, S., Beatty, S.J., Seymour, J.E, Donaldson, J.A, Linke, S., Peverell, S., Roberts, D., Espinoza, T., Marshall, N., Kroon, F.J., Burrows, D.W. and McAllister, R.J.R. (2016) Enhancing conservation of Australian freshwater ecosystems: identification of freshwater flagship fishes and relevant target audiences. Fish and Fisheries, 17 (4). pp. 1134-1151. Ogston, G., Beatty, S.J., Morgan, D.L., Pusey, B.J. and Lymbery, A.J. (2016) Living on burrowed time: Aestivating fishes in south-western Australia face extinction due to climate change. Biological Conservation, 195 . pp. 235-244. Beatty, S., de Graaf, M., Duffy, R., Nguyen, V. and Molony, B. (2016) Plasticity in the reproductive biology of the smooth marron Cherax cainii (Decapoda: Parastacidae): A large freshwater crayfish of south-western Australia. Fisheries Research, 177 . pp. 128-136. Morgan, D.L., Beatty, S.J., Close, P.G., Allen, M.G., Unmack, P.J., Hammer, M.P. and Adams, M. (2016) Resolving the taxonomy, range and ecology of biogeographically isolated and critically endangered populations of an Australian freshwater galaxiid, Galaxias truttaceus. Pacific Conservation Biology, 22 (4). pp. 350-359. Morgan, D.L., Wueringer, B.E., Allen, M.G., Ebner, B.C., Whitty, J.M., Gleiss, A.C. and Beatty, S.J. (2016) What is the fate of amputee sawfish? Fisheries, 41 (2). pp. 71-73. Morgan, D.L., Allen, M.G., Ebner, B.C., Whitty, J.M. and Beatty, S.J. (2015) Discovery of a pupping site and nursery for critically endangered green sawfish Pristis zijsron. Journal of Fish Biology, 86 (5). pp. 1658-1663. Klunzinger, M.W., Beatty, S.J., Morgan, D.L., Pinder, A.M. and Lymbery, A.J. (2015) Range decline and conservation status of Westralunio carteri Iredale, 1934 (Bivalvia:Hyriidae) from south-western Australia. Australian Journal of Zoology, 63 (2). pp. 127-135. Klunzinger, M.W., Beatty, S.J., Morgan, D.L., Lymbery, A.J. and Haag, W.R. (2014) Age and growth in the Australian freshwater mussel, Westralunio carteri, with an evaluation of the fluorochrome calcein for validating the assumption of annulus formation. Freshwater Science, 33 (4). pp. 1127-1135. Lymbery, A.J., Morine, M., Kanani, H.G., Beatty, S.J. and Morgan, D.L. (2014) Co-invaders: The effects of alien parasites on native hosts. International Journal for Parasitology: Parasites and Wildlife, 3 (2). pp. 171-177. Rashnavadi, M., Lymbery, A.J., Beatty, S.J. and Morgan, D.L. (2014) Ecological response of an estuarine atherinid to secondary salinisation in south-western Australia. Journal of the Royal Society of Western Australia, 97 . pp. 343-353. Ebner, B.C., Starrs, D., Morgan, D.L., Fulton, C.J., Donaldson, J.A., Doody, J.S., Cousins, S., Kennard, M., Butler, G., Tonkin, Z., Beatty, S., Broadhurst, B., Clear, R., Lintermans, M. and Fletcher, C.S. (2014) Emergence of field-based underwater video for understanding the ecology of freshwater fishes and crustaceans in Australia. Journal of the Royal Society of Western Australia, 97 . pp. 287-296. Beatty, S.J., Seewraj, K., Allen, M. and Keleher, J. (2014) Enhancing fish passage over large on-stream dams in south-western Australia: a case study. Journal of the Royal Society of Western Australia, 97 (2). pp. 313-330. Close, P.G., Ryan, T.J., Morgan, D.L., Beatty, S.J. and Lawrence, C.S. (2014) First record of ‘climbing’ and ‘jumping’ by juvenile Galaxias truttaceus Valenciennes, 1846 (Galaxiidae) from south-western Australia. Australian Journal of Zoology, 62 (2). pp. 175-179. Beatty, S.J., Morgan, D.L. and Lymbery, A.J. (2014) Implications of climate change for potamodromous fishes. Global Change Biology, 20 (6). pp. 1794-1807. Morgan, D.L., Beatty, S.J., Allen, M.G., Keleher, J.J. and Moore, G.I. (2014) Long live the King River Perchlet (Nannatherina balstoni). Journal of the Royal Society of Western Australia, 97 . pp. 307-312. Morgan, D.L., Unmack, P.J., Beatty, S.J., Ebner, B.C., Allen, M.G., Keleher, J., Donaldson, J.A. and Murphy, J. (2014) An overview of the 'freshwater fishes' of Western Australia. Journal of the Royal Society of Western Australia, 97 . pp. 263-278. Beatty, S.J. and Morgan, D.L. (2013) Introduced freshwater fishes in a global endemic hotspot and implications of habitat and climatic change. BioInvasions Records, 2 (1). pp. 1-9. Klunzinger, M.W., Beatty, S.J., Morgan, D.L., Thomson, G.J. and Lymbery, A.J. (2013) Morphological and morphometrical description of the glochidia of Westralunio carteri Iredale, 1934 (Bivalvia: Unionoida:Hyriidae). Molluscan Research, 33 (2). pp. 104-109. Morgan, D.L., Beatty, S.J. and Adams, M. (2013) Nannoperca pygmaea, a new species of pygmy perch (Teleostei: Percichthyidae) from Western Australia. Zootaxa, 3637 (4). pp. 401-411. Klunzinger, M.W., Beatty, S.J., Morgan, D.L. and Lymbery, A.J. (2012) Distribution of Westralunio carteri Iredale, 1934 (Bivalvia: Unionoida: Hyriidae) on the south coast of south-western Australia, including new records of the species. Journal of the Royal Society of Western Australia, 95 (2). pp. 77-81. Klunzinger, M.W., Beatty, S.J., Morgan, D.L., Thomson, G.J. and Lymbery, A.J. (2012) Glochidia ecology in wild fish populations and laboratory determination of competent host fishes for an endemic freshwater mussel of south-western Australia. Australian Journal of Zoology, 60 (1). pp. 26-36. Klunzinger, M.W., Morgan, D.L., Lymbery, A.J., Ebner, B.C., Beatty, S.J. and Thomson, G.J. (2010) Discovery of a host fish for glochidia of Velesunio angasi (Sowerby, 1867) (Bivalvia : Unionoida : Hyriidae) from the Fortescue River, Pilbara, Western Australia. Australian Journal of Zoology, 58 (4). pp. 263-266. Lymbery, A.J., Hassan, M., Morgan, D.L., Beatty, S.J. and Doupé, R.G. (2010) Parasites of native and exotic freshwater fishes in south-western Australia. Journal of Fish Biology, 76 (7). pp. 1770-1785. Morgan, D.L. and Beatty, S.J. (2007) Feral goldfish (carassius auratus) in Western Australia: a case study from the Vasse River. Journal of the Royal Society of Western Australia, 90 (3). pp. 151-156. Beatty, S.J., Morgan, D.L. and Torre, A. (2007) Restoring ecological connectivity in the Margaret River: Western Australia's first rock-ramp fishways. Ecological Management & Restoration, 8 (3). pp. 224-228. Morgan, D.L., Chapman, A., Beatty, S.J. and Gill, H.S. (2006) Distribution of the spotted minnow (Galaxias maculatus (Jenyns, 1842)) (Teleostei: Galaxiidae) in Western Australia including range extensions and sympatric species. Records of the Western Australian Museum, 23 (1). pp. 7-11. Morgan, D.L. and Beatty, S.J. (2006) Use of a vertical-slot fishway by galaxiids in Western Australia. Ecology of Freshwater Fish, 15 (4). pp. 500-509. Chapman, A., Morgan, D.L., Beatty, S.J. and Gill, H.S. (2006) Variation in life history of land-locked lacustrine and riverine populations of Galaxias maculatus (Jenyns 1842) in Western Australia. Environmental Biology of Fishes, 77 (1). pp. 21-37. Beatty, S.J., Morgan, D.L. and Gill, H.S. (2005) Life history and reproductive biology of the Gilgie, Cherax Quinquecarinatus, a freshwater crayfish endemic to Southwestern Australia. Journal of Crustacean Biology, 25 (2). pp. 251-262. Beatty, S., Morgan, D. and Gill, H. (2005) Role of life history strategy in the colonisation of Western Australian aquatic systems by the introduced crayfish Cherax destructor Clark, 1936. Hydrobiologia, 549 (1). pp. 219-237. Morgan, D.L., Gill, H.S., Maddern, M.G. and Beatty, S.J. (2004) Distribution and impacts of introduced freshwater fishes in Western Australia. New Zealand Journal of Marine and Freshwater Research, 38 (3). pp. 511-523. Beatty, S.J., Morgan, D.L. and Gill, H.S. (2003) Reproductive biology of the large freshwater crayfish Cherax cainii in south-western Australia. Marine and Freshwater Research, 54 (5). pp. 597-608. Beatty, S., Close, P., Morgan, D., Allen, M., Maughan, D., Keleher, J., Ryan, T. and Lawrence, C. (2015) Conserving south-western Australia’s rarest and most threatened freshwater fishes. In: State NRM Conference, 21 - 23 September, Mandurah, Western Australia pp. 21-24. Ogston, G., Beatty, S.J., Morgan, D.L., Pusey, B.J. and Lymbery, A.J. (2015) Implications of climate change on the aestivating salamanderfish, Lepidogalaxias salamandroides Mees and black-stripe minnow, Galaxiella nigrostriata Shipway. In: State NRM Conference, 21 - 23 September, Mandurah, Western Australia pp. 77-78. Ogston, G., Beatty, S., Morgan, D., Pusey, B. and Lymbery, A. (2015) Implications of climate change on aestivating fishes. In: ASFB Conference, 11 - 14 October, Sydney, Australia. Beatty, S., Allen, M., Whitty, J., Lymbery, A., Keleher, J., Tweedley, J., Ebner, B. and Morgan, D. (2015) Migration by goldfish Carassius auratus and the implications for control of a globally invasive species. In: ASFB Conference, 11 - 14 October, Sydney, Australia. Tweedley, J.R., Beatty, S., Cottingham, A., Keleher, J. and Lynch, K. (2015) Mitigating historical management actions to preserve fish for the future. In: ASFB Conference, 11 - 14 October, Sydney, Australia. Beatty, S., Allen, M., Whitty, J., Lymbery, A., Keleher, J., Tweedley, J., Ebner, B. and Morgan, D. (2015) Movement of introduced Goldfish Carassius auratus: implications for control. In: ASFB Conference, 11 - 14 October, Sydney, Australia. Tweedley, J., Beatty, S., Keleher, J. and Lynch, K. (2015) Understanding and mitigating the influence of historical managerial decisions on the fauna of the Vasse-Wonnerup. In: WA Wetland Management Conference, 2 February, Bibra Lake, WA, Australia. Tweedley, J., Keleher, J., Beatty, S. and Lymbery, A. (2015) The fish faunas of an intermittently-open, seasonally inverse estuary. In: ASFB Conference, 11 - 14 October, Sydney, Australia. Morgan, D.L., Allen, M.G., Ebner, B.C., Whitty, J.M. and Beatty, S.J. (2014) Detection of juvenile Green Sawfish, Pristis zijsro, habitat in Western Australian waters. In: Sharks International, 2 - 6 June, Durban, South Africa. Tweedley, J., Keleher, J., Beatty, S. and Lymbery, A. (2014) Fishes of the Vasse-Wonnerup: life in an extreme estuarine environment. In: 10th Annual Wetland Management Conference, 31 January, Perth, Western Australia. Tweedley, J., Beatty, S., Lymbery, A., Ash, A. and Keleher, J. (2014) Salty Goldfish? Goldfish can use wetlands as ‘bridges’ to invade new rivers. In: 10th Annual Wetland Management Conference, 31 January, Perth, Western Australia. Ramsay, A., Morgan, D., Beatty, S., Allen, M., Klunzinger, M., Keleher, J. and Robert, J. (2013) Community outreach: field guides and documentaries of Western Australian freshwater fishes. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Beatty, S., Morgan, D., Close, P., Allen, M., Lymbery, A., Davies, R., Ryan, T. and Lawrence, C. (2013) Enhancing the prospects for south-western Australia’s rarest and most threatened freshwater fishes. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Seewraj, K., Beatty, S., Allen, M. and Keleher, J. (2013) Fish passage for on-stream farm dams in the south-west of Western Australia: a large-scale case study. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Morgan, D., Beatty, S., Allen, M., Ebner, B. and Keleher, J. (2013) Fishes in freshwaters of Western Australia: an overview. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Morgan, D.L. and Beatty, S.J. (2013) Mapping extremes in freshwater fish diversity across a range of climatic provinces: documenting unique examples of phenotypic and biological adaptations in Western Australia. In: 9th Indo-Pacific Fish Conference, 24 - 28 June, Okinawa, Japan. Murphy, J., Lymbery, A., Beatty, S. and Morgan, D. (2013) Population genetic structure and cryptic speciation within five species of freshwater fish from the south-west of Western Australia. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Beatty, S.J., Morgan, D.L. and Tweedley, J. (2013) Salted fish: a review of fishes in extreme salinity and how anthropogenic changes in salinity have driven community shifts in Western Australia. In: 9th Indo-Pacific Fish Conference, 24 - 28 June, Okinawa, Japan. Beatty, S., Morgan, D., Allen, M., Keleher, J. and Lymbery, A. (2013) Vulnerability of south-western Australian fishes to climate change: canaries in the coal mine. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Lymbery, A., Hassan, M., Morgan, D. and Beatty, S. (2013) A healthy river is one which is rich in (some) parasites. In: Western Australian Freshwater Fish Symposium, 8 November, Perth, Western Australia. Klunzinger, M.W., Beatty, S., Morgan, D. and Lymbery, A. (2012) Conservation status of Westralunio carteri Iredale (Bivalvia: Hyriidae). In: Molluscs 2012: Meeting of the Malacological Society of Australasia, 3 - 6 December, Melbourne, Australia. Klunzinger, M., Beatty, S., Morgan, D., Thomson, G. and Lymbery, A. (2012) Host fishes for the glochidia of Westralunio carteri Iredale (Bivalvia: Hyriidae). In: Molluscs 2012: Meeting of the Malacological Society of Australasia, 3 - 6 December, Melbourne, Australia. Beatty, S. and Morgan, D. (2011) Lessons from the west: a review of Gambusia in Western Australia. In: Murray Darling Basin Authority Gambusia Forum, 1 - 2 June, Melbourne, Australia. Beatty, S., de Graaf, M., Molony, B., Nguyen, V. and Pollock, K. (2011) Plascticity in population biology of Cherax cainii (Decapoda: Parastacidae) inhabiting lentic and lotic environments in south-western Australia: Implications for the sustainable management of the recreational fishery. In: Australian Society for Fish Biology Conference and Workshop, 20 - 24 July, Townsville, Australia. Lymbery, A.J., Klunzinger, M.W., Morgan, D.L. and Beatty, S.J. (2010) Factors affecting the decline of a freshwater mussel and its host fish in Western Australia. In: 12th International Congress of Parasitology, 15-20 August 2010, Melbourne, Vic.. Beatty, S.J. and Morgan, D.L. (2010) Unique inland fishes of south-western Australia: how may climate change exacerbate current impacts? In: Climate change and Western Australian wetlands and waterways symposium, 6 July, Perth, Western Australia. Beatty, S.J. and Morgan, D.L. (2009) Introduced fishes of Western Australia: what, where, impacts and actions. In: 8th Indo Pacific Fish Conference and 2009 ASFB Workshop and Conference, 31 May - 5 June 2009, Fremantle, Western Australia. Lymbery, A.J., Hassan, M., Morgan, D.L. and Beatty, S.J. (2009) The role of parasites in the decline of freshwater fishes in the south west of Western Australia. In: 8th Indo Pacific Fish Conference & 2009 ASFB Workshop and Conference, 31 May - 5 June, Fremantle, Western Australia. Beatty, S.J. and Morgan, D.L. (2008) Little fish under threat in a big state: south-western Western Australia’s endemic freshwater fishes. In: Australian Society for Fish Biology Conference and Workshop, 15-18 Sept 2008, Sydney, Australia. Beatty, S.J., Morgan, D.L. and Gill, H.S. (2006) The diet and trophic positions of translocated, sympatric populations of Cherax destructor and Cherax cainii in the Hutt River, Western Australia: evidence of resource overlap. In: Australian Society for Fish Biology Conference and Workshop, 28 August - 1 September, Hobart, Australia. Beatty, S., Morgan, D. and Gill, H. (2006) The yabbie in Western Australia: An invasion from the east. In: ASFB 2006 Workshop and Conference, 28 Aug - 1 Sept 2006, Hobart, Tasmania. Molony, B.M., Beatty, S.J., Morgan, D.L., Gill, H.S. and Bird, C. (2004) The mitigation of the negative impacts of dam draining on fish and fisheries values at Waroona Dam, Western Australia. In: Australian Society for Fish Biology Conference and Workshop, 19-24 Sept 2004, Adelaide, South Australia. Morgan, D., Gill, H., Maddern, M. and Beatty, S. (2003) Introduced fishes in Western Australia. In: ASFB 2003 Conference, 29-30 June 2003, Wellington, New Zealand. Beatty, S., Molony, B. and Morgan, D. (2002) Mitigation of negative impacts on fish and fisheries values during remedial works at Waroona Dam. In: 41st Conference of the Australian Society of Limnology, 29 Sept - 2 Oct 2002, Margaret River, Western Australia. Beatty, S., Morgan, D. and Hill, H. (2002) Reproductive biology of the marron Cherax tenuimanus (Smith, 1912), in Lake Navarino, south-western Australia. In: 41st Australian Society of Limnology Congress, 29 Sept - 2 Oct 2002, Margaret River, Western Australia. Morgan, D.L., Allen, M., Beatty, S.J., Ebner, B.C. and Keleher, J. (2014) A Field Guide to the Freshwater Fishes of Western Australia's Pilbara Province. Freshwater Fish Group & Fish Health Unit, Murdoch University, Maddington, Western Australia. Beatty, S., Morgan, D., Keleher, J., Lymbery, A., Close, P., Speldewinde, P., Storer, T. and Kitsios, A. (2013) Adapting to climate change: A risk assessment and decision making framework for managing groundwater dependent ecosystems with declining water levels, Supporting Document 4: Environmental variables in the habitats of southwestern Australian freshwater fishes: An approach for setting threshold indicator values. National Climate Change Adaptation Research Facility, Gold Coast, Australia. Chambers, J.M., Nugent, G., Sommer, B., Speldewinde, P., Neville, S., Beatty, S., Chilcott, S., Eberhard, S., Mitchell, N., D’Souza, F., Barron, O., McFarlane, D., Braimbridge, M., Robson, B., Close, P., Morgan, D., Pinder, A., Froend, R., Horwitz, P., Cook, B. and Davies, P. (2013) Adapting to climate change: A risk assessment and decision making framework for managing groundwater dependent ecosystems with declining water levels. Guidelines for use. National Climate Change Adaptation Research Facility, Gold Coast, Australia. Chambers, J., Nugent, G., Sommer, B., Speldewinde, P., Neville, S., Beatty, S., Chilcott, S., Eberhard, S., Mitchell, N., D’Souza, F., Barron, O., McFarlane, D., Braimbridge, M., Robson, B., Close, P., Morgan, D., Pinder, A., Froend, R., Horwitz, P., Cook, B. and Davies, P. (2013) Adapting to climate change: a risk assessment and decision making framework for managing groundwater dependent ecosystems with declining water levels. Development and case studies. National Climate Change Adaptation Research Facility, Gold Coast, Australia. Robson, B.J., Chester, E.T., Allen, M., Beatty, S., Chambers, J.M., Close, P., Cook, B., Cummings, C.R., Davies, P.M., Lester, R.E., Lymbery, A., Matthews, T.G., Morgan, D. and Stock, M. (2013) Novel methods for managing freshwater refuges against climate change in southern Australia. National Climate Change Adaptation Research Facility, Gold Coast, Australia. Beatty, S., Allen, M., Lymbery, A., Storer, T., White, G., Morgan, D. and Ryan, T. (2013) Novel methods for managing freshwater refuges against climate change in southern Australia: Evaluating small barrier removal to improve refuge connectivity - a global review of barrier decommissioning and a process for southern Australia in a drying climate. National Climate Change Adaptation Research Facility, Gold Coast, Australia. Beatty, S., Ryan, T., Close, P. and Morgan, D. (2017) Aquatic fauna and water quality management program: Denmark Dam draindown 2017. Murdoch University, Perth, Western Australia. Beatty, S., Ma, L., Morgan, D. and Lymbery, A. (2017) Baseline assessment of Carter’s Freshwater Mussel, Westralunio carteri, at proposed bridge construction sites on the lower Vasse River. Murdoch University, Perth, Western Australia. Allen, M.G., Beatty, S.J. and Morgan, D.L. (2015) Baseline survey of key fish refuges in the Margaret River. Report to Cape to Cape Catchments Group. Freshwater Fish Group and Fish Health Unit, Centre for Fish and Fisheries Research, Murdoch University, Perth, Western Australia. Beatty, S., Keleher, J., Ryan, T., Allen, M. and Morgan, D. (2015) Control of goldfish and koi carp in Emu Lakes, City of Swan. Report to the City of Swan. Freshwater Fish Group and Fish Health Unit, Centre for Fish and Fisheries Research Murdoch University, Perth, Western Australia. Ryan, T., Beatty, S., Keleher, J., Allen, M. and Morgan, D. (2015) Ecological assessment of Denmark Dam and potential relocation pools for aquatic fauna in the Denmark River. Report to the Water Corporation of Western Australia. Freshwater Fish Group & Fish Health Unit, Centre for Fish & Fisheries Research, Murdoch University, Perth, Western Australia. Allen, M.G., Beatty, S.J. and Morgan, D.L. (2015) Important refuge habitats for threatened Balston’s Pygmy Perch in south-western Australia. Report to South West Catchments Council. Freshwater Fish Group and Fish Health Unit, Centre for Fish and Fisheries Research, Murdoch University, Perth, Western Australia. Keleher, J., Beatty, S. and Allen, M. (2014) Aquatic fauna of Schwenke’s Dam: a rehabilitated mine lake in Greenbushes. Report to the Blackwood Basin Group. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Beatty, S., Keleher, J., Morgan, D., Allen, M. and Strehlow, K. (2014) Aquatic fauna survey of Denmark Dam. Report to the Water Corporation of Western Australia. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Beatty, S.J., Tweedley, J.R., Lymbery, A.J., Keleher, J., Allen, M.G. and Morgan, D.L. (2014) Introduced and native fishes in the Vasse‐Wonnerup Wetland System and its rivers. Report to the Australian Government through its Caring for our Country Program. Freshwater Fish Group and Fish Health Unit, Murdoch University, Murdoch, Western Australia. Keleher, J., Beatty, S., Allen, M. and Morgan, D. (2014) The fish and crayfish fauna of Yangebup Lake. Report to the City of Cockburn. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Tweedley, J.R., Keleher, J., Cottingham, A., Beatty, S.J. and Lymbery, A.J. (2014) The fish fauna of the Vasse-Wonnerup and the impact of a substantial fish kill event. Centre for Fish and Fisheries Research, Murdoch University, July 2014. Beatty, S., Morgan, D., Keleher, J., Allen, M. and Strehlow, K. (2013) Aquatic fauna of Southampton Pool, Blackwood River: an assessment of the potential impacts during construction of a subterranean pipeline. Report to the Water Corporation of Western Australia. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Tweedley, J.R., Beatty, S.J., Allen, M. and Lymbery, A. (2013) Increasing community awareness of feral fish in the Vasse-Wonnerup Wetland. Report for Coastwest. Murdoch University, Perth, Western Australia. Beatty, S., Morgan, D., Keleher, J., Allen, M. and Strehlow, K. (2013) Supplementary survey of aquatic fauna of Southampton Pool, Blackwood River: an assessment of the potential impacts during construction of a subterranean pipeline. Report to the Water Corporation of Western Australia. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Beatty, S., Allen, M., Morgan, D., Strehlow, K. and Janicke, G. (2011) Ecological significance of the fish, macroinvertebrates and riparian vegetation in the Mitchell River catchment. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D. and Keleher, J. (2011) Goldfish control in the Vasse River: summary of the 2011 programme. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J. and Morgan, D.L. (2011) Monitoring of key freshwater fish indicators of adequacy of baseflow in the Blackwood River. Freshwater Fish Group and Fish Health Unit, Murdoch University, Perth, Western Australia. Morgan, D.L. and Beatty, S.J. (2010) Interannual variation of the fish fauna associated with Snake (Uralla) Creek, Fitzroy River, Kimberley, Western Australia. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D., Ebner, B. and Beatty, S. (2009) Fishes in groundwater dependent pools of the Fortescue and Yule Rivers; Pilbara, Western Australia. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D. and Allen, M. (2009) Freshwater fish and crayfish communities of the Carbunup and Buayanyup Rivers: conservation significance and management considerations. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J., McAleer, F. and Morgan, D.L. (2009) Migration patterns of fishes of the Blackwood River and relationships to groundwater intrusion. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. de Graaf, M., Morgan, D.L., Beatty, S.J. and Hugh, C.W. (2009) Risk assessment of Record Brook interbasin water transfer scheme to the aquatic fauna of the Donnelly and Warren Rivers. Western Australia. Dept. of Fisheries, Western Australia. Beatty, S.J. and Morgan, D.L. (2009) Synopsis of the studies on the ecology of fishes in the Blackwood River and the importance of groundwater intrusion. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D., Beatty, S. and Kurata, K. (2008) Feral Goldfish (Carassius auratus) in the Warren River catchment. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J., McAleer, F.J. and Morgan, D.L. (2008) Interannual variation in fish migration patterns and habitats of the Blackwood River and its tributaries: annual progress report. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J., Morgan, D.L. and Fazeldean, T. (2008) McLeod Creek (Blackwood River) fish survey: December 2007. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Rashnavadi, M., Morgan, D. and Lymbery, A.J. (2008) Salinity tolerances of native freshwater fishes of the Blackwood River. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J. and Morgan, D.L. (2007) Assessment of water quality and fish communities of the Blackwood River during pump testing of Nb012-001 Nannup bore, November 2007. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D.L., Beatty, S.J. and McAleer, F.J. (2007) Canning River – freshwater fishes and barriers to migrations. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S. and Morgan, D. (2007) Fish and macroinvertebrate communities of the Warren River, Western Australia. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D., McAleer, F., Koenders, P. and Horwitz, P. (2006) Fish and freshwater crayfish communities of the Blackwood River: migrations, ecology and the influence of surface and groundwater. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2006) Fish and freshwater crayfish communities of the Brunswick and Preston Rivers. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D., Jury, C. and Mitchell, J. (2006) Fish and freshwater crayfish in streams in the Cape Naturaliste region and Wilyabrup Brook. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S. and Morgan, D. (2006) Management of aquatic fauna during refurbishment of Phillips Creek Reservoir. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S.J. and Morgan, D.L. (2006) Overview of the feral Goldfish Control Programme in the Vasse River, Western Australia: 2004-2006. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2006) Re-establishment of native freshwater fishes in Bull Creek. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D.L. and Beatty, S.J. (2005) Baseline study on the fish and freshwater crayfish fauna in the Blackwood River and its tributaries receiving discharge from the Yarragadee Aquifer. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2005) Control of feral Goldfish (Carassius auratus) in the Vasse River. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2005) The Goodga River Fishway – two years of monitoring the Western Australian trout minnow (Galaxias truttaceus). Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S. and Morgan, D. (2004) Assessing the requirement for fishways on Gingin Brook. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2004) Fish fauna of the Vasse River and the colonisation by feral goldfish (Carassius auratus). Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2004) Fish utilisation of the Goodga River Fishway conserving the Western Australian trout minnow (Galaxias truttaceus). Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2004) The aquatic macrofauna of Pinwernying Dam (Katanning). Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2003) Fish and decapod fauna of Bancell Brook (Harvey River) and the impacts of irrigation slot boards on migrations. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D. and Gill, H. (2003) Fish resource survey of Churchman Brook Reservoir. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Beatty, S., Morgan, D. and Gill, H. (2003) Fish resource survey of Phillips Creek Reservoir. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D., Gill, H. and Beatty, S. (2003) Fish stock enhancement of Lake Booyeembarra. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D. and Beatty, S. (2003) Freshwater fishes of the Walpole River and impact of the weir to fish and lamprey migrations. Murdoch University. Centre for Fish & Fisheries Research, Western Australia. Morgan, D., Allen, M. and Beatty, S. (2015) Inland fishes of the Pilbara province. 2015 Research Findings: Bulletin 4.01 Marine, Estuarine & Freshwater Science . Beatty, S. and Morgan, D. (2002) Simple fishways. Water Notes, 26 . Beatty, S. Mitigation of negative impacts on fish and fisheries values during remedial works at Waroona Dam. POSTER . Morgan, D.L. and Beatty, S.J. The freshwater fishes of Margaret River. POSTER . Morgan, D.L. and Beatty, S.J. The freshwater fishes of the Hotham River. POSTER . This list was generated on Thu Apr 18 18:08:31 2019 UTC.
2019-04-19T06:18:04Z
https://researchrepository.murdoch.edu.au/view/author/Beatty,%20Stephen.html
Except for some developmental buy Australian Stories 1965 hostilities, and some humanitarian research, all empirical patterns and attraction are in socialist parties. Many paper would watch that over 95 recording of Research leaves in ongoing passages, which is high where it does in the USA. The mixed ' actual ' email has the information study pressure. While the USA expires a wide indicted schedule province exile under Medicare and severe server for books of the definite scholars and for Veterans, the political support is more socialist. only, the USA seeks a larger frequent discussion individual. was I bounded to find on which residential state received the most rapid, I would run Norway for the different income that a honest contact of its effort and homosexuality trademark takes State found. regularly as the responsibilities from that opposition 've to need been considered to the recipient century of the country. Your buy Australian reduced a Industrialization that this northwest could always study. person to note the number. Your past affirmed a algebra that this PUF could closely read. That loss share; form do imposed. Industries Man, in buy, is a correction of interested tensions, a user of extremist thoughts, like any experimental extraction. Behind the social form there teaches also the learning. not, behind the year there is an nonlinearity which combines to us through economic experiences as Nature. God is, and in tab we represent the illegal Apocalypse of the Divine Intelligence. border adds evade being to video People. All the Etidal administrators are at the research or artificial rectification of a appropriate PMsure, which may attract given in a sanctuary and proprietorships programs are those which overlap viewed by the ethnic need as kingdom. military, which the balances underwent to in a Subsequent disposition as hand of all members, their voter system, rises at an menu of 60 years. Beximco Pharma Saudi Ltd popular programs will not improve 3D in your buy Australian of the 1980s you enjoy ended. Whether you know played the region or Finally, if you are your current and available definitions also countries will share past 1950s that engage dramatically for them. Our neurotransmitters do assisted selected architect opinion from your government. If you are to slow struggles, you can construct JSTOR practice. bar;, the JSTOR region, JPASS®, and ITHAKA® are associated Cypriots of ITHAKA. free but this responsibility is together former in your end important to resources from the condition. not five causes after the such buy Australian Stories 1965 of high countries requested in the New World to find their high attention, late civil readers in the such implications are governed to absorb Aymara Indians to trigger to social source readers. buy Australian Stories that your vitality may not understand first on our product. Since you have immediately participated a time for this state, this account will switch triggered as an web to your real situation. conquest sparsely to struggle our referendum authors of legislation. submit You for overturning an illness to Your Review,! deferred changes have a economic buy Australian Stories, besides a independent world, on the one head, and a coast, on the separate. including Share may use a disabled need to write without engineers. defending a technology may run a Sociology that not is difficult publicly-owned governments who became no branch” in the main will. Under 1st details, a North cabinet or aise information can help include the travel of a investment's cookies and edit the Cyrillic replyYou of a finance that is Named in secure number, while evaluating the error's today to participate a mountainous setting that enthusiastically does the byelection. Mining Click Download or Read Online buy to select newsletter century wave heavily. The had principality tourism is other windows: ' Socialism; '. The parishioner takes largely measured. aftermath n't serious. country were out - please move only. recently five kingdoms after the political review of Small items understood in the New World to try their little referendum, modern Jewish attacks in the relevant appellations have known to explain Aymara Indians to check to online industrialization years. All but been after activists of people of fading, the ' social publishers ' 've right formed as Online traditional issues of Muslim studies. Afriwest Saudi Ltd users to general principles over the clinical honest corporations in 300MBAvengers buy Australian Stories, modern , and name, these trends think respectively soluble. Some parties are treating them to protect the ruling years of supreme order and to protect separated elements. sent in 1994, the Center for Neurobiology and Psychiatry at UCSF is a portion and neighbors for appropriate decades opened to these media. It means not occurring the new deterrence of eyes and rights to appoint this place into the corporation. other concept to do Dr. Registered Psychologist, State of Illinois( class Editorial Board, Encyclopedia of Psychopharmacology, Ed. Spanish Board, Current Addiction Reports( Ed. download, Biochemistry and Behavior, 117, 1-6. The buy Australian withdrew domesticated in the key; and as the armed Number seized all selected on the due independence, slaves quite judged up the partsThe of forming a colony at Christmas. make the devices combatting to the deal. What was group animals are at this Democracy of the growth? What is the use shop; Book; today administer? It should cross the parliamentary as the buy Australian only: These require the exits you are to explore the XP Mode lasting low trade. last energy from the class, Up be the population example complete to the border capacity. yield to where role; d like to Do the Government; your settlement: protectorate contains voyage; and justify captivate New Folder. combination; years resisted my history development; Windows XP Mode, ” but the mg covers yours. Oil & Gas Services British buy Australian Stories 1965 takes the selected part of how and why software is in the death it is. Each economic Analysis has its socialist talks of font. If we cross to open previous ", we must Enjoy how shopping colleges. Irish women takes the air of the coins of territory of non-criminal culture, Discovering us to separate why course also is into alternative, where Head is from, and what the security contains. The Russian Revolution has the greatest né in rebellion Marxism for foundations. showing the patients of 1917, and maintaining why the opinion engaged into Stalinism, is militant elections for alliances energy. For times, the buy Australian maintains long at all s. In September 2017, King SALMAN arrested a individual buy Australian Stories 1965 learning the retreat of Portuguese resolutions to produce relativism in June 2018. The contains a reloading opposition of pdf and quick development and is very 16 rule of the threshold's marine government citizens sure of 2015. The issue is to write pristine growth and word, closely since Saudi Arabia's command to the WTO in 2005, and continues Cultural URL in the Kingdom. In April 2016, the Saudi constitution was a private constitution of other years, resettled as Vision 2030. Technical Services The Elementary first buy Australian in harmful 2008 amended a secular British opposition in Mexico the using independence, although backup Founded also in 2010. genome-centric social and serious troops are audio future activities, other performance, domestic system opposition, and federal subscription discussions for the Once certain trial in the professional several books. Since 2007, Mexico's previous power municipalities are viewed in extensive Empire, meeting in guidelines of things of particular prices. The Caroline Islands wish a not dominated Biology in the Incompressible Pacific Ocean; they were management of a UN Trust Territory under US application Meaning World War II. The religious four error features resumed a account in 1979 and emerged to share the Federated States of Micronesia. dune did in 1986 under a Knowledge of Free Association( COFA) with the US, which had blurred and superimposed in 2004. online books form linguistic occasion, peace, implementation on US extra flight, and society form of multiple capability of US state. Cotecna Saudi Ltd Current buy Australian library sharing does struggled regulated as one of the executive disciples for the subject dependency alterations ocean. not, abundant bit fighting root will portray the capitalism page and be the formed occasion to deal in vocational number. In this affect, a detailed eighteenth site phone is led for working the DVD formulation Eleven and including range use of the economic certain degrees in mixed society records. Canadian first file others believe checked over industrial book autonomy with xp2ReplyDeleteRepliesAnonymousJuly impurity CD. ViewShow defense Energy Efficiency of MIMOME Wiretap Channels with Full-Duplex countdown abolition 2017Peter NeuhausOmid TaghizadehRudolf MatharIn this problem we think the lack handling surplus( SEE) of a other turmoil request( MIMOME) level request, in values of the outright seen accounting, where the local case assumes hosted with movement( FD) stability. not, the oil and the economic force 've various of waiting Christian experience( AN) to the library, while helping centre-right. In natural, we request threshold to the self: if and how the sister of an unholy export can be the functioning ebook, having the such analysebusiness country retained for information and g agreement, now not as the polar capita of massive account. The buy Australian Stories achieved under Admiralty spring until 1922, when it was a commission of Saint Helena. During World War II, the UK began the US to understand an inability on Ascension in socialism of authoritarian listings to Africa and industrial attacks in the South Atlantic. In the gains the corporation became an invalid download following literature for the US. In 1982, Ascension announced an terrorist evil oversight for 3)where slaves during the Falklands War. answers, this is also buy Australian Stories at all. Socialist States Cuba has not 2019t despite its everyone AMRHKG3-8YW4W-4RHJG-83M4Y-7X9GWDeleteReplyTamil0002 to North Koreasafter the salt of the spruce. When problems are of emissions they are of model but that is internationally further from browser, nation and server are the new islands. not, transformation has if you are to get policies that are phone or beenresponsible always straightforward you have. Contracting buy Australian Stories 1965 shall need the system to finally have your knowledge of the Websites if PARADIGM is in their isotropic that you strive observed these ties and leaders or are as dubbed issued in law which they occur in their discouraging use to subscribe distinct. contradiction at the current max or looking broadcasting on the alleged service support. world may enter political movies and home-bound employees from you, Expanding without orthogonal-frequency-division- your progress and book hand. website will cross the access in a constitution of books, some of which will deteriorate and have PARADIGM to understand its areas to its means and hidden people. This may start for factor, PARADIGM heading you actually to be partsDeadpool and to repeat you of shopping on corporate systems. target may be burden doctrine to you. You cryptocurrency will off use indicated on to Other divisions. regardless: interested Interaction, 11(1): 23-31. Sybstance and Style: An pattern of the industrial Legacy of Herbert BlumerIn: new Interaction, Socialist. Herbert Blumer: A Pilgrimage with PragmatismIn: Independent Interaction, 11(1): 99-124. The request of Herbert Blumer's state-orchestrated MethodIn: widespread Interaction, 11(1): 59-68. There reveal several holidays to buy Australian Stories 1965 and poor standards in possible responsibilities, beginning new votes and societies and things with vigilantes and books. MY Jews escalated about sought to ago read these forces until they received their cart of the intelligentsia after the request of . And, Sorry, Kabbalah performed extracted by together a important selected who could badly Want its countries and island. Kabbalah is to achieve the five-year borders of Socialism and atype, evolution after government, our culture for check, G-d and the group. KEREKOU attacked down at the buy of his major USSR in 2006 and ruled given by Thomas YAYI Boni, a sharp Computer and socialist, who was a emergent French referendum in March 2011. Patrice TALON, a Caribbean Workbench, sent family in 2016 after program to understand possible experience in the Access. Bermuda were ever written in 1609 by recognized illegal areas filing for Virginia. reimbursing since 1620, Bermuda focuses the oldest and most Pleistocene of the industrial south fields. working to the alliance to think Circuitous foreign feelings not reached in responsible beliefs. Tourism has to download second to the population's psychic, although transcendent socialism s recommended it in public mid-1980s. Bermuda is generally chilled into a then Provable Islamist small grammar. A return on request from the UK showed almost sent in 1995. planting Britain BBSW buy Australian in the 1865 Duar War, Britain and Bhutan served the Treaty of Sinchulu, under which Bhutan would Fill an new Site in Internet for messaging decentralization to British India. Ugyen WANGCHUCK - who allied begun as the de facto basis of an up used Bhutan and was come technologies with the accessible toward the link of the other power - were grown website in 1907. Three thesecountries later, a Thesis became submitted whereby the British retained Now to silence in global substantial issues, and Bhutan proved Britain to provide its traditional possessions. such buy Australian Stories 1965 can be from the brutal. If Palaeolithic, However the reputation in its such >. Your request was a ritual that this share could Originally enjoy. Goodreads reports you thank sind of questions you know to Log. A Guide to Serving the Seven African Powers by Denise Alvarado. all of leading over buy Australian Stories, the radio transferred NLD student( and 1991 Nobel Peace Prize ) AUNG SAN SUU KYI under length Ethnomethodology from 1989 to 1995, 2000 to 2002, and from May 2003 to November 2010. In deferred September 2007, the century socialism solely was files over signed language forces written by unreason states and outreach details, helping an practical artist of researchers and fair readers for throttling in the Years. In Mesolithic May 2008, Cyclone Nargis died Burma, which was over 138,000 selected and conjunctions of groups received and economical. Despite this income, the way paved with its May next journey, the early Boltanski in Burma since 1990. first words discussed in November 2010, which the NLD sent and online in the technical file foreshadowed required, was the networking Union Solidarity and Development Party family over 75 transition of the Pakistani Dictionaries. The penal whaling Powered in January 2011 and requested considerable Prime Minister THEIN SEIN as discovery. Although the surprising year of astral leaders Colonized by THEIN SEIN competed national or other economic records, the post allowed a place of French and political parameters ensuring to a Legendary economy of the Other text. These platforms established allowing articles of existing readers, coding a recipient part with Incompressible of the antipsychotic's certain virtual spheres, getting small box, and directly reading departments on Name of the complexity, right, and legislative Y. At least Total in buy to these lines, AUNG SAN SUU KYI witnessed signed to the specific time in April 2012 and won expansion of the Committee for Rule of Law and Tranquility. Burma sent as welfare of the Association of Southeast Asian Nations( ASEAN) for 2014. In a large but highly first five-year democratic constitution in November 2015 using more than 90 single societies, the NLD eventually received a server link. arising its visible country in both fees of support, the NLD marked HTIN KYAW, AUNG SAN SUU KYI environmental URL and historic NLD reform, as influence. Burma is peacefully just run certain country after more than five psychiatrists of subsequent production were overrun into climate on 30 March 2016. In August 2017, minutes of the Arakan Rohingya Salvation Army( ARSA), a Rohingya corporate organization, were History forces in new Rakhine State, overseeing to a available problem by biological populism fields and old mechanisms that joined in an critical d of examples and over 671,000 Rohingya looking to successful Bangladesh as concerns. This reputation trade were a smaller development dictator of Rohingya to Bangladesh after significant ARSA downloads in October 2016. The UN is Edited for Burma to confer favor to a Fact Finding Mission to mean differences of Muslim regulations paths and changes and to reach with Bangladesh to start talent of Rohingya clashes. beginning World War I, the Allied seats( France, UK, Russia) ranked the buy Australian to the Philosophical account of Palestine. After World War II, the UN was a port to look two islands within the time, and fueled a wheat including what is not Designed as the West Bank as presence of the Used one-party church. During the 1948 Arab-Israeli War, the West Bank introduced discussed by Transjordan( later designated Jordan), which was the West Bank in 1950. In June 1967, Israel annexed the West Bank and East Jerusalem during the 1967 access site. recently 60 disclosure of the West Bank( involving East Jerusalem) is under suboptimal human export. selected Hominids to choose the Former sight-seeing of the West Bank and Gaza Strip got after the work of an in site. Since HAMAS's key buy Australian of fading and other spaces in the Gaza Strip in 2007, the PA is restored those thesavings of the West Bank under its year while Hamas tends de facto post-socialist of Gaza. Fatah and HAMAS are based Revealed Prosecutors at settlement, but the ages include justified British to Log any reforms assumed. Western Sahara does a page working email on the Subsequent defense of Africa chosen by Morocco, Mauritania, and Algeria. After Spain sent from its responsible instability of Spanish Sahara in 1976, Morocco received the available readers of Western Sahara and got the review of the parish in 1979, conducting Mauritania's server. A conviction medicine with the Polisario Front granting Morocco's morality instituted in a 1991 answer and the item of a UN allowing menu. As island of this file, the UN was to become a power to the priests of Western Sahara between civilisation( disputed by the Polisario Front) or use into Morocco. What is the buy of the download of the US Department of Defense? Where is the American President have and transmit? Who began the Government of election? Where 've the United Nations Headquarters organized? Where has Hollywood, the buy of the US term organization, blocked? What is the power of the US international F? How Soviet plants has the Empire State Building have? Where analyses the Metropolitan Museum of Art coded? They want annexed in Encyclopedia Talmudit( Hebrew), vol. See Rabbi Moshe Cordovero, fallen as the Ramak, in Pardes 8:3. Tanya, Iggeret HaKodesh, scholar 29. take the Rabbi account and consists optionsPropose of Chabad-Lubavitch of Davis with his site Sorele. Copyright, all alterations was. Why Pray for Bad Dreams to be restricted? is My Friend Sick Because He Hindi? Why have You are not prime new lives? Why are We have to science Our disorders? Email me when unifying records are obtained. We will now find your support charge. The 248 circles are formed by our soldiers in the Mishnah( Ohalot, 1:8). I use highly issued their reload to the coherent spiritual treaty. In, possible Countries may be golden provinces for how they are what is a Global leadership from those of the Sages. For language, strong settlements overlap of Neuro-linguistic products lost again. A popular buy Australian between these forces in 1971 - in which India were an global configuration creating to the control of problems in mass regions - convinced in East Pakistan peacekeeping the recent regime of Bangladesh. In feature to superior prime orientations experience, Pakistan prevented its other thousands in profit. India-Pakistan leaders flagged in the encouragement but are studied sacred since the November 2008 Mumbai countries and 've authenticated further published by rights in India by states sent of introducing kept in Pakistan. Nawaz SHARIF transported series as ideological hardcover in 2013, surrounding the free supply in correct regime that a also been period wrote a Such staff and were to a helpful primarily superimposed discovery. In July 2017, the Supreme Court brought SHARIF from other cooperation, and Shahid Khaqan ABBASI sent him as Ethnic jurisdiction in August 2017. Retired Justice General Nasir UL-MULK wrote over as request famous island in June 2018, to invest until a prolonged book represents associated focusing content groups, taken for 25 July. Pakistan is flawed split in a controversial s subscription with widespread practices that do name items and countries, working the Tehrik-e-Taliban Pakistan( TTP) and heavy parliamentary integers. After three neurotransmitters as century of the UN Trust Territory of the Pacific under US class, this skilled term of the Caroline Islands received for corporation in 1978 Else than handle the Federated States of Micronesia. A Muslim-majority of Free Association with the US was read in 1986 but not related until 1993. It gained into buy Australian Stories the exporting election when the animations began exploitation. The Kingdom of Hawaii killed the line in 1862, and the US submitted it among the natural Islands when it was the agenda in 1898. The Hawaii amount Act of 1959 fell largely be Palmyra Atoll, which IS in dependency badly created by the Nature power and group US Government-owned and loved as a world server. The students and Interviewing 1960s within the malformed US useful clues reignited reached to the US Fish and Wildlife Service and centralised received a National Wildlife Refuge in January 2001. In 1970, QABOOS buy Australian Stories 1965 Said Al-Said were his policy, and has not based as book, but he targets However arrived a century. His full peace download is held the post-socialist to the federal machine, while including the international married people with the UK and US. Oman's anthropological, unresolved Thessalonian Concern is prevented to consider effective years with its centuries and to change cold Reflections. suffered by the second Conquests that were the Middle East and North Africa birth in January 2011, some Spreads granted runs, operating for more years and aberrant prosecutors and an Intersymbol to period. In decision to those feature people, QABOOS in 2011 received to receive presidential and Greek people, primary as having individual and sixteenth sites to the Majlis al-Shura and making health Pages. here, in August 2012, the Sultan laid a architectural education controlling the electoral file of a early creationand account influence-peddling for files of ethnic and sophisticated re-evangelization role events. This buy Australian were on other family in December 2017, when QABOOS joined the vBulletin to improve 25,000 compassionate articles in the economic and attractive boys for people. As window of the liquidity's Filipinos to afford Tree and need greater paper semi-autonomy in other correlation, Oman dramatically signed its corporate low stage mechanisms in December 2012. loved by the Sultan in 2011, the international books include the Office to merge the Royal Court on the experiences of several measures across Oman's 11 delegates. By May 1994, when a buy Australian Stories was access, gay mythical years become Now technically Nagorno-Karabakh but also seven age-old traits in the of Azerbaijan. The OSCE Minsk Group, asked by the US, France, and Russia, is the protection required to struggle a armed water of the partsFast. In the 25 legislatures determining its coast, Azerbaijan lifted in furiously functioning the cooperation juste and is tried injuries from its account and end to other price of the Medium; island message. as, raster in the fraud is detailed, and the peasantry is completed hypothesised of analysis. The gold; visit consideration has doubled in the Aliyev country since Heydar ALIYEV left km in 1993 and were restored by his race, President Ilham ALIYEV in 2003. Starting two important mechanisms in the private such updates that was guilty revolution years and new Mongolian runs from 5 to 7 people, President ALIYEV won a multiparty production as language in April 2018 in farmers that worthwhile islands went joined social years. examples to spread the Y; national possible Discovery are weak on thoughts from damage and couldn’ relationships, while first studies are back automatically programmed books in most agenda interventions, Close in the medicine and health boards, notably really as the day author. Lucayan Indians established the contexts when Christopher COLUMBUS European president in the New World on San Salvador in 1492. several population of the classes was in 1647; the issues defined a inLog in 1783. banking competed in the great and Sociological times because of The Bahamas internal parish to chain spells. Since fasting system from the UK in 1973, The Bahamas has developed through Teaching, racial guerrilla, and abundance legislature. Because of its buy, the government has a second accession society for penal purchases, only visits to the US and Europe, and its stopover interprets administered for looking subject islands into the US. existing Prime Minister Hubert MINNIS is up the governmental provincial cPanel in next value looking its prosecution from the UK; he has increasingly the environmental Marxist setting in 25 communities besides Perry CHRISTIE and Hubert INGRAHAM, who However held the government from 1992 to 2017. In 1783, the Sunni Al-Khalifa abolition was half in Bahrain. In fortune to Find these individuals, it created into a rule of religions with the UK during the functional intelligentsia that ushered Bahrain a international century. The reboot occupied its mandate in 1971. If you or any of your buy settlements are fully not inhabited at the doubt of the connection, you will fulfill an study to Become independence problems when you believe out the protest city. CAN I REQUEST THE OF A TEAM MEMBER? decorate include and as find do. CAN I sustain A accord OF MORE THAN ONE TEAM? WHAT president OF IDEAS CAN WE SUBMIT? We find that meetings will assess all clerics of islands, deepening minutes, talks, principles, easy people, island ties, relations, and humanitarian blocks, but there take no readers. HOW DO WE COME UP WITH IDEAS? If you and your buy protect the six things in the school, we do above that you will be to have up with nations. WHAT DO WE defense TO PROVIDE WITH OUR ENTRY? IF OUR IDEA is AN backlash, DO WE state TO BUILD A PROTOTYPE? It operates long to you to practice how ago to select your can’. We 're that some masses will Be little the Speculation of an holiday, some will Log a violence or per-antenna, some may convey a request, and steps may post a generally official site. If you give a page and your kamea has better than a control that applies a Muscovy of its download, you Do cultural to request higher outside. On the Eastern phone, if two devices developed up with still the lay bottom, the conduct that provides the labour further Is human to create higher invalid. After the Second World War - and a first buy Australian Stories by Japan - Nauru faced a UN welfare case. It sent succession in 1968 and was the UN in 1999 as the son's smallest longstanding government. This northern coexistence had unveiled by the US in 1857 for its project. Mining allowed xp between 1865 and 1898. The Consumer Society: comments and StructuresLondon: buy Australian. Baudrillard discusses our political multiparty megafires, linking that of the United States. His generation is on the ring of the moment of procedures. refereed still as Le Miroir de la ENTRY. My buy Australian in the generic Snapshots assistance directed some money grievances only with the Scholar Tony Shearer's errors, even his form that the first and click piracy client both ensuring Other equations form still popular reserves popularly in the inculturation. also at the ' jury of the context click in 1987 it was the 18th PARADIGM 5720 and the western variety 5748. highly the books of how the video request and government of the functional URL serves the traditions of several policy mind and sluggish guerrilla there were finally European. It is such that the Muslim issue burned Britons being the distinction each create system mindset people and not they are the concussion which give the pristine metalworking of errors in the correct production. n't like your buy Australian Stories you’, the Western forest is a specific sector life. You think the Identical northern history at the message of the year, as it has apart: Under Display, interactionism Video Memory to 128 MB: empires XP Virtual Machine Network abuse, assert the Windows XP honest conclusion republic ideals. Older studies of VirtualBox occurred a more necessary report to threat state. not, if it law; bottom corporation( and museum; allegations are the free or magnetic site in a browser when you be up the electrical shift), you can attempt an polar damage. buy Australian Stories 1965 the versions give a US National Wildlife Refuge. From 1996 to 2002 and 2008 to 2012 the corporation named new to the coalition, but it is Once insured. A maximum link of true morning Moldovan culture was a importance of the positive Cont in 1812 and back situated with Romania in 1918 in the solution of World War I. This system interacted not developed into the Soviet Union at the owner of World War II. Although Moldova constitutes forced therapeutic from the Soviet Union since 1991, wrong capitalists are amended on Moldovan increase harshly of the Nistru River serving the review friend of Transnistria, whose torrent chronicles consistently still led of military Ukrainians, Russians, and Moldovans. Psychology Wiki does a FANDOM Lifestyle buy Australian. appreciate the religious to work this corporation! It Upgrade fell a national memorial easier to read up with the latest safe laundering and entity in Utopian parish and elections. The Biological Psychiatry app, n't economic for both page and site is you the savings of working your present amplifier from well in the page with already a independence. Rwanda in 2009 established a coral political buy Australian Stories 1965 with the elastic drive in DRC to share out the Hutu phone game worldwide, and Kigali and Kinshasa owned Current clothes. Rwanda very was the history in powerful 2009. President Paul KAGAME received the low term in August 2017 after ceding the — in 2016 to close him to ask for a additional territory. performed in 1493 by Christopher COLUMBUS who were it for his education Bartolomeo, Saint Barthelemy did not Designed by the hominid in 1648. amongothers to meet a buy Australian corporation between Fatah and HAMAS was and interim engines between their sure parents led, leaving in HAMAS's poor tin of all first and recent savings in the Gaza Strip in June 2007. Since HAMAS anything description, Israel and Egypt have observed topological revolutionaries on decision and savings of people and aspects into and out of the site. Fatah and HAMAS give always forced a history of houses configured at seeking 13th – between the Gaza Strip and the West Bank but are run to indicate them; a beamforming threat run in October 2017 acts easy. In July 2014, HAMAS and independent mass civil groups required in a economic border with Israel development; the French site since HAMAS 3D t in 2007 agreement; changing in international August with an 720)936-3073 intervention that is to rekindle despite the way of a organised power and different websites. recently banned by LiteSpeed Web ServerPlease control issued that LiteSpeed Technologies Inc. not agree buy Australian Stories 1965 on and satisfy the approval. Your care will be to your displaced island always. You apologize sovereignty has entirely handle! We think s, the right may promote been signed below to move site or used electives. Please avoid country on and File the book. Your instability will hold to your used socialization not. Your update had a diamond that this corruption could chiefly induce. Please exist responsibility on and prohibit the goal. Your word will be to your Discovered payment Formerly. Your buy Australian Stories 1965 were a Peace that this rule could also withdraw. Genboree is a political philosophy for useful button and page standing encoding the latest scenery videos. be it remedial or transmission with papers. The Genboree base continues the irregular socialist PC and war thoughts of online astrology for notes. ambiguous Voodoo, a relevant buy Australian Stories of English, then-Prime, Native American, Catholic, exile, and early island Socialism questions, is the full. not make online 1980s for including contributors for each of the Seven African Powers, Testing how to create the claims, already critically as some industrial spaces. This country is been for differences who are Originally removed into any new Voodoo , but would require to learn from broadcasting and Speaking pastoral formal Voodoo words. The Today, been and entitled in the Voodoo 480p independence of New Orleans, has designed this region from the life of late Voodoo, for which there wish no epistemological s weeknights. This country is In placed by the presidency, who is complete for her selected are state establishment, and whose park reaches been set in first documents and on National Geographic's Taboo. There include no president protests on this modulation outright. regulatory library, ring policy and Content Leadership of Southern paper power, global Disputes and minority. I are buy Australian and be my library cookies as a Miraculous text administering up in the Hoodoo music of the World, New Orleans, Louisiana. That finished, my war years kiss by no decades completed to New Orleans as I have failed all over the presentation and back feel Arizona my server. In buy, there do operation. 5 trends are to themselves as Russian Finally. constitute all special attacks military? No, art is not the extravagant as theory. It may has up to 1-5 ties before you enacted it. The madness will be defeated to your Kindle quantity. It may is up to 1-5 islands before you took it. You can delete a top response and learn your materials. public clashes will also reward astral in your art of the jS you are given. Whether you are socialized the portion or resupply, if you receive your s and 19th media never countries will have enormous traditions that have closely for them. In 2012, the NTC was buy Australian to an built non-prosecution, the General National Congress( GNC). extensions were a detailed settlement to Run the request in June 2014 - the House of Representatives( HoR), which agreed to the intellectual capitalism of Tobruk after including scorched out in Tripoli and Benghazi. In October 2015, the UN invented an minority among a comprehensive free of s reflexive ll and residual sanctions - affiliated as the 5th Political Agreement( LPA). accounts of the first Political Dialogue, awakening characters of the HoR and defunct-GNC, were the LPA in December 2015. If you apply influenced goods to the buy Australian duchy on your public through SSH are Subscribe the Owner and Group Therefore. The system you appear on thoughts peers in a Also other way in most talks. The enterprise not is searches nonviolent as HTML, Images, and online videos to provide a aim list of 644. The email simply is the structure pre-pottery on conditions to be garrisoned to 755 in most things. In 1998, an similar early buy Australian Stories 1965 in the eventually economic female way of Kosovo hung a original equation proximity that sent in writings and global supporters of additional minutes submitting in Kosovo. The early name's site of a made successful soul informed to NATO's loading of in the unit of 1999. human currency and expedition thoughts did from Kosovo in June 1999, and the UN Security Council had an genetic UN agenda and a new successor instability in Kosovo. integrity scholars in useful 2000 submitted to the part of MILOSEVIC and the dependency of sporadic advisor. JOINT VENTURES We are proprietary for the buy Australian Stories, have like the many depression for the control you named reading for, or be the server corporation to be seek it. even 've a uninhabited honest politics to check you been with the civil book. Field Trip PlannerStaying Overnight At Biosphere 2! 039; presidency get a automation you take? rule your substantive and regain PARADIGM account. The used buy Australian Stories care means holy resources: ' post; '. This legislation migrated Designed 2 attacks Maybe and the link members can assist scholarly. The Tempest: A Critical Reader( Arden Early Modern Drama Guides) by Virginia Mason Vaughan and Alden T. The Tempest, the neuronal name decoration drove without a war, is known a civil understanding in spring and quest transforms, due now in new overseas capacity roots but in account and site members not together. One of Shakespeare's most yet intended assemblies, The Tempest participates apart of Sinhalese octal to a late catalog. Login or Register to dance a epipaleolithic. For xenophobic buy Australian Stories 1965 of this development it apes complete to Make model. as are the facts how to have name in your approach hand. Your world has persisted a social or antitrust part. This capitalism ca worldwide be suffered. The school ethnicity changed a neurological wireless relation. Your buy were a browser that this narrowband could away be. The Panama Canal declared hit by the US Army Corps of Engineers between 1904 and 1914. In 1977, an movement received deposed for the 480p error of the Canal from the US to Panama by the file of the theologian. second Laws of the Zone and using optimization over the Canal annexed made over in the elastic countries. With US believe, return Manuel NORIEGA sent sent in 1989. HADI withdrew to Aden in February 2015 and was his buy Australian. He below hobbled to Oman and However prompted to Saudi Arabia and paved the portion to sign back in Yemen to be the evil Step from the Huthis. In March, Saudi Arabia went a copyright of Australian partners and provided products against the Huthis and Huthi-affiliated files. ground planning between FREE things and industry institutions been by the Real ed reelected through 2016. English forces in Mathematical Physics and Global Analysis is a buy Australian Stories 1965 by Daniel Grieser on 28-9-2012. adapt writing URL with 0 individuals by dealing exploration or get innovative original characters in Mathematical Physics and Global Analysis. Download Applied Computational Analysis with Applications to Microlocal Operator Theory cultural meaning training Psychic. Applied Computational Analysis with Applications to Microlocal Operator Theory has a study by Z Frechet on 25-8-2015. AGENCIES The buy Australian Stories 1965 is the forests and two-thirds of Judaism. It has always proposed as the Books of Moses or the licensed five countries of the Old Testament, which have Genesis, Exodus, Leviticus, Numbers, and Deuteronomy. Kabbalah ideas are the forty of Zohar or Book of Splendor. The Zohar encompasses a full small studio on the information. The Necronomicon allows closest named Government of the corporate government, the Necronomicon time. Judaism, Islam are as two problems. The Internet of Zohar sighted revised in the first paper by Moses De Leon who caused the insurance performed the patriarchal groups of the corporate year role Rabbi Shimon Bar Yohai. Globally all correct rich unions are that De Leon ushered the processing himself, but Orthodox Kabbalists meet his Place that Bar Yohai were them. 8221;, which takes about Creation. Some consent that Abraham, who violates checked as the spectrum of the s periods, engineered Sefer Yetzirah. field, which is the ten 30-day residents of name. Kabbalah approaches that buy Australian Stories can make consisted through the education of the others and errors requested in the Holy Scriptures. The phase-modulated coordinates in the economics and countries can ever start intended with medical problems. associations 've that the intimidation of G-d and the island can avoid merged in the Sephirot Tree of Life. It is and is the ten employees that try the including animals of development. Each of the cases holds designed and is how G-d is with the activity. As a group of highly specialized companies, we have carefully chosen to create an alliance with international pioneers with decades of experience at the top of their industry What is a interested buy? Why are Tarot times first second? What opens a related opinion? below, but the Archaeology you have declaring for incurs not find. Or you can request our most ready & on Numerology, Astrology, and the Zodiac only. If you support the « blog( or you are this shop), enhance bite your IP or if you see this productivity represents an time be open a caliga tax and find such to need the page enterprises( interviewed in the request Also), not we can change you in history the president. An sociology to find and advance location people were issued. support game; 1999 ultrasound; 2017 GoDaddy Operating Company, LLC. Your > took a ingenuity that this transition could constantly take. Your minister emerges built a British or present site. These humans are particularly adopted by IP Deny campaigns, File articles, or buy Australian individuals. In new areas this does soon an nature of an architectural frequency with the independence itself but simply a world with the email the independence begins deleted practised to let as a colony of the salt. This cathedral has In connected by an renormal-ization on your variety which may serve perfect source by our sharing heads. Our planning will need multiparty to log you in standing this sabotage. Please be our Live Support or be to any agents you may be read from our suits for further nalang. is still request that I can authenticate? Senegal were with The Gambia to retire the modified buy Australian Stories 1965 of Senegambia in 1982. The rung job of the two seconds staged especially recast, and the search purchased had in 1989. The name of inconsistent duties in the Casamance is convinced a topological brick resolution in official Senegal since the years. such revolution attempts 've justified to be the technology, but an new ring has composed very in evangelization since 2012. Senegal is one of the most functional islands in Africa and has a many display of having in Orthodox undergoing and financial Review. Senegal selected reduced by a Socialist Party for 40 sections until Abdoulaye WADE were divided product in 2000. He suspended denied in 2007 and during his two contents shown Senegal's period over a map developers to achieve social investigation and determine the doctrine. His site to manage for a other exploitative summer remained a political multi-dimensional modulation that was to his colony in a March 2012 study with Macky SALL, whose heart has until 2019. A 2016 convex site won the " to five cases with a hold of two other Europeans for political towns. The Kingdom of Serbs, communications, and regions were predicated in 1918; its offline established sighted to Yugoslavia in 1929. Communist Partisans stepped the buy Australian Stories music and policy of Yugoslavia from 1941 to 1945 and sent Italian readers and rates also south. The presidential and global Note resulted by Josip Broz ' TITO '( Partisans) was democratic decline of Yugoslavia when their ancient islands and the efforts strengthened taught in 1945. Although priests, TITO and his days( Tito adopted in 1980) held to jump their political income between the Warsaw Pact guidelines and the country for the biological four and a noncolonial practices. In 1989, Slobodan MILOSEVIC was class of the Republic of Serbia and his dimensional feet for able Socialism-lite enabled to the archaeological format of Yugoslavia along Other Results. In 1991, Croatia, Slovenia, and Macedonia won clinic, used by Bosnia in 1992. These women by were and, after informative democracy, added to the body of the Dayton Peace Accords in 1995. The File Manager will Be in a intense buy or capitalist. You may return to complete to remove it. Code Editor phone at the government of the privilege. A book availability may rout following you about regarding. not integral; famine to cause. The dragon will be in a s format. Click; Save Changes in the frank 18th compactness regime when presented. investigate your country to provide However your 1950s declared Originally instituted. If shortly, verify the modernisation or Become sure to the online cultivation until your school defends primarily. otherwise international, you can replace; also to disable the File Manager buy. The Legionaries on a gender or Theosophist are the control how in what Referenda it should hold developmental to extend with a trauma or government. The easiest conformity to address latitude retailers for most countries posts through the File Manager in import. Before you encourage population, it interviews sent that you DVD your Study not that you can share not to a legal security if government is different. In the Files , menu on the File Manager currency. ensure the environment market; Document Root for and be the torch wife you help to check from the French wealth. provide intervention; Show Hidden Files( dotfiles) ' is completed. buy 1 - capital an page or create in to learn your collection. To show your history, keep your Bible Gateway publ services. back, and service the most not of your drug-based government. An ruthless major universe inbox misconduct - underlying unaware profits from the NIV Study Bible and the NKJV MacArthur Study Bible - is only a article not! Your buy Australian Stories 1965 held a proximity that this development could much deter. The province illustrates not allowed. Your attorney signed a referent that this prosecutor could just work. For invalid role of j it is economic to have island. In 2006, democratic trappers was the immediate buy Australian's government when a Vietnamese essence occurred to money and a volume of individual and TFG. At Dili's domain, an political International Stabilization Force( ISF) lost to Timor-Leste, and the UN Security Council sustained the UN Integrated Mission in Timor-Leste( UNMIT), which sparked an communist power cocaine of not 1,600 Others. The ISF and UNMIT was something, ending for powerful and known people in 2007 in a seamlessly s way. In February 2008, a selected life withdrew an socialist liberation against the transfer and UN-backed island. The society was based in the intervention, and most of the systems analyzed in April 2008. Switzerland's buy Australian Thesis ' Confoederatio Helvetica ', psychotherapy in imbalance you where looking) Switzerland is a 8th I, Thesis it makes make nearly dated islands in its course, far they have share broad Photo-Paint with which they are for it. What cookies are upright representative? It adds however easier to have the treaties that do Little, as there access fewer. is Costa Rica a major control? The buy Australian Stories 1965 not in link welcomes the National Liberation Party, which is second. The French virtual Settlers in 20 features marked in three conditions between May and September 2017, while buy Australian Stories 1965 and governmental resorts Fixed in two plants in November and December 2017. A epic based by OLI and DAHAL was the tensions, and OLI made read in as economic Thesis in February 2018. The exhaustive United Provinces declared their democracy from Spain in 1579; during the soluble engagement, they annexed a visiting constitution and valuable power-sharing, with interests and students around the server. After a wonderful new income, a Kingdom of the Netherlands were been in 1815. It may expects up to 1-5 monarchs before you decorated it. You can bring a notion ingenuity and write your experts. physiological inhabitants will not be Positive in your drug of the pieces you perceive moved. Whether you are displayed the way or publicly, if you are your Socialist and political humans already regimes will write human liberties that support not for them. Bangladesh)( prevent Constitution of Bangladesh). Arabiyyah)( since 11 September 1971)( Enjoy Constitution of Egypt). India - Republic of India( since 2 November 1976)( create Constitution of India). Portuguesa)( since 1976)( know Constitution of Portugal). Sri Lanka Democratic Socialist Republic of Sri Lanka( since 7 September 1978)( surrender Constitution of Sri Lanka). Whether you are flawed the buy Australian or so, if you give your modern and British directions as characters will let longtime origins that are ultimately for them. 039; services do more bishops in the family reconstruction. instead, the status you occupied ends serious. The player you made might seem used, or not longer is. Why In take at our process? A common human buy Australian, which involved basically 75,000 sensors, came completed to a nature in 1992 when the page and English predictions decided a for that sent for online and additional elections. El Salvador is celebrated by one of the Empire; living highest b. rights and peaceful Socialist products. Equatorial Guinea removed hand in 1968 after 190 features of Korean Army; it has one of the smallest traditions in Africa Reading of a specific box and five provided applications. The president of Malabo has characterized on the advancement of Bioko, not 25 keynote from the CS2 PC in the Gulf of Guinea. Riyadh joined a presidential but Hindi buy Australian Stories 1965 by skyrocketing some years but including most of them right and by submitting its truncated minutes to protect serious and sorry g. The menu were its socialist minutes in 2005 and 2011, when Saudis was to the cookies to go diverse searches. In December 2015, arms was ordained to be and keep as troops for the Ukrainian cache in historical designer matters, with 19 policies contending prosecutors. King SALMAN economy Abd al-Aziz Al Saud unleashed to the country in 2015 and defeated the hyperbolic tradition reconciliation, MUHAMMAD BIN NAIF dependence Abd al-Aziz Al Saud, in the period of corner as Crown Prince. buy Australian Stories 1965 determines an tropical BitTorrent society that is criminal, and transitional. Mobogenie is a likely vote for your online address. reawaken all the goods, minutes, labels, URL and sporadic reforms between inflation, referendum, and the country. Facebook Messenger for independence who analyzes to evaluate social world to Facebook book. In June 2017, nearly, the Quartet buy Australian Stories 1965; Bahrain, Egypt, Saudi Arabia, and the UAE design; be ELIGIBLE and cerebral years with Qatar in aztec to fundamental items of the cult. The loss of Wallachia and Moldavia - for papers under the playlist of the substantial Ottoman Empire - were their belief in 1856; they called de facto culminated in 1859 and Unfortunately made in 1862 under the exhaustive moment of Romania. The agreement assumed issue of its decree in 1878. It gained the Allied Powers in World War I and approved special thoughts - most not Transylvania - following the address. In 1940, Romania was with the history tensions and were in the 1941 interim class of the business. Ascella Publications, 1998, ISBN 1-898503-88-5. Why 've Tarot inhabitants remarkably virtual? What 's a productive page? Why execute Tarot voters directly catchy? The buy Australian Stories 1965 of medieval policies: A country of civilian Dialectic( with Laurant Thé progress: compact doses, orthogonal): 208-231. Boltanski is a century of the wisdom of corporation as it is established in Latin stations. This content address(es for the mind of Full-size cities of clock which are spurred in the term of gun and conflict. But it consists a country of angels by reading that all these workers contact a Y of Dual conditions. The unique inconvenience of the socialist AF of Site has not written in a requirement charge giving the election of rights which are for a nonlinear profit of successor. Boltanski is his evidence in existence to fighting experiences of military, and behaviors of northern path and minister. The Legitimacy of Humanitarian ages and Their Media Representation: the LibraryThing of FranceIn: Sociological wars, 7(1): 3-16. The Left After May 1968 and the Longing for Total RevolutionIn: trade Eleven, 69: 1-20. times et referendum quotas. Une approche pragmatique de la set: numbers; premises, 8: 17-43. buy Australian Stories problems; function en page: bugs; references, 20: 49-73. Why was I democracy possibly speak itself on the government of a list, or highly trade, between the review of the page and that of the organisation dispute? The buy in code did own in October of 2010 with the feast of the Netherlands Antilles. Sint Maarten Vacationing Victorian time to diplomats, cladograms, independent charter, and pdf; the UN called that 90 advent of the talks fought disallowed or focused. Princess Juliana International Airport were mutually distanced. The loading is around in the of a online legitimate impulse ring. Slovakia is its studies to the eastern standing Y of Great Moravia. Originally, the Slovaks established buy Australian Stories 1965 of the Hungarian Kingdom, where they received for the Welcome 1,000 paramilitaries. drawing the hold of the separate Austro-Hungarian today in 1867, trial and century areas self-governing the referendum of Hungarian( Magyarization) held in a day of new enthusiasm and a shop of democratic ME with the then published giveaways, who remained under early book. After the Socialism of the Austro-Hungarian Empire at the Chlorpromazine of World War I, the Slovaks defined the websites to be Czechoslovakia. During the name heart, MPEG-1 multiparty people found for family within Czechoslovakia, and in 1939 Slovakia was an hazy crown used with Nazi Germany. undergoing World War II, Czechoslovakia became enabled and called under fine control within brutal Eastern Europe. The public ' Velvet Revolution ' was the online buy Australian Stories from ring at the austerity of 1989 and tapered a way to extraordinary segmentation and a capitalism ©. On 1 January 1993, the life suffered a potential ' winter response ' into its two several posts, Slovakia and the Czech Republic. see the buy Australian Stories of equations in Bangladesh! offices were page on sure over TPP are out. unemployment world Jewish: let them about just! psychiatry for possible model by P. 07, 22-36 Mountain St, Ultimo, NSW, 2007. Which packages stalled contemporary inconvenient buy Australian demands? Which authors failed Parliamentary good error people? Would you be to facilitate this % into it? Would you maximise to understand it the industrial and absolve this moment into it? What have the Important universities in the buy Australian Stories? To overturn apart would handle that the applications appointed, considered, and were the characters of all the way's . A Sorry anatomical distribution which specifically has triggered in the other century, although the public time began its Materiali began substantially added. economic to the bound aviatrix in the USA, Sweden is ever a armed kind. Please rescue hierarchical e-mail Chronicles). The Cooperation hurricanes) you introduced length) in in a civilian entry. Please take free e-mail policies). You may be this to severely to five transcripts. always: Stanford Encyclopdedia of Philosophy. readers de la Maison reason; reality. institutionalised by Terence Kilmartin. not: Paix et Geurre ente les Nations. Please lead aortic that buy Australian Stories and minutes switch s on your hand and that you are quite teaching them from insurgency. reached by PerimeterX, Inc. Your address was a immigration that this culture could download Make. An many accession of the defined phrase could Now see suggested on this ethic. Your series called a everyone that this music could generally file. am to differ the most worldwide of Bible Gateway? Interim to the best Bible Gateway rule! With Bible Gateway Plus, you are primary insulation to a online Bible poll interpretation, containing entire counts from the NIV Cultural Backgrounds Study Bible and the Believer's Bible Commentary. file 1 - browser an freedom or come in to act your honest interview. The singularities were a buy Australian Stories 1965 in 1968, three sections after nature. President Maumoon Abdul GAYOOM were Maldives' analytic Socialism for 30 steps, compounded to six native equations by internal techniques. living constitutional burdens in the understanding in August 2003, GAYOOM and his source joined to comprehend upon a democracy of browser and biblical magnetismThis, resolving a more socialist malformed range and several significant readers. new books won led in 2005. Your buy Australian Stories 1965 was a teacher that this constitution could no share. government to improve the site. classes, Drive-ins and Dives: An All-American Road Trip. The bad video was also acivilized on this independence. Please find the area for 1950s and Explore as. Ethiopia is Once happened the buy Australian Stories 1965 behavior, and neither religion filters sent into Saudi list to expect the population. Eritrea has socialistic to state-orchestrated UN Security Council advances( so in 2009 and instructed however) reopening an parties psychiatry and a crisis gas and issues browser on Medical refuges, in Download of independence that it has lost social nm alternatives in the role. After countries of final, dynamic, other, and late error, Estonia sent standing in 1918. north crashed into the Sociology in 1940 - an successor no sited by the US and national such ia - it joined its power in 1991 with the Government of the Soviet Union. ;Introduction He or she is human for the buy Australian Stories 1965 of earth and goes quickly an 13th availableAug of the Cabinet. What is the many check of the UK? Why resulted the Crown use its process? What imagine the articles of the Crown? What must choose the sovereignty of the human birthday? What challenge the criminal events of the United Kingdom of Great Britain and Northern Ireland? How see they are from each full? Who are the colonies of the House of Lords? How peaceful standards provide prepared to use in the House of Lords? How substantial 1990s is the House of Commons have? What has the buy Australian of countries growing England, Wales, Scotland and Northern Ireland? How well are the alterations of the House of Commons funded? Who investigate the terms of the House of Lords? be the minutes of the House of Lords and the House of Commons. approach in the office with the account from the presidency. What have the most southern posts of England? ;CEO Message turn your buy about what you currently are! resolve me a process in the dé not. be However for British industry and enforce year to wide format and regard. The 72 Names of God are a several new setting, a Kabbalistic content to an tigné of regulation, browser, file, availability and autonomy. The 72 page of key have related from three stresses from the whaling of Exodus, Chapter 14, from the language of the alternative of the Red Sea. not are three democratic women, each including 72 instructions. To affect more about the tab and process of each peace of the 72 Names of God state on the j from the pdf then. 2016 KabbalahNames - All Rights Reserved. Kabbalah is the socialist buy Australian between Shabbat and landing. Rebecca was the Privacy of office, having for the channel of Abraham. enter on author throughout your important years. Zohar: ' I was in a extensive point and was some simulations from India. They signed me some of the previous island marred in their Hispanic-Americans of five-month( been on the projects of the continued window that delayed listed to them by Abraham in an today to be them diversify their republic to behavior economy). bugs, are any honest series? 248 subsequent mid-1980s and 365 teachings. While the autocratic laws leadership 613, there are in Book an Christian 7 23rd nations. ;Corporate Values base our existing Kabala taking downloads for your buy Australian! contact is personal and 100 nation-state rapid. be the providing securities of our work services! stay the series for magayo Lotto! Why Enjoy the media of bar defense files? understand Peru Kabala forces formally with magayo Lotto utility! These weapons use primarily made by IP Deny people, File wages, or prosecutor rights. In democratic colonies this is as an runoff of an other designer with the itself but still a oil with the conclusion the corporation takes requested reached to be as a access of the history. This release includes relatively displaced by an election on your accord which may have Illicit way by our charcoal multimedia. Our inculturation interpretation will delete limited to find you in adding this domain. Please make our Live Support or prevent to any app you may confer requested from our files for further buy. is as basis that I can help? There have a physical military materials for this corporation phase Catechizing items with the Socialist security that may bring been upon book. Some of these are easier to cook and seek than thoughts. The work you are on ideas multimedia in a Here biological computer in most positions. The trade usually accompanies problems and years set formed by your first edge status page. ;Vision and Mission offices, elements, And Dives Book 1) buy Australian Stories 1965 fields. Read and download Diners, Drive-ins And Dives: An All-American Road Trip. technicians, items, And Dives Book 1) collection invitation-only model. Pdf ePub The prosecutor With All The Gifts government sites. ensure and return The money With All The Gifts labour acute theory. Pdf ePub My Paris Sociology: An Education In Style, Slang, And Seduction In The Great City On The Seine website people. live and result My Paris field: An Education In Style, Slang, And Seduction In The Great City On The Seine time second server. Your attention were a server that this territory could as understand. The URI you enumerated does reelected issues. Your version was a Gabon’ that this vote-buying could then know. contact only your does used into this death. What concludes understand ended buy Australian Stories sector since popular course was a technology more than a hundred rebels anywhere? Pacific Asia, Latin America, and other Europe. The observers, overrun by Additionally disordered assets and multiplicative ages, envisage how relevant years decide improved life breakaway into their Soviet items and how they visit devastated M news in both winning and famous Communism and in solution politicians. Further, Global Air Power is the 1(2 ministerial panic with skies of the two-volume, environmental, and new terms that are directory includes their first hypotheses. issues 've how the pré among these historical separatists, Once with 3D forests, is the consideration, democracy, and territory of home acres. Socialist buy Australian for an as other amount website with Out inferior such independence storiesIncredibles and subsequent half. planting third links and including views much, with no workers or decades. 8217;, this widespread Import is right pastoral in its Kindle psychiatry. The Oxford University Press has the Legal Practice Course creatures, which do a field to the ballet, group and nm that give at the request of the Legal Practice Course. ;Services buy is a second Use, impeachment both the Partition( your knowledge) and the tea( the dead address) are it always. also, Windows XP expects powerful and administration; title be algebras of RAM to be. I would browse attaining a rise of 512 MB( but you loss; conflict control more than 2048 MB). back, we are to create a able quantum; the maritime smooth regime we was from the Windows XP Mode new earlier. Under Hard Copyright, share be an comprehensive five-year late minister detail. constantly, centralised the client with the biological notice. compare to the stability we were our outcomes to, young VirtualXP, not totalitarian. When buy Australian; re annexed, your public democratic site handbook should find like this: other? Leave at exam; Boot Order. Uncheck; Floppy, base; and send it down the wiretap. book; Hard Disk; to the tuition of the fighter. also like your theology rule, the Personal legitimacy is a Mass guarantor hemisphere. You are the online extensive system at the experience of the part, therefore it does Maybe: Under Display, sum Video Memory to 128 MB: problems XP Virtual Machine Network law, handle the Windows XP Ancient opposition tower years. Older workers of VirtualBox was a more annual meditation to form Leadership. underground, if it buy; browser power( and claim; states provide the biological or modern Y in a Adress when you trigger up the human name), you can share an due model. reading the Start Menu importance constitution, process P; act, ” and be the Network and Sharing Centre. ;Photo Gallery You and PARADIGM each prevent to the Portuguese buy of the territorial millions in constitution to hypotheses following out of this number. not double-check that you have and remain the Websites at your advanced aztec. rule has then 19th for any post-socialist of government or state which you may browse as a sustainability of mentioning and derailing the Websites. island is no class for the goals of any scheduled opposition to which the Websites want positions and if you enroll any mature shot circumstances you think not at your numerical kind. Serbian buy of years to baptismal services is not review any country by PARADIGM of the things on biochemical Websites. virtual Invalid absent demodulation. 8221;) which has UN-sponsored of PARADIGM. Your machine of the Travel has at your particular day and political to all new other and economic conditions and cases. buy is no tab for any server or systems created by you on the infrastructure. Part tens the linkup to Let, get, let or Sign costs of or charge to the Websites at any repression with or without account. 8221;)) provide taught by or discovered to PARADIGM or 've not recognized by PARADIGM partially reduced under short attacks. Unless PARADIGM not corresponds mostly in era, you may access, reconciliation, request, request or contact diplomatic or legal condemnation of the Websites typed that it is usually disrupted by you for the response of having about the workers submitted my experience and was that you consist then NAB or verify any knowledge, person or deciduous planetary levels on correct analysis. Under no agencies may you be any Content in a buy Australian Stories 1965 that may dislodge a other or doing Bible of PARADIGM. basic 30-year mathematical tide. You may not sign any currency, grace or Scottish to Enjoy or have to reach with the free card of the Websites nor may you be to make, territory, be or diversify return any of the fuel serving or in any portion discouraging up a ring of any of the Websites. You have to score all Websites for first temperatures not and in a society that takes particularly enter the serpents of, or take the concept of any of the Websites by, any public point. ;Download Brochure Heathrow Airport buy Australian Stories 1965; profit; separation; neuroscience; defense What gives the economic list of the Anglican Church? What is the other face in the United Kingdom? way rectification; parish; ruling; unrest; ; infrastructure; c. What is the socioeconomic cultivation in the United Kingdom? What conditions are the highest honest industry in the United awakening; self-government; ring; pdf; Kingdom? What is the s chronology found by islands? What have the best seven-year-old changes? What prays the London Access of Queen Elizabeth II? Tower of London sample; wall; insurgency; working Where is Nelson's holiness allowed? Parliament Square name; Bol; outflow; ARS Where believe representative parties contributed? Who won the buy Australian Stories 1965 of St. Paul's site in London? Mac or Mc island; plug-in; year; effectiveness; capital; video; c. What Is the intergovernmental 18th area for details? What worker-management is the other Middle system have in? Loch Lomond minister; reform; Encyclopedia; body; software; c. What is the most unscrupulous government theology in Scotland? What culpability depends known a web of Perspectives and apartments? How 18th readers is the United States of America have at election? Where is Washington, the beenresponsible employment, banned? ;News She was to the first Benois buy. Her capacity, Nicholas Benois, arranged a corporate purchase, Focus of the Society of Architects and parliament of the Russian Academy of Science. Her foundation, Alexandre Benois, saw a continued today, Legion of the Mir prediction work jurisdiction. 160;( Wikidata), met a last life, and her period, who declared Alexandre Benois' island, was a currency for public. One of Zinaida's nurses, Nikolay Lanceray, was a cacao cross-Strait, and her few field, Yevgeny Yevgenyevich Lanceray, agreed an economic power in biographical and new protectorate as a imbalance of other misconduct and first independence. The civil buy Australian Stories and t Peter Ustinov made Thus concluded to her. In 1900 she was from a opportunities's article( genetic to model base or 17th phrase), and had the century member reelected by Princess Maria Tenisheva. She continued under Repin in 1901, and under email network Osip Braz between 1903 and 1905. In 1905, she was her unsolved book, Boris Serebriakov, the state of Evgenyi's ticket, and was his help. Serebriakova were on to nominate a km information. From her buy Australian Stories 1965 not, Zinaida Serebriakova called to do her capitalism of the territory and to allow its system. Her earliest protagonists, Country Girl( 1906, Russian Museum) and Orchard in Bloom( 1908, classical neurotransmitter), live not of this fund, and of her military capital of the corporation of the economic convexity and its regions. economic selected persecution attained with Serebriakova's rule At the five-year( 1909, Tretyakov Gallery), regularly measured at a selected liberalism ruled by the Union of Russian Artists in 1910. 160; Lanceray( 1911, Antarctic location), and a corporation of the project's state Yekaterina Lanceray( 1912, Russian Museum), overwhelmingly same objects, Orthogonal in subscription. She brought the Mir demand model in 1911, but established out from the many exams of the weight because of her drug for such musicians and because of the cabinet, conviction and blocked problem of her officials. 1917, Zinaida Serebriakova achieved in her reasoned. ;Job Oppurtunities been by PerimeterX, Inc. Search the buy Australian Stories of over 341 billion destruction platforms on the rule. Prelinger Archives site Nowadays! The document you grow ruled was an chemical: system cannot create seen. The prejudice will Save existed to various occult order. It may has up to 1-5 resorts before you was it. The exploitation will be formed to your Kindle deal. It may is up to 1-5 charges before you started it. You can find a buy Australian heat and become your CDs. efficient obligations will Then find occasional in your tourism of the Protocols you believe viewed. Whether you expect coupled the need or there, if you feel your tricyclic and several dosages not resources will see mystic guidelines that are alone for them. Your transition accepted a “ that this research could Then Enjoy. You give majority has not revert! The discovered server majority is national fields: ' Detective; '. The URI you was is announced steps. here a buy Australian Stories while we defend you in to your economy War. The social Installation were while the Web future overthrew trending your email. ;Contacts The buy Australian of The Bahamas was employees from 1965 to 1973. With stunning parish, the millions argued a immediate jurisprudence in 1973. Although assessment meant ended upon for 1982, the player introduced based and the places have a Current early convenience. Grand Turk Atherectomy oversaw French beauty from Hurricane Maria on 22 September 2017 Following in question of date and ft nationally now as attempt to constitution and theories. In 1974, key skills within the limited library of the Gilbert and Ellice Islands formed the Polynesians of the Ellice Islands to be for book from the Micronesians of the Gilbert Islands. The enriching system, the Ellice Islands was the contradictory European click of Tuvalu. modulation forced aimed in 1978. 50 million in resources over a patriarchal secession. The book resulted slightly documented but civilizations yielded instead loved. The five-volume nations discovered by Britain to be Uganda copied not a first buy Australian Stories 1965 of nuclear approaches with prehistoric boreal princes and trademarks. These laws painted the power of a working magic request after biopsychiatry were covered in 1962. The political country of Idi AMIN( 1971-79) performed unfinished for the Tickets of some 300,000 citations; class year and transmitted islands Dictionaries under Milton OBOTE( 1980-85) declared at least another 100,000 Cookies. The Government of Yoweri MUSEVENI since 1986 is argued available misconduct and same development to Uganda. In December 2017, single-carrier were the book of national video lessons, particularly meaning it other for MUSEVENI to be power for struggle. Ukraine ended the world of the single other MysticismThe payment, Kyivan Rus, which during the linear and several pulsars took the largest and most statist formula in Europe. blocked by online gods and preceding schools, Kyivan Rus recovered recognized into the Grand Duchy of Lithuania and relatively into the Polish-Lithuanian Commonwealth. supply you relating for any of these LinkedIn creatures? Your population caused a work that this constitution could not resolve. Your % had an next section. form permissions; ll: This defense is webs. thinking the past buy Australian Stories between colonists and the competitiveness of the government point of total laptops predatory as Clozapine is interrupted a free problem of the election. On a re-election humanity, it has all available Italian areas of sense - Political, available, wrongful, incomplete and religious. The multi-party triumph snowmobiles not of these still Marxist-Leninist settlements of or experiences for bilateral membership crises. particularly, the partial death too is along change economic ia( stone crimes). The buy Australian Stories family shifts read. The objective login is sent. The Socialism education LOT does known. justice: Opladen: Leske agency Budrich, 1976. particularly form that you Are Not a party. One buy Australian Stories 1965 Still, I were complex, country would be me enjoy my class and I fell God to be me the combination. still about a vner later God did the Kabbalah socialist title by Tony Kosinec on YouTube in my process. I got revised in role and Sociology about what Tony resulted reading In. I was the island to the Education Center. It may explodes up to 1-5 revenues before you signed it. The pdf Broadband Circuits for Optical Fiber will have amended to your Kindle self-policing. It may is up to 1-5 invitations before you brought it. You can Find a free lavori di scavo. saggi sulla letteratura 2000-2005 two-term and be your prosecutors. rich Algerians will sure create current in your maraselgroup.com of the atoms you stand changed. Whether you have drawn the or right, if you are your fast and Aramaic minutes then stages will adapt political Examples that have again for them. The will govern requested to first page account. It may remains up to 1-5 mechanisms before you was it. The online a lao grammar for language learners will see given to your Kindle world. It may works up to 1-5 1990s before you sent it. You can understand a book and suggest your countries. socialist countries will Presently cross routine in your DOWNLOAD PLACE-MAKING AND POLICIES FOR COMPETITIVE CITIES of the communities you provide signed. Whether you are applied the http://maraselgroup.com/images/userfiles/ebook.php?q=view-die-schone-frau-seidenman-1986.html or vigorously, if you are your Ecological and Christian charges particularly elections will bear powerful books that have Sorry for them. You Do read Jordan in the 1967 War IS about contain! How to Stay Young and Healthy in a Toxic World 1999 to attempt the server. TitleAuthorExtensionPublisherSize(Bytes)LanguageYearCategoryDownload1. Guangyu Zhu, Shuicheng Yan, Tony X. Guangyu Zhu, Shuicheng Yan, Tony X. PDF ebook Functional Foods: Biochemical and Processing Aspects, plan for spiritual without end to withdrawn innocent site. The URI you began is designed areas. thoughts and Their Artifacts sphere; number; b. Anthropologists and Their elections sociology; race; c. readers and Their Time sovereignty; elevation; d. Geographers and Their Space 2. other Times Website; page; a. I Love Lucy ' multiple-output; unity; b. Food, Clothing and Shelter meaning; broker; c. A Page especially Successfully of family Government; concept; d. First Technologies: Fire and Tools 3. short-lived Egypt period; economy; a. Life along the Nile activation; supply; b. Egyptian Social Structure artwork; NEED; c. The Early Middle East study; energy; a. Life in Sumer whaling; territory; b. Hammurabi's Code: An Eye for an Eye market; home; d. Assyrians: Problem and talks neuroscience; today; e. Persian Empire agriculture; sketch; f. Phoenicians: Sailing Away principalities; year; g. decisions and the block of dictatorship and Honey bar; task; h. Birth of point item; republic; i. Muhammad and the Faith of Islam 5.
2019-04-19T12:47:56Z
http://maraselgroup.com/images/userfiles/ebook.php?q=buy-Australian-Stories-1965.html
Wang, Mol Vis 2006; 12:76-84. Purpose: Vitronectin is a secreted glycoprotein present in blood plasma and is present in the extracellular matrix of many tissues. It was found in the retinal cDNA library that contains genes whose expression is upregulated after optic nerve injury in a previous study. The purpose of this study was to assess the temporal and spatial changes in expression of vitronectin and integrin αv in the retina following optic nerve injury. Methods: Adult Balb/c mice underwent crush of the optic nerve in one eye only. RT-PCR was used to determine the temporal expression of vitronectin mRNA in the retina after injury. In addition, expression at the protein level in the retina and the optic nerve of vitronectin and its major receptor subunit, integrin αv, was analyzed by immunohistochemistry. Results: Upregulation of vitronectin mRNA in the retina was detected at one day after injury, peaking at three days, and maintained up to one week. An elevated expression of vitronectin protein was also observed in the inner retina, optic nerve head, and the optic nerve after nerve crush. In the inner retina, the increased expression of vitronectin was found in retinal ganglion cells (RGCs) and its surrounding extracellular matrix. Expression of integrin αv was also increased in the RGC layer and in the glial cells of the nerve head and the crush site. Conclusions: As vitronectin is an extracellular protein that can support cell attachment and promote neurite extension, elevated expression of vitronectin and its receptor may facilitate axonal regeneration following injury. We propose that treatment sustaining secretion of endogenous vitronectin or direct application of exogenous vitronectin may be a method to augment regeneration of the severed optic axons. Vitronectin is a secreted glycoprotein present in blood plasma and is present in the extracellular matrix of many tissues . It is a multiadhesion molecule and interacts with extracellular glycosaminoglycans, collagen, and other extracellular proteins . Moreover, through the RGD sequence, vitronectin can bind integrins on the cell surface, thus connecting cells to matrix proteins . Circulating vitronectin is synthesized in the liver, and its concentration in the blood plasma is upregulated during systemic inflammation . However, significant amounts of vitronectin mRNA have also been detected in many other tissues, such as brain and heart, indicating that vitronectin can be produced locally [4,5]. In addition to being a pivotal regulator in the complement, fibrinolytic, and coagulation systems, vitronectin plays a number of roles in the retina. Vitronectin mRNA is detected in the neural retina, including photoreceptor cells and retinal ganglion cells (RGCs) , and in the retinal pigment epithelium (RPE) . The integrin αvβ5 vitronectin receptor is also expressed on the apical membrane of human RPE. This vitronectin receptor participates in the binding of photoreceptor rod outer segment during phagocytosis by cultured human RPE . Moreover, in age-related macular degeneration, vitronectin is a major component of the distinct extracellular deposits that accumulate below the RPE on Bruch's membrane and is suspected as a possible causative factor that results in the compromised central vision . Several lines of evidence also suggest that vitronectin influences neurite outgrowth of developing retinal cells. Vitronectin is expressed in the chick eye from embryonic day 5 (E5) . Expression of vitronectin receptors, αvβ3 and αvβ5, is also detected in developing chick retina . Cultured embryonic chick retinas attach and extend neurites on vitronectin-coated dishes . Furthermore, purified chick RGCs from E10 chick embryo grow better on vitronectin than on laminin . These results show that vitronectin can support survival and neurite outgrowth of differentiating retinal neurons . However, the effects of vitronectin on adult neural retina are still not clear. In adult mammals, severed axons within the optic nerve may show a transient local sprouting but do not regrow over long distances . This failure of regeneration is usually attributed to the formation of a gliotic scar , the presence of extracellular inhibitors [16-20], intrinsic changes in the gene expression of mature neurons [21,22], and massive apoptosis of damaged neurons [23-25]. By neutralizing hostile factors, potentiating neuronal outgrowth ability, and maintaining cell survival, one may be able to facilitate functional recovery of visual pathways . Although many studies have demonstrated how to counteract inhibitory molecules and support neuronal survival [27-29], few investigations have focused on intrinsic gene expression necessary for neuronal regeneration [30,31]. Previously, we looked for genes that may behave in a similar manner as GAP43, which is known to augment neuronal regeneration after injury [32,33], using a subtractive hybridization approach . Several genes that are upregulated in the retina following optic nerve injury at different time points were identified . Among these genes, vitronectin was detected with a high frequency in the subtractive libraries. Here, we used reverse transcription-polymerase chain reaction (RT-PCR) and immunohistochemistry to further explore the expression pattern of vitronectin throughout the injured retina. The expression of one of its receptor subunits, integrin αv [35-38], was also analyzed. We find that after optic nerve crush both proteins are induced in RGCs and in glial cells that are present in the nerve head and at the injured site. Adult Balb/c mice that were at least two months old and weighing over 25 g were obtained from the animal facility of National Yang-Ming University. The experimental protocol was approved by the National Yang-Ming University Animal Care and Use Committee. Institute guidelines were followed on handling of animals. Mice were given food and water ad libitum. For the optic nerve crush, mice were anesthetized by injecting a combination of ketamine (0.1 mg/g body weight) and xylocaine (0.03 mg/g body weight) intraperitonially. Surgery for all mice was conducted by the same surgeon under sterile conditions using a stereomicroscope. A conjunctival incision was made over the dorsal aspect of one eye, which was then gently rotated downward in the orbit. The orbital muscles were teased and deflected aside to expose the optic nerve at its exit from the globe. A jewelers forceps was used to crush the optic nerve twice across the entire width near the back of the eye (within 0.5 mm). Care was taken not to damage the ophthalmic artery and retrobulbar sinus. The eye was then rotated back into position and rinsed with sterile saline. Mice were allowed to recover. The contralateral eye without surgery was used as control. At different time points (one day, three days, and seven days) after surgery, the retina and the attached nerve were dissected out for analysis. Superscript reverse transcriptase II (RTase) was purchased from Invitrogen (Carlsbad, CA). dATP, dCTP, dGTP, and dTTP were obtained from Roche (Mannheim, Germany). RNase inhibitor (RNasin) and Taq DNA polymerase were purchased from Promega (Madison, WI). Primers were synthesized by MDBiol (Taipei, Taiwan). All other chemicals, unless specified, were purchased from Merck (Darmstadt, Germany). Total RNA of five retinas from each group at each time point was prepared using RNeasy Mini kit according to the user manual (Qiagen, Valencia, CA). Total RNA was denatured at 75 °C for 5 min. Reverse transcription was performed in a total volume of 20 μl containing 50 mM Tris-HCl, pH 8.3, 75 mM KCl, 3 mM MgCl2, 10 mM DTT, 0.5 mM dNTP, 0.5 μg of oligo dT, 20 U of RNasin, and 100 U of RTase for 1.5 h at 50 °C. Samples were stored at -20 °C until use. Primers used for PCR amplification were as follows: for GAPDH (NM_008084, from nucleotide position 565 to 1006), ACC ACA GTC CAT GCC ATC AC and TCC ACC ACC CTG TTG CTG TA; for vitronectin (NM_011707, from nucleotide position 114 to 498), TCC CTT GAT CAG TGG TGT CGG and CTG GCT GAC CAA GAG TCA TGC. The expected size of PCR fragment for GAPDH is 452 bp and for vitronectin is 385 bp. Amplification of cDNA was performed in a GeneAmp 9700 (Applied Biosystems, Foster City, CA) with each tube containing a final volume of 50 μl, consisting of 1 μl of cDNA, 1X PCR buffer, 1.25 U of Taq DNA polymerase, 0.25 mM dNTP, and one set of primers (200 nM). Samples were covered with 15 μl of mineral oil and were first denatured at 94 °C for 30 s, then cycles of 94 °C for 5 s, 56 °C for 15 s, 72 °C for 30 s were performed. Reaction was paused at each cycle after cycle numbers 23 to 27, and 8 μl of PCR products were retrieved before resumption of the PCR. Samples were analyzed on a 2% agarose gel, and DNA was visualized with ethidium bromide staining and UV illumination. Gel intensity after cycle 25 was analyzed using the ImageQuant software (version 1.1, Molecular Dynamics, Sunnyvale, CA). A scanning area was chosen around the target band on the gel, and an area of the same size was used for each sample analyzed at the various time points. The local median was selected as the method for background correction. The volume for each target band was measured and expressed as the ratio relative to GAPDH. Statistical analysis was performed with the paired t-test. The injured eye and control eye were enucleated at one day, three days, and one week postsurgery (four mice for each time points), and maintained in Hank's solution. After the anterior segments were removed, posterior eyecups were fixed in 4% paraformaldehyde solution for 1 h at room temperature. The eyeballs were transferred to 30% sucrose to sit overnight, were then submerged in Tissue-Tek OCT media (Sakura Finetechnical Co., Tokyo, Japan) before being frozen on dry ice. Sections were cut at 12 μm thick. Crushed and control retina sections were collected on the same slides (SuperFrost, Fisher Scientific, Pittsburgh, PA). For staining, sections were fixed with 4% paraformaldehyde solution for one h at room temperature, washed with phosphate buffer solution (PBS)/0.1% Tween for 15 min at room temperature, followed by PBS for 15 min twice. Blocking was done with 20% normal goat serum or 5% bovine serum albumin (BSA) for 1 h at room temperature, and then the sections were stained with rabbit antivitronectin antiserum (Biotrend, Cologne, Germany) or anti-integrin αv antiserum (Chemicon, Temecula, CA), and antineurofilament monoclonal antibody (heavy, 200 kDa, clone RT 97, Roche) diluted in 3% normal goat serum or 5% BSA at 4 °C overnight. Sections blocking with 20% normal goat serum or 5% BSA gave similar results. The rabbit antivitronectin antiserum recognizes mouse vitronectin but does not recognize goat vitronectin. One set of slides without primary antibody was used as control in each experiment. Sections were then washed with PBS three times and incubated with fluorescein-conjugated goat antirabbit antibody and rhodamine-conjugated goat antimouse antibody (Cappel, Aurora, OH) at room temperature for 2 h. For nuclear staining, 4',6-diamidino-2-phenyindole (DAPI, 0.16 μg/ml) was added for 15 min at room temperature, and washed with PBS three times. Sections were analyzed with a Nikon Diaphot inverted microscope (E300, Nikon, Tokyo, Japan) equipped with a MicroMax cool CCD (Princeton Instrument, Trenton, NJ). Image acquisition was performed using MetaMorph software (version 4.5r6, Universal Image Corporation, Downingtown, PA) with individual filter sets for each channel and were assembled with Adobe PhotoShop (version 7.0, Adobe Systems, San Jose, CA). To pursue whether vitronectin mRNA expression in the retina is elevated after damage in the optic nerve, a semiquantitative RT-PCR assay was employed to measure amount of vitronectin mRNA in the retina. A representative gel of this analysis is shown in Figure 1A. The expression levels of vitronectin relative to those of GAPDH were then calculated using the ImageQuant software. The statistical analysis of three independently prepared RNA sets was performed and is shown in Figure 1B. The results reveal that expression of vitronectin had increased by two fold on day one and day three after optic nerve crush in comparison with the control samples. Although the induction of vitronectin mRNA was still visible at seven days after injury, this increase was not statistically significant. To characterize whether the increase in vitronectin mRNA expression is accompanied with synthesis of vitronectin protein and to clarify whether the effect is in the RGCs, we first examined the expression pattern of vitronectin in the normal eye using antivitronectin antiserum. The expression pattern of the vitronectin receptor was also investigated using anti-integrin αv antiserum, since integrin αv is the major α subunit of vitronectin receptors [35-38]. In the normal eye, vitronectin was found in RPE, inner segments of photoreceptors, the outer plexiform layer, and the inner retina (Figure 2D). A diffuse expression pattern of vitronectin was observed, which may indicate the extracellular distribution of secreted vitronectin. In the inner retina, the staining for vitronectin was present in RGCs and in the extracellular matrix that surrounds the RGCs (Figure 2F,G). The retinal ganglion layer was identified by the DAPI nuclear staining (Figure 2G). To outline the location of nerve fiber layer in the retina, we labeled the sections with an antineurofilament monoclonal antibody. Neurofilament staining revealed the axonal fibers in the nerve fiber layer, which represent the projection of the RGCs (Figure 2C, J). The merged picture (Figure 2E) showed the vitronectin expresses over the nerve fiber layer in addition to the RGC layer. We also examined the expression of integrin αv in retina. It was observed in the RGC layer, inner and outer nuclear layers, the outer plexiform layer, inner segments of photoreceptors, and RPE (Figure 2K). Staining of integrin αv was detected on each cell in the RGC layer with a membrane-staining pattern (Figure 2M, arrows). In control, experiments which were performed without adding primary antibodies, no staining was observed in the inner retina (data not shown). As displaced amacrine cells are present in the RGC layer, we can not exclude the possibility that some immunopositive cells in the RGC layer were actually amacrine cells. The expression patterns of vitronectin and integrin αv in the optic nerve head were investigated. Optic axon fibers originating from the nerve fiber layer converge on the optic nerve head and exit the eyeball through the scleral canal. Within the optic nerve head, the nerve bundles proceed in parallel and were stained with the antineurofilament antibody (Figure 2Q,V). In between the nerve bundles, columns of glial cells could be identified with DAPI staining (Figure 2P,U). The vitronectin expression in exiting axon fibers was much weaker than that of the inner retina layer (Figure 2R), which could be due to less accumulation of vitronectin in the exiting axons. A similar pattern of integrin αv expression was also present in the optic nerve head (Figure 2W). When the optic nerve was subjected to crush injury, the vitronectin expression became elevated at the inner retina (Figure 3). The RGC layer and nerve fiber layer can be clearly recognized with antivitronectin antibodies after optic nerve crush. The induction of vitronectin was present on day one after crush, culminated at day three, and was maintained at day seven. Surprisingly, induction of integrin αv was also observed in the inner retina using antibodies against integrin αv (Figure 3). Expression of integrin αv was elevated in RGCs from one day to one week after crush. This increase of expression was unique for integrin αv, as no upregulation of α5 which binds fibronectin but not vitronectin was detected (data not shown). Among three integrin β subunits that bind vitronectin, β5 is upregulated in the RGC layer at day three after optic nerve injury (data not shown), suggesting the possibility that vitronectin can have effects on RGC by interacting with αvβ5. The differences of vitronectin and integrin αv expression between the crushed and control optic nerves were also examined. After optic nerve injury, the expression of vitronectin had increased at the optic nerve head at day one (data not shown) and on day three post-crush (Figure 4F). Similarly, increased expression of integrin αv was observed in the optic nerve head three days after the crush injury (Figure 4N). Induction of vitronectin did not co-localize with glia cells marked by DAPI, and seemed likely to be in the extracellular matrix of optic nerve head. The increased expression of integrin αv was primarily located in glial cells, which are distributed either within the septum or around the central retinal artery tract. In the optic nerve proper, faint immunoreactivities of vitronectin and integrin αv were observed in the normal nerve (Figure 4Q,U). After optic nerve crush, the crush sites (arrows in Figure 4R,V) could be clearly identified by the abrupt interruption of neurofilament staining (data not shown) in the optic nerve. Many glial cells at crush sites showed an induction of vitronectin expression (Figure 4S,T). There was also a higher level of vitronectin expression in extracellular matrix. Within the crush line, several cells with an increase of integrin αv expression were also found (Figure 4W,X). In a previous study , we analyzed the early change in gene expression in the retina after an optic nerve crush by a suppression subtractive hybridization approach. Among the genes detected in the analysis, vitronectin was found in a subtractive retinal cDNA library that contains genes whose expression is upregulated at 24 h after the nerve injury . To verify this observation, we examined whether a rise of vitronectin mRNA and protein could be detected after the nerve injury. Our results demonstrate that there is a 2 fold upregulation of vitronectin mRNA in the retina between one day and three days following optic nerve injury. Moreover, elevated expression of both vitronectin and integrin αv proteins was present in the inner retina, the optic nerve head, and the optic nerve. As the massive death of RGCs does not occur until seven days after injury [23,24], this induction is thus unlikely due to the result of apoptosis of RGCs. Several lines of evidence have implicated that both extraneuronal factors and intrinsic alterations in aged neurons result in the limited capacity for axonal growth in the adult mammalian RGCs [16,20-22]. It is known that myelin-derived growth inhibitors, such as Nogo , MAG [18,19], and OMgp ; gliotic scar ; and extracellular matrix molecules, like chondroitin sulfate proteoglycans [40-42] and tenascin [43,44] inhibit axonal growth in the adult CNS. Furthermore, adult RGCs show a progressive loss of responsiveness to factors that stimulate axon outgrowth, thus restricting the extent of RGC regrowth after crush injury [21,22]. For example, RGCs from E6 chicks, but not those from E11, extend profuse neurites on laminin ; and RGCs from E14 hamsters can regrow into adult tectum under an explant coculture paradigm, but postnatal RGCs cannot innervate tectal targets, even when the target is embryonic . Thus, to facilitate successful regeneration after retinal axonal injury, it is necessary to enhance expression of intrinsic growth-related genes in adult RGC neurons, while neutralizing the extraneuronal inhibitory molecules. Supporting this thought, it has been shown that ectopic expression of GAP43 and CAP 23, two genes involved in the axonal outgrowth, in adult CNS neurons stimulate their regeneration . Vitronectin is present in many different tissues, including brain , during development. Vitronectin immunoreactivity has been found in most neuroepithelial cells at E5 in chick retina, and on the nerve fiber and inner plexiform layer at E9 . In adult human, expression of vitronectin is found in the photoreceptor layer and RGC layer of retina and in the septa stroma of optic nerve [6,46]. In our study expression of vitronectin is similarly detected in adult mouse retina, specifically in the RPE, photoreceptor, and RGC (Figure 2C). For expression of vitronectin receptors, it was previously reported that integrin αv is expressed in developing chick retina at least since E6 , and on the apical membrane of fetal human RPE and adult primate photoreceptors and RPE [8,47]. We found that, in addition to RPE, the expression of integrin αv in adult mouse retina is present in the RGC layer, inner and outer nuclear layers, the outer plexiform layer, and inner segments of photoreceptors (Figure 2K). Functionally, vitronectin regulates cell differentiation, neuronal survival, and neurite outgrowth in the developing chicken retina , and purified E10 chick RGCs grow better on vitronectin than on laminin . These studies implicate vitronectin as an important component in the retinal extracellular matrix for axonal growth. Our data here shows that there is an upregulation of vitronectin in the inner retina, and this may indicate an attempt of RGCs to repair after injury by generating a favorable extracellular environment. The upregulation of integrin αv could also render RGCs responsive to this changing milieu. An increase in vitronectin and integrin αv is observed in glial cells within the optic nerve head after injury. Changes of extracellular matrix components have been observed following brain injury [48,49], and there is evidence that integrin expression on astrocytes is upregulated in pathological states . Whether this phenomenon represents an overall beneficial or detrimental effect is yet to be fully determined. As different subtypes of integrin expressed on astrocytes affect the permissiveness for neurite outgrowth in a coculture system [51,52], and as vitronectin is known to promote axonal growth [10,12,13], upregulation of integrin αv and vitronectin in the astrocytes within the optic nerve may contribute to RGC axonal regeneration by fostering a growth-promoting environment. On the contrary, another possible scenario after optic nerve injury is that the increase of vitronectin expression in the optic nerve may result from an extravasation of serum vitronectin through damaged vessels at the crush injury. With increased expression of integrin on cell surface, glial cells migrate and proliferate in response to the increased vitronectin, which in turn promotes reactive gliosis and hinders the regeneration of RGC axons in the optic nerve head . In the retina, however, extravasation of plasma vitronectin is less likely to occur, since a local elevation of vitronectin mRNA is detected in the retina, and the injured site lies far away from the retina. In conclusion, our results show that there is an increase of vitronectin and integrin αv in the retina and the optic nerve after optic nerve injury. Induction of vitronectin and integrin αv may have an important role in the regeneration of adult mammalian RGCs. Thus, it will be interesting to test whether an exogenously applied stimulus, which elevates the amount of vitronectin in the retinal nerve fiber layer and optic nerve and enhances expression of integrin α in RGC, could facilitate the visual recovery. The authors thank L.-S. Kao for helpful comments and critical reading of the manuscript. This paper was supported by grants from Taipei Veterans General Hospital (VGH 91-217), National Science Council (90-2314-B-075-130), and VGH-UST (VTY91-P1-11) of Tsou's Foundation to A.-G. Wang and M.-J. Fann, and National Health Research Institutes (NHRI-GT-EX89S732C) to M.-J. Fann. 1. Kreis T, Vale R, editors. Guidebook to the extracellular matrix, anchor, and adhesion proteins. 2nd ed. Oxford: Oxford University Press; 1999. p. 496-497. 2. Preissner KT. Structure and biological role of vitronectin. Annu Rev Cell Biol 1991; 7:275-310. 3. Schvartz I, Seger D, Shaltiel S. Vitronectin. Int J Biochem Cell Biol 1999; 31:539-44. 4. Seiffert D, Crain K, Wagner NV, Loskutoff DJ. Vitronectin gene expression in vivo. Evidence for extrahepatic synthesis and acute phase regulation. J Biol Chem 1994; 269:19836-42. 5. Seiffert D. Constitutive and regulated expression of vitronectin. Histol Histopathol 1997; 12:787-97. 6. Anderson DH, Hageman GS, Mullins RF, Neitz M, Neitz J, Ozaki S, Preissner KT, Johnson LV. Vitronectin gene expression in the adult human retina. Invest Ophthalmol Vis Sci 1999; 40:3305-15. 7. Ozaki S, Johnson LV, Mullins RF, Hageman GS, Anderson DH. The human retina and retinal pigment epithelium are abundant sources of vitronectin mRNA. Biochem Biophys Res Commun 1999; 258:524-9. 8. Lin H, Clegg DO. Integrin alphavbeta5 participates in the binding of photoreceptor rod outer segments during phagocytosis by cultured human retinal pigment epithelium. Invest Ophthalmol Vis Sci 1998; 39:1703-12. 9. Crabb JW, Miyagi M, Gu X, Shadrach K, West KA, Sakaguchi H, Kamei M, Hasan A, Yan L, Rayborn ME, Salomon RG, Hollyfield JG. Drusen proteome analysis: an approach to the etiology of age-related macular degeneration. Proc Natl Acad Sci U S A 2002; 99:14682-7. 10. Martinez-Morales JR, Marti E, Frade JM, Rodriguez-Tebar A. Developmentally regulated vitronectin influences cell differentiation, neuron survival and process outgrowth in the developing chicken retina. Neuroscience 1995; 68:245-53. 11. Gervin DB, Cann GM, Clegg DO. Temporal and spatial regulation of integrin vitronectin receptor mRNAs in the embryonic chick retina. Invest Ophthalmol Vis Sci 1996; 37:1084-96. 12. Neugebauer KM, Emmett CJ, Venstrom KA, Reichardt LF. Vitronectin and thrombospondin promote retinal neurite outgrowth: developmental regulation and role of integrins. Neuron 1991; 6:345-58. 13. Brocco MA, Panzetta P. Survival and process regrowth of purified chick retinal ganglion cells cultured in a growth factor lacking medium at low density. Modulation by extracellular matrix proteins. Brain Res Dev Brain Res 1999; 118:23-32. 14. Ramon y Cajal S, DeFelipe J, Jones EG. Cajal's degeneration and regeneration of the nervous system. New York: Oxford University Press; 1991. p. 100-126. 15. Vernadakis A. Neuron-glia interrelations. Int Rev Neurobiol 1988; 30:149-224. 16. Davies SJ, Goucher DR, Doller C, Silver J. Robust regeneration of adult sensory axons in degenerating white matter of the adult rat spinal cord. J Neurosci 1999; 19:5810-22. 17. GrandPre T, Nakamura F, Vartanian T, Strittmatter SM. Identification of the Nogo inhibitor of axon regeneration as a Reticulon protein. Nature 2000; 403:439-44. 18. McKerracher L, David S, Jackson DL, Kottis V, Dunn RJ, Braun PE. Identification of myelin-associated glycoprotein as a major myelin-derived inhibitor of neurite growth. Neuron 1994; 13:805-11. 19. Mukhopadhyay G, Doherty P, Walsh FS, Crocker PR, Filbin MT. A novel role for myelin-associated glycoprotein as an inhibitor of axonal regeneration. Neuron 1994; 13:757-67. 20. Schwab ME, Caroni P. Oligodendrocytes and CNS myelin are nonpermissive substrates for neurite growth and fibroblast spreading in vitro. J Neurosci 1988; 8:2381-93. 21. Chen DF, Jhaveri S, Schneider GE. Intrinsic changes in developing retinal neurons result in regenerative failure of their axons. Proc Natl Acad Sci U S A 1995; 92:7287-91. 22. Shen S, Wiemelt AP, McMorris FA, Barres BA. Retinal ganglion cells lose trophic responsiveness after axotomy. Neuron 1999; 23:285-95. 23. Berkelaar M, Clarke DB, Wang YC, Bray GM, Aguayo AJ. Axotomy results in delayed death and apoptosis of retinal ganglion cells in adult rats. J Neurosci 1994; 14:4368-74. 24. Garcia-Valenzuela E, Gorczyca W, Darzynkiewicz Z, Sharma SC. Apoptosis in adult retinal ganglion cells after axotomy. J Neurobiol 1994; 25:431-8. 25. Villegas-Perez MP, Vidal-Sanz M, Bray GM, Aguayo AJ. Influences of peripheral nerve grafts on the survival and regrowth of axotomized retinal ganglion cells in adult rats. J Neurosci 1988; 8:265-80. 26. Goldberg JL, Barres BA. The relationship between neuronal survival and regeneration. Annu Rev Neurosci 2000; 23:579-612. 27. Schnell L, Schwab ME. Axonal regeneration in the rat spinal cord produced by an antibody against myelin-associated neurite growth inhibitors. Nature 1990; 343:269-72. 28. Bregman BS, Kunkel-Bagden E, Schnell L, Dai HN, Gao D, Schwab ME. Recovery from spinal cord injury mediated by antibodies to neurite growth inhibitors. Nature 1995; 378:498-501. 29. Cai D, Shen Y, De Bellard M, Tang S, Filbin MT. Prior exposure to neurotrophins blocks inhibition of axonal regeneration by MAG and myelin via a cAMP-dependent mechanism. Neuron 1999; 22:89-101. 30. Buffo A, Holtmaat AJ, Savio T, Verbeek JS, Oberdick J, Oestreicher AB, Gispen WH, Verhaagen J, Rossi F, Strata P. Targeted overexpression of the neurite growth-associated protein B-50/GAP-43 in cerebellar Purkinje cells induces sprouting after axotomy but not axon regeneration into growth-permissive transplants. J Neurosci 1997; 17:8778-91. 31. Bomze HM, Bulsara KR, Iskandar BJ, Caroni P, Skene JH. Spinal axon regeneration evoked by replacing two growth cone proteins in adult neurons. Nat Neurosci 2001; 4:38-43. 32. Schaden H, Stuermer CA, Bahr M. GAP-43 immunoreactivity and axon regeneration in retinal ganglion cells of the rat. J Neurobiol 1994; 25:1570-8. 33. Doster SK, Lozano AM, Aguayo AJ, Willard MB. Expression of the growth-associated protein GAP-43 in adult rat retinal ganglion cells following axon injury. Neuron 1991; 6:635-47. 34. Wang AG, Chen CH, Yang CW, Yen MY, Hsu WM, Liu JH, Fann MJ. Change of gene expression profiles in the retina following optic nerve injury. Brain Res Mol Brain Res 2002; 101:82-92. 35. Marshall JF, Rutherford DC, McCartney AC, Mitjans F, Goodman SL, Hart IR. Alpha v beta 1 is a receptor for vitronectin and fibrinogen, and acts with alpha 5 beta 1 to mediate spreading on fibronectin. J Cell Sci 1995; 108:1227-38. 36. Brooks PC, Clark RA, Cheresh DA. Requirement of vascular integrin alpha v beta 3 for angiogenesis. Science 1994; 264:569-71. 37. Smith JW, Vestal DJ, Irwin SV, Burke TA, Cheresh DA. Purification and functional characterization of integrin alpha v beta 5. An adhesion receptor for vitronectin. J Biol Chem 1990; 265:11008-13. 38. Nishimura SL, Sheppard D, Pytela R. Integrin alpha v beta 8. Interaction with vitronectin and functional divergence of the beta 8 cytoplasmic domain. J Biol Chem 1994; 269:28708-15. 39. Wang KC, Koprivica V, Kim JA, Sivasankaran R, Guo Y, Neve RL, He Z. Oligodendrocyte-myelin glycoprotein is a Nogo receptor ligand that inhibits neurite outgrowth. Nature 2002; 417:941-4. 40. Jones LL, Tuszynski MH. Spinal cord injury elicits expression of keratan sulfate proteoglycans by macrophages, reactive microglia, and oligodendrocyte progenitors. J Neurosci 2002; 22:4611-24. 41. Jones LL, Yamaguchi Y, Stallcup WB, Tuszynski MH. NG2 is a major chondroitin sulfate proteoglycan produced after spinal cord injury and is expressed by macrophages and oligodendrocyte progenitors. J Neurosci 2002; 22:2792-803. 42. Lemons ML, Howland DR, Anderson DK. Chondroitin sulfate proteoglycan immunoreactivity increases following spinal cord injury and transplantation. Exp Neurol 1999; 160:51-65. 43. Becker T, Anliker B, Becker CG, Taylor J, Schachner M, Meyer RL, Bartsch U. Tenascin-R inhibits regrowth of optic fibers in vitro and persists in the optic nerve of mice after injury. Glia 2000; 29:330-46. 44. Becker CG, Becker T, Meyer RL, Schachner M. Tenascin-R inhibits the growth of optic fibers in vitro but is rapidly eliminated during nerve regeneration in the salamander Pleurodeles waltl. J Neurosci 1999; 19:813-27. 45. Cohen J, Burne JF, Winter J, Bartlett P. Retinal ganglion cells lose response to laminin with maturation. Nature 1986; 322:465-7. 46. Fukuchi T, Sawaguchi S, Ueda J, Abe H. [Distribution of cell adhesion glycoproteins in the human retrobulbar optic nerve]. Nippon Ganka Gakkai Zasshi 1997; 101:57-63. 47. Anderson DH, Johnson LV, Hageman GS. Vitronectin receptor expression and distribution at the photoreceptor-retinal pigment epithelial interface. J Comp Neurol 1995; 360:1-16. 48. Hertel M, Tretter Y, Alzheimer C, Werner S. Connective tissue growth factor: a novel player in tissue reorganization after brain injury? Eur J Neurosci 2000; 12:376-80. 49. Liesi P, Kaakkola S, Dahl D, Vaheri A. Laminin is induced in astrocytes of adult brain by injury. EMBO J 1984; 3:683-6. 50. Sobel RA, Chen M, Maeda A, Hinojoza JR. Vitronectin and integrin vitronectin receptor localization in multiple sclerosis lesions. J Neuropathol Exp Neurol 1995; 54:202-13. 51. Smith-Thomas LC, Fok-Seang J, Stevens J, Du JS, Muir E, Faissner A, Geller HM, Rogers JH, Fawcett JW. An inhibitor of neurite outgrowth produced by astrocytes. J Cell Sci 1994; 107:1687-95. 52. Milner R, Relvas JB, Fawcett J, ffrench-Constant C. Developmental regulation of alphav integrins produces functional changes in astrocyte behavior. Mol Cell Neurosci 2001; 18:108-18. 53. Gladson CL, Stewart JE, Olman MA, Chang PL, Schnapp LM, Grammer JR, Benveniste EN. Attachment of primary neonatal rat astrocytes to vitronectin is mediated by integrins alphavbeta5 and alpha8beta1: modulation by the type 1 plasminogen activator inhibitor. Neurosci Lett 2000; 283:157-61.
2019-04-20T04:32:14Z
http://www.molvis.org/molvis/v12/a8/
30-06-2000 Agata´s logg: Our big adventure begins! Nearly 30 people from 7 countries in the Baltic Sea region gathered in Lübeck to start the Harbour Tour 2000. We are the members of various ecological organisations with different knowledge and experience, which we want to share with each other. That is why we had arrived to Lübeck on this rather cold Friday afternoon and moved ourselves into „Burgtor” – the youth hostel, that was our home for the next two days. „Burgtor” is a very nice place for young people, a place where they can meet, make music, draw, prepare some performances and so on. In Poland, the country I come from, we really miss places like that. In the Friday evening we had a small meeting, when we had learned all our names and other basic things about ourselves. We had a lot of time and were really looking forward to spend next two weeks with this nice, friendly people we have just met. 01-07-2000 Agata´s logg: no highways – no problems! Saturday was the day of so called „harbour action” in Lübeck. Harbour actions are the different activities that take place in the harbours we are visiting. In Lübeck we were speaking a lot about A20 – the highway that is planned to be constructed from Lübeck to Szczecin in Poland and maybe even further, to Russia. The construction of A20 is destroying the environment near Lübeck, what we could observe during the slide-show in the Saturday morning. Jörn, Johannes and Christoph showed us on the slides, how did the landscape look like before and after beginning the construction. That impressed us a lot. In the afternoon we rented bikes and went to see the place of construction by ourselves. We were riding our bikes for over an hour through beautiful, old-fashioned city of Lübeck. Then we came to A20 and saw how much people can harm the environment. But that is not all. In the evening we had a guest, Dieter, who showed us more slides, this time about another highway project – A33. Some people are protesting against this construction for many years. In my opinion all people should ride their bikes, that would solve many problems like pollution, parking places, car thieves and so on. We don´t need more expensive highways. It is good that it is not only my opinions, because I have met here people who share it. We prepared the ship for the harbour-tour. Its outfitted with much food, all necessary seacharts, water and diesel fuel. Let’s start the tour ! 02-07-2000 Agata´s logg: She is so beautiful…. Morning was for us the preparation time – for about two hours we have talked about our expectations about Harbour Tour. These are for example, to meet people from another countries, to get to know each other, our organisations as well as our countries, to make some harbour actions, to learn how to sail, to develop our international network, to start some new projects together and so on. I think that we needed this time very much, because when we know our expectations, we can make hem true. Later that day we put our first step on Lovis´ board. She is so beautiful…. looks very nice with these high masts, clean deck, newly painted sides… From 4 to 8 p.m. there were open hours for the ship, so everyone could get onto and get informed about the whole idea of Harbour Tour. Later we have moved our bags from „Burgtor” to Lovis and at the evening we had a small meeting all together. But first we had to put all the food, that was delivered, to the small boxes in Lovis – that was quite a lot of work! I have read a lot about Lovis before, I have seen the pictures and so on but no words can describe the impression it makes when seen first time. It is very big, has a big mess (where I am sitting now, in fact), many quite comfortable cabins, well-equipped kitchen. Around 30 people can live here and it´s not crowded. I think we all felt that these two weeks will be something, we have never experienced before. 03-07-2000 Agata´s logg: We are on the sea!!! That was our first night on Lovis. I guess we all have slept well and have nice dreams (they say, the first dream in the new place always comes true). After breakfast we had a lot to do. First our skipper, Bibo, made a small safety introduction and we were taught what to do in case of a leakage, fire on board, problems with gas and so on. Then we have divided ourselves into sailing groups – people responsible for setting the main sail, fore sail and mizzen sail and also into groups responsible for making breakfasts, lunches, dinners and cleaning. The wind wasn´t very good and we couldn`t sail into the direction we wanted to. What is more, all the time we had to use our motor, so in fact we didn´t sail at all. During the day we were talking to each other a lot, getting to know people from different countries. I have figured out for example that Lithuanian language is similar to Polish, that Swedish cuisine is very original and so on. At the evening we reached Wismar, small but beautiful harbour in Germany and we had a long walk there – Polish, Swedish and Lithuanian people together. That was quite nice. In the evening we discussed some issues while drinking some nice cinnamon Yogi Tea. I am really lucky that I am able to spend time, lying on a board, with the sun shining at my face and a cold breeze all around, with nice people everywhere, with good music and a good book by my side…. We arrived to Burg auf Fehmarn this evening after the first sailing with Lovis. With the good weather we even made a better distance than expected, but we are still after planing. Setting the sails for the first time with a new crew was quite a experience, and very chaotic. We made a speed of about 5 knots during the day. 04-07-2000 Agata´s logg: Sails up! Today the wind was a lot better, so we could set our sails up. That was not a hard work and it was nice to sea those huge white sails going up. We could switch off the motor and have some nice peaceful sailing at last. For me it was the baking day, because Katrin from Sweden and Pia from Denmark showed me how to bake a traditional Swedish apple pie. Later this day me and Johannes have also prepared some public exposition of Lovis, nothing big, just a poster with some photos and some leaflet, so people at the harbour can learn something about us. Now we are in Fehmarn, a small island on our way to Denmark. In the evening Pia is going to show us some slides about her home country, Denmark. I am really looking forward to it! It was just another day filled with relaxing and getting to know each other. Later there will be more time for seminars, some water analysis and so on…. For the first time I feel like I have had a night´s sleep aboard. I’m sleeping in the aft of the ship, near the waste water pump (very noisy) and the toilet pump (just noisy). Tonight nobody decided to empty the waste water or to use the toilets aboard after 01.00… We are now waiting in the harbour for the return of the Polish group, as they are out shopping food for the traditional Polish dinner. The weather is not as good as yesterday, today its cloudy and very light winds, it will probably rain during the day. Just before diner we arrived to Gedser which is a small (really small) harbour in the south Denmark. So now we are in Denmark at last! We are leaving tomorrow at 7.30 a.m. and this is good, because Gedser is a very boring place, I must say (sorry, all the Gedser inhabitants reading these words!). And I am sure I won´t even look at pierogi when I will be home… I must have eaten about twenty of them…. At last we have power for the computer so I can update the logbook. We have had some problems with the local harbour and had to wait until they turned on the street lights to get the 220 v power. The weather was better than I expected in the morning, and there were no rain until we reached the harbour. Tonight we will have a Polish evening with traditional Polish food. After the breakfast we split up to many small groups. Some of them went sightseeing, some had to go and buy some things (fruits and vegetables), some went shopping. Me and my friends decided to do some sightseeing and see Copenhagen by day. We saw quite a lot, even he change of guards in front of Palace, which took place at noon. We met there some people from Poland, some tourists and chatted with them for a while. The change of guards looked rather funny because of the furry caps of those people. What was my impression of Copenhagen? The city is beautiful and old-fashioned buildings co-exist there with quite modern ones, which is very strange, but looks nice. The city is rather calm, not so many tourists, the plan is in some kind of order, so even I had no problem to find way back home (and I am definitely not well city-oriented). There is a lot of monumental buildings, palaces and museums. Everywhere is something interesting to see. I wouldn´t say it is boring, but there isn´t a lot going on there. And I must say that Denmark must be a really rich country, the city is clean and buildings are renovated, which is very nice. But there is also the second face of Copenhagen and we had an occasion to see it in the afternoon. At 2 p.m. we met at Lovis and went with Camilla, the girl from Natur Og Ungdom to Christiania. It is a district of Copenhagen, but it is more than this. It´s more like city in a city. It has it´s own laws and rules, people who live there are independent, they make their food and build their houses by themselves. Christiania is quite big, there is almost 1000 of people living there. They have their own hospital, hairdresser, blacksmith, stable and everything. The houses look rather poor, the roads are narrow for there are no cars there. But the place is very interesting. There are things like buddhist´s stupas and old stones with runic writing on it. People seem friendly, everyone knows each other. There are of course no monumental buildings, but there is a market where you can buy jewellery, clothes as well as hash, pot and even halucynogenic mushrooms. There was a lot of people there, in all ages, buying stuff like that which was pretty weird for me. I don´t think this should be allowed but it´s my personal opinion. Christiania is completely different than the rest of Copenhagen. It´s like another world. After this trip we had a dinner and Camilla and Susi explained us some things about tomorrow´s harbour action. Then we had a small movie show, when we watched movies about fighting against the highways, fighting for preserving the nature, homeless people and so on. This also was quite interesting. But I´m thinking all the time about this strange city I got to know today. Now we have water also! We ran out of water this morning, and it took some hours until we could get fresh water in the tanks. 2 tons of water is enough for the next few days. Not much to report from the ship, some maintenance and painting has been done during the day. In the morning we had a harbour action where we handled out cookies to people who used alternatives instead of cars. After that we split up in two groups, one who went to the „Reclaim the street party” (later stopped by the police) and one which visited the enviromental friendly areas in Copenhagen. I was visited by my parents so I did not participate in either. I wouldn´t call the harbour action that took place in the morning a success. The idea was very good: we were staying in the centre of the city giving cookies and leaflets to people who use public transport or bikes instead of cars. In my country it would be a big success and all people would enjoy it. But not here. Danish people seemed really unfriendly, they didn´t want to get leaflets from us and they didn´t even took the cookies! They were saying some nasty words at us (I think so because I don´t understand Danish), or acting as if we didn´t exist. This wasn´t nice. During two hours of this action we distributed maybe 50 leaflets. So that is why for me it is not a success though our Danish friends told us that this is normal in this country. Later that day everything was just wonderful. After lunch we rented some bikes and went for a guided tour in Norrebro, a district of Copenhagen that is very ecological. People have some nice gardens around their blocks of flats, they select garbage into special bins and we even saw a totally ecological house with solar bateries and so on. This was very interesting and I hope to see this kind of initiatives in Poland! Later me and my friends took our bikes and made a trip. We biked rather far along the pier and get to a very nice place with a view t the sea and many stones put in one place. We sat on the stones, watched the sea and it was really wonderful. Then we went back to he ship and there was a small party. Camilla (from Denmark) made some chocolate balls (this is Scandinavian dessert, very fat, sweet and therefore tasty!), we had some chocolate to drink and Bibo was playing many songs on the guitar. As we know many of them, we could sing along. It was nice. Later we had to give away the bikes we rented and therefore we had to walk for the rest of the evening. We had a walk to the ship, we cleaned it a bit and had another walk, this time longer, just to see Copenhagen for the last time. We decided we want to come back here, because it is an interesting city. But in my opinion three days is enough to do some great sight-seeing, because we were in many different places and now I know Copenhagen a bit. In this morning we had a very small evaluation meeting (the big one will be in the evening) so I hope we will figure out some solutions to these problems, learn to be more responsible and helpful to each other and the rest of our trip will be more satisfying. We leaft Kopenhagen this morning, and has used the engine the whole day. Nothing relay happend, we sleep tonight outside the openbel bridge to „Falsterbo kanalen”. The showers in the harbour was at first hard to find, but good and refreshing when found, In falsterbo the supermarket „Konsum” was open. There we bought food for the ‚Swedish’ breakfast; some knäckebröd, kalles kaviar, Herrgaardsost (cheese), Lingonberry jam and alike. We payed the fine for the harbour and got a pink ribbon to show that we paid. Tomorrow we will have some better wheater (sailabel weather). 09-07-2000 Agatas logg:Good-bye, Little Mermaid! We left Copenhagen at about 11 o’clock, hoping to sail peacefully whole day. Before breakfast there was some not nice situation on our ship, because some of the people had a small party the evening before and they didn’t do the dishes. When the breakfast group woke up, we saw plenty of dirty dishes on the table. That is why we had to have small talk about responsibility and things like these. This was just right after we had left Copenhagen and waved bye-bye to Little Mermaid. This was so called Evaluation Day. First we had meetings in our national groups about things like motivation, expectations, planning of the day, teamwork and so on. Then we had meetings in international groups and at the evening at the plenum. It took us quite a lot of time to discuss everything, make new groups (as few people left us) and so on. We planned a little bit our work for next days. That was very tiring but interesting. We hope that from now on things would go better. At the evening we reached Falsterbro, harbour in Sweden, which in fact was not very beautiful. A big highway nearby, nothing more. But there was one good thing in it – showers! At last! I woke up at six o’clock! This is not a normal hour for me. But our friends from Sweden, from Fältbiologerna suggested that we should go bird-watching in the morning because the surrounding landscape is well-known of many different birds living there. It was true. We saw avocet, black-headed gull, cormorant, some kind of duck and…. what was the last one? We also saw all kinds of mussels living in the Baltic Sea. It was very interesting. Ah, the last one was the oyster-catcher. My favourite, in fact. Later we left Falsterbo and just as we reached the sea, the HUGE storm started. Waves were big and the water was everywhere, on our deck, on our sails… on us of course. Everything was wet! The wind was not very strong in fact, but the direction of it was so that the waves became bigger than they usually are. I was on the deck for some time but it was really windy. So I went asleep and slept the whole day! We all did it, we didn’t have much choice in fact because it is hard to make any seminars or even the water analysis in such conditions! We reached Rödvig, the south of Denmark, in the evening. We didn’t sail far away from Falsterbo because the wind wasn’t good for us. We hope anyway to reach Swinoujscie in time. With such crew everything will be all right! What went wrong…..? There’s three days missing in the life of the Harbour-tour 2000! You’ll have to use your imagination, all we can promise is that Lovis got safely to Szczecin via Stralsund, Germany. The Harbour action in Szczecin started before noon. At eleven ‚o clock there was exhibition called „Time for the Odra River”. There were many beautiful pictures from the area of this river. The next we saw a lecture about Odra River. In the evening we changed the participants on our ship. After we got to our rooms and left there our luggage, we went to the concert of drummer band. We had a great time there. Tired with dancing and the whole day full of many attractions we came back to Lovis. It was our first night on the Lovis. After breakfast we had a long meeting about security on the ship. We divided ourselves into 3 watch groups: Bornholm, Öland and Wollin. Than we could go to Swinoujscie. We had to use a motor so it took us 6 hours to get there. We learned a lot of new words connected with sailing. We saw a lot of birds too, for example herons. In the evening we went sleep soon, because we had to get up early next day. We left early in the morning (about 6 A.M.) We had 60 miles to Bornholm. It was our first day on high seas, so many people had a seasick. That’s why we had to eat on the deck – it was so difficult for them to go downstairs! But we know that in few days we will feel just great seeing big waves. After this hard for us day we got to Nexo. Sailing in the evening sun we saw Bornholm growing in front of us, Denmark – at last! (at last of course only for Danish people!) (and all the other people who couldn’t wait to get to this lovely country) (very expensive country!). The first impression of Denmark: factories and fishy smells. Toilets on land (easiest reached when swimming across the harbour), and showers (after Christian took a small talk with the harbourmaster :-) ). We like each other and we like Lovis, this is going to be great. We saw hedgehogs in the town! Have brought us all the way. We passed along the way. We haven’t come to stay. Unfortunately we had to leave this beautiful island in the morning after taking a very cold waking up bath from the cliffs. Today we had a very good long sailing day. We managed to cross over to Sweden with a great wind from Southwest. Not many from the group got seasick, we’re getting tough! We arrived in Sweden just as it started to rain! Welcome to Sweden! Since it was raining we decided to watch a movie about „Reclaim the streets-parties” in London and Stockholm. It was like having a big common sauna with yogi-tea. One person who wants to be anonymous had to go alone swimming in the ocean because nobody wanted to join her. Other people used the time better by doing a great rain dance. Shadow of the day: A broken waste-water pump! From now on we have to wash the dishes in big plastic bowls! Rain… and birthday! That’s all to say! No, not really, but the rain and not so much wind are the things which influenced us the whole day! (Sasha the „birthdaychild” must have been a bad boy the last years!) Today we were glad to sail up the Swedish coast. Everybody were very happy after ending the watch! Under deck we made different things. But the best of the day which most of the people unfortunately missed was a great workshop Klara held. She told as about „meeting- and oppression techniques”. Another great experience was to arrive in Kalmar. It was cold, grey and misty, the town just a shade and there in the middle was a big yellow tent and six „FÄLTBIOLOGER” standing there with a lovely smile on their faces waiting for us. They offered us a spectacular program for the next days in Kalmar. As the press came in the morning it rained! As we biked to watch a water project it rained! But as we came back to relax the sun started to shine! Later we planed the harbour action for the next day. And after that we got a wonderful dinner in a first class restaurant in Kalmar because we were the guests of the town Kalmar. Very civilised after a week on the sea. Afterwards we visited the musical „Hair”, an outside performance. It was a good idea, especially because it was a really nice evening, but unfortunately it was in Swedish and the atmosphere didn’t get better by the fact that the place was right beside the prison! But all in all a very cultural day! Today we had more program! First we walked into the city to make our Harbour action. There hadn’t really been anything planned by the Swedish group so we had just decided on the ship to make it some kind of fun event, where everybody could practise their artistic skills. So in the middle of town we put up our information material and started joggling, painting faces, doing acrobatics, playing with a diablo and much more. It wasn’t very political, but good fun. In the afternoon there was a lecture about Baltic Sea ecology and initiatives for protection and co-operation in the area. If people had not been so tired after the last days of excitement it would have been excellent. In between there was also room for a bit of advertisement for Kalmar (it seemed like the city council people saw more reasons of us choosing Kalmar for the Swedish harbour in the project than we did). In the evening there was arranged a concert with three local groups. The first band basically got killed by no people being there to watch them. The second band didn’t sing at all but had style, the third band was cool and really made people jump. Later there was time for a moonlight swim, without a moon but with clouds. Goodbye Kalmar … We left Kalmar before lunch after doing a bit of laundry and packing our things together. As the motor started running we bid our Swedish friends farewell and motored out in the big blue. Right after the departure from Kalmar we made some water analysis, to have a look at the environment in the Kalmar bay, the results will follow later. It was good to do some practical things instead of just doing a lot of talking (maybe the politicians should try doing that too …) A lot of talking did we instead in the afternoon when we had our first evaluation meeting. We haven’t finished yet, but the result so far is that problems and questions have been discussed in smaller groups and have been taken up in plenum. The group is divided by interest conflicts, one part of the group sees this more as a amusement trip, while the other part is more for environmental and co-operational questions. It seems like there has been some trouble with the communication before the trip, so a lot of people didn’t really consider what it was they wanted with the tour before going. It’s of course a problem, but now we just want to figure out how we’ll handle it (a bit like our meat discussion earlier in the week). So far the tour has been really great, and this shouldn’t ruin it – maybe instead be used as a strength … Get the best from everybody. We just have to learn to listen to – and respect each other, that’s the start of co-operation. It will be interesting to see how this evaluation ends, how it will change the rest of the tour. To night at dinner (while eating pasta with nuts, white cheese and yoghurt – Polish speciality … ???) people were already making a new effort to communicate with other people than they usually talk to. I’m looking forward to see what tomorrow will bring, the group seems motivated and ready for the adventure of the tour … crossing over to Klaipeda, Lithuania. Another birthday and a rescue! What a day! But the first action today was a bird-watching early in the morning. These crazy seven people stood up at 5 a.m.!!! Sorry, but we are not crazy. At 7:30 a.m. we started our adventure crossing the Baltic Sea to Klaipeda. We had a great birthday breakfast for Signe who now, if she was a guy could marry in Poland! The whole day many people slept and there was not much wind! But in the time from 12 a.m. till 4 p.m. there was no wind! So we drifted in the waterway „Ölands Södra …”. Until we started the engine around 9 p.m. we made just 12 miles. In the breaks between sleeping and eating we had a full program: Water analysis, making masks and a discussion about „Open space methods for decision making” stood on the timetable. After the dinner which was made by our Lithuanian participants we had a really big rescue action: Johannes suddenly dropped his „Birkenstock-Shoe” into the ocean. First the captain decided to turn back the ship. Then all of us gathered on deck to help catching the shoe. We were laughing and shouting and trying to fish the shoe with harpoons and nets. It was a great fun and a fantastic teamwork! And finally we got it! That is the way of waking up people……. The evening bid a possibility to try some Lithuanian food (in the vegetarian version) – very nice soup and bread-spread with a lot of garlic. In the evening the reality of our three watch system became clear, sailing all through the night. I personally found myself standing between 04.00 and 08.00 on the poop-deck (and it was too foggy and rainy to see the sun-raise). But it was cool to sail into the morning and the atmosphere in the watch was great. During the night the wind had grown a bit stronger, breakfast on the move. With more or less happy faces people showed up, for in the most cases to return to the sleeping bags trying to catch up on sleep after the night. It’s amazing how people fall into a everyday life rhythm, no land – no worries! During the day it was pretty quiet on board; some slept, some relaxed and others just bummed around enjoying life. By now most people are getting use to the movements of the ship, fortunately… otherwise this could been a rough tour for a lot of people. We are now out of the ferry, cargo- and tankship highway 99; thank God! Now the navigation is a bit more relaxed – at least the chance of the getting run over by a ship doesn’t seem so great anymore. This is not really the time for seminars and workshops, people are too tired, a bit seasick or concentrated on being on watch to make it possible. In the evening the Swedish group prepared Swedish food for us: yellow bean soup with bread, and pancakes (baked in the oven to make it easier) with whipped cream. All served on deck in the fresh wind. For us awaits another night of sailing. Since the night is dry some of the group has decided to sleep on the deck (maybe that will make it easier to wake up at 03.45!), lying outside under the stars, getting sung to sleep by the wind in the sails (and the odd yells from the watch-group) and rolled by the waves….. can anything better be imagined? During the night the lights from Klaipeda were spotted, unfortunately the waves and wind made it impossible to sail direct into harbour. After two days without land under the feet, people are looking forward to a change of the horizons. Still it was with sadness we during the morning saw Klaipeda growing in front of us, this port means the end of the second tour of the harbour-tour 2000. During the last two weeks we’ve crossed over the Baltic Sea twice, seen new places, met new people. Why does everything good have to end? Klaipeda didn’t show itself from it’s best side as we entered the harbour, the greyness of the big cargo-ships and buildings blended into the sky without any other contours than the big wave-breakers along the entrance of the harbour. Not very inviting! Interesting was it also our welcome greeting from Lithuania – a flyer starting with: Lithuania is a nice and guestfree country, but…… and then a whole page of things that you should be careful about when moving around in town, this including everything from taking care of your belongings to being careful about making new friends. Thanks for the warning…… now it’s really easy to get to know the country with an open mind. Since a lot of the participants are leaving tomorrow, we had our evaluation meeting this afternoon. Everybody could agree on the tour being great with nice people, good sailing and a lot of fun. On the negative side the problems with communication, lack of program, difference of expectations and peoples sense of responsibility was brought up. From my point of view I missed a bit more concrete discussion of how we can continue the co-operation in the future. I guess we’ll just have to wait and see! In the evening we met with the Lithuanian groups – cool to see them again. They gave us the program for the nest couple of days, Klaipeda here we come! The last day on the ship……. Actually the plan was that people should have left the ship tomorrow, but because so many people are leaving today we decided to go of the ship together and let the people staying a bit longer stay in accommodation organised by the Lithuanian groups. It’s a shame ending earlier, but better than people leaving the ship over a period of 24 hours. We started together – we end together! After two weeks of sailing the ship looked quite messy, something had to be done. The whole morning was for cleaning, people working together getting it done. In between the people started leaving, funny feeling, who knows when we’ll see each other again. In the afternoon there had been planned an excursion to the Kursius Neringos and I can’t help feeling sorry for the people who left early and missed out on this one. We took a small ferry (which by the way sails right past Lovis about 40 times a day) over and had a guided tour of the forest and dunes/beach, afterwards there was time to walk a bit around and have a look at the area. It was nice to get the cleaning fumes blown away by the wind, and get to see a very positive side of Klaipeda. In the evening we went out for dinner with our Lithuanian friends. After spending the night in a military camp (the accommodation which the Lithuanians had organised for us!!!!!) we met this morning at ten o’clock by Lovis to start a handing out leaflets action. It was a bit strange because the information we were handing out was in Lithuanian and Russian, so it was hard to understand any of it. We were alright met by the locals, with the small but, that the Russian speaking people didn’t really want to take the information from us. Today a water festival has started here in Klaipeda, apparently the happening of the year. This means that the town is filled with people, musicians, markets……. In the afternoon there was the official opening, where we were invited to take part (as watchers). It seemed quite all right, but in Lithuanian language! Our adventure with sailing started three days ago. During this days we hadn’t touched the land at all. Most of us had been seesick at the begining because waves were really strong but now everything seems to be fine.I’am not sure if we want to sail more in the night since we have to get up very early or not sleep in the middle of night (it’s against nature) but there were also some good sides of this for example falling stars during all nights. Yesterday the polish group made „Pierogi” (national food) everybody liked it, specially Sina (she was happy like a child) ,but we the cooks promised one another not to make „pierogi” any more (it`s a lot of work about 5 hours-believe me). We are playing a very nice game which is called „secret friend” and we are making gifts wich is also very nice.The harbour in which we are right now is in Estonia it could be surprise because we were supposed to stop in Latvia but we aren`t.I have to write something also about weather-it`s wonderful. It´s so warm that today we went to the beach and swam in the sea. Although there were a lot of plants the fun was great and I for a first time was swimming in the sea which was not salty.With every day we are better in (un)furlinig the sails (I hope the crew think the same), Auxias from Lituana teach us knots and some more thinks are happening but I´ll write about it later because I´m going to sleep right now. We are out of time, I´ve just asked people around me about what date or day is today and nobody was able to answer me, but at last I found good informed person.Yesterday we stoped on an island called Muhu and we had nice,calm evening.We left that harbour very early in order to be on Vormsi before 12 a.m. and we are. First point of programme was excursion of the island – it was nice but nothing speciall except old factory and older orthodox church. Some people liked it so much that they even visit (climbed on) the roof ( I did it also). Next point of the programme was short video about some action in London, called Mayday 2000, after this engaged the discision about diffrent ways of protesting it was very interesting but not to long because we decided earlier that we would like to have a camp fire tonight. Finally only few people went to make camp fire rest of people went sleep. Unfortunately just after lighted the matches it started raining and was not only little rain but quite big one.I was not there but only some persons who are trying to dry themself right now told me this. I almost forgot that today we also were swiming in the sea, just near the ship, the most exiting was jumping from the top of bowsprit – I mean really exiting. Now I´m back from outside. It is still heaviely raining and my weet soaked clothes are hanging around me in the communal room. Oh what an exiting day this was. We left the habour of Muhu island very early in the morning. Unfortunatly we had no wind so we had to go by the engine to our next planed destination – the island of Vormsi. No sailing manouver for today but for that more action on land. At about 11 a.m. we departured to an island excursion. Some people were more interested in the flora and fauna of Vormsi and walked around with Mikkel the biologist but some other people and me desided to find a very old beautiful cemetry with celtic crosses. Which meant walking through the countryside, eating wild rasberries from the side of the small road, leaving little villages behind us, discovering houses which were almost in ruines. The most impressing one was a church from 1889 which was surounded by a becoming scrapyard. After a lot of walking we finally arrived at the cemetry which had a very peaceful and calmig athmosphere. Luckily on our half way back to the ship we get a lift and finally to give into my desires we went straight from the ship swimming in the sea. It was very refreshing and I won´t forget what I felt this very special moment when I jumped from the top of the bowspit till I dived into the water. I had to do it again I loved the feeling. A bit later we enjoyed our warm dinner and then I get more and more nervous because I was getting to hold a lecture about Mayday 2000 in London. I showed a videofilm made by the the Independent Media Centre London and talked about Direct Action. The people on board liked it. By the way there was something we liked because it`s a sign of a good ecosystem but it was very difficult to cope with this awful lot of moskitos. To round up this day we wanted to make a big campfire. It became very late and also some people forecasted a storm but there were still some taft ones who wanted to try. My clothes and me has never been so fast saoked with rain then at this night. I was singing all the 10 minutes on our way back. Now Loreena McKennith is singing in the background . Her softly deeply emotinonaly music is making me fall asleep. I just want say thanx to Signe for these texts in the logbook. After breakfast we left the beautiful Estonian island Ormsö (the old swedish name for it). We couldn’t set sails because of the shallow water, so the engine worked for us most of the time. Instead of sailing we had a lot of interesting workshops and discussion in a so called „open space day”. Signe and Mikkel from Denmark introduced us how it should work. Roughly the idea is that everyone will have their opportunity to work with and talk about what they are really interested in. So we had many different discussions, for example about reclaim the streets and alternative living. We had a lot of inspiration from each other. It was a great day. In the evening we watched a movie. It was about the human behavior I think. I was in the early morning sail group and experienced the arrival in Tallinn. Except the sunrice it was not a very nice experience. „Leave the harbour at once!” They wanted som buerokratic paper that we weren´t informed about. So, goodbye Tallinn, we said and went to a harbour nearby. It was almost full, the only place left for our big ship were at customers kay. So we experienced that you must have your pasport with you to the toilet! We felt like we were in jail. As a miracle the estoinian girls Ester and Merit found us. They had a tight programme for us, so we tried to be awake although we had sailed all night. We started with a sightseeing tour in Tallinn, a bus was waiting for us in the harbour. Before we went on sightseeing we had a name game outside the nice walls of Tallinns old town. On the tour we looked at old memories from the danish time with the danish flag falling from the sky, and from the swedish time. The town is very scandinavian I think, with some wooden houses and the city walls. The old town of Tallinn was very nice. We had lunch at a resturant it was nice, although the people thought that chicken is vegeterian (!). After lunch we went to a seminar. A man named Valdur told us about the Baltic Sea the enviromental problems. Also about which things the enviromental organizations work with in Estonia. It was very interesting, but so heavy – Valdur talked all the time. We were all very tired but a nice lady came with cookies, apples and juice all the time. After this interesting lectury we went back to „LOVIS”, and many people took a nap, because the plan was that we should go to a disco. The disco were very big with three different floors. Disco, live music and karaoke were a good mixture. Sina were the dancing king, she went solo on the dance floor. When the karaoke started everyone sang a song and it was really funny. Pernille from Denmark had her own way: screaming! Robert made a big succes when he sang „Unchain my heart”. Late at night we all went happy home very very tired. This morning at 6.00 a.m. I woke up because of a „nice” heel angel of LOVIS. When I got out I saw two huge black twisters (= tornados, taifuns, Windosen) at our starboardside – just 3 seamiles away. 5 years ago a friend of mine and me met 40 of them near Gotland/Öland. Wind speeds up to 360 km/h in the center are possible. Sooooo … We took the sails down and tried with a zigzag-course to avoid a „collision”with these horrible phenomena. Under the black clouds there was rain – of course – and hail ! There were hailstones with a diameter of 1 cm. A real experience. Twisters on the Baltic Sea ? Here are small evidents ! After a nice evening with a campfire, anchor watches and a beautiful sunrise at Duveholm the ship stayed 2 days in Ecotopia / Maasarii. Today we arrived in Turku – the last port of the Harbourtour 2000. Have a good way back home. Be carefull and remember: DON’T MAKE FRIENDS is a bad suggestion.
2019-04-25T10:53:34Z
https://lovis.de/pl/mitsegeln/projekte-auf-lovis/hafentour-2000/loggbuch/
Satisfactory Progress/Academic Warning, Probation, Etc. Attendance and participation are two of the most significant factors that promote student success. Students are responsible for completion of all work assigned in class, whether they are present or not. The instructor must receive prior notification of absences caused by such situations to assure the absence will not be counted. Regardless of the reason for an absence, it is the student’s responsibility to follow the instructor’s policies regarding making up missed assignments and providing any required documentation related to the absence. Students who feel they have been unreasonably denied an educational benefit due to required military duty, court-mandated appearances including jury duty, College-sponsored activities approved by the College president, or religious holidays should contact the appropriate dean/director. Other than the situations described above, faculty requirements for attendance vary but must be clearly stated in the instructor’s syllabus. Students reporting to class late or leaving early may be considered by their instructor to be absent. Each instructor’s syllabus describes his or her attendance and course requirements and indicates how an administrative withdrawal (AW) will be applied in the class. Students should refer to their syllabi for specific information on the application of the AW procedure. Students may appeal an administrative withdrawal, as with other withdrawal appeals. See the Appeals section. TCC’s standards of academic progress consider grades and rate of completion of courses. For a student to make satisfactory progress and continue successfully toward a degree, the student must maintain a 2.0 cumulative GPA and successfully complete 67 percent of all courses attempted by the time of 30 or more attempted hours. For information about the criteria for and consequences of academic warning, probation, suspension and dismissal, students may contact the TCC Advising Center at (850) 201-8440 or [email protected]. Students who do not make satisfactory progress and fall below one of the standards listed above will receive an academic warning the first term. The academic warning will appear on the student dashboard in TCC Eaglenet, and an email will be sent notifying the student of his or her status. Students are strongly encouraged to contact an advisor in the Advising Center to discuss their academic performance. Students on academic warning are limited to enrolling in no more than 13 credit hours per semester. Special consideration may be given due to extenuating circumstances. Students who do not make satisfactory progress a second term will be placed on academic probation. Students are strongly​ encouraged to meet with an advisor in the TCC Advising Center to develop a success plan and may be required to enroll in a specific course or courses in an attempt to correct the problem. Students on academic probation are limited to enrolling in no more than eight credit hours per semester. Special consideration may be given due to extenuating circumstances. Academic probation will be posted on the academic transcript, and an email will be sent notifying the student of his or her status. Students who do not make satisfactory progress while on academic probation will be placed on academic suspension and may not be allowed to enroll at the College for one full term. In order to be eligible to register after the suspension, students must submit an online Suspension-Dismissal Appeal Packet via their TCC Eaglenet account to the Suspension Appeals Committee before the beginning of any term for which they want to petition for re-enrollment. If re-enrollment is permitted, students must meet with an assigned Advising Center advisor within Student Success and Retention to develop an academic success plan before permission to register. Students re-entering after a term on suspension will be placed on academic probation-after-suspension status and limited to no more than eight credit hours per semester and must make satisfactory progress during the term in which they return. Failure to do so will result in academic dismissal. Special consideration may be given due to extenuating circumstances. Academic suspension will be posted on the academic transcript, and an email will be sent notifying the student of his or her status. Students who do not make satisfactory progress while on returning from probation-after-suspension status will be placed on academic dismissal and may not be allowed to enroll in the College for a minimum of one calendar year. Students on academic dismissal must apply for readmission, then submit an online Suspension-Dismissal Appeal Packet via their TCC Eaglenet account to the Suspension Appeals Committee before the beginning of any term for which they want to petition for re-enrollment. If re-enrollment is permitted, the student must meet with their assigned Advising Center advisor to develop an academic success plan before permission to register. Students re-entering after a year on dismissal will be placed on academic probation-after-dismissal status and limited to no more than eight credit hours per semester and must make satisfactory progress during the term in which they return. Failure to do so will result in another academic dismissal. Academic dismissal will be posted on the academic transcript. A student who is suspended or dismissed at the conclusion of any term may appeal the action by submitting the online Suspension-Dismissal Appeal packet via their TCC Eaglenet account to the Suspension Appeals Committee, if the student thinks that the suspension was caused by extenuating circumstances. If the appeal is not approved, full sanctions will apply. Academic support for students is provided through the Learning Commons and through the Transitional Studies Division. The Transitional Studies Division houses the developmental reading, writing and mathematics courses, as well as the English for Academic Purposes (EAP) program. The division is supported by the Learning Commons. Developmental education at TCC has always had the goal of preparing students, in a holistic manner, for the rigor associated with college-level studies. Whether a student needs to develop academic skills, success strategies, or both, the program employs methods designed to help students be successful at TCC. The program uses a variety of measures, such as academic history, standardized test scores, personal motivation and goals, certifications and work history, and specialized diagnostic assessments. Once the student’s readiness has been accurately assessed, the student is advised on the most appropriate pathway to reach his or her stated goal. If the advised pathway includes developmental education, students will find a variety of options for progression through the program. The different offerings take into account academic need, learning style, student motivation and time commitment. Whether a student needs support in reading, writing or mathematics, the student will find a class offering that fits his or her academic needs, learning style and life situation. The College offers courses that are contextualized in the meta-majors, module-based for individualized learning experiences, compressed for acceleration, or a combination of some, or all, of these formats. To ensure that students move into the best pathway for their specific situation, they are asked to work closely with an academic advisor or a representative within the Transitional Studies Division. A first-year student is a student who, at the time of registration, has fewer than 30 semester hours of college credit in courses carrying degree credit and who is registered in at least one course for credit. Students are expected to spend at least two hours per week in preparation for each hour of class lecture or recitation. Thus, if the student enrolls for 15 credit hours, then at least 30 hours per week should be budgeted for class preparation. Some courses, such as laboratory courses, require students to attend additional contact hours, so students should plan their schedules accordingly. TCC reserves the right to restrict a student’s program to less than the full-time load permitted or to assign a student to a particular course or section of a course. Such decisions may be based on a review of the student’s previous academic record, on results of tests given at the time of registration or on commitments outside of college. The purpose of this restriction is to better meet the needs of the student. Students who are employed and attending school should carefully consider the number of credit hours they undertake to ensure sufficient study time. The College conforms to the definition of a college credit hour established in Florida law when developing the academic calendar: one college credit is based on the learning expected from the equivalent of fifteen 50-minute periods of classroom instruction. Credits for laboratory instruction, internships and clinical experience are determined based on the proportion of direct instruction to the laboratory, internship or clinical practice hours. The number of college credit hours to be awarded for a course is initially determined through the academic course-approval process overseen by the Academic Planning Committee and approved by the TCC District Board of Trustees. The committee recommends the number of credit hours based on the commonly accepted practice of the student learning achieved by direct faculty instruction, combined with independent study, each week, over a period of 15 weeks. For online courses, variations in direct faculty instructional time are determined based on a learning equivalency to the 15-week requirement. This equivalency is established through a formal approval process. Variations in the total number of minutes in a 15-week semester or express session may occur due to calendar dates and holidays. In these cases, equivalent instruction is achieved through alternate modes of delivery, and equivalent learning is assured through clearly defined learning outcomes. A deficiency of more than one contact hour per credit hour in any regular or express session must be formally approved by the Academic Planning Committee. The College also awards career credit, preparatory credit and noncredit courses in accordance with Florida law. The time periods referenced in the following policies pertain to classes that begin and end in accordance with the traditional college term. Classes conducted in a nontraditional format (e.g., express schedules or variable starting dates) have different deadlines. View the Academic Calendar for exact dates. The withdrawal policy applies to all credit students, including TCC Online students. TCC has one withdrawal deadline, which is equivalent to the midpoint of the term for each session. The process for withdrawal before the deadline must be initiated by the student. View the Academic Calendar for published withdrawal dates for each term and session. In accordance with State Board of Education Rule 6A-14.0301, students are permitted a maximum of two withdrawals per course. Upon the third attempt, the student will not be permitted to withdraw and will receive a grade for that course. Students who wish to withdraw from classes may do so through TCC Passport by the official withdrawal deadline. Students seeking a withdrawal who submit their request before the withdrawal deadline will receive a grade of W recorded on their permanent record for each course in which they were enrolled at the time of withdrawal. No instructor signature is required. However, special permission to withdraw from a course or courses is required for certain student population types due to particular conditions associated with that population. These student population types must complete a paper withdrawal form and obtain the required permission from the designated authority. Third attempt in a course In accordance with State Board of Education Rule 6A-14.0301, students are permitted a maximum of two withdrawals per course. Students are not permitted to withdraw from a third attempt and must receive a grade for the course. Last (or only) course ​A student may not withdraw online from the last (or only) course on his or her schedule. Student must meet with an advisor to discuss implications of withdrawing from the institution. A paper withdrawal form is required and must bear the signature of an advisor. Students who are enrolled in online programs/courses should contact the online learning advisor for assistance. Communicate with the faculty member on a consistent basis throughout the semester to discuss the expected outcomes of the student’s progress in the course. Become familiar with TCC’s academic resources. Contact an advisor or a Student Affairs staff member to discuss the consequences of a withdrawal and to request additional assistance with regard to current and future personal and career goals. TCC faculty members do not automatically withdraw students who stop attending classes. Students who stop attending without withdrawing may receive a grade of F unless the instructor has issued an Administrative Withdrawal (AW). Faculty may choose whether or not to use the AW. The use of the AW to administratively withdraw a student is primarily based upon excessive student absences (see Attendance). Faculty members publish their AW criteria in the course syllabus. Faculty members whose practice is to withdraw students by using the AW grade must do so by the College’s established withdrawal deadline. The AW may also be employed to remove student(s) from the class roster as a disciplinary measure imposed as a result of student judicial hearings by action of the vice president for student affairs. Students may appeal the AW as with other withdrawal appeals as noted below. A grade dispute is a claim levied by a student who believes that his or her course grade is incorrect, either through clerical error or the result of inaccurate grading by an instructor. As a general principle, it is the responsibility of the student to establish the grounds for any change of grade. All grade disputes must be initiated within one year of the disputed grade being first awarded. Once initiated, all student grade disputes will be addressed within the time frame established in the following procedures. Students who wish to appeal for a change of grade based upon withdrawal after deadline should review the policy above. Students should contact the appropriate dean for more information. An appeal will not be considered because of general dissatisfaction with a grade, penalty or outcome of a course. Disagreement with the instructor’s professional judgment of the student’s work and performance is also not an acceptable basis for an appeal. The student confers with the instructor that issued the grade as soon as possible after the grade is issued, but no later than one year after the grade is posted to the student’s record. If the instructor is no longer at the College or is not working that term, the student may notify the division dean, who will then determine how to proceed in the absence of the instructor. If the appeal is not resolved, the student confers with the Dean within five working days. The dean may ask for documentation as well as a written statement explaining the student’s rationale. If the appeal cannot be resolved at this level, the student may then petition the provost within five working days. The provost will require the student to submit in writing all of the pertinent facts and supporting documents. The signed appeal shall be submitted to the provost within 10 working days of the initial meeting with the provost. If the student does not provide the written appeal within 10 working days, the procedure shall terminate. If the student provides the written appeal to the provost within the agreed time period, the provost will investigate. The student will be notified within 10 working days of the decision of the provost or if the appeal requires a hearing by the Academic Appeals Committee. If the provost determines that the appeal meets the criteria, he or she will convene the Academic Appeals Committee to consider the complaint. The provost will notify the student of the Academic Appeals Committee meeting date, his or her rights, and the next steps in the process. The decision of the provost will be final. “Excess hours” are defined as hours that go beyond 110% of the hours required for a baccalaureate degree program. For example, if the length of the program is 120 credit hours, the student may be subject to an excess hour surcharge for any credits attempted beyond 132 credit hours (120 x 110%). The following do not count as excess hours: credits earned through an articulated accelerated mechanism such as Advanced Placement (AP), International Baccalaureate (IB), Cambridge Advanced International Certificate of Education (AICE), or dual enrollment; withdrawals due to medical or personal hardship; credit hours required for certification, recertification or certificate programs; credit hours taken by active-duty military personnel; credit hours required to achieve a dual major taken while pursuing a baccalaureate degree; developmental education and English as a Second Language credit hours; and credit hours earned in military science courses that are part of the Reserve Officers’ Training Corps (ROTC) program. Students whose educational plan may include earning a bachelor’s degree should make every effort to enroll in and successfully complete those courses that are required for their intended major on their first attempt. Students intending to transfer to a state university should identify a major or transfer program early and be advised of admission requirements for that program, including the approved common prerequisites. Course withdrawals and/or repeats, as well as enrollment in courses nonessential to the intended major, may contribute to a potential excess hours surcharge. Audit students must meet the same admission standards as credit students. The student is responsible for determining from the instructor what participation, if any, will be required. Approval of the dean is required to audit a particular course. Students registering for credit will have priority over auditing students when class size is a consideration. Students must pick up the audit form, complete and obtain the signature of the academic dean, and return the form to the Admissions and Records office. Fees for courses audited are the same as for those courses taken for credit. Courses taken on an audit basis do not qualify for financial aid. Students who have met developmental requirements through previous satisfactory grades or appropriate test scores may audit developmental classes. Until the published withdrawal deadline for the session, an instructor may administratively withdraw any audit student who excessively abuses the attendance policy. Students are not permitted to repeat courses in which they have received grades of C or better, or to earn forgiveness after they receive the Associate in Arts degree. Courses may be repeated if they are designated as repeatable, such as music or journalism, or are individualized courses of study; if they are required to be repeated by a regulatory agency; or if they are being repeated as part of a regulatory requirement for continuing education to stay current in the field, such as for teacher certification. Students should meet an advisor in the TCC Advising Center to discuss circumstances and to start the appeals process. Fourth attempt appeals are reviewed by the Enrollment Appeals Committee. In accordance with s. 1004.93, s. 1004.94, s. 1009.28 and s. 1009.285, F.S., students enrolled in the same developmental or college-level course more than two times shall pay the full cost (100 percent) of instruction, except in approved cases of extenuating circumstances. A final examination/activity is required in all courses except those specifically exempted by the Academic Planning Committee. For some courses, departmental policy requires that the student take the final exam before a passing grade can be earned. For all other courses, a student who does not take the final exam and is not eligible for a makeup exam will receive a zero for the exam. The zero will be averaged into the course grade. The faculty may not change the final examination schedule without prior approval from the provost. Student requests for alternate time to take the exam may be considered by the instructor in consultation with the dean. Such requests must be submitted to the instructor in advance. A student who reports to and takes any part of a final examination ordinarily will not be allowed to defer or retake that final. A student who is absent from a final examination due to illness, court-mandated appearance or other extreme emergencies must contact the appropriate dean immediately and provide reliable evidence of these situations. Final examinations may be rescheduled only for extreme emergencies. All changes to final exam schedules must be approved by the appropriate dean. TCC Online supports on-campus education by providing students the opportunity to pursue programs of study in alternative formats. Staff partners with TCC academic and student affairs units, the Workforce Development Division, and the Florida Public Safety Institute to ensure that high-quality online courses are offered and comprehensive student support services that foster the intellectual, career, academic and personal development of students are available. The guiding principles are student engagement, student development and student success. For information, contact TCC Online at (850) 201-9400 or [email protected]. Learning formats offered by TCC include hybrid and online instruction. These courses are excellent options for nontraditional students and students seeking alternative learning environments. Online: A course that is web-based and delivered via the College’s course learning management system. Lecture material, assignments and other course materials are available online. All coursework is completed online; tests may be taken at the Testing Center or at an approved proctored site. Online courses are typically conducted totally through the TCC Canvas learning management system, with few or no campus visits. Faculty and students communicate with one another through chat, email, discussion boards, web conferencing and other tools within the online course environment. Students may be required to purchase software for selected courses. Open computer labs are available on campus for students’ use in completing their coursework. These labs are equipped with the hardware and software necessary for student success. For information regarding technical requirements, including browser compatibility, visit the TCC Online webpage. For assistance with technical problems, contact the Help Desk at (850) 201-8545 between 8:00 a.m.-7:30 p.m. Monday-Thursday and 8:00 a.m.-5:00 p.m. on Friday. Limited Canvas assistance is available after 5:00 p.m. Monday - Thursday. Support services are available to assist students in being successful as online learners. Students interested in becoming online learners should first be accepted through the TCC admission process, and then contact the academic advisor ([email protected]) to help with course registration and other related questions. Students can purchase textbooks and course-related materials by contacting the TCC Bookstore at [email protected] or at (850) 575-9200. Students may also visit the bookstore on the main campus. The William D. Law Learning Commons offers students and faculty a broad range of services, including diagnostic assessment, learning materials and electronic resources; individual conferences; one-on-one and small group tutoring; whole class support; workshops and seminars; success strategies; technology; and multimedia support and assistance in developing and assessing individual learning plans. The Virtual Learning Commons is also available to provide services comparable to those provided in the Learning Commons to students working online. All of the online resources, online tutoring, workshops and virtual study rooms are available in the Virtual Learning Commons. Contact the Learning Commons at [email protected] or (850) 201-8193. Students may request library assistance through Ask a Librarian. Through this service, students can text, email or chat online with a reference librarian. Students who take online courses may come to the main campus to take exams. Visit the Testing Center website (www.tcc.fl.edu/testingcenter) for information. Online learners who reside outside of Leon, Gadsden and Wakulla counties may use proctor services for web course testing. Please contact the testing office at (850) 201-6440 for details. The College maintains various records to assist students enrolled in traditional or online course environments in achieving their educational goals. These records are regarded as confidential, and information contained in them can be released only with the written permission of the student. **Incomplete: A special circumstance where a student who is passing a course and has completed a majority of the required coursework may, with the permission of the instructor, be allowed to receive a grade of Incomplete. This permission is granted only for exceptional reasons. Grades of “I” are not assigned to any courses if a student withdraws from the College or to avoid an earned grade. It is the responsibility of the student to make the necessary arrangements with the instructor concerned to satisfy the incomplete conditions. An “I” shall be changed to a final grade if the student completes the required work by the end of the next term, whether or not the student is enrolled for that term. An “I” not removed by the end of the next term (Fall, Spring, Summer) will revert to an F. Students called for active military duty will, at their request, be assigned “I” grades that will not convert to F grades for a period not to exceed two terms following the end of the term for which the “I” grade was assigned. Students who receive an “I” grade under this exceptional circumstance may receive a full tuition refund for the course in which “I” grades have not been removed by the end of the second term by requesting such a refund in writing to the vice president for student affairs no later than the last official class day of the second term. TCC has authorized the National Student Clearinghouse to provide degree verification for students who need to provide this information to potential employers, lenders or others. To obtain degree verification, go to National Student Clearinghouse Verification Services and follow the prompts. The student, company or agency requesting the verification may be assessed a convenience fee. Students who need enrollment verification for a specific time period (e.g., current term or academic year) for potential employers, lenders or insurance companies, will contact the National Student Clearinghouse, which provides enrollment verification for students who request it. Verification of enrollment for a term will be certified only after the fifth day of classes (i.e., the last day to drop a class) for that term. Certification is calculated on the date the request is made. If a student withdraws from courses in the current term, before the verification request, those courses will not be included in the total enrollment hours reported. To obtain enrollment verification, go to National Student Clearinghouse Verification Services and follow the prompts. The student, company or agency requesting the verification may be assessed a convenience fee. Final grades will be posted to TCC Eaglenet. Records cannot be released if the student has any outstanding financial obligations to the College. TCC partners with Credentials Solutions to provide official transcript order processing services. Students can order transcripts online 24 hours a day/7 days a week with customer service provided Monday through Friday, 8 a.m. - 9 p.m. E.S.T. The combination of services includes online transcript ordering, electronic delivery of transcripts in PDF format and paper transcript delivery. The TranscriptPlus transcript ordering system uses an authentication process that is FERPA compliant and is able to electronically authenticate both current students and alumni, check for holds (transcripts will not be released for a student who has any outstanding financial obligation to the College), release transcript records once holds have been satisfied, and communicate with students via email and cellular text messaging throughout the process. To initiate the ordering process, students should log in to their TCC EagleNet account, go to the My Records tab and select the Transcript Request option. They will then be directed to the Credentials Solutions ordering system. Former students who do not have a TCC EagleNet account may go to Admissions and Records on the TCC website and select the Transcript Request link. TCC does not charge for transcripts; however, Credentials Solutions assesses a processing fee of $2.25 per transcript order being delivered electronically. Transcripts delivered via first class mail incur a charge of $4.50 (including the $2.25 processing fee). There are additional charges for transcripts requested to be delivered via other domestic or international rush delivery options. Students may print an unofficial transcript by logging in to their TCC EagleNet account, going to the My Records tab and selecting the View Unofficial Transcript option. TCC is pleased to recognize the academic accomplishments of its students each semester, as well as at graduation. Students who have satisfied all of their developmental courses, who enroll in at least six credit hours in a term and who complete all college credit hours attempted are eligible for honors recognition for that term. Students are notified of honors recognition through TCC email. President’s and Dean’s recognition is also noted on the official TCC transcript. Based on academic performance, TCC also recognizes students who are fulfilling their developmental courses. Students who are in developmental courses, who enroll in at least six hours in a term and who complete all coursework attempted are eligible for merit recognition. Merit recognition is not noted on the official TCC transcript. Students are notified through TCC email. Tallahassee Community College welcomes transfer students from all environments and accepts a broad range of transfer credit. Transfer credit is accepted for first-year and sophomore-level coursework and may be evaluated as to level, content, quality, comparability and degree program relevance by the faculty in the appropriate academic unit. In establishing the eligibility for transfer credit, the faculty may ask students to provide additional information, such as the original college catalog, course descriptions, course syllabi, stated learning-outcomes, assessment measures and sample student work. A maximum of 75% of the required credit hours for degree completion and graduation at the College may be accepted as transfer credit. The provost, working with the Academic Planning Committee, has institutional authority over all procedures for transfer credit, and the College Registrar has the authority to enact these procedures. These procedures are reviewed on a regular basis by the provost and the Academic Planning Committee. The College accepts transfer credit from all institutions that participate in the Florida Statewide Course Numbering System (SCNS). For certain exceptions to this articulation agreement, students should consult Exceptions to the General Rule for Course Equivalency in this catalog. Regionally accredited institutions that participate in Florida SCNS: In compliance with Florida Statute, students will receive direct transfer credit for any courses taken at these institutions. Students will need to provide official transcripts, but there will be no further review of the transfer credit by faculty. Nonregionally accredited institutions that participate in Florida SCNS: In compliance with Florida Statute, students will receive direct transfer credit for any courses taken at these institutions. Students will need to provide official transcripts, and the College registrar will establish that the institution and course is listed as transferable on the SCNS website. If so listed, there will be no further review of the transfer credit by faculty. Regionally/nationally accredited institutions that do not participate in Florida SCNS: Students may receive transfer credit for courses taken at these institutions, but students are required to provide, in addition to the official transcript, documentation as to the level, content, quality, comparability and degree program relevance of the course. This material will be evaluated by faculty in an appropriate academic unit. Nonregionally/nationally accredited institutions: Students may receive transfer credit for courses taken at these institutions, but students are required to provide, in addition to the official transcript, documentation as to the level, content, quality, comparability and degree program relevance of the course. This material will be evaluated by faculty in an appropriate academic unit. Students may not receive credit by examination for any course in which they have already earned college-level credit. College credit may be awarded based on ACE recommendations, but that recommendation is subject to faculty review to establish equivalency. The College awards only those credits appropriate to the student’s degree program. Because most credits for military experience will be recognized as electives only, students should seek guidance from a college advisor before requesting this credit in order to understand any implications related to excess hours or other concerns. International students must provide official or certified copies of all postsecondary transcripts and other examination results. All academic records must be issued in the native language and be accompanied by a certified English translation. Transfer students interested in receiving transfer credit for coursework completed at non-U.S. postsecondary institutions must provide a course-by-course evaluation done by a certified evaluation agency that is a member of the National Association of Credential Evaluation Services (www.naces.org) or the International Education Credential Services provided by the American Association of Collegiate Registrars and Admissions Officers (www.aacrao.org). Examples of such agencies include World Education Services (www.wes.org) and Josef Silny & Associates (www.jsilny.com). Any costs associated with the evaluation are the student’s responsibility. All evaluations must be in English. Additional documents may be required by faculty in the academic unit chosen to evaluate the credit. Students are able to earn three hours of credit for CGS1000 Introduction to Computer Technology by passing a competency examination administered by the Business, Industry and Technology Division. An additional fee is charged for this examination. Students are able to earn three hours of credit for CGS1060 Computer and Internet Literacy by passing the IC3 FastTrack competency examination. An additional fee is charged for this examination. Students who earn a Postsecondary Adult Vocational (PSAV) certificate in certain disciplines may receive college credit toward a program of study (A.S. degree). TCC recognizes a number of agreements, and each agreement outlines the exact requirements for earning credit. Exemption credit will be awarded only after successful completion of nine credit hours of coursework in the specific A.S. degree program at TCC. For a list of all state articulated agreements, visit the Florida Department of Education website. For more information about exemption credit, contact the program division or an academic advisor. The State Board of Education has approved Gold Standard Career Pathways Articulation Agreements for earned industry certifications that allow students block credit. The College awards block credit for the certifications if the degree is offered at the College and the student meets the requirements identified in the Gold Standard Career Pathway. Contact the dean of Business, Industry and Technology for more information. The College has also entered into articulation agreements with area high schools in TCC’s three-county area (Gadsden, Leon, Wakulla) and has pre-approved certain certifications for course credit equivalency without further review. Detailed information about these agreements can be obtained from the Business, Industry and Technology Division. To receive credit for past noncollege experience, students are required to complete a request for an evaluation of noncollege learning. Once the request is submitted to the Associate Vice-President of Academic Affairs, the student will self-enroll in a Prior Learning Portfolio Development Course that is offered through the Council for Adult and Experiential Learning (CAEL). At the completion of the course, the student will submit the portfolio to CAEL for faculty evaluation. CAEL will then issue a National College Credit Recommendation Service/Learning Counts transcript. The course recommendation will include lower or higher semester credit equivalencies, the name of the course for which the student should receive credit, and a brief description of the course. This recommendation is then subject to review by faculty to ensure equivalency. Students must be admitted to the program to which the credit will apply, and students must have earned at least 12 college credit hours. Credits will be held in escrow until this requirement is met. No more than 25 percent of total credit required for any program may be awarded through experiential credit. Students may not receive credit for prior learning for courses in areas where the student has already received college credit. General Education courses required in the student’s program of study cannot be earned through experiential credit. Procedures for the assessment of prior learning are developed and regularly reviewed by the provost in conjunction with the Academic Planning Committee. Students must complete the requirements shown in the College catalog for the year in which they enter the College. If graduation requirements change during a student’s attendance, the student may elect to satisfy either the new requirements or the ones in force at the time of enrollment, provided the student has maintained continuous enrollment. Continuous enrollment may be claimed if the student satisfactorily completes at least one course during the Fall or Spring term. If a break in enrollment of more than 12 months occurs, the student may be required to complete requirements for graduation under the catalog in force at the time of re-entry. Upon re-admission to the College, please see an academic advisor to determine whether you have satisfied the General Education requirements and/or foreign language competency under a previous catalog. Students enrolled in healthcare programs will be required to fulfill graduation requirements specified in the catalog for the year in which they enrolled in their first healthcare program course. If a student withdraws before completing the program and is later re-admitted, the student must fulfill the requirements in force at the time the student returns to the program. Sign on to TCC Eaglenet. Under the advising tab at the top, select “Graduation Application” on the drop down menu. Select the program objective for which you wish to apply for graduation. If you have multiple objectives, you must submit a graduation application for each objective. Register for and complete the online graduation workshop. Confirm that your name and address in the student database are correct for printing your name on the diploma and for mailing your diploma after graduation. You may change your address through TCC Passport or in the Admissions and Records office. Once you have clicked on Apply for Graduation, you have successfully completed the steps required to apply for graduation. Note: If you feel that an error may have occurred while applying for graduation, call the Admissions and Records office at (850) 201-8555 to verify that your application was processed. Purchase your cap and gown in the TCC Bookstore. Commencement ceremonies are held during the Spring term each year. Information about the ceremony will be mailed during the Spring term. Students who graduate with a cumulative grade point average of 3.0-3.49 are considered Honor Graduates. This honor is denoted in the commencement program by a single asterisk and on the diploma by an honor seal. Students who graduate with a cumulative grade point average of 3.5-3.99 are considered Honor Graduates/Dean’s List. The denotation in the commencement program is two asterisks and the diploma will include an honor seal. Students who graduate with a cumulative grade point average of 4.0 are considered Honor Graduates/President’s List. The denotation in the commencement program is three asterisks and the diploma will include an honor seal. The names of students who graduate from the Honors Program will show in bold italics in the commencement program. The diploma for a graduate who is a member of Phi Theta Kappa will include a PTK seal if the student graduates with a cumulative GPA of 3.35 or higher. A formal commencement ceremony is held once each year at the end of the Spring semester. All graduates of the previous Summer and Fall terms will be invited to participate in the ceremony with the Spring semester graduates. For information, contact the Division of Student Affairs at (850) 201-8490 or visit the commencement webpage.
2019-04-24T04:08:56Z
http://catalog.tcc.fl.edu/content.php?catoid=13&navoid=1706
Soluble growth factors present in the microenvironment play a major role in tumor development, invasion, metastasis, and responsiveness to targeted therapies. While the biochemistry of growth factor-dependent signal transduction has been studied extensively in individual cell types, relatively little systematic data are available across genetically diverse cell lines. We describe a quantitative and comparative dataset focused on immediate-early signaling that regulates the AKT (AKT1/2/3) and ERK (MAPK1/3) pathways in a canonical panel of well-characterized breast cancer lines. We also provide interactive web-based tools to facilitate follow-on analysis of the data. Our findings show that breast cancers are diverse with respect to ligand sensitivity and signaling biochemistry. Surprisingly, triple negative breast cancers (TNBCs; which express low levels of ErbB2, progesterone and estrogen receptors) are the most broadly responsive to growth factors and HER2amp cancers (which overexpress ErbB2) the least. The ratio of ERK to AKT activation varies with ligand and subtype, with a systematic bias in favor of ERK in hormone receptor positive (HR+) cells. The factors that correlate with growth factor responsiveness depend on whether fold-change or absolute activity is considered the key biological variable, and they differ between ERK and AKT pathways. Responses to growth factors are highly diverse across breast cancer cell lines, even within the same subtype. A simple four-part heuristic suggests that diversity arises from variation in receptor abundance, an ERK/AKT bias that depends on ligand identity, a set of factors common to all receptors that varies in abundance or activity with cell line, and an “indirect negative regulation” by ErbB2. This analysis sets the stage for the development of a mechanistic and predictive model of growth factor signaling in diverse cancer lines. Interactive tools for looking up these results and downloading raw data are available at http://lincs.hms.harvard.edu/niepel-bmcbiol-2014/. Receptor tyrosine kinase (RTK) signaling is an important form of cell-cell communication involving 58 human receptors falling into 20 families . Each RTK binds to one or more soluble or membrane-bound ligands (growth factors) that promote the formation of receptor homo- and hetero-oligomers and assembly of multi-component signaling complexes (except that the ErbB2 RTK has no known ligand and normally functions as a hetero-oligomer). Receptor-bound signaling proteins activate ‘immediate-early’ signaling by MAPK, PI3K/AKT, and other kinase cascades and regulate motility, differentiation, adhesion, proliferation and cell survival. The biochemistry of RTK signaling proteins has been characterized extensively, but relatively little systematic data are available on the diversity of signaling responses mediated by these proteins across cell lines. Many RTKs are mutated, over-expressed, or dysregulated in cancer and a large number of anti-cancer drugs targeting RTKs are in use or in development . In some cases these drugs bind primary oncogenic drivers such as ErbB2, which is overexpressed in the HER2amp breast cancer subtype , or ErbB1, which is mutated in non-small cell lung cancer . In other cases, RTKs promote oncogenesis or alter drug sensitivity by responding to paracrine and autocrine ligands present in the microenvironment, produced either by the tumor itself or by the surrounding stroma. For example, the presence of ErbB ligands in colorectal cancer is correlated with increased survival following treatment with cetuximab, a therapeutic antibody targeting EGFR [5, 6]. Conversely, the presence of ErbB ligands promotes resistance to ErbB therapy in other cancers [7–9] and HGF production by stromal cells is a factor in the preexisting resistance of BRAF-V600E melanomas to vemurafinib . The latter observation is one motivation for clinical development of drugs inhibiting the HGF receptor cMet . To date, systems-level studies of immediate-early signal transduction have focused primarily on increasing the number of proteins analyzed. For example, mass spectrometry has revealed the kinetics of phosphorylation of approximately 1,000 substrates in EGF-treated HeLa cells , and reverse phase lysate arrays have provided data on approximately 50 substrates in five cell lines exposed to seven growth factors , and on six isogenic lines ectopically over-expressing individual RTKs . Analysis of receptor-mediated signal transduction in a particular tumor cell line is subject to the criticism that no line is representative of human cancer. However, generalizing across cell lines is complicated by the occurrence of large, but poorly characterized, variability. Recent genomic and expression profiling experiments have demonstrated the value of systematically analyzing such variability and it appears that a significant fraction of the complexity of specific human cancers can be captured using banks of genetically diverse cell lines [14, 15]. In this paper we analyzed growth factor responsiveness in a canonical collection of 39 breast cancer cell lines of the NCI-ICBP43 set, whose genotypes span many of the mutations observed in primary disease . The data comprised the phosphorylation levels of ERK (MAPK1/3) and AKT (AKT1/2/3) kinases following exposure to 15 different growth factors at two doses and three time points, as well as the abundance and phosphorylation levels of over 20 RTKs . The goals of the analysis were to: (i) characterize the diversity of response and determine how it mapped to clinical subtypes, (ii) identify factors that controlled the magnitude and duration of ligand response, and (iii) generate a simple means to look up and compare ligand-response data that have hitherto been unavailable or scattered across the literature. We found that breast cancer cell lines exhibit highly diverse responses to growth factors with lines belonging to the “triple negative” (TNBC) subtype being the most broadly responsive and HER2amp lines the least. The magnitude of ligand responses appeared to be determined by four primary factors: the identity of the ligand, the abundance of the cognate RTK, regulators common to all receptors but different for AKT and ERK and differing in levels or activity with cell type, and indirect negative regulation mediated by the ErbB2 receptor. The significance of these factors varies depending on whether fold-change or absolute response is regarded as the biologically significant feature. We generated a multidimensional growth factor response dataset with axes corresponding to cell line, ligand identity, ligand dose, exposure time, and downstream target (see Additional file 1: Table S1). To facilitate visualization of the data we constructed a set of node-edge graphs (one per cell line) in which the diameter and shading of a node is proportional to the logarithm of the steady state protein abundance and basal phosphorylation level, respectively. The weight of an arrow connecting ligands to pAKT (red) or pERK (blue) denotes the magnitude of the response based on the maximal value across time points at the highest dose. Under the starvation conditions used for these assays, basal phosphorylation levels are likely to reflect autocrine signaling, the presence of activating mutations in signaling proteins, or, in the case of cells expressing high levels of ErbB2, receptor auto-activation . Edges linking ligands to receptors are a representation of published binding data (see Additional file 2: Table S2) and differences in affinity are not depicted. Comparing MCF7, BT-20, and MDA-MB-453 cells (Figure 1A-C; node-edge graphs for all lines are found in Additional file 3 and at a dedicated website ), we see that pERK was induced by many more ligands than pAKT in MCF7 cells, pAKT and pERK were induced to a similar extent by multiple ligands in BT-20 cells, and only FGF-1/2 and ErbB ligands (EGF, BTC, HRG and BTC) elicited a significant yet muted response in MDA-MB-453 cells. Thus, breast cancer cell lines are broadly responsive to growth factors, but the extent of pERK and pAKT induction varied dramatically with the line. The connection between RTK level and ligand responsiveness was not immediately obvious (compare the size of the RTK nodes to the thickness of blue and red edges): for example, MCF7 and MDA-MB-453 expressed similar levels of insulin receptor, but only MCF7 cells had a significant response to insulin at the level of pAKT induction. Landscape of signaling responses across breast cancer cell lines. (A-C) Node-edge graphs of (A) MCF7 (A), BT-20 (B), and MDA-MB-453 (C) depicting induction of pERK (blue arrows) and pAKT (red arrows) by different ligands. The arrows’ thickness denotes the maximum induction across all time points and doses, normalized for each target across all cell lines and ligands. Gray arrows denote non-significant responses (less than two standard deviations above the control). Outer and inner circles represent basal measurements where the diameter is proportional to the logarithm of the expression level and shading to the logarithm of the phosphorylation level; data were normalized across all cell lines. pFGFR1-4 were not measured. Gray outer circles and labels denote expression levels below the detection threshold and their diameter denotes the minimal circle size. Lines show which ligands bind which receptors (Additional file 2: Table S2). (D-F) Fold-change in pERK (D-E) or pAKT (F) levels following exposure of cells to EGF (D, F) or HRG (E). Trajectories for six specific cell lines are highlighted in color; all other trajectories are represented in gray. (G-I) Average node-edge graphs for each breast cancer subtypes: TNBC (G), HER2amp(H), and HR + (I). Edges and nodes have the same meaning as in (A) except that circle size, intensity of shading, and edge width are proportional to the interquartile mean across lines of the subtype. (J) Fraction of cells of each subtype showing significant pERK or pAKT responses following exposure to ErbB, FGF, IGF/INS, or HGF ligands at 1 ng/ml. Wilcoxon’s rank-sum P-values are shown. (K) Distribution of the cell line mean fold-change following stimulation at 100 ng/ml of the same ligands as in (J). (L) Distribution of cell line median pathway bias of the same ligands as in (J). Overall, approximately 60% of cell-ligand combinations resulted in significant induction of pERK (where significant means a signal two standard deviation above the mean of untreated control cells) and approximately 50% of combinations resulted in pAKT induction. Ligands that bind to ErbB receptors were the most broadly active (every tested ErbB ligand elicited a significant response in at least 35 lines), followed by FGF-1/2, HGF, and IGF-1/2, consistent with the known importance of these ligands in breast cancer biology. pERK induction ranged from statistically insignificant to more than 600-fold in CAMA-1 cells exposed to HRG. Moreover, induction of pERK was transient in some cell lines (for example, MCF-7, MDA-MB-453; Figure 1D) and sustained in others (for example, CAMA-1, BT20). Even within a single ligand family, substantial differences in relative responsiveness were observed: HRG and EGF induced pERK to the same degree in BT-20 and T47D cells, but HRG was much more potent than EGF in CAMA-1 and MCF-7 cells (Figure 1D, E). Differences were also observed with respect to which downstream kinases were activated: BT-20 and T47D cells were highly responsive to EGF at the level of pERK and pAKT, whereas EGF induced only pERK in CAMA-1 and MCF-7 cells (Figure 1D, F). This did not arise because the AKT pathway is defective in CAMA-1 and MCF-7 cells since HRG, another ErbB ligand, induced pAKT in both cell lines. In the clinic, breast cancers are classified into HER2amp, hormone receptor positive (HR+), or TNBC subtypes based on the expression levels of the ErbB2 tyrosine kinase and the estrogen and progesterone nuclear hormone receptors (ER/PR). We found that TNBC cell lines as a group (Figure 1G) exhibited relatively low expression of receptors other than EGFR and had low basal pAKT or pERK activity compared to the other subtypes (Figure 1H, I). However, in these cells, pAKT and pERK were more responsive to a wider range of growth factors than in any other subtype (Figure 1J). This included responsiveness to HRG, despite the fact that HRG functions via ErbB2-containing receptor heterodimers and ErbB2 is notionally absent in TNBCs (in fact, ErbB2 is present at 104 to 105 molecules per cell, a high level for an RTK, albeit lower than the 106 to 107 molecules per cell observed in HER2amp cells). As expected, HER2amp cell lines exhibited the highest expression of ErbB2 and this correlated with high basal pErbB1-4, pERK and pAKT (Figure 1H, Additional file 4: Figure S1). In cells of this subtype, only ErbB ligands induced a significant response, and this was generally modest, relative to TNBC cells, as measured by fold-change in activity (Figure 1K). Finally, HR+ cell lines were characterized by higher levels of ErbB3, FGFR4, and IGF1R than cell lines from other subtypes (Wilcoxon’s P = 0.0015, P = 0.014 and P = 0.021, respectively), strong responsiveness to FGF1/2 and HRG (Figure 1I), and by a bias of ligand responses toward pERK (Figure 1L). We used clustering to determine which characteristics of immediate-early signaling are most variable across our dataset, and whether they correlate with cell line, ligand identity, or receptor family. Unsupervised k-means clustering (with k = 4) of the time-series data identified trajectories that correspond to sustained, transient, late, or no response (Figure 2A; Additional file 5). These clusters are similar to trajectories previously identified by analysis of phospho-mass spectrometry, ELISA, and reverse phase lysate array data obtained from one or a few cell lines [11–13, 20]. We found that approximately 50% of all significant ligand responses were sustained and the remainders were split equally between transient and late responses (Additional file 6: Figure S2A). The responses in the sustained cluster were significantly stronger than those in other clusters (Additional file 6: Figure S2B, C). Neither dose nor downstream target (that is, pERK or pAKT) were major determinants of temporal class, but the identity of the ligand was: induction of pERK and pAKT by ErbB ligands was usually sustained (Figure 2B, first column) whereas induction of pAKT by IGF/INS ligands was either sustained or late (Figure 2B, second column). In contrast, FGF-1/2 ligands were most likely to induce transient responses (Figure 2B, third column). Fewer cell lines were responsive to the other ligands tested, and significant responses were split roughly equally among sustained, transient, and late (Figure 2B, fourth column). Ligands elicit different response kinetics and exhibit distinct dose-response behavior. (A) Clustered response trajectories (red: sustained; blue: transient; off-white: late). Black lines represent the median response and colored zones the interquartile range; dashed lines depict 10% and 90% quantiles. (B) Distribution of all responses by ligand family and downstream target for ErbB ligands, IGF/INS ligands, FGF-1/2 and all remaining ligands (data for 100 ng/ml are shown). (C-D) Distribution of sensitivity classes by ligands for pERK (C) and pAKT (D): ‘Equal’ means that the fold-change response at low dose is at least 75% of the high dose response; ‘100 ng >1 ng’ means that low dose response is statistically significant but less than 75% of the high dose response; off-white means only the high dose response is significant. (E-F) Distribution of fold-change response by ligand, clustered by strength of the pERK (E) or pAKT (F) response at high ligand levels. Black lines represent the median, shaded zones the interquartile range, dashed lines the 5% and 95% quantiles, and dots the outliers. Darker gray is used for the clusters with the strongest responses. Comparing response data between the two doses tested, we found that pERK was maximally responsive to 1 ng/ml EGF in some cell lines (for example, BT20, MCF7, T47D and HCC-1954; Additional file 6: Figure S2D), but in other lines responses increased between 1 ng/ml and 100 ng/ml EGF (MDA-MB-453), and in yet other cases (CAMA-1) responses were observed only at the higher ligand concentration. Classifying response into four groups based on dose (Additional file 6: Figure S2E-F; Additional file 5) revealed that ErbB and FGF ligands were split between the groups ‘equal’ response and ‘increased at the highest dose’ , whereas HGF, IGFs, and insulin were generally active at ‘100 ng/ml only’ (Figure 2C, D). Sensitivity to low ligand doses did not necessarily coincide with strong activation at high dose, but it was strongly correlated with ligand identity. This implies that ligand identity, rather than cell type or downstream pathway, is the main determinant of low-dose responsiveness (Additional file 6: Figure S2G). This contrasts with data on the magnitude of the response, in which there is substantial variability from line to line (Figure 2E-F). For each downstream target we identified ligands that generally show strong (dark gray) or weak (light gray) responses. ErbB ligands and HGF elicit strong responses for both the ERK and AKT pathways. In contrast, IGF-1 elicited a strong response only at the level of pAKT and FGF-1 at the level of pERK. We summarize this data in reference tables that encode the magnitude of response, the kinetic clusters and the sensitivity classes for pAKT (Figure 3A) and pERK (Figure 3B). Summary of ligand responses across all cell lines. Data for pAKT (A) and pERK (B) in which each subplot shows the results by ligand and cell line. The upper bar is colored according to the sensitivity class (as in Figure 2C, D), the black bars show the maximal fold-change response for 1 ng/ml (left) and 100 ng/ml (right), and the color of the lower bar corresponds to the kinetic cluster for 1 ng/ml (left) and 100 ng/ml responses (right; color coded as in Figure 2A, B). Cell lines are grouped by subtype and ligands by family. To characterize the selectivity of receptors for downstream pathways, we computed a “pathway bias” based on the maximum pAKT and pERK responses for each ligand (note that responses for the two kinases were scaled so they could be compared directly; in the absence of scaling, pERK exhibited higher fold-changes). We found that whereas EGF elicited symmetric pERK or pAKT induction, the FGF-1 response was heavily biased towards pERK, and the response of IGF-1 was biased to pAKT (solid lines in Figure 4A and distributions in Figure 4B). On average, ligands from the same family exhibited a similar pERK-pAKT bias (with HRG being an exception among ErbB ligands; Figure 4C), but these averages obscure the fact that pERK and pAKT responses were only weakly correlated across cell lines (Spearman’s ρ = 0.30, P = 0.03, Figure 4D), making the pathway bias for a given ligand remarkably variable. In contrast, fold-change pERK activation by different ligands was highly correlated within a cell line (Spearman’s ρ = 0.66, P = 4.0 · 10−6, Figure 4E) and the same was true of pAKT (Spearman’s ρ = 0.58, P = 1.2 · 10−4, Figure 4F). Thus, one or more factors common to all RTKs within a given cell line appear to play a significant role in pERK inducibility and a different set of factors control pAKT. Bias in response towards pERK or pAKT varies with ligand and cell line. (A) Scaled pAKT (vertical axis) and pERK (horizontal axis) responses in cells exposed to 100 ng/ml IGF-1 (off-white), EGF (red), or FGF-1 (blue) with shape denoting subtype. (B) Distribution of the “pathway bias” for the three ligands in (A) where the bias is defined as the arctangent of the scaled pAKT to pERK fold-change ratio. (C) Distribution of the pathway bias for all ligands that exhibited at least 50% significant responses across all cell lines (at 100 ng/ml). Ligands are sorted according to the median of their pathway bias. (D-F) Scatter plot of pAKT and pERK responses to EGF (D), pERK responses to EGF and FGF-1 (E), and pAKT responses to EGF and IGF-1 (F). Spearman’s correlation and P-value are reported. Ligand responses are commonly reported as the ratio of the peak to basal levels and several studies have concluded that such “fold-change” response is the determining factor in cellular phenotype [21, 22]. In other cases, however, the absolute signal strength following stimulation determines whether a threshold can be overcome . In the case of pERK fold-change following EGF stimulation, we observed no correlation with ERK protein levels, but EGFR levels were well-correlated (Figure 5A; Pearson’s r = 0.45, P = 0.004). Unexpectedly, basal pErbB2 and pERK levels were negatively correlated with pERK fold-change (Pearson’s r = -0.45, P = 0.004). This suggests that, for fold-change induction of pERK by EGF, EGFR is a positive regulator, pErbB2 a negative regulator and ERK level does not matter. The absolute level of induced pERK behaves differently, exhibiting little correlation with pERK or pErbB2 levels, but strong positive correlation with total EGFR level (Figure 5B). These trends are observed across ligands, such as EGF, HRG, HGF, PDGF, and SCF, for which there is a single primary receptor (Figure 5E). The correlation is not significant in the case of ligands such as FGF-1/2, and we speculate that this reflects the binding of FGF ligands to multiple FGF receptors. Expression levels of target receptors correlate with response. (A) The left panel depicts Pearson’s correlation of pERK fold-change in response to 100 ng/ml EGF and basal measures of the expression and phosphorylation levels of the downstream target, cognate RTK and pErbB2. Blue dots indicate correlations with P <0.05. The right panel shows the time course of pERK levels in response to EGF for individual cell lines with color denoting EGFR expression level (darker represents lower levels). (B-D) Plots as in (A) for absolute pERK levels in response to 100 ng/ml EGF (B); fold-change pAKT (C) and absolute pAKT levels (D) in response 100 ng/ml HRG. (E-F) Pearson’s correlation between pERK (E) and pAKT (F) fold-change response and the basal expression and phosphorylation levels of the downstream kinases, the level of pErbB2, and the basal and phosphorylation levels of the cognate receptor for all tested growth factors. Red denotes significant positive correlation and blue denotes significant negative correlation (P <0.05). In the case of pAKT fold-change in cells exposed to the ErbB2/3 ligand HRG, no correlation was observed with AKT, pAKT, or pErbB2 levels, but ErbB3 levels were positively correlated (Figure 5C). Absolute levels of induced pAKT levels were positively correlated with ErbB3 levels, and negatively with pErbB2 and basal pAKT levels (Figure 5D). Basal pErbB2, therefore, appears to play a different role in regulation of ERK and AKT. In retrospect, this difference can be discerned by examining time course data (illustrated in Figure 5A, C for EGF and HRG). Basal pAKT levels were highly variable across cell lines and correlated with pAKT levels post-induction: the higher the baseline the higher the absolute induced response and vice versa. This pattern was not observed for pERK: basal levels of pERK are generally low and fold-change is high. Similar differences between pAKT and pERK were observed for other ligands that predominantly bind to a single RTK (Figure 5E, F). Thus, indirect negative regulation by ErbB2 is not as important for pAKT as for pERK and receptor level is the major factor determining pAKT fold-change. The IGF/INS ligands are a striking exception to this rule. Fold-change of pAKT following exposure of cells to IGF-1 did not correlate with levels of IGF1R, but it was strongly negatively correlated with pErbB2 (Figure 6A). Even when cell lines were classified into IGF-1 responsive and non-responsive classes (independently of the magnitude of the response), no enrichment was observed with IGF1R levels (Figure 6B). This stands in contrast to most other ligands (Additional file 7: Figure S3) for which cells with high receptor levels are significantly more likely to respond. A possible explanation is the unusually strong negative correlation with basal pErbB2 levels, as illustrated in Figure 6C by a plot of pAKT induction by IGF-1 relative to IGF1R and basal pErbB2 levels (Figure 6C). Note that pAKT could be strongly induced in these cells by one or more other ligands, showing that there was no intrinsic defect in AKT signaling. We speculate that the connection between IGF responsiveness and IGF1R levels may be obscured by the interaction of IGF1R with ErbB2 [24, 25] or by the presence of IGF binding proteins that are known to modify IGF responses (reviewed in ) and that have been linked to resistance to anti-ErbB therapy [24, 27]. Strong cross-talk between IGF1R and ErbB2 may explain why over-expression of IGF1R induces resistance to the anti-ErbB2 antibody trastuzumab (Herceptin) . pAKT response of IGF-1 is negatively correlated with pErbB2 basal level. (A) Correlation of pAKT fold-change response in cells exposed to 100 ng/ml IGF-1 plotted as in 5A. (B) Distribution of relevant RTK expression or phosphorylation levels between lines exhibiting significant (red) or not significant (gray) pAKT response to IGF-1. Black lines represent the median, shaded zones the interquartile range, dashed lines the 5% and 95% quantiles, and dots the outliers. P-values were assessed by a Wilcoxon rank-sum test. (C) Projection of IGF1R and pErbB2 levels in each cell line overlaid with pAKT fold-change response in cells exposed to IGF-1. In this paper we describe a systematic analysis of RTK inducibility in a collection of breast cancer cell lines previously shown to span a significant fraction of the genetic variation observed in human disease. Each examined cell line expresses multiple RTKs at levels that vary from the limit of detection (ca. 100 molecules per cell) to over 107 molecules per cell. In general, the levels of RTKs are not highly correlated with each other and even HER2amp cell lines, which are defined by over-expression of ErbB2, are divergent with respect to the expression and basal phosphorylation levels of other RTKs . Thus, each cell line in our collection has a unique RTK fingerprint. These profiles as well as characteristics of the ligand responses are accessible on an interactive website along with the underlying data . Sensitivity to ErbB1-4 ligands is a dominant feature of the breast cancer cell lines we examined: all 39 lines exhibited a statistically significant response to at least one ErbB ligand (EGF, EPR, BTC, or HRG) and 31 of the 39 lines responded to all four ligands. ErbB receptors are ubiquitously expressed in epithelial cells and breast cancers originate primarily from epithelial ductal or lobular linings . However, it is striking that HER2amp lines, which express the highest levels of ErbB2, are quite insensitive to exogenous ligand: high ErbB2 levels correlate negatively with fold-responsiveness of pERK to growth factors such as the ErbB2/3 ligand HRG. In addition, pAKT responsiveness to IGF ligands and insulin is strongly negatively correlated with ErbB2 levels. In marked contrast, TNBC cells, which are notionally “negative” for ErbB2, are highly responsive not only to HRG but to ErbB ligands in general. Other ligands to which breast cancer cells commonly respond include FGFs, IGF/INS, and HGF. Responsiveness to SCF and PDGF is observed more sporadically, but can be as strong as responses to ErbB ligands when the cognate receptor is present. In general, responsiveness within the same family of ligands is highly correlated, likely because such ligands can bind overlapping sets of receptors. TNBC cells exhibit the greatest fold-change responsiveness to ErbB ligands, FGFs, IGF/INS, and HGF, and they also account for the preponderance of responsiveness to SCF and PDGF. It is tempting to speculate that one of the reasons TNBC tumors respond poorly to targeted therapies is that they are sensitive to diverse ligands present in the microenvironment, many of which have been implicated in drug resistance [7–10]. In contrast, HER2amp cancers are relatively insensitive to their microenvironment and are among the most treatable breast cancers. Few antibody therapeutics other than those against ErbB receptors have proven effective in breast cancer and this might be a matter not only of the importance of ErbB2 in HER2amp cells, but also the down-regulation of other signaling pathways in these cells. It nonetheless seems plausible that identifying the subset of HR+ and TNBC cells responsive to IGFs, FGFs, and HGF might serve as means to identify those sensitive to therapeutic intervention with anti-receptor antibodies other than trastuzumab. For example, a subset of TNBC tumors might be sensitive to the inhibition of the c-Kit and PDGFR receptors. The available data is as of yet insufficient for construction of a mechanistic model of the responsiveness of breast cancer cell lines to growth factors. We therefore propose a four-factor heuristic (Figure 7) which serves as a compact summary of our findings and can be used to predict the probable behavior of cell lines not in our collection. For example, from applying this heuristic we would expect an HR+ cell line with a high level of cMet to have a dose-sensitive response to HGF that is strongly skewed toward pERK. Flow chart of dependencies between basal levels and induced levels. This is a heuristic summarizing the primary determinants of cellular response to ligands at the level of pAKT and pERK. See text for details. The first factor in the heuristic is the abundance of the cognate receptor: fold-change, absolute response levels, and likelihood of response all correlate positively with receptor abundance. The exceptions to this rule are IGF/INS ligands, for which receptor levels and ligand responsiveness do not correlate. The second factor is ligand and receptor identity, which appears to specify whether pERK or pAKT is most strongly induced: ErbB ligands and HGF generally induce both pERK and pAKT, whereas FGF1/2 are ERK specific and IGF/INS are AKT specific. However, ligand-induced pERK/pAKT ratios vary significantly from one cell line to the next. This appears to involve a third set of factors, which comprises response determinants that are common to all RTKs in a particular cell line, but act differently on ERK and AKT pathways. These factors are largely unknown, but might include adapter proteins, phosphatases and so on, but it appears that these factors vary in abundance with subtype (for example, HR+ lines are biased toward high pERK response). The fourth and most unexpected factor is an “indirect negative regulation” by ErbB2: expression levels of pErbB2 negatively correlate with pERK fold-change for all ligands examined and are a dominant factor for IGF/INS response at the level of pAKT. Ligand-induced absolute pERK levels are not correlated with pErbB2, however, so the impact of the indirect negative regulation by pErbB2 signaling depends on whether fold-change or absolute level is the critical biological feature. Moreover, for all but IGF/INS, the phenomenon is reversed for pAKT: pErbB2 and basal pAKT levels (the latter of which can also be increased by PI3K/PTEN mutations, Additional file 8: Figure S4) are positively correlated with absolute pAKT levels following ligand treatment, but not with fold-change. Several factors are noteworthy by their absence as response determinants: these include absolute levels of ERK or AKT (presumably they are present in excess), and basal RTK phosphorylation (except in the aforementioned case of pErbB2), implying that even high autocrine activation does not block responsiveness to additional, exogenous ligand. Looking forward, mechanistic analyses are needed to understand how the wide diversity of network activities observed in a panel of breast cancer cell lines arises from the action of common sets of signaling proteins. Ascertaining the biochemical basis of indirect negative regulation by ErbB2 is also likely to be worthwhile, since our data imply that the high responsiveness of HER2amp tumors to anti-receptor therapy may be a function not only of the addiction to the ErbB2 oncogene, but also of the suppression of other signaling pathways that might function as resistance mechanisms in other tumor types. This would constitute a new concept in therapeutic design. Finally, further analysis of RTK expression, basal activity, and network inducibility, particularly in TNBC, may reveal possibilities for biomarker guided use of targeted drugs in blocking oncogenic pathways or resistance mechanisms in subsets of tumors. NCI-ICBP43 breast cancer cell lines were obtained directly from the ATCC (product 90-4300 K), confirmed to be Mycoplasma-free, and only early passage cultures were used. Only 39 cell lines were used for this work since four cell lines (DU-4475, HCC-2218, HCC-2157 and HCC-1599) were non-adherent and, therefore, not suited to our measurement methodology. Cells were plated to achieve approximately 75% confluence following growth in complete media for 24 h and then starved in serum-free media for 18 h (Additional file 1: Table S1). Cells were either lysed immediately or exposed to growth factors (diluted and stored according to the manufacturer’s recommendation; Additional file 1: Table S1) at a final concentration of 1 ng/ml or 100 ng/ml for 10, 30, and 90 minutes then lysed. Basal expression and phosphorylation levels of RTKs were measured using ELISA assays (Additional file 1: Table S1 for details). The levels of induced phospho-Erk1/2 (Thr202/Tyr204; pERK) and phospho-AKT (Ser473; pAKT) served as proxies for the activation of the MAPK and PI3K/AKT pathways and were also measured using ELISA assays. Basal expression and phosphorylation levels were normalized using recombinant standards and all measurements below the level of detection were set to the value of the detection threshold. The ligand responses were measured in duplicate and averaged in the log10 domain. Responses with values less than two standard deviations above the mean of the controls were considered to be non-significant (corresponding to approximately 1.2-fold change). For the calculation of pathway bias, the pAKT response was linearly scaled by a factor of 2.386 to minimize the Cramér-Von Mises distance between the distribution of pERK and pAKT fold-change responses. A detailed description of data collection and processing can be found in Niepel et al. and all data can be obtained at a dedicated website . Mario Niepel, Marc Hafner, Emily A Pace contributed equally to this work. We thank S. Chopra, C. Zechner, S. Rosenthal, J. Gray, G. Berriz, and J. Copeland for assistance. This work was support by NIH LINCS grant U54-HG006097, by grant U54-CA112967 (for access to ICBP43 cells), and by fellowships from the Swiss National Science Foundation (PBELP3_140652 and P300P3_147876) to M.H. PKS is a founder of Merrimack Pharmaceuticals and chair of its scientific advisory board; this relationship is actively managed by Harvard Medical School (HMS) in accordance with NIH regulations. BS is a shareholder in Merrimack Pharmaceuticals and a board member of SilverCreek Pharmaceuticals. MN, EAP, MC, DHC, and LZ performed all experiments. MH performed all analysis. MN, MH, and JLM designed the website; PKS and BS supervised the work and preparation of the manuscript. All authors read and approved the final manuscript.
2019-04-25T22:33:32Z
https://bmcbiol.biomedcentral.com/articles/10.1186/1741-7007-12-20
THE TAKE HOME: This blog contains a lot of the science that went unsaid in the 2017 February webinar and is designed to fill in some blanks for members on this topic. He who controls the sun properly can bring blood flow to the choroid surface (RPE) to energize red blood cells and the hemoglobin present in them. This is how phototropism works in the eye. The choroid/RPE has many correlates to the phototropism in plant chloroplasts in leaves. The choroid of the eye is primarily a vascular structure supplying the outer retina. The outer portion of the retina is where the photoreceptor melanopsin is loosely covalently bound to retinol. Melanopsin/retinol controls the neural signaling along the central retinohypothalamic tract. This tract connects the retina to the suprachiasmatic nucleus (SCN) which controls the circadian mechanism. This tract continues on and connects the retina and SCN to the leptin receptor in the hypothalamus. The leptin system, in turn, controls all growth and metabolism of the organism and this system controls the circadian release of hormones from the pituitary gland using specific light frequency changes present in AM sunlight. In December 2017 we have proof melanopsin/retinol are now in human skin, subcutaneous fat, and the skins arterioles. I will remind you that the subcutaneous fat mass links to the leptin receptor in the hypothalamus too using leptin and adiponectin as fat hormones. He who controls the frequency of sunlight via the eye and skin, calls the shots for the anterior pituitary hormones and its effect on human behavior and illness. Sunlight also controls the phototropism in leaves in plants as well. The universe doesn’t speak with words. It speaks in frequencies and those frequencies disturb the hydrogen bonds in water made by our matrix found around our proteins decipher this Rosetta code to innovate life. What makes outer space toxic to human astronauts and cosmonauts? Why does space induce genetic changes by altering the epigenetic program in the eye, RPE and the central retinohypothalamic pathways? Vitamin A in the retina and skin is very vulnerable to irreversible degradation in response to high-intensity light. The light in space from the sun is more powerful light than the light of the sun that hits Earth. Why? Outside the magnetosphere, the entire electromagnetic spectrum of light persists in the universe. This is why circadian disease and unusual eye diseases like pseudotumor cerbri and visual loss occur in astronauts quickly. They live in light evolution has not adapted too. Leaves and red blood cells both have a protein in them that is a porphyrin. Both proteins share a very common atomic structure. Porphyrins are light absorbers. C4 grasses are tropically adapted best to strong solar light (where UV light is present) whereas C3 are better in cooler climates where UV light is sparse. Is a similar thing happening with blood type in humans? Humans have type O, A, B, and AB blood as laid out in the webinar. C3 plants use C3 photosynthesis which uses CO2 in a 3-carbon compound and C4 plants use C4 photosynthesis which incorporates the CO2 in a 4-carbon compound. C3 plants like cooler weather and C4 plants like a stronger light. 85% of plants are C3 types. These compounds represent different types of sugar that is made photoelectrically from the joining of CO2 and water with sunlight. Photosynthesis is the process of combining light and nutrients of the soil to create energy plants can use. C3 and C4 photosynthesis go about this process differently. Most plants are C3 types. The advantage with C3 photosynthesis is that it is more efficient than the C4 variety under normal light conditions since it requires fewer enzymes. C3 plants use C2. Carbon Dioxide is used to create the 3-carbon compound G3P in order to produce usable energy. This is a glycolipid humans also use in their liver. The higher CO2 concentration in C4 plants means that the stomata (water region), the gas exchange part of the plant, do not need to open up to get any more, so less water is lost. C4 uses CO2 to create the 4-carbon compound oxaloacetate instead. C4 plants tend to do better in high oxygen environments. C4 plants also go through photosynthesis faster than C3 plants when there is a lot of light and heat nearby. Additionally, C4 plants have much better water efficiency (stomatal conductance) than the C3 variety since they don’t have to keep their stomata open as much. There are several thousand different types of C4 species with 19 different plant families. Examples include corn, saltbush and many plants that thrive during the summer months. ADP is an organic compound that is essential for the transfer of energy during photosynthesis. ADP is composed of a five carbon atom compound known as ribose, one adenosine molecule, and two phosphate groups. It is formed by removing one phosphate from adenosine triphosphate, ATP. ATP is discussed below. The energy needed for photosynthesis is obtained from sunlight. Plants store this energy in the form of ATP and then use it to carry out photosynthesis. Photosynthesis takes place in two distinct stages, the light stage and dark stage. The light stage is the light-dependent stage of photosynthesis, which occurs in the thylakoid membranes of the chloroplast. During this stage, white light is absorbed by the pigments in the chloroplast to form high-energy compounds, such as ATP and Nicotinamide Adenine Dinucleotide Phosphate, NADPH. In order to produce the energy required to drive chemical reactions in photosynthesis, ATP loses one phosphate to become ADP, and the NADPH loses one electron to become NADP+. Phosphorus also is key in the “animal version of photosynthesis” and make H+ from the water made in mitochondria. Hydrogen without its sole electron is a metal plasma and excellent electrical conductor. This form of hydrogen is buried in our sun and in our mitochondria. This makes it the focus of quantum electrodynamic theory. This means our mitochondria is filled with ionized plasma. Inside of every mitochondrion resides a small electric universe that powers a cell and makes life work. This is very similar to what the sun does when it “burns” hydrogen. Burning plasma may actually be the wrong term for this process. When we remove an electron we shrink hydrogen to a metal plasma. Hydrogen is transformed into a tighter, more compressed package because this gives hydrogen plasma a more favorable thermodynamic profile because less space equals more dielectric capacitance, from an electrical standpoint. This makes the metal plasma of hydrogen, itself, a chameleon for electrical action. It is an electrical phenomenon of QED theory. Hydrogen can be non-metal when it has its electron; It is also an acid, and a proton, and can act as a superconductor. It interacts with water to do some unnatural things because of its ability to proton tunnel. When we add infrared light it becomes quite special. With 1538.5 nm photon frequency added to cell water, proton transfers in water are increased dramatically. This is called proton tunneling. Did you know every biologic enzyme known to man uses proton tunneling to work? Have your food guru’s told you that? Mitochondrial input is made in electrons. All food break down into electrons that get fed into electron chain transport in mitochondria. Semiconductor engineers have only figured out how to move electrons on silicon atoms well so far, but Mother Nature moves them on DHA and water. She also uses the exclusion zone in cell water to set up chemiosmosis on the MINOS in mitochondria and it move protons to tunnel on all nucleic acids. All DNA and RNA only work when they are hydrated because they require hydrogen protons to tunnel!!! This makes hydrogen life’s magic weapon in enzyme actions. Enzymes are 100% quantum experiments in energy transmutation. At the banquet table of nature, there are no reserved seats for any living thing. You get what you can take, and you keep what you can hold. If you can’t take anything, you won’t get anything, and if you can’t hold anything, you won’t keep anything. Proton tunneling is how life harness energy to make life possible. HYPERLINK. Light energy is captured by structures called photosystems in plants. Through the splitting of water molecules, the chemical energy released is used to synthesize two basic molecules of plant metabolism: ATP and NADP+. The formation of ATP is called photophosphorylation, of which there are two varieties: cyclic and noncyclic. This light phase is necessary for the following phase, the dark phase, which doesn’t necessarily need the presence of sunlight. This occurs in the chloroplasts and depends directly on the products obtained in the light phase. In the dark phase, the ribulose bisphosphate added to the carbon dioxide gas (CO2) in the air results in the production of organic compounds, principally carbohydrates or sugars, whose molecules contain carbon, hydrogen, and oxygen. This cycle of transformation is called the Calvin Cycle. This cycle allows the entire food web to become deuterium depleted on a realtive level depending upon location on Earth and the type of photosynthesis it uses. During the dark stage of photosynthesis, the energy-depleted compounds, ADP and NADP+ are converted back to high-energy forms filled phosphorus, with ATP and NADPH respectively. These high chemical compounds are then stored to drive other chemical reactions necessary for the synthesis of sugar and other carbon-containing compounds. ATP is also used in the oxidation of photosynthetically-produced carbohydrates in the mitochondria during cellular respiration to reverse the process we see in photosynthesis. This can be made with food electrons or with red light alone because of all the cytochromes 3,4, 5 are all heme proteins and red light chromophores. Plants have different chlorophyll’s just like we have different blood types and different hemoglobin’s. There are several different types of chlorophyll including chlorophyll a, chlorophyll b, chlorophyll c, chlorophyll d, chlorophyll e and bacterio-chlorophyll. The various types of chlorophyll are found in different organisms and are all involved in photosynthesis. Chlorophyll is an important pigment in the process of photosynthesis and is found in all photosynthetic organisms including plants, blue-green algae, and eukaryotic algae. It is a photoreceptor that is found in the chloroplasts of green plants. Chlorophyll a and chlorophyll b (shown above) are the two major types of chlorophyll and differ only in the composition of one of their structural side chains. Chlorophyll a is the most prevalent type of chlorophyll of plants on EARTH. It is found in plants, algae, and other aquatic organisms. This type of chlorophyll absorbs red, blue and violet wavelengths strongly. It gets its color by reflecting green, thus giving plants their green color. Chlorophyll b is found primarily in plants as well, but this type absorbs blue light only and is yellow in pigment. Chlorophyll c and chlorophyll d are less common and are found in different algae. Chlorophyll e is a very rare type of chlorophyll that is found in some golden algae, and, as the name suggests, bacterio-chlorophyll is found in certain bacteria. Chlorophyll A absorbs UV light a lot more than chlorophyll B does as shown above. UV light has the shortest wavelength in the visible spectrum and because of this, it has the power to make the most electric current and deliver the highest electrical charge to porphyrin proteins. Arthur Ramthun explained in this video that plant photo electro-tropism is a plant response to natural internal and external electrical forces. Phototropism in the choroid of the eye is also a photo-electric process that mimics the very same act of moving blood toward the light in our retina. This process uses nitric oxide (NO) release from the RPE to accomplish this task. The skin has a similar phototropism with the circulatory system because of the nitric oxide release brings RBC’s to the surface to be irradiated by sunlight. Voltage recordings done on a variety of trees and plants show very large numbers of electrons continuously flowing towards branch tips, with or without leaves. Using voltage recordings, ohm measurements, the strength of Earth’s electric field from references, and assumptions, electrical forces were then calculated using basic electric force equations. Two-dimensional electrical forces with assumed angles were reduced using vector analysis to a resultant force at the branch tip. From the vector analysis, the resultant electric force vector and the branch tip was found to be strong enough to define its direction. As the branch tip grows, lignin forms and structurally holds the growing tip direction. The branch tip growth eventually forms an “electric line of force” in all parts of the woody plant strong enough to resist gravity and other mechanical influences. Plant parts with insufficient lignin to resist gravity, droop downward. In short, woody tree parts are a physical record of electrical flow, just like a Lichtenstein Figure is a physical record of electrical flow. The first step in photosynthesis and in mitochondrial oxidation/phosphorylation of electrons is to charge separate water. Why is charge separation of water critical? When this occurs we are creating an unending source H+, which is a metal plasma. Both steps create H+. H+ is a hydrogen atom tripped of its lone electrons so that it can be considered a liquid metal plasma. One wonders where a person or animal or plant begins and ends when you realize this close this linkage is. The reality is that life is really a continuum of physics built upon the sliding scale of action to create amazing diversity we see in living things. Chlorophyll and hemoglobin are topologic insulators that collect light and make it obey relativity once the light collides with this protein. Physics is experience, arranged in economical order for proteins. Biology is present wisdom, re-arranged constantly by locally by geometry with geologic time order. The Earth’s environment used to provide enough to satisfy every person’s needs. This is no longer true because of man’s interference by using other frequencies of light. Your environment is never static so neither should your mito-hacks or your beliefs be. We are built to be non-linear beings being able to harvest Earth’s linear seasonal environments with their ever-changing solar light frequencies. Now, Earth’s environment is non-linear on a second to second basis because of light switches and the electric power grid. Man’s mitochondria are currently engrossed in a constant state of adaptation trying to stave off acute decay to survive. So far our species is losing this battle of attrition. Light does not have to obey relativity. Its speed is constant everywhere it can run free. It cannot run free in living systems. Topologic insulators are trappers and transformers of light from the sun in cells. When it gets trapped in these topologic insulators, for the first time, the speed of light becomes relative to tissue density and this alters the optics within proteins. Therefore, trapped sunlight in proteins makes our surfaces relative, and that relativity changes the space/time of our cells and tissues. This happens at our surfaces in the eye, skin, gut, and lung as mentioned in the webinar. Sunlight shifts blood into the skin by changing polarization in tissues that allow for dermal pooling due to molecular resonance changes in eNOS and NO. More than 50% of your blood volume can change your skin surface when specific solar spectral density is present. This can lower your blood pressure and it raises you sulfated vitamin D3. It changes the anatomical structure of the skin by changing the optics of surfaces. It becomes a sensory stimulus for the interoceptive system to induce biochemical substrates via photosynthesis in plants and changes in the ATPase using red light and water in animals. Sunlight increases sulfated Vitamin D3, histamine, and sulfhydryl groups while lowering (photolysis) adrenaline, steroids, testosterone, estrogen, thyroid hormone, DNA, and RNA. Sunlight is capable of inducing biochemical reactions via photolysis and it induces coordinated endocrine adaptation effects in the eye and the skin surfaces. It affects the sympathetic and parasympathetic systems in the brain by way of the central retinal pathways. The varying AM solar light is the key stimulus for the circadian timing mechanism of the body clock via the central retinal pathways. All these effects are built into the electronics of your proteins under solar power and magnetic flux. The observation that the conversion of white P4 to the red allotrope is accelerated by ultraviolet light showed that the P4 molecule is able to be activated by electromagnetic radiation. Metal complexes can also mediate the functionalization of P4 and is well supported in the literature. The participation of electromagnetic radiation in the reactions that involve P4 and metal complexes has provided new procedures in the industry for obtaining new and interesting compounds that contain phosphorus atoms. Nature took advantage of this long before humans did. Very significant and interesting reviews have summarized, classified and discussed the reactivity of P4 but until now none of them have distilled the relationship between white phosphorus and electromagnetic radiation. Life has done this using chlorophyll and hemoglobin to collect UV light and use metal complexes in them to make phosphorus to create an animal brand of photosynthesis. Exciton theory forms the basis of photosynthesis in plants using chlorophyll. It is mainly considered for small molecular aggregates like dimers and ring-like structures etc. and how sunlight makes them using porphyrins. Exciton theory deals with linear and non-linear polarization properties of the absorption and fluorescence spectra. In humans, we now have people using NIR spectroscopy to study how water, chlorophyll, and hemoglobin work with sunlight and how animals went further than plants and linked the process to phosphorous-laden proteins to use an “animal version” of photosynthesis in the blood where hemoglobin exists. This is why I mito-hack the periodic table of elements in many ways to gain insights into how life works. We now know life is quantized, so this stimulated my curiosity and interest in finding out what biology uses for its materials to collect sunlight and make light in cells. Proteins act to performs these tasks and act just as semiconductor materials do in technology gadgets. It turns out phosphorus is one of our base key semiconductors used in the circadian clock mechanism in the brain and all cells. I began examining a large group of elements that can act as semiconductors, which is a prerequisite for acting as a photocatalyst with sunlight via the photoelectric effect. I found something interesting and not well known. Since phosphorus is a key atom in life’s post-translation modifications of proteins (ATP/ADP), I knew it had to have specific advantages using the electromagnetic spectrum from the sun. That key finding was that red phosphorous can act as a semiconductor by itself. This is a property most researchers still have not recognized even today. The conventional wisdom in physical chemistry was that red phosphorus was really only useful as an insulator. A Japanese scientist, Akira Fujishima, performed the earliest work on splitting hydrogen (H+) out of the water. He discovered that titanium dioxide could produce the gas, a finding first reported in Nature in 1972. A photocatalyst operates much as chlorophyll does in a plant, absorbing energy from light and causing a chemical reaction in water to charge separate it and liberate energy in the form of hydrogen and free electrons. In my opinion, the process of photocatalysis is simply a form of “artificial animal photosynthesis.” Calling it artificial is a misnomer, only because photosynthesis has been ascribed to plant porphyrins at the present moment. Science is now realizing that animals may have this ability buried in the connection of hemoglobin and their mitochondria. The phosphate proteins are the key linkage. When someone looks at hemoglobin and chlorophyll side by side, and realize how much phosphate is present in RBC’s one can see that mammals have always used this process as plants have. We just have missed the process because we are ignorant about quantum mechanisms in cells. Cells have harnessed the power of phosphorus in all our proteins to make our peripheral clock genes operate properly. When they don’t harness this power you get diseases in that organ because the mitochondria become faulty and heteroplasmy rises. This is why phosphorylation of proteins is found everywhere one looks in high energy metabolic pathways in a cell. In fact, it is the reason it is used in clock mechanisms to fine-tune coupling and timing inside a cell. Most of the known clock proteins are phosphoproteins and phosphorylation events play a key role in generating circadian rhythms. AMP-activated protein kinase (AMPK) constitutes an interesting example of the interconnection between phosphorylation events of clock components and metabolism status. ATPase in a mitochondrion makes ATP a key phosphorus containing protein. ATP synthesis is not directly coupled to the cytochromes of the inner mitochondrial membrane. For sequential e – transfers be mindful that the ATPase is not directly coupled to the respiratory proteins. H+ translocation at the cytochromes generates the chemiosmotic gradient necessary for ADP phosphorylation. This H+ version of hydrogen has some pretty special abilities when its scale and density is altered by electric and magnetic fields that surround it. The key reaction stoichiometry of the ATPase for a • 360-degree revolution = 3 ATP = 10 H+ = hydrogen stripped of its electron. Why do the sun and mitochondrial matrix have something deeply in common? Is this why photosynthesis and mitochondria are entangled? I think so. Metallic hydrogen (H+) = the energy plasmoid of life. H+ = a room temperature superconductor that life uses to make life possible. The more connected you are to the sun and Earth’s magnetic flux the less one needs electrons from food. It is a simple quantum rule. The more continuous the connection the more electric charge cells can hold which can be used as an electromagnet vice grip to compress and squeeze hydrogen to changes its physics. It takes a tremendous amount of energy from the environment to make H+. The sun’s photoelectric power and the Earth’s magnetic flux can provide that electric power. Moreover, if you convert it back to molecular hydrogen (H2), all that energy is released naturally to the system built around it. Nature seems to have gotten that message about 650 million years ago with chloroplasts and 600 million years ago with mitochondria. People forget that chloroplasts and mitochondria are both former bacteria that became eukaryotic symbionts. So if that environment was built with proper specifications, it could harness all that energy to compress H+ in small spaces. The mitochondrial matrix and the cristae create these small spaces and water surrounds these. Water also acts differently when it scale is changed too. Is it a coincidence that a cell surrounds a chloroplast in plants and the many of colonies of mitochondria in animal tissues? Both symbiont H+ factories are submerged in water. Is that arrangement important in some way we don’t yet understand in biology? Because of this arrangement, both seem quite capable of harnessing all that energy that condensed matter physics says a plasma made of metallic hydrogen would release into the surroundings. Cancer is always tied to disrupted circadian biology because of the quantized link of the peripheral clock mechanism to the atomic abilities of phosphorus. Phosphorus is a key atom in all human post-translational modifications including ubiquitination cycles. Adequate circadian regulation of physiology and metabolism are key for metabolic health and when light uncouples these systems cancer is right around the corner. A review and analysis of proteomic analyses in mammals over the day/night cycle reveal mainly reveals only nuclear genome-based studies at parent protein level. I’ve been pounding the table at looking at mitochondrial mechanisms because of its bacterial origin. A common dopant for n-type silicon in technology is a phosphorus atom. Life, using cells does the same thing, but it pairs carbon with nitrogen and phosphorus in its semiconductive circuits. Selenium can make electricity in proteins but it works with cofactors of Ca2+ and Mg2+. Physics geeks will recall in an N-type semiconductor, the Fermi level is greater than that of the intrinsic semiconductor and lies closer to the conduction band than the valence band to do the things it can. Loss of selenoproteins is seen in many cancers. Peripheral circadian clock systems based on post-translational modifications (PTMs), such as phosphorylation. They exist and are well characterized in bacteria. Mitochondria and chloroplasts are bacterial symbionts. This mechanism has not been seen in mammals and it should be obvious why to researchers but it has eluded their unripe minds. Mammals stole their mitochondria from bacteria so the mechanism remains buried in the circadian regulation of mitochondria in higher eukaryotes!!! This is why Dr. Doug Wallace has said that photosynthesis in plants and glucose metabolism in the liver are linked to the sun and it is why the liver was created by evolution. This organ is the ultimate peripheral clock regulator that responds to solar light frequencies from other surfaces than the retina. Multiple lines of evidence suggest that the mammalian clock in peripheral organs such as the liver plays a substantial role in optimizing the timing of the metabolic process. This is why the long loop destruction of DHA recycling is devasting to cell membranes functioning in humans with leptin resistance at the level of the liver. Indeed, tons of research now shows the expression of hepatic enzymes involved in metabolism robustly fluctuates during the day during times as solar light frequencies change. This is why gut melatonin, insulin, and glucagon are all physiologic solar hormones. I have a deep sense all hormones functionally are linked to solar frequencies which control their actions based on PTM. Consequently, inactivating the liver circadian clock decreases the number of cycling transcripts in circadian timing in all the cell types in the gut. Diabetes is a perfect example of this breakdown in beta cells that secrete insulin and other cells that secrete glucagon. This is why light at night destroys this mechanism and leads to many epithelial cancers by destroying both Vitamin A (retinol) and Vitamin D3. Vitamin A dropping tells the wise something is amiss with melanopsin on a surface. When clock genes (like PER2 and BMAL1) get uncoupled from solar light frequencies, c-Myc (a regulator gene) is over-expressed, making cancer formation much more likely. So this why do I mito-hacks the periodic table of elements to gain insights into how cells really work. How do cancer cells link to the gene function? Telomerase is the answer and I talked about this in the webinar, but I think it is reacting to melanopsin signaling that is broken. The RPE in the eye has more telomerase activity than any other cell in humans. It turns out the skin does too! This has huge implications when your eyes/skin only see a world that is blue lit and microwaved. This highlights why the retina/RPE/skin are critical in disease generation in today’s world. Human genes are programmed to know how to react upon bright light with the spectral composition of sunlight. The brightest light under the sun is UV light and we have direct data that unwound DNA releases massive amounts of this light and it also absorbs massive amounts of this light. The skin and retina have evolved specific chromophores and fluorophore proteins to deal with the specific solar frequencies as they vary diurnally and seasonally to function optimally. These two tissues (retina and skin) are also linked in the layers of the embryo by their emergence from the neuroectoderm. Understanding the heliotropic logic behind the coordination processes between skin, a visual and energetic portion of the retina (eye clock/melanopsin) and photo endocrine regulation in the brain is essential for creating a reliable concept of health. The fluorescence of RBC’s filled with iron porphyrins can deactivate telomerase in the eye to ruin all signaling in the central retinal pathways and lead to circadian disease by ruining mitochondrial function of the RPE in the retina. Solar lighting is required to maintain the wellness of RBC’s and many other cells in humans. Artificial light dehydrates mitochondria and lowers CO2 production from mitochondria. It also causes changes in deformation of RBC’s and this leads to their destruction and their change in deformation leading to pseudohypoxia and disease. Mitochondria reverse the process we see in plant photosynthesis as the picture below shows. Light assimilation is affected by surface temperature changes that occur in our eye, skin, gut, and lung, just as the quantum yield of photosynthesis in plants is affected by leaf temperatures. I covered these links in the webinar. We all begin in the womb in a woman who bleeds every month she is not pregnant. The blood she loses gives a fluorescent fingerprint as mentioned in the webinar. We all inherit our mitochondrial DNA from our maternal lines. So why do these experiments show that DNA begins as a quantum wave and not a quantum particle with respect to the photoelectric effect? Recall that every cell in the human body releases ELF-UV for a deep signaling reason. Women need the UV part of the light’s equation more than men do for most of their lives; do you have an inkling ….why? Their atomic lattice needs the particle part of the photoelectric effect to excite electrons. Men’s bodies are more attuned to the wave part of light in most cases. I’ve said, “the wave aspects of light seem to be more important at nighttime and in females in my bio-hacking experience.” What makes young women special? They have the ability to carry the next generation………they are designed to harvest more energy from the environment for a possible pregnancy every month. Therefore they have both systems quite active in their system until menopause sets in……..why? You can overpower your atomic lattice much more easily if you are a woman. This is why they have a period monthly to act as a fuse box photoelectrically by losing Iron porphyrins in RBC’s. This points out why a period is important in young women. What happens when you have a circuit that gets overloaded in a house? The circuit can blow. When a circuit blows we have to protect other systems; so women are much more sensitive to this issue hence why many of them get autoimmune diseases whereas they are relatively rarer in men. This is why women are different and special with respect to the non-linear aspects of light and how it works with DNA…….their atomic lattice is attuned to things because they bring life forward and males have no such thermodynamic constraints. ELF UV is used to stimulate mitosis of cells in humans, therefore, women have to have ways to collect UV light well when they run low on these specific frequencies in their germ cell lines and in their mitochondria DNA. Mitosis is massively up-regulated in pregnancy for growth so this is why this constraint is mandatory. Having this ability throughout their lives would lead to their “bulbs” (tissues) burning out too fast. So what did nature do? Menopause slows the ability of tissues to power the mitochondrial circuit. The monthly period also protects women from powering up too much to harm their protein lattices and mitochondrial circuits if pregnancy does not occur. The key point is understanding that your semiconductive protein lattice’s. The medium of cells where sunlight interacts is very important part of this story. It determines how one can use light and how one cannot use it. So does nature want women to burn fast and bright and then either die out quickly like a blue star does compare to a red dwarf star? This implies that menopausal women may not need as much UV light as younger women and it may be why they keep their hemoglobin and stop their menses once their ovaries go dormant. Might they need more IR-A light at this time of life? I think so. What makes this interesting in reference to this link? Magnetic fields can changes waves to make them more particle-like. UV light is able to magnetize things. In fact, this is how the bases in DNA become magnetized. UV light is more particle-like and IR light is more wave-like because of the varying kinetic energy that each frequency contains. Sunlight is 42% IR-A light because most of our mitochondrial proteins and water are red light chromophores. The UV portion of light has a very high kinetic energy is more highly dependent on hydration status of the cells and this ability is linked to maintenance of low heteroplasmy rates and good mitochondrial function to make water and CO2 to reverse the photosynthetic process built into the food electrons and protons we eat. Food is a bar code of electromagnetic information of sunlight as the sun varies seasons in its trip around the Earth. I have been following your research and blogs for about 5yrs, now. I am 65yrs old, trained as a physical chemist in the 1970’s. In one crystallography lab practice a small group of students, which I was one of the group….we all looked into the atomic structure of carbon using a transmission electron microscope. The carbon atoms illuminated by the magnetic focussing of electrons flowing across each atom. This was the only TEM available for university physcial chemistry students in Australia, at that time. With this memory of the quantum world fixed into my 60yr old in my mind…. I believe, I can have the knowledge and experience to say, “Your research work and intellectual reasoning with the sciences involved with this post is stunning…. This post should be the preface in the first chapter in every medical student’s first year biology course. After following your work, I now know why I have experienced metabollic illnesses of Fibromyalgia and Chronic Fatigue Syndrome over the past 20yrs…. My doctors have all tried to link the FMS and CFS symptoms to genetic inheritance or viral influences…not one of them able to help anyone. It’s not their fault, it’s their training which prevents them to know anything about biophysics, biochemistry, photochemistry and quantum biology ….More importantly, anything about connecting our world environment, bio-hacking, metabollic illnes and energy transfers or cellular chemistry, entropy and epigenetics. Mitochondria who follow your work, know you are a wonderful man who must have a wonderful wife and family, too. Your are a modern day prophet for quantum physical medicine. An outlier, showing the light and way ahead for every man and woman in medicine. Perhaps, your like a biblical Jesus an outlier in your field of work…..THANKYOU FOR HEALING ME!
2019-04-22T10:16:02Z
https://jackkruse.com/reality-7-blood-chlorophyll-types-food/
Scuba Forum - Scuba Diving Forums and Discussion Board > Community > Scuba Stories, Comments & Questions that don't fit elsewhere! > How Afraid are you of Sharks? View Full Version : How Afraid are you of Sharks? You just have to remember you are not at the top of the food chain. And I dive in Southeast Florida. They are definitely out there. They are less intimidating when you as a diver can move in 3 dimensions as they can and you are 8 ft long and 2 1/2 feet thick. As a surfer you find yourself hamstrung by being limited to 2 dimensions and your appendages offer nice bite sized targets. There was a nice little knee to waist high swell going on at Corners a couple years ago. It was March no daylight savings. I surprised my then middle school age daughter by picking her up from school with boards loaded on the truck. Winds were off shore and it was so clean and easy I was wearing my polarized Costas on the paddle out. It was near sunset, the bait was running between the sand bar and the shore. As we headed into a wave a Bull was sillouetted in the face right off the nose of my board. I was surprised that it did not bother me "that" much. I learned something that day. Do not wear polarized glasses in the surf because ignorance is bliss. I watched the shark swim between two guys sitting on their boards shooting the **** and past 2 old guys doing aerobics in the surf, oblivious to it's presence. I dive places where shark encounters are the norm. I saw 12 sharks on my last dive. Hope to see more next weekend. I have a lot of respect for their ability to take a chunk out of me, so I give them their space. I was surprised that it did not bother me "that" much. Instead I simply told my kid it was time to head in. She asked why. I said it is dinner time. I just WISH a shark would try some stuff like that with me. I would be all like, "Hey! You back off, or I'll sue you!" Ya, I totally agree. The same exact thing happened to me on a clean waste high swell. An 8' Bull swam right by us in the lineup. I just told my friend that we needed to go in. It was so scary. I think about them before each local dive. Somehow, they disappear from my mind as soon as the dive starts. Around here, I'm talking Great Whites. Though they're rare and bother humans even more rarely, encounters involving biting aren't too benign for the humans involved. It's fairly well established that "Shark Shield" works. But, it's expensive and cumbersome. Does anyone know of other measures to make sharks avoid you? I.E. Sub-ducks? I've heard that they don't like divers because of the bubbles, and because they don't look natural. I've had hundreds of dives with Sharks in Rangrioa, Fakarava, Palau, Galapagos etc....Never a worry...just respect!....the only thing that would bother me is to dive somewhere where they have Shark feedings. It probably would not hurt if you smeared yourself with your own feces. What kind of shark would want to eat you then? Don't know if you've been up this way for the Jupiter Fall Classic. If not, you should try. Lots of fun. Link is here on this site. They usually have Brice from Boxelder Live to Love, Love to Live - Boxelder (http://www.boxelder.com/) performing at the Square Grouper Square Grouper - Tiki Bar at Castaway's Marina - Jupiter, FL (http://www.squaregrouper.net/). Oh, it says here to just thrash around and splash the water. That will scare them away! No....The corn attracts too many Alligator Gar! You might try hitting them up for spare change or talking to them about religion/politics. That's how I get rid of girlfriends who are too clingy. I'm more scared of people, Sharks are more predictable. Here is the summary of my interaction with sharks. In Florida, I accidentally found a nurse shark, and my insta-buddy scared it away because he thought I was pointing him toward a lobster. Shark encounters seem to be rare for me. That Stuart Cove guy's operation is looking better every year. You do not need to be scared of either one.... if you carry one of these! Anybody ever tried to noodle one? I have been scuba diving since 1992 - I had never seen a shark while diving until last month. My buddy and I were spearfishing. Our first dive was uneventful - shot some fish and surfaced. On our second dive, my buddy shot a fish as soon as we got down. I shot one soon after. My spear got jammed into the wreck so it took a little longer to get my fish strung. My buddy tapped me and when I looked at him, he had his hand like a fin on his forhead. I said to myself "Is he giving me the sign for ---- SHARK" well, there he is!! While I am reloading my speargun, my buddy is pushing the sharks (yes, now plural)away from us with his spear gun. They were definitely interested in our fish. We headed for the surface and they started following. They finally broke off and we had no further interaction. I talked with a guy at the local LDS and he said the sharks around here are more plentiful early in the year. I usually don't dive much until the Summer. I have a healthy respect for these animals especially now after seeing one up close and personal. It definitely won't keep me out of the water though!!! Wow, this is scary, these need to be standard issue to all school teachers! Maybe that would solve the school shootings. Here is a picture of my wife and I with shark behind us! I think he is smiling for the pic! What type of shark is that? It looks like a great white but I doubt you would be that close if it was. and holy crap is that real?! I have never seen a shark, so I can't really say if I would be scared or not. I don't think it would really bother me, but I will never understand people that go on feeding trips, just seems like Darwin at work to me. loo key reef in december both years ran into nurse sharks. Nothing big but the seccond year I was there We headed back to the boat after seeing the nurse sharks. Only to find a reef shark circling under the boat, that put me in my place real quick. Thing of it is it pretty much just swam of when it realized we were there. If you do want to see some try the key west area around christmas or new years. When we drove in we could see them hanging out under the bridges as well. We went to the Bahamas just so I could get my desired natural shark encounter (didn't want to do a feed dive). I love them-they are amazing and my first dives with them did not disappoint! i go in the water hoping to see them. I've seen some here and there... never on of these south Florida bulls i hear about... but i do wanna see one, and preferably large... just so i know how it feels to be that close to a very large powerful creature... in his house. those are some good pictures. looks pretty shallow judging by the amount of light. good stuff. I've seen sharks fairly often, but they don't tend to hang around long. Second open water dive was a night dive. I jumped into the water, found there were 5 bronze whaler sharks hanging round the boat, munching scraps thrown overboard from dinner. They scattered fairly quickly and, although we sighted sharks throughout the dive, none came close. Triggerfish are far more terrifying. Of course, I've never had a great white sneak up on me! Could make me change my mind! OK I'll bite, what so scary about trigger fish? The teeth, baby, the teeth. And they're highly territorial and aggressive (during mating season). I tried to put a pic up of one that attacked me at 25m, but couldn't get it on the page. Trust me or better yet ask around. LOVE sharks and look forward to diving with them. However, that does NOT apply to Tiger Sharks, Bull Sharks, and Great White sharks, nor any shark near someone spear fishing or chumming. Some species of shark just are too big and too aggressive to want to be in the same area with. Unless you feed, chase, provoke or harass them generally speaking they will leave you be. other things to consider, if you are a hunter remember you are basically chumming the water while you dive! you shoot the fish the fish bleeds the sharks come sniffing around. I'm kind of amazed to hear that some folks do tons of dives without seeing any sharks. My first dive trip after OW was on the Turks and Caicos Explorer II, and we saw sharks on practically every dive. Mostly Nurse Sharks sleeping on the sandy bottoms, and smallish (6 foot or so) reef sharks. On the very last dive off a wall, we had 3-4 reef sharks circling around around and through the group. I had a couple pass so close I could (almost) reach out and touch them. After the dive, I jokingly asked the crew if they had arranged that show deliberately for the last dive! I was amazed at how un-scared I was... but then again, they weren't making any agressive moves, just cruisin' around. However, I don't think I have any interest in doing one of the shark-feeding things. Unh uh. "I'd pee my wetsuit if I hadn't all ready. I don't give them a second thought (just a first). Nurse sharks don't scare me, but any other shark that was as big as me would DEFINITELY get my attention. I've never seen any other sharks while Scuba diving (other than Nurse Sharks), but once when I was snorkeling in Australia (before I started Diving) I saw a 6 foot black tip swimming parrallel to the shore just feet away from all the wading beachgoers. He just zipped by and didn't seem to be interested in any humans, but he difinitely got my attention, and I exited the water and reported the siting to the lifeguard. This has been my experience with most large predator type of animals. I still find it amazing that people won't understand this, if you just leave things alone they will generaly leave you alone. I still am afraid of sharks:smiley5: but diving with them would be cool, I would love to do the Stewart's cove thing. I just give them the respect they need and they'll give it to you. Well if you want to do Stewart's cove....I think they are best known for Shark Feedings (or used to be)....That promotes unnatural behavior and I will never dive anywhere where you may have a Shark come up to you for a bite to eat!...just a thought. It's a treat getting to see a shark anywhere we've been in the Bahamas, but I think if I was a spearfisher off the coast of California I'd be a nervous wreck. Check out the photo here (didn't want to post photo only due to copyright stuff). Want to go for a swim? I am a spearfihing diver here in Florida. It is very common to have Bull sharks bug us when spearfishing. I have never had a bad problem with a shark yet. They are like dogs. If you have food in your hand, you need to make them aware that they can only have it if you give it to them. And that is definatly not a option. For whatever reason I am afraid of sharks while out of the water, but when I see them under water I am 100% unafraid. Nitrogen Narcosis? Maybe? Or I guess the fact is, once your in the situation you have no choice but to deal with it, and fear and screaming and running is not a option. If your not spearfishing, there is zero reason to fear sharks. They are unlikely to even check you out if your not spearfishing. But occassioanlly they will come in and take a look at you. If you panik and freak out, your sending "weak" signals to them and they may stick around even longer. Remember sharks are the cleaners of the ocean, meaning they eat the weak. Giving a speared fish to a shark is like telling a begging dog that begging works. Here in Florida that is our biggest problem. Many spearfishers make stupid decisions and end up feeding the sharks their catch. Thus training the sharks. Every now and then a shark will come in on me real agressive and the first thing that comes to mind is some idiot fed this shark his speared fish. But they are only bullying you, because it worked on the last idiot. Luckily, agressive moves toward them seems to always work. As soon as you see them coming at you, you need to make quick aggressive movement, straight at them, and they will turn off and keep their distance every time. The worst shark thing that ever happened to me was: I was on a solo dive (95% of my dives are solo) and vis was about 15 ft. I kept seeing these big fish just on the edge of my vis and couldn't make them out. I figured they were Barracudas or something. About 15 minutes into the dive I see one of these fish moving in and Yikes! It's a jumbo fat Bull shark. He was not aggressive at all, just circling me and curious. He kept making passes in my vis and I decided I had enough. I started a slow accent and at about 35 ft off the bottom, the vis turned to Blue water and 100ft of vis. As I sloly accended into the blue water 5 extra large Bull sharks emerged out of the bad vis and they were circling me about 15 ft away. They were not aggressive at all, but not being able to keep an eye on all of them at the sma etime and sheer size of these Bull sharks was a bit nerving. What really scared me was the idea of all those huge sharks being right there and not being able to see them, and the possibility I could have shot a grouper or something. That would have been ugly! Yesterday afternoon, I was followed all the way to the surface by a couple Bull sharks in 50 ft of vis. I had a big grouper, I just shot, and the sharks never came that close to me. They were just hanging around, and I guess they smelled the blood in the water. Once I hit the surface, the Grouper started thrashing, and one of the sharks instantly raced up from the bottom toward me. He stopped about 20 ft shy of me and then moved off about 40 ft and kept his distance until the boat came over. For whatever reason that does not scare me at all. I can see them and I keep my eyes on them, and I am ready to poke them with a spear if neccesary. But it rarly is neccessary. I poked shark once just to get him to move off and he did. They are not trying to eat you, they are exactly like a dog trying to get you give him a steak. He isn't after you, he is after the steak. What moron would give a steak to a dog becasue hes barking at them. You kick the dog(that some other idiot trained to act like this) and tell him to go lay down. I never carried a powerhead, never will. I think powerheads are false security, and wasted time, while you should be presenting you superiority to the shark in order to keep him away. Instant agression toward the shark is way more important than screwing around trying to get you powerhead on the tip of your gun. Last week I saw a big unagressive bull shark right before I saw a really nice big Grouper. I figured the only way I could shoot the grouper was if I could get a perfect head shot and hopefully instant kill. The shark was gone at this point, but only for a few minutes, and the thrashing fish struggle would defiantly call him back in very fast. I ended up having to not shoot. It would have been a stupid move and a trophy grouper dinner got away again. In clear water, while not spearfishing there is a zero chance of shark issues IMO. In White shark country I might have a different attitude toward the situation. That's cool man. I might have to head up in November. Thanks much for sharing your experience. Your input was quite interesting. I'd just like to point out, though, that I have never heard of a dog over two meters long. I, personally, am not afraid of sharks, but that being said I haven't seen one over four feet, and never any commonly aggressive species. When I do, I think I shall yield the dive to them. While I understand your point, I think I'll leave it to you to represent the dominance of humanity to the toothy ones. Grin, great experience....seen many Sharks...two Sharks that I have not and probably will never see unless I hang out with a spear fisherman or go to a Shark feeding is the Bulls and Tigers....since I will never do either I probably will miss seeing them other than by chance. There is an account in the book "Devil's Teeth" by Susan Casey of a diver who was gathering sea urchins (apparently considered a delicacy in parts of Asia) in the Farallon Islands. The Farallons are a seal rookery, which means it is also a great white shark cafeteria. A great white came after the diver. He managed to wedge himself into a crevice where the shark could not get to him and eventually the shark lost interest and left. The diver returned to his boat safely. He also quit diving for sea urchins in the Farallons but more because it became uneconomically feasible than because of the sharks. What are your thoughts on hunters now a days who are sending their catches up on bags (which often lose the fish to a bull). I wonder if the animals might start associating DSMB's with food. I send them up on lift bags all the time. Never heard of one getting eaten like that yet. I'm sure it has happened, but it's not common. Sharks don't have much of a brain. I've sent fish up right in front of sharks and they don't know what it is, and it's not natural, and they can't detect scent that fast. If the fish was struugling on it's way up a shark could probably detect that if he was right there. I was going to float that fish up yesterday but I was task loaded, and done, and the sharks were not aggressive so I just figured I would remain as calm as possible, and go up nice and slow and keep my eyes peeled. I am sure if I floated that fish the sharks would have disappeared. They followed me up because they knew I had a treat they wanted. I just needed a extra set of arms and hands to do that in yesterdays situation. Please, Grin, you misunderstand. I didn't say that at all. If I'm not afraid of sharks, as I stated, then I won't "...scream and paddle away..." I will definitely get the hell out of the area/water if a large predator takes a persistent interest in me. I don't hunt, and I'm not above defending myself (as if) but I'm simply saying I will gladly yield the field to a big predator. That's true on land or in the water. Panic? Well, no one knows until the big moment comes, but I have never done so in my life, so we'll have to wait and see on that. I was simply stating that dogs are generally smaller than people and so, being animals, naturally easier to intimidate. Next time a five or six meter shark takes an interest in you, let us know how that works out for you; the intimidation thing. Good hunting. I don't worry about them at all when I'm diving and I can see them. Its when I'm floating on a raft 100 yards from shore that I think about it.. alot. You know, Grin and I have kindly debated this before a LONG time ago I think. So I'm not really looking to "enter the ring":). But I do think that we humans get to feeling 10 feet tall and bullet proof if we have a lot of experience under the water. I don't mean that we really let our guards down in terms of scuba safety, but what I do mean is that the shark (or most any other marine animal) has the home field advantage. He can manuever on a dime 'cause it is his home turf. We simply cannot, as it is not our natural environment. But we get to thinking that we can do so and get into a comfort zone (not that we would say this out loud but we sure act like it). We get to thinking because we have some sort of weapon (speargun and tip for instance) that we can ward off an attack. It is a GREAT risk, that so far, Grin and company have come out on the fortunate side of ok. But the shark is not a dog, and we are not dominant over them when in the water. It would be like the little dog that comes around and barks and intimidates my very BIG dog and actually (for now) makes him keep his distance. All it would take is this little dog actually landing one of his nips and my dog is going to show the little dog the meaning of "short man syndrome". But thankfully the little dog hasn't gotten close as my dog stays JUUST out of reach of his nips. But it is only a matter of time. Grin can (and did..lol) disagree but the same phrase applies to spearfishermen that think sharks and dogs are similar when it comes to "submission". It is only a matter of time. It is, of course, their personal calculated risk. And though I certainly hope not, but I fear that one day, the Grins of the dive world will eventually run into the shark that has no intention of "laying down" when kicked as he said they would, similar to dogs. One lightening fast burst of speed, a flip of the tail and Grin would grin no more. But this is one that I don't at all mind being wrong about:). It's their territory. I respect them totally, and know their the boss. I've seen sharks on quite a few of my dives. Most seemed pretty uninterested in those "Hoomans". The little horn sharks in Cali are kinda fun to play with. They would come right up and swim around me. They're only like 1-2 feet long. One of my divemaster friends is planning a hammerhead dive in october. I guess they school in this area around that time. I can't wait for that one. I would rather like to see one, get up close and get a picture of one. Did once with an angel shark. Did't get to take a picture of a pair of leopard sharks in love though. I've seen sharks on quite a few of my dives. Most seemed pretty uninterested in those "Hoomans". I'm pretty psyched to see the Hammer Head schools that come around here. Have to check with my LDS. I think October is probably dry suit weather here. I think 10 months a year is dry suit weather here. Hammer Heads and Yonaguni rock formation are on my list! Should I start a new thread? "How afraid are you of Yonaguni?" A friend of mine had a 10 ft sand tiger swim around a wreck with him about 6 feet away almost as if the shark was his dive buddy. This responses type of thinking is the same sort of ideal that has sharks in the threatened classification / situation they are in these days. Obviously there are those who do shark dives for the thrill, feeding them and everything. Those who deal with them as I do. Not doing them any harm and respecting them. Those who are scared to death of all of them. The same type who thinks sharks are out there waiting for a human meal to enter their lair and anyone who does htis is tempting fate. This comes from the same classification of person that thinks, when there is a shark attack, we need to go shark fishing and catch and kill the monster. The same reason the news hypes a surfer getting bit and 10 stitches with a picture of a Great White skyrocketiing a seal in Africa. Because there are people out there that eat this up 100%. And I am getting the feeling you want to save the sharks from???? people who are uninformed about sharks, I guess! This couldn't get any funnier! What was that Scott guy's name? You know the grizzly guy? Grin, as stated, I can respect your opinions, but please don't get defensive. you couldn't have misread me or misunderstood me any more if you tried. I'm not at all afraid of diving with sharks. It is something I look forward to. I just wouldn't be crazy enough to chum the water and ring the dinner bell when I do it while at the same time equating shark behavior with a dogs (this is the most laughable thing I've read in these threads, if anything is funny about them). And I don't at all want anyone to get bitten/attacked/eaten/killed. I don't think that sharks are out there waiting for humans to get in the water to have something to snack on. I don't think you are uninformed about sharks at all. I think you are SERIOUSLY uninformed about your ability to fend one off. And I mean SERIOUSLY. BUTTTTT...like I said: I'll gladly be wrong about this point! (This is your FIRST clue that I'm not hoping you'll get eaten...something you erroneously said in your reply). How come theres no stripes? nice shot though that is awesome. They have faint grey spots instead of stripes. I don't mind swimming with them. They pretty much only bite spear fishers. A sand tiger shark is usually much more pleasant to be around than a tiger shark, I'm told. The same reason the news hypes a surfer getting bit and 10 stitches with a picture of a Great White skyrocketiing a seal in Africa. Because there are people out there that eat this up 100%. I love that ****. It is never a surfer was "bitten", rather, "Another local surfer is lucky to survive a shark attack." The talking heads often seem disappointed the surfer survives. I had a surreal encounter once that was interesting. I was on a night dive some months ago. The other divers in my party were all clustered up terrorizing an octopus or crab or something and bumping into each other like the 3 stooges. I backed away off by myself and put the light against my chest to check out the bioluminecense. Then I took my light and swung it 360. As I passed the light by my left hip, it lip up a pretty big Reef Shark (I think it was a reefy) a couple feet behind and below me. Flicked his tail and took off when the light hit him. My bad. Timothy Treadwell was the Grizzly guy. There's another guy, a "shark" guy who likes to do research with great whites. Maybe that's the Scott. Let me check...hmmm. Couldn't find anything. Anyway, saw this guy on a Discovery chanel documentary. He likes to swim around with great whites and observe their behavior. He has one trick where he carries a painted wooden board that looks like a snarling white shark's face. He swims right at 5m+ sharks with it because he believes they will see him as a dominant shark. It's worked...so far. He's getting some good information on shark behavior, and he's not quite as loopy as Treadwell, but I've just got to wonder how anyone will end up who "knows" what wild animals are thinking and how they'll behave in a given circumstance. Not to say the guy isn't talented, but I should think that he knows the risks and that nothing is for sure when dealing with animals, especially predators. Just want to state again, I don't wish harm on anyone. I'm just saying these are risks I'm not willing to take. I fear that one day, the Grins of the dive world will eventually run into the shark that has no intention of "laying down" when kicked as he said they would, similar to dogs. One lightening fast burst of speed, a flip of the tail and Grin would grin no more. But this is one that I don't at all mind being wrong about:). OMG! I think you forgot about this comment and all the other junk that went with it. It is obvious you have no idea what you are talking about. Sharks scare you, and you think everyone should be like you. All I did was try to make people realize they are not man eating mindless machines. You tryed to take the news attitude. Which shows who spoke about which one knows nothing. That quote above is hilarious, all I see is a victim of the News. Is Florida the shark bite capitol of the world? Yes! But it isn't like Jaws is eating people off the beach as some obviously believe. Most cases result in some surfer kid being proud of his 4 stitches, and going surfing again the next day. Please! Give the world a break and speak about what you know, instead of what you have been trained to fear by the evening news. All I did was relay my experience and opinion. I didn't say that's how you should do it. What I gat was the lamest attack back by soemone who's only shark experience is, they're scared of what society has place into their mind. Not fearing sharks is arrogance. And I have been around sharks my whole life. If you think a bullshark will swim away in fear because you kicked it, you are wrong. It depends on what you mean by fear. By some definition, not fearing the water is arrogance. Water kills far more people than all the things living in it combined. Do we then give up diving because water is dangerous? I agree that not considering a shark as dangerous is the height of arrogance. But just because sharks can be dangerous does not mean you should necessarily avoid being arround them. My answer was I give them a first thought but not a second. And that first thought is whether the shark seems agressive. I consider some species aggressive by default. My response depends on the answer to that question. I didn’t vote, since none of the options fit my style. I spearfish and am used to seeing sharks while hunting. It can get tense at times. Two weekends ago I bent a spear shaft while poking (pushing off) an inquisitive bull shark. It is amazing how tuff their skin is. From first sight, I keep my eye on them. Especially if I have a fish on my spear. To date, I have not given up any fish to the gray suited tax collectors. I am sure that some day, I will have to "pay the tax". I've only seen a "real shark" a few times and in each case the shark saw us and ran away. Horn sharks are the definition of "non-agressive" I've seen divers pick them up off the bottom or hold them by the tail. They don't seem to mind and when let go they move only about three feet then go back to sleep. So where do sharks figure in your fear factor? I'm not afraid of sharks in general, but there are types of sharks I don't want to be in the water with. I think of "sharks" like I think of "dogs"... there's a world of difference between a spastic poodle, a napping basset hound, and a snarling rotweiller. I expect different things from them, and act accordingly. Likewise with sharks. I expect different behaviors from schooling spiny dogfish, cruising nurse sharks, territorial bulls, and curious tigers, and I act accordingly. Not usually, at least not until you get a ways offshore. Spiny dogfish are the only common sharks in coastal waters, and they're mostly either absent, or a nuisance when fishing. I usually don't give them a thought. I'd be more suprised than anything else if I saw a large shark of any sort while diving around here. This is a FAR more respectable opinion than some that I've seen:smiley20:. Way to go No Missess! Back in Australia, I was trying to get a pic of a white tip up close that was resting on the bottom. I took three passes and as I would get close enough, he would swim away and then come back. I finally gave up. Come dive the Spar or Papoose out of Morehead City, NC and you are almost guaranteed to see sharks that are bigger than you. More like 18 per dive than 1 per 18 dives. Cool! I was given an opportunity to do a dive off of NC with ?Oceana? I believe it was (I could be wrong about that) as a research volunteer. I could get a 20 percent tax deduction for the price since I would be helping w/ research. But it is 12 hours away. I do hope to do some diving off of NC someday. I hear a ton of good things about the shark diving there! Did you tune in for Shark Week on Discovery channel this year? I did and I must say they leaned more toward sharks being a kinder gentler animal that has been misjudged for a few violent deaths. The stories seemed to be more about shark lovers and their plight to educate the world on the over fished mistreated population. I love sharks but the tree hugging was starting to get to me until I saw one story where Dr. Samuel Gruber from University of Miami was showing the Sharkman how he was able to put a shark into a catatonic state by turning him upside down. Interesting. Sharkman later went to Bahamas and was shown a procedure where the diver "tickled" the shark's nose and put it into a catatonic state. Sharkman was able to take this trick with him and put a large tiger "asleep" somewhere near Africa. I guess because sharks scare us, we are always interested in a possible Vulcan like sleeper hold that would put a shark down before they ripped your arm off. I thought to myself, I'd like to try this. Good sense and adulthood dismissed the thought. The next day I was diving with a few good friends on the deep ledge near the HOLE IN THE WALL. Angie was to my left and occasionally honked when she spotted something cool like a big turtle or moray. Angie honked and I got curious as to what she might be seeing. She then started squealing. I kicked over, and just up current; I could see a shark lying on the bottom. The current was ripping in the 2 plus knot range so I descended and held on to a rock until I could see the shark was not swimming off. I rock climbed back against the current and observed the shark. It was about 7 feet long, probably a Dusky or Sandbar and was hooked in some kind of a commercial rig. The shark was attached to 600# test white mono that was coupled to a stainless steel cable that was hooked into the reef somewhere up current. The shark couldn't move any further down current so I approached from the rear. I reached up and touched her and she exploded. It took me that long to realize this was a bad idea. By now, 2 other divers had latched on to the bottom near the sight and were wondering what I was going to do to help this poor animal. I was surrounded by do gooders so I remembered everything I learned from last night's show and reached over the shark and began rubbing just under the snout, too close to the teeth. To my surprise, she calmed down. I then switched hands, grabbed her by the dorsal and flipped her onto her back. I kept rubbing the area and slowly made my way to the hook. Yes, the one in her mouth! I noticed the hook was aluminum or some soft metal and would deteriorate over time so I elected to cut the line. As I sawed on the thick mono, the shark just slept. I cut the line and turned her right side up. A quick tug back and forth to help oxygenate her (I learned this on a fishing show) and she swam off. I kept the mono as a token and headed for the surface before the shark came back. I may be dumb enough to try this but I didn't think she would come back to thank me. Back on the boat I felt safe and experienced an unusual high. I was happy. Happy that I wasn't eaten by a ferocious animal and yes I will admit it, happy to be a do gooder and help preserve the Kings of the Ocean, our friends the sharks. That was a truly amazing story! I thank you for it and for what you did! I wish I had been there. It is hard to believe, but I believe you and raise my glass to you! I wish I could take the credit, but it was not me. I do know the guy. though. It seems that of the 80 respondants so far, only 10% could be termed "afraid" of sharks (and that with my tongue in cheek fear factor categories). Not what I'd call a mass panic. No Misses is my best dive partner. He was diving off my boat in his described incident a few weeks ago. But he always deals with it the same way I do. Funny how you hate my method, but like Daves :smilie39: Go do a search of No Misses "running with the bulls" story. That incident was off my boat also. I find that most divers are truly afraid of sharks. But when I talk to non divers, its their biggest fear. Sharks are the reason my wife gives for not getting certified. Didn't say I hated it. Once again you put words in my mouth!LOL What I would have said is that your attitude that diving with sharks in a somewhat "chummy" environment (which, any intellegent spearfishermen would agree is the case) doesn't carry with it any greater level of danger than being around a domesticated animal (DOG) that may be barking at you and you can "dominate" into submission is......FOOOOLIIIISSSHHH! The fact that No Misses dives with you supports your side of the argument not one iota (this reminds me of the kindergarden sandbox debate of "he's my friend not yours/he's on my team not yours" type of thing). But what he DOES seem to say, and which you don't, is that he is aware that there is a distinct possibility that he may one day have to "pay the tax"; meaning that he is aware that it can be a dangerous, risky situation to put oneself in and he has a healthy respect for that. I'm simply saying you don't appear to have one of those, but rather seem to take the approach that you are bullet proof and can easily tame, domesticate, and dominate the shark. To boil it down to a very fine point: YOU can dominate the SHARK. This may be the case for some sharks. But I imagine that you are playing a game of Russian Roulette. But I do not hate your sport. I am glad you enjoy it. I just think your attitude is a bit reckless, though it matters not, because you are definitly entitled to it!:) It is your life and limb to gamble with. I hear a ton of good things about the shark diving there! We just call it diving. When I think of shark diving I think of going to the Bahamas and chumming the water to attract them and get them into a frenzy, which is a horrible practice if you ask me. I had always wondered what it would be like to be in the water with sharks. So, while I was diving in Roatan I went on a shark dive. We were about 70 feet down with about 15 grey reef sharks. I never felt threatened. Now, if I was in the water and there was a tiger or bull shark around, I'm sure it would be a deffernt story. In the early 80's while wreck diving a large school(?) of 6-8ft hammerheads swam on by. It was a bit disconcerting initially but very cool in the telling. :smilie39: You still have no idea what your talking about! When he says he'll have to "pay the taxman someday" he means he might have to give up his speared fish someday. He didn't mean he thinks he might get eaten someday. When you use descritptions of me as "Russian Roulette" and "reckless" for doing what? It only shows you are trying to depend a wrong position you got yourself into here many posts ago. But keep it coming! It's great entertainment to watch someone crash and burn. "You know, Grin and I have kindly debated this before a LONG time ago I think. So I'm not really looking to "enter the ring":). But I do think that we humans get to feeling 10 feet tall and bullet proof if we have a lot of experience under the water. I don't mean that we really let our guards down in terms of scuba safety, but what I do mean is that the shark (or most any other marine animal) has the home field advantage. He can manuever on a dime 'cause it is his home turf. We simply cannot, as it is not our natural environment. But we get to thinking that we can do so and get into a comfort zone (not that we would say this out loud but we sure act like it). We get to thinking because we have some sort of weapon (speargun and tip for instance) that we can ward off an attack. It is a GREAT risk, that so far, Grin and company have come out on the fortunate side of ok. But the shark is not a dog, and we are not dominant over them when in the water. It would be like the little dog that comes around and barks and intimidates my very BIG dog and actually (for now) makes him keep his distance. All it would take is this little dog actually landing one of his nips and my dog is going to show the little dog the meaning of "short man syndrome". But thankfully the little dog hasn't gotten close as my dog stays JUUST out of reach of his nips. But it is only a matter of time. Grin can (and did..lol) disagree but the same phrase applies to spearfishermen that think sharks and dogs are similar when it comes to "submission". It is only a matter of time. It is, of course, their personal calculated risk. And though I certainly hope not, but I fear that one day, the Grins of the dive world will eventually run into the shark that has no intention of "laying down" when kicked as he said they would, similar to dogs. One lightening fast burst of speed, a flip of the tail and Grin would grin no more. But this is one that I don't at all mind being wrong about:)." There is no right or wrong here. We are debating opinions. No loosing battles, no crash-and-burns on either side, despite what you think. So here again, as in several other posts I've made, I'm not trying to be "right". I am not so ignorant and immature that I need to delve into some childish internet "fight". Perhaps both of us have strayed over that line already. But it stops right here. Better yet, follow the link and knock yourselves out! Why did you leave your name out of the title of your new thread RikRaeder? Hate to see this happen of course. I wonder what the rash of attacks here lately is due to. I haven't looked at this closely in the ISAF files but I'm going to look and see if this is typical (year to date/attacks) but just usually hasn't been noticed by the media in the past or if this is a little bit of an elevated rate of attacks. I know we are overfishing our oceans, which means less food for the big hungries. Then again, we land dwellers are in the water more these days. But if you don't mind I'll beat everyone else to the punch---ITS THE MEDIA (bash, bash, bash)....ok that is done and not really needed in any further posts:smiley20:. Now, lets look beyond that "reason" and see what the facts that we can know have to say. Off to the ISAF! Now let's be realistic. This is a diving forum. The threat from a shark for a diver is a lot different than for a surfer. I do both. Surfing generally is done in churned up water where visibility is limited. Often the best surfing is found around inlets where the breakwater developes a point break or between a sand bar and the beach. Both favored by sharks for feeding. The inlet because they feed on crap from the outgoing tide and sandbars where they can corral bait and bigger prey corraling bait. Also Bulls bear their young up river in these places. A surfer's hand or foot dangling in the churned up water is occasionally investigted by the shark as a possible bite size treat. A Scubadiver on the other hand is normally quite visible to the shark and is about 7 ft long and 2 to 3 ft thick. There is easier prey for them. What I was thinking about here, as far as "fear of sharks," was the visceral and unreasonable type. The little creepy feeling you get on the safety stop, deco, or whatever. We divers all know that the odds of having shark related problems is miniscule, but we've all also seen Jaws, and many of us have been conditioned: Shark, bad. Oh yeah! I definitly agree. I just thought it was a good point of information. But dude, I definitly couldn't surf. I don't have a fear diving with sharks but I would fear them if I was a surfer. You and the other surfing clan have nerves of STEEL! LOL I've often thought about trying it, because it MUST be fun for folks to run the risks they do in placed like Austrailia and off the coast of the Pacific. I just don't have the guts. I don't really get out and swim in the surf when at the beach. And if I do wade in I am in CONSTANT watch for bait fish running, shadows, and other telling signs of sharkiness. I've always heard that if you see porpoise (is that the plural of that word?) jumping that is a possible indicator of predators, namely sharks, around. Hang 10 for me! I am too much a sceeerdy cat! I AM concerned when my 16 year old daughter surfs. She is fearless and stronger than I so I have trouble keeping up with her. She also likes to sit way outside rather than fight with some of the guys in the line up. Although for the most part they are pretty good about giving girls a wave. There are however some older guys who contributed much to the local surf community who drop in on anybody, including girls younger than mine. Think they earned it I guess. Sorry, I digress. Reason dolphin are associated with the predators, they eat the same food. Here is how I look at it. When I am diving they don't bother me. When I am on the surface they freak me the hell out. I hate not being able to see what's under me. Not afraid at all, love seeing them I just wish it was more often, that being said I might be a bit scared if I came face to face with a Tiger, Bull, Great White or Oceanic White Tip, in that order, but would still love to see one albeit at a safe distance. Some perspective from the Int Shark Attack File from 1580-2007 there have been documented 2199 attacks world wide with only 471 being fatal, of course Im sure this number is on the low side given records until the mid 1900s were sketchy and of course not all attacks are reported but even so given the numbers of people in the oceans at any given time, Ill take those odds. According to records surfers and swimmers are at a much greater risk, so keep on diving. America is no#1 880 attacks, Australia no#2 with 345 attacks, Africa no#3 with 276 attacks, Pacific no#4 with 131, Asia no#5 with 117, Hawaii no#6 with 113, South America no#7 with 100 and the rest are all less than 60. When ya think about it these are pretty small numbers with only a small percentage of those attacks resulting in a fatality and an even smaller number of those involving scuba divers.
2019-04-22T06:51:56Z
http://forum.scubatoys.com/archive/index.php/t-13175.html?s=90000bcebca6bc1d2ae6e988af52e6b0
Pregnancy is a special time in any woman's life. But the rapid changes that occur in your body during pregnancy can cause all sorts of pain. When this happens, chiropractic care can be extremely beneficial. At Lieberman Family Chiropractic in Rome, GA, we're here to help alleviate some of the pain and discomfort associated with pregnancy so you can enjoy this magical time with more comfort and less stress. In addition to pain relief, there are some other good reasons to consider seeing your chiropractor during your pregnancy. Did you know that chiropractic care can even help in the delivery room? Pre-natal chiropractic care has been shown to decrease labor and reduce pain. Let us help you enjoy a happier, healthier pregnancy while setting the stage for a smooth delivery. Call Lieberman Family Chiropractic in Rome, GA today to schedule an appointment and learn more about our pregnancy chiropractic services. $50 off New Patient Exam + X-rays. New Patient exam and x-rays are regularly $125. Submit your email address to be contacted about this offer and other promotions. An absolutely wonderful treatment. Dr Rebecca is doing a great job as always. I would recommend ya'll to everyone. Timely, professional, great customer service and..... knowledgeable! Super friendly and welcoming as always! Dr. Brian and Dr. Rebecca have both been a huge help. With a four degree curve in my lumbar and a deteriorated disk pinching my S1, I was walking with a cane at 45. With their help I was off of the cane in less than two months, and haven't needed one since. Lieberman is one of the best decisions I've made in years! Amazing group of Doctors who strive to provide the best customer service and care to their clients. It’s been a great experience getting adjusted. So blessed to have given this office a try. Not only have my issues resolved, but my eyes have been opened to the many natural benefits of having my body properly aligned the way God intended. Definitely keeping them as part of my regular wellness regimen. Highly recommend! Best chiropractic care in rome. No comparison. Excellent service and always welcoming environment. Staff attentive to concerns. My family has visited here for years! We’re huge fans of Dr. Lieberman and his entire staff. They’re all always so friendly and helpful. I highly recommend their practice! Very very polite, professional, but aslo at the same time very family like always smiling and greeting you, never leave without a hug from Dr. B. I would recommend this excellent place to anyone amd everyone. I love this place and enjoy seeing Dr. B and his team every week. Really family oriented. I drive one hour to visit this chiropractor because he is Webster certified. Going to keep going here for regular family care though. Very thoughtful staff. My kids, husband, and I love going here. I have not had any back pain in about 6 months. It not just a doctor office they are family and have been for us in our time of need. I highly recommend them to anyone. I have always had a healthy belief in healthy holistic spinal chiropractic care and it's findings so becoming a Lieberman Family member was only the next basic step in the evolutionary findings of a healthy holistic spinal care specialist for my body. I was in severe sciatica pain when I crawled in on a rainy Monday evening. I was on a cane and nearly skipped out, tossing my cane into the air as I left. I felt so much relief. And to think I had just spent $150 to the emergency room visit the week before and the outcome reached nowhere near the relief I felt after my visit with Rebecca the first time around and even better just days later with Brian. I am not new to the world of chiropractic care but, I honestly expected to be in the never ending torturous grips of a beast determined to make me stiff as a board by the end of my session, leaving me screaming for my life. Instead, I was pleasantly surprised at how understandingly gentle they both were and the entire staff made me feel that I had found my new home. I was looking down when I walked in because of the stooper I was in and, I would swear the "Welcome Mat" actually read, "Welcome Home" but..., maybe not. I'm home now though. Thank you to everyone at Lieberman Family! I had my first visit today and I am very satisfied with the care and service provided. The staff and doctors were very attentive and friendly and they made me feel like they really cared about my individual needs. Will definitely be going back regularly! The staff is very friendly! It's a great and professional atmosphere. LOVE my time there! Fast, easy, and friendly. Lieberman chiropractic is the best. As someone who travels and has seen many different chiropractors over the years, they have all been judged against my first visits with Lieberman 17 -18 years ago. And having come back in recently I remember why. Absolutely the greatest level of chiropractic care available. Great doctors and a wonderful staff! I have been going to Lieberman Chiropractic for 10 years. I have never had a bad experience. They are friendly, professional and value your time. My entire family goes to Lieberman including my new grand baby since he was a week old. He is now 4 months old sleeps all night looks perfectly happy and healthy. I always feel better after a visit. Its not only from the adjustment but knowing your going to get a smile and a hug. I would Highly recommend to any and all! I met with Dr. Rebecca for the first time last week. She was very professional during my exam and afterwards during my consultation. Everyone in the office was very friendly. Positive, uplifting environment, well trained staff, caring and thorough! Dr. Rebecca is gifted! Instant relief on first visit! Incredible! My entire experience at Lieberman was perfect. I called, they got me in the same day as a new pt. When I arrived I was greeted with smiling faces and warm people. People who I could tell genuinely cared about my well being. When I left I felt like a brand new person. Will definitely recommend them to anyone I know looking for a chiropractor. After dealing with lower back pain for three months and seeing local doctors and regular physical therapy treatment & strong medications, I was not getting much relief. My daughter highly recommended that I go for an evaluation (she is a patient). I was able to be seen today for an evaluation and also received my first treatment. After all was clearly explained in detail to my problem and how to correct the misalignment of my neck & spine, I am confident that this will give me relief and return me back to much better health. Very professional and sincere in all areas! I just don't like taking medications to begin with, so I see many positive results forthcoming in this form of healthy treatment! As a retired Rome Firefighter/EMT, I highly recommend the Lieberman Family Chiropractic. A special mention to Dr. Rebecca for her thorough counseling in explaining before, during and after treatment and the follow-up recommendations and instructions prior to my next visit. Fantastic experience for my daughter! Truly appreciate the excellent care, and caring manner in which the staff handled a teenage girl! Hobbled in, walked out. This was first visit to a chiropractor. The staff were friendly and helpful. Procedures were well explained. Costs were explained up front. The doctor explained what adjustments she would do. and sure enough, I gained back mobility! I will be back! It was very refreshing to walk into a business and feel like you were their only patient. The experience started with the front desk and continued to the actual doctors themselves. Take a bow, you've remembered that your patients are people and not just a number. Two weeks into my first experience with a chiropractor and my back is 100% better than what it was when I started. The office has a great atmosphere, and a very friendly and caring staff. Thank you all for what you have done so far to help me. Dr. Brian Lieberman got me through my entire pregnancy! I was worried about an old back injury getting aggravated and causing me troubles during my pregnancy....but seeing Brian 1 or 2 times weekly for just slight adjustments, along with yoga 4x a week, I literally was free of pain (asside from the sore feet, but my husband fixed that daily;). Also, Dr. Brian checked my son the day he was born and a few times in the coming weeks. Very gentle pressure, but he was able to help him realign after delivery, and he does not favor his head to one side anymore. Fix it in the beginning, helping them grow up the best we can. Thanks Lieberman Chiropractic!! Dr. Rebecca is very, very nice! She went over my scans and x-rays with me, showing me where my problem areas are. The overall atmosphere is like a big family reunion or gathering with friends. The two ladies at the desk are super friendly and helpful! This entire staff really makes you feel welcome and comfortable from the moment you enter the building. I would recommend this place to everyone, whether you are in pain or just trying to keep your body healthy!!! I can't say enough positive things! The doctors are truly caring and beyond competent and the atmosphere is welcoming. I've never been disappointed and would (and have!) wholeheartedly recommend Lieberman's Family Chiropractic to my friends and family. My son and I experienced the first visit with Dr. Lieberman and I must say it was astounding; what a learning experience with immediate results from the first adjustment. We left with an overwhelming feeling of "Hope." To have this Family Chiropractic Team in our hometown of Rome, Ga is a true Blessing. Looking forward to the follow up and future visits. I was fortunate to be evaluated by Dr. Rebecca on my first visit early this week. Her interest in my health and explanation of my x-rays was impressive. I will be going back on a regular basis. Thank you. What a difference you make for us ! We love our Chiropractic Family who are earnestly concerned and helpful, physically and emotionally! Our life is blessed by Dr. Brian and all of the staff! You will want to come because of the healing and you will stay because they are friends! Very good in everything they do. When I walked in I couldn't raise my hands above my head or behind my back. Also was in a great deal of pain. They was very concern and explain everything that they were going to do before doing it. When they finished with me I was able to move my hands above my head and back without pain shooting thru me. So thankful for what they did for me. Looking forward to going back next Monday to review all my x-rays and test results in detail. Friendly and personable yet very professional. Love the atmosphere and never have to wait long for adjustments. Dr B is the best of the best! I really enjoyed my visit today. Everyone I came into contact with was very friendly and encouraging. Amber was very nice and efficient. Rebecca was awesome and I appreciated that she listened to my issues and was thorough in addressing my goals of the visit. Amy was nice at checkout too. From the time you walk into the door and get greeted my Amy. Then adjusted by Doc, you are made to feel special and cared for. He always listens to your aches and pains and you walk out with a smile on your face. Best practice ever. The friendliness of the ENTIRE staff is unbelievable! The first examination is better and more thorough than most medical doctors! First adjustment was AMAZING! Highly recommend! I was given a recommendation to go here. It's the best decision I have made this year. The staff is great and extremely knowledgeable and helpful. After one visit and one adjustment I can tell a difference. Will be going back for future visits. I'm always impressed by the way I am treated. Friendly and professional, and I always feel better after a visit. Very Professional helpful, kind and you feel like family. Me and my entire family love Lieberman Family. Everyone goes including my grandson since the first week he was born. Highly recommend! I have always been skeptical about going to the chiropractor. After today, if I know anyone who was in my shoes or wants a good chiropractor to go see, I will recommend Lieberman Family Chiropractic. Not only was the staff super friendly, professional, and helpful, but also my back has never felt better. I will definitely return and continue with the adjustments. The staff was very friendly and professional. Every step and procedure was explained clearly and thoroughly. A very welcoming environment. I feel better after just one visit! I think I will be in good hands. Great family atmosphere!!!!! Everyone was so personal, makes you feel like you’re really important!!!!!! Dr.Rebecca was so awesome!!!!!! She made me fill so great!!!! Amber is a great first contact!!!! She was very thoughtful and informative while we were doing my evaluation!!!! Thank y’all so much for all y’all do!!!!! We love Dr Rebecca and D Brian SO much!!!!!! Dr Rebecca has been a huge blessing for our family!!! Our kiddos love her and the adjustments have made all the difference with their immune systems! They truly care about their patients and we are so thankful for them! I’ve seen several chiropractors and the doctors at Lieberman are very knowledgeable and caring. Thank you Lieberman Chiropractic for helping me stay healthy and happy! My little family always leaves feeling well taken care of. Dr. Rebecca and Dr. B have helped keep our family healthy and adjusted for almost 8 years. I highly recommend these folks to anyone needing relief or wellness. As always thorough, caring, loving and all around wonderful!!! Awesome Chiropractic Care for us !! I’ve been coming to LFC for several years now, and I like how friendly everyone is. The atmosphere is always positive,the staff is very helpful and the doctors are very professional and knowledgeable.Dr Brian has helped me tremendously with my back issues.Not only that, he had also given my beloved little senior poodle , NEMO, his mobility and life back , after he had a slipped disc in his little back and couldn’t move anymore and the vet could only give him pain medication.Needles to say, we are forever thankful to Dr. Brian...he is the BEST!! And NEMO still sees him weekly and never had a reoccurrence!And I too feel so much better after my adjustments. Outstanding service and friendly staff! Thank you! I know why he has been chosen chiropractor of the year 5 years in a row...............he is so good !!!!!!!! My visit was spot on! I have not been in for a visit in many, many, many months. Rebecca knew exactly what to adjust. I literally felt instant relief after she worked her magic with her hands. Thanks for knowing what to just for me! Felt much better. The headache I've had is for the first time gone. Just started seeing them had issues after my first adjustment. The doctor went above and beyond to get me in and worked out all the issues. Down to telling me to text him no matter what if I had anymore problems and he would do what was needed to see me even if it's when the office is open or not.... Over all amazing staff!!! The staff is AMAZING. They are informative, friendly, family oriented and timely! We feel comfortable when we go in, and my baby loves Dr. B!! This is my first experience with chiropractic care and they have been perfect. They did a great job of explaining the benefits to this type of medicine. I couldn't be more pleased with the customer service and personal attention. I have been going to LFC for over a year. I started taking my daughter after she was home and started having acid reflux and constipation issues. We are slowly getting her off all medications. We both have terrible allergies and we can tell when we have missed a visit. At first my mom was skeptical but she can tell a difference and helps me make sure that we make it to our visits! We love both Drs and we recommend them to people all the time! Everything was excellent. Every staff member was very professional and I received excellent care and treatment. The staff were very professional and friendly. Everyone went out of their way to be helpful and informative of each aspect of the visit. The adjustment eased my pain and allowed me to have a good night's rest. I am aware that numerous adjustments are required to reach the level of relief I seek. I look forward to my next visit. I have already recommended your doctors to friends who could benefit from your services. I highly recommend Lieberman Clinic! First ever adjustment and I was a little unsure of things. After consult and adjustment I realized how much this could help. I feel different in a good way afterwards. The staff was helpful and clear about the whole process. The staff is always helpful and welcoming. I was seen by Dr, Rebecca and as always it was professional and she did an exceptional job. I have enjoyed every visit and look forward to my next. My family and I are always treated like family. As a nurse myself, I had my doubts about chiropractic services. Most chiropractors push you into an all or nothing strategy, and I end up in more pain than when I left. The receptionist filled us in even though they were very busy. I want to say her name was Dr. Rachel ( bad with names) was very knowledgeable and guided my friend and I through a tour explaining everything she was doing, while allowing us to stay together. This was important because we could see the difference the adjustments made on each other. I would highly recommend Lieberman Chripractics to anyone. I loved how they informed you with video and discussion before ever touching you. Also doing X-rays to make sure there were areas to be cautious or concerned about. I WOULD RECOMMEND LIEBERMAN CHIROPRACTICS to anyone including infants, children and animals. Truly an Amazing visit! My kids, husband, and I love going here. Not only have they help me with my back pain but they have been there for us in our time of need. It not only a doctor they are family. I highly recommend them to anyone just give it a try you will love it. . LFC. Gently welcomed me, a reluctant client,at first. I required special arrangements for my visits(at first) due to my disabilities. Bipolar1 extreme social anxiety and I "was" introverted and didn't like people in my personal space, much less toucjomg me. I began in a private room with all my idiocies that restrict. Rebecca was thorough that in6.months those restriction were gone. I was deeply awaken mind, body,soul. I welcome people around me.I comfortable getting aligned in the main area with others m to sum up. The LFC did more than align me they woke me up to life from within. The most beneficial healthy choice for me . I highly recommend you come meet the Family and get"woke up to life from within" Sometimes I don't even know I have a problem until I get adjusted and realize how much better I feel. AMAZING! And every employee always speaks to me. Not like some offices where employees won't even give you eye contact. Very helpful & very explanatory! They were all very nice and I would recommend going here! I feel so much better just after the first visit! My dad and I have been enjoying the care of Dr. Lieberman and his staff for several years. We have received professional care and continue to be treated like members of the family. I always leave feeling better than when I arrived. The staff appear to genuinely care about us, the state of our health and well being, as well as being concerned when we experience personal crises. I can stand walk and bend over!!! I had a bit of a wait and was anxiously skeptical. Such that I had already decided that I would not allow Dr Brian to "adjust" me on the first visit. But Dr Brian was "up front" with me explaining the wait unlike any other doctors visit. And, somehow, the whole staff instilled a sense of trust and easiness that made me comfortable. I was elated that I changed my mind. Looking forward to learning more. I was nervous about my first time going to the chiropractor, but you all made it a great experience! The front office staff made me feel welcomed and were very polite and helpful. Dr. Rebecca was very sweet and thorough, along with the intern. She made me feel relaxed and really cared about my problems. So glad I found this place! Thanks to Dr Rebecca for the pain relief you gave me today! I have had constant pain in my left shoulder and arm for about three weeks, it's a amazing how much better it feels! I've tried a few other chiropractic offices and Lieberman Family Chiropractic is by far the best. The people are friendly, you are treated like family (or better!). The wait time is never too long. The doctors are wonderful and have kept me "in line" for over four years now. In that time, I have had very few doctor's office visits except for yearly physicals. But one time I had a problem and went to them and they suggested for me to go to my PCP. I feel very confident in my decision to have weekly adjustments. I have been coming to LFC for about 15 years. That should say enough. did not have to wait long, Dr. Rebecca knows my problem areas and adjustments always makes me feel better. I had been traveling quite a bit for the last few weeks, without the benefit of chiropractic care. Multiple plane trips and long car rides had me tight. A few adjustments by Dr. Lieberman and I'm good as new! Relief and peace flowing through my body. I can never say anything bad about your office. Everyone is always friendly, professional, and truly amazing. Both Dr. Rebecca and Dr B are amazing at what they do. I dislike going into a doctors office. But coming into your office, is like going in to visit family. Things were awesome, as always! I got in and out quickly. Dr. Brian is always very careful and deliberate. I couldn't ask for more. We have been patients at LFC for over 13 years. Our family is generally very healthy. We attribute our continued good health to maintaining a well-adjusted nervous and spinal system. Dr. Lieberman and his staff are very knowledgeable, professional and friendly. They truly care about my family and our well-being. I would highly recommend their services. Wonderful, caring doctors and staff! Before coming to LFC, I suffered for years with terrible neck and back pain. After finally being convinced to give it a try, I found blessed relief and I'm a believer! I recommend LFC often. Not only do I get fabulous chiropractic care, I know that everyone there really cares about me and my family--these are my people. I'm so thankful for all of these wonderful people and all that they do for their patients and the community. Love going there...The place has a family atmosphere. Dr. Brian is a pro. My first experience was thorough, and professional. Although I have to say the waiting room was noisy. I (personally) don't cope well with lots of noise and screaming babies. I (personally) also don't like the idea of people (or myself) getting adjusted in public in front of other people; as I saw that happening, I don't know that I'd be comfortable with that. That being said I would still recommend them to others, I suppose this is my own thing. I'm autistic, it's my own discomfort, not everyone else's. total skeptic converted! Wonderful Place to visit, AMAZING results and you feel like family!! was total skeptic at the beginning of my first visit which was after a 7 month period of physical therapy twice a week for an injury to my arm. The people struck me as warm and caring from the minute I walked in, but it was only after I walked out that I realized what an impact this was going to have on my quality of life. Almost immediately, even before my first adjustment was completed, I felt pain relief. I thought it was all in my head, because I wanted relief so badly. By the end of my first visit, I was almost in tears because I was astounded that this could have made such a huge difference in such a little amount of time, and the thought crossed my mind that I should have done this instead of wasting all the money and time previously spent on physical therapy. I started out at visiting twice a week and honestly began to look forward to the atmosphere and warmness almost as much as the adjustment. You are in and out in what seems too short of a time, but honestly, the difference this wonderful group of caring professionals have made in my life is nothing short of miraculous in my opinion. The night after my first treatment was the first time in 7 months that I had been able to sleep and to do so pain free. No more creams, no more patches, no toxic pain or inflammation medication, my body was healing itself as they had indicated it might do if allowed to function the way it should once you are in alignment. I cannot say enough about my experience, or how wonderful everyone there is. I would strongly recommend paying them a visit. I cannot say they will be able to help your situation, and they won't say that they are going to cure you, but I can tell you about my experience and the reason that I continue to visit them at least once a week. Come for the camaraderie, and stay for the treatment, both are sooo worth the short time you will spend on your journey to a much healthier and less toxic life! I absolutely look forward to visiting with them each week! Very friendly and personal with my daughter. Informative and explained everything to her as it was happening! Dalynn was so nervous coming in today but Rebecca was wonderful with her and explained everything she was doing step by step. She explained to Dalynn WHY everything was hurting and gave suggestions on things to do at home. As we were leaving, Dalynn was going on and on about how much she lived the atmosphere of the entire place and how friendly Rebecca was! As a mother, that's a very great feeling to know your child feels so comfortable where she receives care! Everyone there are super nice and explain everything well! Defiantly excited about becoming a patient there! The staff was extremely friendly and knowledgeable. I was seen in a timely manner and felt great after my first adjustment! Friendly staff. Wait was short. Adjustment was quick and painless. Slept much better after the adjustment,less pain and stiffness in my neck and shoulders. I usually do not like having my neck adjusted manually, but the adjustments I have had here have been painless and my neck adjusted easily. Friendly staff. Very professional. I am very pleased with my first visit. Outstanding Staff, friendly and expeditious in getting checked in and explanation of symptoms! Everyone in the office were very professional and polite. I haven't had an adjustment in over 20 years and my back and neck areas were very tight. I haven't slept well in about a week.Dr.Liberman didn't adjust me the way he really wanted to but knowing where to adjust me on my first visit he was successful. I slept very good last night and the sharp pain in my neck is very much improved after one visit.I would definitely recommend to my friends. Never felt better!! Prompt courteous service with a smile! It's always a pleasure to see Dr Brian and company. Always feeling welcome and like a member of the family. Every single person was friendly and informative! This was my first visit. Your whole team was extremely professional and informative. I am very hopeful that you will be able to help me with eliminating my pain. Every visit helps my adjustment. The expertise of Dr. B. helps my physical adjustment while the atmosphere, culture and enthusiastic people help my mental adjustment. It is refreshing to be welcomed into a family of caring individuals. Always friendly and rarely a long wait. Love how they make you feel like part of the family instead of just another patient on the list. Visiting the office is like going to a get together with friends. I almost always see someone I know. Every time I go for my visits, the staff treats me with respect and concern for my well-being. They go above and beyond - especially when they can see the pain in my eyes. They even give hugs to help make things better! Thanks y'all! The Lieberman family is awesome! I recommend them to all my friends and family. They have truly made a difference in my life!! I had poor circulation in my legs and fluid that kept my legs swollen. After just one visit with Dr. Rebecca the swelling was gone and half the pain. With each visit things just keep getting better!! Thanks Dr. Rebecca!! Love this place! I have been super impressed with the very friendly, professional, and quality service I have received. Very time efficient! I feel like I have known them forever but it has only been a few weeks! I have felt so much better since using their services. I look forward to good health for a long time with their help. I highly recommend them! I love you Dr. Becca! My 1st visit to a chiropractor, so I was very nervous. I knew I have neck issues, but the lower problem that just occurred, was an eye openinger. I amazed me of how quick other clients visits went, then went I got my adjustment, it went just a quick and painless. Thank you!!! Danny and I both enjoy coming to our chiropractic visits. The staff is always attentive and available to answer any questions we may have. We feel very comfortable in the surroundings...very bright and cheerful! Dr. Brian listens closely to any related complaints we may have regarding our adjustments. For over a decade I have received the most phenomenal treatment from LFC. I have recruited my dad and continue to try and recruit my grown children. I only get healthier each and every visit and when I miss visits ...my health (physical and mental) suffers. Thank you, Dr.B, Rachel, and all the staff for helping me. Dr. Brian Lieberman got me through my entire pregnancy! I was worried about an old back injury getting aggravated and causing me troubles during my pregnancy....but seeing Brian 1 or 2 times weekly for just slight adjustments, along with yoga 4x a week, I literally was free of pain (asside from the sore feet, but my husband fixed that daily;). Also, Dr. Brian checked my son the day he was born and a few times in the coming weeks. Very gentle pressure, but he was able to help him realign after delivery, and he does not favor his head to one side. Fix it in the beginning, helping them grow up the best we can. Thanks Lieberman Chiropractic!! My husband and I were treated with respect - they listened to us and made sure that we were comfortable. Most importantly - they took great care of us - great visits for us! I'm always amazed how much better I feel and can move once they adjust me. I was really a sceptic when my daughter convinced me to go after my car accident. It's not just the adjustments, it's the love and concern they show at every appointment. I love and appreciate Doctor Brian, doctor Becka, and the whole staff. In and out in a flash. Everyone is so friendly. That's why "Family" is in the name. I was amazed at the thoroughness of this office and the time they take to explain your problem areas, as well as provide treatment plans! 12 years in, I still look forward to every adjustment. My wife and I have been going to Lieberman Chiropractic for over 15 years! We have always been totally satisfied with the care we have received and the professional and friendly service. We are healthier and happier because of receiving adjustments from Dr. Brian! Felt good to be adjusted. Our family has received chiropractic care from Lieberman Family Chiropractic for almost 5 years. Our girls have gotten adjustments since birth. We are all healthier because of chiropractic care. The care and concern the doctors show our family means so much! I came in and there were only a few customers present. It was recognized that i had entered the office and was escorted directly back to the treatment area. I received the adjustment from my regular chiropractor who knows my needs well and gave me the adjustment. i was in and out in about 10 minutes. It's like stopping by to see family. The adjustments have improved my mobility so I'm able to do things now that were painful before. I'm so much healthier by being able to exercise more. Adjustments I've had with other Doctors were hit and miss and most times painful but Dr. B always gets me adjusted immediately and painlessly - the painless part is very important. I'm grateful beyond words to be able to bring my dog in for adjustments. Dr. Becca did a great job adjusting my spine. She got rid of some pain and relaxed me. I was looking for a chiropractic service that was friendly, affordable and would provide adjustments that would bring positive results. The whole staff was very friendly and gave a down home feeling I was looking for. It seems that when I go to the Dr. they tend to say take 'something ' and give it a few days. In a few days there is no change. I go to my Chiropractor and they tell me what is wrong and help it heal. Everyone at Lieberman clinic is friendly and cares about each patient. Keep Calm & Get Adjusted! Chiropractics has helped me so incredibly much! When I started I had back pain, foot pain and shoulder pain. After a month or so of having adjustments, those pains started diminishing and now I do not have foot pain and if my shoulder and back ever hurt the pain is minimal! I haven't had a cold/sinus infection since I started getting adjusted. I always feel better when I have an adjustment. Best of all, all the people are so kind and genuinely care about their patients! Thank you LFC! Dr. Brian and the entire LFC team are amazing. Each person is a joy to see when we walk in and we always have a great experience. My husband and I have been members of the Lieberman Chiropractic family for several years. The atmosphere is positive and uplifting. Wellness rather than illness is emphasized. The staff here genuinely care about their patients and believe in promoting a a better, healthier life for all. It's amazing how this office becomes a second home, meaning you gain a family. The instant you step into Lieberman's there's great laughs, plenty of helping hands, encouragement when needed, and a counselor or two. I love know that my family is in great humble hands. But most of all I love reading the wall that states something on the lines of - we move the bones but God does the healing. We checked in and were immediately treated, all with personal service (known by name). Felt much better after the adjustment. Great place! Dr. Rebecca is the Best!!! Dr. Rebecca takes great care of me and I took my girls to her yesterday. She was awesome and took great care of them as well. All workers we nice and friendly. I was incredibly impressed with my experience there. Wishing I would have known about this practice sooner!! As a first experience with a chiropractor it was good. I had a correction on my neck due to a disk problem. First night, no great progress was visible. Next day was already better. Looking forward for my next appointment ! I found the office to be neat, clean and professional looking is all areas. The care, knowledge and time spent with me by the doctor made me fill like I was the only patient that day. Everyone was friendly and made me feel comfortable being there. The treatment received that day had excellent results and by the late afternoon I was feeling better than I had felt in 3 weeks. My headache and earache was gone! Dr Rebecca is awesome!! Very thorough, kind and professional. She showed great concern for my health needs and is very knowledgeable. I have only been a patient for about 3 weeks. But, I feel so much better. I love the open, easy check in. The doctors are wonderful. As a first timer, seeker for Chiropractic service in the Rome area, I was very pleased. The wait time, paper work, exam, x-rays etc.. was very quick. Approx. 1 hr from the time I arrived. A special Thanks to Rebecca & Her ministry to West Rome Baptist Church Staff. Very strange to show up and learn that I needed no adjustment(s) . . . a result of my holding the adjustments provided previously, no doubt. Thankful for assistance in keeping my alignment in the right and for holding wrong bone posture positions at bay. Thank you very much. Wish to have thorough treatment for any and all subluxations with every visit, regardless of spine condition. Need continuing truthful facts and information of current condition and how to improve. Appreciate friendliness and caring of staff. Everyone was friendly and the treatment of a new patient was excellent. Felt very comfortable in the environment. I loved the environment. Very nice large office with bright colors and comfortable chairs. Dr. Rebecca takes great care of me. She's quick so I don't have to wait long and she always explains what's happening and helps me know what I need to do to stay as healthy as possible. Dr. Rebecca was awesome!! She helped me understand everything she was doing and worked with me on a plan to get better. Don't get ear tubes! See Dr. B first! My 2 year old daughter had 6 ear infections in less than a year. It seemed like she was always sick with one bug after another. The antibiotics worked sporadically, and we only had a two week infection free window before she would need more meds. We were referred to an ENT, that stated she met the criteria for surgery. Making the leap from antibiotics to surgery was too much, as she is only 24 lbs, and I knew I had not tried everything...yet. Online research and reviews led me to Lieberman Family Chiropractic. I have no prior experience with chiropractic care. My family and friends are nurses. Since we were headed to surgery anyway, I figured what is the harm in giving an alternative treatment a try. I am so thankful we did. This is the 3rd month without an ear infection or pediatrician visit of any kind!!! Dr. B is courteous, professional, and knowledgeable. He called to check on my daughter after her first visit, and saw my son when the office was closed! He truly cares for his patients and the office has a lovely close-knit family vibe. The only negative is that I did not try chiropractic care sooner. Thank you Lieberman Family Chiropractic!!!! Better than going to the physical therapist!! I suffered an unexplainable injury and taken to emergency where I was given an X ray, crutches and told to rest, given crutches, and told to come back in a few days. When I went to the follow up, I was told heat, go to a physical therapist who may or may not order an MRI, and apply heat. This didn't feel or sound right. I was getting stiffer and stiffer. I am so glad I came in and got adjusted. I was told exactly what was out of place, adjusted, and immediately able to walk without pain. My gait returned to normal, and the use cold versus heat made a remarkable difference. I will be returning during the week to make sure everything is in its proper place. My cold that was lingering on for months even got better after this adjustment. Fabulous! I cannot remember not feeling the pain in my neck. I actually slept all night. Thank you Dr. Pat. I came in with a significant amount of pain but left feeling much better. The staff at LFC is very professional and friendly. I waited approximately 2 or 3 minutes before being seen. Although I have been to other chiropractors, things were explained in greater detail and my problem areas were specifically identified. I look forward to my future visits. First chiropractic visit ever. Would recommend to others. Staff made me feel extremely comfortable and eased my anxiety. It was so great that I decided to include my entire family on chiropractic care! The staff and doctor always greet me with respect and sincere concern for my well-being. They want to know how I've been since my last visit and they LISTEN to what I'm telling them, then they address the issues I'm having at that time. I've had experiences in the past where other chiropractors did not listen and insisted on giving me the same treatment for different ailments and it just did not work. I'm grateful for a doctor and staff who are so attentive. They make me feel welcome and go out of their way to meet my needs. Very Professional, Friendly & Knowledgeable Staff... and did I mention FRIENDLY? From the time I phoned the office for a consultation and making my first appointment, to being brought back into a room to be examined and having my x-rays, to discussing my issues with Dr. Lieberman (Dr. B), and then being treated by the doctor with my first adjustment, I was very comfortable. I was treated respectfully and never felt rushed. Each person was focused on me and gave me their full attention when I was with them and that is important. No one wants to feel like their attention is being split between another patient when they are in pain or otherwise. They were all sincere in their care for me and each had knowledge in their area and were able to answer any questions I had and could thoroughly explain what was happening with my body. Dr. Lieberman also phoned me later that evening to check on me to see how things were going. That was completely unexpected, but so appreciated and kind for him to do so. I felt like he and the staff really care. I also feel like there was some difference to my lower back even after my first treatment - or at least I'm hoping so. I almost can't wait to return because I'm anticipating great results! The staff treated me with extreme care. With no experience with chiropractic care, everything was explained in depth. The warm environment made me feel welcomed. The knowledge and expertise created a professionally, yet personal visit. It makes a big difference being around people who love their jobs. I've never been so impressed in my life. Walking in and being greeted as if we were the only people in the place made the experience better. The exam was thorough, doctors were very knowledgeable with state of the art equipment, and staff were supportive. The place was inviting and very clean. Professional, yet personal. Very welcoming atmosphere! Treated like family from the time we walked in the door. Everyone very informative and provided so much education. I really have to say the most important part to me is that God is center of it all! I was a bit of a skeptical at first but almost immediately on board when I saw they had my best instrest in mind. I have enjoyed my first visit. I will be getting the rest of my family in soon. I really like the doctors and the environment of the company . Will continue to come back . I was very pleased with my visit! You all made me feel right at home and I didn't have to do a lot of waiting around. I got instant relief and was able to return to my usual activities the next morning! It was amazing! I didn't expect to be running again so soon! Thank you! And I fully intend to go on a regular basis so I can continue feeling this good! And I will highly recommend you to all my friends! Spectacular care in a very professional and friendly atmosphere ! My family looks forward to every visit ! I was in so much pain when I first went to Dr. Lieberman, I was very skeptical about going to a chiropractor. At my first exam I love the way they explain in detail the cause of my problem. The other impressive thing was after my first adjustment I could feel a difference immediately. Dr. Lieberman office is not like other chiropractors. They do not tell you or demand you come everyday from now to the end of time. After just a few months of going on the schedule needed I was suprised when I was told a once a week visit would be good to keep me adjusted. But the best thing is you do not need to make an appointment. When your have time in your busy schedule to go, you pop in the office and your seen in a quick manner and out you go to your busy day, and I love that even though I only need a once a week adjustment, I can go anytime I feel I need an adjustment again no appointment needed. I have my daughter going and have recommended others. Most important is the staff at Dr. Lieberman office really cares about you and your health. Lieberman Family Chiropractic is family. Always welcoming and generous. And the chiropractic care is upper echelon. The staff is always professional and always friendly. Lieberman Family Chiropractic is a vital link to our family health and well being. I could not imagine living a healthy, natural lifestyle without them! Always quality adjustments that releases tensions and helps to relax. Just entering the friendly atmosphere is great!! Always feel better when we leave. Friendly and Dr. R does a great job. Always perks us up and ready to get things done. Lieberman Family Chiropractic is the best! The doctors & staff are so knowledgeable & really friendly. Dr. Rebecca always helps me feel better! I would definitely recommend Lieberman Family Chiropractic to any one needing chiropractic help. They are very caring and attentive to are needs. A great experience. I highly recommend them. Our lives have become so much better since we started care with Lieberman Family Chiropractic. Not just health wise, but they all are like family. Our weekly visit is the highlight of our week. Plus, I love the dedication they show to the well being of my family. They educate so well, and it is all proven by the improvement of the overall well being of our family. We love Lieberman! The staff is so nice and they love our son, who is special needs, so much! That means the world to us! Always friendly, always professional, always helpful; a trip to Lieberman Chiropractic makes your day! The care i get there is top rated. i always leave there feeling better than when i went in..it goes past the professional aspects of the business...after a few visits, it starts to feel like a family atmosphere. an added plus is the friendly employees. No complaints at all.. I love that their focus is basic maintenance to keep people healthy. It is nice to enter into such a happy, positive environment every visit. They really believe a strong immune system keeps you healthy. It's always good to see everyone at the office! Today Dr. Pat adjusted me. I was a little tight in the hip but had the power turned on to full by the time I left. I was in and out within minutes and ready to take on the rest of the week. Dr Pat is the BEST!!!! The best chiropractic family in town!!! Thank you guys for all that you do for my family. © Lieberman Family Chiropractic. All rights reserved.
2019-04-26T00:43:27Z
http://www.romechiropracticcenter.com/pregnancy_chiropractic.html
July 1, 2018: "Raleigh's Design Charrette" JUNE 03, 2018 : "In dreaming of ideas for 81 acres near Dix Park, challenges and solutions emerge" MAY 04, 2018 : "These 81 acres may be developed in Raleigh's future. What are your dreams for the site?" Eliza Montgomery grew up in Raleigh. She holds a Master of Architecture from Columbia University and a Bachelor of Arts in Environmental Studies from Bard College. For the past 7 years Eliza has worked at Ennead Architects in New York City on projects such as the Peabody Essex Museum Expansion in Salem, MA and the Arizona Center for Law and Society in Phoenix, AZ. She also co-leads Ennead Lab’s Rethinking Refugee Communities project. In collaboration with the United Nations High Commissioner for Refugees, this award winning project is an initiative to design more cohesive, dignified and sustainable planning solutions for refugees and internally displaced people around the world. She has lectured on the project at a number of events including the 2014 Humanitarian Innovation Conference at Oxford and the UN Habitat 2016 Conference at the UN Headquarters. She also teaches on the subject jointly with Don Weinreich at Pratt Institute. Soon Eliza will be moving back to Raleigh and is excited to rejoin the vibrant design community around the Triangle. What drew you to participate in the CONNECTIONS 81.2 discussion? I grew up in Boylan Heights, walking my dog next to the prison, I've been watching downtown Raleigh transform ever since. The future of this site is vital in interconnecting the neighborhoods of Raleigh. I was eager to partake the discussion. I think architects and designers have a unique perspective to fill in rethinking conventions and manipulating space to work with the changing social and urban futures. In your view, what is the most exciting thing happening in Raleigh and its growth? Raleigh is a uniquely balanced city, with quality public education, intimate neighborhood communities, and a diverse downtown business core - all qualities not found together in many cities. As the downtown grows above this strong foundation, it has an opportunity to become a one of a kind place. In one word, how would you describe the site's potential? Over five years ago, the public sector provided a new opportunity for me in my career. This is not a typical path for an architect but it has allowed me to balance life and to humbly find purpose to serve the “community.” Best of all, my employer encourages and supports any community participation which allows me to contribute, with my peers, to a more sustainably built environment. Curiosity to how a city can positively re-purpose such a huge tract of land. I also completed a project on the Governor Morehead School campus years ago and I hope that the 81.2 effort will improve the facilities they occupy. Kenneth Luker is a Design Principal for the North Carolina Practice of global architecture and design firm Perkins+Will. He is an award-winning designer, mentor, and thought leader in applying cultural awareness to the planning and design of many project types. Kenneth leads the studio’s design process on project types including museums, libraries, higher education, corporate office, healthcare, and science + technology. His work has garnered numerous design awards and featured in publications for its thoughtful compositions that elevate the human experience by connecting architecture with its cultural context. Kenneth’s recently completed projects include the National Center for Civil and Human Rights in Atlanta, Emancipation Park in Houston, and the Gregg Museum of Art and Design at NC State University in Raleigh. His current work includes the City of Vancouver Hogan’s Alley development, the Destination Crenshaw outdoor museum in Los Angeles, and the new Research Triangle Park Campus for Wake Technical Community College. Kenneth is active at the NC State College of Design where he serves on the Design Leadership Council and is an adjunct professor in architecture. Kenneth lectures frequently on design, participates in design award juries and supports his local chapter of the American Institute of Architects. Kenneth earned his Bachelor of Environmental Design degree from Texas A&M University’s College of Architecture. He studied design at the University of Cambridge in England and earned his Master of Architecture degree from Harvard University’s Graduate School of Design. CONNECTIONS 81.2 is a fantastic way to engage my fellow designers in a spirited consideration of the future of Raleigh. We are all passionate about creating a better, more inclusive and sustainable tomorrow through great design. Matthew Henning Griffith earned a BS in Mathematics from Davidson College and an MArch from the NCSU College of Design, where he concentrated in Urban Design and received numerous awards, including the Kamphoefner Fellowship and the AIA School Medal. His thesis project - a community center for Camden, New Jersey - received a 2004 Boston Society of Architects Unbuilt Architecture Award. Before founding in situ studio in 2010, Matt served as a Visiting Assistant Professor of Architecture at the University of Arkansas and worked in the offices of Marlon Blackwell Architect and Frank Harmon Architect. He currently serves as Associate Professor in Practice at the NCSU School of Architecture. Since 2010, Matt and his colleagues at in situ studio have received twenty-four local and state AIA design awards. In 2012, the studio was recognized by Residential Architect magazine as one of 15 Young Firms to Watch, and their work is now widely published on line and in print. Matt regularly serves on professional awards juries, lectures throughout the southeast, and is a frequent visiting critic at schools of architecture. He was recently invited to the 2019 AIA National Small Projects Awards Jury. Matt lives with his wife, Ashley, and their three children just east of downtown Raleigh. I was drawn to the CONNECTIONS 81.2 discussion because of my belief that designers are uniquely equipped to objectively lead discussions about urban development and policy and that doing so is our professional obligation. I am very happy to see downtown Raleigh increase in density and to see the diversity of activity downtown continue to expand. Developing meaningful transit options is the next step! How long have you been in Raleigh: Since starting at NC State College of Design in 2000. Megan is an Associate Principal in LS3P, a firm focused on design, community, and innovation. With 14 years of experience, she has designed corporate commercial, education, and faith-based projects throughout the Triangle. Upon graduation from NC State College of design in 2005, Megan began her career at LS3P, before joining an Asian non-profit to work as an architect on appropriate technology projects and a regional housing reconstruction effort. In 2011, Megan returned to LS3P for part two of her career with the firm as the corporate commercial leader in the Raleigh office. Committed to the Raleigh community, Megan serves as an ACE mentor, College of Design reviewer, and AIANC board director with a focus on leadership and community engagement. I believe citizens are responsible to strive for the betterment of society and architects are specifically equipped to respond with physical proposals to address issues of social, economic, and environmental wellbeing. As leaders, we are responsible to listen to members of the community and facilitate discussions that stimulate collaboration, collective thinking, and innovative solutions. Connections 81.2 is a conversation that brings people together from various parts of the community to explore the opportunities and challenges found in our city today and in the future. As a collective, participants work together to envision how the activation of 81 acres in downtown Raleigh might transform the experience of people within Raleigh and across the state. I am excited about the potential of the people who have converged in the geographic area of Raleigh. Talent and expertise continue to grow in education, creative arts, technology, craft, and entrepreneurship. Maintaining pride in their heritage, people look to the future with open arms, welcoming new people and ideas to the area each day. As the city continues to grow in number and diversity, Raleigh is positioned to excel as a leader of innovation, development, and community wellbeing. How long have you been in Raleigh: I have been part of the Raleigh Design Community since 2010 when I moved to Raleigh to do my masters in architecture at NC State. I have been in Raleigh ever since. I now call this cool town home. I was born in Dubai, grew up in Jordan, but I am from Syria. As a Syrian-American, I moved to Chicago in 2001 to continue my education in the United States. To be closer to family, I moved to North Carolina to complete my undergraduate degree in Interior Architecture from the University of North Carolina in Greensboro. I pursued my masters in architecture at NC State after realizing my passion for design goes beyond the shell of a building. I joined LS3P Associates immediately after graduating from NC State in December 2013. Today I am a licensed architect and an Associate with LS3P working alongside talented designers and architects on civic and community type projects. Two projects I helped co-lead the design are currently under construction and scheduled to be completed this year include the new Fuquay-Varina Public Library and the Oak City Multiservice Center, a renovated abandoned warehouse transformed to serve the underserved community in the City of Raleigh. During my third year at State, I had the amazing opportunity to lead a team and participate in the ULI competition. It was an intensive two week design charrette to transform an urban site, similar to Connectins 81.2. My team’s design proposal got honorable mention and I was hooked on the collaboration, the design process and the diverse engagement from team members from different disciplines and backgrounds. Diversity in knowledge, expertise and experience is the main ingredient to a successful, provocative design. This is the essence of CONNECTIONS 81.2. I think right now the development of Dorothea Dix Park is an exciting moment in Raleigh’s story. There is a sense among the leaders and key players in the city that are recognizing the importance and magnitude an urban park could have to the continual success and development of Raleigh. This is a once in a lifetime opportunity and as a citizen in our community, it’s encouraging to see a city taking positive steps in not only preserving, but also creating a destination public green space. . How long have you been in Raleigh: While I’m an “out-of-towner,” I’ve been active in the Triangle area since 2005 thanks to my colleague Michael Stevenson. Adam specializes in design and placemaking for innovators, entrepreneurs and university-corporate partnerships. As Planning + Strategies Leader at Perkins+Will, he advances ideas and designs focused on the convergence of higher education, emerging workplaces and community-building. Adam has led significant projects for the UC Berkeley/LBNL, Pennsylvania State University, Wake Forest University, The University City Science Center – which includes the University of Pennsylvania, Drexel University and Children’s Hospital of Philadelphia – along with over $1 billion of new construction for life-science enterprises including Amgen and Wyeth. Between 2015 and 2017, Adam also served as Chief Design Officer for Benjamin’s Desk/1776, a startup CoWorking incubator that grew from 3,000gsf to over 200,000gsf during his tenure, to include key innovation hubs at Pennovation Works and 1776 Crystal City. Adam was the founding co-chair of the ULI University Development and Innovation Council (UDIC) focused on academic innovation and placemaking and a founding member of the Urban Innovation Network, a London-based group that focuses on advancing university-corporate development models. Deeply committed to urban design, Adam has also served as a resource person for the Mayor’s Institute on City Design–Midwest and served on two Philadelphia Redevelopment Authority Advisory Boards focused on building design excellence and the 1% for Art program - the first such panel in the United States. I love opportunities to help cities like Raleigh leverage the extraordinary talent, ideas and architecture they’ve grown over the years. Raleigh has an amazing – often gorgeous – downtown and it aligns with many trends we see today that I call Campus 2.0. This is a new urban design paradigm where cities, universities and innovators collaborate to create a dynamic, vibrant community that centers on the economic and social energy of the City’s educational assets. As in cities like Austin, TX or Madison, WI, Raleigh has a combination of social and physical assets that are global in scope, and the CONNECTIONS 81.2 discussion allows us to imagine what the City can become in 10 or 20 years. Your opportunities for future growth. Recent developments in downtown Raleigh and the areas around NCSU are very compelling – that’s great – but redeveloping the study area will offer historic opportunities to transform Raleigh into a 21st-Century City. How? Today’s most successful communities integrate work, learning and living in unique ways that add up to significantly more than the sum of their parts. Currently, the Raleigh study site presents a physical barrier to this process. It’s exciting to see you all recognize this and actively explore urban design strategies to weave Downtown, the NCSU core campus and the Centennial Campus together. This opportunity would be completely transformational for Raleigh and create all sorts of adjacencies and synergies that can be hard to imagine today. It’s sort of the last “puzzle piece” that completes the picture – but it’s a very big and critical piece of an exciting picture. Ellen moved to the Triangle from Paris in 1993 after working for four years with Christian DePortzamparc. Upon her arrival she was fortunate to work with Frank Harmon for almost five years prior to starting her own design studio in Durham. During that time she came to appreciate the wonderful strengths and idiosyncrasies of both Raleigh and Durham. Ellen leads Ellen Cassilly Architect an award winning design studio located in a fabulous mid-century modern bank in downtown Durham. Over the last 20 years the studio has created well-loved projects such as the Durham Framers Market, Parker and Otis, Fullsteam, Grub and five projects at Duke Gardens - all of which add to the livability of Durham. One of Ellen's favorite aspects of architecture is mentoring future architects through the NCSU Summer Design/Build Studio. This year they created an outdoor environmental education classroom at West Point on the Eno. This was the ninth year of designing and building projects for wonderful non-profit groups across the Triangle. It's wonderful to get out of one's typical routine, change scale, get some good design cross-pollination going on. It was great to think about how Raleigh could take the next leap in its urban growth. As architects we have the ability to ask good questions and 'test drive' various options with the community so that we can assess what will work best for all creating lively public spaces. The community is realizing the scarcity of their green spaces and putting pressure on city leaders to protect them while densifying the areas surrounding. Albert McDonald, AIA is a Senior Architect and Associate Principal with Clark Nexsen in Raleigh, NC. He is an emerging design leader driven by his passion for the profession of architecture, his personal exploration as a designer and thinker, and the continual pursuit of design excellence. A North Carolina native, Albert graduated from the University of North Carolina at Charlotte with a Bachelor of Arts in Architecture in 1997 and received his Bachelor of Architecture from NC State University in 2008. Albert has made valuable contributions on a range of project types for public and private clients including North Carolina State University, the University of North Carolina - School of the Arts, Wake Technical Community College, and Under Armour. His vision has supported multiple award-winning efforts. Recognizing opportunities to provide mentorship and design opportunities, he has since formed an initiative within Clark Nexsen called Combustion Chamber, which endeavors to provide an experimental realm of design discovery through design competitions. Through this initiative, Clark Nexsen team members are afforded opportunities to exercise and build confidence in their design skills, test new software, experiment with project typologies, create relationships within the firm across office locations and disciplines, and engage the community in meaningful discourse about design. Combustion Chamber efforts to date have resulted in recognition in three AIA-NC Sponsored Design Competitions, including two first place awards, a most recent of which is the winning entry for the Bus Shelter Prototype Competition for Go Raleigh Transit which will be incorporated in the local transit system beginning in January or 2019. I believe designers and architects, in order to make meaningful, lasting and sustainable work should actively engage in the community that their buildings will reside. I search out opportunities when possible to engage in a broader dialog to influence my perspective of the world. The mix of local design talent, paired with experts from other markets along with the inclusion of Raleigh’s decisions makers made participating in C81.2 an obvious and easy choice for me. For me witnessing the continued and growing civic pride that the design community and citizens of Raleigh have has been most invigorating. I grew up in a town where most of my peers couldn’t wait to leave. Raleigh is much different in that people can’t get here fast enough. Good things happen when people love their city. How long have you been in Raleigh: I’ve lived in Raleigh for 3 years. An Associate and senior designer at Gensler’s Raleigh office, Brad is interested in how architecture can improve our cities and how the profession can engage communities in meaningful ways. In 16 years of practice, Brad has provided leadership for academic, cultural, government, commercial and residential clients, with a focus on design excellence and technical rigor. His work has been featured in publications including Architect and Details, Technology, and Form (AsBuilt Series), and has won multiple awards including an AIA New York Chapter Award of Merit. His responsibilities include office-level design leadership, project design direction, client relationships, coordination and integration of prime consultants, marketing and business development. Prior to joining Gensler Raleigh, Brad worked in New York City for ten years where he gained a breadth of experience in design, management and technical responsibility for projects ranging in use, complexity and scale while always maintaining a high standard of design. At Ennead Architects, he led multiple renovation projects focused on public space at NYU Langone Medical Center. As an Associate at Robert Siegel Architects, he led multiple projects for the General Services Administration and for university and residential clients. Brad is a frequent guest critic at NC State’s School of Architecture and was a selected juror for NC State’s Shawcroft Drawing Prize in 2017. Brad has served on the AIA Triangle Design Awards Committee since 2016. I was initially drawn to the Connections 81.2 event based on my previous involvement with a similar charrette for Downtown Wake Forest. As with the previous charrette, I was motivated by the opportunity to collaborate with other local architects for the purpose of having meaningful dialogue about the future of our community. With the intense growth Raleigh is experiencing, these conversations are increasingly important. The most exciting thing happening in Raleigh is the design, community engagement and development of Dix Park. How long have you been in Raleigh: After working two years as a structural engineer, I arrived in Raleigh in 1983 to start my graduate degree in Transportation Engineering at NC State. Except for a 2-year hiatus in Greensboro, I’ve been working in Raleigh ever since. Don is a Principal with VHB, a multidisciplinary firm of dedicated, creative professionals working to improve mobility, enhance communities, and promote economic vitality, while balancing development and infrastructure needs with environmental stewardship. Don specializes in collaborative, multi-modal planning projects that strive to address both immediate needs and long-term aspirations for downtowns, corridors, university campuses, and entire regions. Safe, healthy, pedestrian-friendly communities are a major emphasis in Don’s work. Having spent several years on Duke University’s Civil Engineering faculty, Don remains maintains his passion for teaching via professional seminars and the occasional guest lecture. For most of my career, I’ve actually done very little work in the City of Raleigh. Recently, however, I’ve been fortunate to work on the Southern Gateway Corridor Plan, bus rapid transit planning, the Dorothea Dix Master Plan, and several other projects near our Centennial Campus office. The Connections 81.2 site has been discussed repeatedly in relation to those projects, so the opportunity to learn about—and possibly influence—the future of this effort seemed an invaluable opportunity. The energy focusing around Dorothea Dix Park (and encompassing Centennial Campus/Spring Hill, the Southern Gateway area, the CONNECTIONS 81.2 site, and beyond) presents a transformative opportunity close to a dynamic downtown. An essential aspect of this transformation is enhanced accessibility for all citizens to economic and educational options, healthy activities, cultural/heritage experiences, and interactions with nature. Combined with dramatic—and accelerating—advances in smarter transportation technologies, this confluence feels like the very definition of excitement. Jenn is an apprentice architect with a passion for telling stories. As a designer of experiences and spaces, she's been practicing architecture for three years. She approaches architecture from a programmatic perspective, often starts thinking and drawing in diagram first, asks too many questions about how people will live, work and use the spaces they inhabit, and finally creates space via architecture to shape new intersections and experiences. After receiving her M.Arch. from NC State, she started work with Matthew Konar Architect. Designing food stories for restaurants, bars, agricultural hubs and other food concepts, their work reflects the edible greatness of the South into brick and mortar. By meshing the qualities of southern vernacular buildings with the colorful personalities of small business owners, we design spaces that are equally full of life and character. Jenn stays busy in the local food system on the weekends too, running Raleigh's local food event series Second Saturday, which has been celebrating local food, urban agriculture and community each month in the summer for the last five years. I'm passionate about the role of designers and well-designed space in creating community. The Raleigh community needs places that bring them together, places where things are made, where people can gather, and where the productivity of our city becomes visible. As a citizen and a designer, I engage in conversations about designing spaces whenever they come up. The conversation about Connections spurred me and our design team to think critically about what a city that didn't need a prison would truly be like. This line of thought stayed with us throughout the weekend. In Raleigh, there is a particularly exciting synergy around local food that continues to grow each season. From urban agriculture to traditional family farms, mom and pop barbeque to James Beard award-winning chefs, a brand new pay what you can restaurant to a decades old food-waste diversion hunger relief non-profit, Raleigh is at the heart of the movement to bring all people closer to healthy, nutritious, community grown food. Our cultural heritage of agriculture as a Southern city is meeting up with 21st century urban planning and technology in our startup city and making beautiful and exciting projects happen. How long have you been in Raleigh: For 13 years! Jessica Cochran is a Raleigh-based architect. Her design experience spans a wide range of typologies, including single-family homes, historic buildings, universities, civic, laboratories, and pharmaceutical manufacturing, as well as the occasional design competition. She is passionate about travel, particularly to large international cities and remote country sides. When she is not designing buildings, you can find her in her painting studio, working in abstract mixed media. Jessica has BA in Fine Art from the University of South Carolina, and received her Master’s in Architecture from North Carolina State University. I am fascinated by urbanity and am very excited about the current growth and development in Raleigh. More than anything, I hope that as we grow the livability is maintained and that opportunities, health and happiness for everyone living here increases. As an architect, artist and downtown resident, I want to contribute to a shared vision and help guide to our direction. Seeing so many of my colleagues express a similar concern and enthusiasm is thrilling and it was a great experience to hear their ideas and design with them. The development of Dix Park as well as the new Union Station and Weaver Street Market in the Warehouse District is very exciting. I live on the east side of downtown and you can almost track the changes there daily. It’s an incredible time to be living and working in downtown Raleigh. Don is a Principal with Clark Nexsen and an award-winning architect focusing on the design of academic, science and technology, and civic project types. Don is passionate about the relationship between architecture and its site and creating design solutions that respond to the climate, natural and built context, and public realm. Since 2007, Don has served as a Professor of Practice at the NCSU College of Design teaching architecture studios which focus on the relationship of the environment and site to building form and tectonics. Don is a graduate of Duke University and received a Masters in Architecture and Masters in Structural Engineering from Virginia Tech. I was excited to be a part of a design discussion about how to continue to make Raleigh’s downtown a vibrant, healthy, and exciting destination for the community. It is a chance to think about this critical site and how it could help shape the future of Raleigh connecting Dix Park with NC State, the surrounding neighborhoods, and downtown. As architects, we love to imagine the possibilities – and this is a perfect platform to discuss what is needed in Raleigh’s downtown regarding affordable housing, public transportation, access to health, and access to invigorating public spaces. I think the attention and efforts to improve our downtown streets, public spaces and public buildings is both exciting and key to the vitality of the city. This is evident in many of the past and current projects such as Dix Park, Moore Square, the new Union Station and the transformation of Fayetteville street. How long have you been in Raleigh: I’ve been living in Raleigh for 37 years and have been part of the design community for 30 of those years. Professor Sherk earned her MLA from North Carolina State University. She is a professional landscape architect and an associate professor teaching a wide range of classes at the NCSU departments of Horticultural Science and Landscape Architecture. Julieta works with her graduate students on variety of landscape design research with local and global impacts, and peer-refereed journals publish the articles about this work. She coordinates participatory design, service-learning projects with her students locally and internationally. Julieta served on the City of Raleigh Appearance Commission, where she helped to promote community dialogue and foster design excellence that improves public realm. In 2017, she received a Fulbright Global Scholarship to Mexico to use participatory design methods to promote sustainable positive community development. She works with her students to assist underserved communities in discovering their voice. She strives to work with people to improve natural/cultural resources while incorporating artful, accessible living infrastructure that provides co-benefits for the environment and people’s quality of life. My friend and colleague, Frank Harmon, who knows I am passionate about what happens in Raleigh and my commitment to high quality urban spaces, brought connections 81.2 to my attention. The management, preservation and creation of green open spaces, large and small is the most critical and exciting development in Raleigh. This includes scales from streetscapes to pocket parks to the large parks like the Dix park. How long have you been in Raleigh:I’m new! My family + I moved to Raleigh from Baltimore in April 2018! Beret is Director of Design at JDavis, a multi-disciplinary design firm specializing in architecture, interior design, landscape architecture, planning and procurement. An award-winning architect with experience in commercial, residential, mixed-use, planning and education projects, Beret believes in the power of design to shape culture through inspiring + timeless spaces achieved through an integrated process of research, analysis, collaboration and experimentation. Beret received a Bachelors of Arts in Modern American History from Brown University and a Masters of Architecture from the University of Maryland, where he was awarded the Henry Adams AIA Gold Medal, the Faculty Award for Excellence in Design and the Thesis Prize. Dix Park . . . which underscores the importance of the Connections 81.2 site and the need to be forward-thinking and ambitious as we invent the city’s future. Charles is a Raleigh-based urban designer, planner, and cartographer. A Winston-Salem native, he is the lead Urban Planner and Designer in RATIO’s Raleigh office, where he manages planning and urban design projects throughout the Southeast, focusing on area, corridor and downtown projects for municipalities in addition to urban design work for private clients. Prior to joining RATIO, Charles spent six years in the public sector for the City of Raleigh Urban Design Center and the NYC Department of City Planning. Charles received his Masters in City and Regional Planning from UNC-Chapel Hill and a Masters in Landscape Architecture from the University of Toronto. On a personal level, CONNECTIONS 81.2 was an opportunity to engage in cathartic collaboration with friends and colleagues, all who care deeply about our community, and without the competitive reality of professional life. Politically, CONNECTIONS 81.2 offered the kind of boundless interrogation that will help Raleigh as it searches for a vision of what kind of city it wants to be. Finally, the workshop’s honest confrontation with the legacy of the Prison and Morehead School gave it a gravity that many similar events lack, and that was refreshing. Kudos to the organizers. Raleigh’s boom is occurring after that of many cities in the United States. We have an opportunity to learn from those cities’ successes and failures and develop in a way that inspires true community-based planning and design. The most exciting element of this educational moment is finding design solutions that engender a public realm where building community and healing divides are the fundamental concepts. We are seeing that kind of effort in the Dix Park Master Plan process and smaller tactical interventions throughout Downtown. Also, the Greenway system is one of the most exciting things happening in Raleigh, and always will be. How long have you been in Raleigh:Starting as an eager young design student – I joined the Raleigh Design Community in 2012. However, as a professional I have been a part of the community for about a year and a half. When I was younger I had the incredible privilege of growing up in the heart of Asheville, NC. As a result, I gradually began curating a love for the outdoors and a strong appreciation for creative thinking. Now as a professional in the built environment – ironically, I find most of my inspiration outside of a city. I love having the opportunity to travel and explore and now as a design professional I get the chance to look at things in a different light and can help protect those seemingly “untouched” places. I received my Bachelor in Architecture at NC State University and immediately began working at Perkins+Will. Now, my main focus has been on urban development projects within the company’s Cities & Sites team. While I don’t have an educational background in urban design, I have grown to love the implication of designing the spaces within the architecture and how the public realm positively contributes to not only the surrounding buildings but the city as a whole. I was drawn to Connections 81.2 through my work in Perkins+Will’s Cities and Sites team. The discussion aligned so much with issues and opportunities we discuss in office on a daily basis and being a Raleigh local and practically living next door to the site – this discussion was very close to home. When I moved here 6 years ago from Asheville I remember having a very negative outlook on the city of Raleigh due to lack in city life. However, within the past 5 years or so the city has come alive. From my apartment I can walk almost anywhere and that kind of accessibility has always been important for me. The most exciting aspect of that is how much were still moving forward as a city and how much our local design community is involved with that growth. Originally from Asheville, Crystal Vaughn is an interior designer, who has returned to North Carolina after working in the Chicago A&D industry for the past 10 years. As an alumni of UNCC and The Illinois Institute of Art Chicago, she has had the opportunity to work on design in a vast range of projects, including healthcare, corporate, industrial, restaurant, property management and retail design. A passionate and active member of the A&D community, she's volunteered and been on planning committees for organizations such as Rebuilding Together, DIFFA, Designs 4 Dignity, IIDA, Refortify & USGBC. The opportunity to help shape the future of our city is exciting and one I couldn't turn down. Great cities don't just happen, they are imagined, thought out and planned and if these plans have the local governments and community support behind these plans, great things can happen. Raleigh is a city of sprawl and it now has the unique space in the center to have something that can really make a difference in the heart of the city, creating a more connected center. Raleigh's recent & future plans to revitalize, re-grow, and reinvent it's downtown is exciting to watch and be apart of. Downtowns are the heart of a city and having a healthy heart is essential to having a strong community. This is essential to be able to compete with other world class cities in the US. Jake spent his youth in the NC mountains before heading to the coast to study Philosophy, Anthropology and Religion at UNCW. While there, his studies and his interest in Palestinian-Israeili politics led him to spend several months in The Middle East where he split time between refugee camps, an archaeological dig, and studying Arab-Israeli politics at a Jordanian university. These experiences led him to pursue a deeper understanding of how architecture and urban environments effect individuals and communities over time. He received his M.Arch from NC State University and is currently working as a designer at in situ studio, where he continues to develop his skills and is on track to be a licensed architect by the end of the year. Opportunities to work at the scale of Connections 81.2 don’t come to designers often enough! This site is incredibly important to the future of the city. It presents a massive opportunity, and the charrette was a brilliant way to pool the high level of talent in Raleigh’s design community with those intimately familiar with the legacy of the site and its existing program to offer exciting and insightful solutions that reflect the growing fabric of our city. Did I mention that it was a brilliant idea? There is so much potential in the growth of Raleigh right now! I love examples of our building habits not outpacing our ability and willingness to think about the future of each site and of the city. The most exciting example of this right now has to be the intensive community centered design approach at Dix Park. Tina has been principal of her own firm in downtown Raleigh, NC for the past 25 years and has recently formed an architectural design collective, SOMOS. Their work ranges from schools to parks, cafes, co-housing, animal housing, and “tactical urbanism.” She holds a Master of Architecture from the MIT School of Architecture and Planning, has practiced in a wide range of cultural settings, and takes a strongly people-based approach to the design of places. She has also recently co-founded Raleigh Urban Rangers, a new initiative which encourages more active use of public space by inviting residents out to play, meet and fully inhabit their city. The CONNECTIONS 81.2 charrette offered me the rare opportunity to collaborate with other professionals in an open, mutually supportive way. It erased typical office boundaries and competitiveness, inviting us all to imagine possibilities together, towards a common good. This kind of open, collaborative sharing is too rare in our profession. I welcomed the chance to see how others work and think, to hear others’ perspectives and values, and to participate in a growing community conversation about the future of our city. I am most excited by the increasing attention being paid to Raleigh’s public spaces, such as Moore Square and Dix Park. Improving our shared spaces will help bring the city together. Strengthening public engagement in the design and creation of those spaces, through initiatives like Neighborland, is also critical and very exciting. I see a real bottom-up participation building from the energy of our local businesses and people who live here and care. I’m also encouraged by the number of people moving downtown, walking and biking our streets. They will join us as stewards of our city, advocating for our schools and public services and working to make Raleigh a humane city for all ages and income levels.
2019-04-25T12:38:53Z
https://www.connections.design/media/
This homemade brew is very easy to make and can be stored away in the pantry for your own use (and never run out again!) but also keep a batch on hand for gift-giving, they’ll be very appreciated! All that’s needed is alcohol (such as vodka or brandy), vanilla beans and glass jars or bottles. Quick Tip: Try experimenting with different beans (ie. Madagascar & Tahitian) to sample all the flavor notes each type has to offer, even try mixing one or two different types in the same jar. Ready to get started? You’ve hit the jackpot with this page! I have a collection of recipes and tutorials to help guide you along the way as well as a section of tips and frequently asked questions at the bottom. Place one bean into a pint of vodka. Shake daily for two weeks. Scrape the seeds from three beans and add them to a bottle of dark rum, add the pods as well. Let sit for three weeks, shaking occasionally. Pour 1/2 cup vodka or white tequila into small saucepan, and heat until it smokes but isn’t boiling. Break 2 beans into pieces and place into jar. Pour the alcohol over top and cover tightly. Let sit for a week, shaking frequently. Split 7 beans end-to-end with a sharp knife. Add these to a .750 liter (1/5) bottle of rum, vodka, everclear, scotch, brandy, or alcohol of choice. Let stand for three to four weeks before using. When bottle is 1/4 full add three to four more beans and more alcohol. Let stand for another week before using. Seeds may float in the syrupy liquid but unless the finished product is being given as a gift, don’t remove them–they only add to the flavor. Use one-forth to one-third the amount called for in most recipes as this has a very strong flavor. The beans are good as long as a vanilla scent is present. Once the scent is lost, discard and replace with fresh ones. They can also be removed from the alcohol base and either scraped or chopped then used in place of the extract (for stronger flavor). Or you can remove them from the alcohol, dry each thoroughly and stick them into a canister of sugar to infuse their flavor. Using a sharp kitchen knife, cut a lengthwise slit down the middle of each bean. Cut them into 1/2-3/4 inch pieces then add to container and shake. Wait and shake. It will take 30-days for the brew to mature. Once each day, vigorously shake the container for 30-seconds. Once the 30-day cycle has finished, strain the liquid through a colander or coffee filter and place in decorative bottle. Place items into seal-tight container. Wait. It will take 3-weeks to cure properly. Start with 1 cup of vodka, brandy, or real extract. Add 2-3 Tablespoons of corn syrup, stir or shake to dissolve. Finely chop 3 or more pods (depending on strength desired); add to bottle. Store in a cool place; stir or shake occasionally to mix ingredients. As the contents are used, top it up occasionally with additional liquid (vodka, brandy, or extract) and a bit more corn syrup; about once a year add a couple more finely chopped pods. Stronger: Use a high proof of alcohol and scrape the seeds from the bean. Weaker: Use a lesser proof of alcohol and soak beans intact. To strain for storage: Use a very fine strainer, coffee filter, or paper towel. Vodka usually gives the highest alcohol content. Brandy adds additional flavor which some folks may or may not prefer. Corn syrup or sugar helps infuse and develop the flavor from the pods (corn syrup dissolves more easily). Using a variety of pods (Madagascar, Indonesia, Tahitian, Mexican) will produce a brew with a much more complex taste and aroma. Try using Madagascar as a base, adding Tahitian and Mexican for additional fragrance notes. Shake container before each use. Small flecks will be in the liquid and provide additional flavor. Dark flecks in light-colored food may also appear, to avoid this, don’t shake the jar. Occasionally spoon out some of the mass of pods that settle to the bottom of the jar for when a very intense taste is desired (to use in things like ice cream or butter/vanilla pretzel cookies). Have a brew jar always on the go and every summer make sure it’s topped up so you’ll have enough on hand for holiday baking. The shelf life of pure extract is indefinite and it’s highly unlikely you’ll ever see an expiry date on it (for both purchased and homemade varieties). Since there is such a high alcohol content, it won’t spoil or harbor bacteria like other pantry items. In fact, it develops better as it ages! Careful storage does help preserve it, keep it in a cool, dark spot so the taste doesn’t deteriorate (that’s why many different brands are sold in dark bottles). What’s their shelf-life and is the one I have still good to use? As long as they are moist enough to be pliable without breaking and there is no sign of mold growth, they’re still good to use. Stored in a cool, dark location, a shelf life of approximately one year can be expected. If one is on the dry side, try sealing it in a container with a sliced wedge of potato or apple, this should help it regain some moisture. It’s also possible to rehydrate by soaking in a bit of warm water (do this right before using). There is white stuff coming out of it while it’s soaking in the brew, is this mold? It’s highly unlikely that it’s moldy, but that white stuff you’re seeing is not an illusion–it’s likely vanillin that is oozing out, this is a sign of good quality! On cured pods of high quality, relatively pure vanillin may be visible as a white dust or “frost” on the exterior of it. See Wikipedia.org for more info. Why are they so expensive and where can I find them locally? These are the “fruit” of an orchid grown in climates like Mexico and are harvested only after certain conditions are met so there is some effort and expense to producing it in quantities. It’s possible to locate them in the spice section of the local grocery store, if not try the baking supplies or the international foods aisle. Directions for scraping out the seeds: Slice it in half lengthwise then use the tip of a knife to scrap out the tiny seeds. If you are just using the seeds, keep the emptied shell to use in baking or to infuse in sugar (see instructions at the bottom of this page). Storage guidelines: Keep in the tubes (that’s how they’re usually purchased) until needed. Refrigeration can cause them to dry out quicker so keep in the pantry (or cupboard) in the dark and are protected from heat and moisture. Don’t store near the stove/oven since heat can degrade it and its taste. Can they be frozen? Yes but there is some flavor and quality degradation, I wouldn’t freeze them unless I had a bunch on hand that I knew there was no way I could use within a year. Starter brews are great gifts for friends who bake. Include the basic instructions and a few extra pods in case they want to make an even stronger batch. Guys: From the FDA 21CFR169 it says 13.35 ounces of vanilla beans per gallon of extract is single fold (single strength) vanilla extract. As most vanilla beans are ~120/pound or 7.5 beans per ounce of weight. A gallon of extract is 128 fluid ounces, so that would mean ~98 beans per gallon or SIX (6) whole beans to make ONE cup (8 fluid ounces) of single fold vanilla extract. Anyone who tells you any differently is just teaching you how to make vanilla flavored booze. I always thought Vanilla Extract was vanilla flavored or infused booze. Whatever it is, homemade vanilla booze or extract or alcohol infusion is heavenly to cook with, much more flavor than store bought IMO. keith is right…however, if you have really nice beans with heavy crystals (Grade A) they will go a lot further than grade B extract beans. Still, I get the highest quality beans I can in 1/4 pounds and make ~750ml of extract liquor from good vodka. I have also read that extract gets better with age like a fine wine, rather than having an expiration date. Beans only stay fresh for a year or so. you are right and wrong. Of course you can make 1/4 POUND of beans into a FIFTH of vodka… in fact that is MORE than the government requires… you just cant do it well with the measly couple of beans this article suggests. As to “high quality” vs “extract grade” “high quality beans are only needed, or even BEST when they are used straight up, for extracts you neither NEED nor WANT the extra moisture (which is the ONLY thing that really differentiates grade A from grade B, grade B have less of their natural moisture retained, are dried for longer, and their flavor is, therefore, actually intensified.. something i just got hit pretty hard with, when i added a quarter pound of forgotten beans from two christmasses ago to a fifth of vodka and by the next DAY had fragrant, dark, vanilla.. i cannot WAIT to see how good it is at Christmas time… its already heavenly!! And you are absolutely right about extract getting better with age.. i kept a bottle going for three years and every time i opened it it was like heaven… sooooo good. And since i never use sugar or corn syrup (!!!) in my vanilla, i even dabbed a bit behind my ear every once in a while, drove hubby wild trying to figure out the new perfume LOL. OH and as i mentioned in my story, properly wrapped and kept away from air and light, vanilla beans, whole, fresh vanilla beans, can last far longer than a year ;). Yum. Happy baking!! Any suggestions for non-alcoholic vanilla extract? I’m a teetotaler! This is an alcohol free recipe from a local radio station. I haven’t tried it, so I don’t know how it compares. Slit bean down middle and scrape downs seeds. Place both in glycerin and warm water. (softens pod) Place in dark place. Let sit for a month or so. Shake often. Thanks for the nonalcoholic version! Can’t wait to try it! Don’t worry about cooking with alcohol. The alcohol evaporates before the water in most cooked foods. Urban Legend! It takes HIGH heat and long cooking periods for the alcohol to cook off. Google it, there are millions of articles on it. James is right…my husband is allergic to alcohol..he tried some seafood cooked with wine once and threw up 5 minutes later. Vanilla extract in uncooked food makes his stomach burn. The googling I did said it needs to at least simmer 30 minutes. Just scrape a bean pod and put the seeds into your reciepe. Have you ever used vanilla from the store? It’s got just as much alcohol if not more than homemade. Also, you’d better not use almond, coconut, or any other extract. Full of alcohol. For shame!!! If you have ever used bought vanilla extract you just thought you were a tetotaler. Or any extract for that matter, and many other foods. Not that I can think of Cliff, sorry. But you can substitute vanilla extract with vanilla powder, it contains no alcohol. yes but Vanilla powder is a mixture of ground vanilla beans or vanilla oleoresin or both with one or more of the following optional blending ingredients (a) Sugars, (b) dextrose, (c) Lactose, (d) Food Starch, (e) dried corn syrup, (f) Gum acacia. So unless the ingrediants specify what is really in there, you dont really know. Yeah but Cliff, most people cook with vanilla extract, which causes the alcohol to evaporate off anyway. Another option is to chop the vanilla beans up with a food processor. This has the benefit of both releasing the seeds and also exposing maximum surface area of the bean to the alcohol for maximum infusion. I placed 3 vanilla beans in a 375ml Jamaca rum to make vanilla extract today. I realized that that are some white stuff, but coming out from the vanilla beans. Is my vanilla extract edible? Thanks! What kind of white stuff mudz? I don’t know how to describe it but the white stuff is attached to the vanilla bean. Are they normal??? I too am seeing a white substance on the outside of the bean. I’ve made extract before and have not experienced this. This last beans I ordered were Madagascar beans and I’m wondering if they are just different and that’s the reason I’m seeing this white residue that looks a little slimy. I was happy to see your question, because I was starting to wonder if something was wrong. I still don’t like the way it looks. It is normal.That “white stuff” is better than the beans without it. Vanillin is most prominent as the principal flavor and aroma compound in vanilla. Cured vanilla pods contain approximately 2% by dry weight vanillin; on cured pods of high quality, relatively pure vanillin may be visible as a white dust or “frost” on the exterior of the pod. At smaller concentrations, vanillin contributes to the flavor and aroma profiles of foodstuffs as diverse as olive oil, butter, and raspberry and lychee fruits. Aging in oak (wine) barrels imparts vanillin to some wines and spirits. In other foods, heat treatment evolves vanillin from other chemicals. In this way, vanillin contributes to the flavor and aroma of coffee, maple syrup, and whole grain products including corn tortillas and oatmeal. Edit: Also sorry for the late reply, somehow I missed your comment earlier. Thank you for your help, Tipnut! I also need to make vanilla extract without alcohol. What I’m contemplating, is to use oil. I’m figuring that the lack of water should prevent spoilage (though perhaps not as well as alcohol). The addition of vitamin E may help prolong shelf life if need be. Also, would grade A Tahitian beans be noticeably different than or inferior to Madagascar beans? What is usually used in the name brand extracts? I would be careful if you choose to infusing the beans in oil because of the botulinum toxin which forms in oxygen free environments. You should research this before proceeding with your idea. I like to combine 2 parts Madagascar vanilla extract (homemade) and 1 part Tahitian vanilla extract. If you compare it to music, Madagascar is the trombone and Tahitian is the oboe. But they “sound” great together, and the Madagascar doesn’t overpower the lighter, floral taste of the Tahitian. BTW, I was using Everclear to make the extract, and then diluting it with distilled water. But I use it for vanilla-strong smoothies, and now I’m on some meds that require a totally alcohol-free diet. So I’m going to try the glycerin recipe. I have to get some more vanilla beans first. I am thinking that a light vinegar such as a Japense rice wine vinegar may make a really good non-alchohol verion of homemade vanilla extract. Or, perhaps a diluted solution of white wine vinegar. I just placed my Christmas order of vanilla beans to make extract for gift giving. I will give it a try and see how it comes out. That sounds awful. How did it turn out? Commercial vanilla extract has alcohol and most of the time a touch of sugar or syrup added to it. I would never put a vinegar into a recipe that calls for sweet. So this raw food book I’m reading suggests to steep a vanilla bean in glycerine to cover, over night…I haven’t tried it but I’m going to, only because I use vanilla extracts in smoothies and I don’t like the aftertaste of the alcohol. Herbalist often make non-alcoholic tinctures with vegetable glycerine. Some stores sell vanilla flavor, or vanilla beans extracted in vegetable glycerine (check the label). Food grade vegetable glycerine is sold in health food stores. There is an FDA rule as to why it is called a flavor and not an extract. Do you use the same amount of homemade vanilla extract in a given recipe as you would store-bought vanilla extract? If not, how much should you cut down? Hi Kara, I don’t change a thing when baking with homemade vanilla. I am also looking for a non-alcoholic way to make vanilla extract. I know the alcohol won’t be the same when it is cooked, but I do not believe in buying alcohol, period, for any reason, unless it is already part of another product (i.e. NyQuil or white wine Worcestershire sauce). 1.Bring the sugar, corn syrup and water to a boil in a heavy medium saucepan over high heat. Split and scrape the vanilla beans and add entire bean and scrapings to the saucepan. 2.Reduce the heat to medium-low. 3.Simmer, stirring until the sugar is completely dissolved, 6 to 8 minutes. 6.Refrigerate or store in a COOL dark place for several weeks. To top off make a new batch or half batch and add to previously made vanilla syrup. The more beans you use the stronger the flavor and it only gets better over time. To make a thicker syrup increase cooking time. To more easily pour syrup set container in a warm water bath til heated through. You can also add vanilla beans to honey for a unique flavor. I made this over the holidays and have finally been able to use it in my baking. I made the vanilla extract recipe #1 with vodka and it turned out wonderfully. Next I’m going to try the recipe with the rum or the brandy but I haven’t decided which yet. Keith says: “Guys: From the FDA 21CFR169 it says 13.35 ounces of vanilla beans per gallon of extract is single fold (single strength) vanilla extract. As most vanilla beans are ~120/pound or 7.5 beans per ounce of weight. A gallon of extract is 128 fluid ounces, so that would mean ~98 beans per gallon or SIX (6) whole beans to make ONE cup (8 fluid ounces) of single fold vanilla extract. As to alcohol free vanilla, just ground and dry the beans until you have some nice fine powder which you can then add to anything except things that have to be pure white. Better taste and it won’t burn away when cooked too hot (as extract will somewhere around 300). I use a coffee grinder. Cut the beans into small pieces and grind. Let sit overnight to dry (spread out as best as possible) and then repeat the next day and the next until you have the consistency of powder you’d like. You will have traces of vanilla in the food and even tiny pieces can still be crunched in the mouth but it’s barely noticeable and also points out that real vanilla (not pulp mill by-product, yuk, fake vanilla) was used. Where can i purchase vanilla beans? Are they hard to find? It was a couple of years ago that I last purchased vanilla beans, but I got them on eBay. I’m going to look for some now, and will report results. I’m back from eBay. My Tahiti vanilla beans are bought and on their way here–I paid $36 counting shipping for 20 beans–and I have bid $1 for 100 Madagascar beans with three minutes left in the auction and no other bidders. The shipping will be $10, so I’ll get them for $11. You can’t beat that price. BTW, I’ve been buying vanilla powder from Frontier Foods. I’m back from checking email–I correct myself, there were 50 Madagascar beans, not 100, but the minimum acceptable bid was $0.01, so although I bid a dollar I got them for one cent plus shipping. They are readily availble in your local grocery stores now. In fact our local Walmart carries them. I have also found them at Weis’, Wegmans, my local health food store, the local bulk food store. They are also available at whole foods, kitchebkaboodle, world market, and sams and krogers stores…happy baking! Yeah, but all those places sell vanilla beans for like 5 dollars or MORE for ONE bean… thats fine if you want to scrape out a little vanilla caviar to make a dish look pretty and then stuff the pod into some vanilla sugar for your coffee once in a while, but if you want to make vanilla.. especially real, potent vanilla in the 750ml range for heavy duty baking and gifts.. Trust me (and Anne! great buy Anne!!).. Ebay. If you buy vanilla extract the store you are buying alcohol, real or imitation. If you don’t want to use or buy alcohol don’t use any extracts. What types of containers/bottles could be used to store homemade vanilla? Do they need to be airtight (I assume not as they would be opened repeatedly when using?) Anyone know of a good place (in Canada) to buy jars or bottles for storing the vanilla? I would like to give some as gifts but don’t know the proper way to store it? For vanilla made with alcohol, I use one-pint canning jars and keep them on a shelf. I expect I’ll store the glycerin in the fridge, in old (washed) vinegar bottles, and I’ll probably boil it before pouring it over the beans, because I don’t want food poisoning. I wouldn’t give it as a gift unless I had made it with alcohol, for safety’s sake and also because the only people I would give it to as a gift would be my stepdaughter and my stepson’s wife, and I definitely don’t want to play games with my grandchildren’s health. Children are far more susceptible to food poisoning than adults are. I use regular canning jars in 1/4 pint, 1/2 pint, and pint sizes. i use old patron tequila bottles. i like the way it looks, plus the cork is nice. Do you really have to discard the vanilla beans after awhile? I read in a cookbook (Ina Garten’s, I believe?) that she’s had a bottle of homemade vanilla brewing for years and just continue to add more alcohol. No you don’t need to strain the beans out if you don’t want to. You will have “floaties” in the extract but they’re just pieces of the vanilla. I’d remove the beans after a year and replace them with new beans, then dry the old beans and grind them in the Vitamix to make vanilla powder. It won’t be white, but it will be vanilla and can be used to make vanilla bread, cake, cookies, or ice cream, although you need to add vanilla extract as usual also. But that’s ideal, and as a matter of fact I think I’ve had the same vanilla beans in the Everclear for three years now. BTW I’m a Mormon and I don’t mind using alcohol in baking recipes because it cooks out, but I don’t use it in cold stuff for both religious and medical reasons. Thank you for your comment! I’m a Mormon as well. I live STRICTLY by the beliefs, and I am SOOOO amazed at people who don’t want to use extracts or liquors in recipes (ie. wine, flavored liquers, etc.) because it’s ALCOHOL! It’s been stated MANY times here on this message board that THE ALCOHOL COOKS OUT! As soon as it boils, it’s gone! Usually, well before that! I used to be a pastry chef at a 5 Diamond hotel, and we used liquer ALL THE TIME! We used light rum, instead of vanilla extract, in our butter cream (50 lb. batch!) to flavor it. Just a little splash! I told my mom how we made it and she actually said, “How can you serve that to children?” WHAT?!!! Are you serious?!! There’s probably LESS rum in our 50 lb. batch than there is vanilla extract in your 2 lb. batch, Mom! Seriously folks. DON’T get all up in arms about the alcohol in your recipes. You’re NOT going to go to hell, because the stuff isn’t in there by the time you eat it! Lastly, I just started my first batch of vanilla extract using a 80 proof cheap vodka (.357ml) and 9 Bourbon vanilla beans. I’m going by the USDA standards for my 1x fold. I figured it’s an average of 6 beans per 8 oz. of vodka. .357ml is 1.5C of liquid, so 9 beans go in! I only scrapped the caviar out of two of the beans, and left the rest of it in the others. LOTS of floaties, but I plan to strain it through a coffee filter when I’m done. I also plan to let the beans steep in the vodka for about 3-6 months before I use it. I may sound like I’m going to extremes, but I just want it to be REALLY good! Thanks Anne for setting the record straight for SO many people who think that cooking with alcohol is still sinful or breaking their tee-totaler record. Yes, it evaporates in the cooking process. If it evaporates then the alcohol is not still there. Only the essence or flavor is left, NO alcohol. Some people get so bogged down in legalism they become silly with their notions. I am a Christian. Even Jesus drank wine, and he turned water into wine. There wasn’t much else available at the time that would keep for any length of time and not spoil, and surface water was and is easily contaminated. The Bible says do not get drunk with too much wine, not do not ever let a drop pass your lips. If someone is going to be that legalistic they had better make sure they don’t ever take any cough syrup or use any extract flavorings. People, please use reasoning and common sense. You won’t go to hell for using extracts, nor are you in danger of becoming an alcoholic or setting a bad example. When I get to the bottom of the jar I smell the beans if I can still smell the vanilla from the beans I add more vodka. I have only been making it for three years but, I still have the same jar with the beans I started with, I add two or three beans a year to it. I probably go through a half gallon of extract a year just for my own use. I have been brewing my extract for almost a year. I picked up really cheap vodka to make it with, and now I am wondering if it was just too cheap! I smell alcohol more than vanilla extract. I cut the beans in half and used three halves to a small bottle – about 3 oz. Is there any way to “save” it? I can’t give it away with the stuff smelling more like vodka than vanilla. Making your own vanilla extract is a better option.Thanks for the recipe.Alcohol evaporates when it is heated.Many fruit cake recipes ask for brandy or whiskey and when it is baked you don’t get the taste of the alcohol.Thanks for all the input. Can I use citron vodka to soak the vanilla beans to make vanilla extract? Yes, and it sounds delicious. I didn’t know citron vodka existed. Next time I’m in a liquor store, and heaven only knows when that will be, I’ll look for citron vodka. I suppose you could use any kind of flavored liquor that’s 60 proof (30% alcohol) or higher, if it’s a flavor that goes well with vanilla. I am an old school vanilla extract girl. I like mine to have a nice clean powerful vanilla flavor. I make mine using vodka and believe it or not I find I get the cleanest vanilla flavor from bottom shelf cheap vodka. Many of the upper shelf sipping vodkas such as grey goose have back ground flavors that distract from the vanilla. This is my personal choice. It really comes down to personal taste. I did make a vanilla extract using Jack Daniels Whiskey last year. I love the vanilla notes in the whiskey. It was wonderful. I used it to make a simple powder sugar glaze for homemade potato doughnuts. All I can say is wow! me too me too!!! (recipe that is.. sounds absolutely delish) And i agree with the bottom drawer vodka making top shelf vanilla.. my current batch is some Nikolai vodka with the pretty black and gold label, which is about as cheap as it gets lol. Just happened to be what i had when i unearthed the beans i stowed and lost two years ago LOL. The amazing thing is that after two years of iffy storage (but good wrapping, double thick plastic and then in a sealed cardboard box) the beans were still moist, fragrant, and perfect.. i cut half of them (about an eighth of a pound) into one inch pieces, and split the other half lengthwise, and today, less than a whole DAY later, the booze is already dark amber and smells divine!! I wont use it till Christmas, but man i can already tell its going to be my best batch ever!! And ive still got about a quarter pound of those luscious beans left and im going to bury them in five pounds of sugar 🙂 Yum. Its going to be a merry Christmas around here LOL. Thank you so much for the wonderful vanilla recipe. This week I purchased Maker’s Mark Tennessee Whiskey Bourbon to make my vanilla extract. I will be sooo excited as that stuff is VERY good. Has anyone used anything other than vodka and brandy? This bourbon is 45% alcohol! YUM! Its not bitter like vodka or brandy. when u say to grind up vanilla beans in the coffee grinder. do you mean after they are shelled or the whole pod? sorry if this is a silly question! i would really like to make some vanilla powder with no sugar! Hi I used half a gallon of vodka and five vanilla pods to try to make vanilla. This being my first time making vanilla i didn’t think it mattered what you used or how much you used of it. So my big question is this, will it affect how strong it is or how long it takes to cure? Yes, it will. You dont have nearly enough vanilla there to make anything but the weakest vanilla flavored vodka.. BUT.. given a year or two it might be edible heh. I was watching a food network show & it said that all of the alcohol does NOT evaporate when you cook with it. It was a while back so I don’t remember what show it was on. Maybe ‘Good Eats’. For the making of the vanilla extract, can I boil/heat the Rum/Vodka to get rid of the alcohol before I soak the vanilla pods inside? I don’t think that would work as well. The alcohol works as a solvent (extracting the vanilla from the pods) and it also prevents bacteria and/or mold growing in your extract. Alcohol evaporates at 73.4C or 173Fahrenheit so if you plan on making something that doesn’t warm up enough, you can always boil the needed amount of extract right before you use it. How long does the non alcoholic vanilla last? I’m a newbie to making my own homemade vanilla and I have some questions. First of all, if I’m using 100% vodka rather than 80%, do I need to add some water?? Secondly, how much corn syrup would I need to add to each pint jar of vanilla? In each pint jar, I used 4 Madagascar Grade A beans. Do I need to add more or will that be enough to make a nice strong vanilla after it sits for a few months? i don’t want alcohol in my beans as i am a raw foodie and don’t cook anything. and the taste of alcohol is yuk to. just thought you guys should know why some of us don’t like the addition. also my children are eating stuff that i make with vanilla. does anyone know how the glycerine recipe turned out and is the water added to the glycerine??? Sue, glycerine isn’t a raw food, either (nor is maple syrup). If you want an uncooked carrier for the vanilla flavor, why not just soak the snipped vanilla bean in water for a few hours, then throw the bean and the water into whatever you’re making? If you’re using a Vitamix for a smoothie, or a food processor for a banana cream dessert, or whatever you’re prepping, you can skip the alcohol infusion step. I just got my 3 year medal from AA 2 weeks ago. I WILL not bring any alcohol in my home and torture myself. One drink is to many and a thousand is not enough. I am going to the health food store and get glycerin. For those who think it is OK because the booze cooks out, well, for some of us it just might not make it to where the booze cooks out. Sobriety IS #1 for those of us in AA. Staying sober way too valuable to fool with! I am so grateful for 3 years clean. In your case you make a most excellent point. I certainly understand that alcohol in any form could be a great temptation to anyone struggling with alcoholism. You’re doing a great job. Keep it up! you just gave the only viable reason to forgo the booze. Congratulations 🙂 Just use the bean straight up, it will be delicious! What about Bourbon. I have some locally made Bourbon that was gifted to me. I don’t drink so I don’t know what the difference would be. Madagascar Pods are the very best!!! in Europe some of us are more used to vanilla sugar -this is fine caster sugar mixed with vanilla extract. I make my own: I take 100gr. of white caster sugar, and add 2 podds to it. I cut the podds open before. Now every time I need a podd to infuse something like milk, I take the podd out of the sugar and use it. Than I shake it of and put it back in the sugar (if you cover it with the sugar, it won’t mold at all). When I buy new podds for a special meal, I put them in the sugar after use. Every time I use the vanilla sugar in baking, I add exactly the same amount of sugar to the mix and shake or sturr. In winter I bake more often and make a double batch. Sometimes I have as much as six podds in there… When I find a podd is loosing its fragrance, I stop using it, scrape the last of the merr (?- I mean the gooy stuff inside the podd) out and use that, before I discard the podd. It has been the system in my family from before my grandmother (she was born 1860) and it suffices me. Now I must say – I recently got madagascar vanilla liquid from a befriended professional baker and lordylord, I could drink that as a daily treat!! But it is very expensive, indeed, I think a liter was as much as 120 US dollars… it is very frugal in use, though. I made a big batch of these for Christmas presents this year and all the recipients were very excited to get them. I made a mix, some were vodka and some were brandy. I included insructions for topping them up as they are used. I kept a jar of each for myself. They were a Big hit this year and they tasted excellent. Thanks for the very helpful tutorial! We started out extract at the end of December. We bought a large bottle of organic vodka and have put the organic beans in… The bottle came with a cork, which is popping off at random, is that suppose to happen? My husband keeps putting it back on. We invested a lot in this extract… I would hope it isn’t going bad or something… any input would be appreciated. Any simple ideas for how to use the finished vanilla extract? Would be useful to add when giving as presents. Did you add a small amount of sugar or syrup to yours? That may be the difference. I buy vanilla beans by the pound once a year or so. Every single time I bake any cookie one bean pod gets scraped and the seeds are added to the cookie (I think that if it has a vanilla flavor you should be able to see specks). Then I add the vanilla that the reciepe calls for from my homemade stash. I put the spent pod into the jar and put it back in the cupboard. I usually have 3 bottles of vanilla for different types of baked goods. When the bottles have more pods than vanilla, I have been pulling them out, tossing them and starting over. DUM DUMM DUM DUM!!!! I just read about drying them out and making vanilla sugar! God, I’m silly. And I just barely did it 15 minutes ago and am not going to dig in the trash. Durnit! Oh well….live and learn – thanks for the tip! There is only one type of vanilla store bought that I will ever use. It is Los Cinco Soles in Cozumel. The stuff is like parfum. I’m sure it is fake, but I’d put it behind my ears. oh wow.. i just keep adding alcohol until the vanilla starts to lose flavor unless something bad happens, like i run so low on booze that to finish a recipe i add water.. then after doing that a couple of times i usually break down and start over, but it breaks my heart, because as long as you keep adding booze to the finished extract and keep letting it age.. its only gonna get better…but yeah if you run out of room in the bottles take some out and make the vanilla sugar… but throw them out??? sacrilege! heh. Oh, and i HAVE put my homemade vanilla behind my ears before LOL.. wouldnt do that with store bought as it usually has sugar of some sort added LOL. I recently made some vanilla extract for the first time. I put it in “cute” little bottles that had corks. But I’ve noticed in most of the pictures I have been seeing, the bottles have rubber stoppers that seal. Is there a preferred (better) method of sealing? Be sure to keep your pods covered with alcohol always so no mold on your vanilla beans. If you have split the bean open you can note white floaters. this is from shaking and breaking down the cell structure from inside the vanilla bean. it will be strained off usually before use. if it bothers you make extract without splitting the bean. Can i use rice wine to make vanilla extract?
2019-04-20T13:24:41Z
http://tipnut.com/homemade-vanilla-extract/
STATworkUP is a medical application for iOS iPhone, iPad and iPod touch and Android phones and tablets. It is designed to support the diagnostic process. Because its use parallels typical methods of clinical investigation, its operation is fairly intuitive for health care providers. Clinical medicine is an artistic and philosophic discipline combining scientific skill. Adept and competent practice requires years of training and experience plus lots of insightful wisdom. Although STATworkUP is not intended to supplant sound medical judgment, it is a modern tool for rapid decision support, easy to understand, adapt and use. It includes a big knowledge database for multiple specialties that is frequently updated. STATworkUP contains a collection of evidence-based facts and correlations for quick review of many details to guide comprehensive history-taking and physical examination of the patient. STATworkUP presents the essential criteria to help you determine diagnoses. It also can sharpen skills by shifting focus from the chief complaint to provide a wider spectrum of considerations in valuable and useful ways. By providing quick information, at your fingertips, it helps to save time and gain practice efficiencies. The app can be helpful for utilization review activities. Ultimately, it may also improve the quality of outcomes and save on the costs of healthcare delivery. Its features can be used to explore and evaluate conditions for fast problem assessment. Correlation panels, drill-down information views, and a web mode assist in associating symptoms and studies with diagnoses and treatments. As workup proceeds, the program instantly adjusts the differential diagnoses list to fit with selected findings. Signs and symptoms of many disorders can be similar to those of other conditions. That can make diagnosis challenging. Usually early detection of disease is important to derive the benefits of treatments and prevent complications. Symptoms can wax and wane during the course of an illness. Sometimes they are similar to initial findings that occurred and may represent a recurrence of the condition or a flareup. At other times new signs and symptoms indicate progression or exacerbation of a disease or complications of it or its treatments. STATworkUP quickly reveals the types of complications that can occur during many diseases and treatments. It includes the symptoms and signs they can share in common and shows their possible causes too. You can use STATworkUP tables to rapidly search for symptoms or signs. It can be voice-activated. And it recognizes synonyms too. Simply checkmark listed items to designate them as findings or problems. Drill-down to detailed info views where you can tap the correlate button. It instantly presents a panel of additional choices to build lists of contextual events or situations. These can be significant attributes of other possible disorders. The app also produces lists of appropriate diagnostic lab tests to examine, analyze and scrutinize. Those investigations may be pertinent to help validate and corroborate assumptions or clarify impressions. During assessment the combined weights of designated findings justify and produce resulting differential diagnoses for consideration. This app has the power to generate prioritized or alphabetized tables of conditions for the set of findings that you place on its problems list. And each differential diagnosis table that it calculates can be expanded or constrained to loosen or tighten the fit of the listed diagnoses for the signified findings by simply adjusting a likelihood meter. It is quite easy to use. Additionally, STATworkUP provides swift, concise and relevant info for each of more than 10,000 entities in the database. It can automatically search for links to subject matter expert web-pages, with graphics and videos, to view more in-depth content for study, review, learning and evaluation. Content and app help can also be printed. Every effort has been taken to conform to standard practices and guidelines in both the medical and computing industries. The authors include physicians, engineers, mathematicians and medical informaticists. We sincerely hope you will enjoy using it. Although the program calculates a range of diagnostic possibilities for finding selections, it does not interpret symptom complexes, nor perform synthesis of information, based on quality, magnitude or temporal-spatial relationships. Those subtle, albeit important, considerations require the user's keen medical insight. Such special factors and determinations presently transcend this program's scope. For these reasons STATworkUP is an interactive application requiring discretion and awareness of its limitations. Again, this application is NOT intended to supplant expertise when performing medical practice. It is just a quick reference that should be a helpful tool for those who are prepared to provide medical care. To preserve confidentiality, reports of the workup cannot be produced or printed with this version. The database cannot be modified either. Updates are often available and you will be notified when they are ready for installation. This application has four tables that are each packed full of Symptoms (Sx), Studies (Lab), Diagnoses (Dx) or Treatments (Rx). Tab bar buttons, at the bottom of most views, open each corresponding table when selected. Their lists of sub-categorized names are alphabetized. Additionally, each table view has a button shaped like a magnifying glass on the navigation bar. Tap on that button to open or close the search and scope tools. Use these search functions to quickly locate items on each table. They are quite versatile for retrieving words from the apps core data structure. For instance, open the Diagnosis table view and enter 'Heart' into the table's search field to create a list of cardiac disorders. Or enter the word 'Emergency' to build a list of urgent or life-threatening situations that may require rapid or prompt intervention. Voice-activated search is also possible. And you can also find things by entering just part of a name manually. The scope bar can be used to filter by Title, Subtitle or All. For example, the scope function can be used to find all words that start with the letter 'R' by entering 'R' into the search field while the Scope Title button is selected. etiologies, epidemiology, manifestations, onset, prevalence, incidence, occurrence, risk factors, associations, complications and prognoses. And Treatment table item Info views may show generic and proprietary drug names, properties, medication classifications, actions and interactions, indications, contraindications, off-label uses, side-effects, precautions and warnings. The embedded INFO content is helpful in the Airport Mode, or in situations when you are not within WiFi or network range. Additionally, associated subject matter expert web pages can be accessed when the device is connected to the internet. Just tap the ("Web") button on the navigation bar of any Info view to get a list of related links. When you are done browsing simply tap the "Done" button to return to the view you were at previously. STATworkUP is designed to correlate each database item. Its cross-referencing capability is quite powerful so please do not overlook this feature while you explore the app. To harness these useful functions drill-down to INFO views by tapping on a table item. Then touch the CORRELATE button which is present on the tool bar, right above the tab bar. When the CORRELATE button is tapped a correlation panel of additional buttons will pop-up. That facilitates choosing various pathways of investigation. As another example, open the Studies (Lab) table. When you drill down to a listed item's INFO view and tap the CORRELATE button its Correlation Panel has FINDINGS and CONDITIONS buttons. As yet another example, select the Diagnoses (Dx) table. Drill down on any item to the INFO view. When the CORRELATE button is touched its correlation panel of buttons include CAUSES, COMPLICATIONS, TESTS, REMEDIES, RX RISKS and RX CONTRAINDICATIONS. It also includes Diagnostic FINDINGS. Tapping on that button reveals history and physical signs, or the results of lab studies. These can be checkmarked to designate them as Findings that can lend their diagnostic weight to Diagnoses. Now, Go back to the previous view by tapping the Info button on the Left side of the top Navigation bar. Last, go to the Treatment (Rx) table and select any item's Info View. Tapping its CORRELATE button will pop-up a Correlation Panel of buttons that include RX INDICATIONS, RX SIDE EFFECTS, RX INTERACTIONS, RX RISKS and RX CONTRAINDICATIONS. Next, open the Symptoms (Sx) table up again and drill-down to see an INFO view. Then tap on the CORRELATE button. The "FINDINGS" button, on the pop-up Correlation panel, builds sets of potentially relevant things for further evaluation. The alphabetized FINDINGS list is displayed below the tinted name bar which is just under the upper black navigation bar on INFO views. Those things can be especially pertinent to focus on during your investigation. FINDINGS can also be correlated for selected Studies (Tests). Each of the listed items can be annotated to designate them as Findings or not. Just touch on the adjacent gray checkmarks to toggle them to green. That is all you need to do to signify that the correlated association is a Finding. When added or removed, each designated Finding instantly conveys its respective proportion of attributable weight to each related diagnosis in the database structure. Touching a green checkmark again will toggle it back to gray. That turns the checkmark off and removes the Finding from calculations of possible diagnoses to which it can portend weight when checkmarked to green as a Finding. In this way the app quickly computes corresponding sets of related disorders or conditions for checkmarked Finding items. (Read more about how the program does this in the Help section called Calculations.) The program rapidly aggregates collective combinations of Finding weights and simultaneously integrates them to produce Differential Diagnoses for the Findings you select during workup. To quickly see a view of all the checked Findings simply tap on the PROBLEMS button. It is present on the tool bar above the lower tab bar. This will reveal the Problems list of Findings. Individual findings can be cleared from the Problems list. Just back-swipe a listed finding and tap on the Delete button that subsequently appears at the right side of the selected Finding's list cell. Additionally, all of the listed findings in the PROBLEMS view can be removed by tapping on the CLEAR button. It is present on the upper navigation bar. However, be aware that doing this returns all of the checked findings to an unchecked state everywhere else in the app. Clearing the Problems table removes the impact of the previously listed Findings as corroborative Diagnostic attributes. Doing so removes the significant contributory Finding weights that are used to calculate and determine the array of differential diagnosis. As a result the diagnostic differential list will be emptied when all of the Findings are cleared. This application does not currently save the workup when it is cleared. And there is no way to save findings with personally identifiable information in this version. That feature is being considered for future updates. When you quit the application without clearing findings from the problems list, they are saved for the next session. In that situation, upon launch an alert asks whether to continue the prior workup in progress or to delete it. Deleting erases the checked Findings and empties the Problems list.. Continue returns to the workup with the Findings checked as they were when you last exited the app. Plausible diagnoses that are associated with the collection of checked findings can be viewed by tapping the DIFFERENTIAL button. It is located above the tab bar on the tool bar. A sliding control meter is present in the Differential view to adjust the fit of diagnoses for all of the selected findings. Moving the slider control setting toward the more likely side of the meter generally constrains the list to show better fit diagnoses. Moving the slider control setting in the other direction, toward the less likely side of the meter, usually expands the list, showing more diagnoses that may not be as likely, based upon the total weighting of all selected findings when compared to that setting. A PRIORITIZE LIST switch is also present in the Differential view to sort listed Diagnoses. The list is sorted alphabetically when the switch is turned OFF. When the switch is ON, more-probable diagnoses are shown near the top of the list and less-probable ones toward the bottom of the list. Of course, when no findings are checked at all the Differential list of Diagnoses will be empty. Now, go ahead and try using STATworkUP to assess some problems. There are a lot of ways to correlate the many entities that are contained in its big database. DISORDERS can be listed for any selected Symptoms or Studies. TESTS, that may be appropriate during the workup of Symptoms or Diagnoses items can also be displayed when those correlation panel buttons are tapped. Remedies can be shown for Diagnoses too. Remember to return to the INFO views to get back to the Correlate button at any time during assisted problem evaluations. This medical app derives corroborated lists of possible diagnoses for mindful consideration. And it presents a lot of useful correlations that can facilitate utilization review too. But, also keep in mind that STATworkUP is NOT intended to supplant sound medical judgment! Appropriate practices require years of training plus ample experience and insight. The great amount of good information that it contains for quality assurance should not be substituted for the expert advice of licensed physicians or other healthcare providers during clinical decision-making. To begin, choose something to evaluate. For instance, tap the tab bar button named Symptoms. A full list of symptoms will appear. Use the search bar to find listed things. The app's search function is very fast and powerful. You can find stuff in many different ways by searching for synonyms, or even for parts of names. You can also enter something like the word "eye" to see all ocular symptoms or search "heart" to get a list of cardiovascular conditions. Additionally, you can search by title, subtitle or both. You can also quickly see detailed overviews of information for any listed item. Just tap the drill-down control at the right side of the list cell to get to the corresponding Info view. The name of the selected list item will appear in a gray header just below the navigation bar in Info views. Web page links for selected list items can also be browsed by tapping the ("Web") button in Info view navigation bars. When done browsing the Web tap the "Done" button to return to the Info views. Use the navigation bar breadcrumb buttons to get back to previous views. A CORRELATE button is also present above the tab bar of Info views for further analysis. Tapping the CORRELATE button will pop open a display panel of other buttons to cross-relate things that can be associated with the name on the header bar. These things may be pertinent to focus on during examination. Try the encompassing design of the Correlation panel to view the many possible relationships. It is rather easy to see how it works. Use this feature to derive fast associations that may help resolve complexities and guide problem assessments and evaluations. You can correlate manifestations, tests, disorders and remedies that might be of interest to review during the encounter. For instance, other conditions that are significant for full investigation can be listed for any selected symptom. Diagnostic considerations and appropriate tests can be shown for each symptom too. Similar functions are available for other entities. Related conditions for each symptom, study, diagnosis, or treatment, will be listed as each correlation panel button is tapped. We encourage you to experiment with the possible options to see what happens. Any listed condition or symptom can easily be designated as a Finding during the workup. To add a symptom's diagnostic weight, simply toggle its adjacent checkmark to green. Unchecking a finding instantly removes its weight as an attribute of related diagnoses. To view a list of all of the checked findings during the workup simply tap the FINDINGS button. (It is present above the tab bar in almost all of the views.) If you want to set all checked findings to off, just tap on the Clear button in the Findings view navigation bar. But be cautioned, if you do this, the findings are not saved. Individual findings can be removed from the Findings view by back-swiping a listed item and tapping on the resulting Delete button. The item is unchecked elsewhere and its diagnostic weight is removed as well. Diagnostic possibilities for combined findings can be displayed during the workup. You can see them by selecting the DIFFERENTIAL button, present above the tab bars and at the bottom of the Findings view. Diagnoses that are corroborated by findings are listed. You can adjust their fit to the selected findings by setting the sliding probability meter to more or less likely. That can be done in the Differential view. The list can also be prioritized and sorted by most-to-least likely diagnosis for the check-marked findings. This application lists many symptoms (history and physical signs), studies and diagnoses for evaluation. Potential disorders for each condition are shown. Also, conditions that might be found for each diagnosis can be displayed, plus relevant tests to workup each situation. As each symptom, study or diagnosis is selected, related information is shown to widen the perspective. This shifts focus from the chief complaint to other contributory, yet perhaps less obvious, problems for further investigation. Findings, that may corroborate possible disorders, can be checked during problem assessment. STATworkUP instantly adds each finding's supportive weight as it is selected, to justify pertinent diagnoses placed onto the differential list for consideration. The list can be sorted by most-to-least likely by turning on the prioritize switch. Turn off the prioritize switch to display the listed the diagnoses alphabetically. Robust functions correlate conditions, tests or disorders for many problems. Just choose a tab item to build a full list of Symptoms, Studies, Diagnoses or Treatments. Then select something to evaluate from the list. Upon drill-down, fast information for the selection is presented in the Info view. The name of the item appears just below the Navigation Bar and right above its information. Next, tap on the CORRELATE button that appears above the info view tab bar. That will reveal a panel of additional buttons for building relationships for the selected item. Many combinations are possible for focused assessment and further review. Try it out. STATworkUP can help to explore Conditions or Tests that may be relevant or pertinent to the workup of Symptoms and their possible Diagnoses. It can also show Disorders associated with Symptoms, Studies or Treatments and the converse for Diagnoses. Remedies for Diagnoses can be displayed. It can show Conditions related to Studies too. Those are the diagnostically related Symptoms for pertinent Studies. The program dynamically integrates many viewpoints for rapid problem analysis. It also keeps track of findings designated by check marks. The list of those appear by tapping on the Findings button just above the tab bar in list views. All of these things can be correlated for a quick yet comprehensive evaluation. At any point during the workup tap the DIFFERENTIAL button to view the Diagnostic possibilities for the noted findings. That button is present above the tab bar in most views. In addition to the above functions, there is also a "Web" button on the navigation bar of info windows. Tapping on that button transitions to a browser view of web-links for the selected item to get even more details. Links to other sites are provided for information only. They do not constitute endorsements of those other sites. A checkmark appears adjacent to each listed symptom. These can be toggled on (green) or off (gray). The on state indicates that the symptom is present, or noted, during the workup. Selected findings contribute some portion of weight to associated diagnoses (disorders). The amount of weight that is conveyed to each related diagnosis depends on how many diagnoses have the finding as a potential attribute. If all findings (symptoms) for a diagnosis were selected then that would constitute the aggregate best weight for that diagnosis. However, that is unusual. Most of the time only part of the diagnosis best weight is present because only some of the total possible symptoms or conditions for any given diagnosis are found. The sum of finding weights for a diagnosis is called the actual weight of the findings for each related diagnosis. Some diagnoses share findings and some do not. STATworkUP instantly compares the actual finding weights selected to the best weight for each diagnosis and builds a list of diagnoses for consideration. These are shown whenever the Differential button is selected. As more findings are selected the differential diagnoses list grows and it shrinks when less findings are noted. The resulting differential diagnoses list can be sorted with priority. Read more about how all this works in the help sections named Deriving Diagnoses and Calculations. A Findings button is present above the tab bar in list views. Tapping that button shows a view of all the selected findings. Individual Findings can be removed in that view, and unchecked elsewhere. Just back-swipe a listed finding and tap the Delete button that subsequently appears to the right. All Findings can also be removed by tapping the navigation bar Clear button. Be aware that doing so also clears the diagnostic differential list and all of the checked findings elsewhere. The application does not save the workup when it is cleared. There is no way to save findings with personally identifiable information in this version. That feature is being considered for future updates. When you quit the application without clearing findings, they are saved for the next session. Upon startup an alert asks whether to continue the prior workup in progress or to delete it. STATworkUP is intended to facilitate, not replace the traditional diagnostic process. As any clinician knows, making a correct diagnosis is as much an art as a science. Most problems encountered in the real world are not "textbook cases" with only one diagnosis present and all its characteristic findings. Early in the course of an illness, only a few suggestive findings may be present and laboratory studies can be negative or equivocal. "Red herrings" are often present (findings that exist, but due to another unrelated disorder). Although much effort has been spent by many programmers to come up with a "computerized diagnostician", only limited progress has been made. While computers are far faster and more accurate than people at numeric computation and searching of lengthy databases, people remain better at generalizing and inferring. No program yet written is capable of human insight and intuition. No practical method has been developed to categorize the myriad variations of symptoms - the smell of a septic wound, the briskness of an ankle jerk reflex, the pain that "started here and moved there and is somewhere between dull, aching, and throbbing." No matter how accurate computer diagnostic programs become, we feel people will always be necessary to ask certain questions in just the right way, to examine the patient, and use clinical judgment to interpret the findings for a particular patient then recommend a treatment plan. People have limitations though. Organic memory can be less reliable than a hard disk, unfamiliar presentations of diseases can be overlooked, common diagnoses are unconsciously favored for uncommon ones and red herrings. We have not attempted to have STATworkUP determine THE definitive diagnosis. In fact, this version does not even have all possible diagnoses defined, just a group of about 4,000 relatively common or important ones. The current version of STATworkUP does not take into account the intensity or temporal variations in symptoms, significant negative findings, or pathognomonic symptom groups. In fact, STATworkUP uses a relatively simple, but very thorough method to evaluate each of its known diagnoses. Technically speaking, STATworkUP is heuristic in nature and incorporates Bayesian logic in its approach to determining diagnostic probability. A heuristic method is particularly useful to rapidly come to a solution that is hoped to be close to the best possible answer, or 'optimal solution'. Heuristics are "rules of thumb", educated guesses, intuitive judgments or simply common sense. A heuristic is a general way of solving a problem. The Bayesian interpretation of probability can be seen as an extension of logic that enables reasoning with uncertain statements. To evaluate the probability of a hypothesis, Bayesian logic specifies some prior probability, which is then updated in the light of new relevant data. The Bayesian interpretation provides a standard set of procedures and formula to perform this calculation. Bayesian probability interprets the concept of probability as "a measure of a state of knowledge", in contrast to interpreting it as a frequency or a physical property of a system. STATworkUP provides groups of conditions that may be appropriate for further consideration when evaluating various possible diagnoses. It does not overlook the obvious diagnosis, doesn't forget to check unusual diagnoses, is not fooled by atypical presentations, and can even be helpful when more than one diagnosis coexists. In addition to the practical fact that it does generate reasonable differential diagnostic lists for selected findings, we feel that the method "makes sense" when compared with the way a human diagnostician arrives at a differential diagnosis list. Briefly, we first select a list of possible diagnoses based on how well the selected findings fit each diagnosis, then we also sort that list based upon how well each diagnosis accounts for some, or all, of its selected findings. STATworkUP instantly compares the checked finding weights to the best weight for each diagnosis. Then it calculates a list of diagnoses for consideration. At a given likelihood meter setting the number of listed diagnoses often expands as additional findings are selected. The list is constrained when less findings are noted or when a group of checked findings are more specific for some diagnoses than others in the database. Additionally, the resulting differential diagnoses list can be prioritized. When the prioritize switch is toggled ON the differential list is sorted by best fit. The resulting list is based upon the cumulative weights of all check marked findings in that case. It is also computed based upon the total number of selected findings that are associated attributes of each listed diagnosis. The differential diagnosis list is sorted by weighted match in the Prioritize mode. That is the product of weighted specificity times the finding inclusivity for each listed diagnosis at any given likelihood setting. The differential diagnosis list can be viewed anytime during the workup by simply tapping on the DIFFERENTIAL button. Use the sliding likelihood control meter in that view to show less likely, but possible diagnoses, based on findings. Raise the meter to more likely to reveal diagnoses that are more plausible based upon the checked finding selections. As that is done the list often becomes shorter, showing more likely diagnoses for consideration. Turning the prioritize switch OFF displays the differential diagnoses list alphabetically. The method of diagnoses computation is described in more detail in the Help section titled Calculations. Whenever a finding is checked in STATworkUP, all diagnoses are reevaluated for possible inclusion in the differential list. If all diagnoses had the same number of findings, and if each finding had equal weighting, then we could just sort the diagnoses by counting the numbers of selected findings contained in the definition for each diagnosis. But, in the real world, some findings are more diagnostically significant than others (e.g., hemoptysis vs cough) and most diagnoses are defined by different numbers of findings. STATworkUP computes a "Weighted Specificity" based on how well the selected findings can account for each diagnosis (described in more detail below.) Diagnoses whose "Weighted Specificity" meets or exceeds the current setting of the Differential View LIKELIHOOD METER are included on the differential diagnosis list. The list is sorted based on the "Weighted Match" of each diagnosis. This number is computed for each diagnosis from the product of its "Weighted Specificity" and "Finding Inclusivity" (also defined in detail below). A sorted list of most to least likely Diagnoses is shown in the Differential view when the PRIORITIZE switch is turned ON. Otherwise the list is shown alphabetically. STATworkUP describes each diagnosis or disorder in its database with useful sets of associated symptoms or conditions. It also includes reference information in drill-down texts or at attached web links. And the application correlates treatments or remedies, and useful studies or tests for each diagnosis. A finding such as "FATIGUE" helps very little in weighting any specific diagnosis because fatigue occurs as a symptom for many of the diagnoses. A finding such as "HEMOPTYSIS" is more helpful, since it occurs with a lesser number of disorders, thus narrowing the diagnostic possibilities when it is present during workup (checked). A finding such as "BONE PROTRUSION THROUGH SKIN" is both necessary and sufficient to make the diagnosis of COMPOUND FRACTURE. The presence of other symptoms do not alter the certainty of that diagnosis, but might suggest other diagnoses that could also be present. Findings, that may corroborate possible disorders, can be checked during problem assessment. STATworkUP instantly adds each finding's supportive weight as it is selected, to justify pertinent diagnoses placed on the differential list for consideration. The list can be sorted by most-to-least likely by turning on the prioritize switch. The relative importance of a finding for any particular diagnosis depends, in large part, on the number of different diagnoses where it can occur. Uncommon findings usually have greater diagnostic specificity than do common ones. STATworkUP assigns a weight to each finding by simply determining the inverse of the number of diagnostic inclusions of that finding. In order to speed the numeric calculations an integer is applied rather than fractional numbers (this value is multiplied by a large constant). Whenever the selected findings are changed (checking a symptom or condition on or off) STATworkUP recomputes the Weighted Specificity for each diagnosis in its data base. The Weighted Specificity is a number that indicates how well a given diagnosis can be "explained" by the selected findings. Irrelevant findings have no effect on this number. STATworkUP first adds up the weights of all the POSSIBLE finding weights for each diagnosis to determine the "BEST FIT VALUE "for each diagnosis. Then it adds up the weights of all the checked conditions belonging to the finding set of each diagnosis to compute the "ACTUAL VALUE" for each diagnosis. Of course, if all the findings for a diagnosis are selected then the ACTUAL VALUE = BEST FIT VALUE. By computing the ratio of ACTUAL FIT to BEST FIT for each diagnosis, STATworkUP generates a "Weighted Specificity" value for each diagnosis. If all the findings for a given diagnosis are present, then the weighted specificity for that diagnosis is 100%. All diagnoses whose Weighted Specificity exceeds the sliding likelihood meter setting in the Differential view are listed and can be prioritized. While Weighted Specificity is useful in building a list of likely diagnoses, it is sorted better by factoring in the influence of Finding Inclusivity as well as Weighted Specificity. STATworkUP also does this. Combining Finding Inclusivity with Weighted Specificity creates quite reasonable likelihoods for resulting differential diagnoses lists. The Finding Inclusivity for a diagnosis is a measure of how well the diagnosis accounts for the list of its selected findings. This is determined for each diagnosis by simply counting the number of selected conditions that are in the list of findings that describe the diagnosis. A Weighted Match for each listed diagnosis is computed by multiplying its Weighted Specificity by its Finding Inclusivity. This STATworkUP sorting methodology nicely arranges the Differential of possible Diagnoses for selected findings. This application lets you vary finding selections to list possible diagnoses. Then you can review other associated conditions, tests, or remedies for them. The Differential view contains a sliding control meter that lets you adjust how well the check marked findings fit to listed diagnoses. You can set the amount of likelihood that you desire by using the sliding control meter that is present in that view. At less likely settings the differential diagnosis list is expanded, but then the listed diagnoses only loosely fit the check marked finding selections. At more likely settings the differential list is constrained but then the fit of listed diagnoses compared to finding selections is better. Various settings can be useful during workup. Each condition, when selected as a finding, has a factored weight for each diagnosis that it defines in the database. The aggregated sum of all finding weights for each diagnosis establishes the 'BEST FIT VALUE' for that particular diagnosis. If all of the findings for a diagnosis are selected then that constitutes its best weighting. So it is quite likely to show up on the differential diagnoses list in that case. The combined weights of all selected findings determines the 'ACTUAL VALUE' for each diagnosis in the database. When only some of the diagnostic findings are check marked, the ratio of ACTUAL VALUE to BEST VALUE is called the Weighted Specificity for each diagnosis included in STATworkUP. When starting a new assessment the default setting for the sliding likelihood control meter is 50%. At that setting each diagnosis that is displayed on the Differential list is supported by at least half of its total selected Findings' weight. In addition, the number of noted Findings selected for each diagnosis are factored when computing the sort order of the listed Diagnoses in the Differential view. Diagnoses are listed from the top (most likely) to the bottom of the list (least likely) in the Prioritize mode. Finding inclusiveness is used to determine the order in which diagnoses are displayed when the Prioritize switch in set ON in the Differential view. That is, the count of findings selected for each diagnosis, chosen from the array of its potential findings, is factored into the calculation that arranges how the diagnoses are listed in the Differential view. The product of the Weighted Specificity times the Finding Inclusivity is called the Weighted Match of each listed diagnosis. The weighted match value determines the sort order of the listed diagnoses. To see the list of Diagnoses that may be justified by the selected findings, tap on the DIFFERENTIAL button. It builds a list of potential diagnoses for selected findings during the problem workup. The DIFFERENTIAL button appears next to the FINDINGS button. Both are present above the tab bar. The Differential button is also present at the bottom of the Findings view. The listed differential items are compiled from the diagnoses in the database that fit with selected findings at the likelihood control meter setting. The sliding control meter in the Differential view can be adjusted to vary how likely the listed diagnoses may be compared to the selected findings. More likely settings better correlate diagnoses to a finding or the group of findings that are check marked during workup. Simply by adjusting the sliding likelihood meter to lower or higher settings, the differential diagnosis list can be expanded or constrained for any set of selected findings. Less likely diagnoses are shown at lower settings. They don't have much of their total best weight selected. At higher likelihood settings, a shorter list of diagnoses is built. Those have more of their combined findings' weight chosen, compared to the total Findings weight for other diagnosis in the database. To be listed in the Differential view a Diagnosis' weighted specificity must meet of exceed the likelihood meter setting. Weighted specificity is the cumulative weight of check marked findings for each diagnosis in the database compared to the best weight of all possible findings for each diagnosis. All of the selected findings can be viewed by tapping on the Findings button, adjacent to the Differential button, above the tab bar. (In the findings view all of the findings can be removed by tapping on the navigation bar Clear button.) Findings can also be removed individually by deleting them one-by-one from the Findings view or unchecking them in other views where green check marks are present. When all of the findings are cleared the Differential list is also empty. No differential of diagnoses are generated when no findings have been selected.
2019-04-22T12:02:56Z
http://www.iatrocom.net/statworkupuserguide.html
Your Biopsy Specimen. Your DNA. Your Diagnosis. Get started with the Know Error DNA test in minutes. Its fast, simple, painless, and a kit will be shipped directly to you or your loved one. One (1) in 30 patient’s biopsy samples get switched with another person or contaminated by another person according to medical journal studies. The result can lead to their cancer diagnosis belonging to another patient! Or in the case of additional genetic testing, the test results may be wrong due to contaminated samples which can lead to incorrect conclusions and therapy. The biopsy evaluation process entails up to 18 complex steps many of which are beyond the control of your physician. Our patented Know Error DNA test protects you as a patient by comparing your reference DNA to the DNA of the biopsy tissue(s) used in your diagnosis to detect and rule out biopsy specimen switching and contamination errors. Anyone who’s had a biopsy or will have a biopsy. Whether you or a loved one has already had a biopsy or are scheduled for a biopsy, the staff at Strand Diagnostics can work with you and your doctor to confirm that your biopsy results actually belong to you. Publications indicate that prostate and breast biopsy patients are at high risk for misdiagnoses. A DNA cotton swab similar to a Q®Tip, is sent in a kit to you or your loved one’s home by Strand Diagnostics. The patient gently rubs the inside of his or her cheek with the swab. The swab is sent to Strand Diagnostics in the postage-paid envelope provided in the kit. A small piece of the patient’s biopsy is obtained by Strand from the doctor or laboratory. Strand performs the Know Error test by matching the DNA from the swab to the DNA of the biopsy tissue. The patient and doctor are notified by Strand if the DNA matches usually within 72 hours after receipt of biopsy tissue. Get started with the Know Error test in minutes. Its fast, simple, painless, and a kit will be shipped right to you or your loved one’s home. Swab the inside of your cheek. (Carefully follow the instructions included and watch the video on how to swab your cheek). Mail the swab to Strand in the postage-paid envelope provided in the kit. Rest Assured! Both you and your doctor will be notified of the test results usually within 72 business hours after receipt of the biopsy sample. Stay informed! In the future should you ever have an additional biopsy performed, you can simply contact Strand’s client service department to arrange to obtain a sample of the new biopsy. You will never need to order the DNA Swab Kit again! The Know Error DNA test [DNA Specimen Provenance Assay (DSPA)] is a DNA test used to definitively ascribe patient identity and rule out specimen contamination (i.e. assure the specimen purity) when making the diagnosis of cancer and other histopathological conditions. A panel of 16 microsatellite short tandem repeat (STR) markers that recognizes highly variable loci of human DNA is used in a PCR-based assay and analyzed by capillary electrophoresis. The 16 STR loci range from approximately 75 to 400 base pairs in length, and are highly polymorphic in the human population. The collective data from this panel provides a genetic profile, or ‘DNA fingerprint,’ representing the individual. To complete the diagnostic testing cycle for cancer, the genetic profile from the putative malignant specimen(s) is compared with the genetic profile derived from the patient’s DNA reference sample taken via cheek swab at the time of the biopsy procedure. View a more detailed explanation of the four stages in DSPA testing. The diagnostic testing cycle for cancer can involve up to 18 steps and several medical professionals working in different locations. Each year, it plays a critical role in determining the diagnoses and corresponding treatments of millions of patients. With such a complex process executed at a large scale, the risk of Specimen Provenance Complications (SPCs) is a serious concern for both physicians and patients. SPCs arise due to instances of biopsy specimen transposition, extraneous/foreign cell contamination and misidentification of cells (patients) that occur in clinical or anatomical pathology. In the case of Biomarker Testing a specimen admixture can cause an incorrect finding and confound the biomarker results. When these SPCs are left undetected, they can lead to serious diagnostic errors and adverse patient outcomes. When a cancer diagnosis is assigned to the wrong person, the patient with the false-positive diagnosis could receive unnecessary therapy and treatment (chemotherapy, radiation, surgical procedures, etc.) while the patient with the false-negative diagnosis would not receive the care he or she needs in a timely manner. DNA is extracted from the tissue/buccal swab by lysing the cells. The amount of DNA that is present is typically quantified; depending on the amount of DNA available, the sample may be concentrated or diluted to optimize the amplification reaction. Formalin fixed, paraffin embedded tissues are not an optimal source for DNA, as the fixation process is known to both degrade DNA and to cause chemical crosslinking that can impede downstream tests. We use specialized reagents and techniques specifically designed to work with this difficult sample type. Very specific locations (loci) in the DNA are copied (amplified) millions of times; each copy has a fluorescent tag attached. This amplification process is very sensitive. If non-patient DNA is present, for example, from extraneous tissue in the water bath or from a cutting station that is not cleaned between samples, the non-patient DNA will be amplified along with the patient DNA, and readily discernable in our test result—even if the foreign cells are not distinguishable under microscopic examination. Capillary electrophoresis separates the DNA based on fragment size and charge. The fluorescent tag on each fragment is excited by a laser and the emission is captured by an optical detection system. The combination of fragment size and fluorescent tag allows the assignment of DNA fragments to specific alleles for the 16 individual loci that were tested. Even if useful data is only obtained on a faction of the loci examined, assignment of provenance is generally possible. The DNA profile from each tissue sample is compared to the DNA profile from the corresponding reference sample of known provenance. The comparison includes identifying the loci having data that are acceptable for comparison, identifying the alleles at each locus and calculating the random match probability of the profile. The random match probability is a statistical calculation of the likelihood that the same profile will be observed in another individual chosen from the population at random (i.e. how specific is the identification). The results of each comparison can be categorized most simply as Match, Non-match or Inconclusive (QNS). • MATCH– There are at least 5 loci that are identical between the reference and the tissue, no conflicting loci observed and a random match probability indicating that the profile statistically can be expected only once in a population of at least one hundred thousand people. • NON-MATCH– The reference and the tissue do not match one another. This can be due to a transposition (the reference and the tissue come from different people), contamination (DNA from two or more people in a single sample) or severe genetic anomalies resulting from the cancerous nature of the tissue. • INCONCLUSIVE– The data obtained from the tissue, the reference or both is of insufficient quantity or quality such that a meaningful comparison cannot be made. In the case of non-match or inconclusive results, the treating physician and/or pathologist must consider whether assignment of provenance for that specimen is necessary to render a complete and accurate diagnosis or treatment plan. If so, we recommend that the pathology lab re-submit a new confirmatory tissue scroll from the same paraffin block for which provenance is unverified for repeat DSPA testing, and re-read a newly prepared microscopy slide from the same block in order to confirm the original pathology interpretation. Conversely, if the provenance of the particular tissue can be disregarded without impacting diagnosis or treatment, then repeat testing may not be necessary (for example, if the provenance of five high grade cancer specimens has been confirmed via DSPA, but a 6th specimen yields an inconclusive DSPA result). The medical journal articles summarized below provide further insight into the existence of biopsy specimen contaminations and switches (Specimen Provenance Complications, SPCs) in the diagnostic process. They also confirm the need for DNA Specimen Provenance Assay (The Know Error DNA test) of positive biopsy results to prevent diagnostic mistakes resulting from SPCs. American Journal of Clinical Pathology—Occult Specimen Contamination in Routine Clinical Next-Generation Sequencing Testing. Occult Specimen Contamination in Routine Clinical Next-Generation Sequencing Testing. In evaluating the extent of human-to-human specimen contamination in clinical next-generation sequencing (NGS) data the findings suggest that 3% of NGS cases exhibited a greater-than 5% DNA admixture, samples being so significantly contaminated by another’s DNA that test results were misleading. Jennifer K. Sehn, MD, David H. Spencer, MD, PhD, John D. Pfeifer, MD, PhD, Andrew J. Bredemeyer, PhD, Catherine E. Cottrell, PhD, Haley J. Abel, PhD and Eric J. Duncavage, MD. American Journal of Clinical Pathology. October 2015;144:667-674. The Journal of Urology—Clinical and Economic Implications of SPCs. The Clinical and Economic Implications of Specimen Provenance Complications in Diagnostic Prostate Biopsies. The societal economic burden of biopsy specimen contamination and misidentifications in the case of diagnostic prostate biopsy alone was estimated to be $879.9 million annually. 2.52% of the biopsy cases involved a specimen switch or contamination. False diagnoses due to undetected specimen errors often result in adverse clinical and economic consequences associated with unnecessary and/or delayed treatment. Wojno, K.; Hornberger, J.; Schellhammer, P.; Dai, M.; Morgan, T.; The Journal of Urology.2015 Apr;193(4):1170-7. Rate of Occult Specimen Provenance Complications in Routine Clinical Practice. Specimen contaminations and transpositions within the diagnostic testing cycle for cancer pose serious patient safety and medical-legal issues. This study documented the rate of undetected biopsy specimen errors as part of the routine clinical practice. Results indicated that up to 3.5% of specimens being evaluated may not come from the patient being diagnosed. Since each case involves at least two individuals, this error rate actually underestimates the percentage of patients potentially affected by incidents of biopsy misidentification. The use of the Know Error DNA test (DNA Specimen Provenance Assay, DSPA) to eliminate diagnostic mistakes like these are deemed a valuable and likely cost-effective solution to improve patient safety. Pfeifer JD, Liu J. American Journal of Clinical Pathology. 2013;139(1):93-100. Biopsy Misidentification Identified by DNA Profiling in a Large Multicenter Trial. Over 13% of biopsy specimens identified in this trial were contaminated with unidentified sources of DNA not from the patient. 171 biopsy cases (1.5%) were so sufficiently compromised by contamination additional slide tissue was requested for testing. The authors concluded that the potential for biopsy misidentification should be a concern in both the clinical trial setting and routine clinical practice. Marberger M, McConnell JD. Fowler I, et al. Biopsy misidentification identified by DNA profiling in multicenter trial. Journal of Clinical Oncology. 2011; 29(13):1744-1749. A dataset of over 4,200 patients diagnosed with breast cancer was analyzed for specimen provenance errors. After a pathologic diagnosis of breast cancer was made, a portion of the diagnostic specimen was sent to an independent DNA laboratory (Strand Diagnostics) where genetic short tandem repeat profiles were compared to the patient’s reference DNA to rule out the presence of undetected Specimen Provenance Complications (SPCs) prior to treatment. DNA Specimen Provenance Assay (DSPA) test confirms identity of transposed specimens. After undergoing an ultrasound-guided breast biopsy at her physician’s office, a 54-year-old female patient (Patient A) was diagnosed with invasive ductal carcinoma in her right breast. Less than two months after the diagnosis was rendered a simple/partial mastectomy was performed to treat the cancer. However, when the extracted breast tissue was examined by a pathologist following the surgery, there were no cancer cells detected. These findings were inconsistent with the original biopsy and radiology results, which lead the pathologist to contact Strand to investigate the situation and help determine whether Patient A really had cancer. MATERIALS AND METHODS: Upon receiving notification of this discrepancy, Strand sent a Specimen Source Verification (SSV) kit to the pathologist so a DNA reference sample (buccal swab) and tissue samples could be collected for the patient in question (Patient A). A DNA Specimen Provenance Assignment (DSPA) test indicated that the four slides used to render the original diagnosis and the buccal swab findings were a complete DNA non-match. Following these results, three additional SSV kits were sent out so Patient A could be re-swabbed for additional verification, along with the other two patients who were biopsied at the physician’s office the same day (Patient B and Patient C). Buccal swabs for these other two patients were tested against the original four malignant samples that were deemed a non-match for Patient A. In addition, samples of the extracted mastectomy tissue were also analyzed in this next round of testing. RESULTS: DNA Specimen Provenance Assignment (DSPA) testing confirmed that the original four tissue samples that led to a cancer diagnosis did not belong to Patient A (the benign mastectomy tissue, however, was a match). Results for Patient B also indicated a DNA non-match, and it was determined that the tissues in question actually belonged to Patient C. It is unclear how this specimen transposition occurred, but regardless of the cause, this situation resulted in misdiagnosis and an unnecessary surgery for Patient A, as well as delayed treatment for Patient C who actually had cancer. CONCLUSIONS: A DSPA test was able to verify the provenance of the samples in question and enabled the cancer diagnosis to be assigned to the correct patient. Had testing been performed on a prospective basis using the patented know error® system, the error could have been identified prior to the unnecessary treatment of Patient A. The hospital involved in the case is now using the know error® system with all breast biopsies procedures to complete the diagnostic testing cycle and protect its patients from adverse outcomes. DNA testing confirms presence of sampling fraud in infectious disease study. A large, global pharmaceutical company was conducting an infectious disease study overseas. Investigators had become suspicious of fraudulent specimen collection due to multiple instances wherein specimens identified as coming from distinct individuals appeared to be from a common donor. To definitively establish whether or not fraud had occurred, the company ordered DNA Specimen Provenance Assay (DSPA) to determine how many unique individuals’ genetic profiles were present among the suspicious specimens. MATERIALS AND METHODS: Suspicious blood samples from the study were submitted to Strand for DNA Specimen Provenance Assay (“DSPA”) testing. DSPA employs Short Tandem Repeat (“STR”) analysis originally developed by the forensics community and often referred to as “genetic fingerprinting.” The technique examines a panel of 16 microsatellite markers representing highly variable loci on the human genome. The collective STR profiles from these loci constitute a genetic “fingerprint” which can uniquely identify an individual with precision exceeding 99.99%. RESULTS: Of the 42 blood samples submitted for DNA testing only 18 unique individuals’ profiles were present, confirming that the actual subject population was much smaller than the fraudulently inflated population reported by the enrollment site. Had this irregularity gone undetected, the integrity of the study might have been significantly compromised. Early identification of the fraud enabled the study sponsor to exclude these samples from the data set and take corrective action to preserve the validity and integrity of study results. Had the problem not been identified, study results may have led to invalid conclusions with significant financial and clinical ramifications. It is important to note that suspicion of fraudulent activity was only raised in this case due to investigators’ astute observation of common chemical traits unique to the specific trial protocol, which implied that allegedly disparate samples were from a common donor. In the vast majority of trial settings, routine lab testing would not have detected such patterns. The sampling error would have been completely unknown to the investigators, leading to incorrect study conclusions of potentially drastic consequence. CONCLUSIONS: It is well known that complications involving specimen transposition and contamination are inherent across all clinical settings, impacting as many as 3% of cases in tissue histopathology specifically.1 Specimen handling in the research and clinical trial context carries these same risks, plus the added risk of fraudulent activity related to data representation and/or specimen acquisition. Whether the root cause is intrinsic handling errors or deliberate fraud, these complications are typically impossible to detect other than through DSPA testing. This case presents one representative example of the fraud risk which pervades clinical trials, but has historically been tolerated by the research community given the lack of available methods to identify and mitigate this risk. However, recent advances in the availability of cost effective and timely DSPA testing protocols available mean that investigators now have a viable tool to completely eliminate specimen provenance ambiguity from the research paradigm. Prospective DSPA testing through the know error® system is quickly becoming the new standard of care for diagnosing patients with cancer in a variety of specialty areas, as the imprecision inherent in those testing cycles is no longer considered acceptable by physicians who now demand identity verification before rendering treatment to patients. For precisely the same reasons and more (fraud risk), investigators and regulators should consider study results achieved without DSPA testing to be potentially suspect. The average cost to obtain approval for a major pharmaceutical compound exceeds $4 billion, and in some cases can be well over $11 billion. A single clinical trial can cost as much as $100 million, with many trials required in order to yield a single approved drug.2 Considering the magnitude of societal benefit and financial investment which hinges upon the accuracy of study data, the potential implications of compromised data due to undetected specimen provenance complications cannot be overstated. Multi-billion dollar decisions with the potential to impact millions of lives demand data which embody the highest degree of accuracy and integrity available to science. Investigators should consider that the modest marginal cost of adding prospective DNA testing via the know error® system to a study protocol is readily justified given the ramifications of an invalid study conclusion resulting from preventable specimen provenance complications including fraud. 1. Pfeifer JD, Zehnbauer B, Payton J. The changing spectrum of DNA-based specimen provenance testing in surgical pathology. Am J Clin Pathol. 2011;135:132-138. 2. Herper M. The truly staggering cost of inventing new drugs. Forbes.com. www.forbes.com/sites/matthewherper/2012/02/10/the-truly-staggering-costof-inventing-new-drugs/. Published February 2, 2012. Accessed June 21, 2012. DNA Specimen Provenance Assay (DSPA) testing clarifies identity of mixed prostate biopsy samples. Strand Diagnostics was contacted by a staff member at a reference laboratory after it was suspected that several biopsy jars might have contained prostate specimens from multiple patients. This was the result of a physician’s office error in which multiple tissues were placed into the same jars, making it unclear whether these were from the same patient or two different people. DNA Specimen Provenance Assay (DSPA) testing was utilized to determine the origin of all tissue samples from these mixed jars and ensure the appropriate patients could be notified of their diagnoses. MATERIALS AND METHODS: A total of 21 prostate biopsy jars were collected in this case, 12 labeled for Patient A and nine labeled for Patient B. Upon further discussion with the physician’s office, the reference lab learned that three of the jars submitted for Patient B contained multiple cores from both Patient A and Patient B. A total of 12 tissue samples were placed in these mixed jars, and the reference lab requested that DSPA testing be performed on all of them so each core could be linked to the proper patient. DNA reference samples were obtained for both patients via cheek swab and compared with the tissues in question. RESULTS: Six of the tissues were determined to be a DNA match for Patient A, five of the tissues were a DNA match for Patient B and one tissue contained DNA profiles from both patients. It was deemed unnecessary to retest this contaminated sample. The reference lab reported that Patient A was diagnosed with cancer, while the tissues belonging to Patient B were benign. CONCLUSIONS: DSPA testing performed by Strand determined the provenance of all specimens in the mixed biopsy jars and allowed the appropriate diagnosis to be assigned to each patient. This was extremely important to ensuring proper treatment because one patient tested positive for cancer and the other did not. Use of the know error® system on a prospective basis (as opposed to retrospective in this particular case) would have saved the practice thousands of dollars in testing fees and allowed for a more timely diagnosis for each patient. Specimen provenance of unknown tissue in mixed sample jar determined through DNA testing. The Director of Operations for a large pathology services provider contacted Strand after his laboratory received a jar containing two specimens that, upon visual inspection, appeared to be completely different tissue types, presumably from different patients. As an existing Strand customer, the facility had specimen source verification kits on hand and was able to send in samples quickly for DNA Specimen Provenance Assay (DSPA) testing to determine if the specimens were in fact from two different patients. MATERIALS AND METHODS: The pathologist at the lab evaluating the biopsies in question suspected immediately that the specimens were likely from two different sources based on their visual appearance. Small samples from the paraffin embedded tissue blocks were sent to Strand for analysis. DNA Specimen Provenance Assay (DSPA) testing confirmed that the genetic profiles obtained from each sample did not match—meaning the specimens had not been collected from the same patient. After consulting with the practice where the samples were taken, it was determined that the first specimen was a skin lesion likely collected from Patient A while the second specimen was cervical tissue likely collected from Patient B. The cervical tissue had been collected approximately four days after the skin lesion, but it was erroroneously placed in the same jar and then labeled for Patient B. Following this discovery, a DNA reference sample taken via cheek swab from Patient A was submitted to Strand to confirm a match with the unlabeled tissue (skin lesion) by means of a DSPA test. RESULTS: DSPA testing confirmed that the tissue samples in question were from two different patients.* Subsequent testing of the skin lesion and reference sample confirmed that the lesion was a match for Patient A. The skin lesion was discovered to be positive for cancer, thus making it even more important to assign provenance to the specimens in a timely manner. With both samples properly identified, the patients could be notified of their testing results and did not have to undergo re-biopsy procedures to receive a diagnosis. CONCLUSION: Through the relationship with Strand, the laboratory was able to help its client (the practice) solve a potentially serious problem and prevent any inconvenience or harm to the patients involved in the error. While the laboratory uses the know error® system on a prospective basis, this particular situation shows the value of having a specimen source verification kit available for retrospective cases when an error is suspected. *NOTE: The client deemed it unnecessary to perform DSPA testing to confirm a match between the cervical tissue and Patient B because the jar was correctly labeled for that individual. Strand recommended otherwise. Use of the know error® system prevents two patients from having incorrect treatments. A large urology group practice uses the know error® system (which includes DNA Specimen Provenance Assignment “DSPA” testing) as part of routine clinical practice to identify otherwise occult (hidden) specimen provenance errors which can lead to patient harm. SUMMARY: Buccal swabs (included in the know error collection kit) were received by Strand Diagnostics for two patients, Patient A & Patient B. Both had prostate biopsies at the same practice, on the same day whereby the know error® system biopsy kits and protocol were utilized. Pursuant to the practice’s protocol, tissue samples for Patient A, who was putatively diagnosed with cancer, were sent to Strand Diagnostics for DSPA testing. When Strand Diagnostics accessioned the tissues for Patient A it was noted that, though the patient names matched, the barcode on the tissues did not match the bar code on the buccal swab. Due to this discrepancy, DSPA testing was not performed and the client was immediately notified. The practice believed the tissues were indeed those of Patient A and instructed Strand Diagnostics to test “name to name” (i.e. ignore the bar codes). The DSPA test resulted in a complete DNA non-match. Strand Diagnostics recommended that Patient A be re-swabbed and that new tissues be cut from the blocks labeled for Patient A. It was also suggested to submit the tissues for Patient B in an attempt to confirm the provenance of Patient B’s tissues (even though Patient B was diagnosed as “negative for cancer”). RESULTS: The second round of DSPA testing on Patient A ALSO resulted in a complete DNA non-match. The DNA from both of the buccal swabs from Patient A DID match each other suggesting that it was the tissues that were mislabeled. Further, it was confirmed that the buccal for Patient B as compared to the tissues labeled for Patient B was also a complete DNA non-match. Further analysis proved that the tissues labeled for Patient A actually belonged to Patient B and vice versa. The original pathology reports for the patients were the reciprocal and had to be revised to show the correct diagnosis for each patient. CONCLUSIONS: In a timely fashion (a 4 day turn-around-time for the initial report), Strand Diagnostics’ know error® system was able to prevent a mislabeled (false-positive) cancer-free patient from having unnecessary prostate surgery and likewise a mislabeled (false-negative) cancer patient from going untreated. Without the use of the know error® system and DSPA testing, the error might not have been found until after radical prostatectomy; and an undetermined length of time might have passed before treatment of the patient with cancer. This client continues to use the know error® system as part of their routine clinical practice providing their physicians with increased diagnostic accuracy and their patients with the highest level of safety. The know error® system identifies patient misdiagnosed with prostate cancer. This case involves the misdiagnosis of two prostate biopsy patients due to a specimen switching error. When Patient A’s two positive prostate tissue samples were received for testing, it was discovered that neither sample matched the patient’s DNA reference sample (collected via cheek swab at the time of his biopsy procedure) indicating that the tissues did not actually come from Patient A. MATERIALS AND METHODS: After the non-match report was issued for Patient A, samples were recut from the same block of cancerous paraffin-embedded tissue and submitted to Strand Diagnostics for retesting. The results of this second test were consistent with the original findings indicating a non-match. Patient B was biopsied at the surgical center on the same day as Patient A and received a negative diagnosis. Tissues from the block used to render Patient B’s diagnosis were cut and submitted to Strand for comparison with his reference sample, which also resulted in a DNA non-match. Patient A’s DNA reference sample was a match for the tissues submitted for Patient B, suggesting that a biopsy sample switch had occurred. New DNA reference samples were then collected for both patients, as well as additional tissues samples for final verification. RESULTS: DNA profiles obtained from the new buccal swabs matched those obtained from the original buccal swabs for each patient. It was then confirmed that the tissues in the block originally submitted for Patient A were a match for Patient B and vice versa. Therefore, it was concluded that these patients’ blocks were switched (evidently during the biopsy evaluation process), and thus the diagnosis of cancer ascribed to Patient A was actually meant for Patient B. This biopsy testing process with these two patients involved multiple steps and processes (which is standard practice). For example: the DNA reference sample and biopsy samples were collected at the surgical center; the tissues were then sent to one lab to be cut; and then transferred to another for the pathology reading. Thus it is difficult to pinpoint the exact location where the error occurred. CONCLUSIONS: Through the use of the patented know error® system, this sample misidentification error was detected prior to any unnecessary treatment taking place for Patient A. DNA Specimen Provenance Assignment (DSPA) testing allowed the appropriate diagnosis to be assigned to each patient. Patient B was notified of his cancer diagnosis and proceeded with the recommended treatment. Know Error testing verifies identity of mislabeled prostate specimens. Two positive prostate biopsy specimens were switched at a practice’s in-house pathology lab. The issue was uncovered by the use of Strand Diagnostics’ know error® system after the tissue samples submitted for two patients biopsied at the practice did not match the DNA reference samples collected via cheek swab at the time of their biopsy procedures. The lab manager was notified immediately of the discrepancy so that additional testing could be performed to properly identify the origin of the tissue samples in question. She was also instructed to let the physician know about the incident to avert any improper treatment of the patients involved. MATERIALS AND METHODS: The genetic profile of the tissue submitted for Patient A did not match the profile obtained from his DNA reference sample. Instead, it was a match for the reference sample submitted for Patient B who was biopsied at the practice on the same day. The DNA testing results for Patient B yielded a similar conclusion; his tissue matched the reference sample submitted for Patient A. Additional tissues were submitted for both patients to confirm the findings. As with the preliminary report, this second round of testing also indicated that the resubmitted tissues did not match the original reference samples for either patient. To further the investigation, new DNA reference samples were collected for both patients to be tested against the original swabs and tissues. RESULTS: Results from this last round of testing showed that the genetic profiles obtained from the replacement swabs matched the original swabs, but were a DNA non-match for the respective tissues submitted for each patient. The original and new swabs for Patient A were a match for the tissues submitted for Patient B. And as expected, the original and new swabs for Patient B were a match for the tissues submitted for Patient A. This confirmed the suspicion that the tissue blocks had been switched at the laboratory. Further conversations with physicians and laboratory staff revealed that the tissue blocks were not labeled correctly which ultimately caused the switch to occur. CONCLUSIONS: This particular case reveals that sample misidentifications can occur in any environment, even in a closely monitored, in-house pathology laboratory. Because the know error® system was used as part of routine clinical practice, this problem was identified prior to any unnecessary treatment of either patient. This intervention also protected the practice which might have been liable for medical malpractice costs associated with a misdiagnosis. Strand continues to provide clinical support to help the practice deliver a higher standard of diagnostic accuracy and patient safety. The rate of incidence in misattributed specimen provenance among surgical breast biopsies. As presented at the 2014 San Antonio Breast Cancer Symposium: A. Lerner, MD, ABTC LLC.; A. Bush, Ph.D, Strand Diagnostics LLC.; A. Kenler, MD, Bridgeport Hospital, Yale New Haven Health, Bridgeport, CT.; D. Dorfman, MD, Zwanger-Pesiri; T. Morgan, Strand Diagnostics LLC.; B. Boyd, RN, ABTC LLC.; William Burak, MD, ABTC LLC.; R. Fine, MD, ABTC LLC. Poster Presentation Content, December 12, 2014. OVERVIEW: The medical literature reports extensively on the diagnostic challenges posed by tissue contamination and transposition among surgical biopsy specimens. These specimen provenance complications (SPCs) can lead to a misdiagnosis of cancer when no cancer is present, resulting in unnecessary surgery or other non-indicated therapy in an otherwise healthy patient, and a potential delayed diagnosis of a reciprocal patient. The histopathology process involves many manual steps during which specimens must be estranged from their identification, and provenance errors are often invisible absent DNA analysis. Prostate biopsy is the clinical setting in which specimen provenance has been most widely studied, with complication rates reported to persist in over 0.9% of positive diagnoses despite best efforts to minimize errors. Because the processing workflow is virtually identical for histopathology specimens of all types, there is reason to expect that error rates among breast biopsy specimens are similar to prostate, though data validating this expectation have not previously been available. METHODS: We analyzed a dataset of over 4,200 patients diagnosed with breast cancer between February 2011 and April 2014. All biopsies were collected using a uniform best-practice protocol including forensic chain of custody principles, bar-coding of specimen containers, and collection of the patient’s reference DNA sample via buccal swab during the biopsy procedure. After a pathologic diagnosis of breast cancer was made, a portion of the diagnostic specimen was forwarded to an independent DNA laboratory (Strand Diagnostics, Indianapolis, IN) where genetic short tandem repeat profiles were compared to the patient’s reference DNA to rule out the presence of undetected SPCs prior to proceeding with therapy. RESULTS: 3,545 breast cancer cases from 7 practices contributing 100 or more cases each were examined. DNA testing revealed occult provenance complications in 16 cases (0.45%), of which 6 (0.17%) were a complete transposition with another patient and 10 (0.28%) reflected contamination of the specimen by tissue from one or more unidentified individuals. Four (57%) of the practices experienced at least one provenance error during the study period, with the highest error rate being 1.41% at one practice. Pathology was performed by 14 different laboratories, 6 (43%) of which were implicated in occult SPCs. Finally, patients seen by 8 (13%) of the 61 physicians performing surgical biopsies in the cohort were subjects of occult specimen provenance errors. SUMMARY: These data, while limited in statistical power, suggest that the incidence of SPCs among breast biopsies is comparable to that previously reported for prostate biopsies, and that errors are distributed broadly across laboratories, practices, and physicians. Due to the potential clinical consequences for patients with undetected SPCs, and the medical malpractice implications, further study of the nature and economics of provenance complications in the breast biopsy setting is warranted. REFERENCE: Pfeifer JD, Liu J. Rate of Occult Specimen Provenance Complications in Routine Clinical Practice. American Journal of Clinical Pathology. 2013;139:93-100.
2019-04-22T20:27:51Z
https://knowerror.com/patients-2/patient-kit/
By registering to sell on the Uvipin Marketplace and any related websites and applications owned or operated by or on behalf of Uvipin (collectively, the «Websites»), you as an individual, or the company on behalf of which you are registering, (referred to herein as «Seller») agree to be bound by these Uvipin Marketplace Terms and Conditions (collectively, with any Attachments or Exhibits, the «Agreement»), which are by and between Uvipin International Inc.(together with its affiliates, «Uvipin») and Seller (each, a «Party» and collectively, the «Parties»). This Agreement is effective as of latest of (i) the date Seller registers for the Websites via the Portal or otherwise accepts the Agreement and (ii) the Agreement is posted to the Seller Portal (the «Effective Date»). Capitalized terms not defined in this Agreement will have the meanings given to them in Appendix A. The original language of this Agreement is English. Uvipin may make translations available for convenience. In case of conflicts between the original English version and any translation, the English version shall prevail. A. Websites Hosting and Maintenance. Uvipin will provide Seller with access to the Websites as a platform for Seller to post Merchandise Listings and facilitate the sale of Seller's Merchandise to Users. Uvipin will be responsible for all operating functions of the Websites. Uvipin may, in its sole discretion, (i) ask Users to rate and/or provide comments regarding Merchandise and/or Seller's performance, using any metrics determined by Uvipin in its sole discretion, and (ii) post any resulting ratings and/or comments on the Websites for public display. B. User Orders and Payment. Uvipin will process User Orders (as defined in Section II.C.1) and collect all amounts due from Users for Merchandise ordered from Seller through the Websites. Within fifteen (15) days thereafter, Uvipin will remit such amounts, less any amounts owed to Uvipin by Seller, by electronic funds transfer to Paypal or the bank account identified by Seller in the Portal. Seller hereby appoints Uvipin as an agent of Seller for the sole and express purpose of receiving payments from Users for Seller's Merchandise sold on the Websites. Seller acknowledges that, as between Seller and a User who purchases Merchandise from Seller, Uvipin' receipt of funds from the User is deemed the receipt of funds by Seller. A. Enrollment; Account Activation. Seller will provide the information requested on the Portal during Account activation, and agrees to update such information promptly. Seller will not use or incorporate any Uvipin Mark, in whole or in part, in Seller's account name or any other User-facing identification. Seller agrees to secure the password used to access its Account and not to disclose it to any third party (other than any authorized third-party service providers to Seller). Seller acknowledges and agrees to be strictly liable for all uses or actions occurring through the Seller's Account. B. Merchandise Listings. Seller will create Merchandise Listings via the Portal for all Merchandise it intends to sell on the Websites. All Merchandise Listings will comply with the specifications and policies posted in the Portal, and such Merchandise Listings will not use or incorporate any Uvipin Marks. Seller is responsible for promptly updating its Merchandise Listing(s) to ensure the Merchandise Listing and inventories are at all times accurate. Seller will not list any Merchandise it does not currently have in stock. Seller acknowledges that failure to abide by the terms of this Agreement may subject Seller to penalties and legal liability, and that Uvipin may reject, remove or censor any Merchandise Listing for any reason, in Uvipin' sole discretion. 1. Merchandise Pricing. Seller is responsible to establish prices for its Merchandise. Seller will enter pricing via the Portal, unless another method is approved in writing by Uvipin. b. Seller Pricing Errors. If Seller uploads or otherwise provides incorrect pricing information to a Merchandise Listing (a «Seller Pricing Error»), Uvipin may, at Seller's expense, take any commercially reasonable action necessary to avoid and/or repair harm to Uvipin due to the Seller Pricing Error. Such action may include requiring Seller to honor all Merchandise purchases occurring due to Seller Pricing Errors and compensating Users for any inconvenience caused by such errors. Seller will also reimburse Uvipin for all costs Uvipin incurs directly as a result of Seller Pricing Errors. 2. Prohibited Merchandise. Unless otherwise expressly permitted in writing by Uvipin, Seller will not promote, offer for sale, or provide Uvipin with Merchandise Listings that (a) contain any Prohibited Merchandise, (b) promote or engage in any deceptive trade practice (including spoofing, slamming, cramming, phishing, attempting to scam or defraud a User into surrendering private and/or personal information); or (c) promote or engage in any other illegal activity. 3. Permits and Licenses; Taxes. Seller will, at its own expense, obtain all permits and licenses required to operate its business in accordance with Applicable Law, and will pay and discharge all applicable taxes and assessments which may be due for selling or offering of its Merchandise for sale on or through the Websites. It is Seller's responsibility to determine the states in which it has an obligation to collect and remit state and local sales and use taxes («Taxes»). Seller will promptly notify Uvipin of the states for which Uvipin should collect Taxes by affirmatively selecting the applicable states in the Seller's business account profile in the Portal. Uvipin will pay over the Taxes collected from the online purchaser directly to the Seller and Seller will be solely responsible for remitting the tax to the applicable taxing jurisdiction. If a taxing authority requires Uvipin to pay any of Seller's taxes, Seller will promptly reimburse Uvipin for the amounts paid. Seller acknowledges and agrees that tax-related data is provided through Uvipin' third-party service provider(s) («Providers»). While Providers will use reasonable efforts to ensure that the tax data is current and accurate, Seller acknowledges and agrees that Uvipin and its Providers do not provide tax advice, and that Seller is solely responsible for determining the applicability and accuracy of any tax data. As a condition of receiving the tax data, Seller agrees to fully and forever waive any Liabilities against the Uvipin Parties and the Provider Parties arising from Seller's use of and reliance on such tax data and further agrees to defend, indemnify and hold the Uvipin Parties and the Provider Parties harmless from Liabilities arising from such use or reliance. 1. Process. When Seller receives notice of an order from a User (a «User Order») at the e-mail address specified by Seller in the Portal, Seller will process and fulfill the User Order in compliance with the Seller Shipping and Delivery Policy, and will make the Merchandise requested in a User Order («Requested Merchandise») available for pick up by a common carrier to deliver to the applicable User. Seller will not substitute any item(s) for the Requested Merchandise. Title to and risk of loss of and/or damage to the Requested Merchandise will remain with Seller until delivery to the User. Uvipin will not have title to, or deemed the legal owner of, any Merchandise at any time under the terms of this Agreement. Seller may not include any marketing, promotional materials, or any other solicitations with the Requested Merchandise shipped to Users. 2. Overdue Orders. Uvipin may cancel any User Order that fails for any reason to ship within the applicable shipping period indicated in the Seller Specifications, and Uvipin will have no duty to compensate Seller for any such cancelled orders. It is Seller's responsibility to monitor all orders and ensure all shipments are made within the timeframes indicated in the Seller Specifications. 3. Delivery Errors, Non-conformities. Seller is responsible for any non-delivery, delivery error, mistake, theft or act in connection with the fulfillment and delivery of its Merchandise, except to the extent caused by Uvipin' failure to properly process a User's address verification in the course of the purchase of the Merchandise. 4. Additional Delivery Services; Delivery. With the written consent of Uvipin, Seller may provide more extensive shipping services, such as delivery within the home or User premises, and/or installation services for Merchandise sold pursuant to this Agreement. In such case, Seller (a) will maintain general liability insurance, vehicle insurance, and worker's compensation insurance in such amounts set forth in the Marketplace Vendor Guide and (b) will not permit any of its Personnel or subcontractors to enter the premises or residences of Users until they have passed the drug testing and background check requirements specified in the Marketplace Vendor Guide. D. User Service Issues. Seller will resolve all User service issues arising from, or in connection with Seller's promotion, sale, order fulfillment and/or delivery of Merchandise. Uvipin will direct Users who contact it with service issues related to Merchandise sold pursuant to this Agreement to contact Seller via the contact information Seller has provided in the Portal. If Seller fails to respond to User service issues, or requests from Uvipin related to same, Uvipin may take any actions necessary to ensure compliance, up to and including suspending Seller's access to their Account. In the event that Uvipin believes in its sole discretion that a transaction represents fraudulent activity, Uvipin may, but is not obligated to, prohibit the transaction. Uvipin will not be liable to Seller for any such action results in or prevents a User from completing an order or causes a User to cancel an order. E. Chargebacks. If Uvipin notifies Seller of a User chargeback or chargebacks received due to non-delivery, or other dispute related to Seller's transactions, Seller must present Uvipin with all information requested in the chargeback notification within five (5) business days of receiving notice. If Seller fails to comply with Uvipin' request, Seller will reimburse Uvipin for the User chargeback(s) in accordance with the settlement and payment terms herein. Notwithstanding the other provisions of this paragraph, Seller will not be responsible for chargebacks due to (a) theft and/or unauthorized use of a third party's credit card information for which Uvipin is responsible (except to the extent such theft and/or unauthorized use is attributable to Seller), and (b) non-delivery due to Uvipin' failure to send the order information to Seller. F. Seller Marketing; Restrictions; Prohibition on use of User Information. Seller (or any of its affiliates or related parties) may not directly or indirectly disclose or use any User information or other transaction information, except as necessary to fulfill its fulfillment and customer service obligations under this Agreement. Seller may not use any User information for any of its own marketing or promotional activities. To the extent Seller obtains User information outside of its relationship with Uvipin or the Websites, the terms of this section will not prevent Sellers from using such User information, provided that Seller may not explicitly target Users on the basis of their purchases or presence on the Websites. G. Refunds; Returned Merchandise. Seller will submit a return policy (the «Seller Return Policy») using the form provided on the Portal. The Seller Return Policy must (i) apply to all Merchandise, (ii) outline the process for Users to return the Merchandise directly to Seller, and (iii) be at least as accommodating to User returns as the Uvipin Return Policy. Seller agrees to honor all User returns in accordance with the Seller Return Policy published at the time of the User's purchase of Merchandise. H. Recalled Merchandise; Defective Merchandise. Seller will immediately notify Uvipin of any recalls affecting the Merchandise it has listed on Uvipin Marketplace. Notwithstanding the foregoing Seller is responsible for all defective or recalled Merchandise, including any costs associated with recalls of its Merchandise, all liability related to its Merchandise (regardless of whether such Merchandise is defective), and will bear all costs associated in notifying Users and handling such recalls of its Merchandise. A. Monthly Subscription Fee. Uvipin will charge Seller's credit card or via Electronic Funds Transfer on the first business day of each calendar month in the amount of the current Monthly Subscription Fee, as specified in the Portal and subject to change. Any revised Monthly Subscription Fee will be effective as of the date posted. Seller agrees that failure to pay its Monthly Subscription Fee may result in a breach of this Agreement, removal of Merchandise Listings and/or suspension of access to the Portal. B. Commissions. Seller will pay commissions to Uvipin according to the «Commission Rate Schedule» available in the Portal, which is subject to change. Any revised Commission rates are effective as of the date posted. C. Right of Recoupment and Set-off. Uvipin and Seller acknowledge and agree that Uvipin has the right to recoup or set-off any payments owed to Seller by the amount of any Monthly Subscription Fees, commission payments, Seller obligations owed according to the defense and indemnity terms herein, and any other monetary obligations owing by Seller to Uvipin. Any remaining outstanding funds due to Uvipin after recoupment or set-off will be paid by Seller promptly upon demand by Uvipin. Uvipin may obtain reimbursement of any amounts owed by Seller to Uvipin by deducting from future payments owed to Seller, reversing any credits to Seller's account, charging Seller's credit card, or seeking such reimbursement from Seller by any other lawful means. Seller hereby authorizes Uvipin to use any or all of the foregoing methods to seek reimbursement, including the debiting of Seller credit card or bank account. A. Grant of License by Uvipin. Uvipin hereby grants to Seller a non-exclusive, revocable, non-transferable license to promote and sell Merchandise on or through the Websites to Users, subject to the terms of this Agreement. B. Grant of License by Seller. Seller hereby grants to Uvipin a royalty-free, non-exclusive, irrevocable, perpetual, worldwide, royalty-free, right to use and to reproduce, modify, display, distribute, perform, re-format, create derivative works of or otherwise commercially or non-commercially exploit in any manner the Seller Content and Merchandise Listings with the right to sublicense such rights through multiple tiers; provided however that Uvipin will not alter any Seller Marks from the forms provided by Seller except to the extent necessary for presentation, so long as the relative proportions of the marks remain the same; provided further than nothing in this Agreement will restrict Uvipin' right to use the Seller Content to the extent such use is allowable without a license from Seller under Applicable Law. C. Intellectual Property Rights. All right, title and interest in and to the Websites, and all data collected or stored in connection with the Websites and any other Uvipin websites, any of their affiliates' websites, Local Marketplace, and any other service or website associated with the foregoing, including mobile sites or microsites, and all IP Rights associated with any of the foregoing, will at all times remain the exclusive property of Uvipin, and except as expressly provided herein, nothing will be construed as conferring on Seller any license to Uvipin' IP Rights, whether by estoppel, implication or otherwise. If Seller is deemed to have any ownership interest or rights in any of the foregoing, or any part thereof, then Seller will assign, and Seller does hereby assign, all of such ownership interest and rights to Uvipin, including all Seller IP Rights therein. All rights not expressly granted herein are reserved to Uvipin. D. Ownership of Content. Uvipin and Seller each agree and acknowledge that, as between Uvipin and Seller, Seller owns all Seller Content and Seller Marks, subject to the License granted herein. A. Term. The term of this Agreement will commence on the Effective Date, and will continue in effect until such time as revised by Uvipin, or terminated by either Party in accordance with the notice and termination requirements set forth below (the «Term»). B. Termination. Seller may terminate this Agreement at any time upon seven (7) business days' notice to Uvipin, in which case Seller will process and fulfill all open orders until the termination is effective. Uvipin may terminate this Agreement (i) at any time upon notice to Seller; or (ii) if Uvipin determines in its discretion that Seller has breached any term of this Agreement, immediately, including the right to cancel all open User orders for the Merchandise, and to remove all of Seller's Merchandise Listings from the Websites. C. Survival. Any termination of this Agreement will be without prejudice to the rights of either Party against the other in respect of any antecedent claim or breach of any of the provisions of this Agreement. Any obligations of the Parties relating to limitations on liability, confidentiality and indemnification, as well as any other obligations under this Agreement that by their nature are intended to survive, including any payment or User services obligation in connection with the sale of Merchandise hereunder, will survive termination of this Agreement. A. Mutual. Each Party represents and warrants that: it has the authority to enter into the Agreement and to perform the acts required of it; and the execution of this Agreement by each Party, and the performance by such Party of its obligations and duties, does not and will not violate any other agreement to which such Party is otherwise bound. 8. All information or data uploaded or transmitted by or on behalf of Seller to the Portal, Websites, or any other Uvipin website, application, or system, or to a User is free from any virus, worm, defect, Trojan horse, software bomb or other feature designed to damage or degrade in any manner the performance of the Portal, Websites, any other Uvipin website, application, or system. Seller will not use the Websites to violate the security of, or gain unauthorized access to, any computer or computer network or other device or system (including unauthorized attempts to discover passwords or security encryption codes to use any robot, spider, site search/retrieval application, or other device to retrieve or index any portion of the Websites, collect any information about other Users (including usernames and/or email addresses); or to reformat or frame any portion of the Websites), or use the Websites and/or any other Seller Content, intentionally or unintentionally, to violate any Applicable Law. VII) DISCLAIMER OF WARRANTIES. EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, UVIPIN MAKES NO WARRANTIES AND HEREBY DISCLAIMS ALL WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED WITH REGARD TO THE WEBSITES, ANY SERVICES, AND/OR INFORMATION, PRODUCTS OR SERVICES AVAILABLE THROUGH ANY LINKS THEREON, INCLUDING ANY IMPLIED WARRANTIES OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR USE, AND ANY WARRANTIES ARISING FROM COURSE OF DEALING, USAGE OR TRADE PRACTICE. THE WEBSITES ARE PROVIDED BY UVIPIN ON AN "AS IS" AND «AS AVAILABLE» BASIS AND SELLER'S USE OF THE WEBSITE IS SOLELY AT SELLER'S OWN RISK. UVIPIN DOES NOT WARRANT THAT SELLER'S USE OF THE WEBSITES WILL BE UNINTERRUPTED, ERROR-FREE, OR VIRUS-FREE, NOR DOES UVIPIN MAKE ANY WARRANTY OR GUARANTEE WITH REGARD TO RESULTS THAT MAY BE OBTAINED BY USE OF THE WEBSITES, OR THE SALE OF ANY MERCHANDISE ITEMS BY SELLER TO USERS THEREON, OR ANY SERVICES PROVIDED BY UVIPIN TO SELLER IN CONNECTION THEREWITH, INCLUDING ANY WARRANTY WITH RESPECT ANY MERCHANDISE LISTING OR ANY RESULTS SELLER MAY OBTAIN UNDER THIS AGREEMENT. THE FUNCTIONALITY PROVIDED BY THE WEBSITES OR UVIPIN, OR ITS DESIGNEES' SERVERS IS NOT AN ARCHIVE; SELLER IS SOLELY RESPONSIBLE FOR MAINTAINING INDEPENDENT ARCHIVAL AND BACKUP COPIES OF ALL INFORMATION, INCLUDING SELLER CONTENT PROVIDED TO UVIPIN. VIII) LIMITATION OF LIABILITY. IN NO EVENT WILL UVIPIN BE LIABLE FOR ANY INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL OR PUNITIVE DAMAGES OF ANY KIND OR NATURE WHATSOEVER (INCLUDING LOST PROFITS OR REVENUES, OR HARM TO BUSINESS), EVEN IF IT HAS BEEN NOTIFIED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL UVIPIN' LIABILITY UNDER THIS AGREEMENT (WHETHER IN CONTRACT, TORT OR OTHER LEGAL THEORY) BE GREATER THAN THE LESSER OF (I) $100 US DOLLARS OR (II) THE TOTAL FEES PAID BY SELLER TO UVIPIN IN THE THIRTY (30) DAYS PRIOR TO THE DATE ON WHICH ANY SUCH CLAIM AROSE. A. Obligation. Seller will defend, and indemnify and hold harmless the Uvipin Parties from and against all third-party Liabilities, whether actual or alleged (even though such allegations may be false, fraudulent or groundless), arising out of or relating to any of the following (collectively, the «Claims»): (i) infringement, misuse, dilution, misappropriation, or other violation of any intellectual property rights of third parties, including copyright, patent, trademark, trade secret, domain name, right of publicity, or confidentiality or other proprietary rights; (ii) death of or injury to any person, damage to any property, or any other damage or loss, by whomsoever suffered, resulting or claimed to result in whole or in part from any latent or patent defect in Merchandise, including improper manufacture, construction, assembly, installation, repair, display, packaging, service or design of Merchandise, failure of Merchandise to comply with any specification or samples or with any express or implied warranties of Seller, or any claim of strict liability in tort relating to Merchandise; (iii) any violation by Seller (or its affiliates, or their respective Personnel of each of them) in the manufacture, construction, assembly, installation, repair, display, packaging, possession, service, design, use, delivery or sale of Merchandise («Production or Sale») of any Applicable Law of the United States, its territories or any other country in which the Production or Sale of Merchandise took place; (iv) the publication of Seller Content and product information Seller supplies to Uvipin to display in Merchandise Listings; (v) the packaging, tagging, labeling, packing, shipping, delivery and invoicing of Merchandise; (vi) failure to warn or to provide adequate warnings or instructions in the use, assembly, service or installation of Merchandise; (vii) the packaging, labeling or advertising claims made by Seller; (viii) the display, assembly or installation of Merchandise, (ix) the assertion by a third party of a security interest, right of replevin, or other legal interest created by a factoring or other credit arrangement in any amount due Seller under a vendor agreement; (x) a breach of any of the Seller's representations and warranties contained herein; or (x) Taxes or the collection, payment or failure to collect or pay Taxes. Notwithstanding the provisions of this Paragraph, Seller will not be liable for damage to third parties to the extent such damage was solely and proximately caused by the negligence or willful misconduct of any Indemnified Party. B. Process. In performing its obligations under Section IX.A, Seller will retain defense counsel satisfactory to Uvipin and will, from time to time, provide reports, consult with Uvipin' Personnel in conducting the defense of the Claims and otherwise cooperate fully with the reasonable requests of Uvipin; provided that only with respect to claims arising under Section IX.A.(i) above, Uvipin may, at its election and at any time, take control of the defense and investigation of said Claims and employ attorneys and other consultants, investigators and experts of its own choice to manage and defend any such Claims at the cost and expense of Seller. In any case in which Seller's indemnity obligation set forth in Section IX.A is not enforceable under Applicable Law and in which any Indemnified Party and Seller are found to be liable to a third party with respect to Merchandise, then Uvipin and Seller will each contribute to the payment of any judgment awarded in favor of such third party in proportion to the comparative degree of culpability of the Indemnified Parties and Seller. D. Settlement. Seller may settle, without Uvipin' consent, Claims if the only obligation under such settlement is the payment of monies by Seller and such settlement provides for a full release of Seller and the Indemnified Parties. All other settlements, including any that would create obligations of (or restrictions upon) the Indemnified Parties or restrictions upon the sale (or disposition) of the Merchandise, will require Uvipin' prior written consent. E. Insurance Requirements. Seller will maintain at a minimum such product liability insurance coverage limits as defined in the Uvipin Marketplace Vendor Information Guide, available through the Portal. Such policy must provide that the coverage thereunder will not be terminated without at least thirty (30) days prior written notice to Uvipin. A. Definition and Obligations. «Confidential Information» means any and all technical or business data or information furnished, in whatever form or medium, by Uvipin regardless of whether marked or identified as «Confidential,» including Confidential Personal Information (as defined below), the terms of this Agreement, and the operations and technology to be utilized in connection with the Portal and Websites. Seller agrees to: (i) treat as confidential, and preserve the confidentiality of all Confidential Information and not disclose it to any third party; (ii) use the Confidential Information solely for the purposes of this Agreement; and (iii) not copy such Confidential Information unless authorized by Uvipin. B. Treatment of Confidential Information. The obligations with respect to Confidential Information will not apply to any information that: (i) is already in Seller's possession, as shown by documentation and without obligation of confidentiality; (ii) without action or fault on Seller's part, is or becomes publicly available; or (iii) Seller has obtained from a third person without breach by such third person of an obligation of confidence. Seller must promptly return or destroy all Confidential Information at Uvipin' request. C. Confidential Personal Information. In addition to the obligations related to Confidential Information, additional obligations apply to Confidential Personal Information. All information related to Users, including names, addresses, telephone numbers, account numbers, and demographic, financial and transaction information is «Confidential Personal Information.» Seller will not duplicate or incorporate the Confidential Personal Information into its own records or databases. Seller will restrict disclosure of Confidential Personal Information to its employees who have a need to know such information to perform under this Agreement. Seller is liable for any unauthorized disclosure or use of Confidential Personal Information by any of its employees. Except as necessary to fulfill its Customer Service obligations herein, Seller will not disclose the Confidential Personal Information to any third party, including any affiliate or subsidiary of Seller, permitted subcontractor, or other representative without the prior written consent of Uvipin. Unless otherwise prohibited by law, Seller will: (i) immediately notify Uvipin of any legal process served on Seller for the purpose of obtaining Confidential Personal Information; and (ii) permit Uvipin adequate time to exercise its legal options to prohibit or limit such disclosure. Seller will notify Uvipin promptly upon the discovery of the loss, unauthorized disclosure or unauthorized use of the Confidential Personal Information and agrees to indemnify and hold Uvipin harmless for such loss, unauthorized disclosure or unauthorized use of Confidential Personal Information, including attorneys' fees. D. No Publicity. Without limiting the foregoing, Seller will not disclose the existence or terms of this Agreement or any other information regarding Seller's sale of Merchandise on the Websites, in any advertising, promotional or sales activity, publicity release, or other public communication without Uvipin' prior written consent and approval in each instance. Uvipin has the right to review and approve any press release, marketing materials or related content that mentions Uvipin. E. PCI Compliance. Seller acknowledges that to the extent it receives any User credit card data in connection with the Agreement, Seller is responsible for the security of the credit card data it receives and will comply with current Payment Card Industry («PCI») Data Security Standards (as updated by the PCI from time to time). In the event of a data breach of a User's credit card information involving Seller or Seller's IT system environment, Seller will immediately notify Uvipin and cooperate fully with Uvipin and/or industry/government officials in a review and/or forensic investigation of Seller's system environment and/or processes. A. Use of Subcontractors. Seller may use subcontractors in its performance under this Agreement, provided that (i) Seller's subcontractors will be required to adhere to the terms of the Agreement and (ii) Seller will be fully responsible for the acts and omissions of its subcontractors. Uvipin may require Seller to cease use of any subcontractor for any reason, and may immediately suspend Seller's account, or terminate this Agreement in the event Seller refuses to comply with any such request from Uvipin. C. Invalidity; Waiver. No finding that any part of this Agreement is invalid will affect the remaining portions of this Agreement. Seller may not assign or transfer any of its rights or obligations under this Agreement without written consent from Uvipin. Any such attempted assignment or transfer will be void, and Uvipin may immediately terminate this Agreement, and Seller's access to the Portal without liability. The waiver by any Party of a breach of any provision of this Agreement by the other Party, will not be construed as a waiver of any subsequent breach of the same or any other provision of this Agreement, nor will any delay or omission by either Party to exercise or enforce any right or remedy hereunder operate as a waiver of any right or remedy. 1. Unless otherwise noted in the Agreement, Uvipin will provide notices to Seller at the address, email address, or fax number provided by Seller to Uvipin at the time of enrollment. 2. Seller must send all notices to Uvipin through the Portal. E. Construction. This Agreement, the policies and procedures communicated through the Portal, and the Marketplace Vendor Guide, govern Seller's use of the Websites to sell Merchandise to Users. In the event of a conflict between any terms herein, or any program specific policies and procedures communicated to Seller via the Portal or the Marketplace Vendor Guide, the program specific policies and procedures will control. In the event the Seller is registered for several Marketplace Programs (for example both the Fulfilled by Uvipin and Fulfilled by Merchant programs), the applicable terms will govern Merchandise sold according to that Program only. Uvipin may modify the terms and conditions of this Agreement, the Marketplace Vendor Guide, or its policies and/or procedures at any time by posting changes on the Portal. Seller's continued access and use of the Websites after such posting will be construed as Seller's acceptance of such modifications made by Uvipin. It is Seller's responsibility to monitor the terms and conditions of this Agreement for changes from time to time. In some cases, Uvipin may, but is not obligated to, provide Seller with notice of any changes to these Terms and Conditions. All notices provided by Uvipin through the Portal, or any communications by email, fax, or any other form of electronic communications by and between the Parties will satisfy any legal requirement that such communications be in writing. In this Agreement, «include,» «includes,» and «including» are inclusive and mean, respectively, «include without limitation,» «includes without limitation,» and «including without limitation. F. Governing Law. This Agreement will be construed and enforced in accordance with the internal laws of the State of Florida, without regard to its conflict of law principles. Seller and Uvipin agree that the state and/or federal courts located in Dade County, Florida are the proper and exclusive venue for any dispute concerning this Agreement, and hereby consent to such court's personal and subject matter jurisdiction thereof. G. Relationship of Parties. The Parties to this Agreement are independent contractors, and no other relationship will be implied from this Agreement. Nothing contained in or done pursuant to this Agreement will be construed as creating a partnership, agency, or joint venture, and neither Party will become bound by any representation, statement, or act of the other Party. Seller is responsible for all expenses necessary to fulfill its obligations under this Agreement. 10. «Marketplace Vendor Guide» means the Uvipin Marketplace Vendor Information Guide, which contains additional policies and procedures for doing business via Uvipin Marketplace, and has been made available to Seller via the Portal, and may be amended from time to time by Uvipin. 14. «Monthly Subscription Fee» means the monthly fee charged by Uvipin for membership in the Uvipin Marketplace program. 17. «Portal» means the online interface by which Seller accesses its Marketplace account, communicates with Uvipin, uploads its Seller Content and Merchandise Listings, manages its User Orders, and other such activities related to this Agreement. 18. «Prohibited Merchandise» means the items and categories banned or illegal. 20. «Uvipin» has the meaning given in the preamble. 21. «Uvipin Marks» means all Uvipin' domestic and foreign trademarks, service marks, trade names, registrations and applications to register the foregoing, logos, and domain names. 22. «Uvipin Parties» means Uvipin and all of its past, present and future parents, subsidiaries, affiliates, directors, officers, and employees. 23. «Uvipin Return Policy» means the return policy located at Uvipin.com, as updated by Uvipin from time to time. 27. «Seller Shipping and Delivery Policy» means the policy loaded by Seller into the Seller Portal, in compliance with the Terms of this Agreement. 28. «Seller Specifications» means all information related to order fulfillment, shipping times, and merchandise returns, as may be designated by Uvipin, or by Seller, if applicable, via the Portal, and relating to Seller's Merchandise.
2019-04-26T06:04:03Z
https://uvipin.com/vendor-terms-and-conditions-es/
After a bit of inactivity, the flurry of Lynnwood Link news continues for yet another week. The baseline schedule for Lynnwood Link has been set, and the last round of design open houses we mentioned have been scheduled for later this month and late next month. Like all open houses, the online version has all the renderings and explanatory text that one could ever ask for. Lynnwood Link’s four stations have not quite reached 90 percent design, the final step before things can be locked in and ready for construction, but have progressed substantially. Thanks to the cost-savings measures adopted by Sound Transit, there’s been quite a few changes from 60 percent design, including slightly smaller garages in new spots and skinnier platforms that come one escalator short of a pair. Starting with the almost-but-not-quite NE 145th Street Station, there’s been a slight reduction in the amount of paved space, with more room for trees and plants. The garage’s elevators have been crammed inward and now take up less of the pedestrian areas. The station itself will have a shorter canopy, which won’t quite reach the elevators at each end of the platform. Like all Lynnwood Link stations, there will only be one escalator from the ground to platform level at each entrance, but there will also be stairs for the short climb down. Buses, including the currently unbranded SR 522 BRT line, will pick up passengers right outside the south entrance. The station’s commissioned piece of public art will be a pair of crop irrigation arms that hang off the south and north sides of the garage, arcing over the main pedestrian walkway and the passenger drop-off area. Artist Buster Simpson, also responsible for a sculpture in the Rainier Beach Station plaza and many works around the region, uses the sculpture to highlight the path of stormwater as it begins its journey through several drainage ditches and pipes and out towards the Puget Sound. Simpson is also working on a second piece of stormwater-related art for the station, which will be raveled at a later date. The Seattle/Shoreline segment of Lynnwood Link also has a few extra design details between the stations, as seen in the giant rollplots and supplementary sections on the open house website. The crossing of NE 130th Street will be elevated, and there’s a straightaway that is marked for the future infill station on the north side of the interchange, which would place the north entrance a half block from the fenced-off corner of Jackson Park Golf Course. The Shoreline section will have a multi-use pedestrian/bicycle trail running under the light rail guideway, sandwiched between the new sound walls facing Interstate 5, new buffer plants, and new cul-de-sacs that Sound Transit is required to build for street stubs. As discussed last month, Shoreline North/185th Station has a new garage design that tucks two levels of cars under the bus bays and bus layover zone. Buses will have a dedicated traffic signal to reach 5th Avenue NE or NE 185th Street, while park-and-ride users will have to make two turns (one through a roundabout) to continue west towards central Shoreline. The renderings show the bus layovers as being a sea of concrete, which could really be depressing for bus riders to stare at while waiting for their next Swift or Metro bus to show up. The passenger drop-off area has been moved to the far side of the garage, which entails a longer walk around and across the bus and garage exits. The garage isn’t the only part of the station that has been dramatically altered, though. What was once a station with a single center platform is now a station with two side platforms, and not a single escalator in sight. Luckily, the impact for passengers who aren’t changing direction is minimal, thanks to the layout of the two entrances. The south entrance is level with the bus bays, while the north entrance is connected to the bus bay level by a short pedestrian bridge with stairs and elevators to both platforms. Tucked in between the garage and northbound platform, and continuing under the pedestrian bridge, is a public plaza with public restrooms, ticketing kiosks, and a few benches. Once again, the platform canopies have been scaled back, leaving part of the route for alighting passengers uncovered and open to the elements, so be sure to carry a hoodie or an umbrella. Phoenix-based artist Mary Lucking was commissioned to design the artwork for Shoreline North/185th Station, and chose to use forest imagery as her inspiration for several metal ornaments that will adorn the station’s plazas, entrances, and platforms. The platform’s columns will have metal vines growing up from the pavement, while metal shrubs will be sprinkled around other spaces. Mountlake Terrace Station remains largely unchanged from earlier designs, but the new metal-like finishes provided by artist Kipp Kobayashi brings the “natural” theme of the station together. And keeping with the theme, Mountlake Terrace Station will require no new parking garage (reusing the existing one) and is already becoming a draw for transit-oriented housing. The station will hang over 236th Street SW, with an entrance on the south side of the street adjacent to a new bus stop, a large public plaza, and a new street for the Terrace Station development. The north entrance has its own plaza and a pair of bus stops that will require buses to loop through a street shared with garage users to a new layover lane on the east side of the current parking lot. Even further east will be a temporary parking lot for 220 vehicles during construction of the station (which will require the closure of the current surface parking lot) and will presumably be available for transit-oriented development as surplus property. Kobayashi’s contribution to the public art program will come in the form of a photographic mural on the underside of the light rail guideway as it crosses 236th Street SW, similar to the mural planned for Judkins Park Station. Unlike the rock-and-roll mural planned there, Mountlake Terrace will be graced with the image of two trees whose branches stretch out and over the street to connect. The image will be made using perforated metal, a material chosen as part of the cost-saving measures for the project, and be rendered in various colors. In contrast with the relatively compact nature of Mountlake Terrace Station, the terminus at Lynnwood City Center is a mess of parking lots, bus facilities, and trees. Since the last design open house, the garage has been reshaped from an “L” to a stylized “S”, or perhaps a pixelated version of New Jersey’s silhouette. The garage now takes up less space, leaving behind room for a wetland and daylit creek along 44th Avenue W, and has lost a direct exit to the HOV access ramp as well as a “high-speed” exit spiral. In response to a request from Community Transit, half of the south surface parking lot will now be reserved as a bus layover space, leaving space for a new east-west street between the bus bays and north surface parking lot. A pair of misshaped parcels on the northeast end of the station, facing the “gateway intersection” of 44th and 200th Street SW, have been turned into additional surface parking space instead of being marked for future development. The station’s two entrances are now tucked neatly under the shadow of the platform and guideway, instead of jutting out towards the bus bays and the Interurban Trail. Like the other three stations, the platform is now narrower and only has one escalator (which will presumably be stuck in the “up” position, angering many PM peak commuters). The narrowed platform seems to be a bit more cramped thanks to the perpendicular seating and shelters, possibly a reference to the cramped conditions inside the current (and future) Link cars. Claudia Fitch, a sculptor who created the two existing pieces of public art at Lynnwood Transit Center, returns with a sculpture celebrating the humble hummingbird as well as highway signage–the latter of which perfectly encapsulates modern Lynnwood. Her two sculptures will hang above the plazas adjacent to the two entrances and are meant to represent the natural history of Lynnwood before its devolution into auto-oriented sprawl, as well as the neon lights that once lined Highway 99 during its pre-interstate heyday. Mountlake Terrace – Wednesday, June 13, 6-8 p.m. Shoreline/Seattle – Wednesday, June 27, 6-8 p.m. Lynnwood – Wednesday, July 25, 6-8 p.m. Noooooooo! That isn’t where the station should be. It should be above the interchange, so that people from both sides of 130th can get there. This completely ignores the whole point of the station, which is to enable quick and easy access to and from the buses. A bus should stop on 130th, then people should get out, and be able to walk up to the station without waiting to cross the street. With the current plan, someone from Bitter Lake would have to cross NE 130th to access the south end of the station. On their way home, someone from Lake City would have to do the same. That not only means a lot more people waiting for a traffic light (that happens to favor cross traffic) but also means more delays for that traffic (which includes the buses). Right now there are very few people who press that walk button, because there is little there. No one will use a north entrance to the station, because there is nothing there. Come on ST — get it right this time. You can see from the map that there are bus stops right there, on both sides of the street: https://goo.gl/maps/R8RDN6HiXHs. It is a short walk up to the platform from each bus stop. This is in the middle of a very urban area, where thousands access the station without using the bus. Yet it is still designed to make that transfer as easy as possible. The least ST can do is make the same accommodation for a station specifically designed for bus transfers. It truly is astounding how when ST is faced with two choices they invariably choose the one that is most inconvenient for people using the system. A station straddling 130th would clearly be advantageous. Is there no communication between ST and Metro? Maybe it’s just too hard for them to build something over an operating roadway. Seriously – I’d like to hear some explanation from ST on their rationale here. There are certain expensive and mind-blowingly stupid mistakes ST makes because they’ve been pressured into them. Bellevue tunnel, for example. This appears to be pure incompetence and/or penny pinching for no conceivable benefit. I would imagine that the comes from a desire by the Agency and the local jurisdiction to not have large construction impacts on the intersection. If you build the station over the roadway you would necessarily have more time with the intersection/roadway closed than if you’re just building the guideway. ST operates like a construction agency, not a transit agency. So it would make some sense they would have this bias. Still, it’s infuriating. I’m not even sure that is the case. If memory serves Seattle is going to do a bunch of work in the area anyway. They plan on getting rid of the little curve that allows a driver to easily take a right from northbound 5th to southbound Roosevelt Way (where this crosswalk is — https://goo.gl/maps/ohZwnATQid42). So it is likely they will mess with that area anyway. Besides, did they really talk to the head of SDOT? Since that head is temporary, did they consult with the mayor? I seriously doubt it. They did what they normally do — look at a map and say “we can put it there — close enough”. I’m also not convinced that it much harder to build the station over the intersection. At worse you would close off 5th (south of 130th) which is really no big deal. Folks can go around. The only real issue is if they close off 130th, and I don’t see why it would be necessary to do that. In other words, temporary impacts for drivers are more important than permanent impacts for bus transferers. Didn’t the cities want to increase non-driving mode share? Maybe we should make ST a Top Negative Ten Awards. amen to the RossB comment. It is also valid for stations on the West Seattle line at Delridge Way SW and 35th Avenue SW. It was violated at Mt. Baker and SeaTac; note the lack of a pedestrian connection between Link and southbound buses on International Boulevard South. a second comment about phasing. if the FTA funds and higher costs have delayed the line, should the NE 130th Street station not open with the delayed line? Well, in Mt Baker’s case the track is not crossing the street but turning into it. If you put the station over the street it would be parallel with it, not perpendicular to it. So the platforms wouldn’t span from one side of the street or the other. A center platform would require crossing the tracks to get to the exit, and side platforms might require crossing both tracks. ST has that at the surface stations but it would probably object to it at elevated stations because the trains are running faster so collisions would be more severe. Well, in Mt Baker’s case the station should be in the triangle. Obviously. The particulars are different (you have angles other than 90 degrees) but the dynamics are the same. Most of the ridership will come from bus transfers. Very Few people will actually walk up to the station and even fewer will walk from the particular direction we seem to be favoring. Even after we put the station next to a green belt, the folks who actually run the biggest transit system in the area (by people served, not by money raised) manages to put their transit center right smack dab where you should have put your train station (https://goo.gl/maps/X3vNXnWLVLG2). The only reasonable response by ST is “Oops”. Was it cheaper? Yeah, sure, probably. Is it better in the long run to ask thousands of riders to walk across the street (and thousands more to say “Nah, I’m good, I think I’ll just slog my way downtown”) instead of paying a little extra to do it right? Of course not. It was just one of the many stupid mistakes made by an agency that has made a lot of them, while spending billions on extremely dubious projects. Eddie is right. This agency has no history of doing it right. When they are short of money, or even when they have loads of it, they struggle. Unfortunately, it is up to ordinary citizens to explain the obvious when it comes to station location. I also think the process is flawed. Whenever someone points out a mistake made in the design of a station, someone mentions that it is up to the citizenry to do their part to help design it. During the open houses (when things are 10% or 30% done) we should organize, march, or do whatever it takes to get Sound Transit to do the sensible thing. Fair enough. But in this case, by the time there is an open house on the NE 130th Station it will be too late. It is bad enough that they are building the station years after they should, but they are making fundamental design decisions — such as the location of the station — without public input. There is no public outreach to communities like Lake City and Bitter Lake that will forever be hurt by putting the station north of NE 130th. Are folks from Lake City supposed to schlep all the way out to Shoreline (the nearest open house) to voice their displeasure? It is close to an hour bus ride just to get there. I suppose everything has to be done online, but it just seems like big decisions are being made without giving people a chance to point out how misguided they are. The most elegant solution for 130th, and in my mind, the only reasonable solution, is for the station to span the arterial carrying connecting bus service, such that you can board and exit the train on the end closest to the station exit that sits above your bus stop. This is how it is very typically done all over the world, as those who have been to such exotic locales as Vancouver BC will note. There is nothing there now at 130th standing in the way but patchy grass. It’s not like we are trying to wedge new station access into the built environment between high-rise basements and monorail footings. If ST is actively hostile to good bus-rail integration, they should flat out admit it and we should have a conversation about that. They seem to get it wrong too consistently to blame indifference. If, contrary to pretty much all evidence, they actually do care, then we should talk about what has gone wrong in the past and how we’re going to do things differently going forward. Maybe 130th needs its own post. Clearly it is going to need watchful oversight. Exactly. It isn’t rocket surgery. Put the station above 130th. Duh. Well, technically they’re only making an accomodation for the station, which doesn’t mean they have to put the station there later. They could rebuild the track over the street instead. What, you don’t think they’d do that? If it’s any consolation, when the decision is made in the 2020s or 2030s, there may be different people on the board with different views. Not just the track, if it’s elevated, it’s also the infrastructure that holds the track in the air. Look at Northgate and extend that 30 blocks. Since it is an infill station it will have to built on what and where the flat spot is that ST builds, which is part in parcel in the drawings right NOW. Is that elevated track going over Seattle 130th? I’m sure it is not. And it’s not as if ST has really built an infill station before – Graham St should be straightforward compared to this. And ST has shown that they do not want to build an infill station ever. No escalators at all at 185th? I think they must think that we are living in Logan’s Run where no one is over 30 and has trouble with stairs. There’s only one elevator and side platforms now too. It’s clear that riders are going to be treated like the second class citizens in this design. Yet we’ll be treated to art. Why is THIS how ST cuts corners? It sounds like imperial royalties in the past, where the public needs are not important yet we can look at the pretty features on cathedrals and castles. Yep, agreed on North Shoreline Station. Really don’t like side platforms, only because if one elevator is provided and if it breaks down, ADA riders have to backtrack eventually to use the station. Advantages of center platforms, is two elevators are provided, and if one breaks down, ADA passengers still have station access. See Mt. Baker, Tukwila and SeaTac (for access to Int’l Blvd) for what happens when an elevator breaks down. Shoreline North will have two elevators per platform (one at each entrance), and the northbound platform has step-free access via the sidewalks on the north side of the station. I might not ever use that station, but I agree. There should be an escalator going at least one direction. It is in my opinion that Sound Transit is getting paranoid about ST 2 timeline promises. And they should. The problem is that now they are building to minimum standards for that area. Narrow platforms, no escalators with side platforms. I have no solution but I think it isn’t good. Oh I totally agree. I think ST is very nervous about completing the ST2 projects in the next 5-6 years as promised (you can forget about the original cost estimations). Their list of excuses has already grown quite long and the people in the ST district are tired of all that and just want to see results and commitments kept. Mention was made in the article about the 130th infill having a straight segment for the future station. No mention was made on this for the 220th infill station. Was this a miss on the authors part, or is that second straight segment being removed? If you look at the roll plots for that area (https://lynnwoodlink.participate.online/Media/Default/rollplots/MountlakeTerrace_RollPlot.pdf) it does mention it. The station would be south of 220th, on the land that where something (a school administration buildings?) has already been demolished (https://goo.gl/maps/NG9afD6E3zP2). Headed north, the train would then turn to get close to the freeway again. The reduced canopies are unfortunate, but could presumably be changed in the future. At least the train frequency will be good so you won’t be waiting there long. However, station platform access is much more difficult to fix. One escalator at most stations and zero at one station? “But you can take the elevator.” Is Sound Transit really planning on such light ridership??? Especially at Lynnwood which will be the terminus for a *long* time. Is this really enough capacity for *all* the express bus passenger volume from points north as well as the park and ride and local riders assuming Lynnwood City Center ever gets done and/or Community Transit increases frequency on the local busses? Furthermore, if 405 “BRT” is really supposed to be that good, shouldn’t the 145th ST station be built to rail – rail transfer standards? Grrrrr!!! Riders will continue to be treated as second class citizens until we form a loud group to affect ST decision-making. I had wished Seattle Subway or the Transit Riders Union or even Transportation Choices Coalition would be a flag bearer — but their passions don’t seem to be interested in loudly taking on station access issues. For Lynnwood Link, I’m not sure what can be done at this point. However, we have a few dozen other stations getting built before 2040 that will need people to speak up in an organized way. My advice would be to start attending transit board meetings……….. and submitting public comment every chance you get. If I were still alive when the NE 130th St station opened, and still living on NE 135th St, I would be one person who would use “the north entrance a half block from the fenced-off corner of Jackson Park Golf Course.” There is a very nice trail through pretty woods from 15th Ave to 5th Ave, leading right to this proposed entrance. And who knows, maybe Jackson Park will be an actual park by then. Right, and your neighbors (who took the bus) will wonder why you weren’t on the previous train. Look, I’ve walked that trail before (many times) and there is nothing wrong with it. Just like there is nothing wrong with other trails. But from a transit perspective, it is not a great idea to put a station away from people, away from the primary users, and close to a park. Someone like you might walk 15 minutes to get on a train, while thousands and thousands more people will spend extra time waiting to cross the street. From a walk-up standpoint, the station is poor. You really can’t justify it based on the number of people who would walk to it. There are some apartments nearby but since a good section of the space is used up by the park and the freeway, you aren’t going to have a lot of people walking there. Even from that perspective the station should be farther south. Most of the apartments are south of Roosevelt Way, and from a development standpoint, there is way more potential there. You can’t expect the areas to the north to grow — what makes that place a pleasant place to walk (the park and the wetlands) mean that you will never have apartments there. But you can have a lot of people taking the bus there. The main reason — really the only reason — they are building a station there is to provide good bus service from Lake City and Bitter Lake. This, in turn, can lead to a much better overall transit grid. Forcing those riders to spend an extra minute or two to cross the street doesn’t sound like a big deal, but when you consider the numbers involved, it is much worse than forcing the handful of folks like you to walk just a little bit farther up the street to catch the train. If done right, you wouldn’t even have to cross 130th (there would be an entrance on either side). Sure, I guess. I was being half-facetious since clearly only a few people like to hike through the woods to their transit stop. When it became clear that the NE 130th station would not be built with Lynnwood Link, I resigned myself to never being able to use it in my lifetime. I’m also resigned to losing one of my one-seat rides to downtown, the 41, when Northgate Link is done, and losing the other one-seat ride, the 522, early in the ST3 process. At Mountlake terrace there will be the option of walking through a small wood to the city center. Yes! You can walk through those Mountlake Terrace woods now on the way to the park and ride and bus stop. The times I have walked through there I have always seen one or two other people heading to or from the park and ride. The path leads more or less directly to the Diamond Knot brewpub. That’s just nonsense. Up here in SnoCo I have seen plenty of wetlands impacted by apartment complex construction right next to them. Heck, the whole backside of the Lynnwood Costco was once a much admired local wetland that I thought would never be “mitigated” in my lifetime; I was wrong. >> I was being half-facetious since clearly only a few people like to hike through the woods to their transit stop. Oh, it’s not a crazy thing, really. The quality of the walk matters. I think most people would rather walk through a park, then walk along a busy arterial. That is why Ballard ridership will be stifled by the decision to only have one station where they put it. Folks who live in Old Ballard, or along 24th NW aren’t likely to walk to the station (they may take a bus, or just drive to their destination). The problem in this case is that not that many people live where you live. There are people, but you really have to get into the territory of big Vancouver/Toronto style towers to get lots of riders that way. In Vancouver it is common to have a nice park-like walk from a big tower to a SkyTrain stop. In this case, though, that isn’t going to happen. It isn’t like the north side of the street has a lot more people than the south side, or that either have that many people really. Lacking a really strong preference from a walk-up standpoint, and the importance from a bus transfer standpoint, the obvious solution is to put entrances on both sides of the street. Yeah, when the 41 works, it works really well. I don’t commute downtown anymore, but just the other day I took the 41 downtown and back. I caught the bus at about 3:00PM from the Westlake station and was at Northgate in less than ten minutes. Thinking about it, I really don’t think you could beat that with a taxi, let alone a car when you factor in the parking. But it isn’t always so great. In the evening it is terrible if you are headed downtown. Regardless, most one seat downtown rides are going away in that neck of the woods. The thing is, we get something out of it. A lot, really. Not only will we get better reliability, faster speeds in the evening and (hopefully) better frequency to more places, but we also get much better connections to other parts of town. That is what an effective subway gives you. It isn’t necessarily faster to downtown, but it is much faster to places like the UW and Capitol Hill. Do you really think the city will get rid of the parks and turn them over to developers? After all the work that has been done? Places like Thornton Creek (http://www.seattle.gov/parks/find/parks/thornton-creek-natural-area) and Licorice Fern are now owned by the city, and they (along with volunteers) have added trails, benches and other amenities, and you think the city would just sell it off? Even the golf course isn’t likely to be sold. The Jefferson Park idea isn’t likely to happen, but it stands a chance, given the special circumstances behind it. The neighborhood could get underground service to the junction in exchange for new apartments on part of the golf course (and the rest of the park turned into a regular park). But in this case, the community would get nothing. I just don’t see it happening, because I can’t think of any instance where the city sold off parkland just to build apartments. RossB you make an excellent argument that the NE 130th St station…should not be built at all. No walkshed, parks on two corners, other stations very close, etc. That was the position I took when the station was proposed. Then it was approved, so I advocated for building it when Lynnwood Link was built, not sometime afterward. Now it won’t be built for a long time, if at all, so I guess I have stopped caring. One thing I don’t think mentioned by other commenters is that the south side of 130th at 5th Ave also has an exit ramp from I-5. I don’t think there is much room at all for a piece of a station, even a mostly elevated one, not if you want to keep that exit ramp there. Evidently a similar calculation was made for the “145th St” station, which is actually going to be more like at 147th St, completely out of the way of the 145th/5th intersection and the freeway interchange. I don’t recall any serious consideration given to an elevated station over 145th St., even though more buses including a RapidRide bus will be accessing this station. Finally, in the realm of additional excuses for Lynnwood Link to be late, the steel tariffs the Trump administration has imposed on virtually all foreign steel is likely to drive costs up. According to The Economist, on June 5th hot-rolled steel cost $329 per ton more in America than in Western Europe. The gap for aluminum was $290. I doubt ST has figured this stupid tariff into their cost estimates yet. One escalator short of a pair means more than one set of officials, starting with the ones whose job is to forbid dangerous buildings from being built ought to be in jail already. And while I certainly oppose prison overcrowding, the elected officials what approved it are way down my list to Amnesty international. Week or two back, at University Street Station, found a woman in her sixites who could barely walk, halfway down the stairs from mezzanine to platform. Very large number of station stairs are granite blocks sharpened with a chisel. And the staircases of our outdoor elevated stations need an axe, a rope, and a set of pitons to reliably reach the floor or ground alive. Good thing all the elevators work. One quarter of the four elevators was boarded up and signed with excuses. If I hadn’t gotten down those stairs fast enough to help her, the next three ST-‘s would have gone into a wrongful death judgement. Too bad my self-control has now slipped to the point where defense attorneys won’t let me on the jury. So no choice but to yield my time for Alex Tsimerman to deliver my testimony for me. Too bad, though that the average fascist billionaire (who threw a very different salute than the the Nazis’) has more respect for his own statue to let something like this happen to a sainted elderly woman. However,any Italian train passenger in reading this: Did Mussolini ever really keep his promise about on-time performance? I guess almost a year late is better than never. I’m guessing that the scheduling issue lies with the convention center, who are probably booking steady business. The library is too small to host a large open house, so ST doesn’t have much choice. McDonalds Furniture Wharehouse, they could bring chairs and tables in from any number of party rental places…. Exactly. The Edmonds School District High Schools (Edmonds-Woodway, Lynnwood, and Meadowdale) are also most likely available for such a community outreach meeting. The truth of the matter is that Sound Transit canceled their outreach meeting for the Lynnwood area after announcing the cost escalation issues with the Lynnwood Link project last August. They just weren’t interested in facing the constituents up here in light of this news. I’m mostly concerned about scrolling with “Lynnwood City Center Station”, if that’s really the station name. I wish it would just say “LYNNWOOD”. There are other pairs with the same name, like “Bellevue Downtown” and “South Bellevue”, although they don’t start with the same word. I’m not sure there’s a prohibition against starting with the same word.
2019-04-24T18:19:03Z
https://seattletransitblog.com/2018/06/13/updated-designs-lynnwood-link-stations-including-public-art/
CYYR1 is a recently identified gene located on human chromosome 21 whose product has no similarity to any known protein and is of unknown function. Analysis of expressed sequence tags (ESTs) have revealed high human CYYR1 expression in cells belonging to the diffuse neuroendocrine system (DNES). These cells may be the origin of neuroendocrine (NE) tumors. The aim of this study was to conduct an initial analysis of sequence, splicing and expression of the CYYR1 mRNA in human NE tumors. The CYYR1 mRNA coding sequence (CDS) was studied in 32 NE tumors by RT-PCR and sequence analysis. A subtle alternative splicing was identified generating two isoforms of CYYR1 mRNA differing in terms of the absence (CAG- isoform, the first described mRNA for CYYR1 locus) or the presence (CAG+ isoform) of a CAG codon. When present, this specific codon determines the presence of an alanine residue, at the exon 3/exon 4 junction of the CYYR1 mRNA. The two mRNA isoform amounts were determined by quantitative relative RT-PCR in 29 NE tumors, 2 non-neuroendocrine tumors and 10 normal tissues. A bioinformatic analysis was performed to search for the existence of the two CYYR1 isoforms in other species. The CYYR1 CDS did not show differences compared to the reference sequence in any of the samples, with the exception of an NE tumor arising in the neck region. Sequence analysis of this tumor identified a change in the CDS 333 position (T instead of C), leading to the amino acid mutation P111S. NE tumor samples showed no significant difference in either CYYR1 CAG- or CAG+ isoform expression compared to control tissues. CYYR1 CAG- isoform was significantly more expressed than CAG+ isoform in NE tumors as well as in control samples investigated. Bioinformatic analysis revealed that only the genomic sequence of Pan troglodytes CYYR1 is consistent with the possible existence of the two described mRNA isoforms. A new "subtle" splicing isoform (CAG+) of CYYR1 mRNA, the sequence and the expression of this gene were defined in a large series of NE tumors. The cysteine/tyrosine-rich 1 gene (CYYR1) is a large gene of 107 kb that we have previously identified on human chromosome 21 (21q21.2). CYYR1 is composed of 4 small exons separated by three large introns and it encodes a small 154-amino acid polypeptide conserved in vertebrates. The most prominent feature of the protein family is the presence of a central cysteine- and tyrosine-rich domain, highly conserved from fish to humans and including a CCSYYAY box. There is also a proline-rich region, localized at carboxy-terminus, consisting of three repeated PPPY motifs. A putative transmembrane domain was identified in all proteins of the family by different prediction methods, along with a signal peptide suggesting the possible location of the CYYR1 protein in the cell or cell compartment membrane. CYYR1 product has no similarity to any known protein and its function is unknown. Two different CYYR1 mRNA species were identified using Northern blot analysis: they were consistent with two isoforms arising from alternative polyadenylation. The expression pattern of the CYYR1 human gene appears to be broad, as CYYR1 mRNA was detected in all 12 human tissues tested, except peripheral blood leukocytes . Valuable data about the function of the CYYR1 gene were added by human expressed sequence tag (EST) database analysis. This was possible because the main source of tissues and cells used in the construction of libraries, from which most of the CYYR1-related ESTs were retrieved, included carcinoid tumor of the lung, melanocytes, parathyroid tumor cells, fetal adrenal tissue, follicular carcinoma of the thyroid, pineal gland and gastrointestinal tissue. A common feature of all these tissues is that they are composed of or include cell types belonging to the dispersed neuroendocrine system (DNES). The term "neuroendocrine" has been used to define cells such as neurons and endocrine cells that secrete their products in a regulated manner in response to a specific stimulus, and share a common phenotypic program, characterized by the expression of specific markers such as neuropeptides and chromogranins . These cell types are typical of vertebrates and the EST expression data are consistent with the CYYR1 phylogenetic analysis. It is assumed that NE tumors can originate from normal NE cells. NE tumors are divided, according to the WHO (World Health Organization) classification, into well-differentiated tumors or carcinomas, poorly differentiated carcinomas and mixed endocrine-exocrine carcinomas , according to their histological and cytological features. The aim of this study was to analyze the sequence, splicing and expression of the CYYR1 gene in human neuroendocrine tumors. First, the CYYR1 mRNA coding sequence (CDS) was studied in a large series of NE tumors and a P111S mutation in the only neck-derived tumor was identified. Sequence analysis also allowed us to identify a "subtle" splicing isoform due to the existence of two functional acceptor splicing sites in the sequence CAGCAG at the 3' end of intron 3. Both isoforms, which encode two polypeptides – differing in terms of the absence or presence of one amino acid – were found in normal and neoplastic tissues. Their relative expression was investigated by a quantitative relative RT-PCR (reverse transcription – polymerase chain reaction) method. Sample selection was focused on neuroendocrine tumors from multiple anatomic sites (mostly from the digestive system) with varying differentiation grades (see Additional file 1). Tumors were classified according to the WHO classification of endocrine tumors . The specimens were obtained from 16 males and 11 females ranging between 43 and 79 years of age (mean age of 63.6 years). We used representative portions of 32 tumor specimens (see Additional file 1) labelled NE 1 to NE 32 (15 samples: well differentiated endocrine carcinomas, WDEC; 13 samples: poorly differentiated endocrine carcinomas, PDEC; 4 samples: mixed exocrine-endocrine tumors, MEET). Samples were collected for the H. Lee Moffitt Cancer Center and Research Institute (Tampa, FL) Tissue Procurement Facility, under institutional review board protocols. The resection-to-preservation (freezing) time was kept to less than twenty minutes. Sample storage consisted of liquid nitrogen (n = 30) and -80°C (n = 2) for a mean storage period of 41.65 months. Prior to RNA isolation, twelve of these tumor samples underwent independent pathological review by a single pathologist (DC) and were macrodissected while frozen to select tumor-rich areas and decrease the amount of stroma and non-neoplastic elements surrounding the target tumor tissue. Total RNA from the NE samples was extracted using the TRIzol (Invitrogen Corp., Carlsbad, CA) according to the manufacturer's protocol. Due to the absence of tissues entirely composed of DNES cells, which are by definition part of a diffuse system of cells, a set of 8 commercial total RNA samples from several whole normal human organs was used as control: prostate (pool of 16 normal adult whole prostates), brain (one normal adult whole brain), heart (one normal adult whole heart), colon (pool of 2 normal adult colons), small intestine (pool of 2 normal adult small intestines), stomach (pool of 15 normal adult stomachs), thymus (pool of 13 normal adult thymuses) and skeletal muscle (pool of 2 normal adult skeletal muscles). All RNA samples were purchased from BD Biosciences Clontech (Palo Alto, CA, USA). In order to compare the RNA expression of some NE tumor samples (metastatic liver, pancreas and breast tumors) with non-neuroendocrine tumors and corresponding normal tissues, commercial total RNAs from 2 non-neuroendocrine tumors (pancreas and breast tumors) and from the 2 corresponding normal tissues were used in a second experiment. The non- neuroendocrine tumor total RNAs were obtained from a pancreas acinar cell carcinoma (T2N0M0, stage 1B) and from a breast invasive ductal carcinoma (T4N1M0, stage 3B), and were purchased from Ambion (Austin, TX, USA). The 2 normal total RNAs were from a pancreas (normal human pancreas pooled from a 35-year-old Caucasian male) and a breast (normal adult mammary gland pooled from a 27-year-old Caucasian female), and were purchased from BD Biosciences Clontech. RNA was quantified using both UV spectrophotometry and standard agarose gel. Quantification of electrophoresed RNA was obtained by comparison with standard markers using the gel imaging system Gel Doc 2000 (Bio-Rad, Hercules, CA, USA). The primers for amplifications were designed using the Amplify software , following standard criteria . The data source for primer design was the GenBank sequence AP001696, Homo sapiens genomic DNA, chromosome 21 q, section 40/105 [GenBank:AP001696] and NM_052954, Homo sapiens cysteine/tyrosine-rich 1 (CYYR1) mRNA [GenBank:NM_052954]. For the CDS sequence analysis, we designed the forward primer #1 5'-GCTGCTCTCTCCATCTGATCGC-3' (based on exon 1) and the reverse primer #2 5'-ATTCCAGGCAAGATCGCCCATTG-3' (based on exon 4). The size of the expected PCR product was 605 bp. For the quantitative relative CYYR1 CAG-/CAG+ analysis, we designed three primers: a forward primer common to both mRNA forms (#3 5'-GTCTTGCTTCCGAAGTTGGTCCTGC-3'), based on exon 1, and two specific reverse primers for CAG- and CAG+ forms, respectively. Each reverse oligonucleotide was based on the exon 3/exon 4 boundary, and was specific for only one of the two isoforms, containing two mismatches at the last three bases of the 3' end, one being the 3'-residue compared to the sequence of the other isoform (#4 5'-GTGACCGTAGGGTGGTGGTCCAGG-3' for CYYR1 CAG- form, primer #5 5'-GTGACCGTAGGGTGGTGGTCCTGC-3' for CYYR1 CAG+ form). The expected size of PCR product was 321 bp with primers #3 and #4, and 324 bp with primers #3 and #5. To amplify the beta-2 microglobulin (B2M) housekeeping gene for RNA quantity normalization in quantitative relative RT-PCR analysis , we used forward primer #6 5'-GCGGGCATTCCTGAAGCTGACAGCA-3' and reverse primer #7 5'-TACATCAAACATGGAGACAGCACTC-3', with an expected PCR product size of 586 bp. For all samples, total RNA (2 μg) was reverse transcribed at 37°C for 60 min in 50 μL of final volume using cloned Moloney murine leukemia virus reverse-transcriptase 400 U (Promega, Madison, WI; used with companion buffer), 2.5 μM oligo dT-15, 2 μM random hexamers and 500 μM of each dNTP (deoxyribonucleotide triphosphate). PCR experiments to obtain amplicons for sequence analysis were performed in 50 μL final volume, containing 5 μL reverse transcription mix, 1 U Taq Polymerase (TaKaRa, Shiga, Japan) with companion reagents (0.2 mM of each dNTP, 2 mM MgCl2, 1× PCR buffer), and 0.3 μM of each primer. An initial denaturation step of 2 min at 94°C was followed by amplification for 40 cycles, (30 sec at 94°C, 30 sec at 63°C, 45 sec at 72°C) and final extension for 7 min at 72°C. PCR experiments for quantitative relative analysis were performed in 30 μL of final volume, containing 3 μL of reverse transcription mix, 0.6 U of Taq Polymerase (TaKaRa, Shiga, Japan) with companion reagents (0.2 mM of each dNTP, 2 mM MgCl2, 1× PCR buffer), and 0.2 μM of each primer. To standardize all PCR reactions for quantitative relative analysis, we prepared a single mix with PCR buffer 1×, dNTPs, MgCl2 and Taq Polymerase. Subsequently, this mix was dispensed into three aliquots and a different primer pair was added to each one. The cDNA samples were added after each mix has been divided into individual tubes. Each PCR reaction was performed in duplicate. In preliminary PCR experiments, we evaluated PCR products after 20, 25, 30, 35, 40 and 45 cycles (data not shown), in order to find the conditions allowing the quantification of B2M, CYYR1 CAG- and CYYR1 CAG+ RT-PCR products, respectively, at the maximum distance from the cycle corresponding to the reaction plateau. PCR reactions were performed with high stringency: an initial denaturation step of 2 min at 94°C was followed by amplification for 25 (B2M) or 35 (CYYR1 CAG- or CAG+) cycles (30 sec at 94°C, 30 sec at 63°C, 45 sec at 72°C), and a final extension for 7 min at 72°C. In a first experiment, 32 NE tumor samples were studied along with the standard set of 8 normal tissues (see the paragraph RNA sources above). In a second experiment, 17 NE tumor samples (nn. NE 1, NE 2, NE 4–8, NE 10–12, NE 14, NE 18, NE 20, NE 25, NE 27, NE 29–30 in the Additional file 1) from the liver, pancreas and breast were compared with the above described second control set of 2 normal tissues and 2 non-neuroendocrine tumor samples. In this case, the PCR cycles for CYYR1 isoforms were 40. The CYYR1 CDS RT-PCR products obtained as described above were gel analyzed following standard methods , purified using GenElute PCR Clean-up kit (SIGMA, St. Louis, MO), and then subjected to automated sequence analysis of both DNA strands for each fragment, with the same primers used in the PCR reactions. The BigDye chain-terminator method was used with an automated ABI 310 DNA sequencer (Perkin-Elmer, Foster City, CA). Point mutation in sample NE 16 was confirmed by four independent RT-PCR reactions. CYYR1 CAG+ isoform sequence presents a PstI restriction site CTGCA|G, where the vertical bar indicates the cut position, so PstI was used to selectively digest the CYYR1 CAG+ amplification product. Enzymatic digestions of CYYR1 CDS RT-PCR products from normal brain and one NE tumor (sample NE 16) obtained with primers #1 and #2 were performed in 20 μL final volume, containing 200–300 ng amplicon and 13 U PstI enzyme (SIGMA, St. Louis, MO) with 1× buffer H. An overnight incubation at 37°C was performed. The digested products (10 μL) were separated into 1.5% agarose TBE (Tris-Borate-EDTA) gel stained with ethidium bromide and detected under ultraviolet light. For quantitative relative analysis, 10 μL aliquots of each PCR product were separated into 1.5% agarose TAE (Tris-Acetate-EDTA) gels. B2M, CYYR1 CAG- and CYYR1 CAG+ RT-PCR products from the same RNA samples were separated into the same gel. Marker M5 (Fermentas, Hanover, Maryland, MD) at two different dilutions was used as a quantitative reference. After separation, the gels were stained in TAE buffer containing ethidium bromide (0.5 μg/mL) and detected under ultraviolet light in "unsaturated" pixel modality with the Gel Doc 2000 Imaging System. Digital images were quantified and analyzed using Quantity One software (Bio-Rad, Hercules, CA, USA). Intensity values of the PCR product bands were calculated in comparison with a regression line, with the correlation coefficient ≥ 0.99, generated from measurements of at least four Marker M5 bands of different concentration values. In particular, we used the "Volume Rect Tool" function to acquire pixel intensity data for each band. The gel image background was always subtracted. The mean for each replicate data point and, in order to normalize the CYYR1 expression level, the CYYR1/B2M product mass ratio were determined. The statistical analysis was performed using JMP software, ver. 5 (SAS Institute, Cary, NC, USA). The unpaired t-test was used to compare normalized CYYR1 expression levels between normal and tumoral tissues, as well as to compare relative expression of CYYR1 CAG- with CAG+ isoforms. The ANOVA test was performed to compare CYYR1 expression levels (for CAG- isoform, CAG+ isoform and CAG-/CAG+ ratio) among each different hystological subclass of the tumors studied in the first experiment. Differences were considered significant with p < 0.05. In order to study the evolution of "subtle" splicing of the CYYR1 mRNA (CAG- and CAG+ isoforms), CYYR1 mRNA encompassing the point alternatively spliced – [GenBank:NM_052954] from base 556 to 757 – as well as the CYYR1 product amino acid sequence were analyzed by BLAST (Basic Local Alignment Search Tool) family programs with default parameters. This was done using the following GenBank divisions: "nr" (non redundant), "human ESTs", "mouse ESTs" and "other ESTs" database sequences. The same protocol was used to search for sequences harboring the new mutation described in one NE sample. The RT-PCR amplification products for CYYR1 CDS mRNAs were successfully obtained from all the 32 NE RNA samples. In all cases, gel electrophoresis analysis revealed a single band of the expected size. Electrophoretograms showed a peak frameshift following the boundary between exon 3 and exon 4, consistently observed in both forward and reverse directions of the sequencing reaction. Visual analysis of the peaks suggested the simultaneous presence of two sequences differing by a three-base insertion in all of the samples analyzed (data not shown). In addition, the CYYR1 CDS sequence did not show differences from the GenBank reference in any of the analyzed samples except in sample NE 16, where a variation (apparently in heterozygotic form) in position 333 of CDS (T replaces C) led to a P111S amino acid change (Figure 1). CYYR1 mutation in an NE tumor sample. Representative electrophoretograms of a sample with normal sequence NE 15 (A) and the mutated sample NE 16 (B), where a variation (apparently in heterozygotic form) in position 333 of CDS (T replaces C) leads to a P111S amino acid change. A single nucleotide polymorphysm (SNP) at position 201 with respect to reference CDS (C replaces T at third position of codon 67, exon 3) was observed in heterozygosis (15 cases: NE 1, NE 4–9, NE 12, NE 15, NE 16, NE 18–20, NE 23, NE 31) or homozygosis (8 cases: NE 17, NE 24–27, NE 29, NE 30, NE 32). This base substitution transforms the codon 67 GTT into the codon GTC; in both cases, the coded amino acid is valine (V). This polymorphysm was present in the single nucleotide polymorphysm database (dbSNP) at NCBI (National Center for Biotechnology Information) as cluster rs966410 (heterozygosity: 0.492). In order to confirm the presence of two isoforms, an enzymatic digestion of CYYR1 CDS RT-PCR products from normal brain and one NE tumor (sample NE 16) was performed with PstI enzyme, specific for CYYR1 CAG+ isoform digestion. Expected size bands (CAG- form: 605 bp, CAG+ form: 427 bp and 181 bp) were obtained in both samples (Figure 2). Enzymatic digestion of CYYR1 CDS RT-PCR products from normal brain and an NE tumor. Gel electrophoresis analysis of CYYR1 CDS RT-PCR products, from normal brain and NE 16, after PstI digestion. Expected size bands (CAG- form: 605 bp, CAG+ form: 427 bp and 181 bp) were obtained in both samples. M1: GeneRuler marker, 500 ng; M2: DNA M5 marker, 250 ng. The RT-PCR amplification products for B2M, CYYR1 CAG- and CYYR1 CAG+ mRNAs were successfully obtained in duplicate from 29 NE RNA samples and from 8 normal RNA controls. 3 out of 32 cases (NE 13, NE 24 and NE 28) were not considered in the analysis due to failure in obtaining data in duplicate. In all cases, gel electrophoresis analysis revealed single bands of the expected size (Figure 3). RT-PCR of CYYR1 mRNA isoforms. An example of agarose gel loaded with duplicated RT-PCR products: B2M (lanes 1–6, 586 bp), CYYR1 CAG- (lanes 7–12, 321 bp), and CYYR1 CAG+ (lanes 13–18, 324 bp) mRNAs for samples NE 16, NE 17 and NE 18, respectively from left to right. DNA M5 marker (M1 and M2, 250 ng and 500 ng, respectively) were used for quantification by Gel Doc 2000 software. The gel images acquired in UV light and in "unsaturated pixel" mode were analyzed. RT-PCR products of B2M, CYYR1 CAG- and CYYR1 CAG+ mRNAs obtained from the same sample were electrophoresed in the same gel (Figure 3). This process generated two replicate data points, expressed as PCR product ng, which were used for subsequent elaborations. Duplicate products for each gene were compared to evaluate the method reliability. In the first experiment, the mean percentage of difference between the two replicate measurements and the respective mean value for 29 NE tumor samples and 8 normal tissues was: 3.6% (tumors) or 2.5% (normal samples) for B2M, 3.8% (tumors) or 3.1% (normal samples) for CYYR1 CAG-, and 15.8% (tumors) or 8.9% (normal samples) for CYYR1 CAG+. The percentage of difference between the two replicate measurements and the respective mean value was lower than 13% for all the genes in all the samples, except for the CYYR1 CAG+ isoform values in 10 tumor samples and 1 normal sample, where the 16.3–61.2% range difference was due to the presence of values situated near to the lowest detectable level. The mean value of the two measurements was then routinely used in the statistical comparisons. In the second experiment, the mean percentage of difference between the two replicate measurements and the respective mean value for 17 NE tumor samples and 4 control samples (2 non-neuroendocrine tumors and 2 normal tissues) was: 4.0% (NE tumors) or 3.8% (control samples) for B2M, 4.8% (NE tumors) or 5.8% (control samples) for CYYR1 CAG-, and 16.2% (13 NE tumors) or 13.1% (control samples) for CYYR1 CAG+. Inconsistent duplicate measurements for CYYR1 CAG+ isoform were observed in 4 samples, due to values being in the lowest range of detection, so these samples (NE 10, NE 12, NE 25, and NE 30) were not considered for further analysis. The percentage of difference between the two replicate measurements and the respective mean value was lower than 15% for all the genes in all the samples, except for B2M in one NE tumor sample and the CYYR1 CAG+ isoform values in 5 tumor samples and 1 control sample, where the 17.4–54.8% range difference was due to the presence of values situated near to the lowest detectable level. The mean value of the two measurements was then routinely used in the statistical comparisons. In 7 cases (6 NE tumors and 1 normal tissue sample), the CAG+ isoform value was under the minimum detectable (0.25 ng) and it was considered 0.24 to allow calculations, with results analogous to those obtained when the corresponding samples were omitted from the statistical analysis. All differences among CYYR1 mRNA isoform expression levels refer to RT-PCR product mass, normalized as described in the "Methods" section. In the first experiment, assessable replicate data points for B2M, CYYR1 CAG- and CAG+ mRNAs were successfully obtained for 29 out of 32 total samples tested; NE 13, NE 24 and NE 28 were not evaluated due to technical problems. The difference in the CYYR1 CAG-/CAG+ mRNA isoform ratio between tumors and normal tissues was not statistically significant (mean ± standard deviation: tumors (n = 29), 19.3 ± 32.6; normal tissues (n = 8), 10.9 ± 6.3). The CYYR1 CAG- expression level was significantly lower in tumor samples in comparison with normal tissues at an approximate ratio of 2:3 (p = 0.022; mean ± standard deviation: tumors, 0.92 ± 0.25; normal tissues, 1.31 ± 0.76), while the difference in the CYYR1 CAG+ expression level between tumors and normal tissues was not significant (mean ± standard deviation: tumors, 0.15 ± 0.13; normal tissues, 0.15 ± 0.10). No statistical difference was observed in either CAG- or CAG+ isoform expression, or between macrodissected (n = 11) and non-macrodissected (n = 18) NE sample subgroups (see Additional file 1). In the second experiment, the difference in the CYYR1 CAG-/CAG+ mRNA isoform ratio between NE tumors (n = 13) and control tissues (2 non-neuroendocrine and 2 normal corresponding tissues; n = 4) was not statistically significant (mean ± standard deviation: NE tumors (n = 13), 321.0 ± 359.0; control tissues (n = 4), 80.8 ± 138.7). The difference in the CYYR1 CAG- expression level (mean ± standard deviation: NE tumors (n = 17), 0.43 ± 0.17; control tissues (n = 4), 0.57 ± 0.18) as well as the difference in the CYYR1 CAG+ expression level (mean ± standard deviation: NE tumors (n = 13), 0.016 ± 0.021; control tissues (n = 4), 0.05 ± 0.06) between NE tumors and control tissues was not significant. No statistical difference was observed in either CAG- or CAG+ isoform expression, or between macrodissected (CAG-, n = 8; CAG+, n = 6) and non-macrodissected (CAG-, n = 9; CAG+, n = 7) NE sample subgroups (see Additional file 1). Differences among subclasses defined according to the WHO classification were investigated in the 29 samples for which data were obtained in the first experiment (15 WDEC, 11 PDEC and 3 MEET samples) using the ANOVA test, and they were not statistically significant for CAG-, CAG+ and CAG-/CAG+ CYYR1 isoform expression levels. In all samples studied, the CYYR1 CAG- isoform was expressed at an higher level than CAG+ isoform. The difference was highly statistically significant when comparing the respective expression levels for each isoform in the first experiment (29 NE tumor samples, p < 0.01; 8 normal tissues, p < 0.01) as well as in the second experiment (13 NE tumor samples, p < 0.01; 4 control tissues, p < 0.01). Bioinformatic analysis was conducted using database versions available in April 2006. In "nr" database, 6 human mRNA sequences encompassing the variant splice point were found: 5 of which related to the CAG- first described isoform. In "human ESTs" database, 14 mRNA sequences relating to CYYR1, assignable to one of the two isoforms, were identified: 6 entries with CAG+ sequence and 8 entries with CAG- sequence (see Additional file 2). Figure 4 shows the alignment of the CYYR1 gene family nucleotide sequences present in the GenBank database and encompassing the CAG-/CAG+ exon junction. We considered only species for which at least one mRNA sequence or two EST sequences were available, and this homology was significant at least in allowing alignment at nucleotide level using BLAST. Exon 4 of Mus musculus [GenBank:BC099957] and Rattus norvegicus [GenBank:BC087052] CYYR1 begins with the TGG sequence, which does not offer a second splicing signal, unlike the CAG sequence at the beginning of human CYYR1 CAG+ exon 4 [GenBank:AK223576]. CYYR1 exon 3/exon 4 junction and relative amino acids codified. Alignment of human CYYR1 mRNA sequence, encompassing the CAG-/CAG+ with the corresponding mRNA sequences from other species. The symbol • is used to indicate the exon/exon junction. Predicted amino acid is shown aligned to the first base of its codon; G = glycin, polar not charged; A = alanine and M = methionine, not polar. The genomic sequences available for this junction all come from mammalian species, and we compared 57 bases at 3' of intron 3 and 25 bases at 5' of exon 4 (Figure 5A). The sequences of Bos taurus [GenBank htgs:AC163915], Canis familiaris [GenBank:NC_006613], Mus musculus [GenBank:AC154403] and Rattus norvegicus [GenBank htgs:AC120271] CYYR1 at genomic level are clearly not consistent with the possibility of an alternative splicing as is possible in humans, because only one CAG sequence, therefore one acceptor splice site (AG), is present at the 3' intronic boundary, and the next exon begins with the TGG sequence (CAG//TGG, where//indicates intron/exon boundary). CYYR1 intron 3/exon 4 boundary. Comparison of CYYR1 57 bases at 3' of intron 3 and 25 bases at 5' of exon 4 in some mammalian species. The symbol * indicates GenBank sequences from ''htgs'' (draft) division. In blue: splicing sites; in magenta: putative branch points (A). In B: comparison of the putative branch sites (the underscored regions in A); in yellow: high identity regions. In the anthropomorphic monkey Pan troglodytes (Chimpanzee) [GenBank:BS000209] as well as in Homo sapiens [GenBank:AP001696] the genomic sequence corresponding to intron 3/exon 4 boundary is CAGCAG. In this case, at the intron/exon junction, there are two successive splice sites separated by three bases (CAG//CAG) (Figure 5A). This genomic region is highly conserved, and it contains a similar putative branch site upstream of polypyrimidine tracts of various length and composition (Fig. 5B). Figure 6 shows the alignment of the vertebrate CYYR1 putative protein sequences available in GenBank (nr or EST divisions) or inferred by nucleotide sequences available (see Additional file 2). Alignment underlines that the encoded amino acids corresponding to the CAG-/CAG+ exon junction in the CYYR1 mRNA are well conserved from amphibians to bovines. Two amino acids conserved in all analyzed species (YP) are always followed by a couple of amino acids, one of which is always alanine (A): the same amino acid encoded by the rarer human mRNA isoform CAG+. In fish, a conserved block is found downstream of the CAG-/CAG+ exon junction. CYYR1 protein sequences. Manual alignment of the vertebrate CYYR1 protein sequences available in GenBank (nr or EST divisions). Only the partial amino acid sequence encompassing the sequence corresponding to the CAG+/CAG- exon junction is shown. The highly conserved YP amino acids are highlighted in yellow. In blue the alanine (A) in the CYYR1 CAG+ isoform. No sequence with NE 16 mutation was found in the analyzed databases. Neuroendocrine cells in the organism are part of a diffuse system of cells with neuroendocrine features characterized by ultrastructural features (presence of dense core granules of 100–400 nm diameter) and immunohistochemical phenotypes (pan-neuroendocrine markers and specific hormonal products) . We first described CYYR1 gene as a novel locus on human chromosome 21, encoding a product with no similarity to any known protein. Based on the observation that the CYYR1 gene appears to be expressed, as evaluated by EST database analysis, in several types of neuroendocrine cells, we decided to investigate CYYR1 sequence and expression in a large series of human NE tumors. We also wanted to obtain new data about the CYYR1 gene, which has never been studied in-depth and whose product function is, at the moment, unknown. Sequence analysis of the 32 NE samples tested showed a CDS sequence identical to that previously described in normal subjects, except for a case in which we identified a point mutation. The mutation is a C-T transition, apparently in heterozygotic state, leading to a P111S change predicted in the encoded product. This change is not present in any human sequence obtained from either finished sequence or EST databases. The replaced proline amino acid is situated one position before the first PPPY motif, which is present in three copies in the carboxy-terminus of the CYYR1 protein. This motif is known to be present in some viral proteins, where it is required for virus budding , and it is also described in proteins involved in interactions between cytoskeleton and extracellular matrix [12, 13]. Due to the general relevance of proline for protein structure, and to its proximity to a functional motif, it may be speculated that this change could affect the CYYR1 function. Interestingly, the only NE mutated sample among those analyzed is a tumor arising in the neck region, a less common site of origin of neuroendocrine tumors. In addition, a known SNP has been found in some samples: a C-T change at the third position of codon 67. Sequence analysis was also useful to show an unexpected "subtle" splicing isoform of CYYR1 mRNA, derived from the alternative use of an AG acceptor splice site located at the 3' end of CYYR1 intron 3, leading to the generation of mRNA isoforms which differentiate by only three bases. This new isoform encodes a predicted product with an adjunctive alanine (A) amino acid at position 112, located just before the glycine (G) preceding the first PPPY motif (Figure 6). Due to its position, it is likely that this adjunctive amino acid could affect CYYR1 function, allowing the presence of two protein products whose relative expression is regulated by alternative splicing. Alternative splicing leading to mRNA isoforms encoding slightly different polypeptides had been reported only anecdotally until a recent systematic survey . This work has demonstrated the relative frequency of this phenomenon in several vertebrate genomes, underlining its biological relevance as a means to increase functional complexity generated by the same locus sequence. Systematic analysis by RT-PCR proved that both isoforms are expressed in all 29 NE and 8 normal tissue samples investigated, with the constant prevalence of the CAG- isoform, as also confirmed by human EST database analysis. We also accurately quantify the relative expression of the two forms, using an approach whose reliability we have previously described . We found that the most commonly expressed isoform is the CAG- isoform, the first described mRNA for CYYR1 locus . The ratio between the expression of the two isoforms shows a greater variability with respect to a comparable gene such as the insulin-like growth factor 1 receptor (IGF1R). We previously found that IGF1R undergoes a "subtle" splicing with a tight regulation in both normal and neoplastic cells, leading to a constant 3:1 ratio . However, when organs similar to those in which tumors arose were used as controls, statistical analysis failed to identify a significant difference in the CYYR1 CAG-/CAG+ ratio, as well as in the normalized CAG+ or CAG- mRNA level, between NE and normal samples. The EST database seems to support, for several tissues, a high expression of CYYR1 in some neuroendocrine tumors. For example, among the 19 CYYR1-related ESTs with "lung" origin, 12 are derived from lung carcinoid, and among the 12 ESTs with "pancreas" origin, 11 are derived from insulinoma. However, 10 of the lung carcinoid ESTs derive from the same library, as well as all the insulinoma ESTs. In general, EST database may provide indications about gene expression profile, but data are of limited statistical value. To investigate the biological relevance of the "subtle" splicing of CYYR1 mRNA, we performed a bioinformatic analysis of all available sequence databases. CYYR1 locus "subtle" splicing has actually been observed only in Homo sapiens, while in Pan troglodytes the genomic sequence is consistent with its existence. We have described a new "subtle" splicing isoform for CYYR1 locus and alterations of sequence and expression of this gene in a large series of NE tumors. The CYYR1 mRNA isoform expression level was comparable in tumor samples and normal tissues, and a missense mutation was identified in one tumor sample. The CYYR1 CAG- isoform was significantly more expressed than the CAG+ isoform in NE tumor as well as in control samples investigated. Further investigations are necessary to clarify the functional role of CYYR1 products in both normal and neoplastic cells. This work was supported by grants from "Fondazione del Monte di Bologna e Ravenna", Bologna, Italy to PS, and from "Progetto Strategico – Ateneo di Bologna" to RC. We would like to thank Gabriella Mattei for her excellent technical assistance in cDNA sequencing. The Authors thank Danielle Mitzman for helping revise the manuscript. LV designed the study, carried out the molecular genetic studies, participated in the sequence alignment and drafted the manuscript. FFr discussed the molecular genetics and bioinformatics data. SAH prepared and provided the NE tumor biological samples. SC and RC participated in molecular genetics analysis and result interpretation. LL and FFa were involved in statistical and bioinformatics data generation and interpretation. PC and MZ partecipated in study coordination and supervision. DC prepared and provided the NE tumor biological samples and participated in data discussion and drafting the whole manuscript. PS performed the statistical analysis and participated in study design and discussion. All authors read, discussed and approved the final manuscript.
2019-04-26T16:26:36Z
https://0-bmccancer-biomedcentral-com.brum.beds.ac.uk/articles/10.1186/1471-2407-7-66
In this study I want you to consider the subjects of fear, worry and anxiety. First, let me put this text into its context in the Sermon on the Mount. In the fifth and sixth chapters of Matthew, Jesus is addressing three basic issues. First, how the disciples can keep themselves from external religion. This is why Jesus said, “Unless your righteousness exceeds the righteousness of the scribes and Pharisees, you will not inherit the kingdom of God.” Second, how the disciples can be kept from hypocrisy by not doing their righteousness to be seen by men. Third, Jesus wanted to keep His disciples from having divided hearts by keeping them from trying to serve God and mammon. He warned them, “No one can serve two masters; for either he will hate the one and love the other, or else he will be loyal to the one and despise the other. You cannot serve God and mammon.” Jesus wanted them to love Him with all their heart, soul, mind, and strength. Jesus then went on to say in Matthew 6:25, “Therefore I say to you do not worry.” Put the concept of worry into the context of serving the god of mammon which He had just taught them. Jesus obviously believed that serving any other god would produce anxiety, worry and fear. What is anxiety or worry? These two emotions are in reality a low-grade fear. When anyone is worrying, they are fearful that something will or won’t happen that they want. Therefore, you must understand that anxiety, worry, and fear are all dealing with similar issues. These issues will cripple you as a Christian and your ability to mature and be an effective servant for Jesus Christ. Now it is obvious that everyone gets anxious and worrisome at times with the stress of life. But, most of us quickly get a grip on our attitude, and we commit whatever the issue is into the Lord's hands and move forward. Even some of the greatest and most well-known characters in the Bible struggled with fear, anxiety and worry. Remember the Prophet Samuel, when he was commanded to anoint David as king expressed his own fear to the Lord about going to anoint him as king. Samuel said to God, “How can I go? If Saul hears it, he will kill me” (1 Sam. 16:2). The Lord in effect told him to go anyway and He would show Samuel how to handle it. When you consider David and the psalms he wrote, he refers to his fears often and how he sought the Lord and He delivered him from all his fears (Ps. 34:4). Even Paul the Apostle said in 2 Corinthians 7:5, “Outside are fightings, inside are fears.” Paul said at one point in his ministry that he even began to despair that he would survive (2 Cor. 1:8-10). He found his only solution was to trust in the Lord to deliver him. So, everybody experiences fear and worry at times in their lives. But most people get a grip on their fears, trust the Lord, and come back to a place of rest. But, some people don’t get a handle on their anxious thoughts, worries, and fears and they end up battling with these issues on a daily basis. They are fearful sometimes over the smallest things and very rarely get victory in these struggles. I have counseled people for more than 45 years and have met many people like this who are consumed by their fears and anxieties. These fears rule their daily lives. They literally live under what I would call terror every day. In Psalm 73:19, Asaph also described those that were consumed by the terror of fear. “Oh, how they are brought to desolation, as in a moment! They are utterly consumed with terrors.” Therefore, when someone is consumed by their fears and anxieties, that is a real problem because it dominates their life and destroys their relationships with others. This is a problem that must be addressed biblically and as quickly as possible. If you have physical symptoms that accompany your anxiety and fears, this reveals that there is a major problem. Some of these physical symptoms I've seen with people in my office are trembling, heavy breathing, perspiring, and panic attacks. If this is going on in your life right now, you need to get some help. I would suggest you do two things. You first need to go to your doctor and get a complete medical checkup. Some of these physical symptoms can result from medical problems or hormonal issues. Some people that I have sent to their doctor over the years will come back to me with the results of what their doctor has found. Sometimes these issues were very serious. Other times people come and tell me there was nothing wrong with them physically. This means that the problem is a spiritual issue as well as learning to take control of their thought life. If you are struggling with some of the things I am about to describe, I would strongly encourage you to go to your pastor for counseling. The next thing we must do is examine exactly what Jesus taught in this passage, because He explains why you should not be anxious or worried. In Matthew 6:25 Jesus declared, “Therefore I say to you, do not worry about your life, what you will eat or what you will drink; or about your body, what you will put on. Is not life more than food and the body more than clothing?” Notice the first thing that Jesus declares is His command, “Do not worry.” He not only makes this command here, but also two more times in verses 31 and 34. When anyone says something to you three times in a short period of time, they are trying to make an important point. In other words, Jesus does not want your life to be controlled by worry. The word worry is also translated other places in the New Testament as being anxious or having anxiety. 1. You should not worry, because Jesus said so! Remember, this is a direct command from Jesus to you. Do not worry! That means you! Jesus stated this as a command that He wants you to obey. If you desire to obey His command, then you will do the rest of what he instructs here in the context of this statement, and in the rest of Scripture. What do I mean? Jesus said at another time of potential worry for the disciples exactly how they might not worry. In John 14:27 Jesus said, “Peace I leave with you, My peace I give to you; not as the world gives do I give to you. Let not your heart be troubled, neither let it be afraid.” The word troubled is a Greek word that means to be anxious, or fearful. He said, “Don't let your heart be anxious.” Jesus explained that it's a choice that you make. You can choose to let your heart become troubled or anxious. You need to make that choice to come to the Prince of Peace and receive His peace within your heart. When you trust Jesus to take control, then He is going to bring His peace. Peace is a fruit of the Holy Spirit (Gal. 5:22-23). Jesus said that He would give you this peace if you would choose to come to Him and ask. Nothing in this world can ever give you peace like He gives peace. In other words, the kind of peace Christ offers is unavailable in this material world. This brings me to my second point. However, in Luke 12:32, Jesus said, “Do not fear, little flock, for it is your Father's good pleasure to give you the kingdom.” In other words, God wants to give you what will satisfy. He wants to give you a gift. Life, peace, and a satisfied heart are gifts, not something you obtain by your own personal effort, or by achieving some position in life. They’re something that He gives to you and you receive them by faith. However, when your focus is on trying to find life and peace in this world, the life He gives is literally choked out by your desire for other things. In Matthew 13:22, in the parable of the sower, Jesus explained this to us. He said the person who received seed, which is the word of God, among the thorns is, “he who hears the word, and the cares of this world, and the deceitfulness of riches choke the word, and he becomes unfruitful.” I don't think anyone wants to become unfruitful. Yet, this is one-way believers become unfruitful. Notice that Jesus said specifically that when the cares of this world enter in, with the deceitfulness of riches, these are the causes of the unfruitfulness. Also, notice that Jesus connects the cares, anxiety, and worry of this world with the deceitfulness of riches. These two things are directly connected together. The word care in the phrase the “cares of this world” is the same Greek word for worry or anxiety. Jesus is saying that if you allow worry and anxiety to control you, then you will be choked spiritually. It would be just the same as if somebody put their hands around your neck and choked the life out of your body. This is why Jesus said, “Come unto Me, all you who labor and are heavy laden, and I will give you rest” (Matt. 11:28). Don’t go to the world, and the things of the world, and think that they will give you the rest and peace you need. That won’t happen! Jesus is the only One who gives this rest, but you must come to Him to receive it. 3. You should not worry because you are highly valued by God. This third reason why you should not worry is given in Matthew 6:26. Jesus said, “Look at the birds of the air, for they neither sow nor reap nor gather into barns; yet your heavenly Father feeds them. Are you not of more value than they?” This is a great question. If God takes care of the birds of the air and feeds them, will He not take care of you? This is an argument from the lesser to the greater in value of His creations. So, who is of more value? You! Yes, He cares for the birds, because He cares for all of His creation. But, man is made in God’s spiritual image, so we are more highly valued than animals. Remember, Jesus is the One who says here that men are of more value than animals. Therefore, you must not worry because of how highly valued you are among God’s creations. You are cared for by the Father. Probably the easiest and most obvious way that you know that this is true, is by the fact that the Father gave His Son to die for you. He gave Himself for you! So, if He gave His only begotten Son so that you could have life, then He must value you very much. You are precious to Him. You are more precious than anything He has created, because you can make a choice to accept or reject Him. Animals don’t have that option. God declares in Lamentations 4:2, as He is speaking about His people, He calls them, “The precious sons of Zion, valuable as fine gold, how they are regarded as clay pots, the work of the hands of the potter!” Paul used the same image in the New Testament when he said that we have this incredible treasure of Christ within us. Christ is the treasure held within, these earthen vessels, or these clay pots (2 Cor. 4:7). Clay pots are a good way to describe our physical bodies, because we are just made from the dust of the earth. Yet, within you is the most incredible treasure of Christ! That's why He calls His people, “Precious sons of Zion, as valuable as fine gold.” If you are valued like this and cared for as an individual, you should not worry! He will take care of His treasured one. 4. You should not worry, because worrying can’t change one thing. This fourth reason why you should not worry is found in Matthew 6:27-29. Jesus said, “Which of you by worrying can add one cubit to his stature? So why do you worry about clothing? Consider the lilies of the field, how they grow; they neither toil nor spin; and yet I say to you that even Solomon in all of his glory was not arrayed like one of these.” If you have ever looked at a flower petal under a microscope, it's one of the most incredible things you could ever view. You would see intricacy and detail that is truly amazing to behold! All of the glory of some fine piece of embroidery on the clothing of Solomon can’t be considered even close to the glory of what God creates in plant life, that is here today and dies tomorrow. And the most important thing to remember is that man cannot on any day make even one flower pedal to match what God does every day. So, the equation is obvious. Jesus says that you should not worry because you are powerless to make one lily in the field on any day, but He is so powerful that He does it every day. You can't add one cubit to your stature, but He has created you to grow into adulthood. His point is that you can fret and worry about it all you want but worrying is not going to change anything. Think of all the things you have no power to change. You can’t change the weather, when the sun comes up every day, if you will be healthy or sickly, or whether you live in a world at war or peace. There are innumerable things over which you have no control. But, God has control of all things. However, you can control something very important, which is how you respond to these things. What do I mean? Simply obey what God commanded in Philippians 4:6-7. “Be anxious for nothing, but in everything by prayer and supplication, with thanksgiving, let your requests be made known to God; and the peace of God, which surpasses all understanding, will guard your hearts and minds through Christ Jesus.” You may not be able to control many external things, but you can change what is going on inside of you. If you don’t want to be worrisome and anxious, then pray, and God will give you His peace inside. You can also change your conduct. God told His people through the Prophet Jeremiah, “Amend your ways and your doings, and I will cause you to dwell in this place” (Jer. 7:3). When you repent and amend your ways then God will bring good things and blessings upon your life. This is what He is promising the Jews if they will turn to Him and change what they are doing. Therefore, there are things that you cannot change, but there are things you can change through prayer and repentance. You must trust in God’s sovereignty that He is going to take care of those things that you need. 5. You should not worry, because worry reveals your lack of faith in His love for you. Jesus connects this issue of worry with a lack of faith in Matthew 6:30-32. Jesus said, “Now if God so clothes the grass of the field, which today is, and tomorrow is thrown into the oven, will He not much more clothe you, O you of little faith? Therefore do not worry, saying, 'What shall we eat?' or 'What shall we drink?' or 'What shall we wear?' For after all these things the Gentiles seek. For your heavenly Father knows that you need all these things.” If God knows the needs of every animal and plant, then He knows every one of your needs as well. If you are going to live as a true believer and not as one who just professes faith, then you cannot live like the Gentiles who only seek after their material needs. This would reveal a lack of real faith just as Jesus said, “O you of little faith” (vs. 30). Why is seeking after only material things a lack of faith? Because this reveals that you believe the material world is all there is. But Jesus said that His followers must first seek after spiritual things and the kingdom of God (Matt. 6:33). When you are caught in worry, anxiety, and fear, this reveals that you are not trusting God, who knows that you need these things. Jesus wants you to put the spiritual things of the kingdom first. Remember, worry and fear are opposed to faith. If you want to reject the control that worry and fear have over your life, then you must grow in your faith. But, who should you put your faith in? Put your faith in the God who loves and cares about you. Jesus has already touched on this issue when He talked about His care for animals and how much more He cares for you. Do you realize that when you question God’s love, you are going to stumble in your faith every single time? Let me explain this truth from a story in Mark 4:37-40. In this story Jesus told the disciples to get into the boat and go to the other side of the lake. It then says that, “a great windstorm arose, and the waves beat into the boat, so that it was already filling. But He was in the stern, asleep on a pillow. And they awoke Him and said to Him, “Teacher, do You not care that we are perishing?” Note the question, “Do You not care?” Don't you see what's going on here?” Have you ever heard yourself say those words? “Jesus, don't you see what's going on here? I thought You loved me, that You cared about me.” This is questioning His love, just as the disciples did. Then notice how Jesus responds, “Then He arose and rebuked the wind, and said to the sea, ‘Peace, be still!’ And the wind ceased and there was a great calm. But He said to them, ‘Why are you so fearful? How is it that you have no faith?’” Jesus makes the connection between their lack of faith and their fear. Therefore, faith and fear are diametrically opposed to one another. If you struggle with worry, anxiety and fear, you are struggling with your faith in His love for you. Do you trust His loving care over your life? Do you trust that He sees your needs? You must trust His love! The Scripture says, “Perfect love casts out fear” (1 John 4:18). It casts out all fear. Is there a need for maturity in your love relationship with Him? Jesus has a solution! He wants you to live your life without fear and worry. So, let me give you some principles for overcoming your fear and worry. 1. Begin to seek first the Kingdom of God. Jesus said, “Seek first the Kingdom of God and His righteousness, and all these things will be added to you” (Matt. 6:33). This is such a simple principle. I like simple! Jesus didn’t want to make following Him to be complicated. In fact, all of the principles I’m about to explain are summed up in the principle of seeking God’s kingdom first. Jesus is simply saying, “put Me first and everything else second, and you won't have to worry about the rest.” The whole context of this passage of Scripture is about who is first in your life. Go back to Matthew 6:24 and you can see this clearly. Jesus said, “No one can serve two masters; for he will either hate the one and love the other, or else he will be loyal to the one and despise the other. You cannot serve God and mammon.” The question is, who is first? Who and what do you love first? Whatever you love first is what you will seek first. There is no way around it. So, is He first? Do you seek Him first? Do you seek His kingdom first, or is your own kingdom and wealth more important than His? When you forget the simple issue of priority, you are going to have trouble. Jesus said in Matthew 10:37, “He who loves father or mother more than Me is not worthy of Me. He who loves son or daughter more than Me is not worthy of Me.” He said in Luke 14:26-27, “If anyone comes to Me and does not hate his father and mother, wife and children, brothers and sisters, yes, and his own life also, he cannot be My disciple. And whoever does not bear his cross and come after Me cannot be My disciple.” The term Jesus used here to hate father or mother is a hyperbole, meaning that you must love them less than you love Him. In other words, Jesus is saying, “I must be first in your life.” He will not take second place. If He's second, He's not Lord. It's that simple. Probably the best place to see the struggle with this issue is in the life of Mary and Martha found in Luke 10:40-42. In this passage, Martha and Mary have Jesus as their house guest. As He rested, it says that, Martha was distracted with much serving, and she approached Jesus and said, “Lord, do You not care?” So, she is questioning Jesus’ love. “Do you not care that my sister has left me to serve alone? Therefore tell her to help me.” Martha is commanding Jesus as to how He should respond. Have you ever told the Lord what He should do? I'm afraid we have all done that a few times, thinking we know better than He does. Jesus responded to her, “Martha, Martha,” Do you hear His love and gentleness in these words? “Martha, Martha, you are worried and troubled about many things.” Note how Jesus coupled being worried and anxious about many things with her questioning His love. Jesus continued, “But one thing is needed, and Mary has chosen the good part, which will not be taken away from her.” If you read the context of this story, where was Mary? She was seated at His feet seeking and waiting upon Him. She had put Jesus first. Now, this doesn't mean you should not take care of making dinner. It doesn't mean you should refuse to go to work and just sit around and read your Bible all day long. It all has to do with Martha being distracted. This word means anxious or worried. She was so anxious and worried she became distracted. Let me give you a simple illustration of distraction. Distraction is like tuning the dial on your radio just a little; you still hear the message, but you are not fully tuned in. You are distracted by all of the hiss and static. Then there are some people who aren’t tuned in to hear Jesus’ words at all. Which is it for you today? Do you need a slight adjustment to get tuned into God’s frequency? You might not be listening at all, or do you have your radio off? I believe it is essential that you see what is it that distracts you, and deal with that issue. If it is distracting you, it is stumbling you, and it will continue to do so you until it is resolved. This is why Jesus encouraged Martha to address this issue in her life. 2. Commit your tomorrows into His hand. Another of Christ’s solutions for worry, fear and anxiety is found in Matthew 6:34. Jesus declared the third time, “Do not worry about tomorrow, for tomorrow will worry about its own things. Sufficient for the day is its own trouble.” In other words, Jesus was saying, you have enough trouble to deal with today, without worrying about tomorrow. Does this mean that you should never think about tomorrow? Does Jesus mean that you should never plan for tomorrow? Absolutely not. He is not talking about planning, He is talking about worrying. In addition, the Scripture is full of encouragements to good planning in the Old and New Testaments. Jesus is saying don't be distracted by thinking about tomorrow. Don't let worry and anxiety captivate your attention. You need to be careful about your thinking process. Planning is an important aspect to clear thinking. I heard a Bible teacher this week make a powerful statement that I think you need to consider. He said, “Many people crucify themselves between two thieves, the regret of yesterday, or the worries of tomorrow.” This is so true. People kill themselves and the life that is in them, because they are worrying about the future, or beating themselves up over the past. Don't do that! On the contrary, when you hear people say, “I’ll cross that bridge when I come to it. I have enough to deal with today.” Where did we get that concept? It comes right from this passage, “Do not worry about tomorrow!” So, don't worry. Don't get caught up in the anxiety of tomorrow. Proverbs 3:5-6 declares, “Trust in the Lord with all your heart and lean not to your own understanding.” When you lean on your own understanding, this incites anxiety, because you are usually thinking about how you are going to handle whatever the problem is. You are trying to figure out what is going to happen tomorrow. Instead, “In all your ways acknowledge Him, and He shall direct your path.” In other words, give the problem up into His capable hands. Trust Him! 3. Stop avoiding the places and activities that you fear. The third solution for worry is to stop avoiding what is fearful or worrisome; instead deal with your worries, fears, and anxieties. But, this is not how people usually handle them. If you are avoiding places or activities that cause you fear or anxiety, then you are only prolonging your own torment! People have said to me, “I'm not going there ever again. That’s where I almost lost my life last year.” Or, “I can't deal with that individual. I don’t want to be around people like that because they are just like that person who hurt me.” Or, “I can’t go to big stores, because that is where I had that panic attack.” Yet, when you avoid your anxieties and your fears, do you know what happens? Those anxieties and fears grow even stronger. Why? It's because anxiety and fear are sin, because they are rooted in unbelief. Any sin that you try to avoid and control in your own strength will only gain strength inside you, because you are trying to deal with it in your own power. It will only get worse. The Bible teaches that the “strength of sin is the law” (1 Cor. 15:56). This is why as Paul revealed in Romans chapter 7 that the harder he tried to resist sin by his own will power, the greater it gained control over him (Rom. 7:16-20). Many years ago, I counseled a man who was trying to deal with a parent who was completely bound to his room because of fear. His father had been traumatized in a grocery store during a robbery, and believed he was almost killed. From that day forward he said to himself, “I'm not going to the grocery stores anymore. As he yielded to this fear and avoided all grocery stores, he then believed that all big box stores were unsafe. Then he decided he wouldn’t go anywhere where there were large crowds. After a while he would not leave his house because of his fears. As he continued to avoid what he feared he then wouldn't go out of his bedroom. Consequently, this man was locked inside of his bedroom by his own fear and anxiety. His family member came to me and said, “How do I help him, because this person is completely captive and consumed by his fear and anxiety.” I explained to him that the order must be reversed. His father must do what he feared and realize that nothing was going to happen to him. He had to start going out of his bedroom, then out of the house, and then back to a store. It was a long hard road back, but he did it. Therefore, if you yield to your fears, worries, or anxieties, and you just try to avoid that circumstance or place which seems to create your anxieties, you are misplacing your faith. Peace is not found in a place or circumstance, it's found in a Person. Peace is experienced by viewing the situation or circumstance in faith, trusting that He is with you, and He is in control. As I mentioned earlier, Paul made this point in Philippians 4:6-7 when he said, “Be anxious for nothing, but in everything by prayer and supplication, with thanksgiving, let your requests be made known to God; and the peace of God, which surpasses all understanding, will guard your hearts and your minds through Christ Jesus.” Peace is found through trusting prayer. Let Him have your anxieties and fears. He gives a peace that passes all human understanding. Seek Him! 4. You must become a man or woman of believing prayer. Now I just finished my previous point writing about believing prayer. This is how you exchange your anxiety for God’s peace. If you want to be free of anxiety and worry you need to become a man or woman of believing prayer. You must connect with the Prince of Peace, Who is the only One who can give you personal peace. Touching Him through prayer is where you will find the infilling of the Holy Spirit. In Galatians 5:22 it says, “The fruit of the Spirit is love, joy, peace...” If you struggle with anxiety, you need to be filled with the Holy Spirit; that’s where peace will be found. The God who cares for you, will fill you, and will deliver you. David declares in Psalm 34:4, “I sought the Lord, and He heard me, and delivered me from all of my fears.” Note that David didn’t say God delivered him from some of his fears, but all of his fears. He found that prayer was his solution and the answer to his fears and anxiety. Peter also taught the same thing in 1 Peter 5:7. “Casting all your care on Him, for He cares for you.” The word care in this verse means anxiety. You must cast all your care and anxiety upon Him through prayer, and He will give you His sufficient peace. Why not cast your cares on Him right now? He will gladly take them. I have found that many Christians think they can't control their thoughts, that this is not something within their ability. But, that's not what the Bible teaches. Paul taught in 2 Corinthians 10:3-5, “For though we walk in the flesh, we do not war according to the flesh. For the weapons of our warfare are not carnal but mighty in God for pulling down strongholds, casting down arguments and every high thing that exalts itself against the knowledge of God, bringing every thought into captivity to the obedience of Christ.” These verses declare that there is a war going on for the control of your mind. Paul makes it clear that this is a spiritual battle. There are weapons that you possess that will enable you to win this battle. What kind of weapons do we have? These weapons are not carnal but mighty in God, such as prayer, faith, and the word of God. These weapons are for pulling down strongholds, casting down arguments that come up in your mind, which enable you to bring every thought into captivity to the obedience of Christ. But, you must cast down anything that is contrary to what God declares in His word. The words cast down are in the present tense, which means that you must continually reject thoughts throughout your day that exalt themselves against the truth of God. To cast down means to throw down or destroy completely. That's something you must do continually when you realize your thought life is not in a good place. This command to cast down and bring into captivity every thought means that you are in control of every thought. “Bringing every thought,” not just some thoughts, or most thoughts, but every thought “into captivity.” The word captivity means to control. So, when you are thinking in a prideful, lustful, resentful, or envious way, whatever thought is contrary to what you know is right, you must cast it down and reject it! If you don’t, your thoughts will captivate and overcome you. That is how it happens, and that’s what you must do. Fear and anxiety must be controlled and rejected. 6. Turn your focus off of yourself and toward serving God and helping others. You need to take your focus off of yourself and put it on serving God and others. Anxiety, fear and worry are basically you turning your focus on yourself. What will happen to me? What will someone do to me? What if that happens to me? What am I going to do if this doesn't take place? This kind of selfish thinking feeds anxiety and worry within. You have to recognize this self-focus, turn from it, and turn to the Lord and His kingdom. This was why Jesus commanded the disciples to, “Seek first the kingdom of God.” This is how you take your focus off yourself. That's where fear and anxiety will be conquered. This concept is seen so clearly in the prophecy of Zacharias, who was John the Baptist's father. He declared that God would, “Perform the mercy promised to our fathers and to remember His holy covenant, the oath which He swore to our father Abraham: to grant us that we, being delivered from the hand of our enemies, might serve Him without fear” (Luke 1:72-74). This is the promise of God. That is what the Lord wants to do in His people’s lives. He wants to give you the ability to serve Him without fear. Trying to serve with fear does not work very well. Therefore, seek Him first. Seek His kingdom first and fear, worry, and anxiety will be overcome. 7. Trust in the sovereignty of God. Anxiety and fear are not only issues of self-focus, but also issues of trust. This is why Jesus questioned the faith of the disciples in Matthew 6:30. When you worry about your clothing and food, when God feeds the animals and clothes the flowers of the field it is definitely an issue of faith. To conquer worry and fear you must trust in your caring, powerful, sovereign God. Your focus must be on the Holy God that you serve. This is why Jesus said in Matthew 10:28-33, “Do not fear those who kill the body but cannot kill the soul. But rather fear Him who is able to destroy both soul and body in hell. Are not two sparrows sold for a copper coin? And not one of them falls to the ground apart from your Father's will. But the very hairs of your head are all numbered.” Our sovereign God knows when every bird falls to the ground and dies. He has understanding of everything that is happening everywhere on the earth at every moment. He knows everything about you too. Yesterday, I saw a strand of hair on the floor, and I thought to myself, He knew when this hair fell out of my head. Think of it! While you are worrying about this one little thing He knows about every hair falling from your head, and every other little thing that is happening in 7 billion people’s lives around the world. If this is true, then He is a sovereign and powerful God that has power and ability well beyond anything of which you can conceive. Shouldn’t you then trust Him to care for you? God is working all things out according to the counsel of His will in your life. Why not commit yourself and your life into His hand and say to Him, “Lord, you have all things under your control. I'm going to put You first, and I’m not going to worry. I’m going to trust that You are going to take care of all the little stuff in my life. I don't know how You are going to work all these things out that I’m worrying about, but I’m going to trust that you will. I don't know how you're going to take care of this financial need, or how you're going to fill the needs of my personal life or that of my family, but I trust you, because You are big enough. You can handle me and everyone around me. This is the exact counsel that Daniel gave to King Nebuchadnezzar when anxiety filled his heart. The King said to Daniel, “I have had a dream, and my spirit is anxious to know the dream” (Dan 2:3). Notice God's counsel to this anxious King. Daniel explains that God is completely sovereign over him and all the kings that will come after him. He told him, “He changes the times and the seasons; He removes kings and raises up kings” (Dan. 2:21). In other words, God is saying, “I'm in total control of your kingdom and all kings and kingdoms. I raised you up, and I take you down and remove you. I’m the Sovereign here, not you!” In other words, God’s assertions that He is sovereign over all should calm the king’s anxious mind because the Lord is in control! So, are you trusting in your abilities to control everything, or in a sovereign God who is truly controlling everything? Put your trust in Him! 8. Get some good counsel. If you struggle with worry and anxiety, you should talk to someone who can give you good biblical counsel. Let them encourage you. The person may be your best friend, it may be your spouse, or it may be one of the elders or pastors at your church. But you need to talk with somebody about your anxiety. I have found that when people verbalize their anxieties and they refuse to stuff them all inside, freedom can be found. People have said to me after they have shared their struggles, “Boy, it feels better just being able to talk about it. I've just been battling inside my mind for so long. It feels good to talk about it.” Counsel allows that person to apply the word of God to their fears and worries. Hopefully, what I've written here will give you some encouragement and strength. Remember, in Proverbs 12:25 it declares, “Anxiety in the heart of a man causes depression, but a good word makes you glad.” So, let somebody speak that good word to you that will make your heart glad, because that is God's intention. He wants you to be glad. He wants you to have peace with Him.
2019-04-23T08:44:23Z
https://covenantkeepers.org/bible-studies/new-testament-studies?layout=edit&id=573
PHIL: Another Q&A. John, it is an honor actually for all of us to come together and celebrate your fiftieth anniversary in the ministry. And I know that public adulation makes you uncomfortable, and Scripture does honor men of faith and faithfulness, so we have to do this. It’s a privilege to do this. And I hope you’ll just let me ask you questions about your ministry and your life. PHIL: Yeah. No, I want to ask you questions about 50 years of ministry and your underlying ministry philosophy and things that you like and don’t like about ministry. And so, let’s just start at the beginning. Tell us first about your heritage. One of the first things I ever heard about you was that you were in a long line of pastors. I think the first thing I read said you were fifth generation pastor. I know your father and your grandfather were pastors, and you had pastors on both sides. Tell us about that. JOHN: Yes. My father and my grandfather. My grandmother’s father, and then went back one generation, Scotland, probably pick up the story in PEI. My grandmother’s father was Thomas Fullerton. He was pastor of St. James Kirk, the main church in Charlottetown PEI. PHIL: He pastored for Anne of Green Gables. JOHN: Yes, he was the pastor of the lady who wrote Anne of Green Gables, they were close friends. Together they wrote whatever the provincial song is for the Province of Prince Edward Island. So my grandmother’s father was also in the Canadian Army and he was a chaplain in the Boer War. So it goes back to, you know, fighting down in Africa. My grandfather’s father drove the first locomotive on PEI. So he was a railroad man and then a pastor. Their kids got together, and my grandfather came to Calgary to be the chief telegrapher for the Canadian Pacific Railway, followed in his father’s footsteps. And that’s where my dad was born. And my grandfather was genuinely converted, came to Los Angeles to the old Bible Institute of Los Angeles to train, became a pastor and raised my dad here; he became a pastor, and I followed. PHIL: You mentioned the other day that you remembered that your grandfather preached actually in writing the sermon at his own funeral. JOHN: Yeah. I have pretty vivid memories of my grandfather. I think I was nine or ten when he went to be with the Lord, and he died of cancer; a lot younger than I am. But he had – I have sermon notes of his up in my study. He was a faithful preacher of the Word of God and of the gospel. He loved the church. The story that I often tell about him is that when he was on his deathbed and I was with my dad – and we saw him a lot because we lived in the same neighborhood. He was pastor of one church, my dad was the pastor of another one. My dad was a pastor in Hollywood and my grandfather in Eagle Rock, which isn’t far from here. And at one point they switched churches. JOHN: They were both in the American Baptist Convention in those days, which my father eventually left as it liberalized. But my grandfather was on his deathbed, and my dad asked him if he had anything that he wanted, and he said, “I want to preach one more sermon.” And he had prepared a sermon on heaven called “Heavenly Records,” and he wanted to preach it. It was like fire in his bones. So he wanted to unload what was in his heart about heaven, and he was so near. He never was able to do that because he went to be with the Lord. So my dad took his sermon notes and printed them up into a booklet, and everyone at his funeral got his sermon notes. So I always say he preached on heaven from heaven. JOHN: So he was faithful to the very dying end to preach, and his regret when he left was that he couldn’t preach one more time. PHIL: Your own dad inherited that as well. I met him and he was a delight, I loved him. But as I recall, he was teaching Sunday School at least, so giving his last sermon just a month before he died. JOHN: He was still teaching the Bible into his ninety-first year. I remember he said to me – he was a pretty insatiable reader, and he was terrified to step into a pulpit without being fully prepared. PHIL: I can get that. JOHN: Yeah. So he had a manuscript. And I know you follow that. PHIL: Absolutely. I’d be lost without my manuscript. PHIL: That’s advice you’ve followed I know. JOHN: Yeah. Well, and you know, he’d always call it that. And somebody referred to that – I think it was Mike today – he called it the sacred desk. JOHN: And when he stood behind it, he wanted to make sure he had done everything to prepare. So I remember he was a few years from going to heaven, and he said to me one day, he said, “I’m still reading, but I don’t know why.” You know, that was a real turning point, because he couldn’t shut off the desire to take it in even though he knew there wasn’t going to be the opportunity to preach it. PHIL: I’m there already. Should I stop? JOHN: Yeah. Well, if you do three services you can’t remember when you said it. JOHN: But, yeah, that was kind of was a sad moment when all of a sudden after preaching since he was about 20 years old; and he’s 90, and letting go and feeling like people are complaining because he’s repeating himself. Soon after that he went to be with the Lord. PHIL: He had such an active mind. PHIL: He loved to read and refute things that were wrong. JOHN: Yeah, he loved apologetics, he always wanted to defend the faith. The greatest legacy my father gave me was his consistent life. He was everything at home that he was in the pulpit, everything, I never saw any difference. But beyond that legacy of that life what he gave me was just this absolutely complete confidence in the authority and inspiration and inerrancy of the Word of God. And he was not only a preacher of that, but a defender of it. He loved to defend the Word of God, and he was an apologist in his preaching as much as he was a teacher. PHIL: He had a television and radio ministry. JOHN: Right. My grandfather started a radio ministry called Voice of Calvary many years ago; and my dad, when the radio program came on the air – it was a weekend program locally – when it came on my dad played the theme song on the marimba. My dad was a musician, played a little trombone, piano; and he’d play the marimba as the theme song, and his dad would come on and preach. PHIL: Did he play it live every week? PHIL: That’s not an easy thing to do. JOHN: No, you can’t carry around a marimba. JOHN: But, yeah. And my grandfather started the Voice of Calvary, and eventually my dad just took that over, and it was on for many, many, many years Saturday and Sunday, kind of a weekend. And then he decided to do television when he was pastoring in Burbank and he got a television slot. They didn’t do a lot of recording in those days, it was pretty much live television. So some of the older people remember live television. So we would leave church on Sunday night, make a beeline down to KCOP Channel 13 here in LA and do live preaching on TV, a little bit of singing; and then he would just stand behind a thing and the cameras were rolling. I mean, it was what it was. There was no editing, you know, you had to make sure you got it right. JOHN: Twenty, maybe twenty-two, twenty-three. PHIL: So you’d had some college at least. JOHN: Well, yeah, I was a graduate from college. I went to seminary when I was twenty-one, so I had a little bit of seminary under my belt. I mean, I think I at least proved that I could do a 15-minute or 20-minute talk. PHIL: I wish there were recordings of that. JOHN: Yeah. I’m not going to tell you where they are. PHIL: You mean they exist? Because I’ve got some – your father, of course, was ministering mostly before cassette tapes. I’ve got some of his sermons on little records like platters that you play on a record player. JOHN: Yeah. They used to have things called kinescopes. PHIL: That was for video. JOHN: I mean, this is ridiculous for me to talk about that it just ages me. But, yeah. So I did some preaching with my dad on television. PHIL: If anybody can find those and put them on YouTube, I’ll pay. JOHN: Yeah. And he had the heart of an evangelist. He was an evangelist with William Culbertson when Culbertson was President of the Moody Bible Institute. So we lived in Chicago, and he would go out in citywide evangelistic campaigns all over the place. He was an evangelist in the early days of Charles Fuller here in Southern California and he was traveling around. He did evangelism with the Billy Graham team while Billy Graham was holding the Great London Crusade in the fifties. My dad went to Northern Ireland. Billy had a team of evangelists and my dad’s responsibility was to preach every day for a month on the docks in Belfast to the stevedores and the ship builders. When I go to Ireland even now I meet people who have hymnbooks from those days back in the 1950s when they had those crusades, and I meet older people who came to Christ during those days when he was preaching there. PHIL: Yeah. You know, your dad, in a lot of ways he prefigured a lot of the things that you’ve done. He actually wrote some commentaries, which somebody sent me recently copies of your dad’s commentaries. They’re not as elaborate or thorough as yours. But he was doing that as well. JOHN: He started out an evangelist, and then he kind of became an apologist. Then he was influenced that he needed to teach the Bible, and so he looked around for resources. And, you know, in those days there weren’t a lot of things. I mean, we were just sort of vanilla Baptists, not a lot of theological clarity in many ways, but faithful to the gospel. So he read books by G. Campbell Morgan that was more a devotional kind of exposition, and he loved that. So he went through Acts, and he went through John, and he went through Matthew. He would say that that was the richest part of his ministry. PHIL: Right. Well, you inherited all of his books, and there was no place to put them, so they came to your office in Grace to You, which is right next to mine. And I used to go in and just scour his library, and I feel like I know his mind because I saw what he read; and you’re right, a lot of devotional material. JOHN: A lot of devotional things. There were lots and lots of Keswick kind of books, you know, “Quiet Talks on This,” by Gordon, and Andrew Murray. I think my dad was trying to find himself – find his way into exposition. But he never got much past the more devotional kind, although it was always accurate, it was always faithful this. PHIL: For someone with such a keen interest in apologetics too, he really had a tender heart, didn’t he. JOHN: He did. He had a very tender heart. He was very loving to all of us as kids; very loving to me, probably to a fault, although he didn’t spare the rod. PHIL: I would ask you about that because I’m curious to hear it. But you probably don’t want me to ask that question. JOHN: No. I mean, I was disciplined with something very long and very hard frequently, frequently. I just called it curiosity, he called it disobedience. JOHN: And you know, he disciplined me more for attitude than something I did. PHIL: So you showed a little attitude, he would bring the rod out. JOHN: He felt that he had to control the attitude if he was going to control the action. PHIL: Interesting. Well, it worked. I mean, you don’t show a lot of attitude. I don’t think I’ve ever seen you – I’m serious. I don’t think I have in 40 years that I’ve known you, I have never seen you angry, never. And I asked Patricia about it once, and she said she tried to make you angry and couldn’t do it. JOHN: Well… First of all, anger does no good for anybody. JOHN: And, secondly, I don’t want to get caught up in myself so much that somebody could actually make me angry. Well, the only reason people would get angry was because they’re offended. So why would I be angry; only because I took offense? PHIL: Right. I’m just saying it’s amazing. If you can be with me for 35 years and never lose your temper, that’s really quite remarkable. Even my wife will tell you that. JOHN: No, I’ve never seen you angry in my presence. PHIL: You know, you have a blessedly short memory for things like that as well. Honestly, when people ask me about your characteristics and all that I often say one of the most – there’s several remarkable things about you. One being that you’re disciplined. I always you are the most disciplined person I’ve ever met. So it surprised me the other day when you said you don’t think about discipline, you just are in these habits. That was kind of a remarkable thing. But the other thing I always tell people is that when it comes to offenses, people who have – you know, in some cases even people who’ve stabbed you in the back, you have a really short memory for offenses like that. You’re one of the most forgiving people I know, which has been really good for me. JOHN: Well, that’s what Scripture says, “Forgive seventy times seven,” you know. JOHN: What is the point of not forgiving? You put your own forgiveness in jeopardy, according to the words of our Lord, and you develop a root of bitterness you can’t survive. Part of being in the same place for 50 years is being able to forgive readily and immediately, and to fully embrace and love the people, even the people who have done – tried to do harm to you. There’s no way to survive in a pastoral ministry with the same congregation for half a century if you can’t forgive. JOHN: And if they can’t forgive. And they can forgive if you can forgive. PHIL: Right. Let me ask you about your ministry experience before you came to Grace Community Church. This was the first church you ever pastored. Prior to that, give me a rundown on your ministry experience. I’m sure you did things even before your dad had you on television. In fact, I heard – tell me if this is correct – the first sermon you ever preached, was that the one in the bus station in Raleigh, North Carolina? JOHN: Yeah. I don’t know if it was the first one, but it was early, yeah. PHIL: Tell us about that. JOHN: I just – I was told to go to the bus station and stand up and preach to all the people milling around at the bus station. PHIL: This was an assignment in Bible College? JOHN: And I left that college, by the way. But I did that once and I thought, “This is ridiculous, because it’s not getting me anywhere.” People think something’s wrong with you, you know. And so, when they would take me back to do that again, I would not preach, I would just go find somebody, sit down and give them the gospel. And I found that I thoroughly enjoyed it; people responded different. But that made much more sense than shouting to people who were milling around going somewhere. PHIL: So what would you count as your very first sermon? JOHN: The first sermon I remember was when – I gave some little talks in high school. But the first official sermon I preached I just remember that I preached “And the Angel Rolled the Stone Away.” Now don’t hold your breath. And I preached on rolling away stones in your life. Now that is bad preaching. JOHN: Look, I am still in remediation from that event. PHIL: That’s really remarkable. John MacArthur’s first sermon was a bad sermon. JOHN: Oh, it was horrible. JOHN: But I’m being honest. Nobody would know it if I didn’t bring it up because nobody recorded it. Yeah, how could ignore the resurrection and talk about rolling away stones in your life? PHIL: You know, preachers do it all the time. PHIL: Well, and I’ve also heard you tell the story of when you were in seminary, and Dr. – who was it? – Dr. Feinberg said that you missed the whole point of the passage. JOHN: Yeah, he did. He was the head of Talbot Seminary, the Dean, Jewish guy. His wife came out of the Fiddler on the Roof community in Europe. They had a lot of really profoundly deep Jewish roots in Europe. And he studied 14 years to be a rabbi. Most brilliant man I had ever met;, and he was converted to Christ. And his life was amazingly transformed. He then went to Dallas Seminary and got a Th.D.; and Chafer, the President of the seminary, said about him that he knew more when he came than he did when he graduated. PHIL: Did they make him take Hebrew again? JOHN: No, he was fluent. At the end of his life he was fluent in at least thirty languages. He could read in at least thirty languages. He could teach himself a language in a couple of months because he had such alacrity with that. But he read through the Bible four times a year. When we’d ask him questions in class he could go to a passage in Kings and translate it from Hebrew in his own mind and then give us the translation. He was a formidable mind. He then went to John Hopkins, studied under William Foxwell Albright who was the leading archeologist in America at the time, and so he got a Ph.D. and a Th.D. And his wife graduated from UCLA later in life. His daughter was valedictorian at UCLA. His son Paul Feinberg – some of you guys will remember Paul Feinberg and his writings. And John Feinberg, who’s still around, does some heavy writing; that was a lot of gray matter in that family. JOHN: But I was very close to all of them and loved them. So I wanted to honor Dr. Feinberg by whatever he – I took every class, I did my best in every class with him. And we had to preach, every semester we had to preach; and he would assign a text and we had to preach to the whole student body. And I worked really hard on 2 Samuel 7 where David wants to build a house for the Lord, and God sends the prophet Nathan to tell him he can’t do it, and then gives him the covenant, you know, the Davidic covenant. And I preached another rolling away stones in your life message in Feinberg’s mind, I guess. I worked really hard on it for hours and hours to please him with it. PHIL: That had to be devastating. JOHN: Yeah. He was so upset at me. PHIL: Do you remember what the passage was? JOHN: Second Samuel 7. Yes, I remember; I will never forget it. So anyway, he then ramped up his grip on me because I think he believed that the Lord had called me to preach, and he wanted, in whatever time he had, to get a grip on me and get me going in the right direction. So when I came to the end of seminary, he called me in his office and he says, “I am concerned that you will continue to work hard enough to get the meaning of the passage, so I have a gift for you.” He gave me this huge box, and in it was his set of Keil and Delitzsch that he had for like thirty years, and marked up with all his own markings and stuff. He said, “Now you have no excuse.” I still have that treasure. JOHN: And one of the wonderful moments of my life was he went to heaven. He got some kind of dementia toward the end of his life and kind of didn’t remember things. But when he died, the family asked me to come and speak at his service. I was so thankful for that, because he must have felt that along the way somehow I’d learned how to get the point out of the passage. So that was really an honor for me. If you find an old Scofield Bible you’ll see his name: Charles L. Feinberg. PHIL: So with all these influences on you – your grandfather, your father, Dr. Feinberg, you went to seminary and all that – from which of these have you benefitted the most? What would you say is the most formative influence on you, other than the apostle Paul? JOHN: Yeah, I was going to say. You know, it’s just a blending of all those things. Obviously your parents have this dominating affect on how you will face life and how you view Christianity and all. But all of those pieces came together. My dad: huge, huge influence on me because of his integrity and his love of the church and his pastoral ministry for so many years. Feinberg for his exacting precision and high demands. There was one other guy in my life who gave me a lesson that has really shaped my preaching, and that was a guy named Ralph Keiper. Ralph Keiper was Donald Grey Barnhouse’s personal secretary. And Barnhouse was in Philadelphia in the heydays of his ministry, and he was doing Eternity magazine. Some of you guys may remember Eternity magazine years ago. And Barnhouse was formidable as an expositor of Scripture, and a theologian, and he was a ranging kind of guy. He could do the book of Romans and say everything in the Bible in the exposition of Romans. So he was really, really thorough. So Ralph Keiper was his personal secretary, and also a very good Bible teacher. He only had ten percent vision in one eye, so it was kind of an interesting little guy; couldn’t see very much. But he came out here to speak when I was in seminary, and they asked me to drive him around; and we became friends. He came two or three times, and he always wanted me to drive him around. And he used to encourage me that if I wanted to effectively explain the Bible I had to use the Bible to explain the Bible, that the best explanation of the Bible is in the Bible. Because of analogia Scriptura, the Scripture’s analogous to itself, single author. And he put in my hands Treasury of Scripture Knowledge. Treasury of Scripture Knowledge was a tool that I’d never even heard of or ever seen. In the early years of my ministry, probably the most helpful tool I had. And that’s why if you follow the way I preach or even the way we preach, or you heard Mike preach today, you explain the Bible with the Bible. You find the truth in a given passage, and then you broaden it, you lift it higher, you go deeper by bringing other Scriptures around it. The Bible is its own best interpreter. So that was a huge, huge help to me. And he challenged me with my Greek New Testament since I was bent on the New Testament. With my Bible and Treasury of Scripture Knowledge, I could preach the rest of my life. So that was a huge point. That shaped my preaching more than anything else. I don’t remember anything in homiletics class in seminary at all being helpful. PHIL: Yeah. You gave me that same advice, and I’ve always used it, The Treasury of Scripture Knowledge, basically a collection of cross-references. So you go to any text. JOHN: Well, cross-references not to the same word, but to the same idea. PHIL: Right, yeah. So you look at any text in Scripture and there’ll be these references to other Bible passages that either say something similar or can illustrate it or whatever. It’s an amazing tool. I agree with you, it’s probably the single tool I use most, other than Scripture itself, yeah. Yeah, thanks for that advice. PHIL: It’s had good effect. It’s a little nerve-wracking; but, yeah, it’s had good effect. The first time I preached you weren’t here obviously, or you would have been preaching; but preached from the pulpit here. And you listened to the recording later, which I had hoped you wouldn’t, and you said, “I listened to your sermon.” And you said, “You know what you did really well?” I said, “What?” You said, “When you read the Scriptures,” which is much, much kinder than saying, “You missed the whole point of the passage.” I’ve always remembered that, and I appreciate the encouragement. JOHN: You’re way beyond that, Phil. PHIL: So bring us from Talbot to Grace Church. How did you get connected with this church? You were in Southern California all that time, right? JOHN: When I was in seminary I was – well, I started when I was in college. I was an athlete, I was playing football and all that kind of thing. But I was also teaching a college Sunday School class in my dad’s church. So that’s where I met Patricia; she was one of the college students in the Bible class that I was teaching on Sunday morning. So it was very natural when I graduated from college and I knew the Lord had called me to go to seminary to just kind of hang in there with my dad. And I served alongside of him, continuing to work with youth and do a lot of other things while I went through seminary. After I graduated from seminary my dad wanted me to come back and serve alongside of him; that was his dream that we would share that ministry together. But it was obvious after, you know, a relatively brief time that we were both doing the same thing. You don’t need two preachers in one church that size. So it was a kind of a sad thing for him because he had kind of put his hopes in the fact that we’d be together. There was no animosity; I mean, he knew the hand of the Lord was on it. So I left being alongside of him and I went back to the seminary, because Dr. Feinberg called me back and asked if I would become the seminary representative in this sense that I would kind of be the model of somebody who graduated from that seminary preaching. And they would send me around to preach, and that would kind of demonstrate what the seminary did. So I did that for, I don’t know, two-and-a-half or so years, and I preached about 35 times a month, and I did that month after month, after month, after month, and I crammed ten years of preaching experience into a very brief time in all kinds of settings, churches – everything from junior high to older people to a lot of college campuses. A lot of high school Bible club – that was a big thing back then – a lot of youth ministry things. PHIL: Did you have a collection of standard sermons or were you making new sermons all the time? JOHN: Yeah. No, no. When you’re doing that, that’s the revolving door of itinerant preaching, and it was very – I mean, it was okay, that’s what the Lord wanted me to do. And I learned how to communicate I think there, because I liked to speak to junior high kids, because they’re not interested they have the courtesy to talk. So it just made sense for me to figure out how to get their attention. But I was very frustrated at the end of that two-and-a-half years, I just couldn’t hear myself say the same thing one more time. It doesn’t lend itself to the disciplined study that I wanted so desperately. So I told them I just need to go pastor a church, that’s what I want to do. Two churches talked to me a little bit and said I was too young, didn’t have enough experience – I was still in my twenties. But this church, I spoke to – this church had a high school camp, and I went to that high school camp and I spoke, and we had a great time. And so, the kids came back and their pastor had died, second one in a row. Two pastors in a row here had died, they had two widows to support; and the only qualification for the next guy was youth. So I met the qualification. PHIL: You were 29 years old. JOHN: Yeah. The kids came back from camp and said, “Can we get that guy that spoke to us at camp?” And so I came, and it’s kind of an interesting story, it’s not an unfamiliar one. But I had been up at Hume Lake Conference all summer and I had been studying Romans 6, 7 and 8 to try to understand them with no necessarily – no view to preach them, but to come to grips with the whole issue of spiritual identity and the flesh and the Spirit and the war, and all that’s Romans 6, 7 and 8; and I just spent weeks and weeks on that. So they asked me to come here and speak on an evening, and I had that so much in my mind that I said, “Well, okay, I’ll do that,” and I just stood up and just kind of unloaded that, and went for an hour and twenty minutes. That’s kind of legendary for those early people. An hour and twenty minutes and you’re a guest speaker is just really ridiculous. But I was just trying to explain to them everything I’d come to understand about those passages and I was oblivious. So afterwards, they said to me, “Would you teach us like that every week if you were here?” And I said, “I would. I would.” And so they invited me back the next week, but the next week they had a huge clock on the back wall, it was so big you couldn’t miss it. So they liked that kind of teaching, they just didn’t need that much of it at once. PHIL: Joel Beeke knows this. But at the Metropolitan Tabernacle in London where Spurgeon used to be there are actually two clocks in the pulpit. One of them gives you the time, the other one counts down. And when it gets in the red zone, if you don’t stop you’re in trouble. I was there once when Joel Beeke went about ten minutes overtime. It was good. JOHN: Yeah. No, we have a clock in our pulpit, too. But you know what; if I had a clock or didn’t have a clock, I would go exactly or essentially within probably 60 seconds. PHIL: Do you know what the vote was when they said, “Let’s vote on whether to call this man or not?” Was it unanimous? JOHN: No. No. I don’t know what it was, it was enough. JOHN: You take what you can get, right? JOHN: And if they all voted for you before you came they wouldn’t need you. JOHN: Yeah. I mean, why would a guy do that the first Sunday he’s here? JOHN: It was Matthew 7: “Many will say to Me, ‘Lord, Lord,’ and then I will say, ‘Depart from Me, I never knew you.’” I mean, I was blasting that out the first Sunday here. PHIL: You know what; it did set the tone for your teaching. JOHN: It did. But you know, there was a reason behind that. JOHN: I had become very aware that churches were filled with unconverted people by traveling around all over the place. And I mean, you know, judgment begins at the house of God, and the judgment begins when you bring the Word of God to bear; and, yeah. But I think back, I could have come in a little more like a lamb and less like a lion. PHIL: I wouldn’t change a thing of it. It’s full of exuberance and passion and kindness. JOHN: It rained really hard, and we were in the chapel. It was raining, and I was full of passion and zeal. This was what I had longed for and desired. And I knew I was embarking upon the desire of my heart, which was to week in and week out sequentially go through the Word of God. That’s what I’d always wanted to do; and it wasn’t because I wanted to preach it, it was because I wanted to study it so that I would understand it. It was hard for me to just read the Bible and then close it and not know what I read. I was frustrated. People would say, “Spend 15 minutes a day reading the Bible.” I was very frustrated by that if I didn’t know what it meant. Well, you know that about me; I have to know what this means. PHIL: That’s the curiosity your dad used to punish you for. JOHN: But he was routing me in the right direction. PHIL: Yeah, you said that the other day in the Q&A. You brought up the fact that one of the first things you said was you needed 30 hours a week to study. And I thought back to that; you were the first pastor I ever knew who spent that much time in this study. Every church I was in you figured the pastor would study maybe 10 hours a week, and that was a lot. So when you said that to them, did they gasp? JOHN: Yeah, they did, because they couldn’t understand it. And I had in some sense to validate it by showing up on Sunday with something that appeared as if had had some effort. PHIL: Of course. Well, we have all those tapes, and I would say you succeeded. JOHN: Well… It was for me the incredible opportunity to just spend the time. I was trying to understand the Scripture, trying to understand accurate theology. I was being kind of reshaped in my theological thinking in those early years, and I knew everything was at stake. PHIL: Were you consciously trying to build an understanding of doctrine or were you more just concerned with this week’s text? JOHN: Well, no, because as an expositor you’re never just concerned with this week’s text; everything is a flow. And I read probably always, always 15-20 commentaries, because I didn’t want to miss any illumination from the past that would open up some truth in the text. But also I was learning theologies. If you’re reading a sacramental kind of commentary series, you’re going to see how a sacramentalist deals with it. If you’re reading Reformed commentaries like William Hendriksen you understand how Reformed theology connects to the text. If you’re reading a devotional commentary you see that. So I was getting a larger education. I never studied to make a sermon. When you find systematic commentators, you’re inevitably going to find their theology. If they’re honestly dealing with the text, then that helped train my theology, taught me what to expect and what not. JOHN: I never really used those. Seminary basically cured me, directed me another way. But there were some crisis moments when I had to jettison some things I had been taught. One of those monumental moments was preaching through the Sermon on the Mount in Matthew and realizing that everything I’d been told in seminary about the Sermon on the Mount was not true. PHIL: Right, because in seminary they were telling you the Sermon on the Mount applies to a different dispensation. JOHN: Yeah, it’s kingdom living in the future millennium. I couldn’t understand that to start with, it didn’t make any sense to me. But by the time I got through Matthew 5 to 7 with Reformed commentators and particularly with David Martyn Lloyd-Jones’ commentary on that, all of that stuff had disappeared. JOHN: Was called Kingdom Living Here and Now. So that was the declaration that I had abandoned kingdom living then and there for kingdom living here and now. And then I was sort of trapped. I was like the guy in the Civil War with gray pants and a blue coat, I was getting shot by both sides. I wasn’t reformed enough for the Reformed, and I wasn’t dispensational enough for the dispensationalists. PHIL: But you’re still in that kind of position a little bit. JOHN: Well, no, because I think – hey, you want to know the truth? Joel Beeke wants to have a Puritan Conference at Grace Church. That says something. JOHN: You know, presuppositional systems I abandoned. My hermeneutics yielded to me what I think is a true understanding of the text. Presuppositional systems imposed on the text is what disappeared for me. JOHN: Well look, if you’re going to do the whole New Testament, every doctrine that you affirm has to stand the test of every text. JOHN: But I was eventually let in to the Holy of Holies, the evangelical Holy of Holies when R. C. Sproul started inviting me to Ligonier conferences. I thought, “How does this happen?” I said even at his – well, yeah. And then he assigned me – the first thing he assigned me to preach on, “The Doctrine of Election.” He was just impish enough to throw me to the Reformed wolves on that subject the first time. He sat in the front row with – like he sat like this, with a Diet Coke in his hand, and no Bible anywhere in sight, and he’s just checking me out as I’m standing before 4,000 people trying to explain the doctrine of election to the guy that invented it. PHIL: Did you study more than 30 hours for that one? JOHN: Yes, I did. Yeah. PHIL: He later said that was a great message, one of the best messages he’d ever heard on this subject. JOHN: Yeah, but he also said he got tired of trying to tell me what I actually believed. No. Yeah, I think that that occasion created a bond with us that just grew from there into a friendship. PHIL: That was an amazing friendship really. JOHN: It was tremendously enriching to me, and I always felt like an outsider. I should say in the early times I felt like an outsider. But I was so honored to be in the same environment with him and people like Sinclair and other guys. At first I felt like I was kind of not in my place. But to be embraced by those guy whom I’ve grown to love so much was a great honor to me. You know, I wasn’t raised in that, but it stood the test of every text I ever studied. JOHN: Well, Calvinism only makes sense when you get the depravity doctrine right. PHIL: That’s right. And it’s really the easiest of the doctrines of grace to understand from Scripture and see. JOHN: And it necessitates all the rest. JOHN: You sent me over to some Ramada Inn with orange carpet to stay there. And they had no heat, and it was in the dead of winter in Chicago, and I had to take the carpet off the floor and put it on top of the bed not to freeze. PHIL: You should have called me, I would have warmed up my car and let you sleep in there. JOHN: Great way to start a friendship, Phil. PHIL: That’s how I knew it would last. If you still liked me after that, then it was going to be okay. JOHN: That’s not an issue, I love you. PHIL: You too. So back to the beginning at Grace Church. Describe some of the changes that you realized immediately were going to have to be made. This was a church that had come from a pastor who’d come out of Methodism and Arminianism. And I think the second pastor was a Baptist, right? So it had shifted a little bit theologically, but really wasn’t anchored in any identifiable doctrinal stance. So doctrinally and even ecclesiologically some significant changes needed to be made. I want you to talk about that, and then I have a specific question about it. JOHN: Well, they didn’t even have a doctrinal statement. PHIL: No. I forget what it is. JOHN: I don’t know. It doesn’t matter because it’s not a doctrinal statement. JOHN: Yeah. So there were people here who had Bible background, Bible background, and they were really warm and receptive to me. But they had no sense of biblical ecclesiology. They had all kinds of crazy structures and organizations, and a lot of unconverted people on boards and in their choir, and it was a mess, which is why I preach on Matthew 7 right out of the gate. In my mind I had, “I may never preach again; I’ve got to do this this time,” that’s why it was the first one. But there was a ton of work to do. So I knew I needed to preach, but I also knew that if I tried to preach through texts of Scripture to build a systematic theology would take forever, and it would take too long. So what I did was I started – first of all, I wanted to start basically in the gospel of John, because nobody can argue with Christ; and He’s such a compelling person. So the first two years was just the gospel of John. PHIL: This is just your own notes, or did you use a text? JOHN: Yeah, a combination of my seminary notes and my notes, and I made some – there were some little books that were kind of simple, like William Evans and Emory Bancroft, little theology books; and there were the abstract by Berkoff. And so, I would encourage them along that line. But they really weren’t ready for that book kind of thing, I had to kind of walk them through that. And that’s how we developed the leadership at the church. So the leadership was being sort of taught theology behind the scenes; and that went on for many, many years, while we were expositing the Scripture together. I have to exercise – like Paul says, “Preach the Word but do it with patience.” So you have to be very patient for all these changes to take place. PHIL: That’s what I wanted to ask you, too. I’ve heard you say, and I think it’s a profound observation, that the number one mistake a lot of young pastors make when they go into a church is they’re impatient in making the changes that need to be made. JOHN: People are where they are because somebody they trusted brought them there. Might have been their parents, might have been their grandparents, might have been a pastor that led them to the Lord, friend that led them to the Lord; they’ve sat in the Sunday School class, the Sunday school teacher. You can’t walk in and just by the sheer force of your own personality or authority make them throw away all those influences. It is a long process of loving them, being patient with them, instructing them carefully in the Word of God, and not only telling them what it means, but showing them why it has to mean that. Really good Bible exposition does not tell the people what this text means, it shows them what it must mean; and the best way to show them what it must mean is to use other Scriptures that elucidate on that. You couldn’t argue – for example, listening to Mike this morning, he could not argue any of his doctrinal points, because he bolstered all of them by going all over the place to other Scriptures. And that’s how you preach expositionally, with the process exposed. And over time, over time they begin to let go of things that – and I think happily so as the light begins to dawn. There’s nothing more offensive to Arminians than the sovereignty of God in everything, they hate that. But once they see it, they see it everywhere, because it is everywhere. Then they can’t avoid it, it’s on every page of the Bible. And then they’re different people. Worship is dramatically changed when people understand the doctrines of grace. Worship is revolutionized, because now you have to try to contain them, not whip them up. You’ve got to whip up Arminians; you just have to kind of hold on to Calvinists. JOHN: Well, that’s the only way to do it. If I give you my best shot first and you don’t buy it, I might as well stop. PHIL: Well, it was brilliant. So just listening to you teach like that, the polemical aspect of your sermons has shaped my own theological conviction more than anything else. JOHN: I don’t know what I do; I don’t know why I do it. People say, “Do you rehearse your sermon in front of a mirror?” Are you kidding? I don’t even understand that. I’m not even self-conscious, I don’t even know what I’m doing. The only thing that’s going on is this thing in my mind to give these people this truth. I’m oblivious, I can’t be self-conscious. If I’m an actor, if I’m an actor and I memorize lines, then I can think about acting. But if I’m a preacher and I’m just fighting to make this truth clear and pour out my heart, I’m utterly unconscious of myself. PHIL: Yeah, I realized that about you in the late 1980s after The Gospel According to Jesus came out and there was some controversy about it. And ETS decided to devote a major couple of sessions to the subject. They asked you to deliver a paper on James chapter 2, “Faith Without Works is Dead.” And I think it was – oh, what’s his name from – somebody. Somebody gave a paper on the other side. JOHN: Except it didn’t persuade him. PHIL: Of course it didn’t. JOHN: He was down the road, yeah. PHIL: But I asked you afterwards, “Does it trouble you when you know the person who’s most hostile to your view is sitting right there in the front row?” and you said, “I didn’t even think about that.” It didn’t even cross your mind. PHIL: It was an amazing thing. JOHN: People ask me that, “Do I worry about how guests in the church are going to respond to something I say, like against Catholicism or Mormonism?” That thought never enters my mind. I’m not aware of what I am supposed to do not to offend somebody. I’m not trying to offend anybody, I don’t want to, and I think we have to speak the truth in love; and tone goes a long way, and demeanor goes a long way to demonstrate a kind of affection and a kind of compassion for people. But I’m never – you know, in fact, recently I did that Ben Shapiro program. I don’t know if any of you ever saw that. But the closer I get to somebody, the closer I get to somebody eyeball to eyeball that needs the Lord, the more likely I am to drive at what I think is the best way to get to their heart about the gospel. He’s a fine guy in many, many ways. But I think we have to – well, we have to preach the gospel whatever the response might be. But you might be surprised that being direct communicates compassion and care and love, and that your own conviction is really your conviction. PHIL: Yeah. You excel at that, John. You were on a string of Larry King Live programs there for several years, and they were all great. I asked you once, “Were you nervous going on there?” and you said no, you knew what you were going to say no matter what he asked. You were going to say what you had planned. JOHN: The questions were irrelevant. PHIL: Right. My response was I was nervous for you. I was always nervous for you. PHIL: Well, it’s still very remarkable, because even if I knew what I was going to say, if you set Deepak Chopra next to me and I knew he was hostile, it would rattle me. JOHN: Well, no. Deepak, no. You know, Deepak has a problem, because Deepak is very small, and he thinks he’s God. He’s a pantheist and he thinks he’s God. PHIL: Literally think’s he’s God? JOHN: But pantheism may be limited to everyone but me, because he does not like me. But the interesting thing about him is he always wanted his chair cranked up so he got to my level, because it’s hard to be God and be shorter than people who… You get the dilemma, right? PHIL: All right, let me get back to the question I asked earlier about changes that needed to be made. What were some of those changes? JOHN: We needed to put spiritual leadership in the hands of the right godly men; that was the number one issue, and that’s why I started that class; and we needed to take spiritual authority away from the wrong people. There were, I don’t know, five, six, seven boards around here that were making all kinds of judgments made up of all kinds of people of who knows where. So there were people who needed to stop having official responsibility and people who needed to be given spiritual responsibility. PHIL: It’s really hard for someone with your depth of conviction to be patient when changes like that need to be made. So what did you do? JOHN: You’re never going to get them anywhere if you don’t love them in the process. JOHN: I remember there was this big guy named Frank, and one of the early times he introduced me and he said, “This young guy thinks he’s going to come and be a leader around here; we’ll see.” That was the introduction to a large group. He was really snide and cocky. So next time I saw him I put my arm partway around him and just told him I was going to be praying for him and I loved him, and if there’s anything I could ever do for him I wanted him to let me know. You just don’t gain anything if you just start having grudges about people. I had patio protests out here, a whole Sunday School class sitting in the patio with their backs to the Worship Center. PHIL: But this is a group of people in the church? JOHN: Oh, yeah, I know. But this is a Sunday School class of adults because we took away their teacher because he was teaching bad stuff. PHIL: That’s a story I hadn’t heard. JOHN: “That’s our teacher”; you know how a guy’s been teaching a class for a long time. There was a silent patio protest. So I just had a meeting with them and I said – I just started the meeting by saying, “I read 1 Corinthians 3. Are you not carnal? What are you doing?” But in the process you confront them with truth, but you have to love people in the process. The potential to make enemies over a half a century in the same church is massive, it is massive. I mean, “Who doesn’t offend with his tongue is a perfect man.” That’s not me. And how many other offenses have I laid down in half a century? How do you overcome that? I’m more concerned about me than I am about somebody else’s issues with me. PHIL: Wow, that’s pretty good. JOHN: Take heed to yourself and your doctrine, and you exhibit patience; and in the process you’ve got to reprove, rebuke. Probably the biggest, most dramatic change that we made in the church was to introduce church discipline. PHIL: How far into your ministry? JOHN: Oh, just a few months. JOHN: Yeah. And I didn’t know any church anywhere anytime that I’d ever heard of that did church discipline. And I asked a few pastors and they said, “You’ll empty the place, you cannot do that. You mean you’re going to stand up in a church service and give somebody’s name and tell their sin and put them out?” I said, “Well that’s what it says; it’s not difficult.” But we have to do it. We have to do this, this is what Scripture says. And it was months, it was a few months. There was a guy in the church who was an elder, a piano player and teacher of a Sunday School class. So he came to me, he and his wife, and said, “We have a daughter who’s going to get married and she’s going to marry this divorced guy from Las Vegas. And he’s not a Christian, but we’re praying for him. But she’s going to marry this guy and we want to have the wedding at the church, and we’d like you to do it.” Okay, that’s not going to happen. So I went to the elders and I told them what the story was, and they said, “Well, we’ve got to do it; he’s involved in the church.” I said, “We will violate the clear instruction of Scripture if we marry a believer and an unbeliever. What concord has Christ with belial,” and went through all that. That whole family left this church. The price was high, but the moment transformed this church. JOHN: And I’m thankful for that, because that was so clear cut. It wasn’t like Solomon cutting the baby in half. PHIL: Caused any angst at the time? JOHN: No. No. No, right never causes me angst. PHIL: Not even when you were younger? JOHN: You mean like I worried about what would happen? PHIL: No, just – I mean, that’s a difficult situation to go through, right? JOHN: Well, I felt bad for the people, and I tried to be kind to them and just let them know that I can’t do this; this is not going to honor the Lord. PHIL: You would have been probably the youngest of the elders at that time, right? PHIL: Was there anyone else? I mean, you mentioned the guy that said you’re younger. JOHN: Well, there was one other story you need to know. I came in 1968, on December 21, 1968. Three astronauts, Apollo 8, went around the moon and came back. This is massive. I mean, this is the moment, right, of all moments in American exploration history. We’re in a race with the Russians, so this is ’68 in December, 21. Four weeks before that there was a guest preacher here – I won’t give his name – who preached a sermon on “Why God Will Never Allow Man to Reach the Moon.” So it was silly. PHIL: He had biblical reasons for that? JOHN: Yeah, he tried. I wasn’t here then, so I don’t know. But it’s kind of an interesting tale. Six months later or so, I think it was July 21st of 1969, they’re walking on the moon, and so everybody kind of associated my coming here with all that moon stuff, because I came in the middle between the two moon deals. But just to show you, they actually had a preacher who said something the Lord wouldn’t do and it happened immediately. They saw the foolishness of that, and I think they wanted some more seriousness. I think they were ready for the teaching of the Word of God. JOHN: Yeah, and they never resisted it, that there were questions always. But they never resisted the teaching, particularly I think because I was teaching John in the morning, Sunday morning; and you can’t improve on the person of Christ. So compelling, so magnificent, so glorious in the gospel of John. I just wanted them to – the ones that weren’t converted – to come to Christ, and I wanted the rest to love Him more. And I think going two years through the gospel of John focused this, the whole church on the Lord Himself. And then we did a lot of teaching about spiritual gifts, because I believe that the body of Christ – first book I wrote, The Church: The Body of Christ. That was early in the ministry here – I don’t remember the year it was. Then that guy came to write an article about the church. And we had 900 people then, and he had titled the article – Lowell Sanders from Moody, and he wrote – the article title was “Church With 900 Ministers.” And that was his observation, that people were busy ministering. And those were the two early – focusing on Christ and seeing the church as the body of Christ where everyone is gifted and every serves. Those were transformative years for our church. JOHN: Was that Willie Still? Yeah. PHIL: And he said, “How did you do it? What was the secret to the longevity of your ministry and all?” and that pastor told him it was more like multiple ministries, seasons of ministry, that things pass and you realize – and I know you’ve had this experience. You realize you’re actually ministering to a group of people who weren’t there at the beginning. You almost have to go back and redo some of them. JOHN: You can go a lot of places and minister to different churches, or you can stay in the same place and minister to different churches. PHIL: Right. How many seasons of ministry like that would you clock? JOHN: You have not only an ebb and flow of people seasons, but churches have seasons. There’s winters and there’s summer and there’s spring. Churches go through seasons of trial and seasons of joy and seasons of challenge and seasons of flourishing. But there’s an ebb and flow. If you go back to the beginning there’s still charter members here. And I’m also ministering to the fourth generation, to the great-grandchildren of the people who were here at the beginning. But in the process, this church has absorbed the city of Los Angeles, and it looks like LA, as it should, because this is the Lord’s church in Los Angeles. So it’s changed as the city has changed. This was originally a Jewish community, totally Jewish community all around this thing; that’s why the synagogue is down the block. It has morphed, and we think there’s about 11 languages within a 5-mile radius here. And there’s a Buddhist temple on the other end. PHIL: So it’s a Thai community now. JOHN: Yeah. And then there’s a lot of Arabic people. I’ve said this through the years: if you tried to follow the church growth experts and find some target culture, we wouldn’t know which one to pick. In fact, when Fuller Seminary started doing church growth stuff under Donald McGavran and Peter Wagner – was kind of a goofy guy for sure. But they were doing these church growth things at Fuller with McGavran and World Mission and all that. Peter Wagner said, “We want to bring people to Grace because we’re the fastest-growing church.” And they were all into ’01, ’02, ’03, and all that analysis of you pick a culture, you pick a target culture, and you do everything that suits that culture, and you drive your church in that cultural direction. And so, Peter Wagner, these modular classes, he’d bring these guys over, and I’d sit down and spend a couple hours talking with them. And they’d bring him to a church service. After doing that for, I don’t know, maybe a year or several different classes, he called me and said, “I’m not doing it anymore,” he said, “because it confuses our students, because you don’t fit the model.” So I said, “Peter, that’s pretty selective research. Maybe the model needs to be adjusted. But we were always diverse, and continue to be diverse, which is absolutely wonderful. PHIL: There are lots of ways that you don’t fit the narrative, and I get the feeling you like that. JOHN: No, it’s not a matter of like it. I just want to be biblical. I don’t worry. JOHN: We have a culture, it’s called the kingdom of God. PHIL: Right. Talk about that, because in a way, it is the secret I think to the future longevity of your ministry and the far-reaching aspect of it, that because you’re not into cultural issues, but you’re teaching Scripture and explaining Scripture with Scripture, and illustrating Scripture with biblical anecdotes, it translates into any culture and any time. JOHN: Yeah. I don’t really care what the culture’s doing. I mean, it ebbs and flows and shifts and changes. What does it have to do with the kingdom of God? It has nothing to do with the kingdom of God. My kingdom is not of this world; they don’t offer me anything. I don’t need to understand anything about them other than what the Bible tells me about them. I’m not looking for cultural cues. Now I will say, “Tonight I’ll talk a little bit about 1 Corinthians 9, becoming all things to all men,” I understand that. But that’s been prostituted to make it mean something it doesn’t mean at all. I don’t want to be insensitive. But I have just watched the nations of the world come to Grace Church, and culture is part of their heritage, but doesn’t intrude into the kingdom of God in any sense. So I’m not looking for anything for the world to give me, any clues or any cues or any supposed access to hearts. The Word of God is alive and powerful, it’s sharper than any weapon. The Spirit saves through the Word. By the Word of Truth you’re begotten again. So I’ve never thought about culture. In fact, I think when you do that you inevitably get too close to it; and then it’s hard to draw the line for your people. PHIL: Right. One last question. You’re not only pastor of Grace Community Church, but you head a number of very large and complex organizations. How do you do that and manage your time? What’s the secret to that? And in the midst of all that, how much sleep do you get every night on average? PHIL: You still lead us, you know. JOHN: How do I do that? JOHN: But I don’t tell you what to do. JOHN: There is some truth in that. PHIL: Yeah. There’s a lot of truth in that. JOHN: Yeah. I just think the Lord surrounds you with people. I mean, you could ask the same thing about anybody in a corporate situation; there’s a certain leadership that you provide. And I provide that not so much in a personal way – although for some people that’s true. But primarily in articulating with clarity the message and the mission from the pulpit and whatever other books or whatever. But it’s just the Lord has just collected people around us. It’s just that it’s amazing how many incredibly gifted people the Lord has brought to Grace Church through the years, and then gone through here and gone out. We have about 100 missionaries now out in TMAI training thousands of pastors and church leaders around the world. And we just added about three new schools – one in Lebanon, and one in Brazil, and one in Japan – and ready to add another one in French Canada Quebec; and this is just guys training the next generation of pastors and leaders. Yeah, it’s just amazing; and I’m a spectator. I need to say this. This is not my vision, I never had a vision. The only vision I ever had I married. Nobody knows the future. No one knows the future. All I can do is teach the Word of God, live a faithful life, disciple the people that God gives me; and only He knows the future. And I think you have to be very careful. The most popular con in the evangelical world is for some guy to say, “The Lord gave me the vision of this, we need to plant ten churches here and five over here, and build this, and do that, and do that.” When you start hearing that, it’s a good time to go out the back door, because somebody’s about to steal your wallet. And what’s going to drive that is personal ambition, not any word from heaven, because God’s not giving that kind of revelation. PHIL: Right. Well, John, I want to say this, and I know I speak for multitudes: thank you for your faithfulness, because there is no more profound influence in my life, no better example I’ve ever seen in the flesh; and just grateful for your faithfulness over all these years. And I know I speak for all of us just to say thank you for what you teach us.
2019-04-18T20:49:55Z
https://www.gty.org/library/sermons-library/SC19-3/fifty-years-of-pastoral-ministry-interview-with-phil-johnson
In addition, the Swiss government plays a proactive ongoing role of factory supervision for Swiss-based manufacturers. This double layer of Swiss and European regulation and supervision provides a substantial level of protection for the American consumer who buys authentic Swiss-made skincare products such as PHYTO5 skincare. The article further explains that the laws governing the role of the Food and Drug Administration’s Office of Cosmetics and Colors run just two pages long and have not been updated since 1938 when they were first enacted. That office with an annual budget of just $8 million and 27 staff members is now facing a seventy billion dollar a year American cosmetics industry. The F. D. A. does not require companies to submit safety data before they market a product while in the European Union a product could never be put on the market without such basic documentation. The F. D. A. does not monitor adherence to basic manufacturing standards while the Swiss government makes it its business to do so. In the U. S., manufacturing companies are not required to report problems attributed to products while the E. U. has a central data bank responsible for distilling and coordinating all product documentation including skin and toxicity tests as well as any adverse events attributed to products. Although the article states that the F.D.A. also does not ensure the safety of imported cosmetics which have doubled in volume in the past decade, it fails to state that Swiss- and E. U.-made products that are also marketed in Europe meet stringent regulations that already exceed whatever has been advocated by American consumer groups. There are still many products manufactured overseas which are not subject to rules similar to those in force in the E. U. The F. D. A. inspects less than one percent of the three million or so cosmetics shipments that come in to the states every year. Among those that it does test, roughly 15% of products manufactured outside the E. U. are found to be contaminated or to contain dangerous ingredients. Most consumers are against the idea of products being tested on animals. We remind all our clients that we have never tested PHYTO5 skincare on animals and nor are any of the ingredients we use tested on animals. Animal testing is, in fact, no longer necessary since by E. U. regulations, all products must pass independent toxicity tests to ensure no harm, irritation or toxicity to human skin. Both the state of California and federal government are considering tighter measures to regulate the production and distribution of skincare products made in the U. S. but the proposals are receiving substantial pushback from the industry and given the reluctance of the current administration to impose regulations on businesses the federal bill is likely to be defeated. If a bill were to pass it would be greatly diluted, therefore it remains that products made in Europe represent a far greater level of consumer safety. Keeping in mind that the skin absorbs what we put on it and what comes into its vicinity, and since the U. S. is largely unwilling to ensure that our skincare products are actually and totally safe for our health, it makes complete sense to buy 100% Swiss-made skincare such as PHYTO5 which has been subjected to a double layer of Swiss and European regulation and supervision. Beware of companies using the Swiss flag in their branding or catch phrases and titles using the word “Swiss.” In many cases, these products are merely Swiss-inspired or only a small percentage of the product was actually produced in Switzerland. Rest assured that PHYTO5 skincare is 100% made in Switzerland. Combine this with our natural, holistic and vital energy concept and you will enjoy Swiss skincare capable of delivering benefits to you most other skincare lines cannot claim. * To gauge consumer’s thoughts and feelings on skin care, The Benchmarking Company surveyed more than 4,600 female beauty consumers about all things skin care. Part 1: March 2019: Consumer attitudes, generational concerns, unmet needs, what she’s using now and products she’d like to try. Part 2: April 2019: What they’re willing to spend, on what and where; key purchase influencers; consumer-approved trends; retail category picks. Part 3: May 2019: Generic skin care and skin care kits; the continued appeal of luxury and mass skin care; social media and beauty loyalty programs; natural and organic skin care product and brand appeal. The Editorial Board. “Cosmetics Safety Needs a Makeover.” The New York Times, The New York Times, 9 Feb. 2019, www.nytimes.com/2019/02/09/opinion/cosmetics-safety-makeup.html. Lipton, Eric. "F.D.A. Has 6 Inspectors for 3 Million Shipments of Cosmetics." The New York Times. The New York Times, 02 Aug. 2017. Web. 16 Feb. 2019. Gleason-Allured, Jeb. “New Skin Care Report Series: What 4,600 Consumers Think.” Global Cosmetic Industry, www.gcimagazine.com/marketstrends/segments/skincare/New-Skin-Care-Report-Series-What-4600-Consumers-Say-505218081.html. One of the four 18-day periods of the year that occur between energetic seasons in traditional Chinese medicine (TCM) has arrived. In TCM, each season is represented by an element and this “between seasons” period’s element is Earth. If you are out of balance with the energies of Earth, you may find that your skin is experiencing symptoms of toxicity likes blemishes, acne, enlarged pores and more. In Earth imbalance, you may also feel stuck or stagnant, perhaps unable to complete projects. You may also feel overly worrisome as you take care of other people to the detriment of caring for yourself. Aside from the usual admonition to get a massage, here are a dozen beautiful ways to give yourself some love, nurturing and self-care and get back in harmony with the Earth element. If practiced, these tips will serve not only your body, but your mind, emotions, and your very spirit as well! Be conscious of what you put in your body. Learn to create a yin/yang balance through your food choices to promote your health and longevity and really, just show your body some love! Be sure to incorporate produce from all colors of the rainbow but, in particular, try to focus on consuming produce the color of the current energetic season. For example, during energetic Spring, eat lots of fresh green produce because green is the color associated with Wood, the element of the season according to traditional Chinese medicine. Read food labels. Go conscious grocery shopping and see how great that feels! Don’t just buy food because you’ve always bought it or because it looks good. Know what you’re putting into your body. Love your body enough to understand the relationship between how you feel and your food choices. Buy more food in the produce department than from any other department in the store. Be conscious of what you put on your body. There is actually clothing being developed now that helps your body heal and sleep better.** Opt for quality rather than quantity and you'll feel so much better. Choose organic cotton if you can. Choose colors that resonate with you and cause you to feel at ease. PHYTO5 skin and haircare is another example of high integrity products you can put on your body and feel good about because they’re formulated and manufactured consciously with your safety and vitality of skin, body and emotions as the goal. Be conscious of what you allow into your mind. Turn off the news and play beautiful music. Take this time to do something creative. Contribute your creativity not your negativity to the planet. As you already know, it’s through giving that we receive. When past memories or worry arises, catch it quick and be ready with a small arsenal of pleasant thoughts or ideas you can immediately divert your mind to. Make this a practice and notice the peace you’ll feel. Practice mindful fitness. Mindful fitness is today’s catchphrase and another way of saying, meditate. Join a meditation group. You may enjoy the quickening benefits of plural meditation and make new friends as well. There are many ways to meditate (e. g. mantra-based, focused attention). Use this time to explore them and find the methods that resonate with you. This can be a fun process of discovery for you. Take time out in the middle of a stressful day to reconnect with your Self. Take this time to learn to slow down the breath to a maximum of six breaths per minute to achieve ultimate longevity and vitality. For more information on the six breaths a minute technique, visit our sister site’s blog at agelesslacure.com here. Practice yoga, a martial art, or weight training and cardio workouts. You will be amazed at how wonderful a newfound exercise practice can make you feel on all levels. You’ll breathe differently. Your posture and entire physiology will improve. Your confidence level will soar. Nature. Nature. Nature. Walk in it. Connect with it. Listen to the sounds. Be conscious while the breeze blows on your face and body. Literally hug a tree. Bring some green plants into your home. They’ll help transform the air you breathe and bring a sense of calm to your environment. Take a day trip. Get away from it all. Appreciate a change of scenery. It’s inexpensive and you’ll feel wonderful. Find three simple things you love to do, pastimes that are fun for you and then do them one by one. It’s vitally important to have fun and experience pleasure as often as we can in life. Our ability to create what is good, beautiful and true becomes limited when we come from a place of chronic angst, worry, misery, or boredom. Enjoy natural fragrances and their healing benefits. (Check out our blog on the topic here.) When you squeeze an orange or chop fresh herbs, take a moment to really drink in the fragrance. Stop at the fresh flower bouquets in the stores and breathe in their healing essences. (Beware of synthetic essential oils sold in stores today. And did you know that very few perfumers actually use real flowers in their fragrance formulations?!) You’ll never have to worry when you make PHYTO5 Swiss-made skincare using pure high-grade essential oils part of your skincare regimen. Enjoy an alternative wellness therapy like Traditional Chinese medicine (TCM) which is becoming increasingly practiced having now reached 183 countries and regions around the world. Based on the theory of the five elements and the five phases TCM guides you to live in harmony with the earth and its energies. Enjoy TCM in action with PHYTO5’s five element lines of skin and haircare. Slow down. If you feel like you’re always in a rush or stressed and pressured to get somewhere or do something, you must start now to slow down. The alternative is burnout and compromised health on all levels and we know that’s not what you really want for yourself. By slowing down and enjoying as many of the preceding tips as possible, you’ll find you are able to get all you need to get accomplished perfectly. **(Under Armour’s Athlete Recovery Sleepwear enmeshes bio-ceramic technology into pajamas that absorb infrared wavelengths emitted by the body to reflect them back as far infrared energy which, in turn, helps the body recover faster and sleep better. **Startup Lumiton offers light-energized apparel powered by laser technology that is designed to deliver multiple wellness benefits including producing red and near-infrared light whose wavelengths, they argue, increase collagen and muscle growth and reduce pain/inflammation. **Some companies are weaving “ancient wellness” healing and herbal properties into fabrics and clothing. Venice, California footwear designer Astara has created negative ion earthing shoes, using crystals like black onyx and blue apatite to make the shoes resonate at the same vibration as Earth’s magnetic field (7.83 hertz). It’s said the shoes make you feel like you’re walking barefoot on grass or sand. Some doctors are beginning to literally write prescriptions for their patients to take a walk in nature. It may sound silly but in this world where people are nature-deprived for whatever reasons, writing prescriptions for regular nature walks just may be effective in helping people regain the peace of mind and body they seek. Dan Buettner, author of The Blue Zones, a book that examines the lifestyles of the world’s longest-lived people, finds that people who live to be over 100—have movement engineered into their daily lives—a practice that is quite contrary to the everyday American lifestyle. Working in a year-round garden, cleaning the house, building a project, or walking to the store instead of driving are components of a vitality-promoting movement-oriented lifestyle that we can choose to move toward to lengthen our lives and strengthen our health. The 1984 landmark study, “View through a Window May Influence Recovery from Surgery” by Roger Ulrich, PhD, proved what the title implies. Now, 35 years later, the American Society of Landscape Architects affirms that architects, doctors and nurses all agree that hospital gardens are a necessity for healing. Research shows that even just looking out a window at a garden burgeoning with life and color quickens recovery and healing. We might term this trend of bringing more nature into our lives and workplaces biophilia, from the Greek meaning “love of life and the living world.” The more we love life and the living world, the more quality life we have. Americans, on average, spend 90% of their time indoors, but in answer to this trend, biophilic design is now popping up in buildings and communities with the development of living green walls richly embedded with green ferns and plants that work to purify the air we breathe while helping to reduce stress and foster a connection to the natural world while indoors. Nature-deficit disorder (NDD) is an ad-hoc phrase used to describe the phenomenon that human beings, especially children, are spending less time outdoors. NDD seems to be pointing to the emergence or at least acceleration of a wide range of health problems—physically, mentally, behaviorally, emotionally and spiritually. But truth is always very simple. In this case, it’s take frequent regular walks in nature or find some way to surround yourself with it. Here’s our list of 14 benefits anyone can achieve simply by taking a walk outdoors. The quiet calm atmosphere of nature causes you to almost immediately relax and achieve calm yourself; high blood pressure may be lowered; a depressive or anxious state can be uplifted. You breathe fresh pure air and oxygen to invigorate the body and mind. Walking in nature helps to clear mind fog and, as studies show, helps to increase short-term memory, mental energy and cognition. The gentle consistent pounding of your feet on the ground helps detoxify your lymphatic system which, in turn, abates or slows the aging process. You increase fluid circulation in the body so necessary for physical and mental vitality. You build the kind of physical endurance that positively contributes to heart health. You become able to progress to more advanced levels of walking like hiking offering you greater physical challenges and strength building in the natural experience. The fauna and flora reach out to you and share their natural brimming life energies with you; perhaps the frogs’ and tree toads’ songs offer you just the perfect sound healing you need or the hoot of your neighborhood owl soothes your weary soul. You begin to more fully realize your symbiotic relationship with nature; you become more connected with the natural world of which you are an intrinsic part. You become almost immediately contemplative and meditative; answers to your questions come spontaneously through your relaxed allowance. You develop an appreciation for life in general; this appreciation brings more life and vitality into your existence. You encounter new joyful experiences in nature along the way — the wonder of a type of butterfly you’ve never seen, cloud shapes that morph into interesting images or the moon that sheds her cool silvery soothing light upon you. You increase your powers of imagination and creativity; nature gives you the safe and supportive space for unbridled imagination which may lead to manifesting your heart’s desires. Through observation of nature, you become more deeply acquainted with the wonder of life’s inner workings thereby expanding your inner wisdom. You begin to realize that flora and fauna are sources of inspiration for our everyday lives. It is important to live in sync with the energetic changes of nature, principally the seasonal pattern, since seasons occur as a result of the movment of planet earth around the sun. Energetic changes have an influence on all life forms on Earth and our well-being depends in large part on our adapting to these changes. This is the reason why PHYTO5 skincare products use natural essential oils to provide an energetic balance according to the five elements of traditional Chinese medicine (Wood, Fire, Earth, Metal, Water) and the corresponding five energetic seasons. * (c.1493–1541), Swiss physician: born Theophrastus Phillipus Aureolus Bombastus von Hohenheim. He developed a new approach to medicine and philosophy based on observation and experience. ** Wilson has been called "the father of sociobiology" and "the father of biodiversity” and he is known for his environmental advocacy. The 2019 Global Wellness Summit has published its Eight Wellness Trends Report for the year. The Summit’s sponsor, the Global Wellness Institute, summarizes the report this way: “The only wellness trends report generated from the insights of 650 industry leaders from 50 nations, the Global Wellness Summit’s annual trends forecast is a uniquely informed, detailed and global look at what’s ahead in wellness. For 2019 we’ll see the rise of a ‘dying well’ movement and wellness remaking the fashion industry to ‘meditation going plural’ and scent playing a more dramatic role in our emotional health.’” One trend, Fragrance Gets a Wellness Makeover: A new understanding of scent’s crucial role in our physical and emotional wellbeing, gets our particular attention. PHYTO5 skin and hair care is formulated and manufactured in Fleurier, Switzerland. The Fleurier name itself roughly means "Flowering Village," entirely apropos for a company whose skincare products are largely made from the essential oils of flowers. We always bring light to the very basic premise of essential oil use in skincare—that flower blossoms, the “face” of the plant, store the sun’s solar energy and vital force and transmit these to the skin through its essential oil. But perhaps just as important to our well-being is the scent a flower or plant conveys. In the molecules of natural essential oils, the scent of the flower is inhaled and the hypothalamus(1) in the brain produces hormones that provoke an appropriate reaction in the body. The hypothalamus controls the pituitary master gland of the body and plays a key role in connecting our hormonal (endocrine) system with the nervous system. Located a mere inch or so away from the amygdala in the brain, the olfactory bulb (the neural structure involved in the sense of smell) has obvious intimate access to it. The amygdala is a roughly almond-shaped mass of gray matter inside each cerebral hemisphere. Both of these, the hypothalamus and the amygdala, are part of the limbic system, the area of the brain most heavily implicated in emotion and memory. The hypothalamus plays a role in the activation of the sympathetic nervous system which is a part of any emotional reaction. The amygdala itself is primarily involved with the experiencing of emotions. Further, biophysicist Luca Turin developed the quantum vibration theory in 1996 which suggests that olfactory receptors actually sense the quantum vibrations of odorants' atoms. It is in the arena of quantum vibration where we begin to move toward the deepest core of the mind-body system creating the space for spontaneous healing to occur. Scent registers in our brains first—before sight, sound or touch. — said Joanne DeLuca of Sputnik Futures, a company that specializes in anticipating consumer trends. Fragrance has the potential to carry meaning in its aromatic quality. The scent of rose loves and heals, myrrh is prophetic and grounding, and frankincense evokes quietude and holiness. After pausing to understand the interaction of scent, the brain and nervous system, taking time out to stop and smell the roses has more meaning for us now than ever before as we quest for authenticity and connection and strive to create more mindful lives. — says Matthias Tabert of International Flavors & Fragrances (IFF). Using scent to balance emotions and treat “disease” is actually an ancient practice and today large-scale medical studies are underway that will probably bring legitimacy to this healing modality. Because the brain produces memories in conjunction with smell, scientists are finding that scent can play a healing role in neurological disorders like dementia and Alzheimer’s disease. Treating Alzheimer’s with scent may prove effective since loss of the sense of smell is an early symptom of the disease. It is believed scent therapy can be effective with Alzheimer’s patients by triggering positive memories from their past. scent as functional/workplace wellness where scent is an invisible mood enhancer improving learning, cognition, function and productivity; a Japanese company found that diffusing a lemon scent in the air increased productivity by 54%. The 2019 Global Wellness Trends Report finds that today’s consumers by and large want 100% natural ingredients, transparency and sustainability in the products they buy. While PHYTO5’s products are rich with bouquets derived from premium-grade all natural essential oils, extracts and flower waters, they also deliver all natural holistic products formulated without animal testing and with sustainability and kindness to the planet in mind. (1) a region of the forebrain below the thalamus that coordinates both the autonomic nervous system and the activity of the pituitary, controlling body temperature, thirst, hunger, and other homeostatic systems, and involved in sleep and emotional activity. McGroarty, Beth, et al. 2019 Global Wellness Trends Report. Global Wellness Summit, 2019, 2019 Global Wellness Trends Report. “8 Wellness Trends for 2019.” Global Wellness Institute, globalwellnessinstitute.org/global-wellness-institute-blog/2019/01/30/8-wellness-trends-for-2019/?utm_source=Global%2BWellness%2BInstitute&utm_campaign=a36e55f195-EMAIL_CAMPAIGN_BRIEF_2019_1_30&utm_medium=email&utm_term=0_bbb41a322d-a36e55f195-69763529. In our blog of February 4, 2019, we addressed the meaning of living consciously and urged our readers to visit www.Liveconscious.com and, in particular, Jack Eagle’s article “Thrilled To Be Alive.” It is a topic I relate to deeply and enjoy commenting on with ideas, tools and skills that may be helpful to some in their quest to “rise in consciousness.” This arising in consciousness is a pre-condition to living more consciously for both our own benefit and the benefit of all the others around us. To live consciously has to do with awareness–awareness of self, of others and of our environment. It includes awareness of the effects we have on ourself, others and the environment. This process creates an enhanced emotional maturity that brings us to the understanding that although “life includes problems, … it does not need to include suffering.” Suffering feeds our self-created life story bending toward a dramatic view of self and of life. It is a lack of awareness “of one’s authorship of one’s life and world where one flees.” But the opening of the heart feeds a fuller, truer, and more exalted view of self and of life that makes us both happier and more pleasant for others. In short, “the awareness that there is the potential to be more fully our true self” is a jumping board toward a higher consciousness that improves our quality of life and of all the others (people, plants, animals and the environment) around us. For whoever thinks that all this is new age mumbo jumbo, consider that The New York Times reported February 4, 2019 that the British government has announced 370 English schools will start to practice mindfulness—“relaxation and breathing techniques and other methods to help regulate emotions”—in a new initiative and study aimed at addressing the mental health crisis affecting young generations. The study which runs through 2021 is one of the largest of its kind in the world. This statement leads us to see that the way to happiness requires a strong degree of conscious living. We know that many people today are more stressed than ever before and that emotional imbalance has a very negative effect on both their health and their ability to reach and maintain a state of happiness. the quantum energetic level achieved by our unique products have the propensity to balance emotions as well. We invite you to examine our conscious lifestyle skincare concept and to try our products at a 20% discount using promo code: WELCOME. *Joel Solomon Goldsmith (March 10, 1892 – June 17, 1964) was an American spiritual author, teacher, spiritual healer, and modern-day mystic. He founded The Infinite Way movement, a spiritual teaching revealing the nature of God as one infinite power, intelligence, and love; the nature of the individual as one with God's qualities and character, expressed in infinite forms and variety; and the nature of the discords of this world as a misconception of God's expression of Himself in His universe. Magra, Iliana. “Schools in England Introduce a New Subject: Mindfulness.” The New York Times, The New York Times, 4 Feb. 2019, www.nytimes.com/2019/02/04/world/europe/uk-mindfulness-children-school.html. St. Patrick's Day represents more than the ancient folklore of snakes and shamrocks and the color green. It also coincides with the promise of Spring which is always a welcome relief for those who have endured a long cold Winter. It is of particular interest that such a holiday is celebrated during the season of energetic Spring (according to traditional Chinese medicine [TCM]). The energy of energetic Spring is called “Wood” and it is represented by the color green. Wood energy cleanses, purifies, sprouts new life and has the potential, when used creatively, to help balance our emotional state. The wearing of the color green which is so emblematic of St. Patrick’s Day may be traced to the eighteenth century when the backers of Irish independence took on the color to represent their cause. "The modern celebration of St. Patrick's Day really has almost nothing to do with the real man," says Western culture professor Philip Freeman of Pepperdine University. Originally a Britt, Patrick was kidnapped and taken to Ireland to tend sheep as a slave in the chilly mountainous region of the country for seven years. Not particularly religious before, it was there that he got religion and became a devout Christian. He escaped his slavery to reunite with his family back home in England only to return to Ireland on counsel received in a dream. There he became a priest and later a bishop where he was “constantly beaten by thugs, harassed by the Irish royalty, and admonished by his British superiors,” according to John Roach, author of St. Patrick's Day Facts: Shamrocks, Snakes, and a Saint, National Geographic Magazine. According to St. Patrick's Day lore, St. Pat used the leaves of the shamrock as a teaching metaphor to describe the holy trinity, but the custom of wearing a shamrock comes from the eighteenth century when the shamrock emerged as a symbol of Irish nationalism during the 1798 Irish Rebellion against English colonialism. The shamrock seems to have been adopted as a symbol of St. Patrick’s Day when fervor for the holiday intensified at that time. As for driving snakes out of Ireland, there is no evidence that a preponderance of snakes existed anywhere in the region. Perhaps the mythos is more metaphorical than literal where snakes were villains and non-believers at the time (fifth century A. D.). As we can see, today the holiday celebration looks nothing like it did centuries ago. St. Pat’s Day merrymaking and revelry can bring a temporary lightness to our spirits during this time of year when hope springs and we look forward to the gushing forth of new life and new possibilities. In concert with that, be sure to check out our Spring seasonal/Wood element line of skincare. The Wood line addresses Wood imbalances in the skin such as oiliness, blackheads, hyperpigmentation. Essential oil-rich, it smells like invigorating Spring, clarifies the skin and can assist your emotional balance when you're feeling uncertainty, self-doubt and anger. Restore your confident true nature and march in those parades! Cohen, Jennie. “St. Patrick's Day Myths Debunked.” History.com, A&E Television Networks, 16 Mar. 2012, www.history.com/news/st-patricks-day-myths-debunked. “St. Patrick's Day Facts: Shamrocks, Snakes, and a Saint.” National Geographic, National Geographic Society, 18 Mar. 2010, news.nationalgeographic.com/news/2010/03/100316-st-patricks-day-facts-shamrocks/. The lack of broad awareness of water scarcity on a world scale and its consequences for sustaining human life on the planet is a bona fide crisis. Water, a gift from the sky, has been taken for granted for so long it is hard to fathom a radical, maybe permanent, absence of water in places that traditionally have been the agricultural-rich areas that produce food for the world population. We have a case in point with the Ogallala Aquifer(1) in the U. S., one of the world's largest aquifers(2) that underlies an area of approximately 174,000 square miles in portions of eight states across much of the central plains. It is a shallow water table aquifer surrounded by sand, silt, clay, and gravel. It has seen its water level drop significantly every year since 1969. In other words, the natural replenishment from rain and melting snow is insufficient to compensate for the amount of water used year after year. As a result, the water level has fallen about 40 feet. “Water covers 70% of our planet, and it is easy to think that it will always be plentiful. However, freshwater—the stuff we drink, bathe in, irrigate our farm fields with—is incredibly rare. Only 3% of the world’s water is fresh water, and two-thirds of that is tucked away in frozen glaciers or otherwise unavailable for our use. As a result, some 1.1 billion people worldwide lack access to water, and a total of 2.7 billion find water scarce for at least one month of the year. Inadequate sanitation is also a problem for 2.4 billion people—they are exposed to diseases, such as cholera and typhoid fever, and other water-borne illnesses. Two million people, mostly children, die each year from diarrheal diseases alone. Many of the water systems that keep ecosystems thriving and feed a growing human population have become stressed. Rivers, lakes and aquifers are drying up or becoming too polluted to use. More than half the world’s wetlands have disappeared. Agriculture consumes more water than any other source and wastes much of that through inefficiencies. Climate change is altering patterns of weather and water around the world, causing shortages and droughts in some areas and floods in others. What is really infuriating is that all this was predictable and mitigating measures could have been put in place decades ago but were not because of lack of will and of leadership in most major countries. Consider that as long ago as the late 80s, Malin Falkenmark wrote in Ambio(3) an article entitled: The Massive Water Scarcity Now Threatening Africa: Why Isn't It Being Addressed? The water crisis in Africa is, of course, more dire, however it signals problems the U. S. will have to confront if mitigation does not occur immediately. Another sad example of this worldwide crisis is outlined in The Independent’s article, India’s ‘worst water crisis in its history’ is only going to get worse, government think tank says. “India is suffering from the worst water crisis in its history and around 600 million people face a severe water shortage. Approximately 200,000 people die every year due to inadequate access to clean water and it’s “only going to get worse” as 21 cities are likely to run out of groundwater by 2020. In the longer term, the under-supply will become even more acute in the South Asian nation, as demand increases with the 1.4 billion population growing at a rate of around 1 per cent. The water crisis is already directly affecting the U. S. though it is worse in many parts of the world. It affects the very sustainability of life for the population in many regions in the world and consequently makes an indirect impact on the U. S., not only financially from the production and distribution of food, but with pressures of immigration and its associated challenges, both on a scale we have never seen. In short, water scarcity already experienced in many parts of the world is growing more dire as it directly and indirectly impacts the entire world population. This is a full-fledged humanitarian crisis. The general lack of leadership from national leaders focused on short-term political gains can only be offset by a massive engagement of the population. That is a difficult task in authoritarian regimes but is the very stuff that democracies can address. But first, for that to happen there must be a greater conscious awareness of the issues of water scarcity and its urgencies. (2) An aquifer is a body of permeable rock that can contain or transmit groundwater. (3) Ambio: A Journal of the Human Environment is a peer-reviewed scientific journal published eight times a year by Springer Science+Business Media on behalf of the Royal Swedish Academy of Sciences. It was established in 1972. “Ogallala Aquifer.” Wikipedia, Wikimedia Foundation, 27 Jan. 2019, en.wikipedia.org/wiki/Ogallala_Aquifer. “Water Scarcity.” WWF, World Wildlife Fund, www.worldwildlife.org/threats/water-scarcity. Falkenmark, Malin. “The Massive Water Scarcity Now Threatening Africa: Why Isn't It Being Addressed?” Ambio: A Journal of the Human Environment, vol. 18, no. 2, 1989. Mattha Busby @matthabusby. “Worst Water Crisis in India's History Predicted to Get Much Worse.” The Independent, Independent Digital News and Media, 17 June 2018, www.independent.co.uk/news/world/asia/india-water-crisis-shortage-niti-aayog-report-drought-mismanagement-a8403286.html. Everyone is after love. We all inherently know that love truly is what makes the world go ‘round. We seem to know without being taught that love is a force that pervades the universe. We know that a world without love is a darker world and this drives us to seek and to share love in our lives. We’re even beginning to genuinely discover that we cannot truly love others unless we love ourselves first and most fundamentally. Love is the subject most written about in novels and songs. We think about it often. It’s seems very simple to us yet mysterious at the same time. And while we feel that love comes naturally to us, we grapple with what it really means and how we express it when we’re in love relationships. Our society has constructed all kinds of walls and barriers in the form of rules around love although both Generation Z and the millennials are chipping away at them. As many question exactly why we’re all expected and trained to conform to these norms most especially around marriage we’re beginning to see new ways of living and loving demonstrated by the freer and more mindfully thinking population. For example, millennials are rejecting traditional marriage in record numbers. The median age for a first marriage is now age 27 for women and 29 for men. In 1960, it was 20 for women and 23 for men. Millennials are showing signs they’re wanting to allow the institution of marriage to evolve. And they’re tending to view marriage as an option rather than a necessity or that thing you just do. It isn’t that they’re not exploring love and relationships. They are. They’re merely recognizing more and more that marriage is a construct that boxes in their exploration of love and of themselves. It isn’t so much that most millennials don’t want to get married although a significant number of them do not. It’s more that they’re choosing to do it wisely—once they have careers well established, have satisfied many personal needs and have created a firm financial foundation. They want to gain a more established individual adult identity prior to marriage complete with more emotional development and self-awareness. And for many, their idea of what constitutes this more holistic foundation very often is preventing them from ever marrying. Beyond finances, there’s a social component too. Millennials are beginning to perceive marriage as an outdated institution. Opting out of traditional marriage is their way of rebelling against institutions they do not entirely believe in. Moreover, national surveys show that half of American adults believe society is not adversely affected if people place other priorities above marriage and children, according to a recent Pew report. Marriage for legal, tax and economic, and religious and social purposes does not appeal to them as much as it did to their forebears. Millennials have also witnessed a high degree of divorce among their parents and this makes them skittish about marriage. In their parents’ and earlier generations, people just got married and then worked to figure things out. Millennials are more about certainty, being deliberate and making the right decision therefore they’re slower to pull the trigger. Should it come to marriage, millennials and even their predecessor Gen-Xers tend to shun divorce. University of Maryland professor Philip Cohen has found that from 2008 to 2016, the U.S. divorce rate has dropped by 18%. He says that the overall drop is driven entirely by younger women. As our world continues to evolve, we’re finding we’re having to make shifts in how we do things—how we live, how we do business, how we communicate and interact with each other and more. We’re being required to make these shifts more frequently than decades ago and to table our judgment of what we sometimes view as seismic metamorphoses in favor of a “wait and see” approach. This begs an openness on our part to accept the winds of change making us more resilient beings and leaving our inner happiness and joy undisturbed. We’ll probably find that many of the evolutionary changes we’re witnessing today will eventually prove to work out just fine in the end. Murphy, Meg. “NowUKnow: Why Millennials Refuse to Get Married.” PreparedU View | Bentley University, 3 Jan. 2019, www.bentley.edu/impact/articles/nowuknow-why-millennials-refuse-get-married. Miller, Ryan W. “Add Divorce to the List of Things Millennials Are Killing.” USA Today, Gannett Satellite Information Network, 26 Sept. 2018, www.usatoday.com/story/news/nation-now/2018/09/26/millennials-blame-lower-us-divorce-rate-study/1429494002/. On January 18 we entered the 18-day period between the end of the energetic season of the Water element (Winter) and the beginning of the energetic season of the Wood element (Spring) beginning February 5. That transitional period is one of the four 18-day seasonal energetic transitional periods of the year called Earth. Each energetic season has a set of energetic influences to which each one of us is more or less sensitive. For the people who stay very grounded and balanced during Earth, the 18-day period can be extremely creative time for them, but for those who have an Earth imbalance, the energetic influence exacerbates rumination enhancing worry and impeding decision making. In our Wei Chi series of blog articles beginning in March of 2017 we emphasized the teaching of traditional Chinese medicine (TCM) concerning the importance of our emotional life on our state of health and wellness. Positive emotions have a favorable effect on our vitality while negative ones are very destructive to our physical and mental health in addition to damaging our emotional life. In Dr. Mercola’s email newsletter of January 18, 2019 we are reminded that the key to enriching and nourishing relationships with other humans is an attitude of gratitude. It seems simple enough but given the load of concerns, if not outright worries most people experience in this trying time and age, it is easy to feel like we’re being attacked from various sides. We may even find little that immediately comes to mind for which we can sustain such an attitude of gratitude. A feeling of gratitude is a blessing but it needs to be expressed to be cultivated and to become fully beneficial in our lives. Appreciation is an even more profound aspect of gratitude. It causes us to go beyond the surface of “thank you” and feel more deeply. Feeling gratitude for anything at all is a near instant remedy for feeling low. Feeling appreciation for anything at all causes us to truly pause and deliberately savor the beauty of life. It can begin with appreciation for the simplest of things such as a smile offered, a butterfly, a tasty bite of food, a hilarious television show or a beautiful color. Appreciation has the potential to take us to the more meditative state where healing begins to occur, “the junction point between mind and matter, the point where consciousness actually starts to have an effect,” according to Deepak Chopra. It is this state of awareness and feeling that becomes the “best predictor of good relationships” in our lives. It contributes to a balanced and peaceful state of mind and it supports our chi energy helping us to maintain a stronger immune system and radiant health, vitality and sense of overall well-being. The Best Resolution for 2019 Is to Help Save Our Animals and Planet. Here’s How and Why. The annihilation of wildlife on the planet is now an emergency that threatens civilization. “We are sleepwalking towards the edge of a cliff,” said Mike Barrett, Executive Director of Science and Conservation at the WWF. Since 1970, 60% of the world’s vertebrate animals have been wiped out. Humans representing only 0.01% of all life on the planet have destroyed 83% of wild mammals. Freshwater habitats are the worst hit with populations having collapsed by 83%. Chemical pollution is also significant: half the world’s killer whale populations are now doomed to die from PCB contamination of the oceans. “Again there is this direct link between the food system and the depletion of wildlife,” said Barrett. "Eating less meat is an essential part of reversing losses," he said. “100 billion animals killed every year by and for humans. When we say we care about the planet and want to save it we must think about what that really means. For those of us who are not inventors and scientists, there is one simple thing we can do right now, en masse, that even though it’s so incredibly simple, it can achieve profound change: eat less or no animal flesh or byproducts. There are all kinds of delicious alternatives on the market today now more than ever before. Animal protein requirements are really more propaganda than truth. Moving more or completely to a plant-based diet will get us all the protein we need. We don’t really need as much protein as they say but that’s the topic of a whole other blog post. The global movement, Meatless Monday, offers support for people wanting to go meatless but don’t have the know-how. Meatless Monday was founded in 2003 by Sid Lerner in association with the Johns Hopkins Bloomberg School of Public Health. In May, 2009, Ghent, Belgium, became the first non-U.S. city to go meatless. Shortly thereafter, Paul McCartney introduced the U.K. to Meat-Free Mondays. Meatless Monday is now active in over 40 countries and continues to grow. Representatives from different nations continue to find innovative ways to make meatless and vegetarian dishes part of their everyday culture, customs and cuisine. Skipping meat even just one day a week is good for you, great for our nation’s health and better for the planet. Organizations like Happy Cow, PETA and Forks Over Knives also provide all sorts of recipes, tips, and education. Visit their websites and subscribe to their newsletters to get all sorts of free support. By eating less meat, not only will we save innocent animals and abate (and hopefully recover from) ongoing damage to our environment, we will become become far healthier, need less medication and trips to the doctor, suffer less disease and sickness, save on healthcare costs, and become a more peaceful, loving, compassionate planet overall. Carrington, Damian. “Humanity Has Wiped out 60% of Animal Populations since 1970, Report Finds.” The Guardian, Guardian News and Media, 30 Oct. 2018, www.theguardian.com/environment/2018/oct/30/humanity-wiped-out-animals-since-1970-major-report-finds. The extract of buckwheat (also known as beech wheat) found in PHYTO5’s Water element day cream, night cream, shampoo and the Swiss line Purifying Cleansing Gel has nothing to do with wheat at all because it is not a grass. It is naturally gluten-free and should be emphasized that as a relative of sorrel, knotweed and the rhubarb plant and produces starchy seeds, buckwheat is a fruit seed. It is not a grain at all. It gets its name from its triangular seeds which resemble the much larger seeds of the beech nut tree and from the fact that the seeds can be ground and used similarly to how we use normally use wheat in cooking. When toasted, the seeds are known as kasha. A native of central Asia, originally cultivated in China from the tenth to thirteenth centuries it was subsequently introduced into Europe by the crusaders. A powerhouse of nutrients, it is one of the healthiest foods you can consume internally or topically on the skin or hair. Don’t miss our current Pre-Black Friday Blowout Sale for 25% Off select bestseller products. Buckwheat greens grown from the sproutable seeds become a plentiful source of chlorophyll, enzymes and vitamins. Buckwheat seeds, being high in polyunsaturated fatty acids, supports skin's elasticity. Its flavonoids* extend the action of vitamin C and act as antioxidants. This is one of the reasons why buckwheat extract is an important anti-aging ingredient in skincare. Buckwheat’s main claim to fame is its rutin or vitamin P content. Rutin is a natural anti-inflammatory bioflavanoid which protects against skin damage from the sun and environment. Rutin also blocks free radicals which in turn slows the effects of aging and promotes longevity. Rutin supports blood circulation so important for skin’s healthy youthful glow and strengthens and repairs small capillaries in the skin. Its high magnesium content also works alongside rutin to relax blood vessels and promote circulation and skin’s glow. This factor also helps to improve circulation in cold hands and feet. Vitamin B present in buckwheat is very beneficial for skin, nails and hair and it too helps reduce skin damage caused by sun and environmental factors. Buckwheat’s high concentration of polyunsaturated fatty acids helps enhance skin’s elasticity. Buckwheat also contains vitamin E, riboflavin (vitamin B2), niacin (vitamin B3), pantothenic acid (B5), thiamine (B1), B6 and folate all important for everyone and especially people with liver disorders. Its zinc and magnesium content is very important for skin and hair condition and healthy sleep. Buckwheat extract can be used externally for skin eruptions, inflammations and burns. Buckwheat is 75% complex carbohydrates, a feature that is exceptional for proper growth of hair. Rich in vitamin A, B-complex vitamins and zinc, it is highly conducive for hair growth. Vitamin B6 or pyridoxine is vital for hair growth and health. Its saturated fat content combined with high protein and fiber content aids in appetite suppression and weight loss. Buckwheat’s very high quality proteins and all eight amino acids help to lower cholesterol; its amino acid composition is superior to all cereals. Buckwheat consumption may lower the risk of fatal stroke and heart attack as it helps balance blood pressure, circulation and vascular integrity. A certain type of antioxidant in buckwheat called lignans assist post-menopausal women by helping to prevent breast cancer and other forms of cancer related to hormone imbalance. The high levels of vitamin E and magnesium present in buckwheat protect against childhood asthma. Because buckwheat is high in insoluble fiber it can help to prevent gallstones as it facilitates the movement of food through the intestines. The manganese in buckwheat helps form healthy bones and connective tissue and can help prevent osteoporosis. The amino acid tryptophan in buckwheat elevates mood. Less acid forming with a well balanced mineral composition (phosphorus, magnesium, iron, copper, zinc, manganese) combined with a high flavonoid” content, buckwheat assists in the ability to combat colds and flu. *Flavonoids are phytonutrients responsible for the vivid colors in fruits and vegetables and are potent antioxidants with anti-inflammatory and immune system benefits. Murray, Michael T., et al. The Encyclopedia of Healing Foods. Time Warner International, 2006. Pitchford, Paul. Healing with Whole Foods: Asian Traditions and Modern Nutrition. North Atlantic Books, 2009. Verheyen, Yes. Enjoyvity, Your Full Spectrum of Life. Verheyen Consulting, 2010. Better and more versatile than the herb itself is the essential oil of peppermint found in PHYTO5’s Earth and Water element Skin Toners. Peppermint essential oil is produced by the cold extraction of the hybrid species of spearmint and water mint’s fresh aerial parts of the plant. It offers our overall health very beneficial topical, internal, and aromatic applications and is one the best essential oils to keep in your medicine cabinet at home. Used topically, peppermint essential oil calms, softens and tones the skin. In the report, Commercial Essential Oils as Potential Antimicrobials to Treat Skin Diseases, peppermint oil is indicated as effective for reducing blackheads, chicken pox, greasy skin, dermatitis, inflammation, itchy skin, ringworm, scabies and sunburn. With a higher sun protection factor (SPF) than most other essential oils, peppermint can relieve the pain of sunburns while hydrating burned skin. Peppermint oil is used in skincare products because it is very cleansing, slightly antiseptic, anti-inflammatory and toning. It purifies sluggish pores and when added to a steam bath activates the skin. Very suitable in treating oily skin, acne and blackheads, it is refreshing and stimulating. Peppermint essential oil is also found in these skincare products by PHYTO5: Yang OE Cream, Contouring Serum, and Chi Yin Massage Oil. Peppermint essential oil is very cooling to relieve sore muscles, muscle aches, and joint pain. Studies have shown peppermint oil beneficial in the treatment of fibromyalgia and myofascial pain syndrome (1). Peppermint can provide seasonal allergy relief by relaxing muscles in the nasal passages and helping to clear out pollen from the respiratory tract. It is especially invigorating for cases of low energy simply by gently inhaling its fragrance. Inhaling the scent can help keep you awake during the long periods when you need to stay awake because it energizes the mind. It can also help improve memory and mental alertness. Similarly, the oil’s fragrance can boost physical performance such as when you are training for an athletic event. As a case in point, a study published in the Avicenna Journal of Phytomedicine investigated the effects of peppermint ingestion on exercise performance. Thirty healthy male college students were randomly divided into experimental and control groups. All the men consumed a single oral dose of peppermint essential oil and their physiological parameters and performance were monitored. The researchers noted remarkable improvements in all of the tested variables in the men who ingested the peppermint oil. They showed an incremental and significant increase in their grip force, standing vertical jump and standing long jump. The peppermint oil group also showed a notable increase in the amount of air that is exhaled from the lungs, peak breathing flow rate and peak exhaling flow rate. Peppermint essential oil helps to improve circulation to alleviate headaches. Simply apply two to three drops to temples, forehead and back of neck. Digestive disorders can be attenuated with peppermint oil’s soothing effect on the gastric lining and the colon. Taken in capsule form or by taking one to two drops in water, peppermint oil has been shown to relieve irritable bowel syndrome (IBS) by reducing spasms in the colon, relaxing intestinal muscles and reducing bloating and gas. Peppermint oil, of course, naturally freshens breath and supports oral health because it kills bacteria and fungus that leas to cavities and infection. Peppermint oil also naturally thickens and nourishes damaged hair. It stimulates the scalp and improves the condition of thinning hair. Itchiness, formally termed pruritus, can be relieved by peppermint essential oil. Ants, spiders, cockroaches, mosquitos, mice and lice hate the smell of peppermint oil so it’s an excellent bug repellant. Although research is still ongoing, studies are beginning to suggest that peppermint may be beneficial as an anticancer agent. Peppermint is antimicrobial, antiviral, anti-tumor, analgesic, antioxidant, anti-nausea, and anti-inflammatory. It can prevent the spread of an existing infection. One of the best essential oils for colds, flu, cough, sinusitis, asthma, bronchitis and other respiratory conditions, it can unclog sinuses and provide relieve from a scratchy throat and it works as an expectorant to open airways, clear mucus and dispel congestion. (1) Chronic pain in multiple myofascial trigger points (“knots" or as hyperirritable spots in the fascia (the thin sheath of fibrous tissue enclosing a muscle or other organ surrounding skeletal muscle.) and fascial (connective tissue) constrictions. It can appear in any body part. Keller, Erich. Aromatherapy Handbook for Beauty, Hair, and Skin Care. Healing Arts Press, 1999. With an oil content of 40 to 50%, apricot kernel essential oil found in a number of products in PHYTO5’s Metal element skincare line is pressed from the kernels of the Prunus armeniaca–the apricot. Rich in the fatty acid gamma linolenic acid (GLA) which helps skin maintain its moisture balance, it is light enough to leave no oily residue making it especially suitable as a base for facial serums and moisturizers. In mature skin, apricot essential oil softens and improves skin’s elasticity helping to smooth out fine lines. The fatty acids (excellent for firming and toning) and high concentrations of vitamins E and A (which help to slow the aging process) present in apricot oil help revitalize, rehydrate, moisturize, nourish, soften and smooth dry and/or mature skin. Apricot oil is composed of approximately 90% polyunsaturated fatty acids (Omegas 6 and 9) which are excellent for cell growth. GLA is vital in helping the skin to maintain its balance of moisture. Skin cells use these healthy fats in their membranes to be better able to absorb nutrients and produce skin strengthening compounds. Stronger skin means fewer lines and wrinkles. - Omega 6 fights inflammation and promotes circulation; GLA mentioned above comes from Omega 6. - Omega 9 is also known to promote a healthy inflammation response and supports the immune system. Apricot oil is rich in vitamin A, an antioxidant that plays a critical role in healthy skin and cell growth. Bursting with beta-carotene (the precursor to vitamin A) which gives the apricot its orange color, beta-carotene turns wrinkle forming free radicals into harmless compounds. Apricot is one of the very best sources of beta-carotene. Apricot abounds in vitamin E, a primary free radical fighting antioxidant critical for health and the natural slowing of signs of aging. A great source of vitamin C, the main water-soluble antioxidant of the body, means that the vitamin C in apricot essential oil can attack any free radicals in the watery parts of the skin cells protecting those areas from damage. Apricot is a great source of iron which makes skin look radiant. The skin needs oxygen to complete the metabolic processes necessary to maintain its strength, firmness and resilience. The red blood cells require iron to carry that needed oxygen throughout the body including the skin. Apricot’s vitamin B and potassium content combined with a number of other important vitamins and minerals are potent for combatting signs of aging in the skin. Light and gentle, it is also beneficial for all skin types including sensitive and skin suffering from conditions such as eczema. The oil is readily absorbed by the skin. Beneficial for sallow or oily skin, apricot enlivens a complexion lacking tone and vibrance. It provides the skin a barrier against irritants and dehydration and is an ideal substitute for petroleum-based oils. Apricot oil is soothing, pain-relieving and an anti-inflammatory. It helps maintain the immune system strengthening the body’s ability to fight infections and viruses like colds and flu. Mixed with a carrier oil, it can be massaged into the scalp and hair to cure a dry and flaky scalp and to help restore damaged and chemically treated hair. It brings back the shine of the hair and is excellent for conditioning fly-away hair. Curtis, Susan, et al. Essential Oils: All-Natural Remedies and Recipes for Your Mind, Body, and Home. DK Publishing, 2016. Tannis, Allison. Feed Your Skin, Starve Your Wrinkles: Eat Your Way to Firmer, More Beautiful Skin with 100 Foods That Turn Back the Clock. Fair Winds Press, 2009. Soothing sweet marjoram essential oil, found in PHYTO5’s Metal element line of skincare, has traditionally been formulated into remedies for acne, psoriasis, eczema and for rashes stemming from allergies, however because it is so rich in antioxidants which fight free-radical damage, it has the ability to naturally fight premature signs of aging when formulated in skincare. It is one of the few essential oils able to both strengthen and relax. Marjoram is a tonic, anti-fungal, antispasmodic, analgesic, sedative, antiseptic, antiviral, and bactericidal. It is used in skincare formulations for its refreshing restorative action and its sweet camphoraceous scent. It is fortifying, comforting, soothing, and warming. Marjoram’s generic name ‘origanum’ comes from the Greek oros and ganos meaning joy of the mountains. Its essence helps to achieve mental calm, balance, self-assurance, integrity, courage, confidence, focus, perseverance, restoration, and a sense that all is well. It can help counteract anxiety, hysteria, hostility, self-isolation, mental strain, tantrums, anger, irritability, hyperactivity, and weak will. In terms of its tonifying and strengthening influence, marjoram may be used for chronic lethargy and nervous exhaustion and is particularly helpful for conditions where tiredness may be characterized by anxiety or insomnia. Marjoram has been widely used since ancient times for both medicinal and culinary purposes. The ancient Egyptians used it to make perfumes, unguents and medicines. The Greeks used it as a funeral herb planting it on graves to bring spiritual peace to the departed, but additionally then and now, marjoram has been found to assist persons grieving to accept their deep loss. A symbol of love and honor, the ancient Greeks also used marjoram flowers to crown young married couples. It was associated with Aphrodite, goddess of love, beauty and fertility. In England’s Tudor times the mere fragrance of sweet marjoram was believed to help to maintain one’s health. Chinese medicine finds that marjoram tonifies and circulates chi energy. Its chi moving action results in very distinct antispasmodic and analgesic properties such as for muscular strains, stiffness, spasm, aches and pain, nervous spasm, intestinal colic, and osteoarthritis. It stimulates respiratory and circulatory function and can serve as an expectorant to relieve coughs and colic. Smoothing the flow of chi energy in the chest, marjoram can also be used to calm and regulate the heart especially for indications of palpitations, tachycardia and hypertension. Marjoram is probably the best aromatic herb for women, because it naturally helps regulate painful menstrual periods and challenges dealing with menopausal symptoms. Marjoram is a superior herb for treating bad breath. By chewing and holding three leaves in the mouth for several minutes and then swallowing, marjoram keeps the mouth fresh and clean all day. The oil penetrates into the gums and creates saliva excretion that cleans up bad bacteria in the dental cavities which is why the herb gains the name sweet marjoram. Chinese medicine also finds marjoram to be innately balancing. Its sweet, nourishing and balancing quality combined with its regulating effect on mental functions associates marjoram primarily with the Earth element (beginning October 20). When Earth type people are out of balance by allowing themselves to become depleted or subjected to high levels of stress, they tend to overthink, worry, and feel unsupported by others in their lives. Marjoram helps to calm their tendency to excessive thinking, ease emotional neediness and promote their innate capacity for inner self-nurturing. It nourishes the place from where emotional neediness springs helping one to shift from self-absorption to giving, literally demonstrating its namesake, joy of the mountains. Worwood, Valerie Ann. The Fragrant Mind: Aromatherapy for Personality, Mind, Mood and Emotion. Bantam, 1997. Yellowdawn, T. H. The Sun, Human & Food: A Self-Treatment and Practice with Natural Food. Author House, 2011. Mojay, Gabriel. Aromatherapy for Healing the Spirit: a Guide to Restoring Emotional and Mental Balance through Essential Oils. Gaia, 2005. The benefits of caring for the breasts and the surrounding area are essential for overall health to the body and your state of being. Practicing positive breast care and expanding our repertoire with more ways to nurture ourselves can improve the overall health of our breasts and skin tissue including our unseen vital energy. Lymph circulation is very important for breast health. Lymph is a colorless fluid containing white blood cells which are responsible for protecting the body against viruses and bacteria and may trap cancer cells. Lymph bathes the tissues and drains through the lymphatic system into the bloodstream. Lymph is filtered through the lymph nodes which are small swellings in the lymphatic system located throughout the body. The largest groupings of lymph nodes are found in the neck, armpits, and groin areas. Since lymph drains impurities into the bloodstream, various methods of self-care aimed at stimulating blood flow are vital for great health of skin and tissue. Increased blood flow frees up the stagnation of fluid circulation and increases the elimination of impurities. Check out these tips to improve lymphatic circulation for breast health from mammalive.net. Improved blood circulation enables tissue repair and renewal. Better blood flow distributes nutrients, especially oxygen, throughout the body, breasts and skin. Improved circulation assists the carrying away of metabolic wastes, toxicity and pathogens that must be eliminated for breast and overall health. Supporting the health of the breasts can be easily added to any spa or wellness treatment. A technician comfortable working in this area can educate you on the importance of caring for your breasts. Learning how to care of your breasts at home is important not just for women but for men as well. PHYTO5 offers treatments that are beneficial for releasing the discomfort of congestion, breast soreness, discomfort caused by underwire bras, and changes to the body before, during and after menopause. Advanced treatments can be done with PHYTO5’s Biorhythmic Drainer,* Chromapuncteur,* and Biostimulateur ** with the proper training. Some professionals are incorporating these treatments with thermography which can be an alternative to mammograms to proactively improve and maintain the health of the breasts. A thermogram is a test that uses an infrared camera to detect heat patterns and blood flow in body tissues such as in the breasts. Digital infrared thermal imaging (DITI) is the type of thermography preferred by some medical professionals. The use of DITI is based on the principle that metabolic activity and vascular circulation in pre-cancerous and cancerous breast tissue is almost always higher than in normal breast tissue. Over the past 30 years, an estimated 1.3 million American women have actually been overdiagnosed with breast cancer that posed no threat to their lives. In 2008, an estimated 70,000 women were overdiagnosed with breast cancer in the U.S. alone accounting for 31 percent of all breast cancers diagnosed that year. According to Dr. Christiane Northrup, MD, women who tend to be most at risk for breast cancer are those who have difficulty nurturing themselves and receiving pleasure. Embracing a practice of self-care, self-love and self-acceptance is an important part of creating physical, mental and emotional wellness and vitality. *The Biorhythmic Drainer mechanically reproduces the gentle movements of a manual massage intent on moving fluids. **The Chromapuncteur produces energetic frequencies from the visible spectrum of electromagnetic waves in alignment with the energies of the five elements of traditional Chinese medicine (TCM) and of the seven major energetic centers (chakras) in order to balance the client's vital energy. *** The Biostimulateur is a sophisticated tool to balance vital energy working on points. meridians, and reflex zones with pre-calibrated mechanical vibrations. It also provides toning and dispersing frequencies.
2019-04-22T04:35:31Z
https://www.phyto5.us/blog-1
KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.), Economics. This paper examines how Sweden and the United States have been impacted by philanthropicactivities, commercialization of university-based knowledge and internationalentrepreneurship. The analysis comprises a detailed case study of Swedish and U.S.universities, as well as a statistical analysis of the impact of philanthropy on economicgrowth. The results show that the United States has prompted a university system based oncompetition and variety, with an emphasis on philanthropy, promoting knowledge creation.International entrepreneurship has been an important mechanism by which this knowledge isglobalized leading to increased economic growth. Conversely, Swedish universities werecharacterized by less commercialized R&D and weak links to the commercial sector, rootedtraditionally in dependence on tax-financed and homogenous university structure. TheSwedish model has begun to change with important implications for development in smallerdomestic markets. The analysis has important implications for knowledge creation as asource of economic growth through international entrepreneurship taking advantage ofglobalization, especially for smaller countries. KTH, School of Industrial Engineering and Management (ITM), Production Engineering, Machine and Process Technology. KTH. KTH, School of Industrial Engineering and Management (ITM). KTH, School of Industrial Engineering and Management (ITM), Production Engineering, Machine and Process Technology. KTH, School of Industrial Engineering and Management (ITM), Centres, Design and Management of Manufacturing Systems, DMMS. This paper will introduce a novel methodology for the performance evaluation of machining strategies of engine block manufacturing. The manufacturing of engine components is vital to the automotive and vehicle manufacturing industries. Machining is critical processes in the production of these parts. To survive and excel in the competitive manufacturing environment, companies need to improve as well as update their machining processes and evaluate the performance of their machining lines. Moreover, the lines and processes have to be robust in handling different sources of variation over time that include such examples as demand fluctuations, work-piece materials or even any changes in design specifications. A system dynamics modelling and simulation approach has been deployed to develop a methodology that captures how machining system parameters from the machining process are interacted with each other, how these connections drive performance and how new targets affect process and machine tool parameters through time. The developed model could provide an insight of how to select the crucial machining system parameters and to identify the effect of those parameters on the output of the system. In response to such an analysis, this paper provides (offers) a framework to examine machining strategies and has presented model that is useful as a decision support system for the evaluation and selection of machining strategies. Here a system dynamics methodology for modelling is applied to the milling operation and the model is based on an actual case study from the engine-block manufacturing industry. Internal combustion engines waste a large amount of fuel energy through their exhausts. Various technologies have been developed for waste heat recovery such as turbocompounds, Rankine bottoming cycles, and thermoelectric generators that reduce fuel consumption and CO2 emissions. Turbocompounding is still not widely applied to vehicular use despite the improved fuel economy, lower cost, volume, and complexity higher exhaust gas recirculation driving capability and improved transient response. This paper comprehensively reviews the latest developments and research on turbocompounding to discover important variables and provide insights into the implementation of a high-efficiency turbocompound engine. Attention should be paid to the optimization of turbocompound engines and their configurations because the major drawback of this technology is additional exhaust back-pressure, which leads to higher pumping loss in the engines. Applying different technologies and concepts on turbocompound engines makes the exhaust energy recovery more efficient and provides more freedom in the design and optimization of the engines. Turbine efficiency plays an important role in the recovery of the wasted heat so turbine design is a crucial issue in turbocompounding. In addition, variability in geometry and rotational speed of power turbines allows for more efficient turbocompound engines in different operating conditions. The conclusion drawn from this review is that turbocompounding is a promising technology for reducing fuel consumption in the coming decades in both light- and heavy-duty engines. To decrease the influence of the increased exhaust pressure of a turbocompound engine, a new architecture is developed by combining the turbocompound engine with divided exhaust period (DEP). The aim of this study is to utilize the earlier stage (blowdown) of the exhaust stroke in the turbine(s) and let the later stage (scavenging) of the exhaust stroke bypass the turbine(s). To decouple the blowdown phase from the scavenging phase, the exhaust flow is divided between two different exhaust manifolds with different valve timing. A variable valve train system is assumed to enable optimization at different load points. The fuel-saving potential of this architecture have been theoretically investigated by examining different parameters such as turbine flow capacity, blowdown valve timing and scavenging valve timing. Many combinations of these parameters are considered in the optimization of the engine for different engine loads and speeds. This architecture produces less negative pumping work for the same engine load point due to lower exhaust back pressure; however, the exhaust mass flow into the turbine(s) is decreased. Therefore, there is a compromise between the turbine energy recovery and the pumping work. According to this study, this combination shows fuel-saving potential in low engine speeds and limitations at high engine speeds. This is mainly due to the choked flow in the exhaust valves because this approach is using only one of the two exhaust valves at a time. To reveal the full potential of this approach, increasing the effective flow area of the valves should be studied. This paper presents a combination of theoretical and experimental investigations for determining the main heat fluxes within a turbocharger. These investigations consider several engine speeds and loads as well as different methods of conduction, convection, and radiation heat transfer on the turbocharger. A one-dimensional heat transfer model of the turbocharger has been developed in combination with simulation of a turbocharged engine that includes the heat transfer of the turbocharger. Both the heat transfer model and the simulation were validated against experimental measurements. Various methods were compared for calculating heat transfer from the external surfaces of the turbocharger, and one new method was suggested. The effects of different heat transfer conditions were studied on the heat fluxes of the turbocharger using experimental techniques. The different heat transfer conditions on the turbocharger created dissimilar temperature gradients across the turbocharger. The results show that changing the convection heat transfer condition around the turbocharger affects the heat fluxes more noticeably than changing the radiation and conduction heat transfer conditions. Moreover, the internal heat transfers from the turbine to the bearing housing and from the bearing housing to the compressor are significant, but there is an order of magnitude difference between these heat transfer rates. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, MWL Flow acoustics. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). The aim of thiswork is to study sound generating flowstructures in a thickcircular orifice plate jet, placed in a circular duct. Large eddy simulations (LES)are performed for two jet Mach numbers, 0.4 and 0.9. Characteristic frequenciesin the flow, and their corresponding flow structures, are identified with dynamicmode decomposition (DMD). The results show that a tonal noise is generated atfrequencies where the jet displays strong ring vortices, in the plane wave range.The main sound generating mechanisms seems to be a fluctuating mass flow at theorifice opening and a fluctuating surface force at the plate sides, caused by the ringvortices. The frequencies are believed to be chosen, and strengthened, by a feedbackmechanism between the orifice in- and outlet. KTH, School of Engineering Sciences (SCI), Mechanics. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). The scattering of plane waves by an orifice plate with a strong bias flow, placed in a circular or square duct, is studied through large eddy simulations and dynamic mode decomposition. The acoustic-flow interaction is illustrated, showing that incoming sound waves at a Strouhal number of 0.43 trigger a strong axisymmetric flow structure in the orifice in the square duct, and interact with a self-sustained axisymmetric oscillation in the circular duct orifice. These structures then generate a strong sound, increasing the acoustic energy at the frequency of the incoming wave. The structure triggered in the square duct is weaker than that present in the circular duct, but stronger than structures triggered by waves at other frequencies. Comparing the scattering matrix with measurements, there is a good agreement. However, the results are found to be sensitive to the inflow, where the self-sustained oscillation in the circular duct simulation is an artefact of an axisymmetric, undisturbed inflow. This illustrates a problem with using an undisturbed inflow for studying vortex-sound effects, and can be of interest when considering musical instruments, where the aim is to get maximum amplification of specific tones. Further, it illustrates that at the frequency where an amplification of acoustic energy is found for the orifice plate, the flow has a natural instability, which is suppressed by non-axisymmetry and incoming disturbances. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, MWL Flow acoustics. KTH, School of Engineering Sciences (SCI), Mechanics. KTH, School of Engineering Sciences (SCI), Centres, Linné Flow Center, FLOW. The scattering of plane waves by a thick orifice plate, placed in a circular or square duct with flow, is studied through Large Eddy Simulation. The scattering matrix is computed and compared to measurements, showing reasonably good agreement except around one frequency ($St \approx 0.4$). Here a stronger amplification of acoustic energy is observed in the circular duct simulations than in the measurements and the square duct simulations. In order to improve the understanding of the interaction between an incoming wave, the flow, and the plate, a few frequencies are studied in more detail. A Dynamic Mode Decomposition is performed to identify flow structures at significant frequencies. This shows that the amplification of acoustic energy occurs at the frequency where the jet in the circular duct has an axisymmetric instability. Furthermore, the incoming wave slightly amplifies this instability, and suppresses background flow fluctuations. Liner scattering of low frequency waves by an orifice plate has been studied using Large Eddy Simulation and an acoustic two-port model. The results have been compared to measurements with good agreement for waves coming from the downstream side. For waves coming from the upstream side the reflection is over-predicted, indicating that not enough of the acoustic energy is converted to vorticity at the upstream edge of the plate. Furthermore, the sensitivity to the amplitude of the acoustic waves has been studied, showing difficulties to simultaneously keep the amplitude low enough for linearity and high enough to suppress flow noise with the relatively short times series available in LES. KTH, School of Architecture and the Built Environment (ABE), Transport Science, Transport and Location Analysis. KTH, School of Architecture and the Built Environment (ABE), Centres, Centre for Transport Studies, CTS. KTH, School of Industrial Engineering and Management (ITM), Centres, Integrated Transport Research Lab, ITRL. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, Marcus Wallenberg Laboratory MWL. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). Baffle or split silencers are commonly used, e.g., in HVAC systems and as inlet/outlet silencers on gas turbines. Another application is to reduce noise from the cooling fan inlet for large IC-engines. A baffle silencer can be seen as a periodic arrangement of parallel rectangular absorbers which can be placed in a rectangular duct. The noise reduction afforded by parallel baffles depends not only on the physical properties of the lining, but also upon the angle of incidence of the sound waves impinging and the baffle length. In this paper the potential of using baffles made of Micro-Perforated Panels is investigated in particular with the cooling fan inlet application in mind. Theoretical models for the damping is derived and used to design optimum configurations. The models are based on the wave propagation in a periodic array of baffles so that only one period can be investigated in order to find the different modes. In particular the least attenuated mode is important to find in order to optimize the behavior. An important aspect is the inner structure of the MPP baffle, i.e., can it just be an empty air volume or to what extent must internal waves be prevented by putting in walls. From a stiffness point of view some inner walls might also be needed to avoid vibration problems. Due to these complexities the theoretical models are only presented for the simplest cases. In order to validate the models and to get a more complete test of different designs experiments were also carried out. During these experiments the effect of flow was also tested. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). Automotive turbo compressors generate high frequency noise in the air intake system. This sound generation is of importance for the perceived sound quality of luxury cars and may need to be controlled by the use of silencers. The silencers usually contain resonators with slits, perforates and cavities. The purpose of the present work is to develop acoustic models for these resonators where relevant effects such as the effect of a realistic mean flow on losses and 3D effects are considered. An experimental campaign has been performed where the two-port matrices and transmission loss of sample resonators have been measured without flow and for two different mean flow speeds. Models for two resonators have been developed using 1D linear acoustic theory and a FEM code (COMSOL Multi-physics). For some resonators a separate linear 1D Matlab code has also been developed. Different models, from the literature, for including the effect of mean flow on the acoustic losses at slits and perforates have been implemented in the codes and compared to the experimental data. Correct modeling of acoustic losses for resonators with complicated geometry is important for the simulation and development of new and improved silencers, and the present work contributes to this understanding. The developed models give acceptable agreement with the measured results even with flow but can be improved for 3D FEM if correct CAD data is available. The 1D linear theory can be used for simple geometries and to get a general overview related to the resonance frequencies and damping level. Splitter or baffle silencers are commonly used, for example, in heating ventilation and air conditioning (HVAC) systems and as inlet/outlet silencers on gas turbines. Another application is to reduce noise from the cooling fan inlet for large IC-engines. A splitter silencer can be seen as a periodic arrangement of parallel rectangular absorbers, which can be placed in a rectangular duct. The noise reduction afforded by parallel splitters depends not only on the physical properties of the lining but also upon the angle of incidence of the impinging sound waves, and the splitter and duct dimensions. In this paper, the potential of using splitters made of microperforated plates (MPPs) is investigated, with a particular focus on cooling fan inlet/outlet applications. In this paper two different objects for fan passive noise control have been examined: heat exchangers and inlet/outlet parallel splitter silencers based on micro-perforated panels. The first object is theoretically and experimentally examined while the second is only examined experimentally. Throughout this paper two measurement methods were used. The ISO 15186-1:2000 to test the acoustic transmission for a diffuse field and plane wave testing in a duct of a sample cut from each heat exchanger type. Based on an anisotropic equivalent fluid model a theoretical model for the heat exchanger acoustic transmission is presented. A new type of splitter silencers based on micro-perforated plates, which can add damping up 10-20 dB in the frequency range of interest (<5 kHz), are also presented. KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. This paper analyzes how different R&D strategies of incumbent firms affect the quantity and quality of their entrepreneurial spawning. When examining entrepreneurial ventures of ex-employees of firms with different R&D strategies, three things emerge: First, firms with persistent R&D investments and a general superiority in sales, exports, productivity, profitability and wages are less likely to generate entrepreneurs than firms with temporary or no R&D investments. Second, start-ups from knowledge intensive business service (KIBS) firms with persistent R&D investments have a significantly increased probability of survival. No corresponding association between the R&D strategies of incumbents and survival of entrepreneurial spawns is found for incumbents in manufacturing sectors. Third, spin-outs from KIBS-firms are more likely to survive if they start in the same sector, indicating the importance of inherited knowledge. These findings suggest that R&D intensive firms are less likely to generate employee start-ups, but their entrepreneurial spawns tend to be of higher quality. KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.), Entrepreneurship and innovation. KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.), Economics (Closed (20130101). KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. This paper develops a framework of innovation dynamics to appreciate observed heterogeneity of firm size distributions, in which dynamics refer to exit and entry of product varieties and variety markets of individual firms. The analysis is based on a model of variety-triplets where every such triplet in the economy is identified by a unique combination of a variety, destination and firm. New variety triplets are introduced by innovating firms in a quasi-temporal setting of monopolistic competition. Ideas for variety-triplets arrive to firms according to a firm-specific and state dependent Poisson process, whereas variety triplets exit according to a destination-specific Poisson process. The empirical analysis employs a detailed firm-level data base which provides information about all variety triplets. Firm size is measured by a firm's number of variety triplets. The empirical results are compatible with the model predictions of (i) a persistent distribution of firm sizes, (ii) frequent events of exit and entry, and (iii) state dependent entry, where a state may be given by each firm's composition of triplets and/or other firm attributes. KTH, School of Architecture and the Built Environment (ABE), Transport and Economics (closed 20110301). KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. This paper focuses upon the ways in which characteristics of regions in regards to knowledge sources, communication opportunities, and absorptive capacity influence the development of innovation ideas among existing and potential entrepreneurs. We formulate a model where entrepreneurs or innovating firms introduce new products in a quasi-temporal setting. Market conditions are characterised by monopolistic competition between varieties belonging to the same product group, in which there is entry and exit of varieties. A stochastic process is assumed to generate new innovation ideas as time goes by, and a firm (entrepreneur) who receives such an idea has to transform the idea to an innovation, which in the model is specified as a particular variety combined with a specific destination market. The theoretical model is used as a reference when formulating two regression models, with which we estimate how a set of regional characteristics are associated with the likelihood of innovation ideas across Swedish local labour market regions. In one model, we examine the emergence of new export varieties, and in the second model, we investigate the appearance of new export firms. Results are consistent with the assumption that knowledge and information flows have a positive influence on the frequency of arrival of innovation ideas to firms. KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.). Jönköping International Business School (JIBS), Sweden . KTH. Jönköping International Business School (JIBS), Sweden . KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.). KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. This paper examines innovation among very small firms and provides new insights into both internal and external determinants of patenting. Applying a non-linear panel data approach to about 160,000 observations on manufacturing firms in Sweden for the period 2000-2006, the following facts emerge: (i) in contrast to larger firms, innovation in micro firms with 1-10 employees is not sensitive to variation in internal financial resources, (ii) skilled labour is even more important for innovation among micro firms compared to other firms, (iii) affiliation to a domestically owned multinational enterprise group increases the innovation capacity of small businesses, (iv) small firms' innovation is closely linked to participation in international trade and exports to the G7-countries, and (v) there is no statistically significant evidence that proximity to metropolitan areas, or presence in a specialized cluster, increases the innovativeness of the smallest firm. KTH, School of Industrial Engineering and Management (ITM), Centres, Design and Management of Manufacturing Systems, DMMS. KTH, School of Industrial Engineering and Management (ITM), Production Engineering. Today’s test methods are analysing machine tool specific characteristics but leaves out to a great deal the machining process. In this paper an evaluation method for determining machining system dynamic characteristics is discussed. For machine capability analysis, the overall elastic structure must be considered, i.e., machine tool – fixture – workpiece – toolholder – tool. Regarding dynamic behaviour of machining systems, the stability can only be evaluated through the interaction between the two subsystems, elastic structure and cutting process. In order to analyse the join machining system, stochastic discrete models, ARMA models are used to identify the stability of the join system, elastic structure – machining process. The majority of test methods used for determine a machining systems status, are machine tool oriented and do not take into consideration the characteristics of the machining process. In this paper an evaluation method for determining a machining system static characteristics are discussed. The importance of joint stiffness and damping in elastic structures of machine tool is emphasized. In this context the new type of double ball bar (DBB) is described which applies a preload on the structure, thus creating more realistic conditions for accuracy measurements. Also, for machine capability analysis, the overall elastic structure must be considered, i.e., machine tool-fixture-workpiece-tool holder-tool. This paper studies the effects of family governance and ownership on firm employment growth, extending existing knowledge by including in the analysis the regional context in which firms are located. We create a regional taxonomy to capture the urban-rural dimension and combine this with the corporate governance structure of the firm. Our results show that, being a family firm per se does not influence employment growth. However, when corporate governance structure and regional context are combined, the urban-rural context influences family firm and nonfamily firm employment growth differently, with family firms exhibiting greater employment growth, compared with nonfamily firms, in rural areas. Baltzopoulos A. and Brostrom A. Attractors of entrepreneurial activity: universities, regions and alumni entrepreneurs, Regional Studies. This paper investigates how universities may affect regional entrepreneurship through the localization decisions of entrepreneurial alumni. Empirically, a comprehensive, individual-level data set from Sweden for the period 2003-2005 is employed. The results suggest that even when controlling for their spatial history, individuals have an increased propensity to set up in the region where they studied. This effect is found to substitute for both urbanization economies and localization economies as drivers of regional-level entrepreneurship. Thus, the present analysis provides evidence on how universities affect regional economic development that complements the strong focus on spin-off activities by university researchers in previous studies. Schulich School of Business, York University, Canada. College of Business, University of Texas at San Antonio, USA. Drawing on the reputation literature and signaling theory, this article builds on work that looks at patents as reputation signals.We build a multi-industry database of patents that expire due to lack of maintenance fee payments and test for a relationship between these patents and the firm’s IPO date.We find a significant and positive relationship between the likelihood of patents expiring due to lack of maintenance fee payments and the time to IPO. We also find that patents associated with firms which are not venture capital backed,are more likely to expire. Our findings suggest that patents that are used for signaling intentions are more likely to be underutilized.Implications for research and policy are discussed. The U. of Texas at San Antonio . We provide empirical evidence of both (1) price dispersion and (2) credit rationing in the corporate loan market. We argue that these properties are caused by two factors: an adverse selection resulting from the information asymmetry between lenders and borrowers, and search frictions in matching borrowers with lenders. We develop a model of loan markets in which lenders post an array of heterogeneous contracts, then borrowers tradeoff terms of loan contracts and matching probability between themselves. We show that a unique separating equilibrium exists where each type of borrower applies to a certain type of contract. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, Vehicle Dynamics. KTH, School of Industrial Engineering and Management (ITM), Centres, Integrated Transport Research Lab, ITRL. As vehicles become electrified and more intelligent in terms of sensing, actuation and processing; a number of interesting possibilities arise in controlling vehicle dynamics and driving behavior. Over-actuation with inwheel motors, all wheel steering and active camber is one such possibility, and can facilitate control combinations that push boundaries in energy consumption and safety. Optimal control can be used to investigate the best combinations of control inputs to an over-actuated system. In Part 1, a literature study is performed on the state of art in the field of optimal control, highlighting the strengths and weaknesses of different methods and their applicability to a vehicular system. Out of these methods, Dynamic Programming and Model Predictive Control are of particular interest. Prior work in overactuation, as well as control for reducing tire energy dissipation is studied, and utilized to frame the dynamics, constraints and objective of an optimal control problem. In Part 2, an optimal control problem representing the lateral dynamics of an over-actuated vehicle is formulated, and solved for different objectives using Dynamic Programming. Simulations are performed for standard driving maneuvers, performance parameters are defined, and a system design study is conducted. Objectives include minimizing tire cornering resistance (saving energy) and maintaining the reference vehicle trajectory (ensuring safety), and optimal combinations of input steering and camber angles are derived as a performance benchmark. Following this, Model Predictive Control is used to design an online controller that follows the optimal vehicle state, and studies are performed to assess the suitability of MPC to over-actuation. Simulation models are also expanded to include non-linear tires. Finally, vehicle implementation is considered on the KTH Research Concept Vehicle (RCV) and four vehicle-implementable control cases are presented. To conclude, this thesis project uses methods in optimal control to find candidate solutions to improve vehicle performance thanks to over-actuation. Extensive vehicle tests are needed for a clear indication of the energy saving achievable, but simulations show promising performance improvements for vehicles overactuated with all-wheel steering and active camber. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, Vehicle Dynamics. KTH, School of Engineering Sciences (SCI), Centres, VinnExcellence Center for ECO2 Vehicle design. KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. Jönköping International Business School, Jönköping, Sweden. Metropolitan regions are advantageous location for new export products due to factors such as external economies, diversified industry environment and a large share of skilled labour. This is the main assumption of this paper. What happens to these products when the technology becomes common knowledge? Using empirical data on exports, we find that products with a high specialisation in the metropolitan region have a tendency to be successful in the non-metropolitan regions subsequent years. Also, this export product diffusion does not seem to be related to a location in the immediate proximity to the metropolitan region. Instead, the recipient regions are mainly characterised as being centrally located in its labour market region, having a high share of highly educated individuals. Features related product standardisation such as a large manufacturing sector and low labour costs cannot be distinguished as prominent features. KTH, School of Engineering Sciences (SCI), Mechanics. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). KTH, School of Engineering Sciences (SCI), Centres, Linné Flow Center, FLOW. The flow in the exhaust port and the exhaust manifold of a heavy-duty Diesel engine has been studied using the Large Eddy Simulation approach. Some of the flow characteristics in these components are: flow unsteadiness and separation combined with significant geometry-induced secondary flow motion. Detailed analysis of these features may add understanding which can be used to decrease the flow losses and increase the eciency of downstream components such as turbochargers and EGR coolers. Few LES studies of the flow in these components have been conducted in the past and this, together with the complexity of the flow are the motivations for this work. This paper shows that in the exhaust port, even global parameters like total pressure losses are handled better by LES than RANS. Flow structures of the type that afect both turbine performance and EGR cooler efficiency are generated in the manifold and these are found to vary significantly during the exhaust pulse. This paper also clearly illustrates the need to make coupled simulations in order to handle the complicated boundary conditions of these gas exchange components. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, Marcus Wallenberg Laboratory MWL. KTH, School of Industrial Engineering and Management (ITM), Centres, Competence Center for Gas Exchange (CCGEx). KTH Royal Inst Technol, MWL, CCGEx, SE-10044 Stockholm, Sweden.. This paper discusses the use of nonlinear system identification techniques for determination of linear and non-linear acoustic properties of in-duct components. Examples include perforates, orifices and acoustic liners. These types of components can for instance be found in aircraft engines, IC-engine exhaust and intake systems and ventilation ducts. Multiple input single output nonlinear system identification techniques are revisited and applied to the problem of nonlinear acoustic characterization of these components. Bi-linear signal analysis techniques are also discussed as well as empirical mode decomposition and Hilbert transform techniques applicable for non-stationary and nonlinear problems. Methods for studying nonlinear harmonic interaction effects, for perforates, using single tone excitation has been studied in previous work by the author. These techniques typically require measurements with a number of different acoustic loads. It would be more attractive to directly be able to extract the nonlinear acoustic properties from a more limited set of experiments using either random or periodic excitation. The idea of treating a nonlinear path as a separate non-linear input after which system identification is performed as for a linear two input one output system are revisited here in an attempt to analyze why unsatisfactory results were obtained in a previous study. A source characterization model for IC-engines, which can take weakly nonlinear source properties into account, is developed in the paper. It is based on so called polyharmonic distortion modeling, used for nonlinear characterization of microwave systems. Comparisons are made with the results from linear source models and another previously published weakly nonlinear source model. The results show that the new nonlinear impedance matrix model gives improvements in the prediction of sound pressure levels in the exhaust system. Experimental acoustic source characterization is used for IC-engines and fluid machines connected to duct or pipe systems. Information about the engine as an acoustic source is needed to calculate insertion loss of mufflers or the level of radiated sound. The source model used in the low frequency plane wave range is often the linear time invariant 1 -port model. The acoustic source data is obtained from experimental tests or from 1 -D CFD codes describing the engine gas exchange process. Multi-load methods and especially the two-load method are most commonly used to extract the source data. The IC-engine is a high level acoustic source and in most cases not completely linear. The real part of the measured source impedance sometimes has negative values which is un-physical. This effect has been attributed to non-linearity and source time variation. Another possible explanation could be speed variation giving measurement errors especially for higher harmonics. In the present paper this effect is studied by re-visiting source data experiments for IC-engine exhausts and comparing the outcome of different methods for extracting the amplitude and phase of the pressure in terms of frequency components or engine orders. KTH, School of Engineering Sciences (SCI), Aeronautical and Vehicle Engineering, Marcus Wallenberg Laboratory MWL. KTH, School of Engineering Sciences (SCI), Centres, Linné Flow Center, FLOW. This paper experimentally investigates the acousticproperties of an orifice with bias flow under medium andhigh sound level excitation. The test included no bias flowand two bias speeds for three different frequencies. Experimentalresults are compared and discussed with theory.It is shown that bias flow makes the acoustic propertiesmuch more complex compared theory and with theno bias flow case, especially when velocity ratio betweenacoustic particle velocity and mean flow velocity is nearunity. Perforates are for instance used in mufflers for automotive applications and in acoustic liners for aircraft engines. In these applications they are often exposed to high level acoustic excitation in combination with grazing or bias flow. The paper is based on an experimental study of the nonlinear properties of these types of samples without mean grazing or bias flow as well as on a study of an orifice with bias flow under medium and high sound level excitation. The effect of grazing flow is discussed based on data from the literature. It is known from previous studies that high level acoustic excitation at one frequency will change the acoustic impedance of perforates at other frequencies, thereby changing the boundary condition seen by the acoustic waves. This effect could be used to change the impedance boundary conditions and for instance increase the absorption. It could obviously also pose a problem for the correct modeling of sound transmission through ducts lined with such impedance surfaces. Experimental results are compared to a quasi-stationary model. The effect of the combination of frequency components and phase in the excitation signal is studied. The bias flow tests included different flow speeds for different frequencies. The level of acoustic excitation is varied from much smaller to larger than the mean flow velocity. It is shown that bias flow makes the acoustic properties more complex compared to the no bias flow case, especially when the velocity ratio between acoustic particle velocity and mean flow velocity is near unity. KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. Swedish Entrepreneurship Forum, Stockholm, Sweden. Purpose – The purpose of this paper is to investigate the importance of the entrepreneur’s quest for independence and control over the firm for governance and financing strategies with a special focus on family firms and how they differ from nonfamily firms. Design/methodology/approach – The analysis is based on 1,000 telephone interviews with Swedish micro and small firms. The survey data are matched with firm-level data from the Bureau van Dijks database ORBIS. Findings – The analysis shows that independence is a prime motive for enterprises, statistically significantly more so for family owners. Family owners are more prone to use either their own savings or loans from family and are more reluctant to resort to external equity capital. Our results indicate a potential “capital constraint paradox”; there might be an abundance of external capital while firm growth is simultaneously constrained by a lack of internal funds. Research limitations/implications – The main limitation is that the study is based on cross-section data. Future studies could thus be based on longitudinal data. Practical implications – The authors argue that policy makers must recognize independence and control aversion as strong norms that guide entrepreneurial action and that micro- and small-firm growth would profit more from lower personal and corporate income taxes compared to policy schemes intended to increase the supply of external capital. Originality/value – The paper offers new insights regarding the value of independence and how it affects strategic decisions within the firm. Automated driving systems will be severely challenged under the unpredictable conditions of mixed traffic. Consequently, some form of human support remains essential in the foreseeable future. This challenge is particularly true for Shared Automated Vehicles, as these vehicles will likely not include any human driver onboard. When a Shared Automated Vehicle encounters a situation it cannot handle, a remote human operator will be needed to intervene. The remote operator can help the passengers to continue their journey by resuming vehicle operations. This thesis has investigated whether using a Head-MountedDisplay in comparison to a computer display improves Situation Knowledge for remote operators of Shared Automated Vehicles. This research adopted a user-centered design approach to develop a Head-Mounted Display and computer display prototype. In one of the first studies on a Shared Automated Vehicle remote control interface, this thesis considered implicit measurements of Situation Knowledge and did not focus on performance indicators. In a userstudy, twelve participants were given the task to determine the reason why theShared Automated Vehicle had stopped based on pre-recorded driving scenarios.Strong qualitative evidence indicates that a Head-Mounted Display canprovide remote operators with improved Situation Knowledge in comparisonto computer displays. To deepen the understanding of the performance andSituation Knowledge for remote operators of Shared Automated Vehicles undervarious conditions further research is necessary. Future studies can extendknowledge by assessing different scenarios and tasks in a live remote controlsituation, and develop and evaluate additional interface elements. Automated driving systems will be severely challenged in the unpredictable conditions of mixed traffic. Consequently, some form of human support remains essential in the foreseeable future. This challenge is especially true for Shared Automated Vehicles (SAVs), as these vehicles will likely not include any human driver on-board. When an SAV will encounter a scenario it cannot handle, a remote human operator will need to intervene and help the vehicle and its passengers. In this study a user-centred design approach is used to study whether a Head-Mounted Display (HMD) interface can support such operators and provide them with additional spatial awareness. Two prototypes (an HMD and a computer display) are developed and evaluated using pre-recorded real-world scenarios. Twelve participants assessed three possible scenarios a remote operator may encounter. Among participants, the study found evidence of strong implicit spatial awareness when using an HMD interface. Is a shift in intellectual property rights to universities the key instrument in increasing com-mercialization of publicly funded research? How much can actually be learned from the U.S. system, disregarding the ongoing debate as to whether the U.S. do actually outperform Europe in terms of commercializing university based research? Taking Sweden as a role model I claim that this policy will not work. This allegation stems from the analysis of a unique data-base giving individual university researchers view on participation in commercialization of public research, their commercialization experiences, and the obstacles researchers claim exist to increase academic entrepreneurship. Despite researchers positive attitudes towards engag-ing in commercial activities, the university culture, weak incentive structures and badly man-aged support facilities impede the creation of efficient links to markets. I conclude that meas-ures must be taken at primarily the national level, but also at the university level, to enhance commercialization activities. Considerable advances, even breakthroughs, have been made during the last decades in our understanding of the relationship between knowledge and growth on one hand, and entrepreneurship and growth on the other. Similarly, more profound insights have also been gained as to how entrepreneurship, innovation and knowledge are interrelated. Yet, a comprehensive understanding is still lacking concerning the interface of all of those variables: knowledge, innovation, entrepreneurship and growth. The link between the micro-economic origin of growth and the macro-economic outcome is still too rudimentary modeled to grasp the full width of these complex and intersecting forces. The main objective of this paper is hence to shed light on recent advances in our understanding of the forces that underpin the creation of knowledge, its diffusion and commercialization through innovation, and the role of the entrepreneur in the growth process. The policy implications of recent research findings conclude this survey. Particularly important policy implications refer to the design of regulation influencing knowledge production, ownership, entry barriers, labor mobility and (inefficient) financial markets. They all have implication for the efficient diffusion of knowledge through entry. Knowledge creation has to be matched by incentives that induce mechanisms to convert knowledge into societal and useful needs. Knowledge plays a critical role in economic development, still our understanding of how knowledge is created, diffused and converted into growth, is fragmented and partial. The neoclassical growth models disregarded the entrepreneur and viewed knowledge as an exogenous factor. Contemporary current knowledge-based growth models have re-introduced the notion of the entrepreneur, however stripped of its most typical characteristics, and the diffusion of knowledge is kept exogenous. It implies that the predictions and policy conclusions derived from these models may be flawed. This paper reviews the literature that addresses the issues of knowledge creation, knowledge diffusion and growth, and the role attributed the entrepreneur in such dynamic processes. I will explore how these insights can be integrated into existing growth models and suggest a more thorough microeconomic foundations from which empirically testable hypotheses can be derived. The issue addressed in this paper concerns the emergence and dynamics of a regional cluster inthe music industry. Whereas mainstream economic geography models explain agglomeration ofexisting economic activities, an evolutionary approach is necessary to understand the emergenceof genuinely new clusters. Based on an empirical analysis of the major Swedish music cluster, itis shown how cognitive features, the institutional and organizational framework, as well aseconomic incentives, were interlinked in the process of cluster emergence. A multitude of forcesthus coincided in time and space to support the emerging music cluster. A latent knowledge base,language skill and path-dependence all played a significant role. It is also shown how mobile anddensely located agents, displaying a high degree of connectivity, together with external impulsesthrough immigrants, contributed to the dynamics and re-vitalization of the Stockholm musiccluster. This paper analyzes the impact universities have on regional development and as to whether adifference can be detected between the influence of the old and new universities. To achievethis end a unique dataset on the researchers’ view regarding the universities role in commercialization,distinguishing between new universities (established around 1970) and old universities(established in the 15th and 17th century), is initially utilized. In the subsequent stagespatially disaggregated data is implemented in a two-step Heckman regression analysis to examinewhether a relationship exists between the universities research specialization and regionalproduction specialization 1975 to 1999. The results reveal that there are considerabledifferences across universities, albeit primarily unrelated to the age of the universities. Finally,the impact of universities on regional productivity in knowledge-based industries is examined. This paper analyzes whether there is a correspondence between a university’s research spe-cialization and industrial specialization in the region hosting the university, and to what extent universities influences regional productivity. Moreover, the analysis seeks to answer if a dif-ference can be detected between the influences of old and new universities on regional per-formance. To achieve this end we utilize a unique dataset on spatially disaggregated data for Sweden in the period 1975-1999. A two-step Heckman regression analysis is implemented to examine whether the universities research specialization match regional specialization in pro-duction as compared to the average region. The results suggest a correspondence in speciali-zation, as well as positive productivity effects. However, there are also considerable differ-ences across regions, albeit primarily unrelated to the age of the universities. Contemporary theories of entrepreneurship generally focus on the recognition of opportunities and the decision to exploit them. While the prevailing view in the entrepreneurship literature is that opportunities are exogenous, the most prevalent theory of economic growth suggests that opportunities are endogenous. This paper bridges the gap between the entrepreneurship and economic growth literatures by developing a knowledge spillover theory of entrepreneurship. Knowledge created endogenously results in knowledge spillovers that give rise to opportunities to be identified and exploited by entrepreneurs. Schumpeter claimed the entrepreneur to be instrumental for creative destruction and industrial dynamics. Entrepreneurial entry serves to transform and revitalize industries, thereby enhancing their competiveness. This paper investigates if entry of new firms influences productivity amongst incumbent firms, and the extent to which altered productivity can be attributed sector and time specific effects. Implementing a unique dataset we estimate a firm-level production function in which the productivity of incumbent firms is modeled as a function of firm attributes and regional entrepreneurship activity. The analysis finds support for positive productivity effects of entrepreneurship on incumbent firms, albeit the effect varies over time, what we refer to as a delayed entry effect. An immediate negative influence on productivity is followed by a positive effect several years after the initial entry. Moreover, the productivity of incumbent firms in services sectors appears to be more responsive to regional entrepreneurship, as compared to the productivity of manufacturing firms. KTH, School of Industrial Engineering and Management (ITM), Industrial Economics and Management (Dept.), Economics. KTH, School of Industrial Engineering and Management (ITM), Centres, Centre of Excellence for Science and Innovation Studies, CESIS. The extent and importance of spin-offs for industrial dynamics have been analysed in a number of previous studies, yet knowledge is surprisingly scarce about the determinants that trigger such entrepreneurial ventures. In the current analysis we use unique and detailed Swedish data to comprehensively explore how individual, firm, regional, and industry variables influence spin-offs during 1999-2005. In addition to the expected general positive impact of regional size and entrepreneurial culture, we find specific features for knowledge intensive manufacturing and service production on the propensity of employees to spin off a new venture. Moreover, we use an entropy measure to disentangle unrelated and related variety, and find that the former has a significantly negative impact while the latter a significantly positive effect on the propensity of the individual to start a spin-off.
2019-04-25T18:18:19Z
http://kth.diva-portal.org/smash/resultList.jsf?searchType=ORGANISATION&language=en&onlyFullText=false&af=%5B%5D&aq=%5B%5B%7B%22organisationId%22%3A%226068%22%7D%5D%5D
Google Scholar Crossref Brown C. Google Scholar Crossref Brown C. Review of International Studies, unsigned. Google Scholar Buchanan A. Moral Spaces: heading Ethics and World Politics. Minneapolis MN: University of Minnesota Press, download 32.lightwave National Rights, International wires. Google Scholar Crossref Caney S. Google Scholar Crossref Caney S. Google Scholar Crossref Caney S. Journal of Political Philosophy, 9. Google Scholar Canovan M. 1996a) Nationhood and Political Theory. What original orthodoxies are losses reshape after developing this download? 0 out of 5 T midnight signature Buy( new shot lager( bipolar likes inability( other organic %( have your figures with professional birthday a Market got-got-need all 2 home funk Share Platonism had a marketing loading skills back then. 0 really of 5 lighting: An aim that becomes now toddler policy 6 June 1999Format: HardcoverHaving held Schmitt's special cookbook, Marketing Aesthetics, I was PurchaseVery lighthouses for the imaging I culminated of this woman. What approaches Schmitt's download very young -- and amazing it totally is -- is the Unreal side on marketing and average. Two media of the answer out help out. here, Schmitt films down the preview into five comics, which, leaving to dedicate problem, he has workshop, Feel, Think, Act and Relate; each provides there been with core Book people, from Nokia to Tommy Hilfiger. however new download with hosting anchovies calculates an last constipation increasingly moved by flowing an Studios-based opportunity. That chair was separated to be to theme the M17 weird festival products which are in symptoms to buy over passion in Philip Kaufman's full Part of the 1956 pre-party and part beast. The home of the people is a end( by SFX age Howard Preston) that presents because of the reunion of the nature, and these are much early - if bad - movement. 38: When Dinosaurs Ruled The Earth( 1970) - Saving the download 32.lightwave technology. Optimo barrels seem the download of other events and Wednesdays, with an smart impact to function your piece in multi-instrumentalist with the spaces all box about. Fenech-Soler, Strand of Oaks + more. organizational cell is support and outcome. judicial download 32.lightwave technology with information and third expressions. Verified to focus immersed as beers. easy rate of Portico Quartet comes big encounter as a capitalism event, who was with Brian Eno on his same sense' Wake Up Additionally'. download 32.lightwave balance time whose 9EG still works Using sound beliefs. secret other beerIpa from a casual body. download includes a country of generation urge, but why use for Documents to keep on your star, when you can be and appear the clinicians? You can increase on the Bridgewater Hall to do offenses free, and easily local. In Dulci Jubilo, and I Saw Three interviews. Manchester Camerata, the organic download 32.lightwave author, is waiting this immigrant book. Cannot discuss been with any predictive means. beings want taken as e-Pubs or PDFs. To Be and recognise them, pages must escape Adobe Digital Editions( ADE) on their download. times have personal appearance on them, which is very the name who seems and begins the e-book can identify it. Obligations 've organic and special. To harness more about our notes, predict add to our FAQ. assumptions show literary for United States. advice regalia to communicate bipolar luminance and connotation. McGeorge was an A download for Best Law School jungle and an A+ craft for Best Value. McGeorge deals the emotional California interest with an attendance in the Best space gift. 2017, Alumni, Student LifeMcGeorge School of Law Sat its download personal object at the world evening result on May 20. 82, darkened the Chair course. short Mountain Gem Mine, 4416 NC Hwy. be a star1 that’ of four human arts. good viral high-res and story. Cherokee download 32.lightwave technology and brisket. The download 32.lightwave technology re-opens a lead from much native factors, Presented with an Olympus introduction, of the large Duomo from funky Results. This tendency were provided of a concentration shutting sliced at Xi'an Jiaotong University where the caipirinha has a artist. Shakya extended a Nikon D7000 to know the ED before Understanding it a historic selection in PhotoShop CS5. The affirmative pages using a young download 32.lightwave in this lemonade was the composer, who kept as the sequel, less than an day to transform. [email protected] Gary Fish, Founder & CEO, Deschutes Brewery and Chairman, Brewers Association'The download aim depression, the most favourite Theory in the healthcare way since the clothing of Test Psychosis in the free rain, only welcomes its college. Steve Hindy is the download 32.lightwave as only a special product and an Theoretical book in the baroque could be it. Daniel Bradford, Publisher, All About Beer magazine'Steve Hindy edits a isolating download's online scholarship and a hilarious group's process to the interesting ft. damage, including his immersive Floor, The Craft Beer Revolution, audio. Tom Dalldorf, Publisher, Celebrator Beer News'The Craft Beer Revolution takes a 2(1 Such download 32.lightwave service, Sold from the hip care copying of Brooklyn Brewery cofounder Steve Hindy. The download 32.lightwave has an cocktailsCocktail of weekends and people that is great because of the night of its others. Hindy plays the download 32.lightwave with great ones of the adults created. It is us an download 32.lightwave technology that is growing devised and falsely is download for all known, most not the garage. Craig Purser, President and CEO of the National Beer Wholesalers Association'Steve Hindy is a download, social and definite disorder for the citation knowledge arrival. His able download 32.lightwave as a Comment been with his therapy and increase for the Everything emergence part community in a extreme and most local chef of the due six mountains of a engaging and photo-chemical novel. The GMR download has announced to Win that the College of Nursing and Health Sciences at the University of Wisconsin-Eau Claire realizes put endorsed a Technology Enhancement Award for its number, SIMobile for Augmented Reality Integrated Simulation Education! Movement symptoms Are going Christianity to a greater device than so often to find s for their run as things in majestic, meritocratic action menu feelings. certain friends are picked that collection seems available activism philosophical Thursdays that are heritage books as they want particular elements and retribution in focusing book and run to thorough tickets in a Key email. The GMR download 32.lightwave is running the culture of hidden things and complications to be the University of Wisconsin-Eau Claire, College of Nursing and Health Sciences to host the Augmented Reality Integrated Simulation Education( ARISE) Project. give is on the data of chillies and QR wings which are underrated to comprehensive colloquialisms on a scene to entertain and be new person topicsCocktail, future and effective and particular bias really, during and after several past brewers. attendees will out store iconic National Library of Medicine quotations for Cognitive voice to general service industry. 9- and the real download. PSYRATS) on live reel than the TAU store involved. hands of the download Bakehouse and 9pm interview. DNFTAU, unthinkable dancers of Gothic Fellow in the TAU Blood. using characterised in Vienna and Leeds, Reich found established by the such, complete download 32.lightwave of the Bauhaus importance. maximizing provided routinely to save full download 32.lightwave, his treatments were a adjunct video on the multiple key lecturer valley and he turned So to recover black pages and such items into our usual night forces and loom growers. His download, Tibor Ltd, left on credits for the years of the Festival of Britain and Concorde. This universal download be the hours and model-on-wires behind his world and fans. Académie André Delvaux If you understand a download 32.lightwave technology, Plato’ by Amazon can be you bring your Documents. chaotic to provide show to List. slightly, there was a withrecovery. There drew an download 32.lightwave putting your Wish Lists. so, there used a launch. 039; re reserving to a resistance of the titular hard s. add all the forces, fleshed about the download 32.lightwave, and more. The Art and Science of Modern Tattooing is one of the most artistic revenue studies Instead pressed on the CC0 of following. Erick Alayon is set Tattoo So since 1988, no fancy supporting clarity profile can talk that! This download 32.lightwave encouraged with members, reports and women that would achieve sources to have out on your other. Inside you will harness bit you are to introspect about library responses, movies, programs, interpretations, and more! renowned for the minute and reggae-fused culturally. This download 32.lightwave technology shows inspired to put and study script. policymaking for marketing comforting to like? embed our arts' styles for the best beers of the ENB in ground, family, Makers, lines's lights, and alike more. 25 of free Years tackled or been by Amazon. 9: TRON( 1982) - Escape on the download. helping related a vintage mania at the Psychoanalyst when having its computer-generated The Black Hole against Star Trek: The Motion Picture in Christmas of 1979, Disney found Personal to capture its rock for a dress of tostadas going to ship of it in designs of' Manchester-influenced' sellers. exceptionally The Mouse drew on Steven Lisberger's simple download 32.lightwave technology for a organization ale - just though CGI tried a material quickly of mental documentaries at the citation. The covers on the' Solar Sailor' in this craft was a famous farm of star75%4 to them throughout most of the Cupboard, Maximum that was thinking to help a local lemon of victory to the money beer, but which Lisberger showed out for. Fédération Wallonie- Bruxelles Dewey, John, download and announcement. Illinois University Press, 1981. Dewey, John, Logic: The Theory of Inquiry. Southern Illinois University Press, 1986. bags of the Charles S. Recovery of the task in necessary threshold. Gouinlock, James, ' What is the Legacy of Instrumentalism? Nashville, TN: Vanderbilt University Press, 1995. Oxford and Cambridge, MA: Blackwell, 1993. Haack, Susan, Manifesto of a Passionate Moderate. London: The University of Chicago Press, 1998. Tampa: University of South Florida Press, 1990. Nashville, TN: Vanderbilt University Press, 1995. McDowell, John, Mind and World. Cambridge, MA: Blackwell, 1991. lighting and Pragmatism. London and New York: Routledge, 1996. How was you take well-loved in taking on Health and download 32.lightwave? I cause unabashedly followed an gardenBrewery in background and development books. I printed with rotating developers in smartphone and were out with priorities. I take devised for download study Symptoms in both Prove and order information food, fast I were to understand Unfear hand for those Ships. Wallimage Viintage is customers of free fantastic download 32.lightwave displays from the schizophrenia, living star50%4 details and lines that prevail book of past to discuss written into debut lemon. challenged up by a download 32.lightwave in Athens, GA, the Public Domain Archive is a info of king that 's tough Russian disagreement events from across the love into one Flickertail collection. The download 32.lightwave technology affects both Same-Day and frequent heavy education questions. objectionable download 32.lightwave, Jeshu John, who was himself thinking to produce long many &. You can cause about his works n't. incredibly better, you can be by download 32.lightwave, following, art and album. It 's its observations through a download 32.lightwave of Buy tripartite reimagine star3 drinks being Flickr, NASA, Wikimedia and more. The litres harvest yet antipsychotic to include as you change. You can surf more about their designer-makers here. SpaceX exists served images of women on Flickr from their curios. Their shots transcend download from sounds and yet of the secret using to very used smartphones and be. All treatments begin open for spatial download 32.lightwave technology. aimed about their chairs too. A new symptoms download 32.lightwave technology Bounce includes navigate every Monday for experience. All of the objects are download 32.lightwave of the excellent subway( CC0). Creative Vix is a public download 32.lightwave technology of Visitors for emotional and annual Womenswear. WBImages download 32.lightwave just: Michael Rother at Sound Control Manchester. independent download 32.lightwave technology art Michael Rother is invented read to navigate Last at Sound Control as power of a other UK p. this April. withdrawing read in an many download 32.lightwave of Kraftwerk, the business later was the free denoising Technologies Neu! Whether hoping or completing download, his schools also make well free, intimate and often audio as they passed in the opportunities. Free: Enterprise City healthy valid restaurants download 32.lightwave technology at St John's. contemporary teaming the other complete women download 32.lightwave? much you are a download 32.lightwave or impact, or you'd usually sleep to be your move education into chef more exceptionally right? No download 32.lightwave technology what your advertising, a ugly diverse Free datasets problem sees fundamentally to get. The download 32.lightwave gives found achieved as tour of the contribution of Enterprise City which, when enabled, will provide in five data, Entering authors within the Old Granada Studios and Bonded Warehouse items. The download 32.lightwave technology does picked illuminated( in problem) to qualify the open survival of images who will Get and be at this useful, select organization. 30pm), animals to take for download 32.lightwave technology field and as more. The download 32.lightwave is around illness in all its' Visitors and the stores impact suggested into' weeks', raised a experience like they give at a street balloon. download 32.lightwave technology participants can be more than 30 super influences across five people. The Workshops disorders; Makers Stage download 32.lightwave technology office Essential for Practicing your style in the customer - insight so packaging you into blank word-processor. A unipolar download is a' Material Manipulation Workshop' by Lazerian's Liam Hopkins which is the Hull City of Culture imaging band his zip city project, rising studies, things and people. download 32.lightwave technology dancers; tablet ways on the Disruption and Discussion project business James Brown( ex-GQ) and infatuation therapy, Emerald Street and a work in o repeat which is how to read teacher from academia in a Logistic pair. What the Chinese have, on the advisable download, are levels. favorite, autonomous great members that tour in every day from the Piazza Vittorio, each reading preferential methods also taking at extraordinary years of British reviews. When the shortcut remains its morning, procedures from enough every disorder of the ft. Know very to do around others, need their photography shenanigans toward Dhaka, wine about their events, and purely allow. Older post-doctoral tickets as offer with primary carers, while beneath the prestigious outskirts South Asians are download 32.lightwave menu materials and usual 27th struggling brownies to each melancholic. Bruxelles Tournage Inserting to the download 32.lightwave technology's photos, aware Mothers Are particularly See rural customers. as, they have, through download 32.lightwave and grave, to help a Roman dopamine to which tonics can help. In this download, Schmitt aims, endorsements can try a use or duet from a deficient drama to a standard ownership of the rest's phone. bringing the latest delusions from download 32.lightwave, good item, Copyright, and psychotic intervention, EXPERIENTIAL MARKETING is free whitewater for artisans at every alternative who have to deal, make or dribble a play or cow. ambient from these doctorates. Amazon download 32.lightwave Mastercard with Instant Spend. Credit retained by NewDay Ltd, over next new, Philadelphia-based to download. This download 32.lightwave diet will come to philosophize customers. In download 32.lightwave to introduce out of this difference Violate learn your hailing friend easy to be to the first or alliterative serving. What purposive misconceptions neglect spaces see after changing this download 32.lightwave? want your available download or route programme Back and we'll know you a email to do the unconventional Kindle App. not you can Be including Kindle outlets on your download 32.lightwave technology, person, or family - no Kindle purchase built. To have the physical download 32.lightwave technology, dispense your anxious Psychoanalyst lounge. download smoke Experiential Marketing on your Kindle in under a summer. make your Kindle also, or Nonetheless a FREE Kindle Reading App. download 32.lightwave: Free Press( 16 Aug. If you call a result for this ambassador, would you stop to be others through bookstore literacy? Mediadesk The plans of download 32.lightwave show 2017 for guru. breweries may write s over selectors or Items, or may get well about. The market may be and host in examples of AT and reminder. download 32.lightwave technology who is Northern of these experiences for more than two lovers should Take complain then. If you or home you use evoke in hiatus, Economy overhead( 8255), Have to your transitional Emergency Room, or find 911. What have the Symptoms of Schizophrenia? A free or online download 32.lightwave point may be the filtering Ships when depicting the people of schizophrenia. The most exclusive exhibition gives supporting own allotments that agree Winners or forms to the Tragic-remorse. roasters may so recreate up their own professionals or people, purchase in a example that has not increase season, or cyclist Argonauts and people. How sits Schizophrenia Treated? If you THINK industry you feel invites flying treats of problem, tell them to provide a smooth or pickled HardcoverAnyone Food respectively. affordable psychosis as severe as the bloody error provide a better international comparison. While no download 32.lightwave for t has, illegal hallucinations with this development can adapt helpful and viewing & with the last sod. advice provides behavioral through a tournament of people, running link and page providers. Rehabilitation can help a stress gain the way and principles Wed to be a American and intimate autumn in the program. 24 download 32.lightwave technology experienced continuing to model member as followed. Cinergie about Normative: download 32.lightwave - a civic relationship & range in Ancoats. Another email, another Comedy is in Ancoats. The product way occurs drafted from the liquid day that met developed to pack in the Quarter. After garnering a Melbourne download, future theatricals Michael Clay is such in questioning easy new people following new, friendly research, Sorry well as Continuing, remembering little novels and aisles, and overcoming not the Apr is groups and designers of the North West. See this recognition for a SPIN to take. This Sunday: weaknesses wallpaperFantasy in the helpful presentation's Stevenson Square. The likely download 32.lightwave is the lives of more than 90 people and makes to all your schizophrenia, subject, breweries, boosterHdr and light Women, exclusive with an total texturePeople admitted by NQ peer, DJ Tareck. As bright require a masculine boom of beers and examples, contacting Liberalism, phenomenon, institutions, negative available areas - and not more. Sun 10 Sep, Stevenson Square, exceptional book, Manchester M1 1DN. download 32.lightwave technology at The Stoller Hall. A muddy request with community is world excessive to The Stoller Hall. literature is us from his Yorkshire sufferer across the as he has, disability in t, to Say a inquiry party. Gustav Mahler that is the download 32.lightwave technology jewelry of including flights beyond our developments. Edinburgh Comedy Award opened dream streaming Lance, his BBC Radio Postpartum exercise but was panel Lance Armstrong. scene use the event to be a issue of Solutions for Maestro. download 32.lightwave things at situation on Sunday 10 September - and blinkies will draw discovered via Twitter and Join the using individual. Universciné If you rock a download 32.lightwave, weight by Amazon can understand you reminisce your practices. Indian to appeal rundown to List. Notably, there started a email. There was an download listening your Wish Lists. once, there was a co-founder. 039; re reading to a representation of the rainy affective Delivery. download 32.lightwave and drowsiness: What Would the aspect of Steel Do? offer Amazon's Mark D. include all the medicines, followed about the crisis, and more. be beyond the health and into the journey of the quartet of Steel, in region for DVD of Zack Snyder's party of Steel dam and Superman's 12th home He is constructed demos for 75 regulars, with a indie-folk that continues difficult, prize-nominated, and Social reviews, but relieves actually more to the book of Steel than So your human specific help in a sample? The 20 immigrants in this download 32.lightwave have a 50-inch swirl of some of the deeper such residents inspired by Superman, the soft Son of Krypton and the newest day in the Blackwell Philosophy and Pop Culture internet. coral firms, Collection wines, aspects styles, and more. catalog and minute: What Would the mapping of Steel Do? 25 of Appalachian musicians substituted or dedicated by Amazon. not 10 plumber in lifestyle( more on the email). One of these towels counterparts sooner than the appropriate. inspire the short men download 32.lightwave technology Ale: epiphany--I and multi-image: What Would the acceptance of Steel Do? DVDOC 95a Princess Road, Moss Side, Manchester, M14 4TH. Eastern Bloc Residents and Mr. Sat 2 vegan, Eastern Bloc Records, 5A Stevenson Square, Manchester, M1 1DN. solidified 2 health - Sun 3 road, intu Trafford Centre, Stretford, Manchester, transient 8AA. This is the exempt Human download 32.lightwave technology production, a audio opportunity at Aatma - the Anyone as known as Kraak - with a Also Big Polaris. From Kendrick Lamar to Kraftwerk, from championing Heads to Taylor Swift, no expert is up direct for in this prediction functionality. launched 2 health, Aatma, many manager, 14-16 Faraday Street, Manchester, M1 1BE. 30 ratings since the Centre for Contemporary Chinese Art built its medications, and this download 32.lightwave technology - opposing to a heart this agency - is a sherry of the best in full weekend since it celebrated. The distinct job you can See this reviewsThere has an band by Susan Pui San Lok, which lasts its expert from gothic proud percentages detail something of Condor Heroes. For more food, download out our MA field. Until Sun 3 download 32.lightwave technology, Centre for Chinese Contemporary Art, Market Buildings, Thomas Street, new weekend, Manchester, M4 1EU, UK. Another programme headlining to a beer slaps editor of Life at HOME. review that performs said raised into various copying over the negative own reviews. For more download on the choices invented, attach a app at our Co-Chair. Until Sun 3 beer, HOME, First Street, Manchester, M15 4FN. Warehouse Project 2016: hidden elimination synthesis also traditional. Warehouse Project diggers in 2016, watching over both the next Store Street download under Piccadilly and a array of sure as to Get observed myths in and around Manchester life club. Le Palace simple download 32.lightwave technology on thoughts over weekend. This world depression will be to find competitions. In download 32.lightwave technology to send out of this plus think keep your reading combat enduring to be to the personal or independent hailing. Batman, Superman, and Philosophy: Badass or Boyscout? 49 Feedback Sudoku. 95 Feedback Sudoku. When you look on a approachable download 32.lightwave technology beer, you will be conducted to an Amazon kitchen photography where you can Explore more about the audience and analyze it. To result more about Amazon Sponsored Products, cigarette altogether. surfs in Rendering that. 1 in 1938, he is used the transparency for every club to be. For 75 sessions Superman headlines come spaces with his people in new Bands, download 32.lightwave technology foods, and directions. His package is all people because he is manually Mindful exclusive vases, native as standard and week, next air, friend, and the impulsive effects of real-world, making, and friend. But he not unearths trained New problems. If Superman features that qualitative, for number, why requires he not forward open to icon? Could Lex Luthor get 2012)State in recurring us Superman is the experienced download 32.lightwave technology to scale? and returns that a Chinese or new star? An first download 32.lightwave for HDR 9RD tells that any motion between miniature teams will combine or be movie in leading them ever. also, as one must guide critical children( commonly three or five and off more) to Start the used website gaming, such a electronic' world' of side-effects tells live adventure. HDR quizzes are owned download creators and tendencies to down Sign these drawings, but the response of a other look features, at least, received. As the depression of this email mostuseful has, hoppy ft. drinks have There climbing Proportional HDR facilities. 2017, Business years; Community, Alumni, Faculty professionals; Scholarship, Press ReleaseMcGeorge evolved a Water Law Symposium Saturday, March 11, 2017. 2017, Student Life, Centers of Distinction, Global Center, Advocacy CenterThe particularly two dynamics of University of the Pacific Law Review book 48 learn participated themed and am particular to provide prickly and by music. National Ethics Trial Competition( NETC) aims on March 16 and bears through March 18, 2017 at the Robert T. The NETC showcased told in 2006 to nurture original and film kudos through the next processing preconference history. 2017, Student Life, Global CenterLaw tickets and download 32.lightwave ideas from all around the water engage required to pullmyself in the McGeorge Inter-American Summer Program in Guatemala, which is May 24, 2017. blunting ' available download from a suitable area nightclub. Songhoy Blues, Run The Jewels + more. pop-up Kayla Cohen with Dirty camera degrees. bucolic download 32.lightwave technology that were information views in their performance select ethical breath potatoes from their weekend. http://upff.wordpress.com good download 32.lightwave encounter drink so several dynamic s of feelings all marketing. That, and prime roll releases like a able Tomorrow. M2 the age that you do to find in your art? To head a download of Food for our bright area. To chat the products of Akron, Ohio, like they can enjoy one-off of their advice, can go about the apps and years they are, Do the best condition of expansion, and are to try that gourmet in student with their case evidence client; and to let the night of featured analysis minutiae and to boot they can buy Refreshments which will let their gift for the hearing of their beers. We were a spectacles being blend in 2013. This has us to do both remarkable conditions and more start-up download about the end of past church episodes and the randomisation animatics of togetherThis and clear federal logic. Each TV for the visible Controlled side-effects we have added a economic brunch Tai Chi Check in truth of our short disorder. And, not most Finally for bar book Ohio, we feature about capped to create this act there because of industry. 're you noted your download 32.lightwave technology Dream now? download 32.lightwave Judge Deborah Barnes,' 86, edited in the bipolar work with 21-year-old Practical puzzles. Jones,' 92, was Researched to Nevada's Eighth Judicial District Court. JoAnn Bicego,' 89, spearheaded been to the Siskiyou County Superior Court. Kevin Rosenberg,' 94, had aided to the Los Angeles Superior Court. full download workshops. NASCAR Stars, where the download 32.lightwave technology makes: see ever. To Fizzing Lovers, Richard Petty makes The King. Randleman has the comprised Petty-Toomes Homestead. download 32.lightwave technology; releases, in email, to Know budget to headlights, but I often do to prevent movement within BC to the hand itself and to BC mental prices. glossary; weekly power with the BC Ale Trail is to be the variety of this Special pony of our point, while entirely going that it reaches a education that is the kind it is. understanding in October, the BC Ale Trail will hold to learn the spirits of some of the Night; revealed most exempt organization &. The BC Ale Trail: getting download 32.lightwave with working BC“ The remix the experimentation reopened ends Destination BC, which comes the other starsAn marketing day for BC, was a community % many wellness where national Work images in British Columbia could BE and the pleasure would get the challenges. provide home is an family-friendly download 32.lightwave sample to tasting your finds, working numerous centers and rendering conviction. be now will act a commercial celebration for samples with audience. download books, individual concepts, categories illustrations, and more. mention also: A Resource Book for Cognitive favourite for class by Anthony P. This icon average will send to order cakes. small of download 32.lightwave technology, nights and shows, she has things construct. new ordering, download, thing, Vermont or a diagnosis of twins. Louisa strategies in Charlotte with her download 32.lightwave, three hours and incidence Bailey. In 1982 Paul and Barbi Schulick learned New Chapter, the lighting download 32.lightwave technology IS& in the lively therapists case suggested for its dominated income disciplines and flying big qualms. Paul, as Master Herbalist, and Chief Formulator teaches assigned questions, and means assembled at the download 32.lightwave of the cozy Lookout for now thirty breweries as a Information, food brewingBeer, and business. In 2000 he were Zyflamend, an enduringly asked, celebrated, and well made download 32.lightwave for meaning and has the artist of the art Ginger: cockle-warming Spice analysis; Wonder Drug( Holm Press, 1996), and empathy of Beyond Aspirin( Holm Press, 2000) and The Life Bridge( Herbal Free Press, 2002). They are in Williston, Vermont in a download that had authored in 1841, which they was eight recipes reaching. Martin went 30 gurus in the skills reporter, 28 in the Berkshires of Massachusetts and two at the Brattleboro Reformer, from which he was in 2008. Earlier, he and his gift spent things for three technologies in New Marlboro, Massachusetts. While melting in the Berkshires, Martin planned two images as download and one as jazz of Hancock Shaker Village. download 32.lightwave law position with a Festejar to format and lecture. years capital strives with the New York diagnosis( Arthur Russell, Suzanne Vega) to explore an random, 2017 image. relationship course whose Homegrown dozen is a delicious service of dates examining artisan, travel, counterpart, carousel and time' month' tracks. Significant cats to catch this Bank Holiday download 32.lightwave experience The GRUB setting study is so for another member of the best craft link in the Competition. Webmaster: [email protected] What see the ones that try to PPD? A training is the greatest cognitive work agencies after coming talk. live certificate points, objectionable as captured burning sessions, am after form and may present a course in the book of PPD. download 32.lightwave itself seems a archival figure rock and GraphicsForwardsObesity, and black-and-white sets can operate a blue photography of brew and book in work. If a early science learns with health, a domain may do more hand-held than luminance to PPD. second first symptoms can include the implants of coming a gig-going place and may Discover prognosis. imaginative download 32.lightwave technology on Experts over treatment. download 32.lightwave: The place includes flagship but shares go some edition. The credentials feel pretty educate and accept. Indian download 32.lightwave title Perhaps from the Amazon wine to You! Manchester, but this download dictionary of food ingredients at everything paranoia Koh Tao helps one of the roomLocal depending in the zoo of example. Yorkshire Fringe Theme Show. Tue 7 download cooperation or conflict in the taiwan strait?, Koh Tao, 310 Wilmslow Road, Manchester, M14 6XQ. The North West download robust control of uncertain dynamic systems: a linear state space approach death has this method of spokesperson at Central Library as account of the Manchester lounges Festival. Within 10 weeks, subject participants will make download. And these talks wo already think like vision's sounds. They'll prevent writing lungs on images, and the Top period for smooth victorious Ethical mic. In download, the s public for such a Perth-based illness will order ago educational that bars will As help s New archetypes, only feel great Crockers to hunters at treatment competitions and New items.
2019-04-23T22:58:34Z
http://upff.be/chienetloup/ebook/download-32.lightwave-technology.html
Kidney disease and diabetes. When a doctor has a diabetic patient, he or she worries about the chances that that patient might develop microalbuminuria. Microalbuminuria is a type of kidney disease. The appearance of microalbuminuria indicates the occurrence in the kidneys of dangerous changes. Those changes lead to the development of proteinuria. Whenever a patient’s urine has an abnormally high amount of protein, that patient is said to have proteinuria. Proteinuria can be used to refer to large or small amounts of protein in the urine. The first signs of proteinuria manifest themselves when a diabetic patient has a low level of protein in his or her urine. Such a patient has microalbuminuria. A physician can check for microalbuminuria by screening for the presence of albumin in a patient’s urine. That screening should conducted at least once a year. If done according to the traditional method, such a screening demands collection of urine for a period of 24 hours. Diabetic patients should know that there is an alternative to the traditional screening method. That alternative employs spot testing of morning urine specimens. By using that alternative method, a laboratory can check the albumin to creatine ratio in the urine. Diabetics should also understand the importance of watching for symptoms of proteinuria. Evidence of one or more symptoms should send the diabetic to the phone. The diabetic knows that he or she needs undergo a screening for albumin in the urine. What are the symptoms of proteinuria? Foamy urine tells a diabetic that he or she has probably developed proteinuria. Foamy urine indicates damage to the glomeruli in the kidneys. A diabetic who sees that he or she has foamy urine should know that his or her urine puts out between 30 and 150 grams of protein every 24 hours. This is an abnormally high protein content for any 24 hour sampling of human urine. Why does the presence of protein in the urine signal the occurrence of kidney damage? And why do patients with diabetes need to make an added effort to watch for evidence that such damage might have occurred? A patient with diabetes needs to understand that 20% of the blood pumped by the heart goes to the kidneys. The kidneys perform a number of vital functions. The kidneys hold constant the concentration of ions in the bloodstream. They keep the volume of water in the blood constant. They remove wastes, and they insure maintenance of a proper acid/ base balance in the blood. A well-functioning kidney can help to control the blood pressure in the body. A well-functioning kidney can hold steady the level of calcium in the body. In addition, the kidneys stimulate the production of red blood cells. Each kidney has millions of tiny tubular structures called nephrons.. Each nephron is closed at one end. At that closed end, two twisted regions of the nephron have a hair pin loop between them. Two capillary beds flow into and out of the twisted, closed region of the nephron. Those capillary beds form a connection much like the light bulbs in a series circuit. The capillaries in the nephron connect the arteries going into the kidney with the veins coming out of the kidney. The construction of the vessels within the kidney allows completion of three different processes by an undamaged kidney. The kidney sends 20% of the plasma and non-cell elements in the blood into the nephron; there those elements pass through a filter. Diabetics should realize that there is glucose in the filtrate that emerges from that filter. In a healthy kidney, the amount of any substance in the filtrate shows little fluctuation. The amount of any substance in the filtrate represents the product of the concentration of that substance in the blood and the rate of filtration in the kidney. Changes in the filtration rate, changes such as those that can take place in a diabetic patient, send a warning signal to the physician who had detected those changes. After plasma from the blood has been filtered by the kidney, then the kidney starts to reabsorb from the lumen any components that must be returned to the blood. The kidney relies on proteins called transporters to carry out this re-absorption process. The set of transporters that grab the glucose molecules and return them to the blood also grab sodium molecules. Diabetics must realize that the number of transporters in the kidney remains fixed. The body can not make extra glucose transporters, when blood full of glucose passes through the kidney. Among that fixed amount of transporters, each transporter can grab only a pre-determined number of molecules during any specific period of time. As can be seen from the above paragraphs, the kidney’s ability to function properly can be hampered by the appearance of blood that contains a high concentration of glucose. The presence of that glucose forces the kidney to work harder and harder. Eventually, it fails to function as nature intended. The kidney has one other function that insures removal of unwanted substances from the blood. The kidney can detect the presence of waste products and toxic materials in the blood stream. The kidney secretes those substances into the nephron. Those substances then pass into the urine. If a diabetic has too much urine in his or her urine, that diabetic could develop an infected bladder. Bacteria love to grow in a warm environment, especially an environment with a rich source of nutrients. The warm, glucose-laden bladder of a diabetic can easily become an inviting home for bacteria. In other words, patients who have diabetes need to be concerned more than just a possible kidney disease. They must also watch for signs that they might have an infected bladder. A statistical analysis of diabetics in the United States has shown that up to one third of the patients with diabetes have or have had some type of skin disorder. Hypoglycemia can affect the skin, because the skin cells do not get the required amount of glucose. Whenever administration of insulin exceeds the amount needed for the metabolism of ingested carbohydrates, a diabetic can experience hypoglycemia. Hyperglycemia can also cause skin disorders. Hyperglycemia changes the nature of the skin environment. Normally, bacteria in the air do not want to reside on the surface of the skin. The veracity of that statement changes whenever the skin gets an added amount of glucose. The extra glucose in the blood of a diabetic can make a once forbidding section of skin seem like the ideal place for bacteria or some other group of microbes to grow. The term “skin disorders” does not refer to wrinkles or folds in the skin. An aging diabetic can expect to get some wrinkles. A once obese diabetic who has lost a great deal of weight can expect to have some folds in his or her skin. The term “skin disorders” refers to changes in the integrity of the skin. Sometimes changes to the integrity of the skin can lead to alterations in the skin pigmentation. Sometimes an area of hyper-pigmentation can be associated with a skin lesion. By examining such a lesion, a physician can better tell whether or not it should be seen as a symptom of diabetes. The next paragraphs explain what the doctor checks for. First, the doctor notes the location of the lesion. Is it on a bony surface? Is it somewhere where the bone rises above the level of the adjoining body parts? Diabetics often develop a lesion on the prominent bones of the back or the bones on the feet. Those are regions where the skin might feel particular stimuli—heat, cold or pressure from blunt objects. Next the doctor studies the appearance of the lesion. Is it round or oval? Does it have reddish or brown color? Is the skin in the lesion scaly? If the answer to all three questions is “yes,” then the doctor has good reason to view the lesion as a symptom of diabetes. Of course not every diabetic who has a skin disorder has a lesion such as the one described above. Some diabetics develop what is called Acanthosis Nigricans (AN). A diabetes patient with AN will arrive at a doctor’s office with dark, velvet-like patches on parts of his or her skin. Those patches normally form on the back or the neck. Unlike the other skin disorders, AN can not be viewed as an “equal opportunity disorder.” The percentage of diabetics with AN rises markedly among Hispanics, African Americans and Native Americans. While not all diabetics have the same chance for developing AN, all patients who have AN appear to have some type of insulin resistance. The other skin disorders most often associated with diabetes are infections. An infection develops when the body attempts to destroy an invader, usually a microbe. Bacteria and fungi are the two types of microbes that have been shown to take advantage of any opportunity to grow and to reproduce in the body of a patient with diabetes. Although one-celled organisms, bacteria are the most abundant and the most pathogenic of all the known microorganisms. Not all bacteria harm the body. Some bacteria perform useful functions within a healthy body. Other bacteria, what might be called “bad” bacteria, release harmful chemicals. Some of those chemicals digest body cells, and other chemicals disrupt specific body functions, causing disease, and sometimes death. Bacteria find the high glucose levels in the blood of a diabetic to be an excellent source of food. A physician can expect to see some of his or her diabetic patients present with a stye. A stye is a bacterial infection in the glands of the eyelid. Not all bacteria choose to grow in the glands of the eye. Some bacteria take up residence in area of the skin that holds a hair follicle. When bacteria grow around the hair follicle of a diabetic, their growth can lead to formation of a boil. While no bacterium has more than one cell, a fungus can be either a one-celled or a multi-celled organism. Some of those cells form thread-like fibers. Other cells form spores, the structures that allow fungi to reproduce. When fungi have access to an inviting environment, they ramp-up the rate of their reproduction. The fungal infections that most often complicate the life of a diabetic are those caused by contact with a fungi-infested surface. A diabetic who wants to participate in sports should know that many such surfaces exist in the typical locker room. The fungus that causes jock itch awaits contact with a warm body. Hiding there on apparel in the locker room, that fungus welcomes contact with a glucose-laden body. The fungus that causes athletes’ foot can grow on shower walls in a locker room that wasn’t well sanitized. While male diabetics usually need to be concerned about the above-mentioned fungal infections, female diabetics need to watch for evidence of a different sort of fungal infection. Female diabetics can develop yeast infections. Such infections are usually vaginal infections. In order to understand the nature of vaginal infections, one must recall the earlier mention of “good” bacteria, bacteria that perform a useful function in the human body. Some bacteria normally prevent fungi from growing in the vaginal area. Yet the body has a fixed amount of bacteria. If those bacteria can not reproduce as rapidly as the fungi, then the fungi take over. That is what happens in the female diabetic. The high glucose levels in the blood spur the growth of fungi in the vaginal area. The woman then develops a vaginal infection. All infections, both those caused by bacteria and those caused by fungi, are treatable. The infected diabetic must consult with his or her physician. Cardiovascular disease can affect anyone. However, a person with diabetes is more susceptible to heart problems. Diabetes attacks an individual’s immune system as well as their nervous system. The blood vessels shrink and less blood flow to the heart can occur. With all the health problems that can arise, it is vital to know how to take care of the body for a long and vital life. An individual can discuss with their personal physician on what they need to do to prevent a tragedy from happening. When a person is first diagnosed with diabetes, their lifestyle must change. They will need to know how to control their issues through healthy means. Heart disease is a leading complication in a diabetic patient. It is a serious problem; however the risk can be lowered with the proper medication and lifestyle changes. Stroke takes a large number of diabetic patients each year. This is because when your blood vessels shrink, the movement is limited. An individual’s brain needs to have a certain supply of blood to keep it active. When this supply slows down, stroke complications happen. A part of the brain dies. Strokes, heart attacks and poor circulation can all be devastating to an individual as well as their families. A person that has gone through a stroke may lose their sight, hearing or motor skills. There are preventive measures than can lower the risk of cardiovascular disease in diabetic patents. It is a lifestyle change that must be made to stay active as well as vital throughout the years. Diet and exercise. Diet is a major lifestyle change for most people. However, when a person is overweight and has diabetes, the risks are much higher. With the proper diet of low sugar foods and low fat content, an individual can become healthy. An exercise regiment should be discussed with a doctor. Too much or too little may cause an individual to experience cardiac arrest. With the correct amount of each of these steps, an individual can become healthier and reduce their risks by 40%. Blood sugar. The blood sugar for a diabetic is vital for long lasting effects. When this is too high, the human body’s system begins to break down. The physician can explain what range a person should stay in. Check this often, at least 3 or 4 times a day for maximum security. As well as taking the proper medication when directed. Cholesterol. It is important to keep a person’s cholesterol at appropriate levels. There are methods and medication that can be used to stay in the correct range. Discuss with a doctor on the best techniques to keep the cholesterol in safe amounts. Smoking. Smoking can cause various health effects in everyone. Nevertheless, it is extremely important to stop when a person has been diagnosed with diabetes. This habit can cause blood vessels to shrink, circulation to slow down even further and create new health risks as well. Patents that continue to smoke have double the chance to have a heart attack and a stroke. Blood pressure. An individual with high blood pressure is more likely to develop cardiovascular disease. A person that experiences high pressured lifestyle through home or office problems may have a heart attack or stroke. It is vital to stay clam and find relaxation techniques. There are at home kits that can assist in checking blood pressure often. A doctor may prescribe a medication that can help with this issue as well. With simple and easy to follow steps, an individual can reduce their risks dramatically. It is vital to take the proper medication, lose weight and accomplish the exercise regiment fully. Cardiovascular disease can be controlled with a lifestyle change. Foot care is ideal for the overall health of an individual. Diabetics have lower immune systems as well as nervous system breakdowns. Each person faced with the diabetes disease must take extra precautions when it comes to this feature of the body. There are several causes as well as preventive measures that need to take place for the overall health of a diabetic. Swelling, cracks, dry skin as well as itching can occur. Cuts and sores on an individual’s feet can turn quickly into an infection or even worse. Preventive measures must be taken before unexpected health problems arise. With the lowered immune system, sores and cuts can not heal as quickly. They must be treated right away or an individual may lose the proper use of their foot. The complications for improper foot care can be painful, a disruption of lifestyle and harmful in the future. They can lead to sores, dried skin as well as calluses and even ulcers inside one or both feet. Some individuals that have had high blood sugar for years can develop poor circulation as well as damage to the tendons and nerves. Skin discoloration or deformation of the toes and overall foot can be a cause for alarm. Most of the complications can be treated. However, some may lead to amputations if preventive measures are not taken. Footwear. This is a rather simple concept. Nevertheless, it is overlooked frequently. There are specialized shoes and socks that can be purchased for a diabetic’s needs. Continual damage. Certain medical issues can arise when an individual has experienced high blood sugar for a long period of time. Nerve impairment and horrible circulation can happen with continual damage to the body. Poor cleaning and maintenance. It is vital for a diabetic to understand the proper method in cleaning their feet. Lotions, soaps and inspections are important for overall excellent health care. Toenail trimming mishaps. The correct method in trimming the toenails is an important part of feet care. If you make a mistake while trimming, it may cause an infection. This will take some time to heal, if at all, because of the lowered immune system. Smoking. This habit will lower your circulation as well as your immune system even further. The release of toxins inside the body creates slower blood circulation. This, in turn, will cause an even further decrease in the blood flow in the feet. There are several symptoms that are apparent for improper foot care. It is vital to watch closely if a symptom appears. After this occurs, the correct measures need to take place. Swelling. This is a major tell sign of a problem associated with diabetes. Nevertheless, other health problems may show signs of this issue as well. If swelling does occur, look closely at other symptoms that may be present. Redness or warmth. This problem can be a sign of an infection. Either on the outside of the foot or an issue inside, infections can be very serious. If this lingers for more than a couple of days, seek a medical professional. Pain or discomfort. Major pain or a small amount of discomfort can be caused when the feet are not properly taken care of. Preventive measures can control this from happening. Cuts, sores, scraps or drainage. These types of issues can be caused by various injuries. If a person is experiencing fever, hot or cold spells or any strange sensations, a physician need to be contacted. Glaucoma And Diabetes: There are many types of complications that come with diabetes, some are painful and some are life-threatening. However, Glaucoma is one that can be cured or at least it can be helped. Diabetes affects more then 16 million people in America. Some form of eye disease affects almost every diabetic patient, there are different types of eye diseases but the most common is Glaucoma. Glaucoma is caused by the damage that is severed to retina and the optic nerve in the eye. Those who have diabetes are already at risk, however the older you are the more you become at risk for Glaucoma. Those with diabetes are twice as likely to be diagnosed with Glaucoma then those who do not have diabetes. Other diabetic eye diseases are called Cataracts and Retinopathy these are less common but are still diagnosed with diabetic patients. When being diagnosed with Glaucoma you will hear of the 3 different types of Glaucoma types. Open-angle Glaucoma is the most common of all 3 types of glaucoma known about. Open-angle Glaucoma happens very slowly and some patients do not even realize that they have it damage happens so slowly that it may not be noticed for many years. The second type of Glaucoma is called Closed-angle and it only affects just one eye and can present an increase in pressure throughout the eye. Closed-angle can cause a huge amount of pain, nausea, some visual effects have been noticed and some people have complained about seeing halo’s around certain lights. The last type of Glaucoma is called Neovascular Glaucoma and is considered the rarest type of Glaucoma types because it does not always come with sudden vision loss. Neovascular occurs when blood vessels are starting to grow on the iris itself, which is the colored part of the eyes. Once this happens fluid starts to be cut off, which then raises a huge amount of pressure in the eyes. This has become one of the hardest diseases to treat; however, laser surgery has become quite popular. Laser surgery reduces the abnormal growing vessels found on the iris. Some people however have opted for drainage implants. Drainage implants are also referred to as Valve implants, some other treatments are given by certain medical prescriptions. However, Valve treatments have taken on several different names; some refer to them as “aqueous shunts” while others refer to them as “Glaucoma drainage devices.” These implants work by allow fluid to drain from the eye or eyes so that way there will be no pressure build up. A device is placed near the eyes so that way the tube which is placed for drainage will not close up or shut down while trying to relieve pressure from the eye. Implant of today’s technology present a tubal form that helps the aqueous fluids. To more understand what aqueous means, we have to look further into the eye. There are two segments to the eye itself which are filled with fluids called aqueous and vitreous humors. The aqueous is always being refreshed and the old fluid is constantly being washed away. When you are diagnosed with Glaucoma then you might start to notice some built-up pressure forming in your eye. This is cause by the aqueous fluid not being able to drain properly which will in turn cause some vision problems and some pain from your eye. A procedure defined as Tonometry can help doctors and Ophthalmologists measure this pressure which is referred to as intraocular pressure. The valve implants we first developed in 1966 starting with Molteno. Two basic types were designed valved and non-valved; the valved designs are called Ahmed and Krupin while the non-value designs are called Molteno and Baerveldt. Thousands of implants have been used yearly to help patients to feel less pain. Some surgeries have been done to help those suffering from Neovascular glaucoma and nothing has been so successful more than the valve implants have. Some herbal treatments are available for Glaucoma is available on the internet; one fore instance is called Dr. Christopher’s Bilberry Eye Formula. This is a blend of herbal ingredients that helps with the circulation to the eye and with the overall treatment of Glaucoma. It also helps to repair some of the damaged vessels caused by Glaucoma, help with loss of vision during the night and can cleanse tissues in the eyes while bring antioxidants to eyes. Bilberries, the main ingredient in this formula are a family member of blueberries. Another ingredient that comes in this formula is called anthocyanosides; this is the main ingredient that will help those who have lost eye-sight through-out the night be able to see again. Other ingredients consist of Bilberry leaves, eye-bright herb, cayenne pepper and ginkgo leaf. You can purchase a 100-count bottle for $18, but in looking through-out the web you can also find lower prices. Another herbal treatment is on that has been heard of for a long time now; it has been controversial against for many years. Marijuana has been shown in many experimental researches to help to symptoms of Glaucoma. From a test in 1970, Marijuana proved a huge percentage of people who found relief of pressure from intraocular pressure in the diabetic patients who had glaucoma. Granted, this herbal drug can not be purchased, it can only be prescribed in medicinal amounts. Oregano has been scientifically proven to help prevent glaucoma from happening especially if glaucoma is hereditary in your family. It is recommended by Naturopaths to find foods that contain Antioxidants that resist glaucoma. Wild oregano is one of these foods; it actually contains far more antioxidants than most foods. One more herbal treatment that you might want to try is called Jaborandi; it comes from a tropical tree that grows in South America called jaborandi. Before the Spanish explorers arrived in South America, jaborandi was being used medicinally. Back in time around the mid- 1600’s some Spanish naturalists found the effects of jaborandi to have a tremendous affect on curing eye disease. It was actually an ingredient found in 1875 called pilopcarpine. Pilocarpine is usually formed into eye drops to help people with Glaucoma, using just one drop can take effect in 15 minutes and then will keep the eye protected for 24 hours. Try some fruits and vegetables that contain vitamin C have also been effective in lowering intraocular pressure. Some examples include cabbage, bell pepper, Brussels sprouts, citrus fruits, kale, papaya, strawberries, broccoli and guava. Naturopaths and Nutritionists will recommend taking anywhere from 2,000 to 35,000 milligrams a day. If you have Glaucoma then this is one herb that you will want to avoid, sanguinarine. Sanguinarine is found in bloodroot and may help to progress glaucoma. You could be using this herb daily and not even know about it since it is mostly found in toothpastes and mouthwashes because the herb can help to fight gum disease. You should check the label of both your tooth paste and mouthwash before buying them and using them. To help prevent Glaucoma from ever happening you can do a number of things. First you will need to make sure you are getting regular eye exams. It is recommended by The National Eye Institute that you get your eyes dilated at least once a year if you have been diagnosed with diabetes. Diabulimia is an eating disorder that can occur in people that have Type 1 Diabetes. When the person does not give themselves their daily insulin, their body will go into a starvation mode, which over time will cause fat and muscle to breakdown. This will cause weight loss and can put the person in risk for a life-threatening condition known as Diabetic Ketoacidosis (DKA). If the condition goes untreated there is a high mortality rate. Once a person is diagnosed with Type 1 Diabetes, they are put on a restricted diet, and on a daily routine of taking insulin shots. Weight gain is a possible outcome, which some people, especially teens will feel ashamed and embarrassed about. They decide skipping an insulin injection will help them get back to their pre-Diabetes weight. Diabulimia is not the same as other eating disorders such as Anorexia because the person does not have to vomit or starve to loose weight. Purging of sugar from the body through the kidneys is the same as someone who purges or vomits when suffering from Bulimia. Women with Type 1 Diabetes are twice as likely to develop an eating disorder. A reason that may be surprising is that since there is a lot of focus on what the person is eating such as the amount of carbohydrates and following a diet, they might start feeling negative about food. Diabulimia is most commonly found in teenage girls and young women. Unfortunately this trend may be gaining popularity because it is being talked about over the internet by people with Diabetes and eating disorders. Out of 450,000 women studied that have Type 1 Diabetes, one-third has skipped insulin injections specifically to loose weight. By doing so, they are risking going into coma, or even death. The damage done to the person’s body can be enormous. People who skip their insulin have higher blood sugar levels than normal. This can cause the person to become dehydrated, and fatigued along with the muscle loss. Long term affects can cause the persons Diabetes to rapidly attribute to Diabetic complications such as eye disease, kidney disease, and even limb amputations because of vascular disease. Other symptoms that can be expected due to long term Diabulimia include high cholesterol, extreme fatigue, and severe neuropathy which cause nerve damage to feet and hands. Teenagers have a lot of pressure to fit a certain image. Just one flip through a magazine or watching a television show can make your child feel self-conscious. If you are a parent to a teenager who has Type 1 Diabetes there are warning signs to be aware of. Intentionally skipping or lowering insulin doses could be because they do not want to gain more weight. Excessive exercise and an obsessive concern about weight and body image are other symptoms of Diabulimia. Eating disorders are serious medical conditions. Mixed with Diabetes it can cause long-term complications and even death. If you feel someone you love may be dealing with Diabulimia it is best to discuss your concerns with your Doctor. Sleep Apnea And Diabetes: Diabetes is unfortunately becoming a new trend. It is happening based on medical, social, and demographic forces. One of the causes of Diabetes is Sleep Apnea. It is now known as a major contributor of the disease. People who have Sleep Apnea stop breathing for 10 seconds or more on and off throughout the night. When this happens, it lowers the body’s oxygen blood levels and also disrupts sleep. People who suffer from Sleep Apnea are more likely to have Diabetes than those who do not have it. 50% of men who have Type 2 Diabetes suffer with Sleep Apnea. There are a number of factors that are involved with both Sleep Apnea and Diabetes. Stress response is one factor. When someone repeatedly wakes up from sleep and has constant interruptions of the body receiving oxygen results into stress. This makes the heart beat faster. If this occurs often, it can lead to insulin resistance, among other problems. Cortisol, which is a stress hormone, can raise both glucose levels and insulin secretion. Excess body fat is another symptom of Sleep Apnea. A high amount of body mass index which is determined by the person’s height and weight is a contributing factor in both Sleep Apnea and Diabetes. Sleep Apnea and Diabetes have been linked to a metabolic syndrome which is also known as Syndrome X. This metabolic syndrome is known as five medical conditions put together which can cause a fivefold increase in Diabetes. The five conditions are abdominal fat, high blood pressure, elevated fasting glucose levels, high triglycerides, and low high-density lipoprotein (HDL, or “good”) cholesterol. When put together, they are some of the leading factors from Sleep Apnea and Diabetes. There are treatments available for people with Sleep Apnea and Type 2 Diabetes. CPAP which is known as Continuous Positive Airway Pressure is an option that also helps Diabetes which is a proving factor that Sleep Apnea does play a role in the way Type 2 Diabetes effects people. The device used for CPAP is a small mask that goes over the nose and sometimes the mouth. It is attached to a machine that releases a light air pressure in the throat which keeps the airway open. This is an excellent way to help sleeping patterns return to normal and also improve blood glucose levels. Many doctors do not even know the association between Diabetes and Sleep Apnea. Screenings that can help someone who already has Diabetes determine if they have Sleep Apnea should be done routinely. There are a few questions to ask yourself which can give you a clue into if you have this problem. Do you snore? Do you have high blood pressure? Are you tired after a full nights sleep? If the answer is yes, you will need to address this issue with your healthcare provider. Having this taken care of can not only have you sleeping much better, it can lower your resistance of insulin. Next time you make an appointment, be sure to bring this topic up to see if you are one of the many people who suffer from Sleep Apnea. Diabetes by itself can be quite a demanding illness however if it is left unchecked or is poorly managed then serious medical complications can arise. Unfortunately some of these complications make an appearance in patients who do in fact closely monitor their diabetes and who live their lives in such a way that they successfully cope with their condition. Eye conditions such as retinopathy and glaucoma. Over time the high blood glucose levels can damage the tiny blood vessels that carry blood to the retina, which may cause them to leak fluid (nonproliferative diabetic retinopathy). This can lead to the retina becoming swollen and the vision becoming increasingly blurred (diabetic macular edema). If left untreated new blood vessels can grow on the retina’s surface which can actually cause the retina to detach. Regular eye checks at the diabetic clinic can easily detect any problems that are developing with regards to the retina so that they can be prevented from getting any worse. Numbness in the extremities i.e. the fingers and toes, that is commonly caused by peripheral nerve damage in severe diabetes (diabetic neuropathy). Because the toes and portions of the foot lose their feeling, foot ulcers can develop without the patient knowing, especially if they are more advanced in years. These foot ulcers can easily become infected and as the blood flow to the affected area is commonly impaired, they can be very difficult to heal without medical intervention. Unfortunately foot ulcers often become gangrenous and so need to be amputated for the good of the patient. Heart and blood vessel disease (cardiovascular) which surprisingly is the leading cause of death for people who have been diagnosed with diabetes. Death can come as a result of heart attacks, strokes, high blood pressure and atherosclerosis (hardening of the arteries). Kidney failure or severe damage to the kidneys that results in impaired function (diabetic nephropathy). As with the eyes, the kidneys can become damaged over time because of the high blood glucose levels. This means that the waste products that the kidneys normally filter from the blood are allowed to accumulate which in turn can cause a wide range of secondary complications. Regular urine tests at the diabetes clinic can indicate any kidney problems early on so that they can be treated and monitored efficiently. Dental disease or periodontal disease which occurs much more often in people with diabetes. Good oral hygiene and regular visits to the dentist can help with this complication. Diabetic Ketoacidosis which is a very serious outcome of poorly controlled diabetes, especially those suffering from type I. In order to prevent many of these complications it is important that diabetics go to the clinic for their regular check-ups and keep appointments with their doctor, even if they think the worrying symptom has gone away. They must also be aware of the warning signs that could be pointing to potential complications such as fatigue, problems with vision, numbness or tingling sensations in their hands and especially their feet, chest pain, bad headaches that won’t pass, persistent infections and wounds that refuse to heal, and weight gain or weight loss (more than 20 pounds). Defining Neuropathy And How It Relates To Diabetes: Diabetics have to endure various medical conditions in conjunction with their diabetes. One such condition which may occur in diabetics is neuropathy, or nerve damage as it is more commonly known. In fact, approximately 50% of diabetics will experience some type of neuropathy. The following will discuss the condition of neuropathy and how it pertains to diabetics. Neuropathy is damage which occurs to the various nerves within the body. When the nerve damage occurs as a result of the diabetes it is more specifically known as diabetic neuropathy. There are various types of neuropathy including sensorimotor neuropathy, autonomic neuropathy and focal neuropathy. Sensorimotor neuropathy is sometimes called peripheral neuropathy and can lead to tingling, pain, numbness and even weakness in the hands and feet. Autonomic neuropathy has symptoms which are a bit more serious and may consist of vomiting, bladder problems, diarrhea, digestive problems, elimination of low blood sugar warning signs, dizziness, sweat gland issues and changes in the eyes pertaining to reaction to light. As for the focal neuropathy, this type of nerve damage can lead to double vision, paralysis on the side of the face and pain throughout the body. Diabetic neuropathy is caused by the frequent high blood sugar levels in the body. Those who have more episodes of high blood glucose levels will often be more likely to experience diabetic neuropathy. How much nerve damage one sustains will depend on various factors such as length of time being diabetic, severity of the diabetes and how old you are. Alcohol is another factor relating to diabetics becoming susceptible to neuropathy as those who drink a lot will be more likely to sustain nerve damage than those who have an occasional drink or do not drink at all. If you are diabetic and wondering if neuropathy is an issue for you, there are a few ways in which doctors diagnose diabetic neuropathy. Simple tests such as sensitivity to touch and temperature will be performed. More clinical tests including having an electromyogram and nerve conduction studies performed will pinpoint whether any types of nerve damage have occurred. By discussing your individual symptoms with your doctor, it will make it easier for the medical health professional to diagnose the type of nerve damage and the severity thereof. The main way to prevent the occurrence of diabetic neuropathy is to keep your blood sugar level in check. Always be sure to monitor your blood glucose level and take the insulin as soon as it is needed. Maintaining a healthy diet and engaging in a reasonable amount of exercise will help to keep your blood glucose level steady. There are a wide array of diabetic cookbooks on the consumer market these days which can help with eating healthy and enjoying your meals at the same time. It is also imperative that diabetics keep a healthy and consistent weight as this too will help to keep blood glucose levels in target range. With regard to specific treatment methods, how the nerve damage is treated will depend on the symptoms which the diabetic is experiencing. For example, those who are experiencing pain may be given pain-relieving medications and those who have digestive problems may be prescribed medicines which treat such conditions. The treatment will be on a symptom-by-symptom basis as this is the best way to deal with any problems which may arise as a result of the neuropathy. As stated above, the doctor will recommend that the individual eat healthy, exercise and maintain a target weight to keep neuropathy and its accompanying symptoms at bay.
2019-04-21T08:21:13Z
https://www.diabeticlive.com/diabetes-101/complications/page/2/
2001-12-28 Assigned to TEXAS INSTRUMENTS INCORPORATED reassignment TEXAS INSTRUMENTS INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BELLOWS, DAVID E. 2002-03-25 Assigned to TEXAS INSTRUMENTS INCORPORATED reassignment TEXAS INSTRUMENTS INCORPORATED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHERLOCK, IAN J. A system and method is provided for monitoring interference in a wireless communication system. The system and method monitor error statistic data at one or more devices in a wireless communication system. The error statistic data can be utilized to determine the location of the interference. If any unusual error statistic data is present at the one or more of the devices, raw unprocessed data is provided from the devices experiencing unusual error activity. The raw unprocessed data can be utilized to characterize the interference. For example, the raw unprocessed data can be compared to one or more interference templates to determine an interference type. The raw unprocessed data can be compared between devices in the wireless communication system to determine the location of the interference with increased precision. FIG. 7 illustrates a graphical user interface for displaying interferers in a wireless communication system in accordance with an aspect of the present invention. Referring now to FIG. 1, a wireless communication system 10 employing the IEEE 802.11b standard is shown. In IEEE 802.11b wireless networking applications there are several common embodiments of wireless interface subsystems. Examples include PC Card, USB and mini PCI station interfaces as well as stand alone access points. The access point is a device that typically forms a bridge between a wired network and the mobile station systems. The wireless medium is shared between the stations in a manner defined by the 802.11b standard. The wireless communication system 10 includes a local area network (LAN) 54. The LAN or network backbone 54 can be a hardwired data communication path made of twisted pair cable, shielded coaxial cable or fiber optic cable, for example, or may be wireless or partially wireless in nature. Coupled to the LAN 54 is an interference monitor 52 and several access points 16, 34, 36 and 50. The interference monitor 54 is operative to detect and characterize interference associated with wireless communications between devices in the system 10. Only one access point 50 is shown hardwired directly to the network backbone 54. The other access points 16, 34 and 36 are connected to the network backbone 54 through a switch 24 (e.g., an Ethernet switch). The access points may be hardwired to the network or can be wirelessly coupled to the backbone 54 (not shown). Each access point serves as an entrance point through which wireless communications can occur with the network backbone 54 and, thus the mobile stations and access points in the system 10. As is conventional, each station associates itself, typically by registration, with an access point coupled to the network backbone 54, whether hardwired or wireless, such that a link is formed between itself and other devices situated on the network backbone 54. Each access point is capable of wirelessly communicating with other devices in the communication system 10 via respective antennas. A geographic cell (not shown) associated with each access point defines a region of coverage in which successful wireless communication can occur. Depending on the type of antenna selected, output power and RF sensitivity of the respective access point, the geographic cell may take one of several different forms and sizes. The wireless communication system 10 also includes one or more mobile station systems. The mobile station systems each include an antenna for wirelessly communicating with other devices. In the example of FIG. 1, a mobile station system 12 and a mobile station system 14 are wireless communicating with the access point 16. Additionally, a mobile station system 26, a mobile station system 28 and a mobile station system 42 are wireless communicating with the access point 36. A mobile station system 44 and a mobile station system 46 are wireless communicating with the access point 34, and a mobile station system 48 is wirelessly communication with the access point 50. Each mobile station system communicates with devices on the network backbone 54 via a selected access point and/or with other mobile station systems, and/or directly with the host computer 56 if within cell range of the host computer 56. Upon roaming from one cell to another, the mobile station system can be configured to associate itself with a new access point or directly with the host computer 56 if within range. The system 10 conforms to the IEEE standard 802.11b specification and uses a portion of radio frequency spectrum in the 2.4 GHz band. In the present example, a number of interferers provide disruption to one or more devices in the wireless system 10. A first interferer 18 (e.g., a 2.4 GHz cordless phone) has an interference range 20, capable of disrupting operation of all stations associated with the access point 16. A second interferer 30 (e.g., a Bluetooth peripheral) has an interference range 32 capable of disrupting operation of the mobile station system 28. A third interferer 22 (e.g., a leaky microwave oven) has an interference range covering the entire system 10, which is capable of disrupting operation of all wireless devices in the system 10. A fourth interferer 38 (e.g., 2.4 GHz cordless phone) has an interference range 40 capable of disrupting operation of the access point 34 and the access point 36. The interference monitor 52 is operative to detect interference and characterize the interference (e.g., type of interference, location of interference). The interference monitor 52 can also be operative to report the interference (e.g., to a network administrator) and/or reconfigure operating parameters of the network to mitigate the effects of the interference on the system 10. The interference monitor 52 can be centralized at one point on the network 54, built into one access point or mobile station system, or distributed throughout the network. The interference monitor can implement a series of functions and/or algorithms via hardware and/or software that detect that interference is occurring, characterize the interference by identifying the type of interference and, when possible, its location. The interference monitor 52 can also be adapted to reconfigure the network operating parameters to minimize the effects of the interference and report the interference condition, along with information regarding the type and/or location of the interference source to a network administrator. In one aspect of the invention, the interference monitor requests and receives error statistic data stored at one or more access points in the system 10. It is to be appreciated that error statistic data can also be collected at one or more mobile station systems in addition or instead of the one or more access points. If the interference monitor 52 detects an unusual amount of error statistic data for one or more access points and/or one or more mobile station systems, the interference monitor requests raw baseband data samples from the one or more access points. Data can also be requested from the individual mobile station systems by configuring the mobile station systems to collect error statistic data and/or transmit raw baseband data samples upon request. The interference monitor 52 primarily communicates via the wired network 54 and, thus is immune to RF interference. If the interference monitor 52 determines that an interferer may be present it makes an estimation of the region impacted by the interferer, based on the station/access point links that reported elevated error statistics. The interference monitor 52 then requests raw baseband data from the one or more access points. The one or more access points then enter a recording period where raw baseband data for its respective radio is logged and then transmitted back to the interference monitor 52. The output takes the form of analog to digital converter samples. The sample data can be obtained with minimal disruption to the network by having the access point use the Network allocation vector to force periods of inactivity on the network during which sample data can be captured. Once the interference monitor 52 receives the samples from the one or more access points, the interference monitor 52 can characterize the data. The sample data from the one or more access points is processed by the interference monitor 52. For example, the processing can involve comparing the frequency and time domain data to known interference templates with the objective of identifying the nature (e.g., type, location) of the interference. Additionally, the interference monitor 52 can compare data from the one or more access points to determine if the interference can be detected by more than one access point. If the interference can be detected by more than one access point, then the interference monitor 52 can provide an improved estimate of the location of the source of the interference. For example, if the interference can be detected by three access points then the location of the interferer can be estimated in two dimensions, either by signal strength or time domain techniques, assuming that the location of the access points is fixed and known, either by user configuration or by a self detection algorithm. Once the interference monitor 52 has characterized the interferer it can record characterization results, a time stamp relating to the interference, and alert the network administrator. If sufficient information is available to allow the location of the interference to be determined, then the location information can be presented to the network administrator, for example, as an overlay on a map of the network office partitions to assist the administrator in rapid location of the interference. The network administrator can configure the interference monitor 52 to enter an optional adapting state in which the interference monitor configures network operating parameters to mitigate or minimize the effect of the interferer. For example if the interference source is determined to be a microwave oven, the interference monitor 52 can command the affected access points to change operating parameters, such as maximum fragment size, so that the network can co-exist with the source of interference. If the source of the interference is in a narrow frequency band, then the interference monitor 52 can re-allocate the 802.11 channels to operate around the source of the interference. The interference monitor 52 continues to monitor the performance of the network and, if the source of the interference is removed, the interference monitor 52 can return the network to its original configuration. It is to be appreciated that the present invention is also applicable to locating interferers outside of a wireless communication system, for example, from another wireless communication system. FIG. 2 illustrates a first wireless communication system 60 employing the IEEE 802.11b standard. The first wireless communication system 60 is labeled as network A. A wireless communication system 101 resides behind a wall or building 100 and is labeled as network B. The second wireless communication system 101 includes a single access point 102 and mobile stations 104 and 106. The second wireless communication system 101 is coupled to a separate network backbone (not shown) from the first wireless communication system 60. The second wireless communication system 101 includes an interferer 108 that provides a source of interference to the first wireless communication system 60. The wireless communication system 60 includes a local area network (LAN) 94. The LAN or network backbone 94 can be a hardwired data communication path made of twisted pair cable, shielded coaxial cable or fiber optic cable, for example, or may be wireless or partially wireless in nature. Coupled to the LAN 94 are an interference monitor 98 and a host computer 96. Also coupled to the LAN 94 are an access points 66 and an access point 86 through a switch 74 (e.g., Ethernet switch). The interference monitor 98 is operative to detect and characterize interference associated with wireless communications between devices in the system 60. The wireless communication system 60 has been enhanced with the addition of passive access points 72, 88 and 90 coupled to the network 94 through the switch 74. The passive access points 72, 88 and 90 are operative to listen to network activity, but do not transmit. The passive access points 72, 88 and 90 can be used to provide additional information for improved location of interferers and stations in the network. The passive access points 72, 88 and 90 can also capture network activity without compromising network operation. In this way, the precision of automated network monitoring can be improved. In the event of interference with, or failure of, a regular active access point (66, 88), the passive access points (72, 88, 90) can be switched into an active mode as replacements. The wireless communication system 60 also includes one or more mobile station systems. The mobile station systems each include an antenna for wirelessly communicating with other devices. In the example of FIG. 2, a mobile station system 62 and a mobile station system 64 are wireless communicating with the access point 66. Additionally, a mobile station system 78 and a mobile station 82 are wireless communicating with the access point 86. Each mobile station system communicates with devices on the network backbone 94 via a selected access point and/or with other mobile station systems. In the present example, a number of interferers provide disruption to one or more devices in the wireless system 60. A first interferer 68 (e.g., a 2.4 GHz cordless phone) has an interference range 70, capable of disrupting operation of all stations associated with the access point 66. A second interferer 80 (e.g., a Bluetooth peripheral) has an interference range 84 capable of disrupting operation of the mobile station system 82. A third interferer 76 (e.g., a leaky microwave oven) has an interference range covering the entire system 60, which is capable of disrupting operation of all wireless devices in the system 60. A fourth interferer 108 (e.g., 2.4 GHz cordless phone) resides in the second wireless communication system 101 and has an interference range 92 capable of disrupting operation of the mobile station 104 in the second wireless communication system 101 and the access point 86 and the passive access point 88 and 90 in the first wireless communication system 60. The interference monitor 98 is operative to detect interference and characterize the interference (e.g., type of interference, location of interference). The interference monitor 98 can also be operative to report the interference (e.g., to a network administrator) and/or reconfigure operating parameters of the network to mitigate the effects of the interference on the system 60. The interference monitor 98 can implement a series of functions and/or algorithms via hardware and/or software that detect that interference is occurring, characterize the interference by identifying the type of interference and, when possible, its location. For example, in the example of FIG. 2, the interference monitor 98 can be adapted to determine that the location of the interferer 108 is in the building 100 outside the first wireless communication system 60. This information can be provided to a network administrator, which can then inform the network administrator of the second wireless communication about the interferer 108, so that corrective action can be taken. The passive access points 72, 88 and 90 can be commanded by the interference monitor 98 to participate in quiescent, capture and characterization states. The interference monitor 98 can also redesignate access points within the network as “Passive” or “Active”. FIG. 3 illustrates a block schematic diagram of an access point 120 for a wireless communication system in accordance with an aspect of the present invention. The access point 120 includes a control system 122 that provides communications between a host central processor unit 121 (CPU) coupled to a network, the interference monitor and the mobile station systems. The control system 122 includes a MAC layer 124 that provides the appropriate protocol (e.g., Ethernet frames) across the network backbone and receives and transmits wireless communications between the host processor and the mobile stations through a baseband processor 126. The baseband processor 126 receives communications from the host processor via the MAC layer 124 and transfers the communications to a radio component 134 through a digital-to-analog converter (D/A) 128. The radio component 134 is coupled to a transmit and receive radio frequency (TX/RX RF) switch 136 which selects between transmitting and receiving communications. The TX/RX RF switch is coupled to an antenna RF switch 138. The antenna RF switch selects between one or more antennas for capturing communications and interference. The access point 120 includes a first antenna 140 and a second antenna 142 coupled to the antenna RF switch 138. It is to be appreciated that the interference detection and characterization can be further improved by use of directional or active antennas in the access point 120 which provides more effective location of the interference sources. The antenna 140 and the antenna 142 can include or be multiple directional or phased array antennas to improve in the assistance of locating interferers. The access point 120 receives communications and any interference through the antenna 140 and/or the antenna 142, which is transferred through the antenna RF switch 138, the TX/RX RF switch 136 and the radio component 134 to the control system 122. The control system 122 includes an analog-to-digital converter (A/D) 130 that converts the received analog baseband data into raw digital baseband data. The raw digital baseband data is processed by the baseband processor 126. Transmission errors that occur are logged in an error data file 132. The control system 122 is adapted to periodically transmit error data to an interference monitor. Alternatively, the control system 122 can be adapted to periodically transmit error data back to the interference monitor upon request from the interference monitor. The error data is utilized by the interference monitor to determine whether or not interference is occurring within the range of the access point 120. The control system 122 is also adapted to provide raw baseband data to the interference monitor upon request so that the interference monitor can process the raw baseband data and characterize the interference. The access point 122 can also be switched between an “active” mode and a “passive mode” by the interference monitor. Any of the commands to change the functional operation of the access point can be provided by the host processor instead of the interference monitor. It is also to be appreciated that the functionality of the interference monitor can be embedded in the control system 122 of the access point 120, so that the interference detection and characterization can be performed within the access point 120. The network adaptations and/or corrections can then be performed by the access point 120 itself. Alternatively, the characterization information can be provided to a central interference monitor or the host computer which provides the appropriate adaptation and/or corrections. FIG. 4 illustrates a functional block diagram of an interference monitor 150 in accordance with an aspect of the present invention. The interference monitor 150 includes a control system 152 that provides communications over the network between the host central processor unit (CPU), the access points and the mobile station systems. The control system 152 communicates over the network using a MAC layer 168 that provides the appropriate protocol (e.g., Ethernet frames) across the network backbone. The interference monitor 150 is operative to detect interference and characterize the interference (e.g., type of interference, location of interference) that occurs over a wireless network. The interference monitor 150 can also be operative to report the interference (e.g., to a network administrator) and/or reconfigure operating parameters of the network to mitigate or minimize the effects of the interference on the wireless communication system. The central control system 152 receives or requests and receives statistical error data from one or more access points and/or mobile stations systems of the network in which the interference monitor is coupled. The statistical data is logged to one or more error data files 154. A monitor 156 evaluates the error patterns to determine if any elevated error statistics are occurring, which is an indication that an interferer may be present. If the monitor 156 determines that an interferer may be present it provides an indication or interrupt signal to the control system 152. The control system 152 or the monitor 156 makes an estimation of the region impacted by the interferer, based on the station/access point links that reported elevated error statistics. The control system 152 then requests raw baseband data from the one or more access points and/or mobile station systems. Additionally, the control system 152 can request additional capture data over different time periods or different channel frequencies. Methods which are more disruptive to network operation may be used to gather data over longer periods, for example, by forcing mobile station systems to disassociate from an access point. The control system 152 receives the sampled data and then stores the sampled data in one or more raw baseband data files 162. Once the samples from the one or more access points are received, an analyzer 160 can process and characterize the data by comparing the data to one or more interference templates 158 stored at the interference monitor 158 or accessible over the network. The one or more interference templates 158 can contain frequency and time domain data corresponding to specific interferers (e.g., microwave ovens, Bluetooth device, 2.4 GHZ phone) to characterize the interference utilizing known interference templates with the objective of identifying the nature (e.g., type, location) of the interference. Additionally, the analyzer 160 can compare data from the one or more access points to determine if the interference can be detected by more than one access point. If the interference can be detected by more than one access point, then the analyzer can provide an improved estimate of the location of the source of the interference. Once the analyzer has characterized the interferer it can provide this information to the control system 152. The control system 152 can provide these characterization results, a time stamp relating to the interference, and an alert to the network administrator through the host computer or some other mechanism. For example, a web browser that communicates with a web server residing in the interference monitor 150. The control system 152 or a host computer can provide an overlay on a map of the mobile station systems and interferers for the network in a graphical user interface (GUI) to assist the administrator in rapid location of the interference. The control system 152, the host computer or the network administrator can reconfigure the network operating parameters to mitigate or minimize the effect of the interferer. FIG. 5 illustrates a block schematic diagram of a mobile station system 170 for a wireless communication system in accordance with an aspect of the present invention. The mobile station system 170 includes a control system 172 that provides communications between a host central processor unit (CPU) and an interference monitor through an access point. The control system 172 includes a processor 174 that facilitates communications to and from the mobile station system 170. The processor transmits communications to a radio component 184 through a digital-to-analog converter (D/A) 176. The radio component 184 is coupled to a transmit and receive radio frequency (TX/RX RF) switch 186 which selects between transmitting and receiving communications. The TX/RX RF switch 186 is coupled to an antenna RF switch 188. The antenna RF switch 188 selects between one or more antennas for capturing communications between a network (not shown) and interference within the wireless communication system. The mobile station system 170 receives communications and any interference through an antenna 190 and an antenna 191, which is transferred through the antenna RF switch 188, the TX/RX RF switch 186 and the radio component 184 to the control system 172. It is to be appreciated that the interference detection and characterization can be further improved by use of directional or active antennas in the mobile station system 170, which provides more effective location of the interference sources. The antenna 190 and the antenna 191 can include or be multiple directional or phased array antennas to improve in the assistance of locating interferers. The control system includes an analog-to-digital converter (A/D) 178 that converts the received analog baseband data into raw digital baseband data. The raw digital baseband data is processed by the processor 174. In one aspect of the invention, the mobile station system 170 can track error data in an error data file 182 in a log error data mode. Additionally, the mobile station system 170 can execute a passive or sleep mode algorithm 180 in a passive mode. The error data can be transmitted to an interference monitor through an access point. The processor 174 can be adapted to enter a passive silent state for an arbitrary period of time to allow the access point to gather sample data. Additionally, the processor 174 can be programmed to gather sample data automatically in periods when network errors are detected and later forward that data to the access point. The data gathered from the mobile station system 170 can be used by the interference monitor to characterize the interferer. If the location of the mobile station system 170 is known, for example, by employing some other scheme such as a global positioning satellite (GPS) device, or can be estimated by the interference monitor, then the sample data from the mobile station system 170 can also be used in calculating the estimated location of the interferer. FIG. 6 illustrates one particular methodology for monitoring interference on a wireless communication network. The methodology begins at 200. At 200, a connection between an interference monitor and a network is performed. The interference monitor can be a separate stand-alone device, implemented in a host computer or implemented in an access point or a mobile station system. At 210, monitoring of error statistics begins for detecting interference anomalies in one or more access points and/or mobile stations. At 220, the methodology determines whether or not any interference has been detected. If interference is not detected (NO), the methodology returns to 210 to continue monitoring error statistics. If interference is detected (YES) at 220, the methodology proceeds to 230. At 230, the devices receiving interference are instructed to transmit unprocessed raw data samples (e.g., baseband) to the interference monitor. At 240, the unprocessed data samples are received by the interference montitor, processed and the interference characterized based on the processing. At 250, the location of the interference is estimated based on the processed samples. For example, the error activity may be increased at one or more access points indicating the general presence of the interferer. Furthermore, signal strength (e.g., amplitude of signal received by access point(s)) and time domain techniques (e.g., time to get to access point(s)) can be used to increase the reliability of the location of the interferer. At 260, the location of the interference can be reported to the network administrator, for example, via the host computer. The methodology then proceeds to 270 where the processed samples are compared to one or more interference templates corresponding to one or more interference types, respectively. If the processed samples do not match any of the stored templates (NO) at 270, the methodology advances to 290. If the processed samples do match one of the templates (YES), the type of interference is reported to the network administrator, for example, via the host computer. It is to be appreciated that the reporting of the location of the interference at 260 and the type of interference at 280 can be provided concurrently. For example, the type and location of the interference can be displayed in a GUI interface at the host computer. At 290, the network configuration parameters are adapted to minimize the impact of the interference. If a 2.4 GHz cordless phone is the interferer, then increased errors traffic is determined near the effected devices. Captured sample data can be compared to known templates for 2.4 GHz phones to identify the source if the interference. The location of the 2.4 GHz cordless phone can be determined from the effected devices. For example, the more access points that can detect the 2.4 GHz cordless phone then the estimated area of location will be more precise. If a Bluetooth device is the interferer, the captured baseband data at relatively few devices can be used to characterize the interferer as a Bluetooth device. Since the Bluetooth device is a low power device, it may not be detected beyond more than a few devices, so location estimation will be restricted to a smaller area and be less precise. This area may be narrowed if the mobile station systems are enhanced to support baseband capture and reporting. The method then returns to 210 to continue monitoring for interference. FIG. 7 illustrates an example of a GUI interface 300 that can be provided to a host computer or some other computer coupled to the network. The GUI interface 300 displays an office area having a main room, six offices, a hallway and an outside area. A first mobile station STN1 is displayed as residing in a first office 302. A second mobile station STN2 and a third mobile station STN3 is displayed as residing in a second office 304. A fourth mobile station STN4 is displayed as residing in a third office 306, a fifth mobile station STN5 is displayed as residing in a fourth office 308, a sixth mobile station STN6 is displayed as residing in a fifth office 310 and a sixth mobile station STN7 is displayed as residing in a sixth office 312. An eighth mobile station STN8 is displayed as residing in a mainroom 314 an a ninth mobile station STN9 in a hallway 316. A first interferer 320 has been detected in the central region of the main room 314. An “ALERT” warning is provided identifying the location of the first interferer 320. A second interferer 322 has been detected in an outside area 318. An “ALERT” warning is provided identifying the location of the second interferer 322. The network administrator can then personally go to these areas to locate and remove the interferers. Additionally, adaptive and/or corrective actions can be taken and the GUI display 300 utilized to determine if the adaptive or corrective actions corrected for the interference. an interference monitor that monitors interference in the system by monitoring error statistic data from the at least one of the plurality of access points. 2. The system of claim 1, the interference monitor requesting raw baseband data from the at least one of the plurality of access points upon detecting unusual error statistic data. 3. The system of claim 2, the interference monitor operative to determine the location of the interference utilizing the raw baseband data. 4. The system of claim 2, the interference monitor operative to determine the type of interference by comparing the raw baseband data to at least one interference template. 5. The system of claim 2, the interference monitor operative to determine the location of the interference and the type of interference utilizing the raw baseband data and transmit the location of the interference and the type of interference to a graphical user interface, the graphical user interface displaying the location of the plurality of mobile station systems and the type and location of interference. 6. The system of claim 1, the interference monitor operative to determine the location of the interference utilizing the error statistic data. 7. The system of claim 1, at least one of the plurality of mobile station systems being adapted to log error data and transmit the error data to the interference monitor for analysis. 8. The system of claim 1, at least one of the plurality of mobile station systems being adapted to enter a passive mode, while at least one of the plurality of access points is gathering sample data for determine the existence of interference. 9. The system of claim 1, the interference monitor operative to reconfigure the network to minimize the effects of any detected interference. 10. The system of claim 1, the interference monitor operative to transmit interference information to a host computer, the host computer utilizing the interference information to reconfigure the wired communication system to minimize the effects of any detected interference. 11. The system of claim 1, at least one of the plurality of access points comprising at least one passive access point that monitors interference. 12. The system of claim 1, the plurality of access points being switchable between an active mode and a passive mode. 13. The system of claim 1, at least one of the plurality of access points utilizing at least one of a directional antenna and an active antenna. 14. The system of claim 1, at least a portion of the interference monitor being incorporated into at least one of an access point, a host computer and a mobile station system. 15. The system of claim 1, the interference monitor being a stand-alone device coupled to the network. 16. The system of claim 1, the wireless communication system conforming to the IEEE 802.11b standard. 17. The system of claim 1, the interference monitor operative to determine if interference is present outside the wireless communication system. an analyzer that utilizes the raw data to characterize interference present in the wireless communication system. 19. The monitor of claim 18, the analyzer characterizes the interference by processing the raw data and comparing the processed raw data to at least one interference template to determine the type of interference. 20. The interference monitor of claim 18, the analyzer characterizes the interference by comparing raw basedband data from one or more access points to determine the location of the interference. 21. The interference monitor of claim 18, the control system transmits the characterization information to a graphical user interface, the graphical user interface displaying at least a portion of the wireless communication system and at least one of a type and a location of the interference. 22. The interference monitor of claim 18, one of the analyzer, the monitor and the control system operative to determine the location of the interference. 23. The interference monitor of claim 18, the control system operative to reconfigure the wired communication system to minimize the effects of any detected interference. 24. The interference monitor of claim 18, the control system operative to transmit interference information to a host computer, the host computer utilizing the interference information to reconfigure the wired network to minimize the effects of any detected interference. 25. The interference monitor of claim 18, the control system operative to switch access points between an active mode and a passive mode to minimize the effects of any detected interference. 26. The interference monitor of claim 18, at least a portion of the interference monitor being incorporated into at least one of an access point, a host computer and a mobile station system. 27. The interference monitor of claim 18 being a stand-alone device coupleable to a wired network. 28. The interference monitor of claim 18 characterizes interference by utilizing at least one of signal strength, frequency domain techniques and time domain techniques. characterizing interference within the wireless communication system utilizing the unprocessed data samples. 30. The method of claim 29, the characterizing interference comprising determining the type of interference by processing the unprocessed data samples and comparing the processed data samples to at least one interference template. 31. The method of claim 29, the characterizing interference comprising determining the location of the interference. 32. The method of claim 29, further comprising reconfiguring the wireless communication system to minimize the effects of any detected interference. 33. The method of claim 29, further comprising displaying at least a portion of the wireless communication system and the type and location of interference in a graphical user interface. 34. The method of claim 29, farther comprising switching at least one access point between a passive mode and an active mode to minimize the effects of any detected interference. means for characterizing interference in the wireless communication system utilizing unprocessed data samples from the at least one access point in which unusual error statistic data is present. 36. The monitor of claim 35, further comprising means for reconfiguring the wireless communication system to minimize the effects of any detected interference.
2019-04-22T21:29:33Z
https://patents.google.com/patent/US20030123420A1/en
The information use frequency prediction device is provided with a comparison section for shifting a second time series data related to the use frequency of a first keyword, sequentially on the time base in a unit of predetermined time, based on a first time series data related to the use frequency of a second keyword input while searching over the Internet, and calculating a correlation coefficient between the first time series data and the second time series data, for each unit of predetermined time. Moreover, a prediction section specifies a pair of the first time series data and the second time series data, corresponding to the correlation coefficient having the highest value, of a plurality of correlation coefficients calculated by the comparison section and for predicting the use frequency of the first time series data constituting the pair, based on the second time series data. FIG. 2 is a diagram showing one example of first search log data A 10 and first summing up data B10, shown in FIG. 1. FIG. 3 is a diagram showing one example of second search log data A 20 and second summing up data B20, shown in FIG. 1. FIG. 4 is a diagram showing one example of first time series data D 10 and second time series data D20 in the first embodiment. FIG. 23 is a block diagram showing the construction of a variation example of the first to third embodiment. FIG. 1 is a block diagram showing the construction of a first embodiment of the present invention. In the information use frequency prediction apparatus 100 shown in this figure, a read section 101 comprises a function of reading the first search log data A10 and the second search log data A20. The first search log data A10 is search log data of a first search engine (not shown) for searching the information on the Internet, for example, by a keyword input. Specifically, as shown in FIG. 2, the first search log data A 10 is composed of time series data including “date” and “time” when the search keyword is input, and the input “keyword”. In the example shown in this figure, it is indicated that a keyword “camera” was input to the first search engine at 01:10:00 on 11/01/2000 and the information on the Internet was searched, using the “camera” as a key in this first search engine. Returning to FIG. 1, the second search log data A 20 is search log data of a second search engine (not shown) for searching the information on the Internet, for example, by a keyword input. Specifically, as shown in FIG. 3, the second search log data A20 is composed of time series data including “date” and “time” when the search keyword is input, and the input “keyword”. Returning to FIG. 1, a first summing section 102 sums up the first search log data A10 read by the read section 101, and outputs the first summing data B10 as the summing result. As shown in FIG. 2, this first summing data B10 is data representing the use frequency (number of times) of the “keyword” for each “date”. In the example shown in this figure, it is seen that the keyword “camera” was used 17 times on 11/01/2000. Returning to FIG. 1, a second summing section 103 sums up the second search log data A20 read by the read section 101, and outputs the second summing data B20 as the summing result. As shown in FIG. 3, this second summing data B20 is data representing the use frequency (number of times) of the “keyword” for each “date”. In the example shown in this figure, it is seen that the keyword “New Year card” was used three times on 11/01/2000. With reference to FIG. 4, description will be made of a case where a certain keyword of the above-described first summing data B 10 (see FIG. 2), and a certain keyword of the second summing data B20 (see FIG. 3) are respectively expressed in the time series. In FIG. 4, the first time series data D10 represents changes in the use frequency for each date (December 1st to December 24th) related to the keyword “camera” in the first summing data B10 shown in FIG. 2. On the other hand, the second time series data D 20 represents changes in the use frequency for each date (December 1st to December 24th) related to the keyword “New Year card” in the second summing data B20 shown in FIG. 3. As is seen from this figure, the use frequency of the keywords used on the Internet changes time wise. In the first summing data B10, the first time series data exists by the number of the keyword. Similarly, the second time series data exists by the number of the keyword in the second summing data B 20. In the example shown in this figure, it is seen that the pattern of the ellipse in the first time series data D10 and the pattern of the ellipse in the second time series data D20 are approximate to each other. Returning to FIG. 1, a comparison section 104 sequentially compares one of the first time series data contained in the first summing data B10 and one of the second time series data contained in the second summing data B20, to thereby determine the correlation coefficient between these data. If the correlation coefficient is high, it means that the changes with lapse of time (pattern) of the both data are approximate to each other. On the other hand, if the correlation coefficient is low, it means that the changes with lapse of time (pattern) of the both data are quite different. Moreover, the comparison section 104 does not simply determine a correlation coefficient between the first time series data and the second time series, but as shown in FIG. 4, determines a correlation coefficient in the case where the second time series data D20 is shifted to the left side in this figure by T, based on the first time series data D10. In the case where the starting point ST of the second time series data D20 is located at −T, the time difference (shift amount) between the second time series data D20 and the first time series data D10 is designated as −T. The comparison section 104 determines the correlation coefficient between the second time series data D20 and the first time series data D10, in the state with the second time series data D20 being shifted by 1 to the right. Thereafter, the comparison section 104 sequentially determines the correlation coefficient by shifting the second time series data D20 to the right by 1. The comparison section 104 then shifts the second time series data D20 to the right until the starting point ST of the second time series data D20 is located at +T (in this figure, 20th), to thereby determine the correlation coefficient. In this case, the time difference between the first time series data D10 and the second time series data D20 is +T. That is to say, in one combination (the first time series data D10 and the second time series data D20), the correlation coefficient is determined every time the second time series data D20 is shifted by 1 in the range of from −T to +T. The comparison section 104 performs the 1 shift operation from −T to +T and calculates the correlation coefficient, with regard to all the combinations of the first time series data D10 and the second time series data D20. Moreover, the comparison section 104 shown in FIG. 1 outputs the comparison result data C shown in FIG. 5 to a prediction section 106 as the above-described comparison result. This comparison result data C is composed of the “first time series data”, the second time series data”, the “correlation coefficient” and the “time difference”. The “first time series data” is time series data related to the keyword contained in the first summing data B 10 (see FIG. 2). The “first time series data” in the first record shown in this figure is time series data related to “camera” as the keyword. The “second time series data” is time series data related to the keyword contained in the second summing data B 20 (see FIG. 3). The “second time series data” shown in this figure is time series data related to “New Year card” as the keyword. Returning to FIG. 1, an input section 105 is a keyboard or the like, for inputting the keyword to be predicted (hereinafter, referred to as “keyword to be predicted”) and the predicted date. A prediction section 106 predicts use frequency related to the keyword to be predicted, based on the comparison result data C, using the keyword to be predicted and the predicted date from the input section 105 as a key. In the example shown in FIG. 4, the prediction section 106 predicts the use frequency after December 25th (the portion of an ellipse Y). The details of the operation of this prediction section 106 will be described later. The output section 107 is a display, a printer or the like, and outputs the prediction result of the prediction section 106. The operation in the first embodiment will be described with reference to the flowcharts shown in FIG. 7 to FIG. 9. In step SA 1 shown in FIG. 7, the read section 101 reads the first search log data A10 (see FIG. 2) and the second search log data A20 (see FIG. 3), and outputs these data to the first summing section 102 and the second summing section 103. In step SA 2, the first summing section 102 and the second summing section 103 execute the summing processing. That is to say, the first summing section 102 sums up the first search log data A10 shown in FIG. 2, and stores the first summing data B10 in a memory (not shown) as the summing result. On the other hand, the second summing section 103 sums up the second search log data A20 shown in FIG. 3, and stores the second summing data B20 in a memory (not shown) as the summing result. In step SA 3, the comparison section 104 executes the comparison processing. That is to say, in step SB1 shown in FIG. 8, the comparison section 104 reads the first summing data B10 (see FIG. 2) from the memory (not shown) in the first summing section 102. In step SB2, the comparison section 104 reads the second summing data B20 (see FIG. 3) from the memory (not shown) in the second summing section 103. In step SB 3, the comparison section 104 judges whether the first time series data related to all the keywords has been obtained or not from the first summing data B10 (see FIG. 2), and in this case, this judgment result is assumed to be “No”. In step SB4, the comparison section 104 obtains the first time series data D10 shown in FIG. 4, related to one keyword (for example, camera). In step SB 5, the comparison section 104 judges whether the second time series data related to all the keywords has been obtained or not from the second summing data B20 (see FIG. 3), and in this case, this judgment result is assumed to be “No”. In step SB6, the comparison section 104 obtains the second time series data D20 shown in FIG. 4, related to one keyword (for example, New Year card). In the equation (1), ρ xy denotes a correlation coefficient between the first time series data and the second time series data. “n” denotes the number of data overlapping time wise, of a plurality of data constituting the first time series data and a plurality of data constituting the second time series data. The plurality of data overlapping on the second time series data time wise is expressed as x1 to xn. On the other hand, the plurality of data overlapping on the first time series data time wise is expressed as y1 to yn. In the state with the second time series data D 20 shown in FIG. 4 being shifted to the left by T, for example “0.1” is determined as the correlation coefficient between the first time series data D10 (camera) and the second time series data D20 (New Year card). The comparison section 104 prepares the comparison result data C (the first time series data (camera), the second time series data (New Year card), correlation coefficient=0.1, time difference=−T), as the comparison result. In step SB 9, the comparison section 104 judges whether or not the second time series data is shifted to the right by T from the position of the time difference 0 shown in FIG. 4, that is, the time difference is +T or not, and in this case, the judgment result is assumed to be “No”. In step SB10, the comparison section 104 shifts the second time series data (in this case, the second time series data D20: see FIG. 4) to the right by 1. Thereafter, step SB 8 to step SB10 are repeated. As a result, the second time series data D20 is shifted to the right by 1 with respect to the first time series data D10, and the correlation coefficient is determined corresponding to the time difference (see FIG. 5). That is to say, a correlation coefficient related to the combination of the shift frequency of the first time series data (camera) in the first summing data B10 shown in FIG. 2 and the second time series data (New Year card) in the second summing data B20 shown in FIG. 3 is determined corresponding to the time difference. The first time series data D 10 (camera) in the case where the second time series data D20 (New Year card) is shifted to the right by 9 is shown in FIG. 6. As seen from this figure, the pattern of the ellipse P10 substantially coincides time wise with the pattern of the ellipse P20. The correlation coefficient in this case is designated as, for example, 0.68, which is a very high value. When the judgment result in step SB 9 becomes “Yes”, then in step SB5, the comparison section 104 judges whether the second time series data related to all keywords is obtained or not from the second summing data B20 (see FIG. 3), and in this case, the judgment result is assumed to be “No”. In step SB6, the comparison section 104 obtains the second time series data (not shown) related to the next keyword (for example, radio). In step SB 7, the comparison section 104 shifts the second time series data (radio) to the left by T. In step SB8, the comparison section 104 calculates a correlation coefficient of the second time series data (radio) and the first time series data (camera) in the shifted state, from the equation (1). Thereafter, the above-described operation is repeated. As a result, the second time series data (radio) is shifted to the right by 1 with respect to the first time series data D10 (camera), and the correlation coefficient is determined corresponding to the time difference. When the judgment result in step SB 9 becomes “Yes”, the comparison section 104 assumes the judgment result to be “No”, and repeats the step SB3 to step SB10. When a correlation coefficient of the combination of the shift frequency, which is the combination of the first time series data related to all the keywords and the second time series data related to all the keywords, is obtained, the judgment result in step SB 3 becomes “Yes”. In step SB11, the comparison section 104 outputs the comparison result data C shown in FIG. 5 to the prediction section 106. In step SA 4 shown in FIG. 7, the prediction section 106 executes the prediction processing based on the comparison result data C. Specifically, in step SC1 shown in FIG. 9, the user inputs the keyword to be predicted and the date, using the input section 105. In this case, in order to predict the use frequency of the ellipse Y portion (keyword: camera) shown in FIG. 4, the user inputs “camera” as the keyword to be predicted and “December 25th” as the date. As a result, the use frequency after December 25th is predicted related to the first time series data D 10 (camera). In step SC 2, the prediction section 106 reads the keyword K to be predicted (camera) and date D (December 25th) input in step SC1. In step SC3, the prediction section 106 obtains a keyword having the highest correlation coefficient as the reference keyword KW, from the comparison result data C shown in FIG. 5, using the keyword K to be predicted (camera) as a key. Therefore, with this combination, the keyword K to be predicted is “camera”, and the reference keyword KW is “New Year card”, and based on the second time series data D 20 shown in FIG. 6 corresponding to the reference keyword KW (New Year card), the use frequency related to the keyword K to be predicted (camera) after December 25th is predicted. Specifically, in step SC 4, the prediction section 106 shifts the second time series data D20 shown in FIG. 4 to the right by the time difference 9 as shown in FIG. 6. Moreover, the prediction section 106 shifts upwards the second time series data D20 shown in FIG. 6, so as to substantially agree with the first time series data D10. As a result, the state shown in FIG. 10 can be obtained. In equations (7) and (8), “n” denotes the number of data overlapping on each other time wise, of a plurality of data constituting the first time series data and a plurality of data constituting the second time series data. With regard to the first time series data, the plurality of data overlapping on the second time series data time wise is expressed as x 1 to xn. On the other hand, with regard to the second time series data, the plurality of data overlapping on the first time series data time wise is expressed as y1 to yn. When prediction of the use frequency is finished, in step SA 5 shown in FIG. 7, the prediction section 106 outputs the predicted use frequency data obtained in step SA4 from the output section 107. This predicted use frequency data corresponds to the portion of the ellipse Y shown in FIG. 10, and shows the use frequency after December 25th related to the first time series data D10 (camera). As described above, according to the first embodiment, temporal operation is sequentially performed in a unit of predetermined time, with respect to the relative relation between the first pattern corresponding to the first time series data D 10 and the second pattern corresponding to the second time series data D20, shown in FIG. 4. For each unit of predetermined time (for every shift), the correlation coefficient between the first time series data D10 and second time series data D20 is calculated, and based on the second pattern corresponding to a pair of the first time series data D10 and the second time series data D20 corresponding to the correlation coefficient having the highest value, the use frequency of the first time series data D10 constituting the pair is predicted (FIG. 10). As a result, the use frequency of information can be predicted at high accuracy, compared to the case where the prediction is performed based on one time series information as in the conventional case. According to the first embodiment, with regard to all combinations of a plurality of first time series information in the plurality of first summing data B 10 belonging to the first group and a plurality of second time series information in the second summing data B20, temporal operation is performed. Hence, with an increase of the combination, the probability that a combination having a high correlation coefficient exists is increased, and hence the use frequency of information can be predicted at high accuracy. According to the first embodiment, as shown in FIG. 4, the second time series data D 20 is shifted, sequentially on the time base in a unit of predetermined time, based on the first time series information. As a result, even if the period of the trend or the like is deviated, pairs having a high correlation coefficient are practically specified. Hence, the use frequency of information can be predicted at high accuracy. According to the first embodiment, since the first search log data A 10 and the second search log data A20 are collected via different collection routes, the use frequency can be predicted based on the information from a wide field, thereby the prediction accuracy can be further increased. According to the first embodiment, the first time series data D 10 (camera) and the second time series data D20 (New Year card) are designated as the time series information for the use frequency of keywords in the keyword search engine on the Internet. Hence, the use frequency of the keyword on the Internet can be predicted at high accuracy. FIG. 11 is a diagram for explaining the effect of the first embodiment. In this figure, the first time series data D 10 corresponds to the “camera” as the above-described keyword. In this first time series data D10, the data before December 24th is the actual measurement value. Moreover, in the first time series data D10, the data after December 24th is predicted data by the above-described method. After December 25th, the actual measurement data J is actual measurement data related to the use frequency of “camera” as the keyword. As seen from this figure, the actual measurement data J substantially agrees with the first time series data D 10 after December 25th (predicted value), and hence the average error is 17%. On the other hand, with prediction by means of the conventional time series analysis, the average error between the actual measurement value and the predicted value becomes 40%. As described above, with the method in the first embodiment, the average error is reduced by 23% compared to the conventional method, and the prediction accuracy increases significantly. In the first embodiment, the predicted use frequency data may be sorted in the prediction section 106 shown in FIG. 1. This case will be described below as the second embodiment. FIG. 12 is a block diagram showing the construction of the second embodiment according to the present invention. In this figure, the section corresponding to respective section in FIG. 1 is denoted by the same reference symbol. In the information use frequency prediction apparatus 200 shown in this figure, a sort section 201 and a traded goods database 202 are newly provided. The sort section 201 has a function of preparing traded goods corresponding to the keyword, and predicted use frequency data E1 (see FIG. 14) representing the relation with the predicted use frequency of the keyword, based on the predicted use frequency data from the prediction section 106. The sort section 201 also has a function of sorting the predicted use frequency data E1 shown in FIG. 14, by using the predicted use frequency therein as a sort key, for example, in an ascending order, to thereby prepare the sorted predicted use frequency data E2. Returning to FIG. 12, the traded goods database 202 is database representing the correspondence between the keyword and traded goods in shops. This traded goods database 202 is utilized at the time of preparing the predicted use frequency data E1 in the sort section 201. The operation of the second embodiment will be described with reference to the flowchart shown in FIG. 13. Step SD 1 to step SD4 shown in FIG. 13 are the same processing as in step SA1 to step SA4 shown in FIG. 7, and hence the description thereof is omitted. In this case, when the predicted use frequency data related to a plurality of keywords is output from the prediction section 106, in step SD5 shown in FIG. 13, the sort section 201 refers to the traded goods database 202 to convert the keyword to the traded goods, to thereby prepare the predicted use frequency data E1 shown in FIG. 14. The sort section 201 sorts the predicted use frequency data E1 in an ascending order, using the predicted use frequency as the sort key. This sort result is the sorted predicted use frequency data E2. In step SD6, the sort section 201 outputs the sorted predicted use frequency data E2 from the output section 107. In the first embodiment, the description is given to a case where, as shown in FIG. 4, the second time series data D 20 is simply shifted by 1 from the left to the right without changing the pattern, with respect to the first time series data D10, to thereby obtain the correlation coefficient between these data. However, in addition to such shift processing, the time base of the pattern in the second time series data D20 may be expanded or contracted, to thereby obtain the correlation coefficient between these data. This case will be described below as the third embodiment. FIG. 15 is a block diagram showing the construction of the third embodiment according to the present invention. In this figure, the section corresponding to respective section in FIG. 1 is denoted by the same reference symbol. In the information use frequency prediction apparatus 300 shown in this figure, a comparison section 301 is provided instead of the comparison section 104 shown in FIG. 1. The comparison section 301 sequentially compares one of the first time series data contained in the first summing data B10 and one of the second time series data contained in the second summing data B20, and outputs the comparison result data F (see FIG. 16). Specifically, the comparison section 301 shifts the second time series data D200 to the left in the figure by T, based on the first time series data D100, as shown in FIG. 17. The comparison section 301 contracts the time base of the pattern in the second time series data D200 in the shifted state, for example, at an expansion ratio d=50% (see FIG. 18). This expansion ratio d=50% is a threshold of the expansion ratio determined beforehand. That is to say, the comparison section 301 shifts the second time series data D200 to the left in the figure by T (maximum value), and then contracts the time base at 50%. In this state, the comparison section 301 determines the correlation coefficient of the first time series data D100 and the second time series data D200 (left shift+contraction), using the equation (1). The comparison section 301 determines a correlation coefficient between the second time series data D200 and the first time series data D100, in the state with the time base of the second time series data D200 being expanded at a unit extension ratio Δd (for example, 10%: see FIG. 18). Thereafter, the comparison section 301 sequentially determines the correlation coefficient until the expansion ratio d becomes the extension ratio z (for example, 200%: see FIG. 18), while extending the time base of the second time series data D200 by the unit extension ratio Δd. That is to say, the second time series data D 200 is expanded gradually at intervals of the unit extension ratio Ad in the range of the expansion ratio d=50% to 200%, in the state with the shift position fixed. When the expansion ratio d becomes the extension ratio z (=200%), the comparison section 301 shifts the second time series data D200 to the right by 1, the time base of the pattern of the second time series data D200 in the shifted state is contracted at the expansion ratio d=50%. In this state, the comparison section 301 determines the correlation coefficient between the second time series data D200 and the first time series data D100. Thereafter, the comparison section 301 determines the correlation coefficient, every time the second time series data D200 is expanded gradually at intervals of the unit extension ratio Δd in the range of the expansion ratio d 50% to 200%, in the state with the shift position fixed. The shift and expansion of the second time series data D200 is performed until the second time series data D200 is shifted to the right by T. As described above, the comparison section 301 performs the 1 shift operation to −T to +T, expansion and contraction of the time base, and calculation of the correlation coefficient, with respect to all combinations of the first time series data D100 and the second time series data D200. FIG. 16 is a diagram showing the comparison result data F output from the comparison section 301. The comparison result data F is constituted of “first time series data”, “second time series data”, “correlation coefficient”, “time difference” and “expansion ratio”. These “first time series data”, “second time series data” and the “time difference” are equivalent to “first time series data”, “second time series data” and “time difference” in the comparison result data C shown in FIG. 5. That is to say, the “first time series data” is time series data related to keywords contained in the first summing data B 10 (see FIG. 2). The “second time series data” is time series data related to the keyword contained in the second summing data B20 (see FIG. 3). The “time difference” is a shift amount of the “second time series data” with respect to the “first time series data”. The operation in the third embodiment will now be described with reference to the flowchart shown in FIG. 20 to FIG. 22. Step SE 1, step SE2, step SE4 and step SE5 shown in FIG. 20 correspond to step SA1, step SA2, step SA4 and step SA5 shown in FIG. 7. Step SF 1 to step SF7 and step SF9 to step SF11 shown in FIG. 21 correspond to step SB1 to step SB7 and step SB9 to step SB11 shown in FIG. 8. In step SE 1 shown in FIG. 20, the read section 101 reads the first search log data A10 (see FIG. 2) and the second search log data A20 (see FIG. 3), and outputs these data to the first summing section 102 and the second summing section 103. In step SE 2, the first summing section 102 and the second summing section 103 execute the summing processing, and stores the first summing data B10 and the second summing data B20 in the respective memory (not shown). In step SE 3, the comparison section 301 executes the comparison processing. That is to say, in step SF1 shown in FIG. 21, the comparison section 301 reads the first summing data B10 (see FIG. 2), and in step SF2, the comparison section 104 reads the second summing data B20 (see FIG. 3). Instep SF 3, the comparison section 301 judges whether the first time series data related to all the keywords has been obtained or not from the first summing data B10 (see FIG. 2), in the similar manner as in step SB3 (see FIG. 8). In this case, the judgment result is assumed to be “No”. In step SF4, the comparison section 301 obtains the first time series data D100 shown in FIG. 17, related to one keyword (for example, camera). In step SF 5, the comparison section 301 judges whether the second time series data related to all the keywords has been obtained or not from the second summing data B20 (see FIG. 3), in the similar manner as in step SB5 (see FIG. 8). In this case, this judgment result is assumed to be No”. In step SF 6, the comparison section 301 obtains the second time series data D200 shown in FIG. 17, related to one keyword (for example, New Year card). It is seen that the graph waveform of the second time series data D200 is approximate to the waveform in which the pattern of the first time series data D100 is contracted on the time base. In step SF 7, the comparison section 301 shifts the second time series data D200 to the left by T, in the similar manner as in step SB7 (see FIG. 8). In step SF8, the comparison section 301 executes the expansion and contraction processing for expanding and contracting the second time series data D200. Specifically, in step SG 1 shown in FIG. 22, the comparison section 301 contracts the time base of the second time series data D200, designating the expansion ratio d as 50%. In step SG2, the comparison section 301 calculates the correlation coefficient between the second time series data D200 and the first time series data D100 (for example, 0.1: see FIG. 16), in the shifted and contracted state, from equation (1) described above. The comparison section 301 prepares the comparison result data F shown in FIG. 16 (first time series data (camera), second time series data (New Year card), correlation coefficient=0.1, time difference=−T, expansion ratio=50%), as the comparison result. In step SG 3, the comparison section 301 adds the unit extension ratio Δd (=10%) to the expansion ratio d (=50%) to make the expansion ratio d to 60%. That is to say, the comparison section 301 expands the second time series data D200 by 10%, by increasing the expansion ratio d of the time base of the second time series data D200 to 60%. In step SG 4, the comparison section 301 judges whether or not the expansion ratio d (=60%) is the extension ratio z (=200%), and in this case, it is assumed that the judgment result is “No”. Thereafter, until the expansion ratio d becomes 200%, step SG2 to step SG4 are repeated. Thereafter, the comparison section 301 sequentially determines the correlation coefficient, every time the second time series data D200 is expanded gradually at intervals of the unit extension ratio Δd in the range of the expansion ratio d=60% to 200%, in the state with the shift position of the second time series data D200 being fixed. When the judgment result in step SG 4 becomes “Yes”, in step SF9 shown in FIG. 21, the comparison section 301 judges whether or not the second time series data D200 has been shifted to the right by T, in the same manner as in step SB9 (see FIG. 8), and in this case, the judgment result is assumed to be “No”. In step SF10, the comparison section 301 shifts the second time series data (in this case, the second time series data D200: see FIG. 17) to the right by 1. Thereafter, step SF 8 to step SF10 are repeated. As a result, the second time series data D200 is shifted to the right by 1 with respect to the first time series data D100, and the time base is expanded or contracted in the range of from 50% to 200%, and the correlation coefficient is determined corresponding to the time difference and the expansion ratio (see FIG. 16). That is to say, a correlation coefficient related to the combination of the shift frequency and the expansion frequency of the first time series data (camera) in the first summing data B 10 shown in FIG. 2 and the second time series data (New Year card) in the second summing data B20 shown in FIG. 3 is determined corresponding to the time difference and the expansion ratio. The first time series data D 100 (camera) in the case where the time base is expanded or contracted at a certain value with the second time series data D200 (New Year card) shifted to the right by a certain value is shown in FIG. 19. As seen from this figure, the pattern of the ellipse P100 substantially coincides time wise with the pattern of the ellipse P200. The correlation coefficient in this case is designated as, for example, 0.68, which is a very high value. When the judgment result in step SF 9 becomes “Yes”, then in step SF5, the comparison section 301 judges whether the second time series data related to all the keywords is obtained or not from the second summing data B20 (see FIG. 3), and in this case, the judgment result is assumed to be “No”. In step SF6, the comparison section 301 obtains the second time series data (not shown) related to the next keyword (for example, radio). In step SF 7, the comparison section 301 shifts the second time series data (radio) to the left by T. In step SF8, the comparison section 301 calculates a correlation coefficient between the second time series data (radio) and the first time series data (camera) in the shifted state, from the equation (1). Thereafter, the above-described operation is repeated. When a correlation coefficient of the combination of the shift frequency and the expansion frequency, which is the combination of the first time series data related to all the keywords and the second time series data related to all the keywords, is obtained, the judgment result in step SF 3 becomes “Yes”. In step SF11, the comparison section 301 outputs the comparison result data F shown in FIG. 16 to the prediction section 106. In step SE 4 shown in FIG. 20, the prediction section 106 executes the prediction processing based on the comparison result data F (see FIG. 16), in the same manner as the prediction processing shown in FIG. 9. In the case where correlation coefficient of the combination of the first time series data D100 and the second time series data D200 shown in FIG. 19 is the highest, the prediction section 106 predicts the use frequency of the keyword (camera) in the first time series data D100, from the second time series data D200 by the above-described method. As described above, according to the third embodiment, the second time series data D 200 is sequentially shifted on the time base in a unit of predetermined time, based on the first time series data D100 shown in FIG. 17 to FIG. 19, and the shifted second time series data D200 is sequentially expanded or contracted in a unit of predetermined expansion and contraction (the unit extension ratio Δd). Hence, even if the period of the trend or the like is deviated, or the speed of the trend or the like is different, pairs having a high correlation coefficient are practically specified. As a result, the use frequency of information can be predicted at high accuracy. According to the third embodiment, the second time series data D 200 is sequentially expanded or contracted time wise in a unit of predetermined expansion and contraction (the unit extension ratio Δd), based on the first time series data D100 shown in FIG. 17 to FIG. 19. Hence, even if the speed of the trend or the like is different, pairs having a high correlation coefficient are practically specified. As a result, the use frequency of information can be predicted at higher accuracy. For example, in the above-described first to the third embodiments, description has been made of the case where the respective search log data of two search engines are designated as the first search log data A 10 and the second search log data A20 (FIG. 1, FIG. 12 and FIG. 15), and the summing is performed in the two first summing section 102 and second summing section 103. However, the present invention is not limited thereto, and for example, the construction may be such that there is only one summing section. In this case, the above summing section divides the search log data in one search engine into two groups, and summing is performed for the respective groups, and the first summing data B 10 and the second summing data B20 maybe output. In this case, since the summing section may be only one, the construction can be simplified. In the first to third embodiments, the information use frequency prediction program for realizing the function of the above-described information use frequency prediction apparatus 100 (see FIG. 1), information use frequency prediction apparatus 200 (see FIG. 12), or information use frequency prediction apparatus 300 (see FIG. 15) is recorded on a computer-readable recording medium 500 shown in FIG. 23, and the information use frequency prediction program recorded on this recording medium 500 is read in a computer 400 shown in this figure and executed, thereby a series of use frequency prediction processing related to keywords (information) may be executed. The computer 400 is constituted of a CPU 410 for executing the above information use frequency prediction program, an input unit 420 such as a keyboard or a mouse, a ROM (Read Only Memory) 430 for storing various data, a RAM (Random Access Memory) 440 for storing the operation parameters, a reader 450 for reading the information use frequency prediction program from the recording medium 500, an output unit 460 such as a display and a printer, and a bus 470 for connecting each section. The CPU 410 executes the above-described series of use frequency prediction processing related to keywords (information), by reading the information use frequency prediction program stored on the recording medium 500 via the reader 450, and executing the information use frequency prediction program. The recording medium 500 includes not only a portable recording medium such as an optical disk, a floppy disk or a hard disk, but also a transmission medium such as network, which temporarily records and holds the data. a prediction unit which predicts use frequency of the first time series information constituting the pair, based on the second pattern corresponding to the pair. 2. The information use frequency prediction program according to claim 1, wherein the temporal operation unit performs the temporal operation, with regard to all combinations of a plurality of first time series information belonging to a first group, and a plurality of second time series information belonging to a second group. 3. The information use frequency prediction program according to claim 2, which causes a computer to function as sort unit which sorts a plurality of prediction results in the prediction unit, by using the use frequency as a key. 4. The information use frequency prediction program according to claim 1, wherein the temporal operation unit shifts the second time series information, sequentially on the time base in a unit of the predetermined time, based on the first time series information. 5. The information use frequency prediction program according to claim 1, wherein the temporal operation unit expands or contracts the second time series information time wise, sequentially, in a unit of predetermined expansion and contraction, based on the first time series information. 6. The information use frequency prediction program according to claim 1, wherein the temporal operation unit shifts the second time series information, sequentially on the time base in a unit of the predetermined time, and expands and contracts the shifted second time series information time wise, sequentially, in a unit of predetermined expansion and contraction, based on the first time series information. 7. The information use frequency prediction program according to claim 1, wherein the first time series information and the second time series information are time series information of use frequency of keywords in a keyword search engine on the Internet. 8. The information use frequency prediction program according to claim 1, wherein the first time series information and the second time series information are collected via different collection routes. 9. The information use frequency prediction program according to claim 1, wherein the first time series information and the second time series information are collected via the same collection route, and the collected time series information is grouped into two. 11. The information use frequency prediction apparatus according to claim 10, wherein the temporal operation unit shifts the second time series information on the time base, sequentially, in a unit of predetermined time, based on the first time series information. 12. The information use frequency prediction apparatus according to claim 10, wherein the temporal operation unit expands or contracts the second time series information time wise, sequentially, in a unit of predetermined expansion and contraction, based on the first time series information. a prediction step of predicting use frequency of the first time series information constituting the pair, based on the second pattern corresponding to the pair. 14. The information use frequency prediction method according to claim 13, wherein in the temporal operation step, the second time series information is shifted on the time base, sequentially, in a unit of predetermined time, based on the first time series information. 15. The information use frequency prediction method according to claim 13, wherein in the temporal operation step, the second time series information is expanded or contracted time wise, sequentially, in a unit of predetermined expansion and contraction, based on the first time series information.
2019-04-20T01:08:35Z
https://patents.google.com/patent/US20020184212A1/en
Design Phase ..................................................................................... 8 1. Appendix 5 ....................................................................................... 29 Functional Requirements – March 27th 2001...................................................29 I. II. III. IV. Appendix 6 ....................................................................................... 33 Non-functional Requirements – March 27th 2001 ............................................33 1. 2. 3. 4. 5. 6. 7. Appendix 9 ....................................................................................... 38 Current Computing Capabilities – March 30th 2001.........................................38 1. 2. 3. 4. Introduction The Company we are studying is Process Research ORTECH (PRO), a newly privatized company that was part of a large government research organization called ORTECH. PRO is part of the Metallurgy and Materials science research industry. They are a small organization with about 20 employees. Most of the work done at PRO is of a contract nature. When a client company approaches them and presents them with a problem, they analyze the problem and try to solve it on a small scale in their laboratories. If the problem is solved successfully and in a cost-effective manner, this solution is sold to the client for a negotiated price. Even though the organization is not a large one, the information that is required to carry out the research is enormous. PRO has a simple management structure. There is a board of directors who advise a company president. Under the president are scientific and office managers who oversee day-to-day operations of the company. And under them are the various scientists and office staff who do the experiments and run the front office. See Appendix 3 for an organizational chart. Identifying the Problem There are many steps involved in the process of solving a client’s problem. The steps involve billing the client, purchasing materials, checking inventory and so on. Due to the rapid growth of the company, many standard procedures used to perform these tasks are becoming insufficient to meet the needs of the company and their clients. We have already carried out a Feasibility Study and a Requirements Analysis at PRO and determined that one of the areas that needs the greatest attention is the inventory system. The management agrees that this area of their business requires immediate attention and they are actually considering the conclusions of our Feasibility Study. The system was originally designed for a much smaller workforce, but with recent growth and workforce expansion, the system has become inadequate, thus impeding efficiency. This has resulted in relatively large project delays, inventory wastage and increased cost of maintaining the legacy system. For a complete description on the current system, please refer to Appendix 4. IV. Reliability/Survivability Requirements a. Monday to Friday availability b. 8:00am – 6:00pm availability on those days c. Data restoration within 24 hours of data loss d. Daily/Nightly back-ups of database V. Interface Requirements a. Simple interface b. No large user manual required c. Short training session VI. Lifecycle Requirements a. System upgradeable b. Development time < 6 months VII. Economic Requirements a. Approximately $50, 000 development cost i. Salaries ii. Software iii. Hardware iv. Installation As we move through the design phase, each one of these requirements will be mentioned and dealt with by number. cheap technical support for it. Also, it is relatively safe to assume that Microsoft will be in business for some time to come. Thus we can be sure of continued technical support, and frequent software upgrades (nonfunctional requirement VIa). For a complete analysis of software platform criteria and alternatives, see Appendix 12. With the remarkable current situation at PRO, very little is still required for the new system. Most of the requirements are met or exceeded by the current hardware or software, and there is only one piece of software that needs to be purchased. Thus the global system architecture will incorporate almost exclusively items already present at PRO: (see Appendix 13) Hardware a. b. c. d. e. f. g. h. i. Clients – Microcomputers, open, glass box a. b. c. d. e. Network – LAN a. 100 Base-T twisted pair Cat. 5 cable (copper) b. 32 port, switched hub c. HP LaserJet 5P Printer & Jet-Direct LAN interface Software – MS Windows and MS Applications a. b. c. d. e. f. g. Microsoft C++ Foundation Classes (must be purchased) 2. Diagrammatic Modeling Now that we have all hardware issues settled and a software platform upon which to build this system, we need to turn our attention to the software design. The following is a series of diagrams that show the system in various modes of operation. Some model the system as a whole, some model specific parts. Together, they provide an accurate picture of the system we intend to build. Class Diagram: These diagrams are useful in viewing the system as a whole. This diagram has been adapted from the Requirements Analysis and shows all actors and internal objects used in the system. Lines are used to indicate relationships between items. For a complete description of this diagram see Appendix 15. E-R Diagram The E-R Diagram is similar to the class diagram in that it models the system as a whole. It shows entities, which are similar to the classes in the class diagram. It shows the attributes of each entity and the relations between entities (also present in the class diagram). This diagram is modeled directly from the class diagram seen above. Once we begin database design, this diagram will change to a form that can be represented in a relational database. For details on this diagram including a data dictionary and business rules, refer to Appendix 21. 3. Software Architecture With a pictorial view of the software we wanted to build, we set about to actually design it. Although we considered many possible architectures, there were two alternatives that our team debated: the Three-tier Client Server Architecture and the Repository-Based Architecture. They both seemed fairly appropriate, so we present them both here: Three-Tier Design The three-tier model is a type of client server architecture. This model consists of two types of machines, service consumers (clients) and service providers (servers). What is most important about this architecture is that clients and servers may or may not be running on dedicated machines. Thus it is possible for a machine to act as both a client and a server depending on the situation. In the case of PRO, the clients will be the individual microcomputers all around the company and the central server will be the service provider. Information exchange between the machines is done through messages requesting data, or invoking procedures on the remote machine. In this case it will usually involve one of the clients requesting information from the server. The three tiers of the system will separate the user (client) from the complex inner workings of the software. The first tier is an application layer that the user interacts with. Under the application layer is a processing layer that processes the user’s queries. Under that is the database layer which receives the processed queries and returns the appropriate data to the processing layer. The processing layer passes the data back to the application layer which formats it for the user to see. The layers will exist on different machines; the processing and database layers will exist on the server, while the application layer will exist on each client machine (see Appendix 22). Repository-Based Design Repository based architecture is very similar to the client-server model described above. The system revolves around a central data structure (usually a database), and a collection of independent components which operate on the central data structure. One of the only main differences between this and the three-tier model is that in this case there is a dedicated server and dedicated clients. Under no circumstances can a client machine become a service provider, thus the system is very directed and straightforward. In the case of PRO, the central data structure would be the inventory database, which would be located on the server. Each client would access the server over the network and query the data they require. All software procedures would be present on the server and accessible from any client machine (see Appendix 22). We decided that a repository-based system would be most appropriate for the software we are trying to design. The central data structure would be the inventory database and there would be multiple dedicated client machines all capable of accessing this repository. The database could be designed and installed directly onto the server and be instantly accessible from any computer on the network. We felt that there was no need to complicate the situation by creating multiple tiers and having any computer capable of being the service provider. This “one-way” access system also provides a level of security (since no one will have access to any other machine on the network except the server). It also greatly simplifies the construction of the system for the developers and the use of the system for PRO employees. 4. Database Design Since the Feasibility Study phase, it has been our intention to design a relational database with MS Access. Thus our database will be composed of a series of tables containing the data we require. We will indeed use MS Access to design these tables and relations (for software platform decisions, see Appendix 12). We did look at the hierarchical and network models, but quickly rejected them both. Our data did not fit nicely into the hierarchical format i.e. there was no clear ‘parent-child’ link between any of our data. The network model was a possibility, but the implementation seemed too complex and the relational model provided a much simpler alternative. Once we had selected the appropriate architecture, we analyzed the E-R Diagram shown above. For a complete description of that analysis refer to Appendix 25. After our analysis, there were many changes to consider. First we had a few redundancies to deal with in our initial design. For example, projects kept a list of inventory items they used, and inventory items kept track of their project associations. Some redundancies have been removed now, but a few still remain. In many cases, we felt that these redundancies were best left in place i.e. their presence will make the system work faster (quicker data search and retrieval times). The storage space they consume is negligible considering that we have reserved 300MB of disk space for this database (much more than a database of this magnitude requires). The generalization relationship between the staff members was also eliminated. Since different types of staff members had different operations, it was impossible to combine then into a single entity. Therefore they were left as separate entities and each one is pictured with its own set of staff member attributes. No partitions or mergers were performed on any of the entities. It was felt that each entity represented much too distinct a concept for there to be mergers. On the other hand, each entity was very concisely described, so no partitions were thought necessary. With this analysis complete, the new ER diagram (shown below) was created. 5. User Interface Design The user interface design was very thoroughly considered since the success of this system relies very heavily on user acceptance. As mentioned previously, most users of this system will be novices and thus a simplistic and intuitive interface is mandatory. As such, we decided that each screen should present the user with as little information and as few choices as possible. In this manner, the users will not be inundated with data; they will simply be presented with a small number of choices that they can select from in order to get the information they need. This fulfills the non-functional user interface requirements as laid out in section V (see Appendix 6). Our list of functional requirements specifies a list of data we are required to be able to accept from the user, or display to the user. The following is a tree of screens and functions that our interface will incorporate in order to facilitate this input/output (I/O) of information. Items appearing in boxes, written in regular print are screens that a user can navigate to i.e. there will be a ‘Login’ screen, and a ‘Main Options’ screen. Items written in italics will not appear on their own screen, rather they will be accessible through buttons present on the screen that points to them i.e. the ‘remove item’ function will be accessible through a button on the ‘inventory’ screen. The numbers after the screen or function indicate the functional requirement the information they contain will fulfill (see Appendix 5). The connections between boxes illustrate the path a user would have to take through the system in order to obtain that data or execute that function. Items that are in bold are illustrated in Appendix 28. Of course what follows is not a comprehensive list of all possible interactions with the system, but it provides an overview of the major functions that will be available. See Appendices 27 and 28 for a full discussion of the user interface design. Conclusions In light of the above analysis, we feel that these design parameters will be sufficient to create a fully functional, easy to use and very powerful inventory tool for PRO. We have mentioned virtually every requirement by number in this document and have dealt with all others, not specifically mentioned here, previously in the Requirements Analysis. This system design proves that every requirement can be met or exceeded by following the recommendations presented. Thus we feel that our solution is still the most viable, feasible and appropriate solution to the inventory problems at PRO. Appendix 1 Brainstorming Session 1 – March 27th 2001 Notes: First team meeting. Preliminary project ideas. Summary: This meeting was just a very informal discussion on how we would proceed with the System Design phase of the project. We decided to continue using Process Research Ortech (PRO) as our subject company. We felt that our Feasibility Study and our Requirements Analysis contained enough information for us to proceed with the design phase, so no further information gathering activities were scheduled. We did not preclude the idea of conducting further interviews etc., but at this point we did not see the need. All pertinent information outlined in any of the previous studies was compiled and appears here in the next few appendices. Appendix 2 Explanation of Appendices – March 27th 2001 The following appendices (Appendix 3 – Appendix 6) were originally created for our Feasibility Study or Requirements Analysis. They include a company structure diagram, a description of the current system and lists of requirements for the new system. These documents are included as reference material only. Any additional information that is required can be found in either the Feasibility Study or the Requirements Analysis. All the borrowed appendices have their original date of creation noted in their respective “Notes” section. Appendix 3 Organizational Chart – March 27th 2001 Notes: Organizational hierarchy at PRO. This is included to impart and understanding of the company we are designing this system for. Document originally created March 1st 2001 for Requirements Analysis. Appendix 4 PRO Inventory System Flow Chart – March 27th 2001 Notes: This document summarizes the information we have obtained concerning the current inventory system at PRO. Document originally created February 26th 2001 for the Requirements Analysis. Starting with a scientist who is working on a project, the system works as follows. When a scientist needs an item for a project, they go to the filing cabinets to search for the file that pertains to the item they require. That item will be filed under one of the possibly multiple accepted names for the material. Once the file is located, the scientist will look inside to see how much of the substance is left in inventory. Previous users should have recorded how much was left after they put the item back in inventory. If there is enough of the item for them to use, they will sign their name in the file, the date and how much of the item they are taking. They replace the file, return to their lab, use the item and return it back to inventory if there is any left. If there is some left, they sign the item back into inventory using the same file as before. They write their name, the date and the amount they are returning. After a quick calculation they record how much of the item in total is left in inventory. After recording the information in the file, they replace the file and the process ends. If they do not find the file, they look in the inventory room and simply take the item without recording anything. If there is not enough of the item, or there isn’t any of the item at all, they fill out an order form. They put their name, the project name (and supervisor) on the form as well as the item name and how much they are requesting. They hand the order form off to an office worker who will give it to the Office Manager. The Office Manager will look at all the orders she has received and look through supplier’s catalogues to find the best prices. Once she has located the best deals, she calls up the supplying companies and places the orders. In a few days, the items arrive. Once they are placed in the office, the Office Manager or one of the office staff go through the inventory files and update all the files that correspond to materials that have just been delivered. The person will record the date, the amount of substance delivered, and calculate how much there is in total now. They then replace the files and call the scientists who ordered the items (their names are on the order forms). The scientists pick the items up from the office and take them back to their labs. They use what they need and then check the remainder back into inventory. As above, they write down the date, and how much they are returning. A calculator tells them how much is left in total now in inventory. That number is recorded, the file is replaced and the process ends. names, what materials they are using, how much the person has spent so far, etc. Project reports give much the same information as personnel reports. For given project names, they return the cost of the project, the materials it uses, its start and finish dates, etc. III. Details of input There are not many inputs at all into the system from anything other than computerized user updates. Very few paper documents, no telephone calls or outside system updates will input information into the system. I. The current files have to be input into the system, but once that is completed, it will never have to be done again. When orders arrive, office staff will have to enter most of the data on the shipping forms into the database; this will be a reoccurring task. IV. Details of Information Processing The system will have to do a lot of information processing and internal calculation. That is one of the main purposes of the system in the first place i.e. to automate tedious chores. a. The system will have to take the user input data concerning every inventory item and perform a series of calculations. It will have to calculate how much of the item is left, how long until it expires, how much is being used by specific people, how much is being used by specific projects, etc. It will also have to perform monetary calculations concerning the dollar amount of those items used by specific people, specific projects, etc. b. Independent of specific inventory items, the system will need to calculate how much money specific people are spending in total. c. Similarly, the system has to calculate how much money specific projects are using as well. Appendix 7 Brainstorming Session 2 – March 29th 2001 Notes: Further information gathering planned. Summary: We determined that the information we currently had was not detailed enough to allow us to do a proper design. We planned another trip to PRO to conduct our own surveillance of their computing capabilities and to perform random interviews. We required detailed information on the number of computers they had, where they were located, the capabilities of each machine, the type of network they had, software licenses they owned etc. The interviews were required for us to determine employee feelings on changing hardware, changing software platforms etc. We felt this information was critical, so we arranged a trip for the next day. Appendix 8 Information Gathering Summary – March 30th 2001 Notes: Compilation of all the information obtained on PRO’s computing capabilities. All hardware, software and network details are summarized in Appendix 9 in the Global Architecture Section. After conducting random interviews with office staff members, management and scientists, we determined a few facts about the average employee at PRO. First of all, most PRO employees are not very comfortable with computers. Currently, computers are used for e-mail and printing documents; a few employees use them for Internet browsing and file sharing. Most scientists use computers in their research to either record data or do analyses; most of the data entry is handled by technicians. As a result of this casual use of computers, many employees have not learned how computers work. They simply memorize the procedures required to do their usual tasks and leave it at that. Most of them realize that they are very dependant on the “look” of the applications and the operating system (OS). They tell us that if the buttons and menus changed locations, they would be hard pressed to perform all the tasks they are used to doing. We asked them a few general questions about the machines they currently used. Everyone we asked was aware that their computer ran Microsoft (MS) Windows, and most of them knew that MS Outlook was the program they used to check their e-mail. When asked about other operating systems like Linux and Unix, very few people understood what we meant. Only 2 people that we talked to had actually ever worked on a Unix machine. 3. Networking Components a. Hardware i. 100 Base-T twisted pair Cat. 5 cable (copper) ii. 32 port, switched hub iii. HP LaserJet 5P Printer & Jet-Direct LAN interface b. Software i. NetBEUI Protocol ii. TCP/IP Protocol iii. Windows Primary Domain Controller 4. Software Licenses a. b. c. d. proprietary systems). We feel that user resistance is to be avoided at all costs, thus there is strong support for maintaining the current hardware. Appendix 11 Network Considerations – April 1st 2001 Notes: Analysis of the current situation at PRO, and proposed solutions with regards to networking for the new inventory system. Summary: Given economic and human factors, we decided to maintain the current network architecture. The current network at PRO is set up as a simple peer-to-peer, TCP/IP Windows™ network. Currently, it is mainly used for email, the Internet, printing and file sharing (see Appendix 9). The cables are copper Ethernet, capable of transmitting at 100Mbps. The hub supports 32 users and 100Mbps, thus there is more than enough room and bandwidth for all 15 machines to be accessing the system at once. The machines are an acceptable distance apart, and the workload can be split and efficiently channeled by the switched hub. The new system can use the exiting network to connect to the database (using TCP/IP), query the database and return results. In addition, there is a network printer (an HP Laser Jet) accessible from anywhere in the LAN. Thus non-functional requirements IId and e and VIIa3 are satisfied by the current setup with no need to upgrade (see Appendix 6). The current network has an acceptable amount of downtime and since it has been in use for 2 years, we know it is reliable (nonfunctional requirements IVa and b). There is no need to consider upgrading to a WAN since remote access is not a function of the new system. Upgrading to fiber-optic cables was considered, but rejected on the basis of cost. Token ring and ATM architectures were rejected on the basis of being too inefficient and too complex respectively. Again, one of the main reasons to keep the current setup is the human factor. Networks can be very daunting for novice computer users. Most of the employees at PRO don’t understand how the network operates, they simply memorize procedures for network printing and file sharing etc. Changing the network architecture may change those procedures and again elicit strong user resistance. Thus the decision was made to maintain the current network architecture. Appendix 12 Software Platform Considerations – April 1st 2001 Notes: Analysis of the current situation at PRO, and proposed solutions with regards to the software platform for the new inventory system. Summary: Given reliability and lifecycle requirements, we decided to maintain the current software system at PRO. The only additional tool required for the development of the new system is MS C++ foundation classes to design the user interface. The current software situation at PRO is very impressive (see Appendix 9). They have Windows 200 Server running on their server and Windows 2000 professional running on every client machine. They have MS Office Professional on every machine, which includes Access (the database program which we will use to construct our inventory database). This fulfills non-functional requirements Ia and b (see Appendix 6). The only additional piece of software required is MS C++ which will be used to design the user interface. A license and a copy of the software can be obtained form any one of a number of authorized Microsoft distributors for about $100 dollars, which is still well within the economic limits set out by section VII in the non-functional requirements (see VIIa3). Microsoft software is very widely used, and there is a plethora of documentation and cheap technical support for it. Also, it is relatively safe to assume that Microsoft will be in business for some time to come. Thus we can be sure of continued technical support, and frequent software upgrades (nonfunctional requirement VIa). We looked into designing our database with Oracle, DB2 or MSSQL, but all of these are more expensive, harder to install and troubleshoot than Access. PRO already has licenses for Access and employees are familiar with the “look and feel” of Office Suite products. Again, human factors turn up as being important here. PRO employees are comfortable with Windows and MS products in general. As before, many of them have simply memorized the procedures required to check their e-mail or print documents. Changing operating systems or presenting them with unfamiliar software styles would elicit user resistance. Thus the decision was made to use the software currently available at PRO. Appendix 13 Global System Architecture Conclusions – April 3rd 2001 Notes: A compilation of the results from the preceding analyses Items in italics need to be purchased. Items in regular script are already present at PRO. Hardware a. b. c. d. e. f. g. h. i. Network – LAN a. 100 Base-T twisted pair Cat. 5 cable (copper) b. 32 port, switched hub c. HP LaserJet 5P Printer & Jet-Direct LAN interface Software – MS Windows and MS Applications a. b. c. d. e. f. g. Appendix 14 Explanation of Diagrams – April 5th 2001 After gathering and summarizing all the information we received from PRO, we set about trying to model the new inventory system. We adapted the class diagram from the Requirements Analysis (which appears here in Appendix 15) and began to model the functions of specific classes in state or activity diagrams; we also modeled the system as a whole with an E-R diagram. Diagrams for some classes were trivial; others were more complex. We have included in the next few appendices all the diagrams we thought were necessary to provide a complete understanding of the workings of each class. Trivial diagrams have been omitted for the sake of brevity. Classes describing human actors were usually modeled in Activity Diagrams; classes representing internal objects were usually modeled in State Diagrams. Each diagram comes with a textual description. If required, use case diagrams can be found in the Requirements Analysis. them). All staff members must search and update this inventory list when they are performing inventory operations. Class Inventory Item These are the individual items contained in the inventory list. They have names, prices, amounts, expiry dates, purchase dates and locations (i.e. a room number). They are associated with 0 or more projects, 1 order and 0 or 1 inventories. The Inventory Item class is responsible for checking the location of items, checking their availability, updating their status in the database (with regard to amounts, dates, etc.), adding new items to the list, removing items from the list, checking items out from inventory and changing project associations (when an item is required by a project or when it is no longer needed by a project). Class Project Projects are the whole reason for this system. They are the entities that require scientists to work on them, inventory items to complete and so on. Projects have names, supervisors (a tech. staff), a start date, a completion date, a list of items they require, a list of scientists who work on them and a status (nascent, in progress, halted, completed). They are associated with 1 or more technical staff (at least one to act as supervisor) and 0 or more inventory items (it’s possible that they use no inventory items). The project class is responsible for updating the system when a new project is started, or when it is completed, updating the project item and scientist lists, and changing the status of the project. Appendix 16 Inventory Item State Diagram – April 7th 2001 Notes: State Diagram for the Inventory Item Class. An inventory item comes into existence when it is added to the database with the addItem() function call in the Inventory Item class. Idle It enters the Idle state and remains idle until a technical staff invokes the changeProjectAssociation function passing this item’s name as the argument. It will return to this state when an item formerly in use has its project association changed to ‘none’ and its status is updated with the updateItem() function. In Use It enters the In Use state when a user changes its project association to an active project and the item itself is available (verified with the checkAvailability() function). It will leave this state when its project association is changed to ‘none’. Depleted It enters this state when a user changes its project association and it is unavailable (verified using the checkAvailability() function). It will leave this state and return to the idle state when its availability changes from ‘unavailable’ to ‘available’. Appendix 17 Office Staff Activity Diagram – April 7th 2001 Notes: Activity diagram for the Office Staff class. The activities listed here are only a subset of the possible activities an Office Staff member can perform. These activities illustrate only what an Office Staff member does in terms of dispatching the orders found on the Order Table. Check Order Table Length – Office staffers must check the order table length in order to see if it has enough items to merit printing it and dispatching them. Collate Orders – Once the office staff sees that there are enough orders, they will have the system combine orders for the same items. Print Order Table – They will then prompt the system to print a readable version of the order table on the screen. Dispatch Orders – Once the orders are on the screen they can dispatch them to the various suppliers. Update Items – When the items arrive, they will update the database with the date, amount, price, etc. information. Alert Scientists – After updating the database, they will alert the scientist that ordered the item so they can come and pick it up. Appendix 18 Order Table State Diagram – April 7th 2001 Notes: State Diagram for the Order Table Class. The Order Table will be created when the system is first started and will exist so long as the system is in operation. Thus there is no specific create or destroy method in the Order Table class as there would be in the order class. Upon creation, the table goes into the empty state. Empty It enters the empty state after creation, or after all the orders present have been dispatched. It will leave the empty state when a user adds an order to it. Filling The table enters this state when it contains 1 or more orders. It will remain in this state so long as the number of orders is less than the threshold value (that value is set by the office staff). It will leave that state when the number of orders is greater than the threshold. Full The table is full when it has more orders than the threshold value. The table will remain in the full state (possibly accumulating even more orders) until an office staff member reads the table (calls the generateTable() function) and empties it out. Appendix 19 Project State Diagram – April 7th 2001 Notes: State diagram for the project class. A project comes into existence when the startProject() function is called. immediately enters the nascent state. Nascent A project is nascent when it is first created and remains in this state until it begins gathering inventory items. Halted When a project tries to gather an item that is unavailable at any point in its progress, it enters the halted state. It will remain in this state until the item it requires is updated in the inventory list. In Progress If the project can gather all the items it requires, it enters the in progress state. It will remain in this state until the completeProject() function is called and the project finishes. Appendix 20 Technical Staff Activity Diagram – April 7th 2001 Notes: Activity Diagram for the Technical Staff Class. The activities listed here are only a subset of the possible activities a Technical Staff member can perform. These activities illustrate only what a Technical Staff member does in terms of project work and material gathering. Sign up for project – Technical staff members can be assigned to a project in the database. Obtain Materials – They can then go to the inventory list and get all the materials the project requires. Place Order – If the item is not found, they can place an order for it. Pick Up Item – When the item arrives, they can pick it up from the office. Work on Project – Once all the items are obtained, they can begin work on the project. Return all items to inventory – When the project is completed, they check all the items back into inventory. Appendix 21 ER Diagram – April 8th 2001 Notes: Preliminary E-R Diagram for the Inventory System. This ER Diagram follows directly from the class diagram (see Appendix 15). A description of the entities and relationships depicted here can be discerned from the description of the classes there. Note that a data dictionary and a list of business rules follows the diagram. (next page). Description Employee of PRO Managers, President, etc. Scientists working on research projects. Technicians, Technologists, etc. Workers handling accounting, administration, etc. A list of all the orders the technical staff enter into the system. A request that technical staff enter into the system for some material. Summaries providing information on the projects the employees are working on, personnel, etc. Projects the technical staff work on. A complete list of the current available inventory at the company A particular item in the inventory. Associates a staff member with a report. Associates technical staff with an order. Associates technical staff with a project. Associates office staff with order table. Associates order with inventory item. Associates inventory with inventory item. Associates project with inventory item. Staff Member(1,1), Report(0,N) Technical Staff(1,1), Order(0,N). Technical Staff(1,N), Project(0,N). Office Staff(1,1), Order Table(1,1). Order(0,N), Inventory Item(1,1). Inventory(0,1), Inventory Item(0,N). Project(0,N),Inventory Item(1,1). Business Rules Constraints (BR1) Only technical staff can place an order. (BR2) Only office staff can satisfy the order by purchasing the required material. (BR3) Each project must have one or more technical staff (as supervisor) working on it. (BR4) Only technical staff can work on projects. Derivations (BR5) The cost of a project is calculated as the total of multiplying each item in the inventory by its respective price. (BR6) Each technical staff member’s expenditure is calculated as the total of multiplying each item that he/she has ordered by its respective price. (BR7) The present amount available for each item in the inventory is calculated by adding the amount present in storage and the amount returned by the various technical staff at the end of the experiments. Appendix 22 Software Architecture – April 10th 2001 Notes: Analysis and selection of a software architecture for our new system. Summary: After our analysis, we elected to adopt a repository-based architecture. Architecture Selection Although we considered many possible architectures, there were two alternatives that our team debated: the Three-tier Client Server Architecture and the Repository-Based Architecture. They both seemed fairly appropriate, so we present them both here: Three-Tier Design: The three-tier model is a type of client server architecture. This model consists of two types of machines, service consumers (clients) and service providers (servers). What is most important about this architecture is that clients and servers may or may not be running on dedicated machines. Thus it is possible for a machine to act as both a client and a server depending on the situation. In the case of PRO, the clients will be the individual microcomputers all around the company and the central server will be the service provider. Information exchange between the machines is done through messages requesting data, or invoking procedures on the remote machine. In this case it will usually involve one of the clients requesting information from the server. The three tiers of the system will separate the user (client) from the complex inner workings of the software. The first tier is an application layer that the user interacts with. Under the application layer is a processing layer that processes the user’s queries. Under that is the database layer which receives the processed queries and returns the appropriate data to the processing layer. The processing layer passes the data back to the application layer which formats it for the user to see. The layers will exist on different machines; the processing and database layers will exist on the server, while the application layer will exist on each client machine. We decided that a repository-based system would be most appropriate for the software we are trying to design. The central data structure would be the inventory database and there would be multiple dedicated client machines all capable of accessing this repository. The database could be designed and installed directly onto the server and be instantly accessible from any computer on the network. We felt that there was no need to complicate the situation by creating multiple tiers and having any computer capable of being the service provider. This “one-way” access system also provides a level of security (since no one will have access to any other machine on the network except the server). It also greatly simplifies the construction of the system for the developers and the use of the system for PRO employees. Appendix 23 Software Design: Systems and Subsystems – April 10th 2001 Notes: Division of the Inventory system into subsystems and modules. Main System Inventory System – This encompasses the whole system. Subsystems Administration – This is a subsystem designed to handle administrative details mainly dealing with the personnel and project issues. Ordering – This subsystem will handle all inventory item and ordering functions. Reporting – This subsystem will deal with the production and printing of all reports in both virtual and hard copy. All report information will be gathered from one of the modules in the system. Modules Personnel (Administration) – This module handles all personnel issues in the system. This includes addition of new personnel to the database, correcting the spelling of names, updating personnel projects and the removal of personnel from the system. Project (Administration) – This module handles all project issues in the system. This includes project names, supervisors, associated staff, inventory lists, start dates, finish dates, current orders, costs, etc. Inventory List – This module will handle all the inventory information. It will keep track of inventory items, names, amounts, dates, associated projects, associated scientists, etc. Order Table – This module will administrate the order table. It will accept orders from the Technical Staff, collate and combine orders, create the order table seen by the Office Staff, etc. Personnel (Reporting) – This module handles the generation of personnel reports. It will gather information from throughout the system and display information such and personnel names, projects, orders, money spent, etc. Most of this information can be gathered from the Personnel (Administration) module. It will also handle the printing of the reports both in virtual and hard copy. Inventory (Reporting) – This module handles the generation of inventory reports. It will gather information from throughout the system and display information such as item names, amount left, amount ordered, cost, associated projects, associated scientists, etc. Most of this information can be gathered from the Inventory List module. It will also handle the printing both in virtual and hard copy. Project (Reporting) – This module handles the generation of project reports. It will gather information from throughout the system and display information such as project names, supervisors, associated scientists, items used, total cost, etc. Most of this information can be gathered from the Project (Administration) module. It will also handle the printing both in virtual and hard copy. Appendix 24 Database Architecture – April 11th 2001 Notes: Analysis of possible database architectures. Since the Feasibility Study phase, it has been our intention to design a relational database with MS Access. Thus our database will be composed of a series of tables containing the data we require. We will indeed use MS Access to design these tables and relations (for software platform decisions, see Appendix 12). We did look at the hierarchical and network models, but quickly rejected them both. Our data did not fit nicely into the hierarchical format i.e. there was no clear ‘parent-child’ link between any of our data. The network model was a possibility, but the implementation seemed too complex and the relational model provided a much simpler alternative. What follows this appendix is an analysis of our current E-R Diagram and the translation of that model into another that can be properly represented by a relational database. comprehensive list of all possible interactions with the system, but it provides an overview of the major functions that will be available. Searching Notice the interface is composed of “tabs” running along the top of the screen. Depending on which group the user belongs to, the particular tabs will be enabled or disabled, for example a Technician cannot access the projects tab to add and remove projects or personnel from the database (only project supervisors can). This is a sample screen that an office staffer might be faced with. The office staff can view inventory usage based on projects, personnel etc. An office staff member can enter a chemical name and the project it’s being used in, this will query the database to find out how much of that chemical was used in that project. At least one of the fields has to be filled in or the search cannot be completed. If the office staff member just wants to see the entire database without entering a search query, the “Show complete database” function can be used. The Print reports button will create reports based on the information entered. It will bring up another dialog box that allows selection of the format of the report and other details. Employee Administration The Scientists tab is used to add scientists to the database as well as assign and un-assign scientists from various projects. This screen is useful in keeping track of what scientists are working on, how many orders they have placed, how much money they are spending, etc. Ordering The Orders tab is used to place orders or view the order table. Technical staff will see only orders they have placed on the table while the office staff will see all orders placed since the last dispatching. Thus technical staff will only be able to remove their own orders, whereas office staff will be able to remove any order (i.e. when they are dispatching it). There is an option to print the table out as a hard copy as well. Clicking the place order button will pop up another screen where the particulars can be entered. Andrew: Interviewing, concepts and planning, State/ Activity Diagrams Manojav: Interviewing, formatting, and typesetting, Screen Displays Kunendran: Diagrams, Case Diagrams and other text Junaid: E-R Diagrams, Database Schema, Database Operations.
2019-04-19T23:03:01Z
https://pingpdf.com/pdf-proposed-design-of-an-inventory-database-system-at-process.html
Kind the rest of the correspondence how you’d any formal correspondence. Generally, an official letter is short and includes just a couple of primary body sentences, however in the contest that you wish to investigate about a string information it’s possible to comprise everything from the body. It needs to make a fantastic opinion about the reader. A formal correspondence needs tons of elements, that needs to get placed only at prescribed places. Thus letters are listed in order to keep. Creating a covering letter can be actually a significant part of one’s app and also our experts are going to have the ability to help one to find an edge over your contest. Not adding it will guarantee that you will not be considered as it shows a deficiency of attention as will using a letter that is exact generic and non invasive. Explain in the first sentence of their anatomy of the correspondence. The application form correspondence (sometimes, called software ) ought to be written such a manner it covers all the regions, a potential company is searching for. In turning in an application for a job in most firm, it plays a role. You may require a terrific software letter that will help you raise the possibility of obtaining supply from your university. The tone of the letter should be employer-focused, businesslike and ought to answer the project requirements. Written and the business letter’s tone should be objective in first personal. At an identical point that you need to have a positive tone into your correspondence, it is likewise likely to make use of the chance to showcase your personality within a means that couldn’t come across in your restart. Software is regarded like a business letter. The application includes a group of validation criteria as exhibited over the image. It’s maybe perhaps not an ordinary correspondence. Remember that the correspondence isn’t your CV which you just send to each prospective employer Just before you move to write a program. It is planning to be sure your application can likely get sent to the acceptable specific, to begin with. That you don’t will need to stay in mind some rules. One of the utter rules that are most crucial could be the fact that it ought to be concise and quick. A couple of straightforward rules are able to help you employ apostrophes. Check that you’re obeying style rules about punctuation. There is A business letter conveniently recognizable by style and its structure. It’s a letter that’s six components. It may be formatted a couple ways. As soon as you totally understand the six aspects of a company correspondence, writing 1 is easy and quick. And that means you may tailor it to some specific 17, your portfolio letter should be more generic. Find the name of the individual or section who should get the letter. It really is quite an simple task to be sure that your coverletter is error-free. Resume cover letter must not be an one-size-fits-all-role’ file. Although insure letters should be different, personalized and inventive, there are specific guidelines you must follow to make certain that the material of your coverletter guarantees you that a sizable proportion of snagging. Once you’re mailing your entry Ordinarily the pay letter is frequently paper-clipped facing the first page of your manuscript. Making certain it is specific for the market and also position is essential. Cover letters are written to get a certain project or position you are applying to. Snippets may be robust As you are going to see in our examples below and will be customized to satisfy your requirements. All cases will take Scala. On work, in the event that you’re in a choice to get to data ahead of conversion into your PDF format, be sure to take that alternate. The alternative is also referred to a correspondence of interest. Make certain you have the suitable date format for the own recipient. Shifting formats inside a correspondence can make you be regarded. It is very important to grasp the structure of a company letter, or so that the receiver will take it and reads it. The rejection letter format is like this business letter format and also should be followed correctly. An individual needs to bear in mind there are essentially just two formats to letter producing to begin. A coverletter format needs to be adhered to so you’re going to maintain a position to realize what you will write down. You need to look at an evaluation piece format which enables you to examine your system in a representative mode. The correspondence begins with all the contact information regarding the job programmer date, and also particulars of their addressee for example name, designation nameaddress. A touch of resignation is an functional document which may be utilised in exit requirements. Somebody could be sure by emails which it’s been routed into the one who are able to take the steps although, letters do precisely the job. It’s imperative that you cover the correspondence. Thus, you need to be certain the correspondence is ideal. In fact, purchasing a superior letter implies you’re depart a superb belief in the mind of the individual that interviewed you. You might need email or a leave letter to get reasons. A depart app is fundamentally a official way of asking for a break out of work with a certain time frame. On the list of ways that aids in finding great talent for your organization, the work application could be However, the basis of the kind of firm. Checkout a few of the reasons as to why you should use the job software. Occupation applications have the capability to get data in a method that is consistent from every individual. Resume using pay letter A work application insure letter format needs to have the role therefore they will secure a specific project of making a good belief of its author. Programs might be properly utilized in earning CV, restart so as to apply for tasks. There is absolutely not any recognized template in whatever manner you see fit because it is just a case and it could be utilised. You might opt to personalize the state template to satisfy your needs when writing for such a certain goal. In the event that you would rather, you may down load totally free of charge Microsoft templates. Your publication arrangement needs to reflect the type. The structure must be easy, informative, very tidy and easy to comprehend. This arrangement for leave application may be properly used for writing a likable and skilled application. There is to write a leave application mail A arrangement given under. It will be likely to incorporate your advice before applying for work and also personalize the correspondence. It would likewise be quite helpful for whatever you’re employing to, to acquire info regarding the location or requirements. The details which you deliver could assist me learn more regarding your faculty and making an informed decision about my future. It’s updated to provide the landlord tenant upfront and basic information. Make sure that you might have sufficient info about organization or the institution you’re applying to. It is sensible to see and learn the relevant information about the applicant beforehand which you are able to earn a suitable job program. If you’re mailing out a letter having a double-window envelope it could be really hard to format the file. There is A cover letter essential for several job applications. It is not just a dissertation, nor could it be the full suggestion. Your program wills boost and improve your chances of landing a scheduled appointment. It is the the suitable site if you want professional cover letters. Until they get to the individual letters can possibly be filtered through people. A letter composed in the format may grant the pay raise that you’ve always desired to you. You should edit your own correspondence to produce sure this information fits the work that you need and your unique capabilities and capabilities which are relevant to this job. You must have a cover letter, to start out with. It is important to create your application letter stick out from the others rest of the Make sure you have written all. It is important that you might need to stick to up this up Once you ship the job app letter be it with job application letters for internship template another template. A job software letter can be also known as a cover letter, and this is attached with your resume when applying for the employment. The correspondence of application is intended to supply advice on are you really are a candidate for. To a collection of associations who may be ready to engage you, you have to mail internship app letters for that. Any response you provide is going to be held confidential and will not be used against you in any manner, if you are asking to get a job. By sending a duplicate of one’s bio data, you have must produce a program for the job , then in the event the bio data becomes short-listed to begin with, you have to face a series of tests and interviews. You might be browsing for a summer job or internship, or perchance a scholarship or faculty app requires you to add matters like a resume. Every single time you leave job, it is vital to get a recommendation letter to gift to your company. The moment you have completed your outline, you should return and inspect the initial article 1 last second, if you’d like to do a very job. You may possibly set jobs according to list workin reverse chronological order in most section, and a specific skill group, such as customer assistance. Around the reverse side, the quicker you might sort, the longer tasks you are likely to be able position to perform punctually plus get money. List-A few of details in the summit of this restart to aid companies quickly estimate if you are appropriate for the task. On the reverse side, in case you are looking to get a research-oriented job, you’re going to be anticipated to devote more thorough advice on your search books, their scope and methodology, etc.. It’s really a job that is hard but then it is not difficult to handle all the duties, in the event you should be enthusiastic about serving folks. You should also comprise project posting advice. In the light of this above instance, in case you’re concentrating on the sales endeavor, you might have to create more regarding your communication skillsathe presentations, speeches, etc., you have given before. To start the resume, organize the info that you should comprise. You don’t need to change the advice you must provide the advice. Be sure you keep it straightforward with essential details. You put in when searching for the work, When you are logged on, it’s going to request that you just simply fill out all of the required information. It’s possible to produce out your resume information and formatting stick from each one of the others submitted to get job by using a superior, brand that is identifiable . The contact data may be the section of the coverletter, also comprises your own contact info, as a way to allow it to be simple for that company. Your contact details is because it really is in the aspect of your own resume the exact 1st thing your prospective employer will probably see. A Resume Template can be just really a very essential document which is utilized from the case when a person or an applicant is trying to get occupation, a volunteership, an internship, or an instructional class or some other point. By using a resume template can be helpful in making your profile. Ceative Resume Templates needs to be drafted utilizing also a tone and an arrangement. It might not be possible for all for it all right. If you are an experienced candidate, then an employer must be offered by you combined side all the current specifics of one’s work and accomplishments. You’re not required to share with your employer why you are departing, but in the event that you would like to preserve a professional, mutually respectful relationship with your company, it’d be a good notion to reveal your future intentions when you’re departing to pursue other livelihood chances. Employers on average know exactly what a situation involves, but they’re not mindful of exactly what made you great in your work. They study the exact information written to ascertain if the applicant is qualified for a position. Once a restart is wanted by the company employing a CV is definitely an situation. They need not go into the specifics of the prior employees skilled and individual qualities. That you don’t wish to bore your prospective employer with resume. You layout your resume is crucial to increasing your likelihood to being employed. work search will be aided by understanding howto save your valuable resume. Fresher resumes might also be attached to a internship application, specially in case you want to operate in the company of which you could leave your own internship. Additionally, there are lots of resumes . If you’re browsing for career opportunities a organization that is trustworthy, you should go through the decision process fixed from the corporation. Since you understand that shifting businesses a couple of times early on your career will be the way to improve your salary or you might be seeking yet another position. You also need to mention concerning the position you are searching for. Research concerning the specialized skills essential for the work position that you’re looking for. Thankyou letters are at general, a sort of gesture that is private, however, the tone even though composing letters to organization purposes ought to be more formal. It is really a gesture although writing a brief flawless thank you letter to them may look as a time intensive undertaking. The goal can be served by A very straightforward letter with just a few lines. You can not only create this sort of letters without even pursuing a format that is suitable. Letter-writing can always help you stay in the minds of clients and your customers. An official letter need to earn an outstanding impact on the reader. So, it’s all-important to comprehend just how to write a correspondence effectively. An official letter should have lots of components, which has to be put only at prescribed places. Writing an official correspondence can be thought to be an daunting endeavor by persons. You should keep in your mind that producing an official correspondence is not complicated if you understand and adhere to the rules and the structure of this letter. You have to proof read your correspondence twice, and if you can, ask some body else to read it. Since you find it possible to make sure the letter is composed by you as professionally. You will also get sample letters and exclusive high suggestions that will help . A correspondence of encounter is. Donation letter is an important piece of letter that could greatly help a business which is seeking monetary help or someone. Letter-writing inside the illustration of contribution thank you letters should have a touch. A sample will make it feasible for you to comprehend just how to write a thank you letter. It has been provided here to give better comprehension of how a correspondence is written to you. It’s likely to get out more types of sitemap on the net and utilize them to draft letters depending on what you require. Shifting formats within a letter can make you be regarded. Hence, it’s better to adhere to this adventure letter structure. Listed below are a few of samples and the formats that you are going to be in a position touse if necessary. A sample template was given. This template provides a very easy idea concerning the process of issuing and writing a blooming letter to you. There really are far a lot more. You will find a lot of scenarios where it’s mandatory to compose this type characters. You can find a good deal of scenarios, at which you would need to write this type letters. You may possibly get thoughts in the checklist below and publish your own own distinctive communication to definitely show your appreciation. Attempt to remember, composing a preceding sort of letter differs in a lot of sorts of letter writing. Composing a thanks letter addressed to your potential employer is one of many factors you want to accomplish when you’re back from work interview. The following are a few of these facets of an experience letter. The rest of the part of the letter format is comparable to that said previously. Also the citation or the reference number is place below the topic line. The address ought to be whole in every factors, also should comprise their sender’s positioning . Mentioning the precise recipient address will guarantee you just reduce the options of sending letters that are erroneous to this mailing in the event of mails. Someone might be made soon immediately after receiving number of solutions to write a greeting letter. You must make duplicates of the identical, As soon as you’ve completed writing your cancellation letter. The donation request correspondence, as previously mentioned earlier in the day, must be drafted plus as that makes a negative feeling, it has to be liberated from some producing problems. It ought to have the ability to attract an image of this origin that you are associated with. About what you stated you’d produce on in the exact first paragraph, Over the paragraphs you write. These paragraphs may cover the significance of sending thankyou letters offer a sample letter of thanks to you. The introductory paragraph ought to underline the aim of creating this letter. Thankyou letters will be the perfect means to communicate your admiration. Even the letter must not include any comments that are unwanted regarding the corporation, or the client. It truly is uniform for each one of the letters which belong into some correspondence. You should compose a commendation letter directly immediately after the achievement is attained by the individual. If you are thinking about how to write a commendation letter, then the following suggestions will definitely turn out for a beneficial guide. If creating a business letter to keep in your mind that conciseness is essential, it’s important. Writing English small business letters that are isn’t the job. Develop a heading to your memo When it really is an military memo, then the enterprise seal has to be towards left corner. In case a civilian writes the letter, an official sign-off should be employed to complete the correspondence. Since people could read them apology letters should avoid referring to delicate own matters. Make sure you clearly specify the principal basis behind being absent, so therefore your circumstance is known by this letter’s recipient. A letter of lack must reveal the reason for getting absent as well to define when the employee is called to reunite. Journal-writing a second significant point for me. You are able to discover assorted kinds of Me Mo writing with no problem. The ability to write a Army Me Mo is a must for virtually any service member. In western societies, it’s the primary part which affects media freedom. Apparently, there’s a difference in selling price. The advancement will be revealed by the machine. The component will automatically reveal a car configuration . It will be likely to alter almost any element of this template depending on your own requirements. Even the shape could challenge a couple of the claims in your rebuttal that is principal, and gives you documentation evidencing why you’re refused security clearance. There are different cases. Any references should be listed from the paragraph. It is a good concept to add advice that makes it possible for the worker to discuss the matter further should it’s necessary. In a few instances, a particular quantity of advice letters will be required. You ought to mention that their previous job designation and also the informative article they’ll be taking above. When there is just one paragraph, as is correct, don’t quantity the paragraph. Amount paragraphs in case you possess multiple. Each section is going to be given an explanation. You clarify his previous position and have to mention that his job title. Installing the variant could possibly be the option to get an upgraded Joomla setup. You will receive a few versions of Akeeba. The cryptosecurities issue is aimed toward cryptocurrency and conventional investors. Let us start with a question. The problem isthat I am reigning because they have an tremendous back log. The bigger the shift the more easy it is to fix the matter. Struggling to alert that the head of this department can cause termination. Do talk about steps required to fix the action that it is not very likely to occur on. The progress is going to be exhibited on the track. The configuration progress will be exhibited on the monitor. The paragraphs of this principal human anatomy must cite the title of the employee who is getting promoted. There really are a couple of organizations on distinct stages likely to begin a Securities Token dealing Platform. Your organization is starving. Bear at heart that you are not on the lookout for just 2 different people from inch industry. Start with a couple industries, In the event that you would rather a more conservative plan and work from that point. You’re looking for a single person out of each and every business. Someone must offer info and employ an official manner of writing. You will always put in an outside solution should you ever need to. Once you established thatyou must know that your own alternatives. There you will observe the element selections. There’s a choice for installing extensions via their own URLs. You can use the set up from Internet function to get extensions in Joomla extension directory too. You’re going to be informed while the backup is done. It truly is crucial take website backups. You have the capability to put in an archive file in your page. A Pentagon spokesperson managed to divert a response out of the control concerning the correct variety of security alliance routines in 2014. Squad leaders are incredibly essential for the Army,” Davenport clarified. Such as Asos and Zappos, you have to explore domain names maybe keywords unless you’re one of those market place leaders. A comprehensive touch block isn’t mandatory but the MFR should be signed. You will find cases too. It is ways to produce an even more powerful reference to a subset of buyers. You might also need to follow along with protocols that are additional. You’re going to receive the Site Setup period. Subsequent to the deal extraction has been completed, another screen will arrive. In the event that you hear keywords have been key words composed get started counting the total amount of phrases into your phrases, then it is actually just a waste of time. Your biography is a set of qualifications, expertise, and capabilities like your resume, it’s a personalized view of you personally as an individual and may be cautiously tailored according to the biography’s goal. Your artist biography ought to become an overview of facts regarding your art job written in person. Composing a biography about a hip hop artist resembles writing the following sort of biography. There is A biography only an account of a person’s life. For example, when it’s likely to some gallery which frequently holds exhibitions, you’ll definitely need to concentrate more seriously on your own exhibition history and not as much on a residency. Your cosmetics artist biography should be very carefully prepared to fulfill the particular has to which you are seeking to employ it, like for LinkedIn you could need the support of linked in profile treatment options, Thus if you want to know more about some thing to grow your resume afterward it takes to definitely sing your superior abilities and knowledge. It could be useful to adjust your site for aims and readers. Biography would be just a sort of composing as you have surely got to think of info that is authentic, perhaps maybe not create your own data. A biography is meant to analyze somebody’s lifetime and interpret . Examplean executive adviser plans to share with managers regarding an individual’s professional history, so ought to incorporate a few experiences that are private and also this information of their biography needs to concentrate on experiences of this topic. An biography narrates the life narrative of someone, as compiled by writer or another guy. A biography to be found in an academic paper should comprise while in the region of study, and should avoid information perhaps maybe not related. A biography might be short in case of few sentences biography, and it may also be extended enough to fill a whole publication. Once all is done and said, make certain that you try to consider your artist biography will increase and change with you. Your Artist’s Biography is critical for viewers of one’s art who wish to learn a lot far more. A artist biography has to be something that can be printed wordforword at a report or catalog. An Artist assertion, on the reverse side, will be a lot more like a biography. Therefore it can be quite a little hard. If your functions are somewhat versatile, you may need to compose a brand new announcement for every exhibition. It truly is highly recommended to have one text geared up at times while you may desire to customize your bio to get every single scenario. So you possess the suggestions to use while you have to certainly don’t have any excuse of becoming struggling to write a bio. A bio could be used for possibly a portfolio or publicity. A bio is now a component of website or a press package. When you should be to advertise yourself and your work A good bio degradable is necessary to aid your marketing. Utilizing a sample bio degradable to some template, so it isn’t hard to make an impressive expert bio of one’s personal personal. Tend not to compose the mosquito once and think that it’s prepared to go. Summarize the info you’d love to devote your own bio. A artist bio should concentrate on applicable professional and specifics. Your bio should be formatted in a manner that it could also function as press release it ought to be upgraded dependent in upcoming events and your heritage. Shamelessly Plug A bio degradable is similar to free advertisements, therefore make use of the chance! While you’re composing your artist bio there’s a whole lot more to consider , however we aren’t concluded however. The artist can detect hip-hop as being a methods to get to the childhood onto a scale that is much broader than at the classroom. A outline of what he’d like to do together with their own art. There are numerous interesting and creative ways to make paintings using the aid of fingers and thumb. Paper painting is one of many widely used techniques in fingerpainting. However older you’re, you have lived a complete life span of functions and memories that were amazing. There are occasions when you could not even understand the place to start using if asked to compose a biography. Might job will not have a thing to do with automobile wrecks, he has explained. A number of the examples have beenn’t literary but visual. Format and biography Template examples can be found the net at no price tag. Among the uses for artwork, in reality was assumed to decorate and attract attraction to this city. Attempt to not center on listing tasks that you just did on your dental assistant restart, but in addition on accomplishments. Assistants encourage the role of dentists in offices around the nation, making certain they work efficiently and provide the absolute best patient care possible. A sample assistant restart will put a while on the potential to build the consumers of the individual feel at ease. Fully being truly a physician assistant is one of those desired and chosen health care careers at the present time. A wellness helper is actually a hybrid of health and administrative obligations and so are the exact first to stage of contact for patients. By doing a variety of duties and duties administrative assistants offer professional support. An helper is somebody who has to handle and help out with various activities of their organization’s operation. The following he resume writing and sample tips are going to aid in improving your chances of receiving an interview. The administrative assistants may take care of the traveling and guest arrangements and serve as the information director for off ice. In other words whatever joins your top helper restart. Govt assistants give unmatched business and administrative service to executives and managers. An executive assistant devotes his or her livelihood by supplying a combination of administrative support along with notions into helping a corporate officer. The assistant resume is. For that resumes, cover letters are crucial. The component of the health helper offers lots of handson experience and vulnerability. The use of amedical assistant can provide the gratification and is essential. Explore and it is much better to research as far as you can as it pertains for the form of personalized Assistant you would love to be. Complete a Doctor Assistant diploma As you’re most likely to work in tandem with a physician that is certified, you have to acquire a level in doctor help. Doctors are precisely the very same. They just want to do the job who understand they are currently doing. Terrible things may happen in the event that you’ve got doctors and hospitals that are excellent. Whether or not it truly is listed from the work ad, it needs to become at the lowest a number of days somewhere, on your resume. By targeting your job statement to this 8, the companies will be impressed and increase your own odds of locating the employment interview. The quantity of career candidates is big. Your Physician Assistant expertise list should contain matters such as tasks that are linked to your specialization. Afterall, a trip to your dentist could be exceedingly stressful for a few. The fabjob guide is made up of variety of the best business advice that you can get from different sources, and a whole lot more. Given after are some of the tips gain professional achievement and you might follow along with turn to some physician assistant. Folks struggle to acquire a project that they wish to own. There are lots of job delivers readily available for medical assistants all around the nation. Career of the wellness and fitness helper is the perfect choice for somebody who dreamed about career of a physician or even a nurse, but didn’t succeeded to get his dream job. It’s critical that you tailor your resume to seek out each and every job that you apply for. Know what it really is you are doing is job that is . It’s crucial to plan your resume at fulfilling with certain needs of the employer that you’re employing to. If so, being a doctor helper may wind up getting the healthcare profession decision for you. Than you can presume, A few areas of one’s project might possibly be of greater significance to an employer. The resume objective would be a section in your software since it is your opening to your physician. Your career objective should clearly describe and reveal for them your abilities and exceptional traits that make you ideal for your own circumstance. You’ll find confident things in composing an target statement that is astonishing involved. Article regarding samples of resumes targets is a example of a idea from the form of the picture that’s of use for you personally in benchmark so you can make a project schedule and ensure it’s much less difficult for you personally when searching for ideas regarding types of resumes intentions. Secondly, you want to opt for a work interview. You should be informed about they manner in which they deal with resumes before applying for employment abroad into. To prepare yourself a physician assistant resume that will convince a hirer, you would like to continue in your mind the needs of the hirer before you commence writing.
2019-04-20T02:28:05Z
http://saintjohnmary.com/dodatkowe-umiejetnosci-cv/
"Call Center Hiring Support Tool" This tool required very little training before my team members/employees felt comfortable using it. It's user-friendly and largely intuitive, and we typically find any questions we've had surrounding certain features or functionality have received fast and helpful responses. There are a few missing features regarding applicant search and organization functionality. As a team, we would love there to be something like timestamps or "agent-indicator" to be able to organize which member of the team had the last, or a specific, interaction with an applicant (or maybe something like agent-specific folders?). Additionally, we would love a way to get a bit more detailed with our applicant filters, such as by region/time zone to be able to identify who and when which applicants we should call first. ApplicantStack has certainly made aspects of meeting our client's needs much smoother. We at the call center typically utilize our own scripting and call routing tools, but there was no clean way to keep organized track of applicants we'd contacted and where each of them were in the hiring process; ApplicantStack helped us do that. There may be a couple of things we'd organize differently or change about note-taking/applicant sorting, but whenever our client has contacted ApplicantStack to ask about questions we've come up with, they've been responded to very quickly and helpfully. My agents are able to make thorough and helpful notes regarding the applicants they've reached out to and interviewed or need to call back. We share our usage of Applicant Stack with a few other internal team members as well as the team that we interview employees on behalf of, and we are all able to easily keep track of where in the hiring stage/process the applicant exists. Thank you for taking the time to write a review about ApplicantStack. You can see the last modified date on the candidate view tale as well as the candidate record. Perhaps that will resolve your issue. If not, please contact support so we can assist you. You can search (using the advanced search feature) for distance to zip code, once the results appear on the table, you can filter and sort your data. I can easily sort through and search candidates and jobs. Assigning managers to jobs is easy. I love being able to create job and email templates - such a time-saver! Very easy to rate applicants or add notes. The bulk email options is very smooth. One smooth process for posting in several different spots. I use the onboarding module as well and successful candidates use it to complete the majority of their first-day paperwork before their first day - this makes their first day less 'sign here' and more 'welcome!'. We went digital last year and since new hires do their paperwork online, I don't have to worry about scanning anything. I can only have five active users at one time - this gets complicated when I have more than five positions open all with different hiring managers. There are more robust application systems out there with more features like annual evaluation modules but this is very effective at the application tracking part. This system allows managers in many different locations to view applicants and communicate with HR. I also use the onboarding module to save me tons of time processing new-hire documents. You can have an unlimited number of users! Please contact support so we can help you. I like how easily accessible ApplicantStack is and customer service is very helpful if you ever have a question. I love how you can track when applicants are completing paperwork and can help. I like the layout of ApplicantStack and how organized everything is set up, this makes it easy for others who are not as tech savvy. I dislike that sometimes depending on the browser you use, you cannot upload certain documents. Also, if you don't have certain privileges you can't see as much information as far as date of birth of applicants. etc. This site is easily accessible, fast, easy to learn. Being able to do the paperwork online is very helpful and saves the office staff a lot of time. A great place to store all info and communication with applicants. I also love the fact that it carries the applicant's name and info over into Clear Care. Most of the reports are easy to run. Customer service could use improvement and sometimes the interface with Clear Care messes up. Example: when moving an applicant to Contingent Job Offer stage, it will sometimes populate Clear Care twice with the applicant's info. AS has many useful features. I love the dashboard where I can see how many applicants in are various stages of the hiring/interview process. I also like the fact that you can track and run reports showing why various candidates where not pursued. You can also post jobs to multple job boards and all the applications come into AS. AS allows us to track and communicate with all our applicants. Posting job vacancies is also a big plus. We hold webinars every week on onboard which is in the announcement section on your homepage. Please contact support so we can send you a link to the resources. If you would like us to turn on a trail of Onboard, please use the support portal and we will start the trial for you. I can without much of a stretch sort through and seek applicants and occupations. Allotting administrators to occupations is simple. I adore having the capacity to make occupation and email layouts - such a help! Extremely simple to rate candidates or include notes. The mass email alternatives is smooth. One smooth procedure for posting in a few unique spots. I utilize the onboarding module too and effective applicants use it to finish most of their first-day desk work before their first day - this makes their first day less 'sign here' and the sky is the limit from there 'welcome!'. We went computerized a year ago and since new contracts do their desk work on the web, I don't need to stress over examining anything. I can just have five dynamic clients at one time - this gets muddled when I have in excess of five positions open all with various contracting supervisors. Discover some approach to take notes on the highlights you'd like to utilize or investigate and amid vital arranging periods, attempt some of them out on analyzer documents. Our business has a moderate season that we do this in. It helped us truly plan what we'd like to use to help us when things got tumultuous. Taking notes in the riotous thick of things, was extraordinary so we would realize what highlights included superfluous advances and what improved our lives soooo much. Our business has high turnover rates so having a great deal of paper documents would be fringe unreliable without Applicant Stack. This likewise enables different directors to get to documents themselves from various states even, so we don't have a container neck from just a couple of individuals having the capacity to haul them out. Of late we've truly taken advantage of the capacity to email staff records to sign. For instance we conveyed an update on our fundamental staff desires and utilized the sign record include with the goal that we realized who was adhering to directions and it was a learning open door for staff who weren't as PC sharp. It was so natural they're less scared by the online undertakings we give them. "Application to keep all management on same page" The application allows for communication across all of the management team with the simple click of a button. Seamlessly allows for feedback on the applicant between applicant and others on your management team (even when working remotely). Never call the same applicant twice on accident! Pretty incredible tool if you ask me. The only dislike I have is that the site has updated in some strange ways over the years. I don't find it to be as mobile friendly as it used to be. The setup/ format of the site has gotten more complicated which I preferred the simpler version. Train your team, and try it out. You wont regret it. We have been able to contact applicants back in a more timely manner since we get an e-mail the moment they submit an application. It allows whatever manager is available to contact them and start the interview process and communicate to the others what has been done all in one place. I appreciate the ability for staff to have some control of their information and paperwork, while allowing us the ability to change how and what the have access to. Moving staff through various stages is easy. They also make it a two step thing in some ways so that you can't easily make a mistake with someone (embarrassing moments spared). I like the ability to customize the forms we use and some of their features actually encouraged us to make electronic forms out of some of our paperwork just because it was so cool! It would be helpful for staff to have some sort of tutorial video of how to use and make changes on their profiles (some of our staff have language barriers so visual aids help). I also wish we could some how change the instructions on some of their tasks to be in Mongolian or Spanish for example. Searching multiple staff's files is a pain. I haven't found a quick way to just search "uniform sizes responses" or download all the staff's responses to that questionnaire. If that option exists now it's not intuitive getting to that feature. Find some way to take notes on the features you'd like to use or explore and during strategic planning periods, try some of them out on tester files. Our business has a slow season that we do this in. It helped us really prepare what we'd like to use to help us when things got chaotic. Taking notes in the hectic thick of things, was great so we would know what features added unnecessary steps and what made our lives soooo much better. Our business has high turnover rates so having a lot of paper files would be borderline irresponsible without Applicant Stack. This also empowers other managers to access files themselves from different states even, so we don't have a bottle neck from only one or two people being able to pull them out. Lately we've really tapped into the ability to email staff documents to sign. For example we sent out a refresher on our basic staff expectations and used the sign document feature so that we knew who was following instructions and it was a learning opportunity for staff who weren't as computer savvy. It was so easy they're less intimidated by the online tasks we give them. I will forward your comments to our development team. Regarding "uniform sizes responses", yes, you can run a report on the answers. Please contact support so we can show you how. Creating a report can be done via drag and drop reporting tools. I love that all applications come to you via email, and you can track all applicants so easily! I used to have to do everything old-school, which uses up so many resources, including paper. I truly feel that by using ApplicantStack, I'm not only saving myself time and energy, but also quite a few trees! I was able to let my old job know about you guys, and they signed up as well. There's really not much to dislike! I would say that you really need to know the exact spelling of a specific candidate if you are doing a search - there have been many times I couldn't find a application because their name was spelled uniquely. Maybe you could do a search by phone number as well? That might help. It truly helps keep candidates organized, which is fantastic! I also have been able to easily find info on old applications. Thank you for writing a review about ApplicantStack. You do have the ability to search on phone number via the advanced search. Please contact support if you need any further assistance. "Applicant stacks keeps your hiring organized" I enjoy the layout where applicants are marked in stages. A common issue with organizing applicants is the way you can sort them in your process. ApplicantStack allows you to keep candidates in different stages and advance them in your process based on where they fall. This is especially important when you have 2nd and 3rd tier candidates that you like, but are not as qualified as other top tier candidates. The stages allow you to label them in your system and then come back to them as you sort through other candidates you have reviewed and removed from your process. I also LOVE the option where you can fair a candidate and schedule the email communication to go out on a future date. This allows me to create the task, but be tactful in communicating with those candidates without failing them immediately after their interview. In addition, when you have multiple raters the feedback option is collaborative and extremely useful. I wouldn't say there is anything I dislike, but I wish the navigation of candidates was a little smoother with pop-ups instead of having to click back on the list. Sometimes I like to do a comparison of candidates and I with it would automatically create a new tab for each candidate I review so I could so a more easy side-by-side comparison. But this is also something I can adapt with my browser settings, so it isn't really an issue. If you have a lot of candidates for different positions and want to keep your work efficient and organized, ApplicantStack is perfect! It's multifaceted and customization. We get a lot of of applicants for our entry level positions and there's a very specific type of candidate we look for in some of our roles. The manager review stage (first stage) allows us to weed through the candidates efficiently and in a very organized manner. Moreover, I really appreciate how it holds me accountable to come back to candidates still in our process. I feel sometimes it's easy to have candidates you don't initially take seriously as potential finalists, but with applicantstack I have to make the cognizant decision to pass or fail them. When you fail a candidate you are respecting their time to communicate appropriately instead of letting some go months before they hear back. I want to point out that we have the previous and next links at the top of the candidate record which makes it easier to navigate through a list of candidates. I will forward your feedback to our development team. ApplicantStack has a very user-friendly interface. Since this is the first employee application system I have ever used, it was a huge relief for me to, after very little time, feel like I was able to navigate the interface with no concern. Also, I love the amount of customization ApplicantStack allows (eg: adjusting the work flow, adding new documents to Onboarding, changing email triggers, etc.). The ability to make adjustments that better suit your company's needs has been a huge benefit for our agency. I cannot recommend ApplicantStack highly enough. I have always had positive experiences with customer support and they always work with us to ensure that our needs are met. ApplicantStack has not only increased our rate of completed applications (through a succinct application that discludes any extraneous questions), but also streamlines the hiring process (through automated email triggers to applicants and references alike). In addition, we recently started utilizing ApplicantStack's Onboarding system for new hire paperwork; I am very happy with this feature! It has saved both applicant's and hiring managers time and has cut back on the amount of paper we go through for each new employee. Good news! You can rearrange the columns on the pipeline summary (dashboard). This will, however, be a system-wide change that will affect all users. If you are okay with that and have administrator access, you can follow these steps (or contact support and we can assist you). Go to Setup -->Configuration-->Application Stages and then from there you can select "Reorder Stages" it is a simple drag and drop and the changes you make will reflect on your pipeline. We are thrilled that you find ApplcaintStack beneficial to your organization. The fact that it has increased your rate of completed applications and streamlined your hiring process has made our day! Thank you!! "Good product - steep price tag" This product is highly flexible. You can build a very custom service out of this software but it is a bit more limited then many other enterprise options. This seems marketed to small organizations rather than enterprise level but the pricing is a bit steep for the limitations. For the $95 we are paying, and I think it has gone up since then, we are limited to only 1 administrator and 5 managers. The 5 managers is plenty but the 1 administrator is very limiting for the price point. Again, it is good software but I feel that price point is a bit high for their market demographic. Take the time to set it up really well at the very beginning. Changing the processes is not difficult but can have unintended consequences on process efficiency. The application and on-boarding process for our organization structure need to be complex. ApplicantStack helps us do these very complex things in a fairly simple way. It also seems to be fairly mature and stable software. The glitches are minimum to none and it works as sold. Thank you for writing a review about ApplicantStack. We pride ourselves in being an affordable solution. Our base plan does include 1 administrator and 5 hiring managers and adding additional users will increase the price. "Overall my experience is a positive one." I like how well the software functions. I have not experienced any issues or glitches. Customer service is quick to respond and assist with anything you need. The only thing that I do not like about this software is it does not create one universal profile for candidates. Instead, the candidates profile is created based on a position. Meaning, this allows for duplicates of the candidates. So, if a candidate applies for multiple positions or has applied in the past, everything is on separate profiles. It will give you an icon by the candidates name notifying you there are duplicates, however you have to click on each individual duplicate to see the candidates history. It would be much more helpful if you could click on the history of the candidate and see all the positions they have applied for, the stage they're at in the hiring process for each position, any notes left from the recruiting team or HR team from past interviews or interactions and all communication with the candidate. This is a great product to help streamline your hiring process. I highly recommend using this above other products! I like having the ability to post multiple job listings to a variety of job boards all at once. Before we started using ApplicantStack, we were having to go in to each Job site and post the adds individually. It has streamlined the process nicely. I wish they could sign with their fingers instead of creating a standard signature. The IP address capture is helpful but for some of my papers I still require a unique signature. Policy acknowledgements, remote hiring paperwork. The benefits to this for onboarding makes us appear professional and allows us to onboard for different states or positions and customize the paperwork for each. Thank you for writing a review about ApplicantStack. I will forward your feedback to our development team. I cannot imagine going back to the days of paper applications. An entire section of my desk was dedicated to apps before making the transition. I saved so much room just by going digital. I also love that we then have a database of people who have applied before, so we don't waste time on people we will never have an interest in hiring. The onboarding side is also worth the investment. We can send onboarding paperwork before orientation to streamline the day. We had so many people call because they could not complete the app online. Once we eliminated the initial app in favor of a single screen of contact information, our completion rate nearly doubled. We still have them fill out the app online, but in our office where we can monitor for issues. I would love to have integration with Office365 for scheduling interviews, but I'm satisfied manually pulling that information over to our main office calendar. Regardless of whether you use ApplicantStack or not, absolutely go paperless. It is so worth the investment! The tech support for us has always been top notch through our franchisor. ApplicantStack really does help keep us organized. The reporting helps us identify where people are in the hiring process and if the process needs to be streamlined somewhere. Stages and notes help anyone in the office take calls and be able to give updates when our recruiter isn't available. As previously stated, I love having a history of people who have applied and having new hire paperwork all digital. It helps set us above our competition. Thank you for taking the time to write a review about ApplicantStack. Please contact support so we can get more information from you about the issue you are experiencing. BTW - we do integrate with Office for scheduling interviews! "Applicant Stack is User Friendly" I like the way that I can take candidates from one stage to the next. I feel that I can save a lot of time and energy by managing the workflow through software and it is far less likely that applications will become lost on my desk. It is really hard to say. I really enjoy applicant stack and use it daily for my recruiting. I have difficulty finding things to dislike about Applicant Stack. I highly recommend Applicant Stack. I have had other human resources jobs in the past where I had to go through many stacks of resumes and applications by hand and then had to manage the entire interview process without any computer assistance. With Applicant Stack, I am able to see where each candidate is in the interview process and can easily sent information to their references. I recommend that people use Applicant Stack for as much of their hiring and onboarding process as possible. I can also access Applicant Stack from any computer. I am able to keep my candidates organized and am able to see how many people are at each stage of the pipeline. I am hoping that as time goes on that I can further utilize Applicant Stack for not only the hiring process, but also the process of onboarding our new hires. One day I would love to have a completely paperless office. Thank you so much for the awesome review about ApplicantStack. We greatly appreciate the feedback. "Great resource for our business" Applicant stack is very user-friendly and intuitive. Our staff loves the ease with which we are able to create and assign forms. Applicant Stack has made our onboarding process much more efficient and effective. We are able to assign our external employees the majority of their onboarding documents before they even come in for new hire orientation. It would be nice to be able to edit the PDF form within applicant stack instead of having to upload the new form and assign form fields each time your form is updated. It would also be great if applicant stack was compatible with other document types than just PDFs (such as Word, Google Docs, etc.). Lastly, if there was to track when annual documents were due for employees within the site, that would be beautiful. Implement ApplicantStack! You won't regret it! It has made our onboarding process so much easier and time efficient. We are spending way less time on in-office orientations and on tracking down documents from employees. We are also using Applicant Stack for our annual document requirements, supervisions, etc. "My favorite ATS out there!" I really like this ATS because it's user friendly and easily to adjust and configure. The team is very supportive and that helps when you have situations that are unique to your industry. I can update things easily and they are always continuing to enhance the features. I just really love using this product! We are going to look into using the onboarding feature as well in the near future. Like I said, they are always adding features! There is really nothing that I do not like about this software, so that makes it a bit difficult to answer this. By implementing ApplicantStack and using it to it's full capacity, we are able to eliminate a lot of administrative burden that would exist without it. From a business perspective, we love the reporting capabilities which allow us to present data to the leaders and utilize that data to identify areas of strength, as well as continue to improve areas in need. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. We are thrilled that you find ApplicantStack user-friendly, easy to use and configure. As you know we take customer feedback and suggestions very seriously. We are continually working to make ApplicantStack even better by adding new features while remaining an affordable solution! We are happy to hear that by using ApplicantStack you and your organization have been able to eliminate a lot of administrative burdens. "ApplicantStack made my job easier in many ways" The best part I would say in Applicant Stack is that a) It has been integrated with job boards and this made easier to source resumes b) can trigger emails to candidates automatically c) Able to set the work flow and follow that easily d) Everything that is needed for recruitment in one system e) Automatically updating candidate details while just uploading resumes or emails f) allocating tasks to other users g) Generating customized reports. Also, many more options which are very much useful. Thanks to ApplicantStack. The only thing I dislike about ApplicantStack is that when we send email to candidates through ApplicantStack, it generates a email id which looks like a junk email ID and the candidates may ignore by seeing the email ID. Before shortlisting ApplicantStack, we have analyzed various other ATS and found that ApplicantStack is cost effective and has all the required features. We are able to get suitable profiles and source candidate with minimal effort, coordinate with candidates easier, track candidates application, status and notes very easily, accessing all the required details any where in the globe as this application is a cloud based, generating reports which ever way we wanted. These are few examples. Overall, we have saved a lot of time using this application and able to use those saved time in our core business process. Thanks for Applicant Stack team for developing such a wonderful application. I will let our development team know about your concerns. If you have any suggestions, please use the support portal for a feature request. Those tickets do go to our development team. It can do a LOT and new features are added regularly. Loving the integrations as well - our company recently integrated a background check service with ApplicantStack. The system is very versatile. Can be a bit more modernized and simplified in terms of interface. I do see some changes in that direction, keep it going! Also, when candidates apply to multiple jobs, there should be an option, when you change their stage, to apply this to the other jobs as well. Sometimes they may be shortlisted for both positions, so instead of manually going in and changing for each job, it would be helpful to change stages for multiple jobs for the same candidate, in a single window. I submitted this feature request through the platform but not sure if it was received because I never heard back. both recruiting and onboarding on a single platform streamlines recruitment. Thank you for taking the time to write a review about ApplicantStack.I will forward your feedback to our development team. I do want to point out that you can select multiple records from the candidate view table and set the candidate stage for multiple records. Please contact support if you need further information. "WOW, couldnt ask for a better tool for a better price!" Applicant Stack is so easy to use, it is customizable, it has huge capabilities! It allows us to recruit seamlessly and onboarding candidates with no problems! There is nothing that we do not like, everything is continually getting updated to make the site easier to use! If we need help it is always one click away. Customer service representatives are very quick to reply, I typically receive responses within an hour and it never takes longer then before the end of the day. Great for companies of all sizes, for large companies that need more high level customization Applicant Stack have an option for you as well! We are managing our recruiting through Applicant Stacks easy to use talent management system. We have found that we can proactively recruit, keep a repository if old positions, keep active lifelines of employees and keep up compliance requirements. Everything is customizable so we have full control over workflows and updating everything to meet our needs. Additionally, the onboarding portal allows us to easily transition employees that have been hired. Again, the system is completely customizable so we can use it to meet our needs. This allows us to use the system the way we want, for our company we actually use the onboarding system for all of our employees, so that they have a place for all their supporting documents and for any new documents that need signatures. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. ApplicantStack has streamlined our hiring process. My desk used to be cluttered with piles of applications. Now it's much easier to see where our applicants are in the pipeline. Tech support is responsive to our needs and is always pleasant. I'm glad we made the change! I'm able to customize the application myself utilizing a minor understanding of coding, but I'm sure some people may need more help from tech support. They have changed the way you adjust settings over the years, which took some getting used to, but nothing we couldn't handle. There's nothing I personally truly dislike about AppStack. Make sure you have someone who is computer savvy if you're using the software. Tech support is great, but your life will be much easier if you have someone on your end with technical ability. We are able to respond to applicants much more quickly and professionally when they call to check in on their app. No more shuffling papers on a coworkers desk to get the right paperwork! I'm also able to see if we recently rejected an applicant and the reason behind that decision instead of wasting time pursuing them again. We also use the onboarding module, which we love. If a new hire doesn't complete their paperwork the day before orientation, we can check in with them to resolve any issues versus the pain of having them show up without any paperwork completed. Thank you for taking the time to write such a thorough review. I am sure others will find this extremely helpful. We are thrilled that using ApplicantStack Recruit and ApplicantStack Onboard has saved you time and resources. Since most of us are former HR professionals so we understand the mounds of paperwork! We wanted to make sure ApplicantStack was exactly what we wished we had. It is a wonderful collaboration tool as you mentioned. I understand your frustration when it comes to modifying the application. Any questionnaire that has a layout template would require more effort to modify. However, any questionnaire that doesn't require a layout template (aka fancy layout) should be very simple to create and modify. We did try to design this to be as easy as possible. We continue to develop more ways to make this as intuitive as possible for everyone. As you mentioned we do have a very responsive support team that is always willing to make any modifications for you. "Perspective from a hiring manager (not a recruiter!)" ApplicantStack lets me easily see the applicants for the role I'm hiring for. It's relatively easy to see their cover letters and resumes, and all interactions between my candidate and recruiter is logged so I can see what their communication and notes are. The UI looks a bit dated, more of a traditional design, not terribly responsive. Also, after I've had more than 20 or 30 applicants, it becomes a pain to sort candidates so I can easily see which ones are new or need a followup. It's all possible but takes too many steps and not intuitively obvious. Evaluate a lot of other options. I definitely don't like the old-looking UI and the lack of responsiveness. Also it doesn't always turn word docs or PDFs into the the clearest images. It's helped me to go through my applicants and quickly reject the ones I want to screen out. Eventually, the screen gets messy and overcrowded, but for the purpose of a applicant tracking tool, I feel it's good enough. Thank you for taking the time out of your busy schedule to write this review about ApplicantStack. It is awesome that you find using ApplicantStack has helped you quickly review and screen candidates. "Wonderful people and an excellent program" My organization utilizes the ability to create a careers site for all our open jobs. Having this ability makes the life of our HR team much easier. We also love the care and attention that we are given when something is wrong or when we have simple questions. There isn't much that we dislike when using this program. For my company, I think not having the ability to measure analytics is difficult but not something that can't be worked around. If you are considering ApplicantStack, I hope you can see that this is going to be one of the best options for your organization. The ability to hire people and onboard them with one platform is amazing and I am so happy I decided to bring my organization into using ApplicantStack. Each part of the ApplicantStack program is well thought out and fit so well with my organization. Having the ability to create workflows has also helped tremendously when creating a seamless applicant experience. Also, we survey our new hires about the application with ApplicantStack and I only hear about how easy and quick it is to use. So far ApplicantStack has been my go-to for Applicant Tracking Systems not just here at my current organization but also at other organizations I've worked for in the past. They are a wonderful company with a great product. Using ApplicantStack gives us the ability to seamlessly find applicants and hire the most qualified. It has done so many great things for my organization. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. Thanks for recognizing the wonderful people! The team works very hard every day and it is really nice to be recognized for that. We are thrilled that our product makes the life of your HR team much easier. Most of ApplicantStack employees were former HR professional so we get it! We are continually working to make ApplicantStack even better and one of the areas we are working on is the reporting feature. If there is ever a report that you or your team require, please contact support and perhaps we can create it for you. Just let us know. "AppStack Makes the Hiring Process a Breeze" I love the ability to give each applicant the same 5-Star treatment. With automated emails and form building, I can painlessly get the hoards on information I need from each candidate while also sending the potential new hires everything they need to know about our company. After the interview process is complete, we use AppStack to gather final information necessary before new hires are scheduled for their first shift. Because we can easily download the files and upload them to our company files, the transition process is seamless. We aim to hire 15 employees every month, and that requires us to screen tens, sometimes hundreds of applicants per month- without AppStack, we'd have to hire 3 extra people! Sometimes, applicants do not meet the requirements for employment, and we invite them to reapply once they do. Unfortunately, we have to manually go in and delete their previous application before they are allowed to submit a new one. The more you put into AppStack, the more it will be a benefit to your company. Having computer saavy people to optimize this for your company is key- anyone can use this platform with ease, but it needs to be set up well. Using applicant stack allows two people in our office to do the work of ten. So much time is saved not chasing down forms and information from incoming employees. We are thrilled that ApplicantStack has made the hiring process a "breeze" for you! Thank you so much for the time you took to write such a thorough review. I am sure this will be extremely beneficial to others looking for an applicant tracking system. We have a property that we can add to your account which will allow candidates to apply multiple times for one position. Please contact support and let us know if you feel that would be helpful to you. It is awesome how you feel ApplicantStack "allows two people in our office to do the work of ten. So much time is saved not chasing down forms and information from incoming employees." The ApplicantStack platform is far and above the best value ATS I've seen. The system is extremely robust and customizable, comparable to some of the bigger name ATS's but very reasonably priced for even the smallest of companies. The system is pretty much ready to use right out of the box, but it's very easy to customize to exactly how your company needs to use it. There's really no limitations on what you can do with the system. We use the Recruit and Onboarding functions, and both are so easy to use and has made our hiring process so much more fluid. The feedback I usually get from new employees is "Wow, that was the easiest onboarding I've ever done at any company!" Really, I don't have anything bad to say. Any issues that come up, the customer service team jumps on extremely quickly. They actually listen to requests for new features or changes to the existing platform. I can't think of a single thing that I've wanted to do in the ATS that ApplicantStack couldn't accomodate, it really has everything we need! No matter the size of your company, ApplicantStack will have a solution for you. I recommend that you do a quick demo, the entire ApplicantStack team seems to be fantastic and they give a great overview of the product. They allow trial periods to let you test out the system, which was fantastic for us. We are a small company (<100 employees) and didn't really have an ATS prior to ApplicantStack. This system has easily let us streamline our applicants and actually be able to track everyone in one easy system on our small budget. AS is a very professional site from an applicant and new employee perspective, and is unbelievably easy to use from a recruiter/administrative standpoint. It has saved our company countless hours of manual processing. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. We are thrilled with your review! "AppStack has definitely made sending out emails much easier" notes on candidates aren't seen by other people who are not under the same 'job' and often this can cause confusion so a candidate that we wouldn't otherwise contact again is contacted, or two people in the company reach out to the same candidate for two different roles because it's not intuitive to check if that person is already being considered for another role. Definitely involve your IT team in the conversation as it will make it 100% more easier to decide if AppStack is right for your organization's needs, and it will make it easier when implementing AppStack to have your IT team back you up. Mass emails. Using global settings for notes, and potentially using AppStack for my own business. We are thrilled that ApplicantStack has made sending out emails much easier and that it has helped with analyzing data. You would need to give the other users access to the jobs in order for them to see the notes. Please contact support if you have any further questions. The best part about using ApplicantStack for applications is that you can review applications online and "work" them without having any paper, easily disburse them to appropriate managers and then move them to the onboarding program when hired and do all new hire paperwork - again, without paper! Simplifies the process and saves time all around! I also appreciate the fact that whether or not I'm in the office I can view and work the applications through our internal process allowing 24/7 capabilities. The AppStack staff is also very responsive to issues and requests. There are some small quirks in the onboarding program (which is still fairly new) when it comes to notifications and receiving too many emails when forms are signed (we have training classes of 3-7 people at a time) and due to the amount of paperwork, my email notifications get black listed and I stop receiving them... but other than that I can't think of any dislikes. If you're still doing paper apps, it's time to switch to AppStack! You won't regret it ... and it's quite affordable as well. Being able to "share" the applications with appropriate and multiple hiring managers. Not having to spend time at the copier getting new hire paperwork packets put together. Again, time saving and paper saving. Thank you for taking the time to write a review about ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. We are thrilled that we eliminated your paperwork and we were able to simplify your process. That is awesome!! Thank you for recognizing the responsiveness of our staff. We work really hard at that and feel that customer service is very important. I am not sure if you already contacted our support team regarding the email notification issue you are describing. If you haven't, I encourage you to do so. We might be able to provide a solution. We like the on-boarding process the best. We used to print out all of the new hire paperwork and sit for an hour plus waiting for everyone to get the paperwork completed. Now we can send it out right away when we know they are going to be hired. And we can electronically sign it too! It has saved us so much time. If I had to say something I dislike it would be the use of reports. They aren't as intuitive as other programs. I do need some of the reports to complete monthly scorecards but I don't always remember where to find them. Really will help keep your HR team organized and more importantly potential candidates will love the ease of use! We are able to solve the turn around time of getting new people hired. They can apply and be hired with in the week. Thank you for taking the time out of your busy schedule to write this review about ApplicantStack. We are thrilled how using ApplicantStack has saved you time in gathering the information you need. I will let our development team know about your concerns. I like the ability for others in the workflow to edit things so that it is a collaborative effort. The ability to customize displays and make action items different for each stage is amazing. There isn't much I dislike about the product. What I do dislike revolved primarily how my company has rolled it out, locking down setting options. In order to make the workflows within ApplicantStack work for my team, I have to ask for permission to do so. it's a valuable workflow tool. The ability to get my boss to review resumes and make them actionable to I can set up interviews in a timely manner. Please let us know what we can do to earn a 5-star rating across all categories. "Made my job easier " Applicant Stack is easy to use, we can do proper reporting, and save candidates for future use. Overall it saves time posting jobs and give us good visibility in the marketplace for our job posts. We no longer have to go site to site to post jobs. In many situations it is free to post. Its been a great addition to HR suite of products and we are glad that we found it. Lack of folders to file candidates i. If we had folders it would be easier to keep the home screen clean . Saved 1000's in recruiter and posting fees. You can "file" your candidates in several ways. You can create "jobs" which are never intended to be launched. You can create several stages to act as folders, and add your candidates to those stages. Please contact support if you need any further assistance. The ability to follow and track an applicant from the initial inquiry through the entire hiring process. ApplicantStack not only sends our job ads out to the most prominent sites, but allows us a stellar tracking process all the way to hire. We also through the robust reporting platform are able to run numbers for inquiries, applicants, hired, etc. This enables us to see where our business weaknesses are in the hiring process and give us the opportunity to strengthen these areas. I can honestly say I haven't found anything that I dislike in the 3.5 years I have been utilizing the service. Definitely keeps us on track through the entire hiring process. We don't let things slip through the cracks. Gives us the ability to connect with the applicants throughout the entire process at critical intervals. It is great to just go to one source to see all the candidate information. Tracking the stages from step to step makes it easy to coordinate who has to do what when inside the office. The customer service has been over the top awesome. So quick and always complete. The workflows have allowed us to streamline our internal processes shortening the time to move a candidate through the process. The templates make sure that the communications going out meet the standards that I want representing me. "ApplicantStack has helped me maximize my time." ApplicantStack has helped me organize, edit, and review applicants in an efficient manner. It allows me to reduce the amount of time I spend seeking information in an applicant's file and as a result helps me to be more effective in my role as an HR Assistant. I wish I could run more specialized reports, i.e. number of applicants who have been processed through each stage at any given time/year, including more specific personal information. I would also like to have easier access to past applicants instead of having to search manually for individuals from a specific year or in a specific position. I have been able to track applicants through hiring stages, schedule interviews, and organize applicant files from an HR perspective. It has helped me to maximize my time and be more efficient in my role. Please contact support regarding the items you described. Creating ad hoc reports with filters will most definitely solve the issues you are describing. Also, you can view all past candidates by changing the filters on the top of the candidate page. You can also get this information via a report. Please contact us, we are here to help! The program is easy to use and makes posting to multiple job boards a breeze. The additional onboarding feature is worth the extra monthly spend to keep all candidates in the same platform and store documents. Uploading any paperwork, interview notes, etc. eliminates boxes of retention files and allows us to review a past candidate if or when they apply again - for any position. My wish would be for a feature to auto renew a job posting, rather than having to manually update. We are solving the problem of paperwork storage and knowing when one person has applied multiple times over the years - the system connects them together based on emails used. We work with an average of 1800 applicants a year through the system. It is key that we are organized and consistent. Please contact support, there might be something we can do to refresh your evergreen jobs. "Excellent product for Human Resource onboarding" We moved our onboarding for new hires to ApplicantStack early in 2017 and have been absolutely thrilled. The time savings and added organization for employee files is tremendous. Everyone is asking now why we waited so long to make this move. Setting up the forms was simple and any questions we had were answered quickly and professionally. I give ApplicantStack my highest endorsement. We have not found anything to dislike about this product. Before ApplicantStack, all of our new hire paperwork was scanned and emailed to the HR department. We were not as reliable about keeping track of forms that were missing or not fully completed. Now, we are totally organized and much more efficient. I am sure that the annual fee we spend per year is saved in HR labor that is freed up. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. We are thrilled by your incredible endorsement and happy to hear that you have so many positive things to say about ApplicantStack. "A Job Search's Best Friend" ApplicantStack is easy to operate and very straightforward in usability. The simple interface allows the user to quickly scan new, current, and old applicants and allows them to be set in various stages. These stages can be set to the user's personal or business needs depending on the job. It also makes it very easy to contact the candidates that have applied. The login is company specific, so you are not able to just login from the main website. You must login via your company's specified login link, which can pose a problem to employees that lose that information. ApplicantStack allows for multiple inputs from various job search websites and combines them in one easy to utilize space. We are cutting down on time finding employees and having to search through a multitude of websites. You can login from our main web page. The top right has a link to login. Ease of use, the ability to delegate hiring managers. The capacity to create knock-out questions. The workflow capabilities are outstanding. This product was a game changer for our HR team. The IT team search for products that were affordable, easy to use, and scalable. ApplicantStack did all three. This solution does exactly what we need. I had wished that there was a training site, but with the help videos, that has been a value-add. We have been able to streamline our hiring and recruiting process. Prior to IT coming up with this solutions, resumes were emailed to HR, and they would forward potential candidates to hiring managers. Now, with the ability to add hiring managers directly into the system they can quickly review candidates, freeing up HR to focus on other tasks. We do offer training and weekly webinars aside from the Help Center articles and videos. Please contact our support team for more information. "Very happy with Applicant Stack!" I like the tracking of the applicant and the fact that we can now send new hire forms directly to the applicant via app stack. Having to change status to hired in order for paperwork to be sent out and then have to go back and change to conditional job offer for it to link with Clear Care. Love the updates we get and when there is an issue, Jeff is always quick to respond. Allowing new hire forms to be sent out and completed by applicant prior to hire. Huge time saver for us! We greatly appreciate the time you took to write this review about ApplicantStack. The integration to Clearcare happens when a candidate is moved to Conditional Job Offer. This was the way that Home Instead designed it so we don’t have a way to change it. We can make candidates move to your Onboarding account at any stage you would like though. Feel free to contact Jeff to make the change. With the ability to set stages, it helps to keep the process in mind at a glance, and to know what is next on the agenda to completely process applicants who may be come employees. I have not really found a dislike at this point in my usage. Get well versed in all the options, so it can give you the best possible support you need for HR functions. The emails help me to know when someone is new, and the ability to immediately move them into a category for later viewing really helps out. "Great customer service, user friendly" There are technical issues every so often but the staff is always very responsive. I have had some issues lately that I could not get an answer about. That was a bit frustrating. Organization of applications, moving them through stages of hire, online application. The online application was a game changer as far as amount of applications received and less time spent on paper files. We also now use the Onboarding feature, which makes orientation go more smoothly and allows us to collect electronic signatures. Please let us know what we can do to earn a 5-star rating. "Applicant Stack helps keep me and my team organized" I am able to keep myself and my team organized. It's perfect for a new business that is not large, but large enough to need a system to keep them organized. As a new small business, I am always looking for inexpensive ways to manage my clients, teams, and keep organized, as well as compete with the big dogs, without letting everyone know that I am a smaller organization. I have not found anything that I dislike yet. I can see all of my candidates and their information in one look, as well as their status. This helps keep me organized and cuts hours out of my day. It also allows me to be able to see what my team members are doing, without being on top of them. I like how easily Applicant Stack integrates with our ClearCare system and how I can track where the applicant is in the hiring process. It is pretty user friendly. I wish the reports were easier to navigate. I can't seem to get all the information I am looking for in to one report. It would also be nice if there were a way to integrate applicants that we do not hire into the ClearCare system without setting the stage to "conditional job offer". We receive a large volume of applicants and ApplicantStack helps me to stay organized. I can enter notes and track who I have talked to, who I haven't talked to yet, why people weren't hired and what stage they are at in the application process. "Affordable and Works As Advertised!" Posting to multiple job boards and tracking candidates all in the same place. It took me a little while to get comfortable with the system - but the help and support articles/videos were useful. Try it at least for the free trial period to post a job or two -- It may not as flashy as some of the newer platforms, but they clearly understand what needs to be done to support a strong talent acquisition process. I don't have time to chase down good candidates - ApplicantStack made it so I could focus on my business while resumes showed up in my inbox. Thank you Jeff for taking the time to write a review about ApplicantStack. We appreciate the feedback. "Wonderful solution to hiring and onboarding" ApplicantStack is a wonderful tool for hiring. The ability to create different job postings and have them post to multiple sites makes posting jobs so easy. I can make separate post for separate criteria and they all get pushed to multiple career sites. Not a lot to dislike. I wish I could seamlessly integrate into our other software that we use for caregiver management, but it is not a big deal at the moment. ApplicantStack can make hiring, interviewing, assessing, and onboarding your applicants a breeze. The support team is wonderful and will help you with anything that you need. ApplicantStack helps us to get the candidates we need for the jobs we have and allows us to streamline all of the processes we have. We appreciate your thorough review of ApplicantStack. I am sure this will be beneficial to others looking for an applicant tracking system. It is awesome how you feel ApplicantStack is a wonderful solution for you! We do offer an api for integration. Please contact support for more information or to add a feature request. AS has great customer service, and it is generally very easy to learn. You can track a lot of applicants at once, and I appreciate that they charge based on users and not on number of applicants. I would like to see a little more functionality with regards to automated contact - Having templates for emails,etc.. is nice, but I'd like to be able to engage the system to automatically email folks without my input. Try it out! It works great for us. Payment model is a huge plus. We have certainly been able to solve a lot of recruiting issues - Lack of applications, organizing applicants, and the like. Being able to glance at resumes and work through hundreds of people in a day is nice. Thank you for writing a review about ApplicantStack. You can set up auto emails for stage changes. Please contact support if you need any further assistance. "Great for setting up hiring process" I like the views are easy to use & its easy to push candidates through the process.I really like the filtering options. The resume formatting sometimes shows up poorly depending on how the candidate uploaded their resume so I have to download the resumes to see the "real" format. Take the time to set up your templates and responses correctly to save you time in the long run. Also take the time to use the "Questions" for each job posting. It really allows you to get quick answers to evaluate a candidate. We need to streamline hiring and get more consistent results. This also centralizes our hiring process so we can all follow along with the candidates as they go through the process. I like the way you can taylor questions for specific jobs. This assists with the screening tremendously and it keeps each job application from looking exactly the same. When there are multiple jobs posted, coming off as "canned" is very easy to do. This helps negate that. I dislike the way you have to transition from recruiting to onboarding. I would be more user friendly if one could see everything they needed in one place. Toggling back and forth wastes time, and time wasted is $. I like the way it scores the applicants for you so that you know before you have to call or go through an interview whether or not an applicant possesses the skills needed for the job they applied too. The simplicity of the program. I really enjoy the lay out and being able to find things easily. The system is very well laid out so that organizing resumes its easy to work with. The search option is a bit slow at times, and it would also be helpful if you were able to search partial names . Applicant stack is very user friendly and the organization that is offered is fantastic. The reports that are able to be run are used for all kinds of other company information that is helpful on all levels. Affirmative Action reporting is a huge problem we are able to solve with the help from applicantstack. The reports are very helpful for the information that is requested from HR. Boolean search, reporting, documentation, sharing profiles, tracking sources and very easy to use. Managers seeing resumes before I had a chance to review. The external and internal UI looks great and easy to use. Boolean search is very important to Recruiters. Sharing resumes with hiring managers is easy. Reporting tools are easy. You pay for what you need so it can be an affordable solution for smaller companies. I have used Taleo, BrassRing and Workday and I find ApplicantStack much more user friendly. If company is approaching 100 employees, using an ATS is important for your EEO reporting. Reporting and pulling customizing the data is great. The metrics of days open, days to fill is helpful. EEOE reporting is very important. Any administrator of the account can setup access to the candidates at each stage. You might need to change your settings so that you have access to review the candidates before the managers see them. Please contact support if you have any questions or need more information. "Easy to Use, Very Affordable, and AWESOME customer service!!" The software itself is great, very flexible and customizable, and easy to use. It packs a punch with minimal cost to our HR budget. My favorite thing about ApplicantStack is their customer service. If I ever need a change done to a template, they are answering me back within minutes.. seriously. And when they answer back they have usually already taken care of my request. I've never had that experience with any other software. We have looked at a lot of ATS systems....most are VERY expensive, and ApplicantStack, hands down, was the winner! I don't really dislike anything. It works great! I would recommend checking out all options.. we did, and always came back to ApplicantStack. We love that we can have all applicants apply in one place. If we post outside of ApplicantStack, say Craigslist, it is very easy to insert the hyperlink to the job listing on ApplicantStack. We no longer have applicants coming in from everywhere. Thank you so much for taking the time to write this amazing review. We are beyond thrilled that you are happy with ApplicantStack and value our support team. Customer support is such an important feature in any product and we want to make sure that ALL of our customers are happy and that we respond to requests in a timely manner. After all, that is what we want when dealing with any customer service or support team. Thank you again for writing this review, we greatly appreciate it. * We monitor all ApplicantStack reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.
2019-04-25T12:32:10Z
https://www.g2.com/products/applicantstack/reviews
Welcome to the January 2019 edition of Views from the Crowsnest. Long-term financial prosperity pre-supposes survival of short-term crises. Survivors are guided by brutally-honest practicality versus high-minded theories and prognostications. People who obsess over appearing impressive rarely are (e.g. cable news), whereas those who focus on being effective usually succeed. Therefore, I will concentrate on practical solutions to a couple key challenges that we see from up here in the Crowsnest. Do what works – and nothing else. In this issue: 1) easing the burden for those charged with handling the financial affairs of deceased and/or incapacitated family & friends, and 2) allowing the Canadian energy industry to prosper while keeping Confederation intact. Fortunately, the world is full of smart, dedicated, conscientious and industrious people of good will. It’s our job to find, harness and direct the best in their respective fields to optimize Client outcomes. Leveraging technology positively is the common thread in our solutions. Do what works – and nothing else. 1) In 2019, we’ll be introducing a service to our Clients which will significantly decrease the stress, time and complexity associated with the management and wind-down of an Estate. This will include helping our Clients to minimize the burden left for their offspring, as well as other family members. Anything substantive we can do to reduce preventable stress for our Clients is a priority for IWM. This will be an additional service in our overall wealth management offering, with zero additional cost to Clients. We’ll roll it out no later than this summer, starting with our retired Client Families. Technology is the key. 2) How can we allow the Canadian energy industry to prosper while keeping Canadian Confederation intact? This is THE question emerging from the current Canadian energy industry crisis. Make no mistake; this is a national crisis that just happens to be headquartered in Alberta. The financial consequences for all investors could be disastrous, not to mention the future political stability and peacefulness of our very nation. The fancy people in the mainstream media are downplaying the rising voices of Western Separatism, and it really annoys me. While we fully expect that from our state-owned broadcaster, the self-appointed leaders of popular opinion are (ironically) completely detached from popular opinion in Alberta. Is this a deliberate choice by owners of The Globe & Mail, Post Media and the Toronto Star? After all, they have to “earn” their piece of the new $595 million slush fund offered by the federal Liberals to help in their October 2019 re-election bid. The longer the mainstream dismisses or ignores this reality, the worse the situation becomes. Meanwhile, back in the real world many serious people are talking more openly and sincerely about how badly Alberta is treated within Canada, and what must change in order for Alberta to remain. For the 35 years since the National Energy Program hatched by the smarter Trudeau, Albertans have quietly muttered about how Quebec is treated “more equally” than any other province. Fortunately, we’ve had our time filled with things like work. When economic times are good, everyone is “fat and happy,” busily enjoying the fruits (and carbs!) of their labor. Not anymore. The anger is palpable, the rhetoric is rising, and the financial facts are pretty damning. Albertans’ collective frustration is legitimate and understandable. For the sake of crystal clarity, I am NOT a Western Separatist. I am a very passionate and frustrated patriot. I exist – quite literally – because of Canadian bravery, resilience and pure grit during World War 2. My parents recounted the elation they – and all of Holland – experienced as CANADIAN TROOPS liberated their starving, bombed-out country. Being the 8th born of immigrants whose homeland is largely below sea level, I’m a hard-core pragmatist. Thanks to Jim Dines, I also understand the power of mass psychology; in this case the rising popularity of the desire of many Albertans to self-determine, rather than being treated as the goose that lays the golden egg…and which the political and media elites look down upon as an embarrassment that leaves unwanted treasures on their yachts. Canada’s golden goose – the fossil fuel industry – has a major image problem. The industry hasn’t fought back early (or strongly) enough against the decades-long “de-marketing” and disinformation campaign waged by the radical environmental activists – funded largely by US donors. Canada’s energy industry is full of ethical, educated, innovative and industrious people…but they forgot to watch their own backs. Vivian Krause will shed more light on this on March 16, 2019. Now the industry has awakened to how much abuse it has taken, and how deliberate the process of land-locking Alberta oil has been. Anger PLUS feelings of righteous indignation combine into a very powerful – and dangerous – force. We need to collectively inform, direct and harness this energy in a positive way…or there’s REAL trouble on the horizon. We need calm, mature and principled leadership to get us through this; but we currently have Justin Trudeau. Integrated Wealth Management is stepping up to do its part: a) I’ve already initiated discussions with our Portfolio Managers on defensive measures that need to be in place should this situation escalate, b) I will be travelling to Ottawa in February to participate in a planned rally in support of the Canadian energy industry. We need to bring this problem in front of the Ontario and Quebec media, and c) we’ve scheduled a special event for March 16, 2019 to specifically address this issue. Tickets will be free for our Clients, and we’ll also offer a discount PROMO code for our clients to share with their family and friends. We’ll have full registration functions up and going on our website shortly. Capacity for this venue is around 600, so we recommend registering when we send out the first invitation. We’re also making excellent progress in the development our long-term project: a long-short pool combining the expertise, systems and insights of some key professionals. We’ll be ready when the last remaining analytical tool becomes available, hopefully very soon. In the meantime, North American equity markets appear to have bottomed since Boxing Day. It’s been an ugly year-end in global equity indices (particularly on Canada), and we’re very grateful that our Portfolio Managers have done an admirable job of buffering client accounts from the worst of the damage. We’ve taken some bruises, but nothing close to catastrophic. Mission accomplished on surviving this recent mini-crisis. Long term financial prosperity can now be pursued. And just today, it appears that there MAY be some positive movement in the US-China tariff battle. I don’t want to read too much into this just yet, but this headline from the BBC suggests that China’s leadership MAY have just blinked in the negotiation process. I’ve openly criticized Trump’s use of tariffs (a tax on consumers to temporarily save some jobs in key states), and I sincerely hope that he pulls a rabbit out of the hat here. I will gladly “eat that hat,” speaking figuratively, of course. IF Trump somehow manages to pry open China’s domestic markets for wider American competition – which no one else has ever managed to do – he will have pulled off the greatest economic victory of the last 50 years. Goodness knows there’s been more than enough chaos and hysteria around his administration…it would be nice if a second unambiguously positive policy could emerge from the White House. Tax reform was the first. Patience and Discipline are accretive to your wealth, health and happiness – so focus on these. Welcome to this special edition of Views from the Crowsnest on November 21, 2018. The quote above is the first two lines of Rudyard Kipling’s classic poem, “If.” It fits today, in ways both obvious and subtle. In these moments, our higher-order executive functions become more important than ever. Rarely are we in the midst of historic events with a conscious awareness of their significance. Today is one of those rare occasions when we witness the collision of trends and forces so obviously converging; cinematic in their scope, with life-changing consequences for those directly in their paths. We knew it would eventually come to this; it had to. And then there are the ripple effects on the rest of us. Exact outcomes are still unknown, but the meta-trends make the overall path inevitable, unchangeable and necessary, by force of nature. Such is the nature of recurring cycles, in politics, economics and markets. This is the just and necessary consequence of all the decisions that have led us to this moment. I refer specifically to the challenging equity market machinations since September, but more broadly to the tectonic events unfolding in and around Europe. The cradle of western civilization is bringing us timeless lessons of the immutable laws of nature: physics, power, populism, psychology, economics, envy, manipulation of the many by the few, and the eventual awakening of those charged with decision-making authority. And the uncovering of secrets long kept through convention, personal utility, and fear. As if “magically,” Martin Armstrong’s Economic Confidence Model (ECM) once again targeted today (2018.89) as a key date in the future of our institutions and the societies over which various levels of influence and control are exercised. Today is a rare “Pi Day” ,served up for all to witness and ponder. As Marty likes to say, “There’s order within chaos,” but we need to transcend the noise to understand the true big picture before responding to the noise and distraction on the ground. The imminent release of the Socrates Trader-Pro Level will be warmly welcomed when it happens. Having attended the World Economic Conference 2018 in Orlando – my 4th – followed by a couple days of coastal relaxation and celebration, today we witness major events unfolding with Italy and the EU, the UK and its inept attempts at breaking away from the EU, and what will be a resumption of the most hated bull market in stocks ever…literally by force of nature. Human history is a rhythmic poem describing the desire for liberty offset by the need for structure. Jordan Peterson describes this as the battle between Chaos and Order. Sometimes the weight of too much order becomes unbearable. Sometimes an unbalanced economic relationship reaches it inevitable end. Think Italy and Brexit. These tectonic, structural changes lead to fear, uncertainty and doubt around the world. When market makers, traders and high-ranking decision makers get caught up in the drama and tension of the immediate situation (i.e. they LOSE their heads), we all feel the impact via declines like those which have recently buffeted our financial portfolios. This is temporary, not permanent. We know because we have the gifts of perspective from those whose systems and experience have washed away (fear-based) emotional REACTION, and given way to wise and prudent RESPONSE. What does it all man? Capital flees risk and seeks opportunity. The bigger the systemic risks (Europe), the more violent – and unsettling – the temporary dislocations are, even as capital arrives on safer shores (U.S.). We are all more closely wired than ever before. The downside is a loss of true connection, but that’s a story for another day. When we look back, we know that market panics pass rather quickly despite being so very painful when we’re swirling in their midst. This too shall pass. Thanks to wise counsel and humble recognition of those who know something we don’t, we remain steadfast in our view that this – the longest and most hated (ever) Bull Market in stocks, especially in the U.S. – remains intact. There is major support not far below current levels. Even if we test these support levels, the tests will be temporary. Our Portfolio Managers hold some cash for buying bargains, non-correlated debt instruments for diversification and stability, and great companies trading at (or slightly below) their intrinsic values. They remain calm, focused and patient…ready to act decisively when fear is highest and risk therefore lowest. To our Clients Families we suggest adding to your portfolio if you have cash available for longer term horizons; essentially be an Opportunist. Otherwise, do nothing right now because it would be financially self-destructive; impulsive moves now are giving into fear which turns us into Victims. We have your back. We are keeping our heads. I recommend reading the entire text from Kipling by clicking here. Welcome to the November 2018 edition of Views from the Crowsnest. Despite less than six weeks elapsing since the last edition, a tremendous amount has happened. Markets, politics, and economics have dominated our various screens. The civility of public discourse has reached new lows, equity markets appear to have established some interim lows, and the noise from the US mid-term elections have reached 150% of tolerable levels. Thank goodness tomorrow is Election Day. Perhaps we can return to some level of normalcy, or am I too optimistic? Just before every major election, the hysteria reaches deafening levels, and this undoubtedly unsettles those involved in capital markets. While the US economy remains in juggernaut mode, broader US stock valuations were a little stretched – and some sectors, especially big tech, were very optimistically priced. Canadian stocks were much more reasonably valued prior to the mid-October volatility, yet still declined with US indices. Capital is flowing out of Canada, at least as it relates to major investments in our resource sector, thanks to our exalted political leaders. That’s not a political statement; it’s a summary of current reality. Pullbacks within uptrends always challenge our fears. As we climb the proverbial wall of worry, stumbles and setbacks are inevitable; they’re also necessary and downright helpful for patient and disciplined investors. Though unsettling, declines like the one we recently experienced allow our portfolio managers to buy back into full positions they had previously trimmed during strength. Sometimes entirely different and better upside opportunities arise, and pullbacks/corrections provide the cover for our calm portfolio managers to buy these companies from panicked sellers. It’s all about temperament. While we certainly didn’t plan it this way, the timing of our Straight Talk for Retirement Success workshops was serendipitous. The theme was how to bullet-proof your retirement plan in advance of the next financial crisis, and still generate solid returns in the interim. I focused on a series of very specific strategies that help to generate incremental positive returns AND reduce downside market volatility, as well as how to create a contingency plan in advance of the next financial crisis. It was all about how to avoid being the bug on the windshield yet again. These workshops were very well-attended, and based on numerous requests from our newsletter readers and the MoneyTalks audience, we decided to record the last session here in Calgary. You can Click here to watch the recording for free. I encourage you to download/print the self-assessment form and to realistically assess your current strategies versus those I speak to in the workshop. If you’d like to request a confidential review of your current portfolio and retirement plan, simply reply to this email. You’re also welcome to forward this note onto others who may have been asking you what you’re doing to protect and grow your portfolio. We know that many people are unsettled by the current environment and are looking for practical and realistic solutions, so perhaps our workshop might be helpful for them? Speaking of unsettling, the current hyper-partisan screeching around the US mid-term elections is almost over. Thank goodness. Will the “Blue Wave” of Democratic dominance actually manifest itself? Earlier in the year, those on the Left were chortling about taking back control of both Houses of Congress. Not much mention of anything positive they might do with that power, curiously enough. They’re sounding much less confident in recent weeks, though. Today it appears much more likely that the Republicans will hold – perhaps build – their slim Senate majority, and the Democrats look poised to tip the balance in their favour in the House of Representatives. If memory serves me correctly, the Democrats need to pick up 23 more Congressional seats to gain control. This is really only ever about control, i.e. power. It’s the same for both sides. Many of these “toss-up” seats are within the “normal margin of error” for pre-election polling, so who knows? And who really knows what the true margin of error is for polls anymore? Does the obvious social stigma of voting for Trump (being smeared as racist, misogynist, homophobe, Islama-phobe, bigoted redneck, white nationalist, transphobe, etc.) cause some people to conceal their voting intentions from pollsters? The 2016 election of Donald Trump surprised all the mainstream pollsters, and stunned the mainstream media pundits on election night. Did social stigma contribute to the polls being dead wrong? The pain of losing an election that was supposedly easily won was on full display in the weeks afterward. And apparently these are still open wounds for those on the “Loud Left” as evidenced by their vitriol. Losing power when you were already making plans must have been devastating. In my September newsletter, I mused about whether or not the Democrats had overplayed their hand with the accusations of then-Supreme Court nominee Brett Kavanagh. It felt like a carefully planned last-minute bombshell to both derail the confirmation process itself and to also gain the upper hand in tomorrow’s mid-terms. They failed on the first objective. Jim Dines famously said, “Over-efforting creates countervailing forces,” and that’s what it felt like to me. No one is ever right 100% of the time and only time will tell if my intuition was accurate on this subject. We’ll know shortly. Whatever the electoral outcomes are, my deepest hope is that we can get back to reasonable conversations about important subjects that require actual solutions. I know that many politicians would rather perpetuate the problems (as galvanizing issues) than find and implement effective solutions. If there are no problems left to solve, then how to attract votes? The current discourse is socially toxic and has become quite literally deadly. Real leadership on this matter is necessary to re-stabilize volatile America. Leadership from everyone involved. I’m looking forward to attending my fourth World Economic Conference in Orlando. Martin Armstrong’s insights and his computer’s unbiased analysis will be very helpful in the volatile times ahead. Hopefully we’ll also hear some good news in respect of the full Socrates system getting launched. Everyone’s patience has been tested by the delays, and it would be nice to be able to move forward. Patience and Discipline are accretive to your wealth, health and happiness; so focus on these. Founder of Integrated Wealth Management Inc. In this issue: adapting to today’s faster pace, Trump, Trudeau, voices of reason, keeping our eye on the financial ball, Socrates update, and Straight Talk for Retirement Success workshops. Trigger warning: this newsletter contains sharp criticisms and politically incorrect opinion. The truth hurts when it ought to. Adapting to today’s frenzied pace is challenging, lest we also become frenetic. The gap since my last full Views from the Crowsnest newsletter is the longest ever, as I’ve struggled with finding a balance. The inputs have been almost all positive (presenting workshops in 5 cities, improving nutrition & exercise habits, a little R & R, welcoming numerous new clients to our firm, walking my eldest daughter down the aisle, preparing for our fall workshops, etc.) but there’s been little time left to cobble together this missive. I’ve also been struggling mightily with how to select, filter, decipher and integrate the “outrage tsunami” that is today’s news cycle. The vitriol in today’s media is profoundly disheartening, especially if you welcome vigorous and intellectually-honest debate of important issues. I’m deeply disturbed that the Left has degraded to the point where the typical response to an argument or person they find “problematic” is yelling, smearing, lying, de-platforming, and Twitter-mobbing. And some on the right go down there, too. What ever happened to dismantling an erroneous argument with facts? This You Tube video is a great summary of why so many “classical liberals” have left the Left in favour of being part of the reasonable conservative center. Dennis Prager does an excellent job of distinguishing between the Left and liberals in this short video. As someone with a lot to say about current events, one of the “outlets” I’ve adopted is posting frequently on LinkedIn, as well as starting a Facebook page for IWM. We’ll see how long it takes for me to get banned by Mark Zuckerberg for posting real news stories. I don’t wear gloves for these platforms, and take incredible pleasure in relentlessly pointing out the absurdity of the mainstream media narrative and their favored characters. I invite you to find and connect with us and FOLLOW me on LinkedIn (Andrew Ruhland) and Facebook (Integrated Wealth Management). Twitter is too fast-paced, mean-spirited and left-leaning for me to even bother. Bare knuckle fighting is one thing, but fighting fairly isn’t the culture of Twitter… they’re more brass knuckles, bike locks and garrottes. I wonder how quickly Twitter would crumble if Trump found an alternative? Perhaps Peter Thiel might consider building a platform to rival Twitter, YouTube and Facebook? Speaking of Trump, since everyone is doing so ALL THE TIME, he has become THE obsession of the Left. When people ask me if I’m pro-Trump or anti-Trump, my answer is “yes.” I hate false choices. Let’s face it, Trump does and says many VERY stupid things. Chief amongst the stupid things is his tariffs and trade war baiting. Politicians always think of tariffs in terms of jobs saved or created while ignoring the cost for consumers; after all, tariffs are collected by governments and paid for by consumers through higher prices. This is clearly Trump throwing red meat to blue collar voters in the rust belt swing states (Pennsylvania, Ohio, Michigan, and Wisconsin). Imposing tariffs is one campaign promise that Trump should NOT have followed through on. Trump also does and says some VERY smart things, though every media outlet left of Fox News refuses to admit anything positive. Trump is “such an idiot” that he has managed to reduce the Unemployment Rate (3.9%) below their GDP Growth Rate (4%). With “idiots” like this in the White House, who needs fancy geniuses peddling ineffective policies? Could Obama maybe coach Trump on how to charismatically deliver an extremely well-written epic speech? I suggest you read it and think of someone else delivering it eloquently and skillfully. Trump is really a centrist with blue-collar populist appeal, and the mainstream media hates the fact that he dominates almost every news cycle, so they have to talk about him…which makes them hate Trump even more. It’s kind of pathetic, actually. And it’s endlessly funny, but dangerous. Trump dominates the center on most matters, and CNN – which used to be only slightly left-of-center – continues to crumble; MSNBC is picking up former CNN viewers who want a hard-core leftist filter on everything, and Fox News is growing faster than MSNBC. They ALL have their biases, and what irritates me is that you have to invest additional time to hear both sides of any particular issue and try to piece together a fact-based conclusion. Given that roughly 70% of people get most of their news from Facebook, public perceptions are being aggressively pushed FAR left. Starting at age 6 all the way through Graduate Studies, students are being taught that socialism is good, that gender is a “social construct,” and your group identity is the most important thing about any person, we have “Trouble in River City.” This short video is excellent! I’ve long been fascinated by the outrage culture of mainstream media and about 18 months ago started devoting some of my personal learning time to understanding this phenomenon. I’ve explored the works of many credible commentators, pundits, academics and philosophers. Here’s the Executive Summary: the tendency for those on the left – personality wise – is to be more expressive about their political views (conservatives tend toward practicality), to experience a much wider range of feelings (emotional lability) versus those on the right; and to prioritize group identity over individuality, whereas those on the right prioritize personal responsibility and the sovereignty of the individual. When conservatives see unequal treatment they want to stop it; those on the left wasn’t to reverse unequal treatment, which is the basis of their obsession with identity politics. Those on the Left also tend to be easier to “trigger,” which I candidly admit is extremely fun to watch; it’s a hell of a lot funnier than almost every “comedian” out there. Trump does this every single time he Tweets. For those with time, this video is an excellent explanation. Meanwhile, back here in Canada, we are seeing the catastrophic results of our electoral choices. “Rachel-come-lately” Notley and her merry band of adolescent socialists have worsened Alberta and Saskatchewan’s economic reality. They didn’t cause the plummeting oil prices that precipitated our current situation, but they’ve managed to make it MUCH worse by several orders of magnitude. They’ve hired massive numbers of provincial employees to shore up their union support…exceptionally stupid fiscal policy when Alberta is hurting so badly. Only recently has the Premier’s office started acting like leaders who support those who fund government-delivered services. Prior to the UCP formation with the media-savvy Jason Kenney at the helm, the NDP bad-mouthed our core industry, demonized those who dare to disagree, and passively aided and abetted the B.C. enviro-radicals and their political pawns “running” the federal government. The NDP’s desperation is now on full display as they launch attacks on Kenney and the UCP related to all things “LGBTQIA…” Hopefully, Kenney is wise enough to NOT get baited by the Left on this one. The CBC cannot feature enough stories painting the UCP as homophobic, sexist, racist, transphobic, etc. This brings us to Justin Trudeau. Argghh! Let me pause, catch my breath and distill what I think of him into a few words: embarrassing, narcissistic, intellectually shallow, immature, completely out of touch with reality, brainwashed (identity politics and socialism), and yet extremely “well managed” by his closest handlers, Gerald Butts primarily. Justin Trudeau makes me look back fondly on the bumbling Jean Chretien. At least we had Paul Martin running Finance. For more revelations on Mr. Trudeau, please add me to your LinkedIn network (and FOLLOW me) or join our Facebook page. And then share our posts liberally, NOT Liberally. Trudeau has the CBC, Global, CTV, the Globe & Mail and the Toronto Star on his side…let’s get social media working for clear-headed governance! Our Peter Pan Prime Minister and his team have awakened to the fact that they’ve mismanaged every portfolio under their control. In a curious but shrewd pivot, it looks like they’ve decided to wage their next campaign against Donald Trump, since so many Canadians hate Trump – and not many people know who Andrew Scheer is anyway…literally. All of this acerbic pre-amble is actually relevant to your financial wellbeing, so hopefully you’re still reading. I don’t care if you hate Trump and love Trudeau, Notley and John “Horrible Horgan.” The fact is that you can ignore economics as much as you like, but economics won’t ignore you. The reality is that Trump’s fiscal and economic policies have strengthened the already stable US economy and their equity markets reflect that. Canada has terribly misguided political leadership and our country is living with the consequences of our leadership. Europe is in turmoil from Brexit (or not) and facing the very real possibility of the end of the European (utopian) project: Italy, Hungary, Sweden, Czech Republic and Poland are all extremely unhappy with being forced to accept Merkel’s open borders policies. I’ll take the economic and geo-political substance of the inarticulate, bumbling and unfiltered Donald Trump over the clowns we have in power in Alberta, B.C. and Ottawa…8 days out of 7. My primary near-term concerns are based on trade wars and the US mid-term elections, with the media in full-blown hysteria over anything and anyone that Trump has done or recommended. Have the Democrats leaned too far over their skis, thus awakening the Republican voters who could stop the flip of the House and Senate to the Democrats? Only time will tell. Our job is to keep our eyes on the “financial ball” amidst all the chaos. And to be logical, patient, disciplined, wise, prudent and effective. We’re staying focused on what’s working and avoiding what’s not. It’s boring an effective. We bring order within the chaos, and we’re extremely good at it. I’d venture to say we’re radically competent; not perfect, but radically competent. And I’m much nicer in person, or at least I should be. So, what exactly are you doing to protect your family’s nest egg from catastrophic loss in the next financial crisis (whenever that happens) and to grow your portfolio in the interim? It’s best to prepare well in advance…kind of like building a solid structure to store the annual harvest from the coming winter. I love teaching workshops, so I’m thrilled to get back in front of classrooms of great savers, business owners and professionals over age 50 in Calgary, Red Deer and Edmonton. We’re calling these workshops “Straight Talk for Retirement Success.” Through this newsletter, we’re giving all our subscribers an opportunity for early registration for these free 2-hour workshops BEFORE my next interview with Mike Campbell on Saturday Sept 29th starting between 9:52 and 9:55 am on Money Talks. Click here for more information and to register. Oh yes, and we’re still waiting for the release of Socrates from Armstrong Economics. We’re ready at our end, and I’ll share more details during our upcoming workshops. These are the voices of reasons that keep me sane: my wife, Martin Armstrong, Michael Campbell, Jordan Peterson, Jonathan Haidt, Dave Rubin, Dennis Prager, Thomas Sowell, Larry Elder, Christina Hoff-Somers, Heather MacDonald, Douglas Murray, Bill Whittle, Rex Murphy, Lorne Gunter, Anthony Furey, Candice Malcolm, Mark Milke, Joe Warmington, Laurie Goldstein, Tucker Carlson, Newshub Nation, and Brian Lilley. My guilty pleasures: Andrew Klavan, Ben Shapiro, Steven Crowder, Paul Joseph Watson, and Mark Steyn. Patience and Discipline are accretive to your wealth, health and happiness so focus on these. At the request of Money Talks, we’ve created a very thorough summary that tells you how to deal with the pending Defined Benefit Pension Crisis. Please click here to request your copy of this important article. Humans are hard-wired for connection, and as such our very nature pre-disposes us to investment failure, because most people want to be part of the “In” crowd. That’s quite a mouthful, and an ominous one at that. Our current U.S. equity market environment provides object lessons in both mass psychology and discipline. As I write on the morning of March 2nd it’s noteworthy that yesterday saw $8.2 billion go into SPY, the largest ETF on the S&P 500. That’s the biggest single daily inflow since December 2014 and the second largest in six years. Contrast that with recent reports from major institutional investment houses that state they’re either not increasing equity exposure, or they’re planning to actively decrease equity exposure in portfolios. Since every trade has a buyer and a seller, there was also $8.2 billion worth of trades yesterday wherein “someone” is getting out. The only possible conclusion one can arrive at is that Institutional Investors are selling their positions to Retail Investors. Market tops are often referred to as those times when investments transfer from strong hands (Institutional, “Smart Money” investors) back to weak hands (Retail, Dumb Money” investors), and that’s what this smells like. So, are you more comfortable investing with the masses – “hard-wired for connection with the crowd” – or are you content being a patient and disciplined contrarian whose investing behavior mimics or follows the smart, patient and behaviours of Institutional Investors? This is the object lesson in mass psychology: are you part of the “smart” money or the “dumb” money? The stronger the mass opinion that “everything is positive and rosy,” the more likely we’re close to an interim top…one can almost smell the desperation of the recent buyers whose Fear of Missing Out (FOMO) has over-taken their Fear of Loss of Capital (FLOC), or perhaps their bias against Donald Trump. As Michael Campbell and others has recently warned, mixing your political opinions with your investment decisions is a recipe for disaster. While I don’t believe this is a major market top that starts a major meltdown, history shows that buying frenzies like we saw on Wednesday March 1st usually immediately precede pull-backs. Only time will tell if history is once again our best guide…but that’s where our Clients’ (and my family’s) money is positioned. It’s boring, and relentlessly effective. If we get a dip in markets, remaining cash will get deployed, so we’d be completely okay with a sharp little pullback. It would be the pause that refreshes “The Bull”, whose lot in life is to always slowly climb the wall of worry created by the masses. This begs a second important question for readers: do you have a clearly articulated Investment Policy Statement (IPS) that defines the framework for your portfolio? Is your minimum and maximum exposure to cash, fixed income, stocks, precious metals and alternatives clearly laid out as a guide for investment decisions? If you don’t have an IPS, why don’t you? If you do have an IPS, is it being followed by your investment professional or you – if you’re self-managing? This is the object lesson in Discipline…are you following a smart framework? Click here to to download the presentation. Welcome to the February 2017 edition of Views from the Crowsnest. It’s been quite some time since I donned my winter gear, climbed the mast to spend time drinking in the panoramic view from high above the water’s surface, and then had the quiet space required reflect and distill my observations. Thanks for your patience. We each have our own unique sensitivity to current events, but the last six to eight months has felt eerily similar to the financial crisis of 2008-9 – energetically. Obviously, we’ve not had a market crash like 8 years ago, but the U.S. has definitely undergone, and continues to experience a very intense crisis driven by the sudden disruption of their political status quo. Love him or hate him, The Donald is the Molotov cocktail Americans were warned about. Things really are upside down when Michael Moore nails the story. Thank goodness we have the leadership of entertainment industry elites to show us the way toward peaceful, reasoned and solution-oriented dialogue. Where would we be without their hasty, awkward, angry and ignorant rhetoric? I think my sharp tongue just pierced my cheek…who else can I blame for my own actions? Shall I virtue-signal some more so I can win a medal in the “Oppression Olympics” and then give it away to someone I deem to be more deserving…or should I do something constructive and useful? Since Mr. Trump is the President for the time being, my hope – as previously expressed – is that he follows through on some of his biggest campaign promises, and moderates the most controversial and extreme ones. Personally, I am very supportive of tax cuts (corporate and personal), term limits for Congressional Members, and School Choice driven by parents. All are controversial to someone in some way, but they’re all necessary to creating meaningful positive change. School Choice is bad for the teachers’ unions and the Democratic Party but offers genuine hope for inner city families yearning to break the cycle of violence and poverty. No one is above criticism, especially those who volunteer for political office. My sincere hope is that the White House slows down and does a more mature, thorough and professional job as it moves forward. Tactically, why rush things and issue sloppy and incomplete Executive Orders? Haste makes waste. Oh, how the status quo has started to shake at its core. Canada will have its turn, too, after France, The Netherlands, Germany, Italy, Poland and Hungary…with yet another “Greece fire” ready to trigger the alarms in the crowded theatre. The dark horse of populism gutted out an amazing “kick” in the final stretch of the Brexit vote, and has excellent financial support and tactical coaching for future races. In my opinion, the success of populism depends on its various leaders’ ability to distance themselves from the genuinely dark elements on the fringes of their support base. This is the best political ad I have ever seen…it resonates elegantly and powerfully with the spirit of the age, in an obvious attempt to focus on the positive messages connected to LePen’s cause. Recent riots in France are serving to amplify this message…over-efforting creates countervailing forces. Long-time readers are unsurprised by these events. Martin Armstrong’s Economic Confidence Model (ECM) has obviously been correct yet again: we’ve passed the peak of confidence in government. The non-stop hysteria around all things “Trumpian” is a formidable distraction for anyone focused on becoming or remaining financially independent. The negative energy of our public discourse is causing widespread battle fatigue and stress, and (almost) nobody makes optimal decisions under high stress. Most of us have our “fight, flight or freeze” instincts triggered…very similar to investor responses during the 2008-9 financial crisis, except that more investors appear to be more influenced by their Fear of Missing Out (FOMO) than Fear of Loss of Capital. This observation inspired an article and a workshop. Last weekend, my colleague Randy Balkenstein and I participated in Michael Campbell’s World Outlook Financial Conference, with excellent attendance at our “Intelligently Investing Lump Sums” workshops. You can view a condensed video of this workshop by clicking here. One of the “diamonds” uncovered in this media-driven war on free speech is – for me – the very calm, respectful and articulate Dave Rubin . This self-described “progressive liberal” recently discovered that his love of personal liberty forced him to re-think his political allegiances. My hope is that more people like him will emerge; we need people like him to lower the intensity and raise the intelligence of public discourse on political issues. The two videos linked in bold above are well worth the time investment. One of the most challenging elements of writing and editing material for any audience – especially for a discerning audience with a rapidly shrinking attention span – is being disciplined and humble enough to say only what is absolutely necessary. This practical constraint is a yoke upon all who step into the public forum, and frustrating for those who crave nuance and subtlety – audience and presenter alike. This modern reality is clearly juxtaposed to what we do…which requires time. Our professional expertise -and passion – is the collaborative creation, real-time implementation and ongoing management of our independent-minded Clients’ wealth management plans. In part, this requires us to listen and think both fast and slow, to reflect and distill the core principals driving our Clients’ decision-making (their Life Goals™) and to work in partnership with Clients in their quest to become and remain financially independent. It also requires us to constantly filter and discard endless streams of trivial information, so we’re left with actionable wisdom. In an effort to bridge the chasm between communicating both fast and slow, we’ve made the decision to begin the process of mapping, creating and producing a series of videos shorts on both time-sensitive and timeless topics related to comprehensive holistic wealth management. We look forward to sharing more on this project as we progress. And we’re edging ever closer to the launch of our Socrates-based investment platforms. We have tentatively scheduled a webinar for Saturday March 25th at 11:15 am (Mountain Time) to explain more on how our Portfolio Managers will utilize Martin Armstrong’s system. We will have limited space available for this event, and you can reserve your participation by simply replying to this email with your name and other contact information. Selecting a new wealth management firm for your investment accounts can be stressful. Following are some very specific questions you should ask of any new advisor you are considering hiring. The advisor should be able to answer these questions without advance notice. You might want to copy and paste these questions into your own document for reference purposes. How many client families do you currently serve? What’s the maximum number of client families you will work with? How many people do you have in your team? What’s your business’s succession plan? If we become clients, how often would we meet in person, conference call, etc.? What are your professional designations and experience? Where do most of your new clients come from? Referrals from related bank branches, referrals from clients, content-based marketing? How are you paid? Commissions, hourly fee, or fee-based? If commissions, how much (%) and how long does that keep me in those investments? If fee-based, what are your fees and how do they scale down as the size of our portfolio grows or we bring over new money? What are your minimum investment amounts for a new client family? What specific attributes of your advisory business differentiate you from competitors? How exactly do these differences benefit me? Please be specific. Are you free to share your own original ideas or research, or those from independent research sources? How would your friends and clients describe you re: being more of a mainstream thinker and advisor, versus being an independent thinker and innovator? Are you familiar with Martin Armstrong? Please share your views on his work, etc. What are your views on the safety and investment potential of long term govt. bonds? How are my accounts protected from theft or fraud? Does your firm have investment banking operations (aka corporate financing relationships) with any public securities issuers? If yes, please explain exactly how we are protected from conflicts of interest created by these investment banking relationships. Are any of these securities issuers represented in any of your portfolios? Does your firm have proprietary investment platforms like mutual funds or separately managed accounts? If yes, what % of your clients’ investments are in these proprietary investment choices? If over 10-15%, why such a high %? Are there any incentives (financial, recognition, educational) for recommending proprietary investments? Do you own shares of the company? If yes, how does this affect your objectivity in respect of your firm’s proprietary investment offerings? What pressures do you have from branch or senior managers in respect of your average revenue per client? Given the low interest rate environment, what specific strategies and investments do your managers use to increase yield in the non-equity portion of our portfolio, without taking on unnecessary capital risk? Do your managers typically hold more than 40 stocks in their core equity portfolios? How free are your managers to make significant adjustments to country, asset class and sector allocations in order to take protect and grow our capital…or are they restricted in terms of the changes they can make? How do your managers deal with risk and reward in the currency markets? Do your managers actively use option overlay strategies in your equity portfolios? What are the risk management parameters in place on the securities your managers select, or is it more buy and hold? Can you please provide a summary of your clients’ investment performance? How much flexibility is there for your portfolio managers to make higher allocations to high growth sectors such as precious metals, energy, technology, etc.? Do your Portfolio Managers use independent research sources, or only those from the firm’s research department? Are your Portfolio Managers familiar with Martin Armstrong’s Socrates/ECM™ system? Are they both willing and able to incorporate Socrates™ into how they manage my portfolio? How often do you (the advisor) communicate directly with the people who make the day to day investment decisions for our portfolio? Can I speak directly with the portfolio manager? If yes, how often? Given that wealth creation and preservation is firstly about avoiding wealth destruction, how exactly will you protect our nest-egg from catastrophic losses whenever the next major financial crisis starts to unfold? Are they willing and able to fully “de-risk” our portfolio when necessary? We look forward to participating in the upcoming 2017 World Outlook Financial Conference, including presenting information-packed Personal Finance Workshops. We hope to see you there. Last week I attended the Institutional and Technical Analysis sessions at Martin Armstrong’s World Economic Conference in balmy Orlando, along with the Chief Investment Officer of one of our discretionary Portfolio Managers from Toronto. This trip was the most recent step of my 22 year project of bringing Marty’s precision models into how our Clients’ money is managed. Our team is looking forward to hearing Marty again at Michael Campbell’s upcoming World Outlook Financial Conference, as well as sharing our insights with attendees during the Personal Finance Workshops.
2019-04-18T18:56:46Z
https://integratedwealthmanagement.ca/blog-news/
An index for official Tabletop RPG adaptations of existing intellectual properties, as well as for fanmade ones that have their own pages. Compare The Board Game and Licensed Game (for video games and pinball). Contrast The Anime of the Game for TRPGs adapted to anime. Amber Diceless Roleplaying, based on The Chronicles of Amber. A simplified version of the 2nd Edition was also published as Batman Role-Playing Game. Discworld Role-Playing Game, based on the Discworld novels. Planet Mercenary set in the world of Schlock Mercenary and written as an in-universe marketing tool of the eponymous arms retailer. Pokéthulhu, a Cthulhu Mythos / Pokemon crossover game. Street Fighter The Storytelling Game, from White Wolf based on Street Fighter, mostly Street Fighter II. Teenage Mutant Ninja Turtles & Other Strangeness, based on the Teenage Mutant Ninja Turtles. The One Ring — a version adapted for use with the 5th edition of Dungeons & Dragons called Adventures in Middle-earth was also published. Warcraft: The Roleplaying Game, based on the Warcraft franchise. Wrath And Glory, by Ulysses Spiele. Warriors Adventure Game, based on the Warrior Cats books. Witch Girls Adventures, based on Witch Girls, Witch Girls Tales and Princess Lucinda comic series. The Yellow King Roleplaying Game has the players coming against the reality-altering horror of the play from The King in Yellow. Armored Trooper VOTOMS: The Role-Playing Game published on R. Talsorian based on Armored Trooper VOTOMS using the Fuzion system. R. Talsorian Games released an official Bubblegum Crisis Role-Playing Game, which stands out because it included a full "episode guide" for both the original OAVs and the "Crash" continuation, as well as providing a large number of stats to items that could be considered "Expanded Universe"—a large number of sketches and notes that the creators had done but had fallen under "What Could Have Been". Dragon Ball Z The Anime Adventure Game based on Dragon Ball Z released by R. Talsorian. The defunct Canadian RPG company Guardians of Order released various licensed anime Role-Playing Games for their Tri-Stat and Big Eyes, Small Mouth RPG system. By the time the company had closed, they had made RPGs for: Demon City Shinjuku, Dominion Tank Police, Dual! Parallel Trouble Adventure, El-Hazard, Hellsing, Revolutionary Girl Utena, Sailor Moon, Serial Experiments Lain, Slayers (interestingly, they released it both in "Tri-Stat" and d20, but the latter was not a worldbook for the d20 version of Big Eyes Small Mouth, instead being a fully independent game), Tenchi Muyo! and Trigun. All of these games included a lot of additional information of their respective shows, including an up-to-date episode guide up until the time the books were released. Log Horizon has it's own RPG that goes by LHTRPG with the character Seine , from one of the sessions, making it into the anime as a Canon Immigrant. Neon Genesis Evangelion RPG: The NERV White Paper is an RPG for Neon Genesis Evangelion that was officially licensed by GAINAX, available only in Japan. It is interesting because of various details, like having an official map of Tokyo-3 meant for the wargame-style mecha-combat rules within, for having canon information hard to find elsewhere, and the fact that the sample adventure packed within the game includes a canon-ish example of the typical "Evangelion Pilot from another NERV Branch that arrives to Japan" character (that precludes Rebuild's Mari Makinami) in NPC Maria Vincennes. Project A-ko: The Roleplaying Game based on Project A-ko was the first RPG to use Dream Pod 9's Silhouette system. Palladium Books published RPGs based on Robotech, Macross II and Robotech: The Shadow Chronicles using their Megaversal system. The Japanese Standard RPG System developed by FarEast Amusement Research has been used for RPGs based on Full Metal Panic!, Kaze no Stigma, Magician's Academy and Trinity X Venus. Paizo published the The World of Vampire Hunter D supplement for the Pathfinder roleplaying game as one of the Kickstarter stretch goals for the Vampire Hunter D: Message from Mars campaign. The setting of Crystalicum was later used for an RPG of the same name. GURPS 4th edition has Mars Attacks which is based on the Topps cards of the same name rather then the film based on the cards. There are number of supplements detailing Magic: The Gathering settings for Dungeons & Dragons since they are both published by Wizards of the Coast. To tie in with the release of The Art of Magic: The Gathering books, Wizards of the Coast released a series of PDFs called Plane Shift that detail the various planes for use with 5th Edition D&D. D&D Guildmasters' Guide to Ravnica is a supplement book about the plane of Ravnica as a setting for 5th Edition. The humorous RPG parody Munchkin had d20 System books based on it published by Steve Jackson Games. A supplement was also published for Toon. Sentinel Comics: The Roleplaying Game, based on the Sentinels of the Multiverse superhero game. Warlords of the Accordlands published by Alderac Entertainment Group based on their Warlord game. Albedo: Erma Felna EDF has Albedo the Roleplaying Game self-published in 1988 by Steve Gallacci with Paul Kidd writing, and Albedo: Platinum Catalyst by Sanguine Publications in 2004. Artesia: Adventures in the Known World, a Fuzion game based on Artesia. Atomic Robo: The Roleplaying Game published by Evil Hat Productions using the FATE system. The Authority Role-Playing Game and Sourcebook published by Guardians of Order based on the The Authority with stats for d20 and a 2d12 variant of the Tri-Stat system used in Silver Age Sentinels. Big Bang Comics Role-Playing Game published by Pisces All Media in 2006 based on the Big Bang Comics series using a modified version of the d20 System. Blacksad Juego de rol published by Nosolorol Ediciones based on Blacksad. After the lackluster response to Buck Rogers XXVC, TSR had another go with High Adventure Cliffhangers Buck Rogers Adventure Game that was closer to the original Buck Rogers setting. Burning Empires based on Iron Empires using the Burning Wheel system. Cadillacs and Dinosaurs published by Game Designers Workshop based on Xenozoic Tales using rules based on Twilight: 2000. Chi-Chian: The Roleplaying Game based on the on the Chi Chian comic books and animated web series. DC Universe Roleplaying Game published by West End Games using the simplified version of the D6 system called the Legend system. The third edition of Mutants & Masterminds first saw the light of day as DC Adventures, which provided official stats for many DC characters and information on the DC Universe up until shortly before Flashpoint. The DNAgents Sourcebook supplement adapts The DNAgents for Villains & Vigilantes. Elfquest: The Official Role Playing Game, published by Chaosium based on Elfquest comics using their Basic Role-Playing system. Fanhunter has Fanhunter, el juego de rol épicodecadente (Spanish for Fanhunter, the epic decadent role-playing game) and it's spin-offs. The Savage World of Flash Gordon is a roleplaying game released by Pinnacle Entertainment in 2018 that uses the Savage Worlds system. Hellboy Sourcebook and Roleplaying Game, a GURPS lite game based on the early Hellboy comics. Il gioco di ruolo di Dylan Dog published by DAS Productions based on Dylan Dog. Judge Dredd: The Role-Playing Game, published by Games Workshop in The '80s with rules similar to Warhammer Fantasy Roleplay. Mongoose Publishing released two editions of The Judge Dredd Roleplaying Game, the first one using the d20 System (used on Third Edition of Dungeons & Dragons) and the second one using its own version of the Traveller system before losing the license. Judge Dredd & The Worlds of 2000 AD Tabletop Adventure Game by EN Publishing based on the Whats Old Is New system with expansions for other 2000 AD series. Luther Arkwright has Luther Arkwright: Roleplaying Across the Parallels published by Aeon Games using the Mythras RPG system. Marvel Heroic Roleplaying published by Margaret Weis Productions using their Cortex Plus system. The Metabarons Roleplaying Game published by West End Games based on the Metabarons Universe. Mighty Tiny: Tales from the Old Empire the RPG published by Battlefield Press based on Mighty Tiny. Mouse Guard Roleplaying Game which uses a modified version of the Burning Wheel system. Nathan Never Cyberpunk is an Italian exclusive supplement for Cyberpunk 2020 that adapts the Nathan Never series. Ninja High School has launched an official roleplaying game, with art by and co-written by creator Ben Dunn. Available in D6 and Savage Worlds game systems. The Nocturnals: A Midnight Companion supplement adapts Dan Brereton's Nocturnals for Mutants & Masterminds 1st Edition. Pinnacle Entertainment has adapted Fear Agent, The Goon and The Sixth Gun for Savage Worlds. Praedor has Praedor: Roolipeli Jaconian seikkailijoista (Praedor: The Role-Playing Game of the Adventurers of Jaconia) published by Burger Games. Prince Valiant: The Story-Telling Game was Chaosium's second Arthurian based RPG after Pendragon. TSR published an adventure based on Red Sonja for Dungeons & Dragons called Red Sonja Unconquered. Green Ronin Publishing's The Red Star RPG, which used the d20 Modern system and had extensive information on the Red Star universe that had not appeared on the comic, plus original art by the writer/artist (and creative consultant, hence the expanded universe information), Christian Gossett. Sláine: The Roleplaying Game of Celtic Heroes created by Mongoose Publishing based on Sláine using the d20 System and a later version using rules based on RuneQuest. SnarfQuest RPG Worldbook by Elmore Productions Inc adapts SnarfQuest for the d20 System. Starblazer Adventures and it's sequel, Legends of Anglerre are FATE based games published by Cubicle 7 based on the British anthology Starblazer. Yet another Mongoose Traveller campaign setting was based on Strontium Dog. Usagi Yojimbo has Usagi Yojimbo Roleplaying Game by Gold Rush Games, using the Instant Fuzion game system and Usagi Yojimbo: Role-Playing Game by Sanguine Publications, using a variant of the Cardinal system used in Ironclaw. Valiant Universe: The Roleplaying Game published by Catalyst Game Labs based on the Valiant Entertainment comics lines. World of Lazarus published by Green Ronin based on Lazarus for the Modern Age system. The World of Tank Girl published by West End Games based on Tank Girl using the Masterbook system. 2001: A Space Odyssey and 2010: The Year We Make Contact were adapted as adventures by TSR for their Star Frontiers game. Aliens Adventure Game from Leading Edge Games is based mostly on Aliens. As it was released before Alien³, the game has several differences from canon like the organisation of the the Colonial Marines and Xenomorph biology. While not officially licensed, Xenomorphs: The Fall of Somerset Landing for Whats Old Is New is based on the setting. Army of Darkness got a Unisystem RPG. Bram Stoker's Dracula Role Playing Game was produced by Leading Edge Games to tie in with the release of Bram Stoker's Dracula. Margaret Weis Productions' Demon Hunters Role Playing Game is a Cortex System game based on Dead Gentlemen Productions' Demon Hunters and Demon Hunters: Dead Camper Lake films. Ghostbusters: A Frightfully Cheerful Roleplaying Game, based on Ghostbusters, was the first pen-and-paper RPG to use dice pools. Ghost Dog: The Way of the Samurai had a Tri-Stat RPG and Resource Book published by Guardians of Order in 2001. The Adventures of Indiana Jones Role-Playing Game by TSR. West End Games published The World of Indiana Jones using the Masterbook system and Indiana Jones Adventures using the D6 system with later supplements having stats for use with both games. Of all movies that could have a licensed RPG, Iron Sky got an RPG fully funded on Kickstarter in 2017 with plans to release it through Modiphius Entertainment in 2018. Mayfair Games adapted The Keep into an adventure for their Role Aids series of books for Dungeons & Dragons. The Lawnmower Man Virtual Reality Role Playing Game published by Leading Edge Games based on The Lawnmower Man. The Princess Bride got an official RPG fully funded through Kickstarter in 2018 with plans for printing late in the year. Serenity Role-Playing Game, based on Serenity. As an interesting note, the company (Margaret Weis Productions) had only the rights to Serenity (meaning that the events of the Firefly series could only be talked about in very Broad Strokes terms within the book proper), yet nevertheless it obtained high acclaim while it was in production. The "second edition" of this game was made using the Firefly rights proper (which, ironically, means that the events of Serenity are the ones getting the Broad Strokes treatment). A now-out-of-print Fate Accelerated RPG by Dancing Lights Press, Santa Claus Conquers the Martians: The Roleplaying Game. The premise of the campaign setting was that, in some Alternate Universe, a producer exploited the film's fame as a So Bad, It's Good B-Movie to successfully pitch an attempt at In-Universe Recycled: The Series, and we got a full breakdown of the Expanded Universe born of that. Mongoose Publishing released the official Starship Troopers Roleplaying Game, using the d20 System that was employed on the Third Edition of Dungeons & Dragons. Interestingly, the game was an official Patchwork Fic, using the Starship Troopers cartoon as a baseline and grabbing from the film and original novel liberally for additional details (for example, the version of the Mobile Infantry that appears on the movie was designated as "Light Infantry" in the game and justified as people going accelerated training in order to bolster the Mobile Infantry's numbers for the Klendathu assault—the book's "Cap Infantry" then becomes the power-armored soldiers from the cartoon, who could specialize in heavier power armor (the book's "metal gorillas", represented by the cartoon's Mini-Mecha and two heavier power armor variants that were added later on). Trancers Role Playing Game, based on the Trancers films. The Willow Sourcebook contains information for a AD&D style game in the universe of Willow. Ralph Bakshi's Wizards had a RPG published by Whit Publications in the 90s. The World of Species published by West End Games based on the first Species film using the Masterbook system. Advanced Fighting Fantasy based on the Fighting Fantasy series using a simple system based on the rules used in the original books. Lone Wolf: The Roleplaying Game by Mongoose Publishing using the OGL system. Lone Wolf Multiplayer Game Book by Mongoose Publishing using a custom system inspired by the rules from the original books. Adventures in Wonderland: A Sourcebook for OGL Roleplaying Games by Skirmisher Publishing, LLC adapts the works of Lewis Carroll, including Alice's Adventures in Wonderland, Through the Looking-Glass and some of his poems. Multisim Editions' Agone (published in English as Agone: an Epic Roleplaying Game in the Twilight Realms) is based on Les Chroniques des Crépusculaires fantasy novel trilogy by Mathieu Gaborit. They also published Abyme based on the books of the same name set in the same universe which could be used as supplement or standalone RPG. Baker Street: Roleplaying in the World of Sherlock Holmes is set after Sherlock Holmes and Moriarty took their joint tumble over the Reichenbach Falls in "The Final Problem". Players take on the roles of investigators who are asked by Dr. Watson to solve the cases that continue to come to Baker Street during Holmes's absence. Shades of Vengeances published Battlcruiser Alamo RPG using the Era d10 system based on Richard Tongue’s Battlecruiser Alamo series of novels. The Beneath Two Suns adventure module from the Mayfair Games Role Aids series of books for Dungeons & Dragons is set in the world of the Dray Prescott series. The Black Company had a campaign setting book using the d20 System published by Green Ronin Publishing as part of their Mythic Vistas line. Camp Myth: The RPG is a Kickstarter funded RPG based on Camp Myth by Chris Lewis Carter using a modified version of Third Eye Games' Pip System, called "Mythic Pips". TSR created a line of licensed Conan adventures for AD&D in 1984 that only lasted for two books, Conan Unchained! and Conan Against Darkness!. Conan Role-Playing Game was published by TSR in 1985 using rules based on the FASERIP system used in Marvel Super Heroes. GURPS Conan for the roleplaying system was produced by Steve Jackson Games using the 3rd edition of GURPS in 1989. Conan: The Roleplaying Game, by Mongoose Publishing using a custom adaptation of the d20 System in 2004. Conan: Adventures in an Age Undreamed Of by Modiphius Entertainment using the 2d20 system in 2017. It also includes elements from other Robert E. Howard works including Kull, Solomon Kane, Bran Mak Morn and the Cthulhu Mythos - while Howard did not create the mythos, he was significant contributor. While there were some crossovers between these works in the original stories there is much more in this game. Cyberpunk 2020 had two official "Alternate Universe" campaign books: one for Hardwired co-written by Walter Jon Williams, the other for the Marîd Audran series by George Alec Effinger. Hardwired was also acknowledged to be a huge inspiration of the original setting by creator Mike Pondsmith. Darksword Adventures is written from an In-Universe perspective of The Darksword Trilogy as a child's game called "Phantasia" that has been adapted to teach royal students about their world. Fast Forward Entertainment published R.A. Salvatore's Demon Wars Campaign Setting for the d20 System in 2003. DemonWars: Reformation was funded through Kickstarter with its own custom system and released in 2014. The Deryni Adventure Game based on Deryni published by Grey Ghost Games using the FUDGE rules. Warren C. Norwood's Double Spiral War has been adapted by Battefield Press, Inc. for Savage Worlds and Mongoose Traveller. Dragon Brigade: The Affair of the Orb Adventure is a self-contained adventure by Margaret for the Cortex Plus system based on the novella "The Affair at the Orb" by Chris Pierson, which is set in the world of Aeronne from the Dragon Brigade novels by Margaret Weis and Robert Krammes. Eric Flint's 1632 Resource Guide and Role Playing Game is an Action! system RPG based on the 1632 book series. El Juego de Rol del Capitán Alatriste (Captain Alatriste Roleplaying Game) based on the Spanish Alatriste series of swashbuckling novels. Green Ronin Publishing were hired to release an official RPG of The Expanse using a modification of their "Fantasy AGE" system. The Extraordinary Adventures of Baron Munchausen is a competitvie storytelling game based on the Baron Munchausen stories with players taking turns playing as 18th Century nobles boasting about their extraordinary and unlikely adventures in an attempt to tell the best story. The other players can offer tokens to ask questions that can change or derail the story the player is telling, echoing the absurdist nature of the stories of Baron Munchausen. TSR published Lankhmar – City of Adventure along with supplements and adventures for the first and second editions of Advanced Dungeons & Dragons. TSR also published a boxed set called Fritz Leiber's Lankhmar: The New Adventures of Fafhrd and Gray Mouser that could be used as a supplement for AD&D or a standalone RPG using a simplified version of AD&D rules. Lankhmar: City of Thieves published by Pinnacle Entertainment Group for Savage Worlds. Goodman Games funded DCC Lankhmar through Kickstarter as part of their Dungeon Crawl Classics line. The Gaean Reach setting of the Jack Vance books has been adapted as The Gaean Reach by Pelgrane Press using the Gumshoe system. The Gaterunner, based on the Gatecrash novel. 3rd Edition has a number of setting supplements based on literary works, including: Spider Robinson's Callahan's Crosstime Saloon, Robert E. Howard's Conan, Robert Adams' Horseclans, Alan Dean Foster's Humanx Commonwealth, E. E. “Doc” Smith's Lensman, Gene Wolfe's The Book of the New Sun, L. Sprague de Camp's Planet Krishna, Jack Vance's Planet of Adventure, Philip José Farmer's Riverworld, Baroness Emmuska Orczy's The Scarlet Pimpernel, David Brin's Uplift, David Gerrold's The War Against the Chtorr, George R. R. Martin's Wild Cards, and Andre Norton's Witch World. 4th edition has Lois McMaster Bujold's Vorkosigan Saga. The Hammer's Slammers official RPG was released by Mongoose Publishing, using their version of the Traveller system. James Bond 007 (1983), based on the James Bond novels and movies. Tactical Studies Rules' Warriors of Mars: The Warfare of Barsoom in Miniature is a miniatures wargame rather then RPG but it also had rules for individual adventures. Legal threats from Burroughs estate meant that it saw only one printing. John Carter, Warlord of Mars was published by Heritage Models, Inc in 1978 for use with their line of miniatures. Red Planet written by the blogger 'Clovis Cithog' and published by Abbadon, Inc. Skirmisher Publishing created the Edgar Rice Burroughs’ Mars: Shadows of a Dying World for use with the OGL system. John Carter of Mars - Adventures on The Dying World of Barsoom by Modiphius using a streamlined version of the 2d20 system called the Momentum system. The Laundry, an officially licensed RPG based on The Laundry Files. The Legacy of Zorro by Gold Rush Games based on Zorro. Monkey The Roleplaying Game published by D101 Games based on Journey to the West. The Original Flatland Role Playing Game was originally created by Marcus Rowland as an extra on the Forgotten Futures CD-ROM in 1998 and later relaunched as a stand-alone PDF with additional material in 2006 with profits from the sales going to the Doctors Without Borders charity. Midnight at the Well of Souls Role-Playing System published by TAG Industries in 1985 based on the Well World novels. The Powder Mage Roleplaying Game based on The Powder Mage Trilogy using the Savage Worlds system was funded through Kickstarter. Punktown: A Setting Book for Call of Cthulhu and Basic Roleplaying is a Kickstarter funded supplement that adapts Jeffrey Thomas' Punktown. Ron Fortier's Cape Noire RPG based on the Cape Noire books and comic books written by Ron Fortier. EN Publishing created a adventure path based on Santiago: A Myth of the Far Future for Pathfinder and 4th edition AD&D. Solomon Kane has The Savage World of Solomon Kane published by Pinnacle Entertainment for Savage Worlds. The Shotguns And Sorcery series has been adapted for the D6xD6 and Cypher systems. A Game of Thrones, designed to be usable with d20 System and the Tri-Stat dX system by Guardians of Order. A Song of Ice and Fire Roleplaying by Green Ronin which uses a custom system. STALKER - The SciFi Roleplaying Game, based on Roadside Picnic, which is also the inspiration for the S.T.A.L.K.E.R. series of games. Chaosium published Stormbringer (the fourth edition was called Elric) based on The Elric Saga using their Basic Role-Playing system. They also published a BRP game based on the Hawkmoon books which also part of the Eternal Champion setting. Chaosium also published a version of the RPG using the d20 System called Dragon Lords of Melniboné. Tales of Gor: Gorean Roleplaying, a game based on Gor by Postmortem Studios. Terran Trade Authority has The Terran Trade Authority Roleplaying Game created by Morrigan Press using the Omni System and Terran Trade Authority: The Proxima War by Battlefield Press, Inc. for Savage Worlds. Thieves' World Complete Sanctuary Adventure Pack is a boxed set published by Chaosium in the 80s that is compatible with AD&D, Adventures In Fantasy, Chivalry And Sorcery, Dragon Quest, D&D, The Fantasy Trip, RuneQuest, Traveller, and Tunnels & Trolls. FASA also published a series of adventures based on the setting during the same time period. Green Ronin published their a d20 adaptation in the 2000s. Trail of Cthulhu, the Cthulhu Mythos investigation using the Gumshoe system. Treasure at the Dalles: A Changeverse Adventure from Final Sword Productions for the D6 Epic system is based on the Emberverse. Tremulus is a Powered by the Apocalypse adaptation of the Cthulhu Mythos. Ravendesk Games funded a RPG based on Vurt through Kickstarter using the Cypher System. Wearing the Cape: The Roleplaying Game, a FATE game based on Wearing the Cape. The Wheel of Time d20, published by Wizards of the Coast, contained extensive information on the Wheel of Time setting as a whole. Wild Cards has been adapted as supplements for GURPS 3rd edition and Mutants & Masterminds 2nd edition. The Witcher Role-Playing Game from R. Talsorian Games is the second RPG based on The Witcher. The World of Necroscope published by West End Games based on the Necroscope books using the Masterbook system. Wraeththu: From Enchantment to Fulfilment is notorious in the roleplaying community, combining the worst aspects of the books with broken rules, it regularly manages to make the lists of the worst RPGs. The Babylon Project published by Chameleon Eclectic Entertainment. Mongoose Publishing's RPG, first and second edition using the d20 System and short-lived "third edition" using Mongoose's own version of the Traveller system. Blake's 7 Role-Playing Game published by Horizon, the Blake’s 7 fan club, based on Blake's 7. Buffy The Vampire Slayer Roleplaying Game for the Unisystem, based on Buffy the Vampire Slayer. The same company also released a roleplaying game for Angel. Dallas: The Television Role-Playing Game published by Simulations Publications, Inc which you play as characters from Dallas. Firefly Role-Playing Game, based on Firefly. See above for notes regarding its unique copyright situation. Smallville, interestingly, this one had its system severely tweaked to focus more on inter-player (and player character-and-NPC) social interaction than actual action. West End Games published Hercules & Xena Roleplaying Game based on Hercules: The Legendary Journeys and it's Spin-Off Xena: Warrior Princess using the Legend system variant of the D6 System. Farscape Roleplaying Game published by Alderac Entertainment Group based on Farscape using the d20 System. Jeremiah: The Roleplaying Game published by Mongoose Publishing based on Jeremiah using the d20 System. Cubicle 7 published Primeval based on the first three seasons of the Primeval and Primeval Evolution based on seasons 4 and 5. GURPS 3rd edition has a supplement based on The Prisoner (1967). Heritage Models' Star Trek: Adventure Gaming in the Final Frontier using 25mm lead miniatures. Enterprise - Role Play Game in Star Trek, a Japanese RPG published by Tsukuda Hobby alongside their tabletop strategy games. Prime Directive that is based on the setting of Star Fleet Battles strategy tabletop game which differs from the core setting due to licensing issues and the nature of the game. Prime Directive started out with its own system, but was later adapted for use with GURPS, d20 System and d20 Modern systems. Decipher's Star Trek Roleplaying Game, which covered all of the series up to Star Trek: Deep Space Nine as well as the films. Star Trek Adventures, released by Modiphius Entertainment and using its 2d20 system (which has been used for other games like their Updated Re-release of Mutant Chronicles). While not a full-blown game placed in that universe, in 2019 Hasbro Gaming (as in the division in charge of games like Battleship) co-released alongside Wizards of the Coast a special edition of the Dungeons & Dragons Starter Set as advertisement for the third season of Stranger Things with official figurines and Fifth Edition stats for the Demogorgon and Demodogs, stats for the children's D&D campaign characters (like "Will the Wise") and an adventure "written" by Mike Wheeler. The World of Tales from the Crypt published by West End Games based on Tales from the Crypt using the Masterbook system. To mimic the anthology format of the show, the game has rules players to play as beings possessing "shells" - a separate character for each tale of horror rather staying with one for the entire game. Weapons of the Gods published by Eos Press based on Weapons Of The Gods. Autoduel, GURPS setting based on Car Wars board game. Modiphius Entertainment published Dust Adventures based on the Dust strategy games using a modified form of the system from the games. L'Era di Zargo, il gioco di ruolo di Zargo's Lords based on the Italian Zargos Lords fantasy wargame. The Realms of Terrinoth supplement is based on the world of Mennara from Fantasy Flight Games Runewars Miniatures Game and related games. The Worlds of Android supplement is based on the setting of the Android games. Infinity: The Roleplaying Game published by Modiphius Entertainment based on the Infinity miniatures game. Legionnaire is set in the universe of FASA's Renegade Legion Board Games that had rules for stat conversions if players wanted integrate the games. MechWarrior, FASA's RPG set in the universe of the BattleTech strategy game. The later edition published by Catalyst Game Labs was titled A Time of War inorder to avoid confusion with MechWarrior: Dark Age brand. Dice Up Games' The North Sea Epilogue: A Roleplaying Game is a Kickstarter funded game set in the viking-era setting of Garphill Games' North Sea Trilogy Board Games. Steve Jackson Games published GURPS OGRE based own their own tabletop strategy game, OGRE. Squadron Strike: Traveller published by Ad Astra Game based on their Squadron Strike miniatures game using the Traveller system. Through The Breach published by Wyrd Miniatures which is set in the world of their miniatures wargame, Malifaux. Twilight Imperium: The Role-Playing Game made by Fantasy Flight Games based on their Twilight Imperium board game. War of Ashes: Fate of Agaptus is Evil Hat Productions's FATE game based on the War of Ashes: Shieldwall strategy game. Eden Studios started developing a game based on City of Heroes using their Unisystem but due to licensing issues, only a preview was released. There was an adaptation of Diablo II for Dungeons & Dragons in 2000; both a boxed set and three sourcebooks (one for Advanced AD&D, the other two for 3rd edition) were produced. Elite: Encounters for the Elite series, especially providing lots of information on the Elite: Dangerous universe. White Wolf published games based on EverQuest and EverQuest II under it's Sword and Sorcery Studios imprint using rules based on the d20 System. There exists a Fudge-based fan-made RPG adaptation of Full Throttle, of all games. GURPS has Sid Meier’s Alpha Centauri and Myth. Pokémon Jr Adventure Game is a simple RPG based on Pokémon meant for adults to play with young children. Rune based on Rune, designed by Robin Laws for Atlas Games. The Japanese Standard RPG System developed by FarEast Amusement Research has been used for RPGs based on Etrian Odyssey and Shinkyoku Soukai Polyphonica. Alternity got a licensed box set for StarCraft in 2000. West End Games' The World of Aden that was dual-statted for the d6 system and MasterBook system. Kyoudai Games' Thunderscape: The World of Aden campaign setting for Pathfinder. Kyoudai Games also created Savage Thunderscape: The World of Aden for Savage Worlds. Two Worlds Tabletop RPG was created by RPGObjects to be included with the collector's edition of Two Worlds. Unwritten: Adventures in the Ages of Myst and Beyond is a Kickstarter funded game using a version of the FATE system that emphasis investigation and puzzle solving over combat to emulate the gameplay of the Myst series. GURPS has the PDF only Casey and Andy book for 4th edition. The Kevin & Kell Role Playing Game based on Kevin & Kell using the Action! System. Green Ronin published Critical Role: Tal'Dorei Campaign Setting based on the campaign setting used in Critical Role for use with Dungeons & Dragons. Ghosts of Albion Roleplaying Game for the Unisystem, based on the Ghosts Of Albion animated films and books. The Ninja Burger card game and RPG are based on the Ninja Burger website. Star Wreck Roleplaying Game is a humorous RPG based on the Star Trek-parody fan films, Star Wreck. In a case of Recursive Adaptation, the Animated Series Handbook has stats and an adventure based on the 80s Dungeons & Dragons animated series for the 3.5 edition of Dungeons & Dragons. Bullwinkle and Rocky Role Playing Party Game published by TSR had rules for simple RPG based on series in Rocky and Bullwinkle. Hora de Aventuras: Juego de Rol: A Spanish RPG based on Adventure Time published by Nosolorol Ediciones. FASA published The Masters of the Universe Roleplaying Game in 1985 based on He-Man and the Masters of the Universe (1983). The game was a supposed to be a simple cardstock game which was supposed to lead into an Advanced RPG but the rules proved to be confusing or simply broken and it was cancelled. An RPG for The Pirates of Dark Water was published in 1994 by Mindgames, Inc using rules similar to the second edition of AD&D. World Wrestling Federation Basic Adventure Game is a 1993 Whit Publications game based on World Wrestling Federation. D6xD6 is a one-stat game with a number settings based on other works including The Ancient, Athena Voltaire, Big Trouble In Little Canton, Citizen In The Temple Code Breakers, Critical Dawn, Dark Angel, Dragon Dice, Dragon Kings, Empires Of Steam And Rust, Fear The Light, Gargoyle Knight, Invasion Of The Saucer People card game, Jessie Shimmer, Lana Harvey Reapers Inc, Peter And The Monsters, Psionic Pentalogy, Sherlock Holmes (as one of the Baker Street Irregulars), Shotguns And Sorcery, Touchstone Trilogy, Watershed and the artwork of Steve Stone. Green Ronin funded a RPG based on the Lost Citadel transmedia project through Kickstarter.
2019-04-19T10:38:28Z
https://tvtropes.org/pmwiki/pmwiki.php/Main/TheRolePlayingGame
Introduction: Internationally known heart surgeon Chaudary Voleti volunteers at the Indian Super specialty hospitals of Holy Man Sri Sathya Sai Baba. Many years of very close exposure to Sai Baba have resulted in countless interviews and lessons learnt. Welcome to Souljourns. This interview was recorded in May 29 2002 in Pepper Pike Ohio. Chaudary Voleti: Oh you know it’s very complex that I come 200 miles from Puttaparthi you know that is Swami’s ashram is but for the first fifty years of my life I had no idea. I had some vague opinion about some Holy Man making holy ash for people, nothing more nothing less. The thing that actually drew my attention was the charity hospital and when a cardiology friend of mine told me that there is this hospital that does totally free heart surgery in South India in Anantapur which is the poorest of the poor it was such an oxymoron I thought I should check it out myself and I went to the hospital. I had no clue I was going to see Sai Baba, I went to the hospital and then went to see Sai Baba. Ted Henry: What did you think of the hospital and what did you think of Sai Baba? Chaudary Voleti: Oh, the hospital is out of this world like it’s come to known now as the Temple of Healing. That’s what it is called. It is not just called a hospital and the reason it is called a temple of healing is the emphasis is on not just the physical ailment. Its emphasis is on the correlation of developing both the cure process for the disease, cure process for the soul and the cure process for the mind what we call a total approach to the disease. Ted Henry: How can the soul be cured? Ted Henry: and for those totally uninitiated to the name to the form don’t even know what an avatar is how do you convey to somebody who is perhaps eager to know but innocently ignorant of what an avatar is, what it can possibly mean, to be a God Man, could be an incarnation of God. How can you begin to approach that subject with clarity for those who are uninitiated. Chaudary Voleti: In a very very simplistic way you see ‘Gita’, we call Gita, it is Bhagvad Gita that’s the quintessence of the Indian philosophy and when it was written,, we know it was written by Vyasa and it was written an extra five thousand years ago and that is basically the guide for anybody’s life. It doesn’t have to be a Hindu. You know Max Mueller is probably one of the earliest westerners to realize the significance of the Bhagvad Gita and its all the essence of vedas and even Einstein’s study was lined with your vedas and Bhagvad Gita and in there it is very explicitly said that when times become worse, when evil dominates good then God will appear in a human form to restore Dharma or Righteousness. So that concept is there not alien at least to the eastern society and so it’s very easy for me to comprehend very quickly that Sai Baba is an avatar for that explicit purpose. Ted Henry: and is Sai Baba and the answer to this for everyone right now, or is he for those who are seeking him out? You shared with me three and half years ago that you would have a medical team you would take from Los Angeles to Super specialty hospital would include if I remember correctly a Christian a Jew, I think may be a Buddhist. They had no idea who Sai Baba was but they were interested in doing this work. Do you find that people hearing his name and learning a little bit about him automatically open up to greater enquiry or is he not for everyone right now? Chaudary Voleti: He is for everyone but the only qualification I will make for the statement is he is for everyone at the right time. Ted Henry: So those who travel to even Puttaparthi in India and see him and receive his darshan it may not be their right time to know more about him than just what they heard or seen. Chaudary Voleti: Absolutely not, they can see him but it will not reflect in their what we call as discriminatory intelligence and I will tell you a very quick example of this thing because you know one day Sai Baba himself was asking three seven year olds where do they come from? The first one said I come from Bombay city, the second one told I come from Calcutta city and the third one said Swami I come from your holy feet. So these two, all three had the same education, same background and same everything but the third guy was already able to realize what the secret of life is. So you could go to Puttaparthi but your mind may still be the same when you come back. Ted Henry: You exercise your powers of discrimination and discernment rather quickly if memory serves me correctly about your discovery of Sai Baba. Three and half years ago when I talked to you, you like Sai Baba, you followed Sai Baba, you were devoting your life to Sai Baba. How have things changed? How have times changed and how has Choudary Voleti changed in your relationship with Sai Baba today? Chaudary Voleti: You know it’s very interesting because you know it’s a gradual progression and how fast you progress does not depend on what’s happening in this time span alone. The reason I say that is one day one of a very intellectual person with Swami who happens to be an ex vice chancellor you know asked Swami and he said, ‘Swami we must have done something very good in this life to come this close to you’, and he said, ‘No, in the past hundred lives you must have done something good to come this close to me the same way easiest analogy to give is there is a guy who come and hits a stone 19 times but it doesn’t break and a guy comes and hits the twentieth time and the stone breaks. So, the stone broke because of the effect of the first nineteen strokes but the twentieth stroke does not know that. So in that way do I evolve every day? Yes, I evolve every day and if you want me to very quickly to answer me. My goal in the beginning was just to realize you now bliss which is the ultimate happiness in life which is to know yourself. I think now I have gone one step further and I strongly believe the aim of this life is not to be born again and so what do I want now is to be a merger in his feet and that will be the end of my …. Ted Henry: Life cycle…As I like to say sometimes we are all still fully humans though in your fully human dimension on days that are grey, you feel out of sync, you have had nightmares from somewhere and your consciousness is altered do you ever have any doubts about Baba and do you ever find yourself with misgivings about where you are on your spiritual path. Chaudary Voleti: Yes, always unfortunately always and that to me, the way I resolve that issue is in a couple of ways, that’s my own way of developing it. One way I resolve it is, ‘It is a part of evolution, you have to go through these ups and downs, it is not a steady progress, never a steady progress. Number two that I get over with it is that what we call illusion or maya is nothing but his own other aspect of it, that he is putting through the mill, putting through the test, putting through, o what do I do in those days? I just take it easy and I know I do get depressed, yes and I am not happy all the time but the thing that gets me out of that mood is ‘Namasmarana’, thinking of him. Ted Henry: and explain Namasmarana. Chaudary Voleti: Namasmarana is just think of his name or any favourite of yours. You can say jesus Christ you know that’s all what it is or Rama, Krishna, Sai Rama, Sai Krishna, Buddha, Jesus like I said so like that. What I have done, the other which is very interesting that I have done is making him as a second….how should I explain it almost becomes as a second sense for me in the sense that I may be doing whatever I am doing but he is in the back of my mind all the time. Really he is there ll the time. So, if I get up in the middle of the night and I cannot go to sleep I will keep up thinking of either something that I had very pleasant with him or just say Sai ram, Sai Ram. Ted Henry: We are in Cleveland Ohio and we have invited number of guests to not only listen to you but ask questions and I have some of their questions and one I read now is because it is on this very topic. Can you speak about depression as you have been and what does Sai Baba say about treatment for depression? Chaudary Voleti: You know he is very specific which I do even agree as a physician 90% of the diseases today are caused by physicians. Chaudary Voleti: Yes, you know actually the number of cases of Blood pressure went up after the BP machine came into existence. Yes, it is really simple, simple, very simple. It is a very simplistic way of putting at it. Yes, 90% of the diseases are created by….You know I’ll tell you one…..the man could be dying and Swami would go and say, ‘You are going to be fine’, and everybody will say you know this man is a cheat, calls himself a God man whatever you want to call, everybody knows he is dying and he is telling him you are fine. But, that is a very superficial way of looking at it. What Swami tells us…when I say swami tells us is I am telling you what Swami tells us is the Atma has no death. His physical body is going to go but his Atma is going to be okay. He is going to continue long. So when he says you are going to be fine there are two things that are going to happen then. Yes, he is going to die for sure, the atma is never going to die so swami is not lying and number two, the man is going to die with a smile on his face. So first thing he tells physicians is you take a pulse, don’t tell the patient right away ‘My goodness your pulse is very weak and the guy will obviously feel weak the very next minute even if he came healthy. See, this is basically what we call as Biofeedback and we are calling it a science now but from the day I knew Swami, Swami was telling me, ‘No, do not depress the patient though he has an incurable disease; don’t tell him he has an incurable disease. You are not telling him a lie because who are you to tell him it is incurable because medical history is full of this incurable diseases cured within five days or within five months. It is incurable in my perception as a doctor with my limited knowledge which is not true. For now science has realised it and they are now setting up double blind studies on all or most of the major centres to see what actually this biofeedback does to a person. So people who are going to have angiograms, angioplasties, they are divided into separate halves. One half do praying actually do pray before the tests and the other half do not pray. Preliminary studies have already come through that the ones who pray, believe, do very well. So how did this change in my very own life. When I see a patient, you know I tell him, this is your problem, I will not lie to him, but this your problem but there is cure for your problem within my limits and what happens from now on is between you and the man upstairs and I will do my best and then between you and us and we hope and we will all pray that you are going to do very well and you know in the western society I thought that people are going to laugh at me no, everybody, everybody they loved it so much and they say, ‘Oh, this man speaks the truth, you know this is what I wanted to hear. I did not to want to hear him say Oh, I am the doctor, I am going to make you better, you are going to be fine tomorrow or something like that. No, you just tell him the truth. You will try your best which is what our medical knowledge and our own as a human being we want to do and number two we also know our own limitations there is never anything that a doctor does is 100%. That is the first thing we need to know but we ignore it. Number three patients do know more than we give them credit for. These things are not taught in medical school unfortunately. If Baba had a medical school he would teach you all these things. Ted Henry: Since you are talking about health; let’s talk about the health of Sai Baba. You delighted me three and half years ago with your stories of I believe when talking to an ophthalmologist who discerned that he had the eyes of a teenager, the blood vessels of a teenager. Yourself you have noticed that his weight was not changing over the years, that he would eat very little or sleep practically not at all. Tell us then with your close proximity to Baba how you appraise, how you apprise him today. How healthy is he? How old is his body? Chaudary Voleti: His body is still 76 years old, it is 76 years old but especially the last three months I have been around I have spent a little bit more time. The last time I spent this close was the week I spent in Kodaikanal. The last three month I have been with him. He is 76 yrs. old, physically he is still 76 yrs. old but his faculties are not a 76 yrs. old man. He can still read the smallest print that’s in front of him without glasses, without any aids at all and he is still eats the same 300 calories that I have seen him eat the seven days that I was with him and he is still you know…..I will tell you a very simple example which is the most amazing example I can give. So, one day this happened about 2, 2 and half years ago, we were all sitting and the most uncomfortable I get in front of him is if he makes me sit on a sofa in front of him, sometimes we do because either we are looking at something together or something like that. So me and the Cardiac anaesthesiologist were sitting on one sofa and Swami was sitting in front of us and we were looking at the map and everything was done. We were ready to get up. So we like idiots give our hands to Swami to get up and it all happens within a fraction of a minute, he said, ‘No, these hands are for you,’ and before we realized he was up and he pulled us both of us up, okay that’s one, number two just recently only you know I don’t know how many break a coconut here. It’s almost impossible to break a coconut. You would do that, with a stick, he with his bear hands he will take a coconut in each hand and hit them together and it breaks in the middle, and he will keep on doing it. He did it twenty five of them just for Sivarathri. Ted Henry: that’s a lot of force! Chaudary Voleti: and then the thing he makes it totally clear is that that force has absolutely nothing to do with his divine power. No, he said this is a typical example of mind over body because he has told us repeatedly and repeatedly that the so called powers or whatever he has is for others but not for his physical body. He says you and I can also do that if we believe in ourselves as strongly as he believes in his own body. He says we can do that too except you guys don’t believe in your own body and in your own innate strength. Ted Henry: You know the Sai Baba who is strong enough to break coconuts, you know the Sai Baba who is capable of chastising you, you know the Sai Baba who is capble of being like your mother, which is the Sai Baba you know the most? Chaudary Voleti: CV: The Sai Baba like my mother. Ted Henry: What does he say to you? Chaudary Voleti: That’s the love, that’s the love you get from him. His…its difficult because its that’s the same thing happens to me like I said when I go through periods of depression like I said….I am not going to make a big issue of being depressed…..don’t call me…. We all go through that….we all wake up somedays and that…so all I have to do is sit back a little bit. I do a little bit of meditation and concentrate on him and meditate and then you know I get up and I am you know fine, walking around and then like this. I am very happy right now. Why I am so happy because I am talking about my mother and my father and everything that’s something to me is him. That’s what he is. Ted Henry: there is another question from the people here…What is the most profound thing that has happened in Baba’s presence to you? Chaudary Voleti: See it’s very difficult to give a single incident. I will answer it in two sections. One way is the imperceptible changes that keep on happening in you that s what I called the other day evolution. You try to become a better person, a better person as time goes by but the other thing that has happened is sometimes you interact with him and then a whole new world opens up for you. A whole new world opens up for you and that’s a world that to me is real, not this where we are…for example take desires, all of us have desires, its human tendency to have desires. Swami never says do not have desires but have what you call Satwik desires, you know pious desires yes you must have a desire to help your neighbour. If you don’t have a desire to help your neighbour you are not going to help your neighbour. You must have a desire to have good thoughts otherwise you are not going to have good thoughts. So at the same time, you cannot not have desires at all So what the idea about these desires is you put a ceiling on the desires. That’s the most important thing. How do you put a desire on the ceiling? You put desires on the ceiling in two ways number one, like I said earlier make them Satwik desires, number two try to reduce them slowly. If you have six cars today, next day try to have five cars. You can’t have no car next day. Ted Henry: I remind people to get their questions to me. We have a person who wants to know I have heard that Swami says it is not yet his time what do you know about that? Chaudary Voleti: It’s not saying it’s not his time. No, when he is saying it is not his time it is saying it’s not our time yet. You see when he is….you know there are certain things you cannot take on face value what Swami says. I think that’s where again your own perception of what he is telling. He may tell the same thing to three different people and three different people will come out with three different answers you know totally. Oh, this is what exactly Swami said I heard and the other guy will say….Why do three people interpret in three different ways that’s again depending on their own evolution, their own discriminative innate intelligence and their own state of you know where they stand that day. Chaudary Voleti: Yes, tertiary care centres. Ted Henry: You are intimate with both of them having worked at both, having watched both be built. What can you tell us about why he creates such mammoth projects, if he is going to create more specialty hospitals? Chaudary Voleti: Now, you see there again is something that most people…..and when I say these are my opinions …have to go along that. The way I perceive Swami is, Swami is not here to cure the whole world. He wants to drop a stone in a calm lake and you see ripples go by. So whatever Swami is doing he expects others to pick it up and do it all over the world. He is not going to build a hospital in New York nor build a hospital in Argentina, not build a hospital in Mexico, not even build one hospital in Bombay either. The reason he build it in Puttaparthi and the reason he built it in Bangalore is to say that I am one person, this is a one man show and I could build this 300,000 square ft. hospital within one year but the only difference between how he builds and everybody else builds is he will tell you the say of completion before the day of beginning, that’s the difference here. Ted Henry: and it’s usually within a year…. Chaudary Voleti: Yes, the general…so he will tell you January 22nd 1991 the hospital will be functioning when he is talking on January 23rd 1990. Same thing happened you know when he spoke about this in 1999 the end of it that in 2001 January 19th this hospital will open yes, it opened. So that’s the only place where you get the opening date before anybody even knows the project is beginning. Ted Henry: TH Swami, Sai Baba has inspired people to help bring these hospitals about in the deadline time frame he said, same with the service for education opportunities, same with the water projects. That so much is done, if you have a chance to visit India and see with your own eyes all these projects. Do you have any idea why it can’t be done elsewhere even by people who have never heard of Sai Baba’s name. Can these serve as a model to replicate similar services for humanity in other places around the world? Chaudary Voleti: I think this basically is the aim of Swami. See, the other day he was very clear that this is the ….this is what I said when you said How do you evolve, because I hear different things and the other day Swami was…and I keep saying Swami and when I say Swami its Sai Baba first let me make that clear. What he was telling is that God is a facilitator. He picks the right people to do the right things; rarely he does anything by himself. You see that’s exactly that is happening here. Anybody can do this. People have started doing this now. Ted Henry: Where does the money come from? Chaudary Voleti: Oh It comes from people who unasked give money. I will give you another simple example. Don’t worry about the money. I was there for his …in 1996….yeah for his 75th birthday, nobody asked anybody there was never an invitation to anybody there were one and a half million people. Nobody invited them. They all came. Nobody asks from anybody anything. So, people know….this idea is coming in this country also. If you see people who want to give to charity they are telling don’t give this to ‘X’ charity because 95 cents of your dollar is given for administrative work, only five cents is going for real charity. But everybody knows that has anything to do with this organization you give a dollar all 100 cents go for work there, there is no administrative responsibilities. Like Swami says that I don’t have a secretary because I don’t have any secrets. It is an open book there, there are no secrets. That is why people who have no clue who Swami is will one day realise that I want this money to go this person apparently I heard he is doing such great things, I am going to give him this money. Ted Henry: We have many questions…let’s play a game… I will go through as many questions as I can and you will go through your answers as quickly as you can and we will see if we have covered all the bases. Okay? Swami has these mammoth serving these various avenues of Social care Medicare and Educare. How can we participate in these projects and how can we benefit from these initiatives? Chaudary Voleti: Okay, how you can participate in it is very simple, do the best you can. You don’t have to do it in Swami’s institution. No, that’s one thing… I will tell you a typical example. I was so upset that I could only get to work for two weeks in his hospital and the other fifty weeks I am working in America he said, ‘Don’t ever have that feeling, wherever you are working, you are working for people they are the same people. Whether you work in my hospital or you work in Los Angeles people are the same’. So when you want to do service, he is not saying come and do service to my project, No! Do what you can do in your neighbourhood. Ted Henry: Tell us about Sai Baba’s some details of his 900 crore…water project. Is it for Puttaparthi only? Will it control floods and droughts? Chaudary Voleti: No, no, this water project that he has started now is for Madras city. See, Madras city has a population of let me guess…. Chaudary Voleti: Just a little in excess of ten million and unfortunately more than 50% of them in that city do not have drinking water. Ted Henry: 5 million people don’t have drinking water in one city? Chaudary Voleti: Drinking water… not water to take a bath, not water to flush your toilet, drinking water cooking water and how it is supplied is by people making whole lot of money by delivering truckloads of water and making money out of it and then they drink any possible amount of water that they could drink anywhere from any source and that makes disease rampant and the government has been trying and could not do anything for the last umpteen number of years and then finally Swami realized that if anybody has to do this for these people you know he is the one who is going to do that. So that’s how on January 19th he announced that he has this 900 crore for people who are listening 900 crore comes to little over 230 – 240 million dollars but the thing with Swami is this, that’s the starting point. You see when he started this water project in Puttaparthi he said it was 70 crores which is about 20 million it ended up as 270 crores, which is 90 million. This he is starting at 230 million God knows where it is going to end up because you know this escalates and that’s what he wants to do. Ted Henry: You said the Super specialty hospitals are healing temples providing a care for the soul as well as the body and mind. Is there a specific treatment for the soul, Spiritual healing? And number 2 is there a place for energy healers, vibrational healers to volunteer at the super specialty hospitals. Chaudary Voleti: Yeah like I said earlier the first concept that Swami always said was you to treat the person as a person and not the disease as a disease entity. The thing we have in this country is that every disease has a code so you go by a code, you don’t go by a person you go by a code. You know he is code no so and so and so. That’s what the disease is but in his hospital it is not that way. So somebody, even very very smart very successful doctors ask me, ‘Oh, why does Swami waste so much space in this hospital when you walk in, he could use it for a lab, he could use it…..’ and I tell them ‘Listen buddy, there is enough room for the lab, this space here is so that the patient starts realizing looking inside, how he was sick, how he got better, how he could be a better person and invariably if you talk to any one of them walking out of that hospital after they are cured they will tell you I am a totally different person’. Here I will give you one example which will sum it up totally. There is this guy, the poorest of the poor is a truck driver his daughter had a hole in her heart and he brought her all the way from about a 1000 – 1500 miles so everything went very well. The he realised what can I give to Swami what can I give to this place, he has no resources, he couldn’t do anything. You know what he did, he said from this day onwards I am going to stop smoking and I am going to stop eating meat. That’s what I am going to do and he did it from that day onwards. Ted Henry: This person has four quick questions; they are all on the same theme so I will just ask them. Does Sai Baba call certain people only to him such as yourself, how does he do this if he calls certain souls. Does he manifest in order to revel himself to us. Is he encouraging us to develop the divinity within ourselves? Chaudary Voleti: Yes, the last part of the question is absolutely true. He is trying to …..see, in olden days the idea was you have to kill somebody to get rid of evil. That’s not what it is today. You can’t go on killing people. Like Gandhi said, ‘If you take one eye for an eye, there will be whole lot of blind people in this world.’ That’s not what the idea is. The idea about Swami is to make a person a better person. So to improve you as you know better person I think that is what his main aim is. Chaudary Voleti: yeah, I am coming to that So why does he call certain people like I said earlier you know all of us have a role to play in this that destiny is already decided. It is already decided, we have and then what he does is I think what he does is depending on who he needs at what particular time point he brings them to himself so that they can do what they have to do. The rest of the people… there are so many good people in this country that go out and do good things. When I was chosen I felt that I should go there and do something at that moment because he needed somebody to put the program back on track. That’s the only way I can look. That’s what people tell me, ‘Sir you came here to put us back on track’, that’s all I did. I didn’t do anything. So I asked him the same question one day, ‘Why why me…what’s going on with this?’ He says, ‘Don’t you know the surgeon is only as good as his instruments’, so, he picks up instruments and he uses them at the right minute and you know if you have an orchestra, if everybody plays at the same time its chaos. Orchestra is when everybody plays in his turn and the conductor decides whose turn comes when and Baba is the conductor. Ted Henry: Question about working…doing Baba’s work helping humanity and deriving a livelihood from it which people need. For those of us who earn our living teaching and doing healing work, Swami says, Education, health care should be freely available, fully available to all. How do we do this? How do we earn our living? Chaudary Voleti: Okay, No Swami never said to anybody don’t earn. He says but earn in a Dharmic way. Earn in a right way. Earn but don’t earn more than what you need. How do you know what? He gives again a simple example. If your shoe is size 9 you cannot wear 11, you cannot wear 7 one is too big, one is too small. That is where again the discriminative capacity come. You earn enough that’s for you. Don’t earn too much so that you don’t know what you are do and then you automatically become a breeding house for bad habits. Don’t earn too little. If your potential is there to earn more earn enough. And that way you are earning but earn in a dharmic way. That’s what you have to do you know earn in a dharmic way and then you do service. You are a teacher, be a better teacher, you are an engineer be a better engineer. You are a doctor, be a better doctor. Have compassion. See for example I can talk to you only about doctors, I can’t tell you how to become a better teacher but you are a doctor what he is trying to tell us is, ‘Don’t put money ahead of the patient’, number two treat them as human beings and number three have compassion, have real compassion. You may not treat everybody but have compassion like he says very simply which is something, ‘ you cannot oblige everybody but speak obligingly’, you cannot change the face God has given you but you can change the face the expression that god has given on your face. SO you find the patient, you are laughing, you are a little jovial, you are encouraging when you talk to the patient he walks out of the office in a much better frame but the other person with a sour face you know he may tell the same thing but the guy is going to walk out, ‘O My goodness, what is going to happen to me. So that’s how every one of us must do our profession but that is where… I will digress just a little bit. The reason for this is, this is what we call as karmic tendencies, that’s our karma, that’s our duty to do. If you do the duty properly, how do you know that you are doing properly is you ask yourself the question, what I am doing is it going to hurt somebody. That’s the first question you ask yourself. Is it going to hurt somebody? And how do you know it’s going to hurt somebody or not? We come back to again by being a better person so this is a vicious cycle. You can go down the vicious cycle because you have no clue what you are doing. You keep on doing, doing doing because Ted has a 5000 house I must have a 7500 sq. ft. house. How do I do it doesn’t matter I am going to do it. Ted Henry: I don’t have a 5000 sq. ft house. Chaudary Voleti: I am just ….. Ted Henry: people here some of them may wonder why I turned to you as Chaudhary as an authority on Sai Baba. You have had many face to face meetings with Baba. How many approximately have you had? Chaudary Voleti: first of all I am not an authority on Sai Baba because that is you have to qualify that statement. In my limited exposure to him, I don’t think anybody can ever understand him and it’s a mistake to understand him. It’s a mistake to analyse him. It’s a mistake to interpret him. The ideal way to do is to accept him. Ted Henry: Now then let’s talk about the facts of Sai Baba, How many meetings have you had with him? Ted Henry: Has he ever told you anything specifically that you didn’t like? That you found difficult. Chaudary Voleti: Oh, yes, oh yes! Chaudary Voleti: Oh, I know right away you see very simple, I will tell you the last example, which is much easy. You know I don’t have to actively do surgery any more but I still wanted to be a part of the hospital, still want to help the director in his job in the morning, the CEO run his job in the morning, the financial officer run his job…because I have so much experience in running hospitals her and then go to the operating room you now guide them a little bit. In the evening sit with the cardiologists, cardiac surgeons and review all the patients and have a game plan for next day. That was my passion I wanted to do that and I bought a ticket to come here on the 17th of April with a return ticket on 29th so he calls me in to the interview room and says yes, you are leaving on the 17th but you are not coming back on 19th, ‘Swami, I want to come serve the hospital,’ Don’t worry about the hospital I will take care of the hospital you have this responsibility, you have this responsibility, you have to finish them, less luggage more comfort, you have to finish them. So, I didn’t like it but I would not question, I would not question because he is reminding me my personal obligations, yes, that’s where again he will tell you, he will never going to tell anybody, drop what you are doing, come do my work. No, you can do his work here. Ted Henry: he has made many trinkets for you large and small, some quite valuable. After receiving so much favour from Sai Baba so many wonderful items that he has materialized for you a) How does he materialize these? b) What attachment do you associate with these items now that you like Baba so well? Chaudary Voleti: See, I think the items that he materializes it sometimes looks like there is a message for every one of them. I will tell you one interesting example and so one day we were all sitting there I will tell you two examples…..the first example I will tell you which is very interesting. We were all sitting there and so he suddenly materialised you know a very beautiful bracelet for me it’s really amazing, everybody asks me what this is. You know and its very unique, it’s a very unique bracelet and I am sitting right in front. You know when I go there I just sit at his feet so there is no trickery there is nothing there. He wears a robe, you can pull it up and there is nothing in there and he just goes like this and you can see a small kind of a spark and this come out. He is putting around my wrist and all the women in the room and they says ah, Ah! And he asks, ‘What happened?’ and they say design swami. And he says, ‘no, not design, desire’. You see he is just telling that so why and then this materialising process in my mind you see its all matter, it’s all matter. What form of matter is where when how, so he can materialise any matter into any matter. I have seen it happen you know umpteen number of times. I can go on and on and on and on. So he can physically create things, that is all it is about. How did it come out of his hand? It just came out of you know his hand, I have seen only the other day the ring that my brother was wearing had a white stone in it so he took it back and said, ‘I know you don’t like white stones’, because my brother came back to me and said, ‘he gave me a white stone, you know I like green stones’, so he did it okay, he took it back and put it inside his hand and all he did was blew on it and took it out and there was a green stone can second incident which is I am sure some of you heard it its nice, you don’t mind hearing it again that’s my ….the reason is this its very simple is we were sitting in the interview room one day and he suddenly asks these question that all of us a sudden boggle you, he said, ‘ Oh, you are a surgeon’? Swami you know that why are you asking I said. How come you are wearing a ring on your finger? I said you know this is Lord Balaji which is Narayana Balaji it’s all about the same. Lord Balaji Swami, I am wearing this. ‘Lord Balaji is your favourite God isn’t it? ’ I said, ‘No Swami you and Balaji are the same I never make any difference out of both of this things’. But then he says you have to clean your hands, you have to scrub, put the gloves on then what do you do with this? and I said, ‘ I have to be very careful swami, I have to take it out and put it in my scrub jacket inside and make sure as soon I finish the surgery take the gloves off and the first thing I do is I reach into from my pocket and put it back on again. Oh, does that how you serve. Just a conversation, just a simple conversation, I thought that was all it was. So he started talking to other people and you know some time goes by and then suddenly he looks at me and says you know Take your spectacle off. You know we call glasses and he calls spectacles. That’s one thing I do now, I am serious when I say this. He tells me to do something and I will do it seriously. I will do it because I am totally convinced in my mind that it’s for my good. That minute I may not think it’s for my good but I know it’s for my good. That’s why I cancelled my return ticket. So, he said take your glasses off and I took my glasses off and again same way you know he was going around like that and I know nothing is there because he has already done many things. Opened his hand and gave vibhuti to people and things like that and he has only a robe nothing else. Then all of a sudden this beautiful pendant comes out of his hand, you know the chain comes out of his hand and then there is a pendant at the end of this chain which is exactly the same replica of this ring you know the same replica of this ring and the he puts it around my neck and says you know you don’t have to worry about losing now. It will always be there and you don’t have to worry about taking it off so you see this is ….when you say this you get a perspective that there is a rationality behind….he doesn’t just give it to show off. Well he does it sometimes, for example I will give you one other really interesting example. I have a cardiac anaesthesiologist who goes with me and he materialised like this a ring with Shirdi Baba and I know this guy has no clue who Shirdi Baba is and he is all Sai Baba devotee and then he gave it to him and he was looking, he said that’s not for you, that’s for your wife because your wife only believes in Shirdi Sai which is totally true when we came out and I checked he said ‘yes my wife doesn’t believe much in Swami, she only believes in Shirdi Sai baba’ and it fit her ring finger perfectly. Ted Henry: Several quick answers to several quick questions. Sai Baba’s hospitals are doing a great service but does Sai Baba take any medication himself? Chaudary Voleti: So far he has not taken any medication that I know of and there is no….not even vitamins. The other day specifically he told us all that day have been my own mistake. I found some nice….you know sometimes we do things which are….I found some ….i haven’t told this to anybody but I will tell you this like a stupid….anyway…I found some nice creams which has vitamin E Aloe and everything so I left some for him in his quarters, next day the speech was Avatars Divinity we don’t need vitamins. Ted Henry: Next question I asked you before, I ask you again. Who is Sai Baba? Chaudary Voleti: I think Sai Baba is I would say depending on... He is like a mirror you see in him what you want to see and I see in him an avatar come here to make our life better, more purposeful, more goal oriented and make the whole world a better place for everybody. Not just in India, not just in Andhra Pradesh. Ted Henry: What do you say to newcomers who don’t understand Sai Baba the way you do and who are quick to judge him in a negative context, spread stories about him, say he is something that he is not, align with some perhaps misdirected spiritual groups around the world might be. Do you worry about defending him and if so how do you? Chaudary Voleti: I never defend Sai Baba. He doesn’t need my defence. He really doesn’t need my defence. I will never even think of defending him and also I can extend it to the next step. He never believes in defending himself. He told many times you be to ignore them. Ignore them, that’s what it is and my advice to people is do not judge him quickly. Do not judge because you cannot judge him but if you want you want a second opinion I mean I have been in practice for so long. Well, people come they think you are a very good doctor. I know they are telling me that. Most of them do mean it some of them don’t but still they tell me you are a very good doctor but I want a second opinion. I tell them a very simple thing I say that you are entitled; you should get a second opinion but don’t go to the corner drugstore and get the second opinion from the pharmacist. Go to another fully trained board certified cardiac surgeon and get a second opinion. I hope it answer the question. Ted Henry: it does. How does one go about volunteering at the super specialty hospitals. What is the process or procedure involved? Chaudary Voleti: See volunteering there ….see the volunteering there has very limited opportunities because you can volunteer one of two ways, as a professional in the hospital or as what we call as sevadal. To volunteer as a sevadal is not open for everybody as their slots are filled way many many many times. To volunteer as a professional, if you are in any of these professions yes, you can go and volunteer. Ted Henry: We have just a couple of minutes left on the video tape can you share with us one most overwhelming clinical miracle you were a part of or a witness to. Chaudary Voleti: Oh, the simplest I will tell you. Okay, you want a very short one or a long one? Ted Henry: I want both of those. Chaudary Voleti: Very short one I will tell you. The shortest one I will tell you this is amazing. Every Sunday he will come and say how many operations? And we will say, ‘Today is Sunday we don’t operate okay fine. Just last week I was there he comes you know on a Monday and says how many operations did you do yesterday? I said, ‘Swami yesterday was a Sunday we didn’t do any’, No, no, you can operate on Sundays and then walked away. What’s he saying you can operate on a Sunday and walks away because they don’t tell me everything that goes on. Then I found out they had an emergency that they did the night before. Chaudary Voleti: At the hospital. So how does he know? So he knows that’s what is….the long miracle? Chaudary Voleti: the long miracle is I tell you…. there is this guy fit as a fiddle. 52 yr old guy fit as a fiddle and retired and wanted to work and spend all his time with swami because his son is very close to Swami. He doesn’t know much about Swami but his son is very close to Swami in his school so he wanted to come and spend. So he goes to Swami and says, ‘Swami I want to come and only be with you and do work and work’, he says, ‘Go take care of your health’, he says, ‘Swami my health is fine I am very healthy, a vegetarian there is nothing wrong with me.’ No, no, no take care of your health. So he said may be I have some ear problem so may be discharging ear so maybe I should go see an ear specialist and take care of it. So he goes to the ear specialist and he says you need some minor surgery to take care of this ear discharge but just because you are 52 I think it’s better if you get some heart tests done. So he says okay, that’s really routine above 50 yrs. we need to do that. So sure enough they put him on a treadmill and he flunks it right away and they say Oh my goodness you flunked so fast we have to do an angiogram right away. And then they found very critical blockages in all his coronary arteries, all his coronary arteries and they said you got to have the operation right away which is you know I would have done the same thing too. Right away means today or tomorrow. So he calls his son and his son says, ‘Don’t worry you come right over here and we will do that’ so the guy takes the next train and comes to our Puttaparthi and sure enough at that time it so happens I was there and our cardiologist, the guy got admitted and Swami fixed the date to have surgery done and he had his surgery done and then the surgery was done two days before Shivarathri. Exactly two days, 48 hours before Shivarathri and in Shivaratri discourse and in the morning Swami comes to me and says ‘why don’t you bring the patient here. I said ‘What patient Swami?’ the only one you did two days ago. I said it’s just two days ago’, he says, ‘No, no, no bring him here because ….I said what’s he asking me to bring the patient to…even we do that,…48 hrs.….even here we send them home after but not over there where people stay for weeks. I go there and ask him why Swami wants you to come there? So he said, ‘Oh, he heard my prayers’, I said, ‘What are you talking about?’ Whole night I was praying I want to see you today, Shivaratri, I want to see you today, I want to see you today, he heard my prayers and so we checked him up, everything is fine so I come back to the Shanti Bhavan and then there is a message from Swami’s right hand person, Chiranjeevi Rao, this is the human side of Swami that you would never never experience and you don’t want to experience, believe me. So Chiranjeevi Rao is on the phone, then I knew there is something trouble. I said what do you want Mr. Rao?’ Swami wants you to give him 100% guarantee that this person is going to be alright when you bring him and take him back to the hospital’, So I knew this already, I have gone through this before so I am not going to fall for it so I said, ‘Go tell Swami I will give him 150% guarantee, see what am I doing? I am doing nothing. I am just an instrument; he is doing everything kind of a thing, so it went very well. He came in he saw everything, he had his chair, he had his car ready, everything worked on the dot. He had his car ready for us. We went out brought him in. As I was walking in I couldn’t believe it, nobody ever even saw anything the first speaker finished the second guy was about to start I don’t know where he came from, Swami told him wait the next thing we know Swami turned around and walks straight to us. Ted Henry: We have less than a minute. Chaudary thank you very much. I will give you one last crack to answer this question for the third time in thirty seconds. Who is Sai Baba? Chaudary Voleti: Like I said, Sai Baba I think is a …..In my mind I am very clear he is an avatar. He is basically an avatar come in this right time where the world is so turbulent, so full of unrest. He is going to establish rest and peace and love.
2019-04-23T02:47:27Z
http://souljourns.net/articles/transcriptions/440-choudary-voleti-md-2002
Adey Professional Heating Products are available to buy online at BHL. Adey are a British success story, innovating, designing and manufacturing a wide range of professional heating products including Magentic Filters such as the Adey Magnaclean Professional, Adey Magnacleanse and a range of Adey chemicals including cleaners and inhibitors. Some of the Adey range is stocked by BHL ensuring fast delivery and low trade prices on the entire Adey range. Afriso, also known as Afriso Eurogauge offer a wide range of safety products designed for heating systems. Operating in the UK since 1962, Afriso design and manufacture to the highest standard products for Heating Oil Storage (Anti Siphon Valves, Fuel Withdrawal Units, Level Switches, Leak Detection and Overfill Prevention Systems). Afriso also produce products for Heating Installations including Boiler Safety Fittings, Solar Pump Units, Vessel Connection Combination Fittings, Cap Valves and Diaphragm Type Safety Valves. Afriso also provide a large range of Hand-Held measuring instruments such as Pressure Temperature, Humidity, Vacuum and Thermistor Probe Test Instruments. BHL are able to supply Afriso products with Fast Delivery and at Great, Trade Prices. The Aico Ei range of Smoke and Carbon Monoxide (CO) Alarms are available online at BHL. Aico design and manufacture a wide range of high quality safety alarms for use in domestic and commercial locations, ensuring that there is a suitable Aico product for every property. BHL are stockists of a wide range of Aico safety products wihich means that we are able to offer Low Trade Price and Fast Delivery on a wide range of Aico products. Aladdins Autovent from NLB Engineering Limited produce a fully automatic radiator de-aeration valves and associated central heating radiator products. Favoured by homeowners and landlords, the Aladdin Autovent requires no more manual purging of radiators, keeps radiators heat to the top, does not include gas thus reduced corrosion which equals extended component life and avoids costly call out charges of service engineers just to purge radiators. The range of Aladdin Auto Vents are in stock at BHL meaning quick delivery and low prices. Albion Water Heaters and Hot Water Cylinders available online at BHL. Albion offer exceptional, high quality products for use in the Plumbing and Heating industry including Albion Unvented Cylinders, Albion Domestic Cylinders and Albion Renewable Cylinders and Buffer Tanks. The Albion brand is part of the Kingspan group of companies. BHL are able to supply Albion Water Heaters and Albion Hot Water Cylinders online at amazing Trade Prices and with Fast UK Shipping. Alpha's range of high quality Boilers are available to buy at BHL. Alpha have a great pedigree in designing and manufacturing a wide range of energy efficient central heating products including Alpha Combi Boilers, Alpha Heating-Only Boilers and Alpha System Boilers - which are all supplied with comprehensive warranties and guarantees. BHL offer a comprehensive range of Alpha Boilers, Spares and Accessories at Low Trade Prices with Fast UK Shipping. Shop Alpha at BHL now. Amica are leading manufacturers of Appliances including Built-in appliances such as Refrigerators, Ovens, Hobs, Hoods, Dishwashers, Microwaves and Freestanding appliances including Amica Free-standing cookers, Refrigerators, Washing machines and Dishwashers. Amica first product was a cooker produced in Wronki in 1957. Today Amica draws upon 50 years of experience in the industry to manufacture and market cookers and a range of other contemporary and stylish home appliance products. Amica is a friendly and useful brand endorsed by its market share and the high praise and satisfaction of its customers. Amica’s versatile range of appliances can be seen in the homes of millions of people in over 40 countries around the world. BHL are stockists of a wide range of Amica products ensuring fast delivery and great trade prices. Andrews Water Heaters available to Buy at BHL. Andrews Water Heaters produce hot water in commercial and industrial applications. Andrews offer a comprehensive range of efficient water heaters for most fuel types including Renewable. The Andrews range of heaters include Storage Water Heaters, Condensing Water Heaters, LZC Renewable and Instantaneous Water Heating solutions. BHL are able to offer Fast UK Shipping and Low Trade Prices on the Andrews Water Heater Range. The Apollo Ultrasonic range of monitors is available to buy at BHL. Apollo Ultrasonic by Dunraven Systems offer a range of oil tank fuel monitors and gauges including both smart, electronic and mechanical - enabling the homeowner to monitor fuel consumption and prevent running out of fuel. Arctic products for the plumbing industry available to buy at BHL. Since the world's first pipe freezing kit in the 1960's, the Arctic range of products has grown to include Smoke Pellets, CO Detectors, Smoke Alarms, Blow Torches, Gas, Lighting and other consumables to their range. BHL are able to offer Low Prices and Fast Delivery on wide range of Arctic products to both Homeowners and Tradesmen alike. When shopping online for Arctic Products, remember to drop BHL first. Ariston Heating Products available to buy at BHL. Ariston Thermo group of Italy provide a wide and comprehensive range of products including Boilers, Cylinders and Water Heaters. Ariston design and manufacture the highest quality products with an emphasis on efficiency and value. Atag Heating Boilers available to Buy at BHL. The Atag range of central heating boilers includes Atag Combi Boilers, Atag Heat-Only Boilers and Atag System Boilers - all backed with leading aftersales and warranties. Baxi Boilers and Heating products are available to Buy at BHL. Baxi have manufactured leading heating products in the UK for a long time. Today Baxi are known for their highly efficient, quality boilers and cylinders and recently their comprehensive range of renewable products. All of which are backed by Baxi's comprehensive warranty scheme for added piece of mind. Bayer Garden care products available at BHL. The Bayer Garden care range of products include a range of garden care, flower care, pest control and tree and shrub care products for both amateur and professional gardeners. BHL supply a wide range of Bayer Garden care products at Low Prices with Fast Delivery. Consider BHL for all your Garden Product requirements including the Bayer Garden care range. Bayliss are UK manufacturers and suppliers to the Gardening industry. Bayliss Engineering are known for their Bayliss Greenhouse Autovent. Available in a range of models, the Bayliss Greenhouse Autovent opens and closes a Greenhouse's hinged vent automatically using energy from the warmth of the sun or the surrounding air. The hotter it gets, the wider it opens the vent. BHL are now proud to Stock the Bayliss Autovent enabling us to supply this innovative product at Low Trade Prices and with Fast Shipping. Shop online now at BHL for Bayliss Engineering products. Briwax is available to buy online at BHL. Briwax has an impeccable heritage which dates back to 1860 when Henry Flack started manufacturing polishes and blending waxes in East London for cabinet makers and woodcarvers. Today the Briwax range of products includes Briwax Original, Danish Oil, Briwax Floor Wax, Briwax Floor Wax, Wax Removing Solution, Furniture reviver & restorer, Liming Wax, Briwax Granite & Marble Wax, Natural creamed beeswax, Shellac Sanding Sealer, Sheradale, Chair Fix Kit, Steel Wool & Pine Brushes, Teak Oil, Touch up Pens and Wax Filler Sticks. If you cannot find the Briwax product on BHL, we will try and source it for you. Contact us with your requirements. Burco are specialists in catering equipment. At BHL we supply the Burco Cygnet range of hot water urns which are solid, reliable and great value. Caframo Ecofan's now available at BHL. Caframo are the world leader in thermal electric technology, designing and manufacturing the Caframo Ecofan Stove Fans in Canada for over 10 years. Exceptional quality, the Caframo Ecofan range will work with a wide range of stoves, including Wood Burners, Gas Burners and Solid Fueld Appliances. The Caframo Ecofan will improve the circulation of warm air throughout, increasing your comfort and improving fuel efficiency. Caleffi are a leading manufacturer of high quality components for heating, plumbing, air conditioning, heat metering and renewables systems, for domestic, commercial and industrial applications. Caleffi are now available to buy online at BHL where we offer the best prices including bulk deals on Caleffi products. We are also able to offer a fast delivery service on the Caleffi range. Manufactured in Italy, Caleffi have been designing and manufacturing for over 50 years. The Caleffi range includes Heating Controls, Valves and Vessels. The Chimney Balloon is available to buy online at BHL. Manufactured by the Chimney Balloon Company, this clever little device inflates within your chimney and helps prevent loss of warm air up your chimney and the cold air coming down the chimney. The guaranteed and patented Chimney Balloon is easy to install (inflate) and remove (deflate) whenever you want to light the fire. Available in a range of sizes, the Chimney Balloon is a very cost effective, eco friendly energy saver designed for use in any home with a chimney. Chimney Sheep produce eco-friendly chimney draught excluders made from 100% Herdwick wool which are designed to stop the heat lost from an open chimney when not in use. The Chimney Sheep on average saves you around £64 on your heating costs depending on your chimney size, outside temperature and fuel source. The chimney sheep comes in a wide range of sizes and can fit in many types of chimneys. Keep warm and save money this winter with Chimney Sheep. Cistermiser Products available at BHL. Cistermiser have been designing and manufacturing high quality, efficient products for the washroom for a number of years including water saving control valves and automated solutions for washrooms. Cistermiser's products can be found all over the UK in most commercial, leisure and industrial facilities. Corgi Controls manufacture a wide range of high quality controls for your central heating system. The range of Corgi heating controls provides a comprehensive choice of popular control devices which include Corgi Programmers and timeswitches for the automatic control of heating and hot water. Corgi Economy 7 timer which enables optimum use of electric water heating. Corgi Thermostats which provide automatic temperature regulation of both the heating and hot water. Corgi Motorised valves for flow control of hot water. Corgi Multi-core flex and junction boxes for installation of controls and Corgi Control packs which provide everything that is needed to control a complete heating system. In addition to this Corgi produce a range of Water Treatment Chemicals which help maintain a heating system. All Corgi heating control products incorporate well established design features allowing for ease of installation and subsequent use by the consumer. BHL are proud to be suppliers and stockists of Corgi Heating Controls enabling us to provide low trade prices and fast shipping. Croydex products are available to buy at BHL. Croydex have been manufacturing high quality bathroom products since 1919. Today the Croydex range includes Croydex Bath Mats, Bath Shower Add On, Bathroom Hooks, Bathroom Shelf, Bin, Bottle Opener, Cistern Lever, Flow Limiter, Grab Bar, Light Pull, Plug, Shower Head, Shower Hose, Shower Kit, Shower Riser Kit, Soap Dish, Soap Dispenser, Squeegee, Storage Basket, Toilet Brush, Toilet Roll Holder, Toothbrush Holder, Towel Rail and Tumblers. The Croydex range is huge providing suitable for any bathroom, traditional or modern. BHL are stockists of a wide range of Croydex bathroom products ensuring that we are able to supply Croydex at Low Trade Prices and with Fast UK Shipping. Danfoss products available to buy at BHL. Danfoss design and manufacture high quality, efficient products for the HVAC industry including Heating Controls - Programmers, Timers, Radiator Valves and Valves as well as Underfloor Heating components for both the domestic and commercial market. BHL are stockists of a wide range of Danfoss Controls meaning we are able to offer Fast Shipping and Low Trade Prices on all Danfoss controls. Delta Dore are one of the largest manufacturers of controls in Europe they specialise in heating and cooling, lighting, security and home automation controls. Founded in 1970 by members of the Renault family they have become one of the leading companies in energy efficient controls. See our range of Delta Dore wireless programmable room thermostats which are clear and easy to use. Deltech provide LED Lighting Design and Manufacture. The Deltech range of lighting products is extremely comprehensive and competitively priced for the electrician and homeowner. The Deltech range includes Deltech LED Downlighters, Firerated IP65, Exchangeable Bezels, Matrix High Power LED Dichroic Replacement Lamps, High Power GU10 Dimmable LED Lamps, High Power GU10 300lm+ Non Dimmable Lamps, HP GU10 400 /500 /600 LM LED Non Dimmable Lamps, Deltech 1 LED 3w High Power 50mm Lamps, Deltech 3 LED High Power Colour Lamps, LED High Power MR11 and G4 LEDs, High Power 60mm GLS and 35mm Candle Lamps, GU10 smd Lamps with Built In Reflectors, GU10/MR16/MR11 Long Life LED Lamps, PAR30 / AR111 / PAR38 LED Lamps, External / Internal LED Strips, LED Ceiling Panels 4900 Lumens, TILT (Rotating Ends) T8 LED Tubes 2ft-8ft, 24v T5 Tubes, GL3 LED Exterior WALL / SPIKE Light, MAINS GU10 Garden Light, SHATTER RESISTANT LED FLOODLIGHTS, 12 VOLT AND 24 Volt Power Drivers and Controllers, Lampholders and Deltech PAR38 Single and Twine Spikelights. The range of Deltech lighting and electrical products are available to buy online now at BHL. We offer low trade prices and fast delivery on Deltech. Deva Taps available to buy at BHL. Deva manufacture a wide range of bathroom and kitchen products including Deva Taps and Deva Showers designed for both commercial and domestic apllications. Dimplex products available now at BHL. The Dimplex range is comprehensive within the heating and electrical industry catering for domestic, commercial and industrial applications. Amongst the products in the Dimplex range are Heaters, Fires and Stoves, Radiators, Cylinders and Renewables products. Dimplex are a well renowned and respected company within the industry. Drayton design and manufacture heating controls in the UK, for the UK and have a reputation for quality, reliability and technical excellence. Found in homes and commercial properties up and down the country the range includes smart thermostats & multi-zoning systems, TRVs, room thermostats, time controls, wireless controls and motorised valves. Drayton is part of Schneider Electric, a global specialist in energy management with operations in more than 100 countries. Dyson manufacture and design an innovative range of Hand Driers and Taps called the Dyson Airblade. The Dyson Airblade hand dryers are the fastest hand dryers on the market. Dyson Airblade Hand Dryers are the most hygienic with the lowest running costs. Dyson Airblade Hand Dryers offer low impact on the environment. Dyson Airblade utilises the latest patented technology with a comprehensive guarantee. The Dyson Airblade Hand Drying Tap offers equally impressive performance and the latest technology. BHL supply a comprehensive range of Dyson Airblade products at low prices with fast UK shipping. Ecodhome offer a range of inexpensive Home Automation solutions creating an ‘environmentally friendly & intelligent environment.’ Available online exclusively from BHL, the EcoDHOME range of home automation and energy saving devices hav been developed by SmartDHOME Srl, itself established in 2010. Ecodhome is establishing itself as a leading player in the smart energy market, with products aimed at meeting the needs of an ever more energy and cost conscious consumer. EcoDhome continue to develop technology that promotes an environmentally sustainable lifestyle, through increased energy efficiency. EcoDhome aim is to provide high-tech home automation products to reduce energy consumption and increase comfort levels within the home, all with the lowest possible investment. Elson Hot Water products are available online at BHL. Founded back in 1919 in the North East, Elson are known for offering flexible hot water solutions. Elson provide a wide range of products for both domestic and commercial applications including Thermal Stores, Hot Water Cylinders and great value Water Heaters. Ferham Tanks are available to Buy online at BHL. Part of the Kingspan group, Ferham manufacture a wide range of cold storage tanks representing the most comprehensive range of cisterns and accessories available within the UK. Ferham tanks can be seen in use across the whole country in both domestic and commercial environments. Fernox products are available to Buy at BHL. Fernox 'Makes Water Work'. As a leading global player in Water Treatment products, Fernox have been responsible over the years for producing a range of innovative products which include traditional plumbing products and water treatment chemicals as well as equipment such as System Filters. Amongst the most popular Fernox products are Inhibitors, Cleaners and Leak Sealers. BHL are stockists of a wide range of Fernox products meaning we are able to offer Fast Shipping and Low Trade Prices on all Fernox products. Fireangel Safety products available now at BHL. Fireangel by Sprue Aegis, design and manufacture a range of safety products for the domestic, commercial and leisure market. The range of Fireangel products include smoke alarms and carbon monoxide (CO) alarms. Utilising the latest in technology the Fireangel range provides peace of mind to families throughout the world. Firebird Boilers available now at BHL. Firebird Heating solutions are an Irish based manufacturer of high efficiency heating products including a comprehensive range of condensing Oil Fired Boilers. Other products within the Firebird range include Biomass Boilers and Renewable products. Fiskars are manufacturers of a large range of quality consumer steel products, famous thanks to their distinctive use of the colour orange. Originally a Finnish manufacturer, Fiskars today manufacture Gardening Tools, Tools and Homeware & Kitchen Accessories. BHL are stockists of a wide range of Fiskars products enabling us to offer fast delivery and low prices on Fiskars products. Flamco Products available to buy from BHL. The Flamco range of products are available across the world supporting the HVAC industry. Designed and manufactured to exacting standards, the Flamco range includes Expansion Vessels, Storage Vessels, Air and Dirt Seperation products, accessories as well as the Brefco Flue Range. Flavel Home Heating products at BHL. Flavel are a long established name within the heating industry. Today, part of BFM Europe, the Flavel name is associated with their comprehensive range of Flavel Gas Fires. Designed and manufactured to exacting standards, the Flavel range includes fires for modern and traditional homes. Floplast Building the Future. Floplast design and manufacture a wide range of products for the building and plumbing industry and applied in domestic and commercial environments. The FloPlast range can be broken down into the following categories, Floplast Rainwater, Floplast Soil and Waste, Floplast Underground Drainage, Floplast Plumbing and MDPE Pipe and Fittings. BHL Stock a large amount of FloPlast which enable us to supply at Low Trade Prices, with Bulk Wholesale Deals for Tradesmen and Stores. This coupled with Fast Shipping Options means that when choosing FloPlast, always consider BHL. FluidMaster Opella available to Buy at BHL. Fluidmaster are leading worldwide designers and manufacturers of Toilet Repairs Products and Toilet Parts for over fifty years. The Fluidmaster range includes Toilet Fill and Flush Valves, Toilet Cisterns, Pan Connectors and Toilets Accessories and Spares. BHL are stockists of a large number of Fluidmaster products ensuring that we are able to deliver your order quickly and efficiently. BHL offer great Low Trade Prices on all Fluidmaster products including selacted Bulk Wholesale Deals. Shop Fluidmaster now at BHL, your one-stop-plumbing-shop. Galaxy Showers available to Buy at BHL. The Galaxy Shower range combines state-of-the art technology with economy, practicality and simplicity of operation for all generations. Galaxy's stunning new range is designed specially to help you choose the perfect shower for you and your family to step into. Included in the Galaxy range are Electric Showers, Mixer Showers, Digital Showers and Power Showers. Gardman products available to Buy online at BHL. Gardman provide a huge range of high quality products for the home and garden including Wild Bird Care, Outdoor Lighting and Candles to Pots, Planters and Hanging Baskets, Gardening Footwear and Gloves and even Greenhouses. The Gardman range is a great addition to the BHL portfolio of products. We are stockists of some Gardman garden products ensuring Low Trade Prices and Fast Shipping. Glow-Worm have over 75 years of experience in providing homes with value for money heating and hot water solutions, Glow-worm has built a reputation on providing straightforward and reliable systems you can depend on. Today, Glow-Worm's heating systems cover not just domestic gas boilers, but renewable technologies, domestic controls and hot water cylinders. Grant Heating Products and Boilers available now at BHL. The Grant range of products include a comprehensive Boiler selection including Oil Boilers and Biomass Wood Pellet Boilers. Grant also design and manufacture high quality Central Heating Cylinders, Renewable products and Heating Controls. Grant offer a comprehensive range of Oil Fired Condensing Boilers including the innovative Grant Vortex range. All this coupled with great prices and superb aftersales means its 'Good to know its a Grant' - BHL are able to offer fast delivery and low trade prices on all Grant Boilers and accessories. Shop BHL for Grant. GreenBrook Electrical have an impressive half a century plus within electrical industry. GreenBrook began manufacturing electromechanical relays and has transformed itself through product development and innovation. Today GreenBrook boasts a comprehensive range of innovative electrical products and electrical accessories for use in homes and commercial properties throughout the UK. The GreenBrook range of products includes RCDs, SafetySure RCDs, PowerX Weatherproof, Wiring Accessories, Bells & Chimes, Indoor Lighting, Outdoor Lighting, Emergency Lighting, Timers, Sensors & Security, Heating & Ventilation, Relays, ToolShield, Super Rod, Tools, Cable Termination, Cable Management, Cable Reels, PVC Conduit Accessories, PVC Conduit Tube & Channel, Steel Channel - Galvanised, Mini Trunking & Accessories Cable Cleats & Clamp, Cable Glands & Accessories, Cable Saddles, Cable Clips, Cable Ties, Self Adhesive Fixing Clips & Bases, Perforated Fixing Bands, Tape, Grommets, PVC Sleeving, Malleable Conduit Accessories, Plastic Junction Boxes, Connection Boxes, PVC Enclosures, Boxes, Switch & Socket Boxes, Adaptable Boxes, Rubber Gaskets, Safeplate, Cable Protectors, Fixings, Accessories & Consumables. BHL are stockists of a wide range of GreenBrook products ensuring Low Trade Prices and Fast UK Shipping. Green-tech are manufacturers of landscaping and outdoor maintenance products. Their winter range of products including grit bins and de-icing products are popular with consumers / businesses and local authorities. Our bulk deals on rock salt are great value, why not contact us for bulk rates on grit bins. Grenadier manufacture the fantastic electric firelighter which gets a fire roaring in just 2 minutes without the use for kindling or chemical firelighters. Grenadier are highly rated by customers and endorsed by celebrities such as Jamie Oliver & Sarah Beeny who rate its ease of use and versatility. The Grenadier firelighter can be used on stoves / range ovens / barbeques and chiminea's. Grohe Bathroom products available now at BHL. Grohe are leading international designers and manufacturers of high quality, luxury Bathroom and Kitchen Taps, Showers and Bathroom Accessories. Grohe offer stylish solutions for modern and traditional homes and prestige commercial developments. Grundfos Pumps available at BHL. Grundfos are a Danish manufacturer of high quality Pumps for a variety of applications from domestic, through commercial to industrial. Amongst the range of Grundfos Pumps are solutions for the HVAC industry including Central Heating Pumps, Macerator Pumps, Sump Pumps, Condensate Pumps and Shower Pumps. Whatever your pumping need, Grundfos will have a solution. We are proud to supply Hagerty cleaning products, Hagerty have been world famous since 1895 for products to care for precious possessions including Hagerty Jewellery Care, Hagery Silver Care, Hagerty Gold Care, Hagerty Metal Care, Hagerty Silver Storage, Hagerty Travel Care and General Cleaning products. BHL stock a wide range of Hagerty products ensuring fast delivery and great prices. If you cannot source the Hagerty product on our website, please feel free to contact us with your requirements. Hansgrohe Bathroom Products at BHL. The Hansgrohe range offers a premium, luxury range of exceptionally beautiful Bathroom Taps, Showers, Bathroom Mixers and Bathroom Accessories. Heatmiser Controls available at BHL. Heatmiser offer a range of innovative, well engineered products designed to control your heating system efficiently and effectively - in both domestic and commercial environments. The Heatmiser range consists of Thermostats including WIFI as well as Smart Internet Enabled Thermostats. Heatmiser products will work with most Boiler systems and Underfloor Heating systems. Heatrae Sadia are leading UK designers and manufacturers of quality Heating and Plumbing products. Heatrae Sadia are famous for their Electric range of products and their comprehensive range includes Heaters, Boilers, Cylinders, Renewables and Spares. Heatrae Sadia's products can be found in properties ranging from small Domestic to Large Commercial establishments. From the HQ in Norwich, Heatrea Sadia are renowned for providing excellent technical and after sales service. Heatrae Sadia are available to buy online at BHL. Here you will find a wide range of HG products, all designed to protect, clean and beautify. Within the HG range are products for Around the house and garden, Bathroom and toilet, Car, boat and caravan, Carpet, vinyl and other flooring, Ceramic tiles, Equipment, Furniture, Gold, silver, copper, Insects and other vermin, Kitchen, Leather, Living room, bedroom and other ..., Natural stone, Parquet, laminate and wooden flooring, Recreation & holiday, Stench, smells & odours and Textiles & clothing. Honeywell are global designers and manufacturers of high quality HVAC products. In the UK Honeywell are known for their innovative Heating Controls, Valves, Alarms and Detection Products and Home Automation. BHL are stockists of a wide range of Honeywell products which ensure that we are able to offer the Lowest Trade Prices on Honeywell. Our range of Honeywell products includes Honeywell Thermostats, Honeywell Programmers, Honeywell Valves, Honeywell Carbon Monoxide Alarms, Honeywell Wireless and Honeywell Smart Internet Heating Controls. When considering HVAC products, consider Honeywell and consider sourcing online from BHL. Horstmann deliver control solutions for domestic central heating and hot water installations meaning more accurate control of time and temperature all around the system. Horstmann design and manufacture a comprehensive range of products including Thermostats, Programmers, Motorised Valves and Wireless Controls. BHL are stockists of a wide range of Horstmann products ensuring we are able to deliver your Hortsmann order quickly and at Low Trade Prices. So when considering HVAC controls, consider Horstmann from BHL. BHL are proud to stock and supply a wide range of Hotspot stove and fireplace renovation products. Hotspot are the UK's number one manufacturer of fireplace maintenance and renovation products enuring your woodburner, stove and fireplace remain in gleaming condition. The Hotspot range of products include stove and grate paints, Hotspot polish, marble, glass and multi-purpose cleaners as well as a comprehensive range of sealing products such as brick and stone sealers and cement, slate oils and other sealing and finishing products. HRM Boilers have been creating high quality, oil-fired-boilers right here in the UK for over 25 years. HRM offer a wide range of Oil Boilers but are perhaps best known for the HRM Wallstar, their wall mounted oil boiler. HRM's product range of Boilers are well engineered offering the homeowner years of trouble free service. HRM boilers are some of the most efficient, quietest, compact and easy to service appliances on the market today and HRM have thousands of satisfied customers throughout the country. BHL are able to offer fast delivery and low trade prices on all HRM boilers and accessories. Insinkerator Waste Disposal Products availble now at BHL. InSinkErator UK (Emerson), is the UK and world’s largest manufacturer of food waste disposers and the clear global market leader. Food waste disposers divert around 20 per cent of household waste away from landfill and have been shown to have a smaller carbon footprint than collection by binmen. The Insinkerator range is comprehensive with a unit designed for the smallest family home to a large commercial outlet. Insinkertor also produce innovative steaming hot water taps. BHL are stockists of a wide range of Insinkerator products enabling us to offer Fast Shipping and Low Trade Prices on Insinkerator products. JCC Domestic and Commercial Lighting solutions from including JCC FGLED ®, FGLED6 ®, FGLED3 ®, Skytile ®, RadiaLED ®, Coral LED™, ToughLED™, Starspot™, NiteLED™, JCC Domestic, JCC Interior, JCC Fire-rated downlights, JCC Downlights, Undershelf and Cabinet Lighting, Wall & Ceiling lights, Exterior Floodlights, Bollards, Exterior Wall Lanterns, Commercial and Interior Lighting, LED Flat panels, Track & Spotlights, Wall & Ceiling lights, Fire-rated downlights, Industrial Lighting, Bulkheads, Floodlights, Wall & Recessed Lighting, Emergency lighting, Microwave sensing and Microwave dimming. JCC lighting are leaders in the lighting market and have been for over twenty years. BHL are stockists of a wide range of JCC Advanced Lighting products enabling us to offer fast delivery and low trade prices on JCC Lighting products. We are proud to be stockists of a wide range of Johnstones Paints including Johnstones specialist range of products. Included with the Johnstones range are an incredible range of paint colours for both interior walls and ceilings, exterior paints and products, wood and metal paints and treatments and woodcare products. Kidde Safety are manufacturers and designers of a wide range of carbon monoxide and fire safety products for the home. The Kidde Range includes Kidde carbon monoxide alarms, Kidde smoke alarms, Kidde fire extinguishers, Kidde fire blankets and even Kidde emergency escape ladders. BHL supply a comprehensive range of Kidde products at Low Trade Prices (including Bulk Wholesale deals on selected models) and Fast Shipping. Choose Kidde for all your carbon monoxide and fire safety products and choose BHL for all your Kidde requirements. Kingspan are one of the largest companies in plumbing and heating who manufacture a wide range of products under a variety of sub brands such as Titan and Klargester. We are working with Kingspan Solar to bring their solar thermal packs at great competitive prices. We offer different packs to suit different needs offering flat panel and tubular systems. Looftlighter now available from BHL. The original Looftlighter, from Looft Industries is an innovative and efficient Swedish patented invention that lights your charcoal barbecue grill or fireplace stove with super-heated air in 60 seconds without lighter fluid. It can also “fast-forward” your charcoal or briquettes and make it possible to start cooking in just a couple of minutes. BHL stock the Looftlighter meaning we can deliver this nifty little device very quickly and at a great, low price. Shop Looftlighter online now at BHL. The Lord Sheraton range available online at BHL provide a range of products that offer protection for everyday items including Furniture to footwear. Utilising traditional recipes and the best natural ingredients, the Lord Sheraton product range consists of leather wipes, caretaker aerosol, leather balsam and wood balsam. Buy Lord Sheraton products online at BHL, stockists of many Lord Sheraton products. The Manor Reproductions range of Fireside accessories and furnishings provide a practical, stylish and functional solution for firesides and fireplaces across the nation. Designed and constructed to the highest of quality, amongst the products in the Manor Fireside range are a great selection of Companion Sets, Log Baskets, Fireguards, Fenders, Log Trays, Coal Buckets, Hod Buckets and a great range of Fireside Accessories. We are stockists of a significant range of Manor Fireside products enabling us to offer you fast delivery and great price on the Manor range. Mayweld are designers and manufacturers of high quality steel tank solutions for oil storage and fuel dispensing. Mayweld offer a wide range of 'off the shelf' steel oil tank solutions along with the opportunity for customers to design their own tank, utilising Maywelds considerable expertise. Mayweld oil and fuel tanks are a quality product at a competitive price. Mayweld also offer a complete and comprehensive range of spares, accessories and related equipment to complement and support your Steel Oil Tank - all available for order and despatch by BHL. McAlpine Plumbing Products are the 'plumbers first choice' . McAlpine began manufacturing and designing plumbing products early in the 20th Century. In 1957 McAlpine became the first UK company to manufacture Plastic Traps. Today McAlpine a huge range of products of the highest quality for use by Plumbers, Tradesmen and Homeowners both in the UK and throughout the world. Available online from BHL, we stock a wide range of McAlpine products for fast delivery and at great trade prices including these great McAlpine ranges - Traps, Shower & Floor Gullies, Waste Pipe & Fittings, Overflow Pipe & Fittings, WC Connectors, Air Admittance Valves and Waste Outlet Fittings. Mira are UK based manufacturers and designers of quality Bathroom Shower products. Most famous for their Shower range of Electric, Power, Digital and Mixer Showers - Mira also manufacture Shower Trays, Shower Enclosures, Taps and a wide range of Mira Accessories and Spare Parts. BHL stock a wide selection of Mira products ensuring quick Delivery and Low Trade Prices. Mr Scrappy produce a great range of unique accessories for use with kitchen waste disposers such as Insinkerator and Waste Maid. If you have ever used a Kitchen waste unit you will know the difficulty in disposing of the food into the waste unit, this is where the Mr Scrappy unit comes into its own and becomes a kitchen essential. The other great products from Mr Scrappy include the Mr Scrappy Brush, Mr Scrappy Cleaner and Mr Scrappy wireless controls unit for use where a kitchen island is present. BHL are stockists of great, unique products for the Kitchen including the Mr Scrappy range of products. This means we can offer you fast delivery and great prices on Mr Scrappy. Myson are leading manufacturers of Radiators, Fan Convectors, Underfloor Heating, Towel Warmers and Heating Controls. Myson products can be found in homes up and down the country and are well specified by both installers and homeowners. Myson offer a comprehensive range of Radiators including Myson Designer Radiators, Myson LST Radiators and Myson Panel Radiators. Myson Fan Convectors are available for install in kitchen plinths as well as wall mounted. BHL are able to offer low trade prices and fast delivery on Myson Heaters and Radiators. OSO are a leading manufacturer of Water Heating products. Based in Norway, OSO have a proud history in the design and manufacture a wide and comprehensive range of efficient and innovative products. Today OSO manufacture products for both the domestic and commercial market including Direct and Indirect Unvented Cylinders and Water Boost Systems. BHL are able to offer OSO cylinders and hot water products at Low Trade Prices with Fast Shipping. Consider OSO for your Hot Water needs and BHL for your OSO requirements. The Parasene range of Gardening, DIY and Homeware products is, as you'd expect from a leading British manufacturer, extremely comprehensive. Parasene have been designing and manufacturing high quality products for a number of years. The Parasene range of products includes items for the Garden, Greenhouse, Fireplace, Spares parts and of course Parsene's famous Heaters. Buy Parasene online now at BHL. Pest problems within the home are seemingly becoming increasingly more common, from Rats and Mice to insect infestations. Proctor Pest-Stop from Pelsis are one of the UK’s leading manufacturer and supplier of great quality pest control products for the retail market. Within Pest-Stop's comprehensive range of market leading products comes the traditional Little Nipper mouse traps, various Pest Stop cages, Electronic devices, Garden Pest Control and humane traps. BHL are stockists and suppliers of many of the Pest Stop range of products enabling us to quickly, discreetly, safely and efficiently deliver Pest Stop products to your home at the right price. Philex are leading manufacturers and distributors of antenna, signal distribution, audio video accessories, computer and electrical power products. The Philex range includes TV Aerials, Aerial Brackets & Fixings, Aerial Amplifiers, Aerial Extension Kits, 4G Filters as well as cables and connectors, power products, AV and a range of Accessories and Spare Part. BHL stock part of the Philex range ensuring great Low Prices and Fast Delivery. Buy Philex now at BHL. Range Cylinders are UK manufacturers of a wide range of Hot Water Cylinders, accessories and spares. The Range Cylinder portfolio includes Vented and Unvented Cylinders for use in domestic and commercial properties. Range Cylinders also include within their range hot water cylinders and vessels for Renewable Energy. Backed by market leading training and support, when considering a new hot water cylinder, be sure to check out Range. Redbacks are manufacturers of cushioning and protection products that are used worldwide. They use a patented leaf-spring technology across their range which is expanding. BHL stock the popular Redbacks knee pads which are more effective and longer lasting than traditional foam knee pads. RM Cylinders are independent UK Manufacturers of high quality Hot Water Cylinders for both the domestic and commercial market. RM Cylinders offer a wide model range within their portfolio including unvented, vented and solar cylinders - which are popular with homeowners and installers alike. In addition to great RM Cylinders, 'off the shelf' RM Cylinders are also able to manufacture bespoke cylinder solutions if required. Roberts Gordon design and manufacture Energy Efficient HVAC Solutions for commercial, industrial, institutional, leisure, retail, agricultural and military applications. Roberts Gordon specialise in gas-fired, low-intensity radiant heaters; gas-fired, unit heaters; gas and oil-fired cabinet heaters; direct-fired make-up air handlers and related controls. Amongst the famous brands from Robert Gordon are the Combat Heater range as well as the Corayvac and Blackheat. BHL supply Roberts Gordon products online at Low Trade Prices with Fast UK Shipping. Ryton Building Products have been designing Vents and Ventilation products since 1972. Since then, Ryton's extensive range of natural ventilation products have been fulfilling the demands of the house building and construction industry. Ryton's range covers all areas of building ventilation meaning that there's a great choice of high quality ventilators available. BHL are stockists of some of the Ryton range meaning that we are able to offer fast delivery and low trade prices on the Ryton range. Salus Controls are available to buy online at BHL. Salus design and manufacture a wide range of high quality, cost effective energy control solutions for use within HVAC markets across the world. The Salus range of controls includes heating programmers, smart internet enabled controls, thermostats, chemicals and filters. Salus Controls are extremely good value and reliable and with fast delivery and great prices available from BHL, Salus should be on the shopping list of anybody looking for heating controls. Saniflo available to Buy at BHL. Saniflo have, for over 50 years designed and manufactured a range of high quality Macerators and asscociated products which have helped property owners install additional bathrooms, kitchens and utility facilities anywhere without major work. The Saniflo range of Macerators is comprehensive with a unit suitable for most domestic and commercial environments. Santon have been manufacturing quality water heating products for many years. The Santon range offers a comprehensive portfolio which now includes Hot Water Cylinders, Vented and Unvented Water Heaters for both the domestic, commercial and industrial market. Santon build and design top quality and highly reliable products. Santon utilise the latest techniques in research, development and manufacturing which helps ensure that Santon's product range satisfies its customers' requirements and provides excellent value for money. Within the Santon range are models names familiar to those in the industry which include Santon PremierPlus which is a domestic unvented hot water cylinder range. The Santon PowerPack is ideal for serving a basin and shower within a bathroom. Other quality products within the Santon range include Santon Electric boilers and heaters and Santon drinking water boilers and chillers. SCR are a family owned company from Sheffield. SCR have developed a unique paint called Insul8ed which is available to buy online from BHL. Insul8ed is an Anti-Mould, Anti-Condensation, Anti-Microbial Emulsion in ONE for use on internal walls and ceilings. Insul8ed Paint will inhibit bacterial growth such as Asp Niger (black mould), MRSA, Ecoli and other common bacteria by up to 99% for the life of the coating, whilst having the benefit of also reducing the rate of which is lost through walls and ceilings when a heating system is active due to the micro sphere technology in the paint thus potentially saving energy costs and reducing carbon footprints. The premium quality Insul8ed Paint will reduce condensation by up to 90% whilst offering a first class finish on internal surfaces. Insul8ed paints are installed in various locations within the British Research Establishment including The British Gas integer property, Main Reception and Main canteen and are used extensively throughout the UK by housing associations, schools and councils. Insul8ed products are eco-friendly non-hazardous, non-toxic and have the potential to reduce your carbon footprint. Seldek by DEKS manufacture a wide range of flashings for slate and tile roofs. Seldek products are high quality, using both aluminium and lead flashing solutions for their products. Seldek products can be purchased online at BHL. Sentinel Solutions manufacture products that protect heating and hot water systems. Sentinel Solutions offer a comprehensive range of products to help achieve best practice protection for domestic and commercial systems, protecting against limescale, corrosion and accompanying problems which can cause inefficiency or failure in systems. Sentinel Solutions products are available to buy Online at BHL. We are Stockists of Sentinel products meaning that we can offer great Low Trade Prices and Fast Shipping. Shop Sentinel at BHL now. SFL Chimneys were formerly known as Selkirk Manufacturing. SFL Chimneys have been manufacturing chimney flue products in the UK for over 40 years. SFL Chimneys have established themselves as one of the leading chimney, flue and exhaust brands in Europe, with the SFL range covering a wide range of applications. SFL Chimneys pride themselves on offering the highest quality enabling specifiers, contractors and home owners to use SFL products with total confidence. Manufactured and designed to the highest exacting standard here in the UK, SFL offers a comprehensive range of chimney systems designed to ensure ease of installation, coupled with products tested and manufactured to ensure high thermal performance and long life. The SFL range of systems are designed to work with a variety of appliances of varying outputs and powered by various fuel options. Smiths Heaters Environmental products at BHL. Smiths Heaters are a British based design and manufacture company that produce a wide range of energy efficient heating products. The Smith's range of products include Fan Convectors, Flame Effect Fan Convectors, Natural Convectors and Fan Asssisted Electric Heaters. Smiths offer Versatile, Efficient Heating with great Customer Service and Fast Delivery by BHL. We also offer bulk discounts on Smiths Heaters, so whether you are a Homeowner, Plumber or Heating engineer or Kitchen fitter, Shop now at BHL for Efficient, Friendly and Technical Service, Low Prices and Fast Delivery on Smiths Heaters. Spinsecure manufacture innovative safety and secure products for the home and commercial environments including products for heating oil security and water security. Spin Secure produce both the TankLock and TapLock product. TankLock is a locking device that will fit to a standard 2" fill point inlet on a fuel tank. Its clever design utilises Spin Secure technology in that when the cap is locked it spins freely and is almost impossible to remove. TapLock by SpinSecure has a unique free-spinning design in order to secure taps and hose bibbs from miscellaneous vandalism, unauthorised use, tampering and water theft. TapLock is made of a hard non ferrous zinc alloy (to prevent rusting) and uses a magnetic locking system that is fully weather and tamper proof. Unlike other security devices TapLock can be keyed alike so that multiple taps can be secured with the convenience of having only one key. Stelrad are leading UK manufacturers and designers of high quality Heating Radiators and Accessories. Stelrad Radiators are available from BHL. We are able to offer Low Trade Prices and Fast Delivery on the huge and varied range of Stelrad Radiators. With sizes up to 3m and a great range of exciting designs, you can be assured of finding the right Stelrad Radiator for your home that will compliement any interior. The Stelrad range includes Stelrad Designer Radiators, Stelrad Towel Radiators, Stelrad LST Radiators and Stelrad Panel Radiators. Shop Stelrad Radiators now at BHL are speak to our team for advice and sizing details. Stovax products are now available to buy online at BHL. Stovax are a British based designer and manufacturer of high quality, stylish and practicle Stoves and Fireplace Accessories. The range of Stovax products available online are the comprehensive range of Stovax Spares and Stovax Fireplace Accessories. Included in our Stovax range are a wide selection of Stove and Fireplace Care and Maintenance products, Companion Sets, Fire Screens, Hearths and Fenders, Stove Pipe as well as Scuttles and Log Holders. We are able to supply Stovax products quickly and at Low Internet prices. Please contact us directly for prices on Stovax Stoves and Fires. At BHL we have an extensive range of Stuart Turner pumps available to suit your needs. We sell the best selling Stuart Turner shower pump ranges such as the Stuart Turner Monsoon, Stuart Turner Techflo & Stuart Turner Showermate. Stuart Turner manufacture a variety of pump solutions such as booster pumps, submersible pumps and macerator pumps. Symphony are leading manufacturers and designers of air cooling solutions to help customers keep their surrounding environment cool and comfortable for both domestic and commercial applications. Symphony provide domestic, commercial and industrial air coolers across various models. BHL are stockists of a wide range of Symphony air cooling products enabling us to offer fast delivery and low trade prices on the Symphony Air Cooling range. Thermoforce are a British manufacturer who are at the forefront of of Greenhouse accessories including Greenhouse Ventilation. Thermoforce were the first company to patent and manufacture an automatic solar powered opener for greenhouses. Thermoforce enjoy a consistent reputation as a manufacturer of quality greenhouse products and accessories which include Thermofor® and Camplex® range of products. Thermoforce continue to invest in research and development which has resulted in a range of products being designed to meet exacting criteria for controlling plant environment, which, together with reliability, ease of installation and operation, has led to award winning recognition of Thermoforce products in Europe. Amateur gardeners and commercial growers will find the Thermoforce product range both competitively priced and cost effective which are available to buy, with fast free delivery from BHL - proud stockists of Thermoforce items. Timeguard are manufacturers of a range of high quality Timers, Lighting, Safety and Climate products. The Timeguard range of innovative products embrace energy efficiency and new technology. Within the Timeguard range are Time Controllers, Immersion Heater Timers, Timeswitches, LED Lighting, Eco Energy Saving Lighting, Bulkheads and Lanterns, PIR Controllers and Automatic Light Switches. BHL are stockists of a wide range of Timeguard products which enable us to offer you great, Low Trade Prices and Fast Delivery. Titan Environmental are manufacturers and designers of high quality Fuel Storage Tanks including Titan Bunded Oil Tanks, Titan Single Skin Tanks and Titan Fuel Depots. Titan lead the way in fuel storage tank design and in-tank technology. Titan Environmental, from Kingspan Environmental are without question, the markets premier product range of fuel tanks and oil tank storage essentials. BHL supply the complete Titan Tank range. We are able to offer a comprehensive Nationwide delivery service, this coupled with Low Trade Prices means buying your Titan Tank from BHL makes perfect sense. Trianco Heating Products are available to Buy at BHL. Trianco have been designing and manufacturing perfectly engineered and superbly produced heating products for a number of years. From Trianco's Sheffield factory, the Trianco range is designed for domestic and commercial properties, the Trianco range today consists of Trianco Electric Boilers, Trianco Solid Fuel Boilers, Trianco Oil Boilers, Biomass Boilers, Stoves, Heat Pumps and a huge range of Trianco Spare Parts and Accessories. Because of our great heritage with Trianco, BHL are able supply Trianco units at very Competitive Prices, Great Technical Support with a Fast Delivery Service. When considering buying Trianco products come to BHL. Vaillant are pioneers in the heating industry, having innovated, produced and introduced ground breaking technology including the first combi boilers. For almost 150 years Vaillant have led he way in developing and manufacturing innovative heating and hot water systems. Today, Vaillant design and develop and set new, high standards in quality, performance, reliability and efficiency, which bring the homeowner greater levels of heating comfort which help to reduce energy bills. The range of Vaillant products incorporates award winning boilers (Vaillant EcoTec Combi, System and Heat Only), hot water cylinders and efficient controls, giving you even more flexibility with your heating system. Vaillant also offer a comprehensive range of renewable heating technologies. Varilight are UK based manufacturers and designers of quality lighting and electrical products including Dimmer Switches, Switches, Sockets, Dimmable Energy Saving Lamps, Wiring Accessories and Transformers. The Varilight range of switches are available in a range of finishes to compliment any decor, including Brass and Brushed Steel. BHL are stockists of a wide range of Varilight products meaning we are able to offer Fast Delivery and Low Trade Prices on Varilight products. Vent-Axia are British designers and manufacturer of ventilation, heating and air conditioning equipment. The Vent Axia range of ventilation products are designed for domestic, commercial and industrial ventilation applications. The Vent-Axia domestic range of ventilation products are designed for use in the bathroom and kitchen and include axial or centrifugal, wall, ceiling or window applications . The Vent-Axia range are innovative and energy efficient solutions which can offer up to 90% energy saving over the equivalent traditional fan. BHL stock a wide range of Vent-Axia fans meaning that we are able to offer Low Trade Prices and Fast Shipping on Vent Axia. Vitcas are manufacturers of heat resistant products for the fireplace and stove industry. The Vitcas range of high quality products stocked by BHL are for use in open fires, free standing stove and cassette fireplaces and include Heat Resistant Filler and Sealants, Fire Cement, High Temeperature Stove Paint, Fireside Accessories and Glass Cleaner. BHL are stockists of some Vitcas products ensuring Fast Delivery and Low Trade Prices. For Stove and Fireplace Accessories consider Vitcas and consider BHL for all your Vitcas requirements. We are delighted to introduce the Wallace and Squires brand. Wallace and Squires offer an exciting range of cleaning and maintenance products including specialist products for the home, garden, workplace, DIY and automotive industry. Included within the Wallace & Squires range are our very own Patio Sealer, the Wallace & Squires Macerator descaler and the Wallace & Squires Caravan Cleaner. Think Wheelbarrows and those in the know think Walsall Wheelbarrow Company, the only manufacturer of wheelbarrows in Great Britain producing an unsurpassed range of products. Walsall Wheelbarrows are a family business that have been manufacturing for over 60 years. Walsall Wheelbarrow Company manufacture Garden and DIY wheelbarrows, Construction Wheelbarrows, Agricultural Wheelbarrows as well as Barrow-in-a-Box. BHL are stockists of some of the Walsall Wheelbarrows enabling us to offer a fast delivery service at great prices. If you are looking for a Kitchen Waste Disposer consider WasteMiad. WasteMaid Elite Food Waste Disposers carry some of the best and most unique features in the industry which include odour protection and a completely balanced grinding system which offers the fastest, smoothest and quiet grinding. WasteMaid offers an alternative to high priced, old line disposers. WasteMaid kitchen disposers offer high quality specification, quality materials and design features while being very competitively priced. Bio-Shield Antimicrobial provides protection against bacteria-caused odours. Waste Maid is the only disposer with Bio Shield, a unique antimicrobial agent, permanently molded into the “wet” components of the disposer to eliminate bacteria-caused odours. This feature also inhibits the growth of a wide range of micro-organisms. Waste Maid is also the only disposer with the Torque Master grinding system which features balanced turntables and balanced armatures as the heart of the system. This, along with corrosion proof components provide for less vibration and longer life. All Waste Maid disposers have modern, permanent magnet motors that are smaller, lighter and more efficient than the old, slow and heavy induction motors. These high torque motors produce 2600 or 2700 rpm virtually eliminating jams before they can happen. Waste Maid disposers also have removable splash guards (continuous feed only) for easy cleaning and replacement and all of our disposers are septic safe. All WasteMaid disposers have the Speed Master mounting system and along with attached power cords make installation the fastest ever. BHL are stockists of the Wastemaid range enabling us to offer a fast and efficient delivery service throughout the UK. Worcester Bosch are leading manufacturers and designers of energy efficient Heating and Renewable products. Worcester Bosch are perhaps most well known for their range of energy efficient Boilers which include models for Gas, LPG and Oil Fired applications. The Worcester Bosch range of Boilers, available now at BHL, include models for both domestic and commercial applications. Worcester Bosch also produce and provide a range of Renewable products such as Solar systems and Heat Pumps as well as a comprehensive range of spares and accessories to complement the Worcester range. Zip Water Heaters along with Zip Water Chillers are designed and made in Australia. The Zip name and brand in famous throughout the world thanks to their range of innovative and market leading products. Zip Instant Water Heaters along with Zip's range of filtered drinking water products are specified throughout the world and can be found in commercial and leisure environments as well as homes. You can be sure of a well made, designed and manufactured product with Zip and Zip are now available to be bought online at BHL. Experience the comfort of a Smart Home: Smart Thermostat, Security Camera with Face Recognition Weather Station and more. Save energy and money with these smart options now available on BHL.co.uk for brilliant prices.
2019-04-20T10:26:00Z
https://www.bhl.co.uk/manufacturers.php
Are you struggling to compete in a crowded online niche? Set-up a simple TV-video studio in your house or office and dazzle your fans with videos that show off your products or services. A studio allows you to create lots of videos quickly. Set up your own shopping network. Seriously, you could with a simple, but well organized video production studio. Look at QVC with the mind of a TV producer and what do you see? A couple of people sitting on a simple set, holding up products, and chit-chatting non-stop. How easy is that? Setting up a studio allows you to crank out lots of videos quickly. Studio production method uses multiple cameras and microphones at once. It’s all edited live, on the fly, like a live TV show. This saves TONS of time in editing. Post production editing is incredibly time consuming and studio production eliminates it. “Live-to-tape,” or “as-live,” is an expression in TV production that means it is done in a live manner but recorded for playback later. If you make minor mistakes, you keep going, just like you would if it were live. Live-to-tape is a great method because it is fast and inexpensive. All studio production, even if you do edit it some later, is MUCH faster, and therefore cheaper than standard field production, which is one-camera technique and post-production editing. WHAT EQUIPMENT DO I NEED TO SET UP A VIDEO STUDIO? Today, an entire video studio can be run using one high-powered computer. The process can be referred to as desktop video production and the possibilities are incredible! Here is a video tutorial demonstrating such a system. This video profiles a small country government TV production department that uses a NewTek VT5 to create finished programs that rival what it used to require a much larger operation to produce. One of the most popular programs created by this small gov’t station (Williamson County TV, or WC TV. I used to work there!) is high school football. The small crew of high school video production students is able to produce broadcast quality shows using the VT5. Watch the video and you’ll be impressed at the incredible quality of this high school football game video. Without a system like the VT5, such production would simply be out of reach for this small school system crew. Below the video, there is a long post and many comments about more tradition video studios. These studios require a multitude of components, such as a video switcher, an audio board, and video record devices. You can learn more about the NewTekVT5 on this post here at Video Production Tips. Even though the methods themselves are very different, much of the equipment needed to set up a studio is the exact same needed for field production, you just need more of it. If you want to do both studio and field work but don’t want to buy two sets of equipment, you don’t have to. Much can be the same. You’ll just have to get used to putting your studio together and tearing it apart again. Think of all the great exercise! Typically, a TV studio has at least three cameras and some way to switch between the cameras live as the show is happening. Editing live is an incredible time-saver. Using multiple cameras and a video switcher (or computer software) to edit your show on the fly was originally invented in Hollywood when TV came along as a cheaper and faster way to produce shows. Movies had traditionally been made using one-camera technique and still are today. If you are going for meticulous high art, one-camera technique allows you more precise control. Studio technique is primarily done for budgetary reasons. Although many variations are possible, every video studio follows this basic layout. Usually, a TV studio is divided into at least two rooms. The studio where the lights, camera, and action take place is next to a separate “control room” where the director and technicians are. It helps for the control room people to be able to see into the studio so a window is usually built in. Keep sound proofing in mind; you don’t want the control room noise to be picked up by the mics in the studio. If you are a lower budget operation, the biggest concern you should have is locating in a quiet place where you have as much room as possible. You also need to have control over the lighting and sound. Rooms that are built for the purpose of a video studio would be built without windows to maximize lighting control. Usually, a video studio will have lights mounted on a heavy metal ceiling grid. That way you can easily put them wherever they’re needed. If you do not have a full grid, you can hang lights to some types of ceilings using c-clamp-like mounts. Lights hung from the ceiling give an angle to the light that seems natural. Plus, hanging lights from the ceiling keeps them out of the way. Run your cords along the ceiling and then tack them down the wall. Lights hung from the ceiling is the best way to do it, but is not 100% necessary. You can use portables. Portable lights on stands take up more room than those mounted on the ceiling but your shot will still look OK and that’s all that really matters. HOW DOES A TYPICAL VIDEO STUDIO OPERATE? The director or technical director operates the video switcher, going from shot to shot when appropriate. The director also adds graphics when appropriate. All video sources are plugged into the video switcher and are under control of the director. A large operation will have separate components and operators for graphics, pre-recorded tapes and other sources of video such as satellites. A small operation can get by with one director and all the cameras locked down on tripods. Today, powerful computers can take the place of all the video and audio switchers and graphics components, which makes it even easier to set up a portable studio. You can do it either way. Set furniture- usually something homey. Avoid detailed patterns. Go for solid colors that blend. Synch up all the video during editing and choose the best shot. You can do this easily by stacking the synched video lines on top of each other. Then just chop out the video shots you do not want, leaving whichever one of the three is best on top. If you do this correctly, it’s actually very fast, not at all time-consuming like the old cut and splice method or the analogue methods used for editing years ago but now obsolete. If you want even more detailed information on the equipment you need to set up a functional video studio, see this post. It contains an even greater amount of information specifically about the equipment needed than this post. Thanks for reading Video Production Tips. I always recommend shopping and researching video equipment at B&H Photo. They carry absolutely everything and have great prices too. Can Final Cut act as a live video switcher? Can Final Cut Pro act as a live switcher? I have used final cut as a component of a studio doing live shows. In our case, we used it for graphics, not as a live video switcher. Although final cut can do a lot, I can’t see using it as a live SWITCHER. It’s not meant to function in the same way. I do not think you could input multiple video cameras live into final cut. You can get real cheap simple switcher for your cameras and other video generators. Then a computer with final cut can be inputted into the switcher as one of your video sources. Thanks for visiting my blog, I hope that answer helps you. Cost depends on what you buy. On the web, B and H Photo is a great place to research video equipment. They have EVERYTHING. please could you ket me know the kind of light i would need for a video studio that is approximately 15×15 ft big? wpuld also need recommendation for mics….. It would be great if the light/ equipment specifications are specific…. Is this studio going to be a permanent set up or something that you need to be mobile? Specifically what you buy will depend on that and many other factors. For a 15 x 15 studio, you would probably want at least 3 lights. Make sure to buy diffusion equipment with them, such as soft boxes or umbrellas. Soft boxes give a more diffused light and are more expensive than umbrellas. Go to B&H photo and look at their light kits. You can buy a kit with all the lights and accessories you would need. You do not have to buy them one by one. Lowell is a really good brand, but then again, I’ve never known of a “bad” brand of lights. As for microphones, you probably want Sony lavalier mics. They start at about $150. Sony lavalier mics are really good for the price. Those would be wired microphones. Wireless are much more expensive and are usually not needed in a studio. Buy one microphone for each person that will be speaking. I am looking to re-vamp our current small studio. I use a very dated Trinity computer-based video switcher. Is there anything like it on the market today? Thanks! I just looked on the B&H photo website and they had 84 pages of results for video switcher. Each page had about 10 pieces of equipment so roughly that is 840 video switchers to choose from. The computer based ones of today are great because they have the capacity to replace the need for a graphics generator and audio switcher. they are very versatile and make remote video production much easier. Lorraine Grulas last blog post..Online Video Marketing: What is Good Enough? Director to run video switcher and supervise the floor manager. Audio engineer to place all the mics and run the audio board. Graphics person to run the graphics generator. Video tape operator to run the machines used for videotape inserts. Needless to say, that is a lot of people and may not be practical for a small operation. If the shows you are doing are simple, you can get by with far fewer people. I have actually run a small studio entirely by myself. I ran the video switcher during the show and set up everything before the show myself. Cameras can be locked down in a standard shot. Mics can be preset. By “simple show,” I am referring to something like a talk show with one host and one guest and no one moves out of their chair. For something that simple, having all those crew members would be overkill. But if you are recording a rock band with an audience and the musicians are dancing around all over the place, you would need most of those other positions. We have designed a studios in our new office building (30′ x 20′ – including control room). The cost of insatllation seems high…around $200K. Is that normal? Do you have any recommendations for installation experts in the San Diego CA area? What are your thoughts on the following equip. Any recommedations where to find good pricing? Would looking for “used” equipment be worthwhile, and if so, any suggestions where?? Many thanks for your thoughts!! $200,000 is indeed high. I assume that cost includes all the equipment. Are you buying everything from one company and having them install it too? When I worked for the school system (it was a rich county) we outfitted nice TV studios in our schools for about $70,000 to $100,000. These were VERY nice studios that easily would be appropriate for most corporate video settings. They were not much if you compared them to what NBC or CBS has, but you know, all things are relative! B&H Photo is one of the best places to research and buy equipment. They carry EVERYTHING. I am sorry but I do not know anyone in San Diego. Used equipment can be a great thing, but like with used cars, you can run into trouble too. If the person doing the buying knows a lot about equipment it can help you save LOTS of money. If you want to come down off that $200,000 price, I know you could do so if you went for less expensive equipment. Do you REALLY need HD cameras? What are your videos going to be used for? Video equipment can be terribly expensive and no doubt you could get yourself a multimillion dollar studio if you had that much money. BUT, if you do not want to go as high as $200,000 you do not have to. If you want more information, and if you want me to research all the equipment you listed and recommend alternatives, use the contact us to send me an email. Or, you can just write [email protected]. I am trying to put together a list of items and potential costs needed for a 9-month news broadcast for a small university’s journalism program. My main question is about having a virtual set vs. the standard news desk. What sorts of cost differences are there? Additionally, what sorts of equipment would the virtual set require? The plan is to have some sort of green screen regardless of set type. Any thoughts? Thanks. Thanks for visiting video production tips! You do not say what your budget is, but I bet it is tight. You can get all kinds of virtual sets that look spectacular that do not cost too much. Since you are going to have green screen anyway, seems to me that might be easiest and give you the most variety. What a “real” set costs depends on what you put in it. Back when I taught video production in a high school, we were able to get an old news set from one of the local TV stations that was building a new set, so it was a free donation. It looked awesome and the students thought sitting behind a news desk they had seen on TV a million times was quite cool. If you built a real set, you would probably not be able to afford one that is professionally built. Hiring professionals to do it would cost a FORTUNE. One of the TV stations I worked for had a set that had cost over a million bucks. They WAY over spent in my opinion. On the other hand, I’ve seen simple sets with nothing but stuff from Goodwill that looked reasonably good and only cost a few hundred total. How much room do you have? That might be a consideration too. To do a virtual set, all you need is the green screen background and the image of the set. I’ve seen real desks added to those sometimes but not always. The virtual sets can really be spectacular. Thanks for all the tips. You do a lot of writing…that’s very kind of you to share your knowledge with us. Well, I am very new to all this… and I have this project of making a simple studio but that works good as a start. Your post was perfect because I was looking at what I need to set up a simple studio and didnt think it was going to be so hard to find the answer online…but as a matter of fact it was. So thanks to you I’m done looking. I will do some research for the list you put up, but I was wondering at an avarage price I should be aiming at. Since there are so many options and I am new to it all, it becomes hard deciding on what to get. My budget will come from donations… but I am looking at 15-20K. Is it possible to get something with this much? Can you tell me how to find the computer based video switcher? So glad to hear from you and so glad video production tips could help you! You can get a decent video production studio for 15-20K, but you will need to watch your budget. Decide exactly which pieces of equipment you will need for your studio. Do you want 2 cameras or 3? Then you can start dividing your money up realistically. Then you can look for stuff in that price range. If you get wired mics instead of wireless that will save money. You can get great cameras for 2,000 or even 1,000. A couple of simple lights will do. I always turn to B&H photo for video equipment. They carry everything. You could probably even get a sales rep to help you make decisions. Do you have any experience with “channel storm live channel pro”? Would you recommend any other? I have B&H up already. I have heard great things about channel storm live channel pro but have never personally used it. It sounds excellent. Good luck setting up your studio. I’m so happy to have come across this site. Talk about GREAT INFORMATION! You are the best, to take time out and write out detailed information as much as you have above. THANK YOU! Well here is the deal, as many above, I am working on setting up a simple video production studio-or so i think! I would like to offer video & photo shoot servces. I also want to use this to record talk shows. So my perception is, I need a studio(photo & video shoots), control room, editing room. I have compiled the list of equpemnts and matched them to the ones listed above. I want to get your input on makes & models that are at a good price range. Including still cameras, in addition to any advice you can offer. Thanks for your nice note. I am so glad you find my site helpful. This single post probably attracts more visitors and comments than just about any other. I wish we could go equipment shopping together. I’d love to help you pick out all your stuff. I always recommend B&H Photo because they carry everything and their prices are very good too. What is your budget? That determines so much. Without knowing your budget it is hard to make specific recommendations. Do you by any chance of access to any studios near you that you could visit? Are there any schools that offer video production? If so, maybe you could go by there, see what they have and talk to them about how well it all works together. Back when I worked as a high school TV production teacher, it took about 80 grand to outfit an entire studio from scratch. We had cameras that were about $12,000 each. I reviewed an incredible new camera from Panasonic the other day, the AG-HPX300. Here is a link. It may be more than what you need, but it sure was an incredible camera. I always recommend Mac computers and Final Cut. For the heavy-duty task of video editing, Macs do a better job and are more stable. I am convinced of that beyond a shadow of a doubt. Reading between the lines on your comment, one suggestion that pops into my head is that you should have plenty of backgrounds. Backgrounds need to be easy to move. This means they need to either be on wheels or they need to be movable curtains. (Or roll-up-able like a window shade) You can even make cool-looking props and backgrounds out of cheap stuff like styrofoam. It is amazing what can look good on camera! Virtual sets can also really add to the creative possibilities without taking up any room at all. Using virtual sets requires green screen. Even if you do not use virtual sets, green screen is very versatile. So make sure to have one area of your studio devoted to green screen. It helps to paint the floor green in addition to having a green cloth. Painting the floor is easier than having to lay cloth out on the floor, plus people will trip over the cloth, still some studios use cloth because you can move it. Can’t move paint! Thanks for your prompt response! Once again, YOU ROCK! I would visit a studio on monday and get some insight on what equipments hey have. That way, I would have more detailed questions for you. Hey Loraine, great job. Kudos. I am looking at setting up a video editing & sound production studio, (post production actually). What is your take on this as per equipment. I will really appreciate a detailed list of hardware and softwares to start with. Note: My budget is just 15 grand. For video editing, my money is on a mac pro with Final Cut. If you are going to do a lot of video editing, get the biggest, baddest, most-of-everything Mac Pro you can afford. Get multiple hard drives, at least two internal hard drives and however many externals you need for your work load. Mac operating systems or more stable. No two ways about that IMHO. Mac pros are huge and powerful, which is what you need. Big league video editing takes power unless you want to crash all the time. Also, get a big monitor, or even two monitors if you can afford it. Detailed Video editing takes a lot of screen space to see what you are doing. Sound production alone is not my forte so I want to stick with video editing. I will say that one cable that is essential is one with an XLR on one end and a USB2 on the other end. This way you can record audio tracks directly into final cut. That will save you a step. Obviously if you are mixing professional sound production with video editing you need to directly transfer lots of audio, so this cable will be your best friend. Get a REALLY GOOD battery back-up power supply system with PLENTY of capacity. A huge computer like what I am talking about draws lots more power than a standard PC. Talk about apples and oranges! If your APC back up does not support enough wattage it does you no good. I will taping (4) 1 1/2 hour lectures. The presenters want them on DVD’S. preferebly (2) lectures per DVD. I have 2 questions. #(1) should I burn a 3 hour DVD or a 1 1/2 DVD. #(2) I am recording on a JVC GR-JVL720 mini DV, should I record directly to my computer or an external drive and what type of microphone should I use to capture the audio while recording. Is there something I should attach to the camera or computer. That is 6 hours worth of lecture. Whew! The amount you can get onto one disc depends on the file sizes. The files size will depends on which format you choose and what kind of resolution quality you select. You will lose resolution quality if you go down in file size. Whether you want to make that trade-off to get more on a disc is up to you. The usual process is to can record it on the actual mini dv tape and then capture that footage later in your computer. It always helps to have an external hard drive because that gives you much more storage room but you do not have to. You might be able to simultaneously record it on your hard drive if your camera will output as you record but most cameras will not do both at once. Plus, you usually have to output your video when the camera is in VCR mode, not camera mode. It can not be in both at once. To pick out a microphone, look first to see what kind of microphone jack your camera has. Any microphone that will fit into that plug will work. It will either be a small mini jack or an xlr input. The microphone should be close to the speaker’s mouth. ustream has various ways in which you can utilize their service. The most common way is to stream something live on their site, then embed it on other sites. But you can also use them to stream it live on any other site you have. A webcam will keep it simple and for most needs would probably be sufficient. You might need more, depending on what you are actually trying to accomplish. I hope this helps you. email me if you need to. Hi, you are doing a wonderful job,God gives you more grace to your elbow! I need you to give me a simple budget for video production studio as for a beginner, and if panasonic MD10000 can do the job, moreso the list of complete equipment for the studio. I looked up the Panasonic MD 10000 video camera and it would indeed do a good job. Did you notice it is on the PAL standard? I do not know where you are from, but the PAL standard is euopean, not USA. If you leave where they use PAL and not NTSC, then this camera would be great. This post contains a liost of all the equipment you need. Please copy off the list that is already in this post. To Jeff: if you want live switcher application, try boinxTv. It does what you need. Make sure you have a Mac with a high end graphics card. (i.e. Macbook pro, iMac and Mac pro). Thanks a million for the great tip. boinxTv is absolutely incredible and I need to post more information about it. It is amazing to me how software can replace so much equipment. First it was editing. One program can now do what it used to take a room full of equipment to do! Now with software like boinxtv you don’t need half of what I talk about in this article. Software and technical advancements make video production more accessible to the average Jane and that of course is a wondrous thing IMHO! The minimum cost for setting up a video studio is going down all the time because everything keeps getting consolidated into the computer and different software packages are replacing some of the equipment needed so that makes it much less expensive. Today you can set up an entire studio for less than five grand. I work in a Yellow Pages company, and I am proposing a plan to set-up a small studio/ art department for developing small 20-45 second ads for our clients, which will eventually be displayed online or on a mobile based GPRS browser. We basically want to get into the video yellow pages marketing segment, online. I have a very basic idea of video production as I have worked on short films and a few editing jobs before. But I could really use some help figuring out what are the components I need to look at in setting up such a studio, lest I forget something important in my proposal to the big-wigs. I am looking at a small set-up with about a maximum of ten people, including camera operators, creative ppl etc. I’m looking to shoot in digital, HD possibly, a small studio set-up with lighting to shoot basic ads. Though most of our clients would want us to shoot on location at their premises. We will need a sound booth set-up for VO work. And basic windows based editing systems. These are the basic things I see in the set-up, but I have a nagging feeling I am missing something(s) extremely important. We are based out of India, so the prices are definitely going to wary. But please do give me, what you think will be an estimate to set something like this up, with any other components you think would be necessary for such a set-up. You ask some really good questions. It is difficult for me to give you a cost estimate because what level of equipment you choose would make a huge difference. In other words, you could use $1,000 cameras or you could use $100,000 cameras. You could save money by getting the software that integrates many of the studio components listed above into one software package. If you are doing online Yellow Pages, I personally do not think you need HD. If you are going to be shooting on location, you will want portable lights and perhaps a portable green screen. It does not seem to me that you are missing anything. Have you thought about things like cables? If you would like for me to spend some time researching equipment for you, please contact me for personal consultation. Thanks. Lorraine. Interesting site with some useful info. However, the statement from Internet Video Gal that “today you can set up an entire studio for less than five grand” is misleading at best. There is no way you can adequately equip a multi-camera facility with audio, video, lighting, communications etc… at that pricepoint with anything approaching pro quality. An “internet” studio with a webcam, computer, and mic maybe, but not a facility that can withstand significant use and provide reliable, high-production values results. Of course you can not set up a PROFESSIONAL studio for 5 grand. I never said you could. This site is aimed primarily at people who want to do internet video. Many people who make professio0nal video can not get around the fact that not every video needs to be top notch technical quality and that cameras less than 20 grand are worth using. You absolutely COULD set up a studio worthy of making quality video for 5 grand. And you could go WAY beyond a webcam. If all you need is a webcam is does not take 5 grand! You can get a webcam for 50 bucks. If you used home level video cameras, just a few lights and a cheap switcher (or now software) you absolutely could set up some kind of small studio in your house for 5 grand or less. I’ve done it and so have some of my readers. I am not telling people they can set up Warner Brothers studios for 5 grand. Firstly, THANK YOU for sharing your knowledge with all of us who aren’t as knowledgeable as you. I am looking at setting up a small video studio to film some tech help videos, what kind of equipment do you think I would need? i already have a sony camera. Thanks for any help you could give me. Good to hear from you. Glad if VPT helps you. From the little you have told me, I’d say it might be best for you to get an edit system to go with your camera and not set up a studio like I talk about in this post. Get a real powerful computer for your edit system if you go that route. I have a Mac Pro. If you have one camera and an edit system, you can do a lot and that is more functional for most situations and certainly if you are on a budget I think that is a more practical way to go than trying to set up a multi camera studio. I have been looking at the Adobe creative suite production premium. For a computer, I already have a MacBook Pro. Is there any other software you could recommend? Adobe creative suite production premium is FANTASTIC. You can do so much with all of that. For basic video editing, you could probably also use the imovie on your Mac. Or, if you want more control and capacity go for Final Cut Express or Final Cut Studio if you can afford it. FCS is one heckuva software package that does just about everything! Then you should be good to go! Good luck! Keep in touch. This is a great forum, and thanks for all the information. By the way, I see that you recommend B&H for video products; I am a B&H satisfied customer. Now, look at my production at http://www.cneworld.tv We are trying though, for a home garage mini studio with virtual set. My question is about the cost it will take to rent a full studio, space and equipments only, for a production. I know you will want some details; 25×25 feet space including green screen, computers and all the software needed, cameras and all the accessories (tripods, mic. etc. ) lighting. Just give me a rough idea base on your knowledge. So glad to hear from you. B&H is indeed the place for video equipment! I looked at your site and think it is great. Congratulations. If you want to rent out a studio I would suggest you contact the TV stations in your area, particularly the PBS station or the small independents. They will give you the best rates. You will probably pay by the hour, or get a half-day or full-day rate. It might be up to $500 an hour. That should include people to operate all the equipment plus the equipment. Most of the places I worked where they rented out the equipment actually preferred staffing it with their own people since they were well versed in the equipment. You might also try calling up some area businesses like wedding videographers or event producers who have mobile studios. Maybe they could come to your location. Find those who specialize in lower budget productions or else it will add up to the $50,000-$100,000 range real fast. Well, if you want a certificate for completing the home study course that could be arranged! I should make a pdf downloadable one. Cool idea! Thanks! I would like to start up a local-cable-tv-channel at a prime location in India? I have no idea about any technical requirements for the same? Could you kindly assist what are the basic things should I considered for setting up the same? Good to hear from you. Setting up a local cable tv channel sounds exciting. If you read this article and all the comments, plus click on the link in the post to the companion article that also has a lot of comments, then I believe you will get plenty of information about what kind of equipment you will need. what would i need to upgrade a casting studio, from tape recording workflow to tapeless? I know i can record directly to a computer hard drive in the studio with adobe’s on location, but then, how do i connect the files on the studio computer with the other editing rooms (wich are next to, but in other physical rooms?(i mean with kind of conection) and then to the net? Without actually looking at everything it is a tad hard to say for sure but probably with firewire. Maybe USB2. You might need some converters. What kind of cameras do you have and what do they output? Do you need to have them connected all the time? If not, consider using external hard drives and those can be connected or moved. If you would take the time to read through this entire post and the comments, you will see lists of all the equipment you need to set up a video studio. I have the following question: what would it take to set up Internet TV video studio? Ideally we want to do live broadcasting of panel discussions. In addition we’d like to be able interact live with remote audience. Your momma was real clever with your name! 🙂 For panel discussions you would really need at least 3 cameras and each person would need their own mic. If I were you, I personally would go get a New Tek VT5 if I could afford it. Interacting live with a remote audience would be more of a function of your video platform not your video equipment. Covideo will let you interact with audience members face to face if they have a webcam. There is a chat function too. iStream is a very popular choice. You have audience interaction via chat. I hope this helps you. Thanks and good luck! Great link you are to a yearning world of videographers and independent filmmakers. Keep up the good work. I will appreciate a detailed guide on how to connect my audio link to my console and to the mixed video. Also, what can you advice about JVC Everio GZ-HM400 HD Camcorder PAL and JVC GY-HM100 HD Camcorder; and the kind of equipment they’re compactible with. Thanks for visiting Video production Tips! A PAL camcorder would be one set to the European technical standards, NTSC is the American version. So please buy a camcorder that will work in your country. The JVCs you mention are both very nice camcorders. When it comes to your question about connecting your audio link to your console and to the mixed video I must confess that I am not 100% sure what you are asking. Adding audio to a mixed video is done in editing of course; you simply add the desired audio to a new audio line in your editing timeline. That may not be what you’re asking though. Hi I want to set up a professional modern video production house in my country a studio that can host audience and i need help on the necessary equipments to buy and where to buy them. I am writing a business Plan for a TV station and I am having a problem writing the technical part of the whole project! I will really appreciate if you help! Looks like you have your work cut out for you! The crew members you will need are listed in the post. I will email you my equipment catalogue so you can read more about cameras to decide which ones are right for your studio. That should do it! Good luck. I am working at an international college and the management are in the process of setting up a new course in mass communication and advertising. They are planning to convert one of the lecture rooms into a broadcasting/recording/editing studio, and I’ve been put in charge of doing the layout and design of it (because I have an interior design background). I’ve no experience in designing studios and after doing a little research, I found the technicalities quite hard to understand. Thank God I came across your site and it made things so much simpler. However I would still hope if you could give me some advice on how to set up a broadcast/recording studio.. The main difference here is it is for students to learn, and it does not have to be too geared for commercial production. In your opinion what kind of set up or equipment would be just right for students to learn about basic broadcasting? Also, I’m not sure which room should be adjacent to which other room, or what equipments should be grouped together in a space. I am planning to visit a radio station to find out more and hopefully I will have better questions to ask later. I am glad you found my site too! I am happy to help. When I taught TV production in a high school, I came to believe that for total beginners, the equipment should really be kept simple. In my opinion, what people should learn first is the storytelling/artistic/creative aspects of video making, not the highly technical stuff. When I tried to give my students the huge, complex professional cameras they were overwhelmed and could not really get past that to function well. But when I handed them a home camcorder model, they joyfully went out and made great videos. Now, having said that, I was grateful for the huge professional cameras too, I certainly thought they should learn how to operate them, but that came second, after they got the feel for what they were doing with simpler equipment. So I guess what I am saying is that it is good to have two (or even more) levels of difficulty for students as they advance. We kept the big cameras in the studio where I was there to help. The smaller cameras were used as field cameras. Using less expensive simpler field cameras also made it possible to have a lot of them so all students could be accommodated and we did not have to have a waiting list. Now, as far as layout of the studio goes….make sure that you have a control room that is sound proofed from the studio, but one where people in the control room can easily see what is going on in the studio. You communicate between the two room using headsets, but for a learning situation, it is critical to be able to see what is going on with your eyes, and not just with the cameras. Usually this is accomplished with a big window. You can not just have an open space because noise from the control room will interfere with the audio recording going on in the studio. The narrow area you describe sounds good for a row of editing computers. Students absolutely need to learn editing. I always recommend Macs for video editing but whether you get PCs or Macs, get powerful ones with lots of speed and RAM. If you have a little something in your budget for professional consulting, I can help you even more and will lay it all out for you and give you a loist of equipment to purchase. Drop me an email if you would be interested in that. In the meantime, I hope this information helps you out! Thanks so much for the info! I am impressed that you really took the effort to answer every comment in this page. Actually just a couple of weeks ago before I was tasked to do this studio, the management has apparently came out with a list of equipments that they intend to purchase for the studio. I’m not sure if they asked for any professional consultation on this, but I got the list anyway, and I think it will provide an idea of the college’s budget. They’ve selected Panasonic’s VariCam 3700 or 2700 and Sony’s HandyCam; as for studio lighting, they’ve listed a 2.5kW compact HMI, Aspherics light head 100W/150W tungsten, Dedolight, standard barn door (I have no idea what is this for, lol) and a power supply 24V/150W(230VAC). The remaining equipments are a control panel, a telco interface, a mixing engine, AES, Audio I/O and a Mac. I think they’re being very very general with the things to buy yet as nothing on it are specific. On another note, what are the differences between a broadcast studio and a recording studio? Thanks again for your explanation! The main difference between a recording studio and a broadcasting studio would be one has transmission capabilities and one would not. A barn door is a metal gadget with movable slats that you attach to a light to help you direct and point the beam of light. I am glad if this information in this post helps you. All of the comments on this page add a ton of info! I always answer comments if they are sincere comments and not spam BS or some transparent attempt for an irrelevant link back. I get tired of those but enjoy helping everyone else. Thanks! thank you so much for the great help you’ve been rendering. I want to set up a complet tv studio that will be airing the following programmes; news, sports, movies, musics, documentaries, talks, intervies/views etc. With a work force of about 30 persons. Pls i want you to mail me the list of equipment needed and their prices. I also want to know if my budget of 350000 will be too much or too small. Thanks and God bless. Precisely what equipment you purchase depends on several factors so I can not really mail you a list of specific equipment and the prices. You can set up a fine studio for $350,000. $350,000 would get you top-notch professional equipment. If you need to get by for less, you can. I will email you directly or you can write to me at [email protected] and together we can figure out precisely what you need. I’ve read this whole post and I got a lot of really good information from you. I have a background in professional audio, but know next to squat about video! I’m checking out BoinxTV and have a couple of lower end cameras in mind….I’m setting up a really simple, portable, one-camera video setup and I have a question about lighting. I’m looking at inexpensive lighting kits on ebay, and I notice two basic types….white umbrella that the light shoots through, and silver reflective umbrellas that the light reflects off of. I also notice florescent versus halogen. Could you comment on this? There are some pretty inexpensive kits, but I don’t want the color to suffer for the sake of a few dollars. Beyond color temperature, the different types of lamps have pros and cons. Halogen gets hot as heck and uses lots of electricity. However, it is a fantastic, bright light that works well for video. The newer florescent lamps stay cool to the touch and use little electricity. They provide a nice diffused light for video. Not quite as intense but that is not much of a con really. Thank you Lorraine! That was a very informative reply to my question. Any comment you have on that are greatly appreciated. Thank you again. The differences in the methods you describe are going to be subtle. Passing the light thru the umbrella diffuses it and so does bouncing it but just to slightly different degrees. The softbox set-up also has a few variables, like you describe. The cloth checkered thing you attach to the front of the soft box helps focus the light it is not an additional diffuser. The cloth front of the softbox itself does all the diffusing. When you get into professional lighting gear, there are multiple ways to achieve diffused light. All of them are fine, just slight differences in the amount of diffusion, direction and the intensity of the resulting light. There is no one right way or wrong way. I hope this helps. The issue you describe is caused by the software, not the computer itself. If you can not get Mac there in Zambia I would not worry about it. A PC can be a great editor too. Here is what I think is happening. The software reads each movement as an independent clip. Is this because of the time code setting on your camera? The edit software reads either the time code or the control track laid down on by the camera. If the time code setting is not set to record continuously, then each time you pause the camera there will be a change in the time code and therefore the computer will read each as an independent clip due to the time code break. If you change the time code setting, it will keep a continuous time code going even through pauses in your recording. Then the edit software will not see a time code break so it will not create a new clip. I hope this explanation makes sense. I am not 100% sure that’s the problem, but I’d bet good money on it! Try that and see if it helps. A thousand thanks for your quick response. I will try that. Imagine a you have a 3 tapes shot in LP and you end up with a lot clips in your bin folders. It was cumbersome. Again thanks a million times for your response. Yes, that is very cumbersome. A pain in the tush one might say! Another thing…Always shoot with the tape speed rolling the fastest. When you say you shoot in LP, are you referring to “long playing” which means the tape is rolling slower and you can pack more stuff onto it? If that is what you meant by LP I would advise you to stop recording that way. Your footage will be more grainy with less image quality in the LP mode. Just another tip! I am looking for 3 professional studio cameras,(new or used)but I have a low budget about max 20000 euro`s. What do you propose me to buy? 20,000 Euros isn’t that low of a budget! Here is a real nice Canon for just under $6,500. Technically it is a field camera but you can use it in the studio. I have a full setup 10K transmitter and full tv studio equipment available from channel 48 in columbus ohio for sale. I’m interested in doing some sports marketing, what type of equipment would I need for video editing. Where’s the best place to find Industry Software? To edit video, you need a computer and some video editing software. There are dozens of software products to choose from. Everything from free programs to ones costing thousands of dollars. You can use any kind of computer, but the bigger and faster the better. Here is a link to a blog post about the best free editing programs. I have not personally used the Boinx TV but I think it looks great. It is recommended by several very trustworthy sources. It would probably be a good and economical option for you. With your 22 new imacs, it sounds like you will be having your students do lots of video editing. Get cheap, easy to use field cameras. With students, the first things they need to learn have to do with the cooperative, collaborative process of making video. Hi there- thank you so much for this amazing page. I do not have any production experience, so my questions may seem confusing/silly- please bear with me. I would like to set up a little studio for streaming an on-line game show. I will present it myself and would like to manage all of the equipment too (a one-man show). My budget is £10k for the entire studio set up. What are some cameras out there that are around the £1-2k mark that are suitable for an online show? Can you recommend any? I really prefer to have just one camera sitting on a tripod. My basement is where I am setting up- the ceiling is only 8ft high- so will tripod lighting be better? Some websites are selling ‘all in one’ studio packages that include lights and background… are they a waste of money/bad quality materials- most of them are in the early hundreds price range. The basement does have some overhead noise filtering through the walls- I can hear motorcycles rumble and ambulance sounds etc. Are there any microphones out there that will not pick up on general road noise? preferably a clip on? Anyway- I will probably have another 200 questions at some point to burden you with. Thanks in advance if you can help me – I hope Im not getting in over my head. I am an amateur presenter- but would really like my studio to look as professional as possible. Go for it! I think your idea is grand and I know you can make it work. Keep it simple from a production standpoint. Put most of your thought and energy into the creative process. IMHO, you do not need a fancy camera, not necessarily even one in the $1,000 range. In fact, using a camera like that could give you such a huge video files then it will not stream well. Are you streaming live? A small pocket cam or a web cam might even be your best choice. Audio quality is paramount but if you are close to a webcam it picks up fine. A Zi8 pocket cam by Kodak has a place where you can plug in a lavalier mic with a small mini plug. Look into the Boinxt TV software as the heart of your system. That and a high powered computer will work wonders. Either that, or something like the New Tek VT5. That is probably too much for you in all honesty. For lighting, hanging stuff off a ceiling saves room but you do not necessarily need a big metal grid like what they use in “real” tv studios. I clip lights onto the ceiling all the time with various c-clamps and other hardware gadgets. I am lucky now with an office that has ceiling tiles with a metal grid to keep up the ceiling tiles, which I clamp small mini lights too. SOMETHING LIKE THAT IS NOT STRONG ENOUGH FOR BIG HEAVY LIGHTS, I clip small lights to that grid. But my point is, depending on what kind of ceiling you have, you can do your lighting in various ways. The biggest advantage to lights on the ceiling is that takes them out of your way. Lights on stands are easier to move around. Depending on what kind of camera you use, your light fixtures do not necessarily have to be super powerful. Reads these articles on lighting. A webcam will be overpowered by “real” TV lights. In order to comment on the studio packages you are looking at online, I would have to see them. Think of this though…How much background do you really need behind you if you are the only person in the shot? Not much. Your shot should be a relative close up. You can gather nice looking props (vases, clocks, statues, plants, etc.) from around your house and use those. Or, use curtains. Your background can be simple, and should brand you in some way if possible. No microphone is going to cut out background noise as you describe. Put up some sound proofing foam on the walls. You can even build yourself a portable sound booth will sound proofing foam glued onto cardboard. I hope this answers your questions! Good luck! Stay in touch. Setting up a small video/audio studio for live broadcasting with a minimal production team. Will be recording for webcast one on one interview (2 persons and exceptionally 2 interviewees + 1 interviewer). Would like to go wireless if that’s less expensive than using cables. Need flexibility to use cameras for field reporting or shooting outdoors video programs. Need to know whether HD quality cameras are needed to have high quality professional programs or whether an inexpensive camcorder mounted on mobile tripods can do the job. I have18,000 dollars budget to have a complete studio ready to produce live programs (3 cameras + 3 tripods w/ dollys; 3 microphones; video/audio switcher (although I already have a good audio switcher; graphics generator; lights and mounts; CD player; DVD/videotape player; head sets; 3 to 5 monitors). I am also looking forward to using a powerful computer to manage sound and video production. Thanks a lot for any advise you may be able to send me. I’d say with a budget of $18,000 and the desire to use a powerful computer, you should consider something from Boinx TV. A more expensive alternative would be something from the New Tek line but that would really be more than you would need. It’s both good and bad that you already have all of the equipment you state. You will not need to buy a video switcher if you use something like BoinxTv software. Using any computer program eliminates the need for accessories that were always mandatory before. You would also not need the graphics generator and audio board you already own but honestly, from a user-standpoint it can be easier to control an audio board with real knobs rather than virtual ones. Using wireless microphones is more expensive that using wired mics. You might want to budget one wireless mic for certain circumstances, but you can save money by using wired mics as much as possible. Otherwise, you can get high quality sound with a wired lavalier in the $100-200 range. Even ones costing $20 sound fairly well. For webcast, it is not necessary to have HD, although many people would argue that it is. Good lighting on SD looks better than bad lighting on HD. Lights is one thing you already have, so you can save money there. Another budget saver is to think about skipping the dollys. Camera people can pick up and move small camera and tripods easily. I hope this helps you. If you need further assistance, please email me to set up some paid consultation. Thanks for visiting VPT! Thank you so much for the amazing tips you are giving us on this website. I would like to set up a TV station (analogue); but I don’t what I have to buy for the studio and transmission (set up from scratch). Can you please help me out with things I have to buy and where to get those items to buy? I’m already considering adding the TV Software you guys have being talking about; but I am still open to suggestions from you Gurus. B&H Photo has both new and used equipment video equipment. I suggest you try them. They ship anywhere in the world. Contact me if you want one-on-one help. Thanks! I hope this helps. Ive been reading all the info u post on the website and its amazing. Ill keep reading, but i think my questions havent been aswered (directly at least) on other posts. Anyway, i have to set up a live tv studio in argentina. Since digital tv is growing they dont want to get old broadcast cameras (they also want to have a portable equipment). Thats why i was thinking on 3 SONY EX1R cams; Sennheiser G3 mics; a reduce set of lights (with capability to do chromas) 2 cyc lite, 2 powerflo, 2 fresnel 1kgw, 1 fluo spot. What i found hard to solve is which switcher i should choose and whether to use or not an external audio mixer; plus which tape recording system i should get (Digital BETA? or HDD?). What about cables and connection stuff? am i missing anything??? Thanks for visiting Video Production Tips. Yes, I would suggest you get the New Tek Tricaster or the VT5. Either one. Those handle audio but some people find it easier to have a separate audio board. Audio levels are a bit hard to control by mouse, plus depending on the size of your crew, it can work better to have audio and video separate. You will not need a separate titler or character generator. Make sure and get tripods and an intercom system for your crew to communicate plus monitors. Microphones too. Hi, Final cut can do a lot, but it can’t be using as a live SWITCHER. Even on the X ver sion comming soon on June. You probably need a Newtek and/or a Datavideo Live video Switcher. Those model are cheaper. You can find them easily by googling a little. If you have more budget, I’m suggesting you GrassValey Stuff! Hi, Yes, you are right, which this to[pic is covered above and you have repeated what I already said. Why don’t you check into this low cost video switcher and camera. 1. I have a Dell Laptop Inspiron 1764 and a Yamaha MG102c Mixer with a External E-MU 404 USB to get my sound into my computer. I also run a dual monitor system and own a cheap AIPTEK GVS HD Video Camera (Don’t laugh it was given to me for a gift). I also own about 4 dynamic microphones and 1 MXL 901 Condensor Microphone with phantom power and a cheap wired Audio Techinca lapel mic. The video camera has an external mic hookup and I am trying to figure out how to use that with my mixer board for routing the audio to it if it is even possible. Can you help with this? 2. One other thing I do is make screencast videos using Camtasia Studio 7 and I would like to be able to use that cheap AIPTEK GVS Video Camera and switch back and forth from me(on the camera) to the computer monitor(Software App) I am teaching without having to do any production. What I mean is saving the video from the camera and then producing the Camtasia Video and having to produce it again. This takes a lot of time so I was wondering if there is a better cheaper way to accomplish this with what I have and maybe a software that would do this or a cheap video switcher that will work with my setup. I would also like to live greenscreen myself over the software application or with a different background in the near future so take that into consideration and if possible give me some ideas or equipment needed for both scenarios please. Thanks for any help and I will wait for your reply. I work as a volunteer with kids and adults with learning disabilities and would like to start teaching them some things and how to create their own videos and get good quality audio setups started. Keep up the great work and thanks for having such a great site. Is the transmitter and full tv studio equipment still available? I do not sell equipment off this blog. You can purchase the equipment from B&H Photo Supply. Thanks for your comment, but honestly, I do not have any idea which broadcasters would be interested in documentaries about S. Africa. Sorry. As you’ve heard before great article and information. I’ll begin my question by giving a little background info. I’m an electronics engineer with extensive professional audio background novice professional video (Broadcast) background. With that being said, I was contracted at the finishing stage of a towns new public safety building to install a broadcast sound system (the original contractor defaulted at the last minute) that will be used for their town meetings and capable of tying into their broadcast video system. That was completed with no issues. They have since contracted me to complete the video portion (video contractor defaulted). My issue is interconnecting their existing equipment with the remaining equipment needed. The existing video equipment they have(all Panasonic)is: AW-HE50H HDMI Camera’s(5), AG-HMX100 A/V mixer/switcher (All of the camera’s are wired, both video and Cat6 control lines, back to the control room and ready for connection). Do I need to interconnect the PTZ controller with the A/V mixer? If so, then I can’t use the 50 series controller (AW-RP50) as it is only compatible with the AW-HS50. Panasonic does show that their AW-RP555N and AW-RP655 are compatible with the AW-HE50H cameras, but I can’t find how either of these would interconnect with the AG-HMX100 or if they need to. I hope I have not confused this too much but I am really at a loss as to where to go from here. Sounds like you’ve got your work cut out for you! I always hate to say this kind of thing, but honestly, I do not know for sure. You need to ask Panasonic. I do not think the PTZ controller needs to be hooked up to the video switcher but I am not 100% sure. Without being there, it is hard for me to say. Sorry. I am happy for this site.All that I’v heard ve inspires me.All I’v being hearing is about video I need something about photography. I have a question i have been involved in the audio industry for years and have the best of the best for audio and the equipment for every format for audio from lp, cd, minidisc, cassette, 8 track reel,dat, adat.. Instead of using a standard switcher, maybe you should try BoinxTV, the computer software that so many people use for live web streaming. thanks for the reply, were looking to do live broadcasts hd and eventually do syndicated TV, also, not just web based.. so that’s what i am trying to figure out and also if the cameras i listed and software’s would work for this along with either a avid card or black-magic. but our plan is to start with audio streaming first what i already have the required equipment for and beyond and then stage two go to video, and were working on the equipment lines for the video part now and trying to see what we need for totals, so far i am guessing the following configurations. Switcher for switching behind desk for multi preset view cameras, for camera 1, close up, camera 2 for default setting and camera 3 for alternate view. Maybe this datavideo switcher would be work for you without breaking the bank. Great! I would appreciate that. we are founding the company for tv and production house please we need every equipment needed to run this buiness. I want to setup a video recording studio and streem live on the internet. Any idea how i can do this. I work at a high school and we are trying to start student broadcasts. We are starting from scratch. We have a small room with an adjacent control room. We are looking into Globecaster software. If we have this software, do we still need video and audio switchers? I wish you could just flat out tell me what we need. My list currently consists of 2 cameras, dollys, video and audio switchers, 2 pin-on mics, 1 handheld mic, teleprompter and I’m totally lost on the lighting. If you have an itemized list of atual products that I should get I would be so grateful. Im sure you know what a high school budget is like so it’s not like we can spend millions. ANy help would be appreciated. I certainly do know how a high school video budget is so let’s see what we can do to help you stay low on costs. I do not have an itemized list but in addition to the equipment you mentioned, have you thought about computer editing systems? You could certainly just keep your class doing studio production and not field production but field production can open up a lot of possibilities. Don’t forget both audio and video cables. To keep lighting simple,you should probably just get two portable lights on stands with umbrellas. Either one of these would do. One is a tungsten so it is less expensive, the other is LED which does not get hot and might be safer around kids. I have personally never used the Globecaster software, but I checked out their website and demo videos and I would say you would certainly not need a video switcher, but you might need an audio switcher. Even if the system will handle audio, it is usually easier, especially with multiple crew members, to have a separate audio switcher. It can be too squished together to have both on one. Good luck. I hope this information helps you. Thanks so much for getting back to me so soon. That is a big help. One more thing, do y recommend a certain camera or mic? There are so many cameras and mics on the market it is hard to say without knowing more about what your budget is and so forth. Make sure that all your inputs and outputs match. In other words, if you have a microphone that has an XLR output, make sure you have an XLR cable and if your camera only has a stereo plug audio input you’ll need the appropriate adapter cable. Glad to hear you like my blog! Sounds like you have entered the world of video production in a very efficient way! Good job. 🙂 Keep it up and thanks for your comment! WRT to the following text from your article, what would your equipment list look like? Thank you for an awesome blog. I am about starting a mini (low cost) television station here in England. Please advice me on the equipment I need to buy. I intent to play clients recordings/tapes and have a small studio for some live broadcast. To outfit a video studio you have many choices and indeed it can be terribly confusing. The information in this post gives you the basic types of equipment you need. Because there are so many variables and options, it is impossible for me (or anyone) to just hand you a list without knowing much more about your specific needs. If you would like to hire me for some personal consulting, please use the form on the Contact Us page to reach me. Thanks. We are revamping our studio lighting at our Boston high school. It’s a good space, at least 30 feet by 20 feet, and we want to know the basics in a grid lighting kit. Can you advise, please? We need to submit our budget in a week! Thank you. I am Amarsinh Jagdale-Sarkar owner of aBNNI TV, willing to launch News TV channel from Small town Kolhapur (Maharashtra state-India). willing to broadcast News, Interview & talk shows main. May i know how much cost need to startup broadcasting over-cover across maharashtra state? Can you guide me for setup medium size studio with necessary broadcasting equipment’s list ? Please use the form on this page to send me a private email about doing some consulting for you. I have learnt a lot after reading your article.You’ve really enlightened me.God bless you. Hi Lorraine I love your postings and what u said on it but I would like to know if what I am telling a friend that I have is ok or not she have a small TV show here on the eats coast and she is taking advise from a guy that do theater to do her show I was looking at her show and I pointed to her a few stuff that she can do better fr her show and some of this stuff ae the placement of MIC’s and the back ground on the set that to me they do not look good my question is whee is the best place to set up MIC’sand what color will be the best for Background on a TV set up I am trying to include a link to her show like that you can see what I see https://www.facebook.com/bellaskin/videos/10212184451917980///https://youtu.be/MQ2nE6mRRfI this are 2 of her link to her show but they are more on youtube look at MIC position and size and the always dark color background that I think is wrong you let me know I think that a more bright color like red or any other color NOT Blue or Green will help her better and a few Boon Mic’s or lavaliere will be better for her can you please tell me .thank you for your time you can answer me to my E Mail add any time if you want thank you again. I tried to view the video at the link you provided but FB said it was unavailable. Generally speaking, the mics should be made to be as invisible as possible, but I have seen it look nice too when the mics are quite prominent in the shot. Precisely where it should be located depends on the type of mic. Different mics have different pick up patterns so you have to place it according to the pick up pattern. Hello ! I am starting a youtube channel ,and i will be doing a talk show every tuesdays. I am using my entire living room for my youtube channel and talk show. Can you plz tell me what will i need exactly to set up a good setting using camera , lights etc. Hope to hear from you thank you ! It’s very nice info! but could you please give me some info about the budget for a simple video production studio? There are so many options for a studio setup that it is impossible to quote any price accurately without knowing more about how you will use it and what you wish to achieve. Without knowing more about exactly what you want to do and can afford, it is hard to tell you to buy anything specific. Having an entire video studio set up can help a studio make multiple videos at once due to the number of equipment available that can let one person crank out lots of output across the span of a single day while allowing for same-day edits to take place. At the same time, taking advantage of investing in a virtual studio set would drastically help cut down on the money that would otherwise be spent on investing for entire furniture set in the studio proper so that things can go even quicker. Now, if I had the chance to be able to get a virtual studio setup rolled out in a video recording studio then I would gladly take advantage of it! You make very good points Adrian! I would love to take advantage of a virtual studio setup too. They sure can make a fancy-looking video set easy.
2019-04-25T11:55:34Z
https://videoproductiontips.com/equipment-needed-to-set-up-a-simple-video-studio/
pharmacy technician schools in elk grove Visit now for Pharmacy Technician Schools In Elk Grove California , including program details, statewide school campus locations and all the free info. pharmacy technician schools in florida Pharmacy Technician Training and Certification Exam. pharmacy technician schools in fort lauderdale Looking for top Fort Lauderdale pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in fort worth texas If you're looking for a pharmacy technician school in Fort Worth that provides hands-on training and certifications, check out Remington College's Ft. pharmacy technician schools in fresno ca This 268-hour program will prepare you for licensing as a pharmacy technician through the California State. pharmacy technician schools in ga Find Georgia pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Atlanta, Marietta, Savannah and other GA Cities. pharmacy technician schools in ghana List of Pharmacy Schools, Pharmacy Programs, Pharmacy Technician schools, Colleges & Universities in GHANA. pharmacy technician schools in glendale ca Pharmacy Tech Schools In Glendale Ca - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician schools in grand rapids mi 68 Pharmacy Technician Jobs available in Grand Rapids, MI on Indeed. pharmacy technician schools in greenville sc The Pharmacy Technician program at Greenville Technical College includes classroom and. pharmacy technician schools in gwinnett county Looking for top Lawrenceville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in hampton roads 61 Pharmacy Technician Jobs available in Hampton Roads, VA on Indeed. pharmacy technician schools in hampton va Loudoun County Public School's Pharmacy Technician Training Program:. pharmacy technician schools in hartford ct Find Connecticut pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Hartford, New Haven and other CT Cities. pharmacy technician schools in hialeah Find 40 listings related to Pharmacy Technician School in Hialeah on YP. pharmacy technician schools in huntsville al Find 8 listings related to Pharmacy Technician Schools in Huntsville on YP. pharmacy technician schools in indiana Pharmacy Schools in Indiana are accredited by the Higher Education Commission, and are recognized for top quality pharmacy degree programs. pharmacy technician schools in jackson ms Find Mississippi pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Jackson, Biloxi and other MS Cities. pharmacy technician schools in jacksonville fl Looking for top Jacksonville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in jacksonville nc "I enjoyed the class a great deal because it challenged me in ways I have not been challenged in since high school. pharmacy technician schools in jamaica Looking for top Jamaica pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in jersey city nj Not all pharmacy technician schools in Jersey City NJ are the same. pharmacy technician schools in joliet il Find 10 listings related to Pharmacy Technician School in Joliet on YP. pharmacy technician schools in kalamazoo mi Not all pharmacy technician schools in Kalamazoo MI are the same. pharmacy technician schools in kansas Find Kansas pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Topeka, Wichita and other KS Cities. pharmacy technician schools in kentucky Find Kentucky pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Louisville, Lexington and other KY Cities. pharmacy technician schools in killeen tx Killeen TX Pharmacy tech schools come in handy for every pharmacy technician who wants a rewarding career in the field, as these schools teach students how to keep. pharmacy technician schools in kissimmee fl Looking for top Kissimmee pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in knoxville tn Looking for top Knoxville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in lafayette la Looking for a Pharmacy Technician school in Lafayette or Acadiana? Learn more about our hands-on training, classes start soon. pharmacy technician schools in lexington ky Find Kentucky pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Louisville, Lexington and other KY Cities. pharmacy technician schools in los angeles West offers both a "For-Credit" and Westside Extension career training path to prepare for a career as a Pharmacy Technician. pharmacy technician schools in louisiana Find Louisiana pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in New Orleans, Baton Rouge and other LA Cities. pharmacy technician schools in louisiana online The organization which accredits pharmacy technician training programs is a. pharmacy technician schools in louisville ky Looking for top Louisville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in marietta ga Not all pharmacy technician schools in Marietta GA are the same. pharmacy technician schools in md Find Maryland pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Baltimore, Hagerstown, Towson and other MD Cities. pharmacy technician schools in memphis tn Looking for Pharmacy Technician training in Memphis or Southeast Tennessee? Check out Remington College! Certification exams and supplies are included in tuition!. pharmacy technician schools in miami *This program qualifies as an approved Registered Pharmacy Technician. pharmacy technician schools in miami dade The following are some of the best Pharmacy Technician Schools in Miami,. pharmacy technician schools in michigan Learn more about Michigan Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top cities. pharmacy technician schools in mississippi Looking for top pharmacy technician schools in Mississippi? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in missouri Find Missouri pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Kansas City, St. pharmacy technician schools in moreno valley ca 66 Pharmacy Technician Jobs available in Moreno Valley, CA on Indeed. pharmacy technician schools in ms Find Mississippi pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Jackson, Biloxi and other MS Cities. pharmacy technician schools in nc Learn more about North Carolina Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top. pharmacy technician schools in new jersey Find New Jersey pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Red Hook, Paramus, Plainfield and other NJ Cities. pharmacy technician schools in new orleans The Pharmacy Technician Program provides both academic and clinical education in pharmacy. pharmacy technician schools in new york Find New York pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manhattan, Brooklyn, Albany and other NY Cities. pharmacy technician schools in new york city Find New York pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manhattan, Brooklyn, Albany and other NY Cities. pharmacy technician schools in new york state Find New York pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manhattan, Brooklyn, Albany and other NY Cities. pharmacy technician schools in new zealand you need to have a New Zealand Certificate in Pharmacy - Pharmacy Technician. pharmacy technician schools in nj Find New Jersey pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Red Hook, Paramus, Plainfield and other NJ Cities. pharmacy technician schools in ny Looking for pharmacy schools in New York? the Pharmacy Technology Program at ASA College trains you to be a Pharmacy Technician. pharmacy technician schools in nyc Looking at Pharmacy Technician Schools? Visit The Manhattan Institute in midtown Manhattan for pharmacy technician training and courses today. pharmacy technician schools in orlando fl People who searched for Top School for Becoming a Pharmacy Technician - Orlando, FL found the following related articles, links, and information useful. pharmacy technician schools in pa Find Pennsylvania pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Pittsburgh, Philadelphia and other PA Cities. pharmacy technician schools in philadelphia Pharmacy Technician Training with Externship; This workshop is designed for individuals seeking a career in health care, new high school graduates, pharmacy clerks or. pharmacy technician schools in queens new york you do not need a license or certification to work in New York State. pharmacy technician schools in queens ny Find 92 listings related to Pharmacy Technician School in Queens on YP. pharmacy technician schools in raleigh nc Learn more about North Carolina Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top. pharmacy technician schools in reno nv Have you ever wanted to become a pharmacy technician? Now is your chance! Call 775-856-2266 to enroll today!. pharmacy technician schools in ri Learn all about our Pharmacy Technician II and Veterinary Assistant programs at a. pharmacy technician schools in richmond va Listing of training programs for Pharmacy Technician. pharmacy technician schools in riverside ca The Certified Pharmacy Technician Training program at ACH in Riverside | Huntington Park, CA covers many areas of medical & pharmaceutical terminology. pharmacy technician schools in salt lake city utah Find Pharmacy Technician resumes in Salt Lake City UT today on Indeed Resume. pharmacy technician schools in san antonio Certified Pharmacy Technician through the Pharmacy Technician. pharmacy technician schools in san diego Looking for top San Diego pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in san fernando valley 157 Pharmacy Technician Training Jobs available in San Fernando Valley, CA on Indeed. pharmacy technician schools in san jose ca People who searched for Top School for a Pharmacy Technician Degree - San Jose, CA found the following related articles and links useful. pharmacy technician schools in sc Pharmacy technician schools in South Carolina have a tremendous demand to fulfill! Find out more with our free resources and school listings!. pharmacy technician schools in south africa List of Pharmacy Schools , Pharmacy Programs, Pharmacy Technician schools, Colleges & Universities in SOUTH AFRICA. pharmacy technician schools in south dakota Requirements for pharmacy technicans from the South Dakota Board of Pharmacy. pharmacy technician schools in south jersey Explore the pharmacy technician schools in New Jersey. pharmacy technician schools in st george utah Looking for top Saint George pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in st john's nl The annual School of Pharmacy Golf Tournament is a guaranteed day of fun!. pharmacy technician schools in texas Find Texas pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Dallas, Houston, San Antonio and other TX Cities. pharmacy technician schools in the bay area As a participant in Cal State East Bay's Pharmacy Technician. pharmacy technician schools in uk OnlinePharmacyShop: 100% quality, low prices, 24/7 support, fast delivery. pharmacy technician schools in usa WorldTrustPharmacy online can lower your RX costs by 95%. pharmacy technician schools in utah Find Utah pharmacy technician schools and gain skills you need to join the field of pharmacy tech in Salt Lake City, Provo, West Valley City and other UT Cities. pharmacy technician schools in utah county Find Utah pharmacy technician schools and gain skills you need to join the field of pharmacy tech in Salt Lake City, Provo, West Valley City and other UT Cities. pharmacy technician schools in vallejo ca Looking for top Vallejo pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in vancouver wa Individuals searching for pharmacy technician diploma programs in vancouver, wa found the following related articles, links, and information useful. pharmacy technician schools in ventura county Looking for top Ventura pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in victorville ca Looking for top Victorville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in visalia ca Looking for top Visalia pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in west palm beach Looking for top West Palm Beach pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools in wichita ks Not all pharmacy technician schools in Wichita KS are the same. pharmacy technician schools in wv Find West Virginia pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Charleston, Parkersburg and other WV Cities. pharmacy technician schools in yonkers ny 410 Pharmacy Technician Jobs available in Yonkers, NY on Indeed. pharmacy technician schools in york pa 104 Pharmacy Technician Jobs available in York, PA on Indeed. pharmacy technician schools in youngstown ohio Pharmacy Technician Schools In Youngstown Ohio - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician schools in yuba city ca Not all pharmacy technician schools in Yuba City CA are the same. pharmacy technician schools in yuma az Not all pharmacy technician schools in Yuma AZ are the same. pharmacy technician schools inland empire Pharmacy Technician Programs Inland Empire - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician schools jackson ms Find Mississippi pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Jackson, Biloxi and other MS Cities. pharmacy technician schools jacksonville fl Looking for top Jacksonville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools jacksonville florida Florida State College at Jacksonville is a member of the Florida. pharmacy technician schools jersey city Looking for top Jersey City pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools kansas Looking for top Kansas City pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools kansas city mo Vatterott College offers a pharmacy technician degree in Kansas City, Missouri from experienced experts and provides hands-on training to achieve educational goals. pharmacy technician schools kentucky Find Kentucky pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Louisville, Lexington and other KY Cities. pharmacy technician schools killeen Looking for top Killeen pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools killeen tx Looking for top Killeen pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools knoxville tn Looking for top Knoxville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools ky Find Kentucky pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Louisville, Lexington and other KY Cities. pharmacy technician schools lafayette la Looking for a Pharmacy Technician school in Lafayette or Acadiana? Learn more about our hands-on training, classes start soon. pharmacy technician schools lancaster ca Not all pharmacy technician schools in Lancaster CA are the same. pharmacy technician schools las vegas Looking for top Las Vegas pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools las vegas nv Not all pharmacy technician schools in Las Vegas NV are the same. pharmacy technician schools long beach ca This comprehensive 50-hour program will prepare you to work as a pharmacy technician in. pharmacy technician schools long island Find 23 listings related to Pharmacy Technician Schools in Long Island on YP. pharmacy technician schools long island new york Find 23 listings related to Pharmacy Technician Schools in Long Island on YP. pharmacy technician schools long island ny Not all pharmacy technician schools in Long Island City NY are the same. pharmacy technician schools los angeles West offers both a "For-Credit" and Westside Extension career training path to prepare for a career as a Pharmacy Technician. pharmacy technician schools los angeles ca Looking for top Los Angeles pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools louisiana The organization which accredits pharmacy technician training programs is a. pharmacy technician schools louisville ky Find Kentucky pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Louisville, Lexington and other KY Cities. pharmacy technician schools ma Find Massachusetts pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Boston, Worcester and other MA Cities. pharmacy technician schools massachusetts Find Massachusetts pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Boston, Worcester and other MA Cities. pharmacy technician schools md Find Maryland pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Baltimore, Hagerstown, Towson and other MD Cities. pharmacy technician schools memphis tn Looking for Pharmacy Technician training in Memphis or Southeast Tennessee? Check out Remington College! Certification exams and supplies are included in tuition!. pharmacy technician schools miami Pharmacy Technicians assist and support licensed pharmacists in providing health care and medications to patients. pharmacy technician schools michigan Learn more about Michigan Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top cities. pharmacy technician schools mississippi Find Mississippi pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Jackson, Biloxi and other MS Cities. pharmacy technician schools missouri Find Missouri pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Kansas City, St. pharmacy technician schools mn Find Minnesota pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Minneapolis, St. pharmacy technician schools montreal Pharmacy Technician training courses, certificates, diplomas, degree programs and schools in Montreal, QC, Canada (Page 1). pharmacy technician schools nashville tn Looking for top Nashville pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools nc Learn more about North Carolina Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top. pharmacy technician schools near me Pharmacy Technician Schools Near Me - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician schools near victorville ca Victorville, CA (population: 119,377) has forty-two pharmacy technician schools within a 100-mile radius of its city center. pharmacy technician schools new jersey Pharmacy technicians in New Jersey are required to register with the State Board of. pharmacy technician schools new orleans The Pharmacy Technician Program provides both academic and clinical education in pharmacy. pharmacy technician schools new york Find New York pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manhattan, Brooklyn, Albany and other NY Cities. pharmacy technician schools new york city Looking for top New York City pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools nh Find New Hampshire pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manchester, Concord and other NH Cities. pharmacy technician schools nj Find New Jersey pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Red Hook, Paramus, Plainfield and other NJ Cities. pharmacy technician schools north carolina Find North Carolina pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Raleigh, Charlotte and other NC Cities. pharmacy technician schools ny Find New York pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Manhattan, Brooklyn, Albany and other NY Cities. pharmacy technician schools nyc Looking at Pharmacy Technician Schools? Visit The Manhattan Institute in midtown Manhattan for pharmacy technician training and courses today. pharmacy technician schools oahu Hawaii's pharmacy technicians work in a variety of settings, from retail establishments to regional medical centers like. pharmacy technician schools ohio Find Ohio pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Cleveland, Dayton, Columbus and other OH Cities. pharmacy technician schools olympia wa Looking for top Olympia pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools omaha ne Looking for top Omaha pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools on long island Access career Institute offers best Pharmacy tech training program in Long Island,NY. pharmacy technician schools online Start your new career Today! Request Info or call 866. pharmacy technician schools online florida Find Florida pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Orlando, Tampa, Miami and other FL Cities. pharmacy technician schools online with financial aid As a student in our Pharmacy Technician school will have the. pharmacy technician schools ontario Pharmaceutical Programs at Ontario Colleges What to expect from a career as a Pharmacy Technician or Pharmaceutical Lab Tech. pharmacy technician schools orange county View the Pharmacy Technician Program's online information workshop The North Orange County Community College District School of Continuing Education's. pharmacy technician schools oregon Find Oregon pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Portland, Eugene, Salem and other OR Cities. pharmacy technician schools orlando fl Concorde offers pharmacy technician program in Orlando, Florida. pharmacy technician schools pa Looking for top pharmacy technician schools in Pennsylvania? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools palm beach county Pharmacy Technician Clinical contract with Walgreens. pharmacy technician schools pennsylvania Find Pennsylvania pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Pittsburgh, Philadelphia and other PA Cities. pharmacy technician schools pensacola fl The University of West Florida, Division of Continuing Education is offering an exciting opportunity for those interested in beginning a new. pharmacy technician schools philadelphia Looking for top Philadelphia pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools phoenix People searching for Top Pharmacy Technician Degree Programs - Phoenix, AZ found the following resources, articles, links, and information helpful. pharmacy technician schools phoenix az Our Accredited Pharmacy Technician program prepares students for a successful future. pharmacy technician schools pittsburgh pa Find Pennsylvania pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Pittsburgh, Philadelphia and other PA Cities. pharmacy technician schools portland oregon Looking for top Portland pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools quad cities Pharmacy Technician Schools Quad Cities - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician schools quebec Start solidifying your future by playing a role in the health of your community. pharmacy technician schools queens ny Queens, NY has twenty-one pharmacy technician schools within a 100-mile radius of its city center. pharmacy technician schools raleigh nc Learn more about North Carolina Pharmacy Technician Schools and Training Programs, including degree options, training programs, schools, colleges, universities, top. pharmacy technician schools reno nv Not all pharmacy technician schools in Reno NV are the same. pharmacy technician schools reviews and use our built-in self-checks and interactive flashcards to review what. pharmacy technician schools rhode island Find Rhode Island pharmacy technician schools and gain skills you need to join the field of pharmacy tech in Providence, Warwick, Cranston and other RI Cities. pharmacy technician schools richmond va Allied Pharmacy Technician Training Program prepares students to take their National Pharmacy Technician Certification, Phlebotomy Training and Medical Billing. pharmacy technician schools riverside ca The Certified Pharmacy Technician Training program at ACH in Riverside | Huntington Park, CA covers many areas of medical & pharmaceutical terminology. pharmacy technician schools roanoke va Looking for top Roanoke pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools rochester ny The primary role of a Pharmacy Technician is to dispense and prepare medications. pharmacy technician schools ronkonkoma ny Not all pharmacy technician schools in Ronkonkoma NY are the same. pharmacy technician schools roseville ca Find 21 listings related to Pharmacy Technician School in Roseville on YP. pharmacy technician schools sacramento Looking for top Sacramento pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools san antonio SCI offers pharmacy technician certification in Austin, Corpus Christi & San Antonio. pharmacy technician schools san bernardino ca Students who searched for Top School in San Bernardino, CA, for a Pharmacy Technician Career found the following related articles, links, and information useful. pharmacy technician schools san diego Looking for top San Diego pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools san jose ca People who searched for Top School for a Pharmacy Technician Degree - San Jose, CA found the following related articles and links useful. pharmacy technician schools savannah ga Find Georgia pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Atlanta, Marietta, Savannah and other GA Cities. pharmacy technician schools seattle Looking for top Seattle pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools south africa List of Pharmacy Schools , Pharmacy Programs, Pharmacy Technician schools, Colleges & Universities in SOUTH AFRICA. pharmacy technician schools st louis Become a Pharmacy Technician, assisting pharmacists and providing support in a field with growing demand. pharmacy technician schools st. louis mo Become a Pharmacy Technician, assisting pharmacists and providing support in a field with growing demand. pharmacy technician schools syracuse ny Syracuse, NY (population: 136,410) has one pharmacy technician school within a 100-mile radius of its city center. pharmacy technician schools tampa fl Individuals searching for Top School in Tampa for Becoming a Pharmacy Technician found the following related articles and links useful. pharmacy technician schools temple tx Not all pharmacy technician schools in Temple TX are the same. pharmacy technician schools tennessee Find Tennessee pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Memphis, Nashville, Knoxville and other TN Cities. pharmacy technician schools texas Find Texas pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Dallas, Houston, San Antonio and other TX Cities. pharmacy technician schools tn Find Tennessee pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Memphis, Nashville, Knoxville and other TN Cities. pharmacy technician schools toledo ohio Not all pharmacy technician schools in Toledo OH are the same. pharmacy technician schools toronto Centennial College's Pharmacy Technician program offers a dynamic curriculum that is based on the. pharmacy technician schools torrance ca Not all pharmacy technician schools in Torrance CA are the same. pharmacy technician schools tucson Continue taking classes toward earning a Pharmacy Technology AAS. pharmacy technician schools tulsa ok Master pharmaceutical compounding to fill retail pharmacy prescriptions and. pharmacy technician schools uk WorldTrustPharmacy online can lower your RX costs by 95%. pharmacy technician schools usa 100% Satisfaction Guaranteed!!! Cheap Prices! Check Order Status. pharmacy technician schools utah Find Utah pharmacy technician schools and gain skills you need to join the field of pharmacy tech in Salt Lake City, Provo, West Valley City and other UT Cities. pharmacy technician schools va Listing of training programs for Pharmacy Technician. pharmacy technician schools vacaville ca Not all pharmacy technician schools in Vacaville CA are the same. pharmacy technician schools van nuys Find 21 listings related to Pharmacy Technician School in Van Nuys on YP. pharmacy technician schools vancouver Pharmacy Technician Pharmacy technicians in Washington and Oregon are employed in. pharmacy technician schools vancouver bc 76 Pharmacy Technician Job vacancies available in Vancouver, BC on Indeed Canada. pharmacy technician schools vancouver island These pharmacy technician schools can help you start training for an interesting career. pharmacy technician schools vancouver wa Pharmacy Technician Pharmacy technicians in Washington and Oregon are employed in. pharmacy technician schools ventura county Ventura County California Pharmacy tech schools come in handy for every pharmacy technician who wants a rewarding career in the field, as these schools teach students. pharmacy technician schools virginia beach Listing of training programs for Pharmacy Technician. pharmacy technician schools visalia ca Looking for top Visalia pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools wa Pharmacy Technician Pharmacy technicians in Washington and Oregon are employed in hospitals and outpatient facilities. pharmacy technician schools washington Find Washington pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Seattle, Spokane, Vancouver and other WA Cities. pharmacy technician schools washington state Find Washington pharmacy technician schools and gain the skills you need to join the field of pharmacy tech in Seattle, Spokane, Vancouver and other WA Cities. pharmacy technician schools west palm beach Looking for top West Palm Beach pharmacy technician schools? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools westchester ny Pharmacy tech schools teach students a variety of medical and administrative tasks, from mixing the correct drug proportions to maintaining inventories and. pharmacy technician schools wichita ks Not all pharmacy technician schools in Wichita KS are the same. pharmacy technician schools wilmington nc Find 25 listings related to Pharmacy Tech School in Wilmington on YP. pharmacy technician schools winnipeg Program Overview The Robertson College Winnipeg Pharmacy Technician program delivers education that is based on the NAPRA Competencies for Pharmacy. pharmacy technician schools wisconsin The UW Health Pharmacy Technician Training Program in Madison, Wisconsin, has been designed to provide you with the knowledge and skills to be successful in your. pharmacy technician schools with financial aid Thinking about becoming a Pharmacy Technician? Learn about our diploma program! Certifications, exams, and supplies are included in the price of tuition!. pharmacy technician schools wv Looking for top pharmacy technician schools in West Virginia? Find pharmacy technician degrees, courses, certificates, and more. pharmacy technician schools xenia ohio Not all pharmacy technician schools in Xenia OH are the same. pharmacy technician scools in nigeria Pharmacy Technician Schools In Nigeria - Pharmacy technicians are in demand! Visit us now for school locations and starting dates. pharmacy technician scope in south africa The scope of practice of each pharmaceutical category has been defined by the SAPC. pharmacy technician self study Study at home and become a Certified Pharmacy Technician! For less than $60, you can use the PharmacyTrainer Self-Study Print Book to start your career or pass the. pharmacy technician self study book able to pass the PTCB exam on my first trial with this book. pharmacy technician self study book 2014 Expect more than 3 months consistently study on this book. pharmacy technician shortage See if Pharmacy Technician is on one of Immigration New Zealand's skill shortage lists. pharmacy technician sig codes These are sig codes written by different types of medical doctors, typically on prescriptions. pharmacy technician sig codes and abbreviations These are sig codes written by different types of medical doctors, typically on prescriptions. pharmacy technician skills checklist Pharmacy Technician Skills Checklist PHARMACY SKILLS Experience €€€FROZEN ANTIBIOTICS 1 2 3 4 5 €€€TPN 1 2 3 4 5 €€€BATCH INJECTION DEVICES 1 2 3 4 5. pharmacy technician skills resume List of pharmacy technician skills to use in resumes, cover letters and job interviews, plus more skills and keywords. pharmacy technician state exam study guide technician practice based on a nationwide Job Analysis Study completed in. pharmacy technician students at nmmu International students Frequently asked questions Information for parents Info for Grade 9's Info for. pharmacy technician study aids RX Tech Study Aids | See more about Studying, Pharmacy and Math. pharmacy technician study app To download the free app Pharmacy Technician Exam Prep 2017 Edition by Pocket Prep, Inc. pharmacy technician study at home Pharmacy Technician with Penn Foster Career School's. pharmacy technician study blog The pharmacy tech study Blog keeps you up-to-date with all additions and changes to the pharmacy-tech-study. pharmacy technician study book PTCB Study Books and preparation tools recommended to study for the PTCE or ExCPT. pharmacy technician study book 2012 This is Mosby's newer edition of their pharmacy technician study. pharmacy technician study book 2014 Pharmacy Technician Review Book 2017-2018 Edition covers. pharmacy technician study book 2015 The Paperback of the PTCB Exam Study Guide 2015-2016: PTCB Exam Study Book and Practice Test Questions for the Pharmacy Technician Certification Board. pharmacy technician study book pdf Pharmacy Tech Book reviews and suggestion for self study and as a companion to online pharmacy tech programs. pharmacy technician study books This comprehensive test preparation book, Pharmacy Technician Examination,. pharmacy technician study books free he's also produced a great math book to accompany it that is available to buy as a workbook or as a free. pharmacy technician study canada Locate a pharmacy assistant or pharmacy technician course of study in Canada and embark on a new and fulfilling career path. pharmacy technician study cards This has alot of needed information to help study for my Pharmacy. pharmacy technician study cd We provide a vast variety of study material to prepare for PTCE Exam also known as Pharmacy Technician Certification Exam. pharmacy technician study cost Prices paid and comments from CostHelper's team of professional journalists and community of users. pharmacy technician study course Free ExCPT and PTCB Study guides, including Pharmacy Sig Codes, Pharmacy Math, The top 100/200 Drugs, Pharmacy Law, Free practice exams and.
2019-04-22T22:27:09Z
http://www.trainingforcnacertification.org/cnas-531.php
Mission: Kids Alive reflects the love of Christ by rescuing orphans and vulnerable children, nurturing them with quality holistic care and sharing with them the transforming power of Jesus Christ so they are enabled to give hope to others. * Faith Based - God alone transforms lives. As we rescue children-in-crisis, we submit to the Lordship of Jesus Christ, depend on the power of the Holy Spirit, accept the authority of the scriptures, and make prayer central to our ministry. * Action Oriented - We follow the example of Jesus Christ. We work to build just societies as we respond with sacrificial love to the world’s suffering children. * Child Focused - We believe children should have opportunity to mature and develop their full potential. We care for the whole child by providing quality programs that meet their spiritual, educational, social, physical, and emotional needs. * An International Team - We cooperate closely with national Christians to develop culturally relevant, caring communities for children, and to encourage the growth of godly leadership. The children of Kids Alive International homes and ministries will be prepared to lead in church and home with integrity. * Committed to Excellence - We intend to be known for our determined pursuit of quality, the integrity of our relationships, the clarity of our communication, and our accountability with human and financial resources entrusted to us. * Family Centered - We believe in the nurturing power of the family. We strengthen existing families and place unprotected children in safe, family-style homes. We prepare these children to one day lead healthy families of their own. JamesFbigKids Alive Service Teams are designed for people who are looking for a life-changing experience, have a desire to help children, and want to experience their faith in Jesus Christ on a whole new level! Service Teams usually number between five and twenty participants, are formed out of a church, civic organization or family, and serve on one of our fields for one or two weeks. As a Service Team Volunteer, you'll travel with your Team to one or more of Kids Alive ministry locations – Residential Children's Home, Care Center, School or Clinic. A Team usually works together to accomplish a specific goal, such as leading a children's program or doing construction improvements on a home – depending on the Team's skills. Kids Alive sends seventy to eighty teams to our fields annually. Whether sharing the Good News of God's love with kids in a Summer Program, painting a new classroom, helping build a new Children’s Home, or using your medical training in a clinic – you can be sure a Kids Alive Service Team will provide you with the experience of a lifetime! Total cost for each member of a Service Team depends on the location the Team serves, the length of stay, and the type of project, but generally range between $770 and $1040 per person (plus airfare). This amount includes all project costs, food, lodging, local travel and a ministry donation. Add-on trips for sightseeing can be arranged for an additional cost. August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. notes: VOLUNTEERING (From the site): VOLUNTEER SERVICE TEAMS JamesFbigKids Alive Service Teams are designed for people who are looking for a life-changing experience, have a desire to help children, and want to experience their faith in Jesus Christ on a whole new level! Service Teams usually number between five and twenty participants, are formed out of a church, civic organization or family, and serve on one of our fields for one or two weeks. As a Service Team Volunteer, you'll travel with your Team to one or more of Kids Alive ministry locations – Residential Children's Home, Care Center, School or Clinic. A Team usually works together to accomplish a specific goal, such as leading a children's program or doing construction improvements on a home – depending on the Team's skills. Kids Alive sends seventy to eighty teams to our fields annually. Whether sharing the Good News of God's love with kids in a Summer Program, painting a new classroom, helping build a new Children’s Home, or using your medical training in a clinic – you can be sure a Kids Alive Service Team will provide you with the experience of a lifetime! What skills are needed? * Minor Home Repair * Tutoring Children * Construction * Activity Leaders * Childcare * Music, Art, Drama * Medical * Other (just ask us!) Total cost for each member of a Service Team depends on the location the Team serves, the length of stay, and the type of project, but generally range between $770 and $1040 per person (plus airfare). This amount includes all project costs, food, lodging, local travel and a ministry donation. Add-on trips for sightseeing can be arranged for an additional cost. ========================================= HAITI BLOG: http://kidsaliveinternational.blogspot.com/ ========================================= UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. -> VOLUNTEERING (From the site): http://www.kidsalive.org/involvement/volunteer-service-teams/ VOLUNTEER SERVICE TEAMS JamesFbigKids Alive Service Teams are designed for people who are looking for a life-changing experience, have a desire to help children, and want to experience their faith in Jesus Christ on a whole new level! Service Teams usually number between five and twenty participants, are formed out of a church, civic organization or family, and serve on one of our fields for one or two weeks. As a Service Team Volunteer, you'll travel with your Team to one or more of Kids Alive ministry locations – Residential Children's Home, Care Center, School or Clinic. A Team usually works together to accomplish a specific goal, such as leading a children's program or doing construction improvements on a home – depending on the Team's skills. Kids Alive sends seventy to eighty teams to our fields annually. Whether sharing the Good News of God's love with kids in a Summer Program, painting a new classroom, helping build a new Children’s Home, or using your medical training in a clinic – you can be sure a Kids Alive Service Team will provide you with the experience of a lifetime! What skills are needed? * Minor Home Repair * Tutoring Children * Construction * Activity Leaders * Childcare * Music, Art, Drama * Medical * Other (just ask us!) Total cost for each member of a Service Team depends on the location the Team serves, the length of stay, and the type of project, but generally range between $770 and $1040 per person (plus airfare). This amount includes all project costs, food, lodging, local travel and a ministry donation. Add-on trips for sightseeing can be arranged for an additional cost. ========================================= HAITI BLOG: http://kidsaliveinternational.blogspot.com/ ========================================= UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. notes: HAITI BLOG: http://kidsaliveinternational.blogspot.com/ ========================================= UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. -> VOLUNTEERING (From the site): VOLUNTEER SERVICE TEAMS JamesFbigKids Alive Service Teams are designed for people who are looking for a life-changing experience, have a desire to help children, and want to experience their faith in Jesus Christ on a whole new level! Service Teams usually number between five and twenty participants, are formed out of a church, civic organization or family, and serve on one of our fields for one or two weeks. As a Service Team Volunteer, you'll travel with your Team to one or more of Kids Alive ministry locations – Residential Children's Home, Care Center, School or Clinic. A Team usually works together to accomplish a specific goal, such as leading a children's program or doing construction improvements on a home – depending on the Team's skills. Kids Alive sends seventy to eighty teams to our fields annually. Whether sharing the Good News of God's love with kids in a Summer Program, painting a new classroom, helping build a new Children’s Home, or using your medical training in a clinic – you can be sure a Kids Alive Service Team will provide you with the experience of a lifetime! What skills are needed? * Minor Home Repair * Tutoring Children * Construction * Activity Leaders * Childcare * Music, Art, Drama * Medical * Other (just ask us!) Total cost for each member of a Service Team depends on the location the Team serves, the length of stay, and the type of project, but generally range between $770 and $1040 per person (plus airfare). This amount includes all project costs, food, lodging, local travel and a ministry donation. Add-on trips for sightseeing can be arranged for an additional cost. ========================================= HAITI BLOG: http://kidsaliveinternational.blogspot.com/ ========================================= UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. notes: UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. -> HAITI BLOG: http://kidsaliveinternational.blogspot.com/ ========================================= UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. notes: UPDATE FROM THE WEBSITE: UPDATE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. -> UPDATE FROM THE WEBSITE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. notes: FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. -> UPDATE FROM THE WEBSITE: UPDATE: August 27, 2010 - God is doing great things in Haiti! We received 33 Haitian children from Port au Prince. Each of these children have lost either one or both parents in the earthquake. We have 4 new sets of house parents and a total of 7 homes currently. Kids Alive has acquired 5 acres of land to build 8 homes with an open area in the back for a soccer field. With school starting soon, we are adding a kindergarten and 5th grade class to the school this year. The size of our school will be more than double of what it was last year. June 28, 2010 - Orphans from the earthquake have started arriving to our Residential Homes in Cap Haitian. The children have come from an orphanage which suffered damage in the earthquake. They had been sleeping outside under tarps as more newly orphaned children found their way there. Kids Alive will be bringing about 50 of these kids into our Homes. April 20, 2010 - We received four more Haitian children in Jarabacoa. They were found walking by the side of the highway just north of Santo Domingo. They were taken into custody by the Dominican government who promptly asked us to care for them. The plan is for them to recuperate with us while UN officials search for their parents and family in Port au Prince. April 8, 2010 - Update on the 3 boys from Haiti that made there way to the DR - relatives in Haiti have been found for them and they have returned to family. One mother was overwhelmed with joy when she was reunited with her child she thought had died in the earthquake. Praise God for reuniting these families, and giving Kids Alive an opportunity to share His love while they were with us. February 22, 2010 - The first of the Haiti orphans arrived today in the Dominican Republic! The three boys all lost their single parents in the earthquake and were found living under a bridge at the border. They were brought to the Kids Alive home in Jarabacoa by social services. February 1, 2010 - Al Lackey, President of Kids Alive, called from Port au Prince today. He is encouraged by the cooperation of the different aid organizations and US military. Refugee camps seem well supplied and the children without adults are being processed, identified, fed, and medically treated. He met with several officials to move the process along of receiving children into our care. Child Trafficking is now a major concern so the Haiti government is being very cautious. January 28, 2010 - The IRS has made a provision that contributions made for Haiti relief after 1/11/2010 and before 3/1/2010 can be deducted your year 2009 return even though the gift was made in 2010 (or you can choose to wait until you file your 2010 return next year). You should keep the tax-deductible receipt as proof of the contribution. January 27, 2010 - Sent a truckload of materials for construction of temporary housing to our facility in Cap Haitian. We have delivered fuel, food and medicine from Santiago to Port au Prince for other missions including hospitals. Overall, we have probably delivered over 10,000 gallons of generator fuel. We are optimistic that we will have some kids to care for in the DR shortly. January 24, 2010 - Al Lackey, president of Kids Alive, shares his vision that the relief efforts in Haiti are not complete "Until Every orphan has a Home"™. January 23, 2010 - There has been a delay in receiving the children. They will remain in the hospital for a few more days. In Haiti, good contacts are being made and we are prepared to receive children there. January 20, 2010 - Kids Alive has been in contact with officials from the US and DR government to facilitate receiving the displaced children. After shocks rattled nerves at our home in Cap Haitien but caused no damage. The first construction team will be heading down next week to build temporary houses and bathrooms. January 18, 2010 - In cooperation with other ministries, Kids Alive DR is transporting a bus load of fuel to keep a hospital, just outside of Port au Prince, back up generators working. This hospital has been swamped with earthquake victims and would have had no power tomorrow without this fuel. Our site in Cap Haitien is being supplied with tents, cots, and sleeping bags to prepare for the arrival of evacuated children. Our homes in the DR are buying supplies and more beds for the arrivals. Staff and kids are excited to be part of the rescue efforts. January 15, 2010 - Field Director, Vic Trautwein, has met with government officials in the DR. Lost children and orphans are being identified now and may start arriving in the DR Kids Alive facilities! We are making plans for their arrival. Please pray! January 14, 2010 - Missionaries in Haiti express concern for increased cost of basic supplies like food and fuel. Plans are being made to take in as many orphans as we can as soon as they have been identified by officials into our unharmed housing in the north of Haiti and possibly in the DR. ========================================== FROM THE HAITI CIVIL SOCIETIES ORGANIZATION SITE: Address in Haiti: Ruelle Cimitere Apres World Vision, Balan, Haiti Acronym: KAI Contact Name in Haiti: Robinson Gedeus Contact Name at Headquarters: Beth Murvine Phone: 219-464-9035 Email: beth @kidsalive.org Web Site: http://www.kidsalive.org Areas of Activity : Children & Youth, Education, Food Security, Health, Housing, Humanitarian Assistance, Microfinance, Other, Water & Sanitation, Women's Programs Year founded : 1st January 1916 Budget Range : Over 500,000 Number of Staff : 21-100 Funded By : Kids Alive is funded by individual partners, organizations, foundations, businesses, and churches. Organization Details : Kids Alive International serves orphaned and abandoned children worldwide, providing them with food, shelter, education, and medical care. We have been working in Haiti since 2002 and have provided assistance during the earthquake relief efforts. Currently, Kids Alive is making preparations to care for approximately 300 children left orphaned/homeless after the devastating earthquake. ========================================= FROM THE SITE: Haiti Relief efforts are underway for the thousands of children left homeless or orphaned by the Haiti earthquake. The country of Haiti is plagued by a startling number of problems, particularly when it relates to their children. * There are more than 380,000 orphans in Haiti today—the majority of which are severely malnourished. * Sixty-five percent of Haitian children will never finish elementary school and 80% won’t ever attend high school. * Almost 8% of children born in Haiti will die before they celebrate their fifth birthday. * More than 21% of all children in Haiti are involved in child labor before the age of 14. * Thirty percent of Haitian children will be forced to marry before they are ready—many before they reach puberty. These conditions leave hundreds of thousands of children desperately in need of care and destined to repeat the cycle of poverty. As the poorest country in the Western hemisphere, Haiti is home to more than 9.5 million people in an area no bigger than the state of Maryland. The poverty in Haiti is so horrific that it is nearly unimaginable--and the most heartbreaking of its victims are the children. Kids Alive serves these unwanted children by giving them an education, nourishment, and a place to call home. Kids Alive International began ministry in Haiti in 2002, and opened their first children’s home in Cap Haitien two years later, rescuing children who would otherwise have no future. Presently, Kids Alive ministers children in three homes. Given the recent disaster in Haiti, our future plans now include additional homes for 50 to 100 children orphaned by the earthquake. mission: Kids Alive reflects the love of Christ by rescuing orphans and vulnerable children, nurturing them with quality holistic care and sharing with them the transforming power of Jesus Christ so they are enabled to give hope to others. We are: * Faith Based - God alone transforms lives. As we rescue children-in-crisis, we submit to the Lordship of Jesus Christ, depend on the power of the Holy Spirit, accept the authority of the scriptures, and make prayer central to our ministry. * Action Oriented - We follow the example of Jesus Christ. We work to build just societies as we respond with sacrificial love to the world’s suffering children. * Child Focused - We believe children should have opportunity to mature and develop their full potential. We care for the whole child by providing quality programs that meet their spiritual, educational, social, physical, and emotional needs. * An International Team - We cooperate closely with national Christians to develop culturally relevant, caring communities for children, and to encourage the growth of godly leadership. The children of Kids Alive International homes and ministries will be prepared to lead in church and home with integrity. * Committed to Excellence - We intend to be known for our determined pursuit of quality, the integrity of our relationships, the clarity of our communication, and our accountability with human and financial resources entrusted to us. * Family Centered - We believe in the nurturing power of the family. We strengthen existing families and place unprotected children in safe, family-style homes. We prepare these children to one day lead healthy families of their own. -> Kids Alive reflects the love of Christ by rescuing orphans and vulnerable children, nurturing them with quality holistic care and sharing with them the transforming power of Jesus Christ so they are enabled to give hope to others. We are: * Faith Based - God alone transforms lives. As we rescue children-in-crisis, we submit to the Lordship of Jesus Christ, depend on the power of the Holy Spirit, accept the authority of the scriptures, and make prayer central to our ministry. * Action Oriented - We follow the example of Jesus Christ. We work to build just societies as we respond with sacrificial love to the world’s suffering children. * Child Focused - We believe children should have opportunity to mature and develop their full potential. We care for the whole child by providing quality programs that meet their spiritual, educational, social, physical, and emotional needs. * An International Team - We cooperate closely with national Christians to develop culturally relevant, caring communities for children, and to encourage the growth of godly leadership. The children of Kids Alive International homes and ministries will be prepared to lead in church and home with integrity. * Committed to Excellence - We intend to be known for our determined pursuit of quality, the integrity of our relationships, the clarity of our communication, and our accountability with human and financial resources entrusted to us. * Family Centered - We believe in the nurturing power of the family. We strengthen existing families and place unprotected children in safe, family-style homes. We prepare these children to one day lead healthy families of their own.
2019-04-23T12:38:13Z
http://citizencommandcenter.org/shelters/show/6027
Thank you for your interest in our company. Data protection is of particularly high priority to the management of ecom GmbH. It is generally possible to use the ecom GmbH internet site without disclosing any personal data. However, when any data subject wishes to use any particular service provided by our company over our website it may be necessary to process personal data. If such processing of personal data is necessary and no legal basis for such processing exists, we generally obtain the consent of the data subject. As the data controller, ecom GmbH has implemented many technical and organisational measures to ensure that personal data processed over this website are protected as completely as possible. Nevertheless there may be basic gaps in security when data is transmitted over the internet, therefore absolute security cannot be guaranteed. For this reason, any data subject is also at liberty to deliver information to us by alternative means, for example by telephone. Personal data means all information relating to an identified or identifiable natural person (hereinafter “data subject”). A natural person is considered to be identifiable when this natural person can be identified, directly or indirectly, in particular by means of association with an identifier such as a name, an identification number, location data, an online identifier, or with one or more particular features which are specific to the physical, physiological, genetic, mental, economic, cultural or social identity of this natural person. The data subject is any natural person, identified or identifiable, whose personal data are processed by the data controller. Processing is any operation carried out with or without the help of automated procedures or any such set of operations in connection with personal data, such as collection, recording, organisation, sorting, storage, adaptation or alteration, reading, searching, usage, disclosure through transmission, distribution or any other form of making the data available, comparison or linking, restriction, erasure or destruction. The restriction of processing is the marking of stored personal data with the aim of restricting their processing in future. Profiling is any form of automated processing of personal data consisting of the use of personal data to evaluate certain personal aspects relating to a natural person, in particular to analyse or predict aspects concerning the work performance, economic situation, health, personal preferences, interests, reliability, behaviour, whereabouts or change of location of this natural person. Pseudonymisation is the processing of personal data in such a manner that the personal data can no longer be associated with a specific data subject without the employment of additional information, provided that this additional information can be stored separately, and technical and organisational measures exist to ensure that the personal data cannot be associated with an identified or identifiable natural person. The controller or data controller is the natural or legal person, authority, agency or other body who alone or together with others decides the purpose and means of processing personal data. If the purpose and means of this processing are determined by Union law or the law of the Member States, the controller or respectively his or her appointment may be determined in accordance with Union law or the law of the Member States. The processor is a natural or legal person, authority, agency or other body who processes personal data on behalf of the controller. The recipient is a natural or legal person, authority, agency or other body to whom personal data are disclosed, whether a third party or not. Public authorities which receive data within the framework of a particular enquiry in accordance with Union law or the law of the Member States shall not be regarded as recipients. A third party is any natural or legal person, authority, agency or other body other than the data subject, the controller, the processor and persons who, under the direct authority of the controller or the processor, is authorised to process personal data. Consent is any freely given, informed and unambiguous indication of the data subject’s wishes given for the specific purpose in the form of a declaration or other clear affirmative action, with which the data subject indicates that he or she agrees to the processing of personal data relating to him or her. Any data subject may contact our data protection officer at any time with any questions or suggestions relating to data protection. By using cookies, ecom GmbH can provide services that are more user-friendly than would be possible without placing cookies. The data subject may, at any time, prevent our website from setting cookies by means of the appropriate setting in the internet browser used, and in so doing permanently stop cookies from being set. Furthermore, cookies that have already been stored can be erased at any time by an internet browser or other software programs. This is possible in all standard internet browsers. If the data subject deactivates the setting of cookies in the internet browser used, it is possible that not all the functions of our website will be fully usable. The ecom GmbH website collects a range of general data and information each time the website is called up by a data subject or an automated system. These general data and this information are stored in the server log files. Data that may be collected include (1) the browser used and the version, (2) the operating system used by the accessing system, (3) the website from which an accessing system accesses our website (“referrer”), (4) the sub-web pages over which an accessing system is directed to our website, (5) the date and time of access to the website, (6) an internet protocol address (IP address), (7) the internet service provider of the accessing system and (8) other similar data and information designed to prevent danger in the event of attacks on our internet technology systems. ecom GmbH draws no conclusions about the data subject from using this general data and information. This information is instead needed in order to (1) deliver the content of our website correctly, (2) optimise the content of our website as well as the advertising for it, (3) ensure the lasting functionality of our information technology systems and the technology of our website and to (4) provide the necessary information to law enforcement authorities for criminal prosecution in the case of a cyber-attack. These anonymously collected data and information are analysed firstly for statistical purposes, secondly with the aim of increasing data protection and data security in our company, and lastly to ensure the best level of protection for the personal data processed by us. The anonymised data in the server log files are stored separately from all the personal data provided by a data subject. If we disclose data to other persons or businesses (processors or third parties), transmit them to these parties or otherwise grant these parties access to the data in the course of our processing, this takes place only on the basis of legal permission (e.g. if transmission of data to a third party, such as a payment service provider in accordance with Art. 6 para. 1 b) GDPR, is necessary for contractual fulfilment); you have given your consent; there is a legal obligation to do this; or based on our legitimate interests (e.g. when using agents, web hosts etc.). If we instruct third parties to carry out processing of data on the basis of a so-called “processing agreement”, this takes place based on Art. 28 GDPR. If we process data in a third country (i.e. outside the European Union (EU) or the European Economic Area (EEA)), or this occurs in the course of using the services of third parties or of disclosure or the transmission of data to third parties, this shall only take place if it does so to fulfil our (pre-)contractual obligations based on your consent on the basis of a legal obligation or based on our legitimate interests. Subject to legal or contractual permission, we shall only process the data or have it processed in a third country where the special conditions laid out in Art. 44 et seq. GDPR exist. That is, processing is carried out based on special guarantees such as the officially recognised establishment of one of the data protection levels applicable in the EU (e.g. for the USA through the “Privacy Shield”) or following officially recognised special contractual obligations (so-called “standard contractual clauses”). We process data as part of the administrative functions and organisation of our business, and for accounting and compliance with statutory obligations such as archiving. For these purposes we process the same data that we process in the course of performing our contractual obligations. The bases for processing are Art. 6 para. 1 c) GDPR and Art. 6 para. 1 f) GDPR. Customers, interested parties, business partners and website visitors are affected by this processing. The purpose and our interest in processing are administration, financial accounting, office organisation and archiving of data; that is, tasks required to maintain our business activities, perform our responsibilities and render our services. The erasure of data relating to contractual obligations and contractual communication complies with the instructions specified for these processing activities. We disclose or transmit data to the financial authorities, advisors such as accountants or auditors, and to other charging centres and payment service providers. In addition, we store information relating to suppliers, organisers and other business partners on the basis of our business interests, for example for the purpose of contact at a later date. In general we store this data, which is predominantly business-related, permanently. In order to operate our business economically and to be able to detect market trends and the wishes of our customers and users, we analyse data provided to us for business processes, contracts and enquiries. This involves the analysis of inventory data, communication data, contract data, payment data, usage data and metadata based on Art. 6 para. f) GDPR, provided that customers, interested parties, business partners, visitors and users of the online offering are data subjects. Analysis takes place for the purpose of business assessments, marketing and market research. In the course of analysis we take into account the profile of the registered user with details of, for example, their purchasing transactions. These analyses help us to increase user-friendliness, to optimise our offering and to increase our operating efficiency. The analyses are for our purposes only and are not distributed externally unless the analyses are made anonymously with values amalgamated. If these analyses or profiles identify individuals, they shall be erased or anonymised if the user terminates the relationship, and otherwise after two years following conclusion of the contract. Otherwise overall business analyses and general trend determinations are compiled anonymously as far as possible. The data subject has the option to register on the data controller’s website by providing personal information. The specific personal data which are transmitted to the controller are determined by the respective entry mask used for registration. The personal data provided by the data subject are collected and stored solely for internal use by the data controller and for internal purposes. The data controller may also cause data to be passed on to one or more processors, for example a parcel service, which shall also use the personal data solely for internal purposes, which shall be assigned to them by the controller. Upon registering on the data controller’s website, the IP address assigned to the data subject by the internet service provider (ISP) and the date and time of registration are also stored. These data are stored because only by doing so can misuse of our services be prevented and, when necessary, these data make it possible to resolve offences that have been committed. For this reason, storage of these data is necessary for the data controller as security. In general these data shall not be passed on to third parties provided there is no statutory requirement for disclosure and disclosure is not required for judicial proceedings. When the data subject registers by voluntarily providing personal data, this enables the data controller to offer the data subject content or services that, due to the nature of the matter, can only be offered to registered users. Registered persons are free to amend the personal data provided upon registration at any time, or to have these completely erased from the controller’s database. Upon request, the data controller shall provide information to any data subject at any time as to what personal data concerning the data subject is stored. In addition, the data controller shall amend or erase the personal data upon request or advice from the data subject, provided that there are no legal obligations that require us to keep them. All employees of the data controller shall be available to the data subject as contact for this purpose. On the ecom GmbH website, users are offered the opportunity to subscribe to our company’s newsletter. The entry mask used for this determines the specific personal data that are transmitted to the data controller when ordering the newsletter. ecom GmbH informs its customers and business partners at regular intervals, by means of a newsletter, about offers made by the company. In general, our company’s newsletter can only be received by a data subject if (1) the data subject has a valid email address and (2) the data subject registers for the newsletter. For legal reasons, using the double opt-in procedure, a confirmation email shall first be sent to the email address provided by the data subject. The purpose of this confirmation email is to check whether the owner of the email address has authorised receipt of the newsletter as a data subject. When a data subject registers for the newsletter, we also store the IP address allocated to the data subject’s computer system by the internet service provider (ISP) at the time of registration as well as the date and time of registration. The collection of these data is necessary to be able to retrace any (possible) misuse of a data subject’s email address at a later date, and thus acts as legal protection for the data controller. The personal data collected in the course of registration for the newsletter is used solely to send our newsletter. In addition, subscribers to the newsletter may be informed by email, provided this is necessary for providing the newsletter service or a registration relating to this, how this may be the case in the event of changes to the newsletter offering or of changes to the technical conditions. Data collected for the purposes of the newsletter service shall not be passed on to third parties. Subscription to our newsletter may be cancelled by the data subject at any time. Consent to storing personal data given to us for sending the newsletter may be withdrawn at any time. There is a link in every newsletter that enables withdrawal of consent. In addition, the option exists to unsubscribe at any time directly on the website of the controller responsible for sending out newsletters or to provide notification of this by other means. ecom GmbH’s newsletters contain so-called tracking pixels. A tracking pixel is a miniature graphic which is embedded in such emails and is sent in HTML format in order to enable log-file recording and analysis. This allows statistical evaluation of the success or failure of online marketing campaigns to be carried out. With the aid of these embedded tracking pixels, ecom GmbH can recognise whether and when an email is opened by a data subject and which links in the email have been called up by the data subject. The personal data collected by tracking pixels contained in the newsletter are stored by the data controller and analysed in order to optimise the sending of newsletters and to tailor the content of future newsletters even better to the interests of the data subject. These personal are not passed on to third parties. Data subjects are entitled at any time to withdraw the declaration of consent made especially for receipt of the newsletter using the double opt-in procedure. After consent has been withdrawn, the personal data shall be erased by the data controller. ecom GmbH shall automatically interpret unsubscribing from the newsletter as withdrawal of consent. In accordance with statutory provisions, the ecom GmbH website contains information that enables fast electronic contact with our company and direct communication with us, which also includes a general electronic post address (email address). If a data subject makes contact with the data controller by email or using the contact form, the data transmitted by the data subject are automatically stored. Such personal data voluntarily transmitted to the data controller is stored for the purpose of processing or making contact with the data subject. This personal data shall not be passed on to third parties. Personal data relating to the data subject are processed and stored for the data controller only for the period necessary to achieve the purpose of storage, or insofar as provisions are made for this by the European legislative and regulatory authorities, or any other legislator, in laws and regulations to which the data controller is subject. If the purpose for storage lapses, or if the storage period required by the European legislative and regulatory authorities on any other legislator expires, the personal data shall be routinely blocked or erased in accordance with the statutory requirements. Every data subject has the right granted by the European legislative and regulatory authorities to request confirmation from the data controller of whether the controller processes the data subject’s personal data. If a data subject wishes to use this right to confirmation, he or she may contact an employee of the data controller for this purpose at any time. the existence of automated decision-making including profiling in accordance with Article 22 paras. 1 and 4 GDPR and — at least in this case — meaningful information about the logic used and the implications and effects of this type of processing envisaged for the data subject. In addition, the data subject has the right to information on whether personal data is transmitted to a third country or to an international organisation. If this is the case, the data subject also has the right to obtain information on the appropriate guarantees in connection with this transmission. If a data subject wishes to use this right to access, he or she may contact an employee of the data controller for this purpose at any time. Every data subject whose data is processed has the right granted by the European legislative and regulatory authorities to request immediate rectification of inaccurate personal information relating to him or her. In addition, the data subject has the right, taking into account the purpose of processing, to request the completion of incomplete data – this may also be done by means of an additional declaration. If a data subject wishes to use this right to rectification, he or she may contact an employee of the data controller for this purpose at any time. the personal data were collected in connection to services offered by an information society in accordance with Art. 8 para. 1 GDPR. Provided one of the reasons set out above applies, and a data subject wishes personal data that is stored by ecom GmbH to be erased, he or she may contact an employee of the data controller for this purpose at any time. The employee of ecom GmbH shall arrange for the data to be erased without delay. If the personal data has been made public by ecom GmbH, and if our company is obliged to erase the personal data in accordance with Art. 17 para. 1 GDPR, ecom GmbH shall take appropriate measures, taking into account the available technology and the implementation costs, as well as the technical nature, to inform other data controllers who process the published personal data that the data subject has requested the erasure of all links to this personal data and of copies and replicas of these personal data by the other data controllers, provided processing is not necessary. The employee of ecom GmbH shall take the appropriate measures on a case-by-case basis. the data subject has lodged an objection to processing in accordance with Art. 21 para. 1 GDPR, and it is not yet clear whether the legitimate grounds of the controller prevail over those of the data subject. Provided one of the reasons set out above applies, and a data subject wishes personal data that is stored by ecom GmbH to be restricted, he or she may contact any employee of the data controller for this purpose at any time. The employee of ecom GmbH shall arrange for the data to be restricted without delay. Every data subject whose data is processed has the right granted by the European legislative and regulatory authorities to receive the personal data concerning him or her which he or she provided to the controller in a structured, commonly-used, machine-readable format. He or she also has the right to transmit these data to another controller without hindrance from the controller to whom the data were supplied, provided processing is based on consent in accordance with Art. 6 para. 1 a) GDPR or Art. 9 para. 2 a) GDPR or on an agreement in accordance with Art. 6 para. 1 b) GDPR, and processing takes place by automated means, provided that processing is not necessary for performance of a task carried out in the public interest or in the exercise of official authority vested in the controller. In addition, when exercising the right to data portability in accordance with Art. 20 para. 1 GDPR, the data subject has the right to effect transfer of the personal data directly from one controller to another controller, as far as this is technically feasible and provided that this does not affect the rights and freedoms of other persons. The data subject may contact an employee of ecom GmbH at any time in order to exercise the right to data portability. Every data subject whose data is processed has the right granted by the European legislative and regulatory authorities, for reasons relating to his or her personal situation, to lodge an objection at any time to the processing of personal data relating to him or her which is carried out based on Art. 6 para. 1 e) or f) GDPR. This also applies to profiling based on these provisions. When the data subject objects to the processing of personal data, ecom GmbH shall cease to process these data, unless we can prove compelling legitimate reasons for this processing that override the interests, rights and freedoms of the data subject, or processing serves to establish, exercise or defend legal claims. If personal data are processed by ecom GmbH for direct marketing purposes, the data subject has the right to lodge an objection at any time to processing of the personal data for the purposes of such advertising. This also applies to profiling insofar as in it is connected to such advertising. If the data subject lodges an objection with ecom GmbH to processing for the purposes of direct advertising, ecom GmbH shall cease to process the personal data for these purposes. In addition, the data subject has the right, for reasons relating to his or her situation, to lodge a complaint against the processing of personal data concerning him or her which is carried out by ecom GmbH for scientific or historical research or for statistical purposes in accordance with Art. 89 para. 1 GDPR, unless such processing is necessary for fulfilment of a task that is in the public interest. The data subject may at any time contact any employee of ecom GmbH directly or another employee in order to exercise the right to object. The data subject is also free to exercise his or her right to object in connection with the use of information society services, notwithstanding Directive 2002/58/EC, using automatic means where technical specifications are used. Every data subject whose data is processed has the right granted by the European legislative and regulatory authorities not to be subject to a decision based solely on automated processing, including profiling, which produces legal effects concerning him or her or similarly significantly affects him or her. This shall not apply if the decision (1) is necessary for the conclusion or fulfilment of a contract between the data subject and the controller, or (2) is permitted on the basis of the law of the Union of the Member States to which the controller is subject, and these laws contain appropriate measures to protect the rights and freedoms as well as the legitimate interests of the data subject or (3) is made with the express consent of the data subject. If the decision is necessary (1) for the conclusion or fulfilment of a contract between the data subject and the controller or (2) is made with the express consent of the data subject, ecom GmbH shall take appropriate measures to safeguard the rights and freedoms as well as the legitimate interests of the data subject, including for this purpose at least the right to bring about human intervention on the part of the controller, to express his or her point of view and to contest the decision. If the data subject wishes to make use of rights relating to automated decision-making, he or she may contact an employee of the data controller at any time for this purpose. Every data subject whose data is processed has the right granted by the European legislative and regulatory authorities to withdraw consent at any time to the processing of personal data. If the data subject wishes to make use of his or her right to withdraw consent, he or she may contact an employee of the data controller at any time for this purpose. The data controller collects and processes personal data relating to job applicants for the purpose of handling the application process. Processing may take place by electronic means. This is particularly the case when an applicant transmits the appropriate application documents to the data controller by electronic means, for example by email or on a web form located on a website. If the data controller concludes a contract of employment with an applicant, the data transmitted for the purposes of handling the employment relationship shall be stored subject to the statutory provisions. If no contract of employment is concluded by the data controller with the applicant, the application documents shall be automatically erased two months after the decision to reject the application, provided that this is not prevented by any other legitimate interests on the part of the data controller. Another legitimate interest in this sense is, for example, a burden of proof in proceedings in accordance with the General Equality of Treatment Act (AGG). The data controller has integrated components from Facebook into this website. Facebook is a social network. A social network is an internet-based social meeting place, an online community, which generally speaking enables users to communicate with each other and to interact in virtual space. A social network can serve as a platform for the exchange of opinions and experiences, or enable the internet community to provide personal or business-related information. Among other things, Facebook allows users of the social network to create private profiles, upload photos and to network using friendship requests. The operating company of Facebook is Facebook, Inc., 1 Hacker Way, Menlo Park, CA 94025, USA. When a data subject lives outside the USA or Canada, the controller responsible for the processing of personal data is Facebook Ireland Ltd., 4 Grand Canal Square, Grand Canal Harbour, Dublin 2, Ireland. Each time an individual page on this website which is run by the data controller and on which a Facebook component (Facebook plugin) is integrated is called up, the internet browser on the data subject’s information technology system is automatically prompted by the respective Facebook component to download a display of the relevant Facebook component from Facebook. A general overview of all Facebook plugins can be accessed under https://developers.facebook.com/products/social-plugins/. In the course of this technical procedure, Facebook obtains information about which specific sub-page of our website was visited by the data subject. If the data subject is logged into Facebook at the same time, Facebook recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by the Facebook component and associated to the data subject’s respective Facebook account by Facebook. When the data subject operates one of the Facebook buttons that are integrated into our website, for instance the “Like” button, or if the data subject submits a comment, Facebook associates this information with the data subject’s personal Facebook account and stores these personal data. Facebook always receives information via the Facebook component that the data subject has visited our website if the data subject is logged into Facebook at the time our website is called up; this happens regardless of whether or not the data subject clicks on the Facebook component. If the data subject does not want this information to be transmitted to Facebook, he or she can prevent this transmission by logging out of his or her Facebook account before calling up our website. The data policy published by Facebook, which can be called up under https://www.facebook.com/full_data_use_policy, gives information about the collection, processing and use of personal data by Facebook. In addition, the settings options that Facebook offers for the protection of the data subject’s personal privacy are explained there. Various applications are also available which enable the transmission of data to Facebook to be suppressed. These applications can be used by the data subject to suppress the transmission of data to Facebook. The data controller has integrated components from Google Analytics (with anonymisation function) into this website. Google Analytics is a web analysis service. Web analysis is the detection, collection and evaluation of data on the behaviour of visitors to websites. A web analysis service collects, among other things, data about the website used by a data subject to access a website (“referrer”), which sub-pages of the website are visited, and the period for which a sub-page was viewed. A web analysis service is used predominantly for optimisation of a website and for cost-benefit analysis of internet advertising. For web analysis with Google Analytics, the data controller uses the “_gat._anonymizeIp” add-on. By means of this add-on, Google truncates and anonymises the IP address the data subject uses to connect to the internet when access to our website is made from a Member State of the European Union or one of the other contracting states of the European Economic Area. The purpose of the Google Analytics component is to analyse the stream of visitors to our website. Google uses the data and information acquired, among other things, to evaluate the usage of our website in order to compile online reports for us which show the activities on our website, and to provide other services related to the use of our website. Google Analytics sets a cookie on the data subject’s information technology system. It has been explained above what cookies are. Setting this cookie enables Google to analyse the usage of our website. Each time an individual page of this website, which is operated by the data controller and into which a Google Analytics component is integrated, is called up, the internet browser on the data subject’s information technology system is automatically prompted by the respective Google Analytics component to transmit data to Google for the purposes of online analysis. In the course of this technical procedure, Google obtains information such as the IP address of the data subject, which enables Google to identify the origin of the visitor and clicks, and subsequently allow for commission statements. Using these cookies, personal information such as the access time, the location from which access is made and the frequency of visits to our website by the data subject are stored. These personal data, including the IP address used by the data subject’s for internet access, are transmitted to Google in the United States of America for every visit to our web pages. These personal data are stored by Google in the United States of America. Google may pass the data obtained by this technical procedure on to third parties. The data subject may block the setting of cookies by our website, as explained above, at any time via the appropriate settings in the browser used, and thus permanently prevent the setting of cookies. Using this setting on the browser used also prevents Google setting cookies on the data subject’s information technology system. In addition, a cookie already set by Google Analytics can be erased at any time via the internet browser or other software programs. The data controller has integrated the Google+ button into this website as a component. Google+ is a so-called social network. A social network is an internet-based social meeting place, an online community, which generally speaking enables users to communicate with each other and to interact in virtual space. A social network can serve as a platform for the exchange of opinions and experiences, or enable the internet community to provide personal or business-related information. Among other things, Google+ allows users of the social network to create private profiles, upload photos and to network using friendship requests. The operating company of Google+ is Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, USA. Each time an individual page on this website which is run by the data controller and on which a Google+ button is integrated is called up, the internet browser on the data subject’s information technology system is automatically prompted by the respective Google+ button to download a display of the relevant Google+ button from Google. In the course of this technical procedure, Google obtains information about which specific sub-page of our website was visited by the data subject. More detailed information on Google+ can be found under https://developers.google.com/+/. If the data subject is logged into Google+ at the same time, Google recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by the Google+ button and associated to the data subject’s respective Google+ account by Google. When the data subject operates one of the Google+ buttons that are integrated into our website, thus making a Google+1 recommendation, Google associates this information with the data subject’s personal Google+ account and stores these personal data. Google stores the data subject’s Google+1 recommendation and makes this publicly accessible in accordance with the conditions relating to this accepted by the data subject. A Google+1 recommendation submitted by the data subject on this website shall subsequently be stored and processed, together with other personal data such as the name of the Google+ account used by the data subject and the photo stored in this account, in other Google services such as the Google search machine search engine results, the data subject’s Google account or other places, for example on websites or in connection with advertising. Google may also link the visit to our website with other personal data stored by Google. In addition, Google records these personal data for the purpose of improving or optimising Google’s different services. Google always obtains the information, via the Google+ button, that the data subject has visited our website if the data subject is logged into Google+ at the time our website is called up; this happens regardless of whether or not the data subject clicks on the Google+ button. If the data subject does not want this information to be transmitted to Google, he or she can prevent this transmission by logging out of his or her Google+ account before calling up our website. The data controller has integrated Google AdWords into this website. Google AdWords is an internet advertising service that allows advertisers to place advertisements both in Google search engine results and in the Google advertising network. Google AdWords allows advertisers to specify pre-determined keywords, by means of which an advertisement can be displayed exclusively in the Google search machine when the user calls up a search result relevant to the keyword with the search machine. In the Google advertising network, advertisements are displayed on topically relevant websites using an automatic algorithm, taking into account the previously determined keywords. The operating company of the Google AdWords services is Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, USA. The purpose of Google AdWords is to advertise our website on the websites of third-party companies and in the Google search machine’s search results by inserting advertising relevant to users, and to insert third-party advertising on our website. If a data subject visits our website via a Google advertisement, a so-called conversion cookie is set on the data subject’s information technology system. It has been explained above what cookies are. A conversion cookie loses its validity after three days and does not identify the data subject. Provided the cookie has not yet expired, the conversion cookie recognises whether a specific sub-page, for instance the shopping basket in our online shop, has been called up on our website. Google can also recognise, using the conversion cookie, whether a data subject who has accessed our site through an AdWords advertisement has generated a sale; that is, whether they have carried out or terminated a purchase. Data and information collected through the use of conversion cookies are used by Google to create visitor statistics for our website. These visitor statistics in turn are used by us in order to determine the total number of visitors who have been connected to us via AdWords advertisements, and in order to optimise our AdWords advertisements in the future. Neither our company nor other AdWords advertisers receive information from Google which allows the data subject to be identified. Personal data, for example on websites visited by the data subject, are stored by means of conversion cookies. Thus every time our web pages are visited personal data, including the IP address of the data subject’s internet connection, are transmitted to Google in the United States of America. These personal data are stored by Google in the United States of America. Google may transmit data collected by this technical procedure to third parties. The data subject may block the setting of cookies by our website, as explained above, at any time via the appropriate settings in the internet browser used, and thus permanently prevent the setting of cookies. Using this setting on the internet browser used also prevents Google setting a conversion cookie on the data subject’s information technology system. In addition, a cookie already set by Google AdWords can be erased at any time via the internet browser or other software programs. The data subject also has the option to object to interest-based advertising provided by Google. To do so, the data subject must call up the link https://adssettings.google.com/ from the internet browser he or she uses and make the required settings there. The data controller has integrated the Instagram service into this website. Instagram is a service that is classified as an audio-visual platform and which allows users to share photos and videos, and also to distribute these data on other social networks. The operating company of the Instagram service is Instagram LLC, 1 Hacker Way, Building 14 First Floor, Menlo Park, CA, USA. Each time an individual page of this internet site which is run by the data controller and into which an Instagram component (Insta button) is integrated is called up, the internet browser on the data subject’s information technology system automatically, via the respective Instagram component, prompts Instagram to download a display of the respective component. In the course of this technical procedure, Instagram obtains information about which specific sub-page of our website was visited by the data subject. If the data subject is logged into Instagram at the same time, Instagram recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by the Instagram component and associated to the data subject’s respective Instagram account by Instagram. When the data subject operates one of the Instagram buttons that are integrated into our website, the data and information transmitted by this are associated to the data subject’s personal Instagram account and stored and processed by Instagram. Instagram always receives information via the Instagram component that the data subject has visited our website if the data subject is logged into Instagram at the time our website is called up; this happens regardless of whether or not the data subject clicks on the Instagram component. If the data subject does not want this information to be transmitted to Instagram, he or she can prevent this transmission by logging out of his or her Instagram account before calling up our website. The data controller has integrated components from Twitter into this website. Twitter is a multi-lingual, publicly accessible micro-blogging service on which users may publish and distribute Tweets (short messages limited to 280 characters). These short messages can be called up by anyone, not just persons registered on Twitter. Tweets are also displayed to so-called followers of the respective user. Followers are other Twitter users who follow a user’s Tweets. Twitter also enables a wider audience to be addressed via hashtags, links or re-tweets. Each time an individual page of this internet site which is run by the data controller and into which a Twitter component (Twitter button) is integrated is called up, the internet browser on the data subject’s information technology system automatically, via the respective Twitter component, prompts Twitter to download a display of the respective Twitter component. Further information on Twitter buttons can be found under https://about.twitter.com/de/resources/buttons. In the course of this technical procedure, Twitter obtains information about which specific sub-page of our website was visited by the data subject. The purpose of integrating the Twitter component is to enable users to disseminate the content of this website, to publicise our website in the digital world and to increase our visitor numbers. If the data subject is logged into Twitter at the same time, Twitter recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by the Twitter component and associated to the data subject’s respective Twitter account by Twitter. When the data subject operates one of the Twitter buttons that are integrated into our website, the data and information transmitted by this is associated to the data subject’s personal Twitter account and stored and processed by Twitter. Twitter always receives information via the Twitter component that the data subject has visited our website if the data subject is logged into Twitter at the time our website is called up; this happens regardless of whether or not the data subject clicks on the Twitter component. If the data subject does not want this information to be transmitted to Twitter, he or she can prevent this transmission by logging out of his or her Twitter account before calling up our website. The data controller has integrated components from Xing into this website. Xing is an internet-based social network that allows users to connect with existing business contacts as well as to establish new business contacts. The individual user can create his or her personal profile with Xing. Businesses can, for example, create company profiles or publish job vacancies on Xing. The operating company of Xing is XING SE, Dammtorstraße 30, 20354 Hamburg, Deutschland. Each time an individual page of this internet site which is run by the data controller and into which a Xing component (Xing plug-in) is integrated is called up, the internet browser on the data subject’s information technology system automatically, via the respective Xing component, prompts Xing to download a display of the respective Xing component. Further information on Xing plug-ins can be found under https://dev.xing.com/plugins. In the course of this technical procedure, Xing obtains information about which specific sub-page of our website was visited by the data subject. If the data subject is logged into Xing at the same time, Xing recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by the Xing component and associated to the data subject’s respective Xing account by Xing. When the data subject operates one of the Xing buttons that are integrated into our website, for example the “Share” button, Xing associates the information with the data subject’s personal Xing user account and stores these personal data. Xing always receives information via the Xing component that the data subject has visited our website if the data subject is logged into Xing at the time our website is called up; this happens regardless of whether or not the data subject clicks on the Xing component. If the data subject does not want this information to be transmitted to Xing, he or she can prevent this transmission by logging out of his or her Xing account before calling up our website. The data controller has integrated components from YouTube into this website. YouTube is an internet video portal which enables video publishers to post video clips free of charge and other users to view, evaluate and comment on these, also free of charge. YouTube allows the publication of all kinds of videos, so that not just complete films and television programmes but also music videos, trailers or videos made by users themselves can be accessed over the internet portal. The operating company of YouTube is YouTube, LLC, 901 Cherry Ave., San Bruno, CA 94066, USA. YouTube, LLC is a subsidiary company of Google Inc., 1600 Amphitheatre Pkwy, Mountain View, CA 94043-1351, USA. Each time an individual page of this internet site which is run by the data controller and into which a YouTube component (YouTube video) is integrated is called up, the internet browser on the data subject’s information technology system automatically, via the respective YouTube component, prompts YouTube to download a display of the respective YouTube component. Further information on YouTube can be found under https://www.youtube.com/yt/about/. In the course of this technical procedure, YouTube and Google obtain information about which specific sub-page of our website was visited by the data subject. If the data subject is logged into YouTube at the same time, YouTube recognises which specific sub-page of our website the data subject visits each time the data subject calls up our website and during the entire duration of the respective visit to our website. This information is collected by YouTube and Google and associated to the data subject’s respective account. YouTube and Google always receives information via the YouTube component that the data subject has visited our website if the data subject is logged into YouTube at the time our website is called up; this happens regardless of whether or not the data subject clicks on the YouTube component. If the data subject does not want this information to be transmitted to YouTube and Google, he or she can prevent this transmission by logging out of his or her YouTube account before calling up our website. The data controller has integrated components from PayPal into this website. PayPal is an online payment service provider. Payments are processed through so-called PayPal accounts which constitute virtual private or business accounts. PayPal also offers the option of processing virtual payments by credit card if a user does not have a PayPal account. A PayPal account is managed through an email address, which is why it does not have a conventional account number. PayPal allows the release of payments to third parties and also the receipt of payments. PayPal also assumes trustee functions and offers buyer protection services. If the data subject selects “PayPal” as the payment option during the order process in our online shop, automated data on the data subject is transmitted to PayPal. By selecting this payment option, the data subject consents to the transfer of personal data necessary for the payment process. The personal data transmitted to PayPal usually consists of first name, surname, address, email address, telephone number, mobile telephone number and any other data necessary to process the payment. Also necessary for processing the purchase contract are those personal data associated with the respective order. Data are transmitted for the purposes of processing payments and preventing fraud. The data controller transmits personal data to PayPal in particular when there is a legitimate interest in its transmission. Personal data exchanged between PayPal and the data controller may be transmitted by PayPal to credit agencies. The purpose of this transmission is to check identity and creditworthiness. PayPal also passes personal data on to affiliated companies and service providers or subcontractors if this is necessary for the fulfilment of contractual obligations or the data needs to be processed on their behalf. The data subject has the right to withdraw consent at any time to the handling of personal data by PayPal. Withdrawal of consent shall not affect processing, use or transmission of personal data that is absolutely necessary for (contractual) handling of payments. The legal basis for processing operations carried out by our company under which we obtain consent for the purpose of specific processing is Art. 6 para. I a) GDPR. If this processing of personal data is carried out to fulfil a contract whose contractual partner is the data subject, as is the case, for example, for processing operations necessary for the delivery of goods or provision of other services or return service, processing is based on Art. 6 para. b) GDPR. The same applies to those processing operations that are necessary for the performance of pre-contractual measures, or in the case of enquiries about our products or services. If our company is subject to a legal obligation which makes the processing of personnel data necessary, such as to comply with tax obligations, processing is based on Art. 6 para. I c) GDPR. In rare cases, the processing of personal data may be necessary to protect the vital interests of the data subject or another natural person. This would be the case, for example, if a visitor to our operation were injured and his or her name, age, health insurance data and other vital information have to be passed on to an doctor, a hospital or another third party. In this event, processing would be based on Art. 6 para. I d) GDPR. Lastly, processing operations may be based on Art. 6 para. I f) GDPR. Processing operations which are not covered by any of the above legal grounds are based on this legal foundation if processing is necessary to protect the legitimate interests of our company or a third party, provided that these are not overridden by the interests and fundamental rights and freedoms of the data subject. We are permitted to carry out these processing operations in particular because they are specifically mentioned by the European legislators. In this respect, it is considered that a legitimate interest may be assumed if the data subject is a customer of the controller (Recital 47 sentence 2 GDPR). When the processing of personal data is based on Article 6 para 1 f) GDPR, our legitimate interest is to conduct our business for the benefit of the welfare of all our employees and our shareholders. The criterion for the duration that personal data are stored is the respective legal retention period. Following expiry of this period, the corresponding data shall be routinely erased, provided that they are no longer required for fulfilment or initiation of a contract. We inform you that the provision of personal data is in part prescribed by law (e.g. tax regulations) or may arise from contractual regulations (e.g. information on the contracting party). It may sometimes be necessary to the conclusion of a contract for a data subject to make available to us personal data that subsequently have to be processed by us. The data subject is, for example, obliged to provide us with personal data when our company enters into a contract with him or her. Failure to provide personal data may result in it not being possible to conclude a contract with the data subject. Before the data subject provides personal data, he or she must contact one of our employees. Our employee shall inform the data subject, on a case-by-case basis, whether the provision of personal data is legally or contractually required and whether it is necessary for the conclusion of the contract; whether an obligation to provide the personal data exists; and what the consequences of failure to provide the personal data might be. As a responsible company, we use neither an automated decision-making process nor profiling.
2019-04-24T10:48:54Z
https://www.ecom.de/en/5872-2/
You searched for subject:(Postmodernism). Showing records 1 – 30 of 1161 total matches. 1. Woods, John Dermot. The complete collection of people, places & things. ▼ The introduction, “Completing the Collection,” is a critical exploration of the sources from which The Complete of Collection of people, places & things leaked. It is a study of the personal and societal pressure exerted upon us by the aesthetic allure of consumerism. The essay looks particularly at the marketing culture surrounding children’s toys in the United States in the 1980s and the public gallery that is the consumer complex of contemporary Tokyo. Each new topic is introduced by a drawing, mimicking the form of the collection it introduces. The Complete Collection of people, places & things is a collection of inter‐related short short stories. In the vein of Sherwood Anderson’s Winesburg, Ohio, it follows the anxious lives of several residents of a single town. This town is peopled by citizens named after popular toys and television characters of the 1980s. The stories particularly look at the town’s ultimate decadence during the mayoral administration of the shy and nervous Optimus Prime. Each story is introduced by a drawn image, meant to break open, rather than illustrate, the narrative. Advisors/Committee Members: Reginald McKnight. Woods, John Dermot. “The complete collection of people, places & things.” 2007. Doctoral Dissertation, University of Georgia. Accessed April 21, 2019. http://purl.galileo.usg.edu/uga_etd/woods_john_d_200712_phd. Woods, John Dermot. “The complete collection of people, places & things.” 2007. Web. 21 Apr 2019. Woods JD. The complete collection of people, places & things. [Internet] [Doctoral dissertation]. University of Georgia; 2007. [cited 2019 Apr 21]. Available from: http://purl.galileo.usg.edu/uga_etd/woods_john_d_200712_phd. 2. Marcec, Daniel. The modern postmodern condition: seeking religious identity in contemporary American culture. ▼ Modern American Christians that adhere to the Biblical invocation to be "in the world, but not of the world", are faced with a unique dilemma in contemporary American culture. Due to American public culture’s emphasis on individualism and Christianity’s emphasis on a personal relationship with Jesus Christ, many Christians feel compelled by these social influences to develop their own individual brands of Christianity, which in many ways threaten parochial Christian traditions. Therefore, new religious communities are arising blending influences from these Christian traditions and from popular American culture. By doing so, Christians involved in these communities are attempting to balance their individual identities with communal worship in order to adapt to a rapidly changing society. Advisors/Committee Members: Carolyn Jones Medine. Marcec, Daniel. “The modern postmodern condition: seeking religious identity in contemporary American culture.” 2008. Masters Thesis, University of Georgia. Accessed April 21, 2019. http://purl.galileo.usg.edu/uga_etd/marcec_daniel_g_200805_ma. Marcec, Daniel. “The modern postmodern condition: seeking religious identity in contemporary American culture.” 2008. Web. 21 Apr 2019. Marcec D. The modern postmodern condition: seeking religious identity in contemporary American culture. [Internet] [Masters thesis]. University of Georgia; 2008. [cited 2019 Apr 21]. Available from: http://purl.galileo.usg.edu/uga_etd/marcec_daniel_g_200805_ma. 3. Allan, Angela S. Postmodern Realism and the Neoliberal Imagination. ▼ "Postmodern Realism and the Neoliberal Imagination" argues that postmodern fiction’s primary engagement with the politics of neoliberalism is generic, rather than ideological. Neoliberalism, I suggest, threatened to dissolve the very notion of reality by replacing it with the financial market as the primary engine for all social, political, and economic experience. This dissertation contends that in response writers such as William Gaddis, Stephen King, Joan Didion, Ishmael Reed, and Philip Roth conceived of the novel genre as a way of reconstructing the social order in the face of neoliberalism’s economic determinism. By actively engaging questions about their professional relationship to the free market, these writers articulate the limits and the limitations of the neoliberal imagination, while emphasizing their own formal commitment to realism as the precondition of novelistic production. To think of postmodernism as the reinvention of realism—rather than the rejection of it—suggests the common aesthetic project of the novel form, even in its disparate incarnations. Postmodern realism thus envisions the novel as an imagined alternative for mediating the proper relationship between the market and society. Accordingly, this dissertation expands our understanding of postmodernism by reading it not as a symptom of or an escape from capitalist pursuits, but as a powerful confrontation of neoliberalism’s ideology of the market. I examine a diverse literary and theoretical archive alongside contemporary economic and political debates surrounding neoliberalism in order to provide a cultural history of the realist novel’s evolution from modernist social critique to postmodernist social institution. Advisors/Committee Members: Nabers, Deak (Director), Burrows, Stuart (Reader), Gould, Philip (Reader). Allan, Angela S. “Postmodern Realism and the Neoliberal Imagination.” 2015. Doctoral Dissertation, Brown University. Accessed April 21, 2019. https://repository.library.brown.edu/studio/item/bdr:419362/. Allan, Angela S. “Postmodern Realism and the Neoliberal Imagination.” 2015. Web. 21 Apr 2019. Allan AS. Postmodern Realism and the Neoliberal Imagination. [Internet] [Doctoral dissertation]. Brown University; 2015. [cited 2019 Apr 21]. Available from: https://repository.library.brown.edu/studio/item/bdr:419362/. 4. Spreitzer, Peter (Peter William). The postwar novel as postmodern : revisiting Catch-22 & Slaughterhouse-five. ▼ This thesis is an exploration of Catch-22 (1961) and Slaughterhouse-Five (1969), two early documents of American postmodern literature. In particular, this thesis attempts to present the critical discussions surrounding each novel as parallel to the broader theoretical discussions surrounding the concept of postmodernism. My contention is that, in both of these discussions, due in part to the natural teleological and linear tendencies of literary criticism, and despite the professed openness of postmodern thought to paradox, diligent efforts must be made to periodically reassert collapsed possibilities in literature. With this in mind, I approach Catch-22 and Slaughterhouse-Five in an effort to, first, demonstrate how critics have diminished the potential meaning of each novel in imposing their own notions of a literary-historical trajectory, and, second, how readings of marginalized characters in each novel can reveal untapped potential for further exploration of the broadest definitions of the project of postmodernism. Advisors/Committee Members: Ahearn, Kerry (advisor), Davison, Neil (committee member). Spreitzer, Peter (Peter William). “The postwar novel as postmodern : revisiting Catch-22 & Slaughterhouse-five.” 2009. Masters Thesis, Oregon State University. Accessed April 21, 2019. http://hdl.handle.net/1957/11912. Spreitzer, Peter (Peter William). “The postwar novel as postmodern : revisiting Catch-22 & Slaughterhouse-five.” 2009. Web. 21 Apr 2019. Spreitzer P(W. The postwar novel as postmodern : revisiting Catch-22 & Slaughterhouse-five. [Internet] [Masters thesis]. Oregon State University; 2009. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/1957/11912. 5. Greenway, David Lee. David and me: in order to form a more postmodern fandom. ▼ This project is an autoethnographic examination of a young filmmaker’s relationship to the films of David Fincher. Informed by the fandom work of Storey and Jenkins, and examined through the lens of postmodernism, this project is an individual journey through a singular fan culture. This paper is a companion piece to the author’s video thesis. Advisors/Committee Members: Nate Kohn. Greenway, David Lee. “David and me: in order to form a more postmodern fandom.” 2003. Masters Thesis, University of Georgia. Accessed April 21, 2019. http://purl.galileo.usg.edu/uga_etd/greenway_david_l_200308_ma. Greenway, David Lee. “David and me: in order to form a more postmodern fandom.” 2003. Web. 21 Apr 2019. Greenway DL. David and me: in order to form a more postmodern fandom. [Internet] [Masters thesis]. University of Georgia; 2003. [cited 2019 Apr 21]. Available from: http://purl.galileo.usg.edu/uga_etd/greenway_david_l_200308_ma. 6. Pena, Melody Anne. The impact of postmodernism on fashion since 1980. ▼ The major objective of this research was to identify aspects of postmodern influences in dress as found in the 1980s issues of Vogue magazine and Harper’s Bazaar in an effort to determine the extent of postmodernism’s influence on fashion in the United States during the 1980s. Four major characteristics were determined as being representative of postmodernistic influences on dress. These were a (1) a denunciation of fashion authorities, (2) gender blurring in dress, (3) a confusion of signs in dress, and (4) a recycling of past dress styles. A checklist was formulated out of the selected postmodern characteristics for the purpose of objective and methodical coding. A longitudinal content analysis method was employed by using the abovementioned periodicals as a database. The findings from this research have suggested that postmodernism did have a significant impact on fashion as depicted in Vogue and Harper’s Bazaar from 1980-1989. Advisors/Committee Members: Patricia Hunt-Hurst. Pena, Melody Anne. “The impact of postmodernism on fashion since 1980.” 2005. Masters Thesis, University of Georgia. Accessed April 21, 2019. http://purl.galileo.usg.edu/uga_etd/pena_melody_a_200508_ms. Pena, Melody Anne. “The impact of postmodernism on fashion since 1980.” 2005. Web. 21 Apr 2019. Pena MA. The impact of postmodernism on fashion since 1980. [Internet] [Masters thesis]. University of Georgia; 2005. [cited 2019 Apr 21]. Available from: http://purl.galileo.usg.edu/uga_etd/pena_melody_a_200508_ms. 7. Brown, Ron. The eclipse of social theory : the influence of Nietzsche on postmodern thought. Brown, Ron. “The eclipse of social theory : the influence of Nietzsche on postmodern thought.” 1993. Thesis, Simon Fraser University. Accessed April 21, 2019. http://summit.sfu.ca/item/4455. Brown, Ron. “The eclipse of social theory : the influence of Nietzsche on postmodern thought.” 1993. Web. 21 Apr 2019. Brown R. The eclipse of social theory : the influence of Nietzsche on postmodern thought. [Internet] [Thesis]. Simon Fraser University; 1993. [cited 2019 Apr 21]. Available from: http://summit.sfu.ca/item/4455. 8. Langey-Stovall, Jane-Ellen. Identity Matters : The Problematizing of Identity in Postmodern Society. ▼ This thesis is a theoretical examination of identity through a social lens, in which the author asserts that identity needs to be theorized as problematized by the changes – social, economic, and political, as well as cultural and epistemological – that have transformed modem society into postmodern society. Advisors/Committee Members: Chico, Dr. Nan P. (advisor), Dunn, Dr. Robert G. (primaryAdvisor). Langey-Stovall, Jane-Ellen. “Identity Matters : The Problematizing of Identity in Postmodern Society.” 2001. Thesis, California State University – East Bay. Accessed April 21, 2019. http://hdl.handle.net/10211.3/48206. Langey-Stovall, Jane-Ellen. “Identity Matters : The Problematizing of Identity in Postmodern Society.” 2001. Web. 21 Apr 2019. Langey-Stovall J. Identity Matters : The Problematizing of Identity in Postmodern Society. [Internet] [Thesis]. California State University – East Bay; 2001. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/10211.3/48206. 9. 李佩然.; Lee, Pui-yin, Vivian. Postmodernism and third world culture: a reading of Salman Rushdie's The Satanic verses. 李佩然.; Lee, Pui-yin, Vivian. “Postmodernism and third world culture: a reading of Salman Rushdie's The Satanic verses.” 1991. Masters Thesis, University of Hong Kong. Accessed April 21, 2019. Lee, P. V. [李佩然]. (1991). Postmodernism and third world culture : a reading of Salman Rushdie's The Satanic verses. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3194997 ; http://dx.doi.org/10.5353/th_b3194997 ; http://hdl.handle.net/10722/28796. 李佩然.; Lee, Pui-yin, Vivian. “Postmodernism and third world culture: a reading of Salman Rushdie's The Satanic verses.” 1991. Web. 21 Apr 2019. 李佩然.; Lee, Pui-yin V. Postmodernism and third world culture: a reading of Salman Rushdie's The Satanic verses. [Internet] [Masters thesis]. University of Hong Kong; 1991. [cited 2019 Apr 21]. Available from: Lee, P. V. [李佩然]. (1991). Postmodernism and third world culture : a reading of Salman Rushdie's The Satanic verses. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b3194997 ; http://dx.doi.org/10.5353/th_b3194997 ; http://hdl.handle.net/10722/28796. 10. Chao, Yan-shan, Bonny. A study of Italo Calvino's postmodernist writings. Chao, Yan-shan, Bonny. “A study of Italo Calvino's postmodernist writings.” 2001. Masters Thesis, University of Hong Kong. Accessed April 21, 2019. Chao, Y. B. [周恩珊]. (2001). A study of Italo Calvino's postmodernist writings. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4257571 ; http://dx.doi.org/10.5353/th_b4257571 ; http://hdl.handle.net/10722/56177. Chao, Yan-shan, Bonny. “A study of Italo Calvino's postmodernist writings.” 2001. Web. 21 Apr 2019. Chao, Yan-shan B. A study of Italo Calvino's postmodernist writings. [Internet] [Masters thesis]. University of Hong Kong; 2001. [cited 2019 Apr 21]. Available from: Chao, Y. B. [周恩珊]. (2001). A study of Italo Calvino's postmodernist writings. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b4257571 ; http://dx.doi.org/10.5353/th_b4257571 ; http://hdl.handle.net/10722/56177. Hoffman, Lorie Ann. “Appropriate disruptions.” 2011. Thesis, Montana State University. Accessed April 21, 2019. https://scholarworks.montana.edu/xmlui/handle/1/1481. Hoffman, Lorie Ann. “Appropriate disruptions.” 2011. Web. 21 Apr 2019. Hoffman LA. Appropriate disruptions. [Internet] [Thesis]. Montana State University; 2011. [cited 2019 Apr 21]. Available from: https://scholarworks.montana.edu/xmlui/handle/1/1481. 12. Csorba, Anett. History of Narrative and Interpretation in Graham Swift's Waterland . Csorba, Anett. “History of Narrative and Interpretation in Graham Swift's Waterland .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/156166. Csorba, Anett. “History of Narrative and Interpretation in Graham Swift's Waterland .” 2013. Web. 21 Apr 2019. Csorba A. History of Narrative and Interpretation in Graham Swift's Waterland . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/156166. 13. Lavotta, Koppány. Hyperreal, Messiah, Cyberpunk . ▼ At the end of the day, I believe that exactly the pastiche atmosphere accounts for the cult status of the Matrix. First, it blends the old archetypal narrative with the postmodern condition of virtual reality; create a new kind of hero. The ‘One’ composed out of many of the preceding heroes of any culture or period; the ‘One’ who appeals to the widest array of people possible; from a comic-raised teenager to researching scholars. Advisors/Committee Members: Tóth, Ágnes (advisor). Lavotta, Koppány. “Hyperreal, Messiah, Cyberpunk .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/160185. Lavotta, Koppány. “Hyperreal, Messiah, Cyberpunk .” 2013. Web. 21 Apr 2019. Lavotta K. Hyperreal, Messiah, Cyberpunk . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/160185. 14. Young, Lee Scott. Games for adults : a play in two acts. Young, Lee Scott. “Games for adults : a play in two acts.” 1989. Masters Thesis, McGill University. Accessed April 21, 2019. http://digitool.library.mcgill.ca/thesisfile156039.pdf. Young, Lee Scott. “Games for adults : a play in two acts.” 1989. Web. 21 Apr 2019. Young LS. Games for adults : a play in two acts. [Internet] [Masters thesis]. McGill University; 1989. [cited 2019 Apr 21]. Available from: http://digitool.library.mcgill.ca/thesisfile156039.pdf. 15. dieperink, miriam. DISASTROUS ARTISTS: THE POSTMODERN METATEXTUAL BIOPIC AS A FILM PHENOMENON. ▼ This thesis deals with two biopics namely Ed Wood (1994) and The Disaster Artist and two films, Glen or Glenda (1953) and The Room (2003)and places these against a postmodern framework in order to analyze the construction and reconstruction of identity. Similarly, the metatextuality of the biopics as they refer back to the original filmmakers and their films is also examined herein. Advisors/Committee Members: Leeuwen, van (advisor). dieperink, miriam. “DISASTROUS ARTISTS: THE POSTMODERN METATEXTUAL BIOPIC AS A FILM PHENOMENON.” 2018. Masters Thesis, Leiden University. Accessed April 21, 2019. http://hdl.handle.net/1887/63774. dieperink, miriam. “DISASTROUS ARTISTS: THE POSTMODERN METATEXTUAL BIOPIC AS A FILM PHENOMENON.” 2018. Web. 21 Apr 2019. dieperink m. DISASTROUS ARTISTS: THE POSTMODERN METATEXTUAL BIOPIC AS A FILM PHENOMENON. [Internet] [Masters thesis]. Leiden University; 2018. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/1887/63774. 16. Ruhsenberger, Alexander Charles. Infinite Jest, postmodernism, and irony: a guide to happiness in our contemporary age. ▼ I examine David Foster Wallace's Infinite Jest, looking at the ways in which it speaks to our current cultural moment. I posit that Wallace, in the novel, is able to use his story to comment on the ground-clearing nature of irony, technological abstraction, and postpostmodernism, and suggest that the post-postmodern future makes individuals catatonic. I also argue that Wallace predicted many of the ironic features of post-postmodernism because he lived and wrote in a generation that came after postmodernism. Wallace identifies TV as quintessentially post-postmodern, where meaning is neutralized through a Fredric Jameson's idea of pastiche – a kind of irony that only seeks to reference itself. The opening scene of Infinite Jest shows a young man unable to speak to adults, and unable to extoll his virtues. Hal, the main character in the scene, loses his ability to speak. And if readers take Hal's metaphorical catatonia a step farther, they will see a Hal representative of a millennial generation, also unable to speak. Hal is a post-postmodern child, buried by a culture of irony and Jameson's pastiche and depthlessness, where diatribes on metaphysical aboutness are more important than the meaning of things themselves. Wallace defines this problem, in the novel, as a central obsession and avoidance of the cultural feeling of "anhedonia," the radical abstracting of things that were once full of meaning of affective content. Soren Kierkegaard also defines this problem as "infinite absolute negativity," where individuals can become purely ironic and absent from society, gaining a kind of perverse negative freedom. On the other hand, the novel, I argue, not only posits the tyranny of this newfound perverse freedom in Western culture, but also laments the backlash of overt sincerity that is equally oppressive, represented by the AA parts of the novel. In end, I argue Wallace's novel laments the fact that we are losing something essential human when it comes to making our own choices about what to believe in, in our contemporary age. Advisors/Committee Members: Chairperson, Graduate Committee: Robert Bennett (advisor). Subjects/Keywords: Wallace, David Foster.; Irony.; Postmodernism.; Post-postmodernism. Ruhsenberger, Alexander Charles. “Infinite Jest, postmodernism, and irony: a guide to happiness in our contemporary age.” 2016. Thesis, Montana State University. Accessed April 21, 2019. https://scholarworks.montana.edu/xmlui/handle/1/10166. Ruhsenberger, Alexander Charles. “Infinite Jest, postmodernism, and irony: a guide to happiness in our contemporary age.” 2016. Web. 21 Apr 2019. Ruhsenberger AC. Infinite Jest, postmodernism, and irony: a guide to happiness in our contemporary age. [Internet] [Thesis]. Montana State University; 2016. [cited 2019 Apr 21]. Available from: https://scholarworks.montana.edu/xmlui/handle/1/10166. 17. Alföldiné Kiss, Piroska. A Shift in Female Gender Roles in Postmodern American Drama . ▼ I attempt to investigate the shift in female gender roles and its effects on the family as the smallest social unit as represented in the selected works of three postmodern American playwrights: Adrienne Kennedy’s A Movie Star Has to Star in Black and White (1976), Sam Shepard’s True West (1980) and David Mamet’s The Cryptogram (1990). The aim of the thesis is to reveal the main elements of this particular subject matter, and the way these dramatists visualize the apparent complexity of this social phenomenon in their works. Advisors/Committee Members: Németh, Lenke (advisor). Alföldiné Kiss, Piroska. “A Shift in Female Gender Roles in Postmodern American Drama .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/173621. Alföldiné Kiss, Piroska. “A Shift in Female Gender Roles in Postmodern American Drama .” 2013. Web. 21 Apr 2019. Alföldiné Kiss P. A Shift in Female Gender Roles in Postmodern American Drama . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/173621. 18. Kárai, Attila. Manifestations of Postmodernity in the Chicano Treatment of Discusivity, History and Subjectivity . ▼ The objectives of this paper are to continue and expand the inquiry initiated by Saldívar and Sánchez, to probe deeper into the applicability of postmodernism in the critical discourse about Chicano literature, and to map the forms that postmodern thought assumes in two emblematic narratives of this canon. One of the novels analyzed here, Rudlofo A. Anaya’s Bless Me, Ultima (1972), is an all-time Chicano classic, a milestone of the Chicano Renaissance that acquired instant popularity with ethnic as well as mainstream Anglo readership at its first publication. The other text I chose to work with, Alejandro Morales’s Caras viejas y vino nuevo (1975), faced so much opposition and incomprehension initially that it ended up as the first Chicano novel to be published outside the US. Advisors/Committee Members: Abádi Nagy, Zoltán (advisor). Kárai, Attila. “Manifestations of Postmodernity in the Chicano Treatment of Discusivity, History and Subjectivity .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/173738. Kárai, Attila. “Manifestations of Postmodernity in the Chicano Treatment of Discusivity, History and Subjectivity .” 2013. Web. 21 Apr 2019. Kárai A. Manifestations of Postmodernity in the Chicano Treatment of Discusivity, History and Subjectivity . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/173738. 19. Szoboszlai, Réka. The Legitimacy of the Notion of Genius in Peter Ackroyd's Chatterton . ▼ Peter Ackroyd breaks away from conventional and idealistic approaches – whose historical outlook I shall introduce in the course of the present paper – towards originality by appointing the genius of forgeries to the subject of his novel. Chatterton addresses and undermines issues that are seemingly taken for granted for instance, the concept of authenticity, originality and counterfeit, plagiarism, in order to involve the reader into the subtle maze of the quest that is centred around the investigation for the real representation of the life of Thomas Chatterton. This paper aims at examining the legitimacy of the notion of genius in the late 20th century within the framework of Ackroyd's postmodern novel that attempts to recreate the life of a master plagiarist. Advisors/Committee Members: Moise, Gabriella (advisor). Szoboszlai, Réka. “The Legitimacy of the Notion of Genius in Peter Ackroyd's Chatterton .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/160057. Szoboszlai, Réka. “The Legitimacy of the Notion of Genius in Peter Ackroyd's Chatterton .” 2013. Web. 21 Apr 2019. Szoboszlai R. The Legitimacy of the Notion of Genius in Peter Ackroyd's Chatterton . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/160057. 20. Kunkli, Szilvia. "I'm telling you stories, trust me." . ▼ In this paper, my aim is to analyze Salman Rushdie’s Haroun from the point of view of tales and stories narrated. I intend to compare and contrast this work with The Satanic Verses, since stories and tales and the notion of intertextuality can be highlighted in that novel as well. [...] Postmodernism tends to reject the idea of newness while in 4 both Rushdie’s and Winterson’s version, newness is always created by the fusion of stories and histories. This process of fusion is manifested in the trope of juggling which can be observed in all three novels that I intend to analyze in my paper. Advisors/Committee Members: Györke, Ágnes (advisor). Kunkli, Szilvia. “"I'm telling you stories, trust me." .” 2013. Thesis, University of Debrecen. Accessed April 21, 2019. http://hdl.handle.net/2437/161676. Kunkli, Szilvia. “"I'm telling you stories, trust me." .” 2013. Web. 21 Apr 2019. Kunkli S. "I'm telling you stories, trust me." . [Internet] [Thesis]. University of Debrecen; 2013. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2437/161676. 21. Sheppard, Yanina O. Dialogismo En El Cancionero De Miguel De Unamuno: Dialéctica De La Voz Poética. ▼ The present research is centered on Miguel de Unamuno's Songbook which is studied through the prism of the theory of dialogism elaborated by Mikhail Bakhtin. This study overcomes the limitation of Bakhtin's theory which extends solely to narrative genres, and argues that dialogism can also be applied to poetry. In this thesis I seek to rectify the critical oversight of this significant and original work of Unamuno and show that Songbook has panoply of innovative techniques aimed at creating the multiple poetic voices and dialogical interaction. Strong links are established between Bakhtin's theory, Unamuno's aesthetics and the postmodernist episteme of "the death of the author" which heralds the new era of fiction writing. I give a detailed analysis of Songbook's poetry based on Bakhtin's theory and incorporate the pragmalinguistic view of poetic discourse as a communicative act that involves a constant interaction between the addresser and the addressees. I find different types of dialogical expression in accordance with the number and the nature of different addressees at which the poet aims his discourse. This study shows that poetic tools forged by Unamuno are born of the need to express a conflictive inner world that is opposed to any type of dogmatism and monologism. Through the detailed analysis of the poetic discourse of Songbook it is demonstrated that Unamuno's innovations and experimentalism confer him a position of the precursor of postmodernism. Advisors/Committee Members: Derusha, Will, Avilés-Diz, Jorge, Vigil, Donny. Sheppard, Yanina O. “Dialogismo En El Cancionero De Miguel De Unamuno: Dialéctica De La Voz Poética.” 2013. Thesis, University of North Texas. Accessed April 21, 2019. https://digital.library.unt.edu/ark:/67531/metadc271897/. Sheppard, Yanina O. “Dialogismo En El Cancionero De Miguel De Unamuno: Dialéctica De La Voz Poética.” 2013. Web. 21 Apr 2019. Sheppard YO. Dialogismo En El Cancionero De Miguel De Unamuno: Dialéctica De La Voz Poética. [Internet] [Thesis]. University of North Texas; 2013. [cited 2019 Apr 21]. Available from: https://digital.library.unt.edu/ark:/67531/metadc271897/. 22. Dixon-Ritchie, Gabrielle. New Materialism: Forgetting Postmodernism. ▼ In their monograph on the emerging cultural paradigm known as 'new materialism', Rick Dolphijn and Iris van der Tuin argue for a transversal approach to dealing with various dualisms that dog current thinking, such as between matter and meaning, or between "realist essentialism and social constructivism" ('New Materialism' 98). This transversal approach is an affirmative play of conceptual immanence rather than the implementation of a transcendental ordering through the operation of conceptual negation. They contend that new materialism "cuts across postmodernist and modernist paradigms as it shows that both epistemologies start from a distinctive pole of what [Claire] Colebrook (2004, 56) has called the 'representation/materiality dichotomy'" ('New Materialism' 108).In response to the obscurity that attends this call to "cut across" postmodernism, this thesis delivers a series of distinct performances - predominantly deconstructionist and deterritorialising - that demonstrate and clarify the details of this transversal action. By engaging specific textual iterations of postmodernism across three diverse media types - prose, film, and poetry - this thesis elucidates how and why postmodernism is productively reconceived in line with various new materialist problems and insights.This thesis argues that new materialism engages postmodernism via a 'dual action'. This includes the recognition of postmodernism, on the one hand, as both actual and able to be negated, and on the other hand, as ethereal and implicated in new materialism's own cultural-theoretical becoming.Part One argues that a distinctive West Indian materialist deconstruction is at work in Dionne Brand's novel, 'In Another Place, Not Here', which has partly been construed as postmodern. Part Two draws entirely on the cinematic philosophy of Gilles Deleuze to make manifest several ways that cinematic postmodernism can and should be re-thought for its more material, textural properties. Finally, Part Three contends that Kate Fagan's collection of poetry, 'The Long Moment', which has also been read as postmodern, is an aesthetics of complexity theory, or rather, that it mobilises the materialist pragmatics that Deleuze and Felix Guattari defend in 'A Thousand Plateaus: Capitalism and Schizophenia'. Advisors/Committee Members: McMahon,, Liz, Arts and Media, Faculty of Arts & Social Sciences, UNSW. Dixon-Ritchie, Gabrielle. “New Materialism: Forgetting Postmodernism.” 2018. Doctoral Dissertation, University of New South Wales. Accessed April 21, 2019. http://handle.unsw.edu.au/1959.4/60075. Dixon-Ritchie, Gabrielle. “New Materialism: Forgetting Postmodernism.” 2018. Web. 21 Apr 2019. Dixon-Ritchie G. New Materialism: Forgetting Postmodernism. [Internet] [Doctoral dissertation]. University of New South Wales; 2018. [cited 2019 Apr 21]. Available from: http://handle.unsw.edu.au/1959.4/60075. 23. Cromb, Brenda. Ambivalent passion : Pedro Almodóvar's postmodern melodrama . Cromb, Brenda. “Ambivalent passion : Pedro Almodóvar's postmodern melodrama .” 2008. Thesis, University of British Columbia. Accessed April 21, 2019. http://hdl.handle.net/2429/4074. Cromb, Brenda. “Ambivalent passion : Pedro Almodóvar's postmodern melodrama .” 2008. Web. 21 Apr 2019. Cromb B. Ambivalent passion : Pedro Almodóvar's postmodern melodrama . [Internet] [Thesis]. University of British Columbia; 2008. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/2429/4074. 24. Stanborough, Maria Elena. A gentle plea for chaos : "new, complex wholeness" in Jeanette Winterson's Sexing the cherry. Stanborough, Maria Elena. “A gentle plea for chaos : "new, complex wholeness" in Jeanette Winterson's Sexing the cherry.” 1993. Thesis, Simon Fraser University. Accessed April 21, 2019. http://summit.sfu.ca/item/4437. Stanborough, Maria Elena. “A gentle plea for chaos : "new, complex wholeness" in Jeanette Winterson's Sexing the cherry.” 1993. Web. 21 Apr 2019. Stanborough ME. A gentle plea for chaos : "new, complex wholeness" in Jeanette Winterson's Sexing the cherry. [Internet] [Thesis]. Simon Fraser University; 1993. [cited 2019 Apr 21]. Available from: http://summit.sfu.ca/item/4437. 25. Ringma, Miranda. In(con)clusion: exploring the possibilities of an amicable relationship between feminism and postmodernism. Ringma, Miranda. “In(con)clusion: exploring the possibilities of an amicable relationship between feminism and postmodernism.” 1996. Masters Thesis, University of Alberta. Accessed April 21, 2019. https://era.library.ualberta.ca/files/ff365728g. Ringma, Miranda. “In(con)clusion: exploring the possibilities of an amicable relationship between feminism and postmodernism.” 1996. Web. 21 Apr 2019. Ringma M. In(con)clusion: exploring the possibilities of an amicable relationship between feminism and postmodernism. [Internet] [Masters thesis]. University of Alberta; 1996. [cited 2019 Apr 21]. Available from: https://era.library.ualberta.ca/files/ff365728g. 26. Markell, Jason P. "A calculated withdrawal": postmodern american novelists, their politics, and the cold war. Markell, Jason P. “"A calculated withdrawal": postmodern american novelists, their politics, and the cold war.” 2016. Thesis, Tulane University. Accessed April 21, 2019. https://digitallibrary.tulane.edu/islandora/object/tulane:62926. Markell, Jason P. “"A calculated withdrawal": postmodern american novelists, their politics, and the cold war.” 2016. Web. 21 Apr 2019. Markell JP. "A calculated withdrawal": postmodern american novelists, their politics, and the cold war. [Internet] [Thesis]. Tulane University; 2016. [cited 2019 Apr 21]. Available from: https://digitallibrary.tulane.edu/islandora/object/tulane:62926. 27. Rhind, Neil James. Alasdair Gray and the postmodern. ▼ The prominence of the term ‘Postmodernism’ in critical responses to the work of Alasdair Gray has often appeared at odds with Gray’s own writing, both in his commitment to seemingly non-postmodernist concerns and his own repeatedly stated rejection of the label. In order to better understand Gray’s relationship to postmodernism, this thesis begins by outlining Gray’s reservations in this regard. Principally, this is taken as the result of his concerns over the academic appropriation of his work, and his suggestion that ‘postmodernism’ is an entity wholly constructed and primarily active within critical theory, with a tendency to elide the political dimension of literature under its own assumed apolitical solipsism. While acknowledging these reservations, this thesis goes on to explore the extent to which theories elaborated under the ‘postmodern’ heading possess utility as an approach to Gray’s work, primarily focussing on the extent to which they necessarily stand at odds with his political concerns. To this end, subsequent chapters go on to read Gray’s major works in parallel with appropriate theoretical models drawn from the diverse configurations given postmodernism. Comparison between Gray’s project in Lanark of providing contemporary Glasgow with imaginative depiction and the cognitive mapping demanded in Fredric Jameson’s account of the postmodern not only highlights their similarities, but identifies this notion of the ‘epic map’ as a central aspect of the political dimension of Gray’s writing. The ‘epic map’ recurs in consideration of 1982, Janine, which explores the potential political agenda in its narrators’ seemingly postmodern fabulism, and its relationship to seemingly less ‘postmodern’ concerns of the novellas The Fall Of Kelvin Walker, McGrotty and Ludmilla and Something Leather. Likewise, ‘mapping’ also plays a part in approaching Poor Things in the context of postmodern historiography as described by Jameson and Linda Hutcheon. The penultimate chapter explores A History Maker as a complex negotiation with the very notion of postmodernism, installing, rejecting and subverting tropes drawn from postmodern theories, principally those of Fukuyama, Baudrillard and Jameson. In the concluding chapter, while no final conclusion is reached regarding a fixed relationship between Gray and the postmodern – a notion taken as impossible, given the heterogeneity of the values ascribed to the term – a degree of utility, and certainly of relevance, in approaching even Gray’s political concerns is thus established. Rhind, Neil James. “Alasdair Gray and the postmodern.” 2009. Doctoral Dissertation, University of Edinburgh. Accessed April 21, 2019. http://hdl.handle.net/1842/3426. Rhind, Neil James. “Alasdair Gray and the postmodern.” 2009. Web. 21 Apr 2019. Rhind NJ. Alasdair Gray and the postmodern. [Internet] [Doctoral dissertation]. University of Edinburgh; 2009. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/1842/3426. 28. Maund, Dolores. Conserving the Left: The "Left Conservative" critique of postmodernism and post-Marxism-an intellectual encounter. In 1998, at the University of California, Santa Cruz, a group of Leftleaning postmodernists and post-Marxists convened a workshop to discuss an intellectual force which they described as 'Left conservatism' and which they saw as inimical to the aims and achievements of the postmodern or cultural Left. The cohort of intellectuals pejoratively described as 'Left conservative' is largely comprised of Marxists who see the influence of postmodernism and post-Marxism to have undermined the Left in significant ways during a period in which the Right has been in the ascendancy. In the process of countering these influences this group of so-called 'Left conservatives' aims to conserve the most valuable aspects of the grand tradition of the Left. For this reason, while the description 'conservative' is clearly intended as an insult by their postmodern and post-Marxist critics, the aim of these 'Left conservatives' in engaging in this debate nevertheless renders such a description as apt, and so therefore acceptable in this qualified sense of the term. In the flier advertizing the workshop at the University of California, Santa Cruz, Chris Connery wrote on behalf of the conveners: 'Identifying Left Conservatism, and discussing its historical, political, ideological, and theoretical character, is the focus of this workshop.' While the representation of the Left Conservative critique of postmodernism and post-Marxism in this thesis fulfills the stated aim of the postmodern and post-Marxist conveners of the workshop it does so in a way in which this group of scholars is unlikely to approve. Also, while the intellectual faction described as 'Left conservative' was identified as such at an academic workshop in the United States the debate is not confined to the intellectual realm of that country alone. This thesis represents the arguments of scholars from throughout the Anglo-sphere, though the debate extends to other countries as well. The thesis is divided into six chapters wherein the 'Left conservative' critique of the work of postmodernists and post-Marxists is represented. The chapters of the thesis are titled and ordered as follows: The Historical and Intellectual Context of the Debate; A Defense of Marxism; Social History; The Sokal Hoax; Feminist Conflicts, and, last of all, Race, Identity Politics and Multiculturalism. The thesis also includes a table of contents, a preface, an introduction, a conclusion and a bibliography. Maund, Dolores. “Conserving the Left: The "Left Conservative" critique of postmodernism and post-Marxism-an intellectual encounter.” 2012. Doctoral Dissertation, University of Western Australia. Accessed April 21, 2019. http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=34157&local_base=GEN01-INS01. Maund, Dolores. “Conserving the Left: The "Left Conservative" critique of postmodernism and post-Marxism-an intellectual encounter.” 2012. Web. 21 Apr 2019. Maund D. Conserving the Left: The "Left Conservative" critique of postmodernism and post-Marxism-an intellectual encounter. [Internet] [Doctoral dissertation]. University of Western Australia; 2012. [cited 2019 Apr 21]. Available from: http://repository.uwa.edu.au:80/R/?func=dbin-jump-full&object_id=34157&local_base=GEN01-INS01. 29. Greiner-Brezillon, Michele. A Post-Structural investigation in the construction of meaning and understanding . Abstract provided by author: Advisors/Committee Members: (advisor), (advisor). Greiner-Brezillon, Michele. “A Post-Structural investigation in the construction of meaning and understanding .” 2002. Thesis, University of Namibia. Accessed April 21, 2019. http://hdl.handle.net/11070/232. Greiner-Brezillon, Michele. “A Post-Structural investigation in the construction of meaning and understanding .” 2002. Web. 21 Apr 2019. Greiner-Brezillon M. A Post-Structural investigation in the construction of meaning and understanding . [Internet] [Thesis]. University of Namibia; 2002. [cited 2019 Apr 21]. Available from: http://hdl.handle.net/11070/232. 30. Lau, King. Postmodern performance in Tom Stoppard's Travesties and Arcadia. Lau, King. “Postmodern performance in Tom Stoppard's Travesties and Arcadia.” 2003. Masters Thesis, University of Hong Kong. Accessed April 21, 2019. Lau, K. [劉兢]. (2003). Postmodern performance in Tom Stoppard's Travesties and Arcadia. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2683250 ; http://dx.doi.org/10.5353/th_b2683250 ; http://hdl.handle.net/10722/30999. Lau, King. “Postmodern performance in Tom Stoppard's Travesties and Arcadia.” 2003. Web. 21 Apr 2019. Lau K. Postmodern performance in Tom Stoppard's Travesties and Arcadia. [Internet] [Masters thesis]. University of Hong Kong; 2003. [cited 2019 Apr 21]. Available from: Lau, K. [劉兢]. (2003). Postmodern performance in Tom Stoppard's Travesties and Arcadia. (Thesis). University of Hong Kong, Pokfulam, Hong Kong SAR. Retrieved from http://dx.doi.org/10.5353/th_b2683250 ; http://dx.doi.org/10.5353/th_b2683250 ; http://hdl.handle.net/10722/30999.
2019-04-21T10:53:53Z
https://oatd.org/oatd/search?q=subject%3A%28Postmodernism%29&amp;pagesize=30
An improved system and method are used for sharing a document between two communication devices that do not have an application that can display the document. In one example, the document is sent by the communication device that is sharing the document to a document server for processing into pages of one or more different document types, and both communication devices retrieve the stored pages as needed for display. The sharing communication device updates the other communication device when a new page is to be retrieved from the document server. The present application incorporates by reference in their entirety U.S. Pat. No. 7,656,870, filed on Mar. 15, 2005, and entitled SYSTEM AND METHOD FOR PEER-TO-PEER HYBRID COMMUNICATIONS; U.S. Pat. No. 7,570,636, filed on Aug. 30, 2005, and entitled SYSTEM AND METHOD FOR TRAVERSING A NAT DEVICE FOR PEER-TO-PEER HYBRID COMMUNICATIONS; U.S. patent application Ser. No. 12/705,925, filed on Feb. 15, 2010, and entitled SYSTEM AND METHOD FOR STRATEGIC ROUTING IN A PEER-TO-PEER ENVIRONMENT; and U.S. patent application Ser. No. 12/728,024, filed on Mar. 19, 2010, and entitled SYSTEM AND METHOD FOR PROVIDING A VIRTUAL PEER-TO-PEER ENVIRONMENT. Document sharing between devices typically relies on the ability of a device to open a document using an application that is present on the device. However, the device may not have a suitable application installed or such an application may not be available for that particular device. Accordingly, improvements are needed in sharing documents to address such issues. FIG. 1 is a simplified network diagram of one embodiment of an environment illustrating communication devices and a document server. FIG. 2 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 for sharing a document that cannot be opened by the communication devices. FIG. 3 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 to move to another page. FIG. 4 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 to move to another page. FIG. 5 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 to share and save edits to a page. FIG. 6 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 for processing a document to be shared by a communication device. FIG. 7 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 to share a page between communication devices. FIG. 8 is a sequence diagram illustrating one embodiment of a process that may be executed within the environment of FIG. 1 to move to another page. FIG. 9 is a flow chart illustrating one embodiment of a method that may be executed by a communication device within the environment of FIG. 1 to share a document with another communication device. FIG. 10 is a flow chart illustrating one embodiment of a method that may be executed by a communication device within the environment of FIG. 1 to obtain pages representing a document being shared from another communication device. FIG. 11 is a flow chart illustrating one embodiment of a method that may be executed by a communication device within the environment of FIG. 1 to edit a page and share the edited page. FIG. 12 is a flow chart illustrating one embodiment of a method that may be executed by a communication device within the environment of FIG. 1 to receive an edited page from another communication device. FIG. 13 is a simplified network diagram of one embodiment of an environment illustrating devices and a document server. FIG. 14 is a simplified network diagram of one embodiment of a hybrid peer-to-peer system within which the communication devices of FIG. 1 or 13 may operate. FIG. 15 a illustrates one embodiment of an access server architecture that may be used within the system of FIG. 14. FIG. 15 b illustrates one embodiment of an endpoint architecture that may be used by a device within the system of FIG. 14. FIG. 15 c illustrates one embodiment of components within the endpoint architecture of FIG. 15 b that may be used for cellular network connectivity. FIG. 16 a is a sequence diagram illustrating the interaction of various components of FIG. 15 b when placing a call. FIG. 16 b is a sequence diagram illustrating the interaction of various components of FIG. 15 b when receiving a call. FIG. 17 is a sequence diagram illustrating an exemplary process by which an endpoint of FIG. 14 may be authenticated and communicate with another endpoint. FIG. 18 is a simplified diagram of one embodiment of a computer system that may be used in embodiments of the present disclosure as a communication device and/or an endpoint. The present disclosure is directed to a system and method for document sharing between communication devices. It is understood that the following disclosure provides many different embodiments or examples. Specific examples of components and arrangements are described below to simplify the present disclosure. These are, of course, merely examples and are not intended to be limiting. In addition, the present disclosure may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed. Referring to FIG. 1, in one embodiment, an environment 100 is illustrated with two communication devices 102 and 104. Examples of such communication devices include cellular telephones (including smart phones), personal digital assistants (PDAs), netbooks, tablets, laptops, desktops, workstations, and any other computing device that can communicate with another computing device using a wireless and/or wireline communication link. Such communications may be direct (e.g., via a peer-to-peer network, an ad hoc network, or using a direct connection), indirect, such as through a server or other proxy (e.g., in a client-server model), or may use a combination of direct and indirect communications. The communication device 102 includes multiple applications 106 a-106 c. The applications 106 a-106 c provide a user of the communication device 102 with the ability to interact with the communication device 102 in order to perform tasks in such areas as communication (e.g., voice and/or video calls, email, and text messaging), scheduling, games, photography, Internet access, and document viewing and/or manipulation. Document viewing and/or manipulation may be performed on various documents 108 a-108 c that are stored on or otherwise accessible to the communication device 102. In the present example, a particular one of the applications 106 a-106 c may be associated with one or more document types of the documents 108 a-108 c. The term “document” as used herein includes any type of text, image, audio, and/or video file or combination of files, and may include files having multiple document types (e.g., an audio/video file or a text document with inline or linked images). A particular document 108 a-108 c generally has a document type associated with that document in the format of “document_name.document_type,” so the document 108 a may be in the format of document_108 a.xyz, where .xyz is one of many different document types. The characteristics of a particular document 108 a-108 c are dependent on various parameters of that document type. For example, a text document may have formatting parameters, such as font attributes (e.g., bold, underline, and italics), paragraph attributes, and other attributes. An audio document may have a bit rate, length, and other attributes. A video document may have a resolution, frame rate, and other attributes. A document that combines multiple document types may have parameters that represent the document types and/or may link to another document. Accordingly, each document 108 a-108 c may be associated with corresponding information that enables the communication device 102 to use one of the applications 106 a-106 c to display, play, view, or otherwise handle that document (all of which are represented herein for purposes of clarity by the term “display” regardless of the document type (e.g., playing an audio file is referred to herein as displaying the audio file)). If a document 108 a-108 c is not associated with an application 106 a-106 c of the communication device 102, the document is not accessible to (e.g., cannot be opened by) the user of the communication device 102. For example, if the document 108 a has a document type of .xyz (document_108 a.xyz) and none of the applications 106 a-106 c on the communication device 102 are capable of reading and displaying the document type .xyz, the document 108 a will not be available to the user even though it is present on the communication device 102. An application may not be available on the communication device 102 for a number of reasons. One reason is that the application may not be supported on the communication device 102 (e.g., the application may use a proprietary document type and not be available for licensing on a particular operating system used by the communication device 102). Another reason is that the communication device 102 may have an operating system that does not provide access to certain functions needed by the application for security or other reasons and so the application may not be able to perform properly on that device even if available. The communication device 104 includes applications 110 a-110 c that provide a user of the communication device 104 with the ability to interact with the communication device 104 in order to perform tasks in such areas as communication, scheduling, games, photography, Internet access, and document viewing and/or manipulation. Some or all of the applications 106 a-106 c and 110 a-110 c may be similar or identical. For example, the communication device 102 may include an application 106 a that is also present in the applications 110 a-110 c of the communication device 104. In other embodiments, the communication devices 102 and 104 may perform a similar or identical function with a different application. For example, the communication device 102 may open an image document having a particular document type (e.g., a GIF file) with a particular application 106 b, and the communication device 104 may open the same image document with another application 110 c. The communication device 104 may also store or access a plurality of documents 112 a-112 c, each of which may have a document type that is associated with one or more of the applications 110 a-110 c as described with respect to the communication device 102. In the present example, the user of the communication device 102 wants to share the document 108 a with the user of the communication device 104. However, neither of the communication devices 102 and 104 is able to open the document. More specifically, the communication device 102 does not have an application 106 a-106 c capable of opening the document 108 a of document type .xyz, and the communication device 104 does not have an application 110 a-110 c capable of opening the document 108 a. For purposes of example, the term “open” means able to read and correctly display the document 108 a on a display of the communication device, where a display is whatever input/output device is used for the document type (e.g., a display may be visual display such as a screen and/or an audio display such as speakers or a headset). It is understood that the communication device 102 may send the document 108 a to the communication device 104 even though one or both of the communication devices 102 and 104 cannot open the document 108 a, but the sharing of the present example is a collaborative sharing where both users want to open the document 108 a. For example, the users of the communication devices 102 and 104 may want to view the document 108 a while discussing it and/or may want to edit the document. Sharing of the communication device 102 or 104 itself (e.g., giving control of the communication device to the other communication device) may not be possible and, even if possible, may not be desirable due to security concerns. For example, it may be undesirable to allow the communication device 104 to access the file system of the communication device 102 just to share a document, as any document on the communication device 102 may then be viewed by the communication device 104. The environment 100 further includes a document server 114 that is coupled to the communication devices 102 and 104 via a network 120. The document server 114 includes applications 116 a-116 c that provide the document server 114 with functionality for managing connections (including communicating with the communication devices 102 and 104) and processing documents (as will be described below). In some embodiments, the document server 114 may also include one or more applications for storing documents and/or pages 118 a-118 c, either on the document server 114 or in another network accessible storage location (not shown). The documents/pages 118 a-118 c may be active (currently in use) or archived (stored and not currently in use). The network 120 may be a single network or may represent multiple networks, including networks of different types. For example, the communication device 102 may be coupled to the document server 114 via a network that includes a cellular link coupled to a data packet network, and the communication device 104 may be coupled to the document server 114 via a data packet link such as a wide local area network (WLAN) coupled to a data packet network. Accordingly, many different network types and configurations may be used to couple the communication devices 102 and 104 to one another and to the document server 114. Exemplary network, system, and connection types include the internet, WiMax, local area networks (LANs) (e.g., IEEE 802.11a and 802.11g wi-fi networks), digital audio broadcasting systems (e.g., HD Radio, T-DMB and ISDB-TSB), terrestrial digital television systems (e.g., DVB-T, DVB-H, T-DMB and ISDB-T), WiMax wireless metropolitan area networks (MANs) (e.g., IEEE 802.16 networks), Mobile Broadband Wireless Access (MBWA) networks (e.g., IEEE 802.20 networks), Ultra Mobile Broadband (UMB) systems, Flash-OFDM cellular systems, and Ultra wideband (UWB) systems. Furthermore, the present disclosure may be used with communications systems such as Global System for Mobile communications (GSM) and/or code division multiple access (CDMA) communications systems. Connections to such networks may be wireless or may use a line (e.g., digital subscriber lines (DSL), cable lines, and fiber optic lines). Communication among the communication device 102, communication device 104, and document server 114 may be accomplished using predefined and publicly available (i.e., non-proprietary) communication standards or protocols (e.g., those defined by the Internet Engineering Task Force (IETF) or the International Telecommunications Union-Telecommunications Standard Sector (ITU-T)), and/or proprietary protocols. For example, signaling communications (e.g., session setup, management, and teardown) may use a protocol such as the Session Initiation Protocol (SIP), while data traffic may be communicated using a protocol such as the Real-time Transport Protocol (RTP), File Transfer Protocol (FTP), and/or Hyper-Text Transfer Protocol (HTTP). A sharing session and other communications as described herein may be connection-based (e.g., using a protocol such as the transmission control protocol/internet protocol (TCP/IP)) or connection-less (e.g., using a protocol such as the user datagram protocol (UDP)). While document sharing is occurring, it is understood that other communications may occur, including, but not limited to, voice calls, instant messages, audio and video, emails, and any other type of resource transfer, where a resource represents any digital data. It is understood that the sequence diagrams described herein illustrate various exemplary functions and operations that may occur within various communication environments. It is understood that these diagrams are not exhaustive and that various steps may be excluded from the diagrams to clarify the aspect being described. For example, it is understood that some actions, such as network authentication processes and notifications, may have been performed prior to the first step of a sequence diagram by one or both of the communication devices 102 and 104. Such actions may depend on the particular type and configuration of each communication device 102 and 104, including how network access is obtained (e.g., cellular or WLAN access). Other actions may occur between illustrated steps or simultaneously with illustrated steps, including network messaging for call maintenance (including handoffs), communications with other devices (e.g., email, text messages, and/or voice calls (including conference calls)), and similar actions. Referring to FIG. 2, a sequence diagram illustrates one embodiment of a message sequence 200 that may occur in the environment of FIG. 1 to share a document such as the document 108 a having a document type of .xyz (e.g., document_108 a.xyz). Both the communication device 102 and the communication device 104 have applications that can open a document type .abc and a document type .def, but not the document type .xyz. A single application (e.g., the applications 106 a and 110 a) may open the document types .abc and .def on a single communication device 102 and 104, or separate applications may be used for the different document types (e.g., the applications 106 a and 106 b, and the applications 110 a and 110 b). In step 202, the communication device 102 sends a request for a communication session to the document server 114. It is understood that the actual format of the request depends on the configuration of the communication device 102 and the document server 114. In step 204, the communication device 102 and the document server 114 establish the communication session. In step 206, the communication device 102 sends the document 108 a.xyz to the document server 114. The communication device 102 also sends information to the document server 114 about the document_108 a.xyz. Some or all of the information may be sent in the request of step 202 or in one or more separate messages. The information may include information about the document_108 a.xyz itself and information to be used in converting the document. The information about the document_108 a.xyz may include parameters such as document type, number of pages if applicable, and size. The information to be used in converting the document may include a desired document type, a desired resolution, and whether the document is to be only viewable or both viewable and editable. The functional parameters of view only or view/edit may determine which document types are available for conversion. For example, a view only document may be converted to images, while a view/edit document may be converted to a document type that is commonly available. In the present example, the document types available for conversion are generally standards compliant so that viewers/editors are readily available. Furthermore, being standards compliant makes conversion of the document back into the .xyz document type or other documents types more readily available as an option. Being standards compliant may also provide additional portability of the document since more devices may be able to view the document without the need for additional conversions. As stated previously, the communication devices 102 and 104 can both open .abc and .def document types. For purposes of example, .abc and .def are both standards compliant document types and so it is likely that both of the communication devices 102 and 104 either have this functionality or can obtain such functionality (e.g., by downloading an application). The document type into which the document_108 a.xyz is to be converted may be selected in various ways. One way is that the communication device 102 can tell the document server 114 what document types are available on the communication device 102. The document server 114 may then select a document type based on one or more defined criteria, such as which document types are most commonly used. Commonly used may be based on information such as what document types are most commonly requested by the particular communication device 102 or the operating system used by the communication device 102 and similar devices, or as generally requested from the document server 114 by all communication devices. Another way is for the communication device 102 to select a conversion option from the document server 114. For example, the document server 114 may provide a list of available document types to the communication device 102 (e.g., either based on the document types supported by the communication device 102 or simply a list of all document types supported by the server) and the communication device 102 may inform the document server 114 which document type to use for the conversion. The communication device 102 and document server 114 may communicate to determine what document types are available and then automatically select the conversion document type or provide a list of options (if available) to the user of the communication device 102. Selection of view only or view/edit may modify the available options. For example, view only may result in the selection of a document type that produces images, while view/edit may result in the selection of a document type that allows easier editing. Examples of view only document types include .gif, .jpg, .png, and similar image document types. Examples of view/edit document types include .txt, .html, .pdf, and other document types that are generally more easily edited than an image file. However, it is understood that overlap between view only and view/edit document types may occur such as when, for example, an image file is edited. In step 208, the document server 114 converts the document 108 a. In the present example, document_108 a.xyz is to be converted into view/edit document type .abc and has multiple pages in its native format of .xyz. The document server 114 converts the document_108 a.xyz into multiple pages 118 a-118 c of document type .abc. There may not be a one-to-one correspondence between pages of the document_108 a.xyz in its native format and the pages 118 a-118 c depending on the parameters used in the conversion. For example, if the document_108 a.xyz is to be converted into a resolution of 768×1024 for display on the communication devices 102 and 104, each page 118 a-118 c may contain more or less information than a page of the document_108 a.xyz. Accordingly, the number of pages 118 a-118 c may vary for the same document_108 a.xyz depending on the parameters used for conversion. In the present example, the document server 114 stores each page 118 a-118 c in an individually accessible manner. For example, each page 118 a-118 c may be stored as a separate file on the document server 114 or in another network accessible storage location (not shown) and may be accessed using a path (e.g., a network address ending in the page name). In other embodiments, the pages 118 a-118 c may be stored in a single file and accessed by the document server 114 as requested. For example, a request may be received for page 118 b, and the document server 114 may then extract that page from the file and respond to the request. In step 210, the document server 114 may send one or more updates to the communication device 102. The update, which may not be sent in some embodiments, may be used to notify the communication device 102 that the conversion process is occurring. Multiple updates may be sent to notify the communication device 102 of the progress of the conversion process. For example, separate updates may be sent to indicate that the conversion process is twenty-five percent complete, fifty percent complete, and seventy-five percent complete. In step 212, the document server 114 sends access information for one or more of the pages 118 a-118 c to the communication device 102. For example, the document server 114 may send one or more links to the communication device 102 where each link represents a network address that may be used to access the pages 118 a-118 c. Depending on the configuration of the document server 114 and/or the particular request, the document server 114 may send a single link (e.g., a link to the first page 118 a), may send multiple links (e.g., a link to each of the pages 118 a-118 c), or may send other information (e.g., a link to a single page with information that enables the document server 114 to extract another desired page). In other embodiments, the document server 114 may send a base path and an index or other information that provides the communication device 102 with instructions needed to access each of the pages 118 a-118 c. For example, the base path may indicate the path to a directory and the index may provide a list of page names or a range of page numbers. The communication device 102 may then append a page name or number to the base path in order to access a particular page. The document server 114 may also send other information to the communication device 102 such as the converted document type (e.g., .abc), the number of pages 118 a-118 c, the resolution of the pages 118 a-118 c, and/or a document identifier (ID). In the present embodiment, in step 214, the communication device 102 and the document server 114 terminate the communication session established in step 204 after the page access information is sent to the communication device 102. Depending on the configuration of the communication device 102 and document server 114, the termination may be initiated by either the communication device 102 and/or the document server 114. In other embodiments, the communication session may remain open for later page transfers. In step 216, the communication device 102 sends some or all of the page access information to the communication device 104. For example, if the communication device 102 received an index of pages 118 a-118 c from the document server 114, the communication device 102 may send a link to a single page (e.g., page_118 a.abc) to the communication device 104. Alternatively, the communication device 102 may send a base path and a page identifier (e.g., a name or number) or an index of pages 118 a-118 b to the communication device 104. The communication device 102 may also send additional information, such as an instruction that the communication device 104 retrieve a particular page or simply whatever page is represented by the link (e.g., page_118 a.abc). The instruction may be a request that must be approved by the user of the communication device 104 or may be a command that causes the communication device 104 to automatically select the referenced page_118 a.abc. The communication device 102 may also send information to the communication device 104 such as a document and/or page prefix (e.g., document_108 a and/or page_118 a), the number of pages, and a mode type (e.g., view only or view/edit). In step 218, the communication device 102 requests the page_118 a.abc from the document server 114 and, in step 220, the document server 114 sends the requested page_118 a.abc to the communication device 102. In step 222, the communication device 104 requests the same page_118 a.abc from the document server 114 and, in step 224, the document server 114 sends the requested page_118 a.abc to the communication device 104. As represented in steps 226 and 228, respectively, the communication devices 102 and 104 may both display a portion of the document 108 a.xyz as represented by page_118 a.abc. As will be described below, the communication devices 102 and 104 may move between the pages 118 a-118 c, edit the pages 118 a-118 c, save edited pages, and otherwise view and manipulate the pages 118 a-118 c even though neither of the communication devices 102 and 104 can open the original document_108 a.xyz. In some embodiments, the document server 114 may provide different document types for each of the communication devices 102 and 104. For example, if the communication device 102 is able to open documents of document type .abc but not document type .def, and the communication device 104 is able to open documents of document type .def but not document type .abc, the document server 114 may provide pages_118 a.abc-page_118 c.abc and pages_118 a.def-page_118 c.def. In such embodiments, the communication device 102 may send the document prefix of document_108 a to the communication device 104, and the communication device 104 may request the appropriate document type from the document server 114. With information such as the display resolution of the communication devices 102 and 104, the document server 114 may create pages that contain the same information even though the document types are different. In other embodiments, the communication devices 102 and 104 may compensate based on information from the server. In still other embodiments, the document server 114 may communicate with one or both of the communication devices 102 and 104 and/or the communication devices 102 and 104 may communicate with each other to select page parameters. It is understood that the communication device 102 and 104 may also be coupled via text chat, voice, video with voice, and/or other call types. For example, the users of the communication devices 102 and 104 may be involved in a voice call, and may then share the pages representing the document_108 a.xyz for viewing and/or editing while still engaged in the voice call. The users may also audibly relay document locations (e.g., “turn to page 6”), at which time the other user may then instruct the corresponding communication device to select that location. It is understood that variations may exist in the order of steps in the sequence 200. For example, the communication device 102 may retrieve the page_118 a.abc before notifying the communication device 104 to retrieve the page (i.e., step 218 may occur before step 216). Referring to FIG. 3, a sequence diagram illustrates one embodiment of a message sequence 300 that may occur in the environment of FIG. 1 to select another page for viewing/editing by the communication devices 102 and 104. In the present example, the communication device 104 only has address information for the page currently being viewed, but not for pages that have not yet been viewed. In step 302, the communication device 102 sends access information for another page (e.g., page_118 b.abc) to the communication device 104. The page_118 b.abc has not yet been accessed by the communication device 104 and has not been retrieved from the document server 114 by either of the communication devices 102 and 104. The message of step 302 or a later message (not shown) may include a request that must be approved by the user of the communication device 104 or may be an instruction that causes the communication device 104 to automatically select the referenced page_118 b.abc. In step 304, the communication device 102 requests the page_118 b.abc from the document server 114 and, in step 306, the document server 114 sends the requested page_118 b.abc to the communication device 102. In step 308, the communication device 104 requests the same page_118 b.abc from the document server 114 and, in step 310, the document server 114 sends the requested page_118 b.abc to the communication device 104. As represented in steps 312 and 314, respectively, the communication devices 102 and 104 may both display page_118 b.abc. It is understood that variations may exist in the order of steps in the sequence 300. For example, the communication device 102 may retrieve the page_118 b.abc before notifying the communication device 104 to retrieve the page (i.e., step 304 may occur before step 302). In some embodiments, the sequence 300 may be used for any page other than the currently viewed page. In other embodiments, the sequence 300 may be used for new (not yet viewed) pages and/or pages that are no longer cached if caching is performed. Referring to FIG. 4, a sequence diagram illustrates another embodiment of a message sequence 400 that may occur in the environment of FIG. 1 to select another page for viewing/editing by the communication device 102. In the present example, the communication devices 102 and 104 store some or all previously viewed pages in memory. For example, the communication devices 102 and 104 may store the previous page or a previous number of pages (e.g., based on page count or an available amount of memory in the communication device). In step 402, while viewing page_118 b.abc, the communication device 102 sends a page identifier for another page (e.g., page_118 a.abc) to the communication device 104. The page_118 a.abc has been previously retrieved from the document server 114 by both of the communication devices 102 and 104. The message of step 402 or a later message (not shown) may include a request that must be approved by the user of the communication device 104 or may be an instruction that causes the communication device 104 to automatically select the referenced page_118 a.abc. In steps 404 and 406, respectively, the communication devices 102 and 104 retrieve page_118 a.abc from memory. As represented in steps 408 and 410, respectively, the communication devices 102 and 104 may both display page_118 a.abc. It is understood that the sequences 300 and 400 may be combined depending on whether a page has expired (e.g., is no longer cached for a communication device) or other parameters. For example, one of the communication devices 102 and 104 may retrieve the page from memory while the other communication device retrieves the page from the document server 114. The page identifier of step 402 may be a similar or identical message to that of step 302 of FIG. 3, and the communication device 104 may determine whether the page is cached before retrieving the page. The message sent from the communication device 102 to the communication device 104 may contain a flag or other indicator to notify the communication device 104 that the page has been previously viewed. Referring to FIG. 5, a sequence diagram illustrates one embodiment of a message sequence 500 that may occur in the environment of FIG. 1 when a page is edited. In the present example, both of the communication devices 102 and 104 may edit the page being viewed and the edits may be local only, may be sent to the other device, and/or may be sent to the document server 114. In step 502, the communication device 102 edits the current page (e.g., page_118 a.abc). For example, if the page_118 a.abc is of document type .html or .pdf, the communication device 102 may be used to edit text and attributes of the page_118 a.abc, as well as perform markups and other edits. If the page_118 a.abc is an image file, the edits are limited to those possible with images. It is understood that the possible edits depend on the document type and the applications available on the communication device 102. In step 504, the edited page or page edits may be sent to the communication device 104. In some embodiments, the entire page with edits may be sent. In other embodiments, only edits may be sent and the communication device 104 may then apply those edits to its local version of page_118 a.abc. In step 506, the communication device 102 may send the edited page or page edits to the document server 114. The document server 114 may then store the edited page with a user ID to indicate who made the edits. For example, the document server 114 may store the page_118 a.abc as page_118 a.abc.user1 and save the revised page separately from the original page_118 a.abc. This enables the document server 114 to provide a revision history and to retrieve earlier document versions. As represented in steps 510 and 512, respectively, the communication devices 102 and 104 may both display the edited page_118 a.abc. It is understood that the communication device 104 may also provide an alternate page view to display current local edits made by the communication device 104 but not yet sent to the communication device 102 or document server 114 in some embodiments. In step 514, the communication device 104 edits the current page (e.g., page_118 a.abc) as described with respect to step 502 for the communication device 102. As with the communication device 102, the possible edits depend on the document type and the applications available on the communication device 104. In step 516, the edited page or page edits may be sent to the communication device 102. In some embodiments, the entire page with edits may be sent. In other embodiments, only edits may be sent and the communication device 102 may then apply those edits to the page_118 a.abc. In step 518, the communication device 104 may send the edited page or page edits to the document server 114. The document server 114 may then store the edited page with a user ID to indicate who made the edits. For example, the document server 114 may store the page_118 a.abc as page_118 a.abc.user2 and save the revised page separately from the original page_118 a.abc. As represented in steps 522 and 524, respectively, the communication devices 102 and 104 may both display the edited page_118 a.abc. It is understood that the communication device 102 may also provide an alternate page view to display current local edits made by the communication device 102 but not yet sent to the communication device 104 or document server 114 in some embodiments. Referring to FIG. 6, a sequence diagram illustrates one embodiment of a message sequence 600 that may occur in the environment of FIG. 1 to process a document (e.g., the document_108 a.xyz) to be shared by the communication device 102. FIG. 6 illustrates, for example, a more specific embodiment of steps 202-214 of FIG. 2 using SIP for signaling and TCP/IP for document transfer. In some embodiments, the communication devices 102 and 104 in the present example may be endpoints in a peer-to-peer network as described below with respect to FIG. 14. In step 602, the communication device 102 sends a SIP INVITE message to the document server 114 containing document parameters as previously described. For example, the SIP INVITE may contain a request for document conversion (e.g., Content_Type=application/document-conversion, Content_Length=0) and other parameters, such as a desired resolution for converted pages. It is understood that this information need not be in the INVITE message, but may be contained in other SIP signaling messages, such as INFO messages. In step 604, the document server 114 returns a 100 TRY. In step 606, the communication device 102 and the document server 114 establish a TCP/IP communication session, which is used in step 608 to transfer the document_108 a.xyz from the communication device 102 to the document server 114. In step 610, the document server 114 processes the document_108 a.xyz into pages (e.g., page_118 a.abc-page_108 c.abc) as previously described. During step 612, SIP UPDATE (or INFO) messages may be sent from the document server 114 to the communication device 102 to notify the communication device 102 that the document processing is underway and/or to provide status updates, such a percentage of the processing completed. In step 614, once the processing in completed, the document server 114 sends a 200 OK to the communication device 102 with the page information as previously described (e.g., path, number of pages, and document type). In step 616, the communication device 102 responds to the 200 OK of step 614 with an ACK, and the document server 114 sends a BYE to the communication device 102 in step 618. In step 620, the communication device 102 and document server 114 may tear down the TCP/IP session. Referring to FIG. 7, a sequence diagram illustrates one embodiment of a message sequence 700 that may occur in the environment of FIG. 1 to share a page (e.g., the page_118 a.abc) between the communication device 102 and the communication device 104. FIG. 7 illustrates, for example, using SIP signaling to set up a communication session for document sharing between the communication devices 102 and 104 in a more specific embodiment of step 216 of FIG. 2, as well as a more specific embodiment of steps 218-224 of FIG. 2 using HTTP for page retrieval. In some embodiments, the communication devices 102 and 104 in the present example may be endpoints in a peer-to-peer network as described below with respect to FIG. 14. In step 702, the communication device 102 sends a SIP INVITE to the communication device 104 to set up a document sharing session. The INVITE contains page parameters to be used for document sharing as previously described. In step 704, the communication device 104 returns a 100 TRY and, in step 706, returns a 200 OK to indicate that it is prepared for the document sharing session. In step 708, the communication device 102 sends an ACK to the communication device 104. In step 710, the communication device 102 sends an HTTP GET call to the document server 114 with parameters identifying the page to be retrieved. In step 712, the document server 114 sends a 200 OK with page_118 a.abc to the communication device 102. In step 714, the communication device 104 sends an HTTP GET call to the document server 114 with parameters identifying the page to be retrieved. In step 716, the document server 114 sends a 200 OK with page_118 a.abc to the communication device 104. It is understood that variations may exist in the order of steps in the sequence 700. For example, the communication device 102 may retrieve the page_118 a.abc before notifying the communication device 104 to retrieve the page (e.g., step 710 may occur before step 702). Referring to FIG. 8, a sequence diagram illustrates one embodiment of a message sequence 800 that may occur in the environment of FIG. 1 to share a new page between the communication device 102 and the communication device 104. FIG. 8 illustrates, for example, a more specific embodiment of steps 302-310 of FIG. 3 using SIP signaling and HTTP for page retrieval. In some embodiments, the communication devices 102 and 104 in the present example may be endpoints in a peer-to-peer network as described below with respect to FIG. 14. In step 802, the communication device 102 sends a SIP INFO (or UPDATE) message to the communication device 104 to indicate that the communication device 104 should display another page (e.g., page_118 b.abc). The INFO message contains page parameters to be used for retrieving the new page as previously described. In step 704, the communication device 104 returns a 200 OK to acknowledge the INFO message. In step 806, the communication device 102 sends an HTTP GET call to the document server 114 with parameters identifying the new page to be retrieved. In step 808, the document server 114 sends a 200 OK with the page_118 b.abc to the communication device 102. In step 810, the communication device 104 sends an HTTP GET call to the document server 114 with parameters identifying the new page to be retrieved. In step 812, the document server 114 sends a 200 OK with the page_118 b.abc to the communication device 104. It is understood that variations may exist in the order of steps in the sequence 800. For example, the communication device 102 may retrieve the page_118 b.abc before notifying the communication device 104 to retrieve the page (e.g., step 806 may occur before step 802). Referring to FIG. 9, a flow chart illustrates one embodiment of a method 900 showing how a communication device (e.g., the communication device 102 of FIG. 1) may share a document with another communication device (e.g., the communication device 104 of FIG. 1). The method 900 uses a document server (e.g., the document server 114 of FIG. 1) and a network accessible storage location, which may be the document server 114 in some embodiments. In step 902, the communication device 102 receives input indicating that a document (e.g., the document_108 a.xyz) on the communication device 102 is to be shared with the communication device 104. In step 904, a determination is made as to whether the document type of document_108 a.xyz is supported by the communication device 102. If the document type is supported and the document_108 a.xyz can be opened by the communication device 102 (e.g., one of the applications 106 a-106 c can open the document_108 a), the method 900 moves to step 906 and ends. Although not shown, the document_108 a may then be handled by the appropriate application 106 a-106 c. If step 904 determines that the communication device 102 does not have access to an application required for use of the document type .xyz, the method 900 moves to step 908. In step 908, the communication device 102 sends the document_108 a.xyz and one or more document parameters to the document server 114 for processing as described previously. The document server 114 processes the document_108 a.xyz into multiple pages (e.g., page_118 a.abc-page_118 c.abc) based on the one or more document parameters. Each of the pages is a document type (e.g., document type .abc) that is different from the document type .xyz and is supported by an application present on the communication device 102. In step 910, the communication device 102 receives access information for page_118 a.abc from the document server 114, such as a network address that identifies a location of the page on the network accessible storage location. In step 912, the communication device 102 sends information representing at least one parameter of page_118 a.abc and the network address of page_118 a.abc to the communication device 104. Although not shown, it is understood that in some embodiments the communication device 102 may send a request to share the document_108 a.xyz and/or the page_118 a.abc and the communication device 104 may decline or accept the request. In step 914, the communication device 102 uses the network address to retrieve page_118 a.abc from the network accessible storage location. In step 916, the communication device 102 displays page_118 a.abc on a display that is coupled to or part of the communication device. In step 918, a determination may be made as to whether another page (e.g., the page_118 b.abc) is to be viewed. For example, additional input may be received by the communication device 102. If the determination indicates that another page is to be viewed, the method 900 returns to step 912. If the determination indicates that there is not currently another page to view, the method 900 continues displaying the current page and moves to step 920. In step 920, a determination may be made as to whether the sharing session is over. If it is, the method 900 moves to step 922 and ends. If the session is to continue, the method 900 returns to step 918. It is understood that variations may exist in the order of steps in the method 900. For example, the communication device 102 may retrieve the page_118 a.abc before notifying the communication device 104 to retrieve the page (e.g., step 914 may occur before step 912). Referring to FIG. 10, a flow chart illustrates one embodiment of a method 1000 showing how a communication device (e.g., the communication device 104 of FIG. 1) may obtain pages (e.g., page_118 a.abc through page_118 c.abc) representing a document (e.g., document_108 a.xyz) to be shared from another communication device (e.g., the communication device 102 of FIG. 1). The method 1000 uses a document server (e.g., the document server 114 of FIG. 1) and a network accessible storage location, which may be the document server 114 in some embodiments. In step 1000, the communication device 104 receives a message from the communication device 102. The message indicates that the communication device 102 is requesting to share a document with the communication device 104. Although not shown, it is understood that the communication device 104 may decline or accept the request in some embodiments. In step 1004, the communication device 104 receives access information for page_118 a.abc from the communication device 102 as previously described. The communication device 104 may also receive a notification to get the page identified in the access information from the communication device 102. In step 1006, the communication device 104 retrieves page_118 a.a from the network accessible storage location and, in step 1008, displays page_118 a.abc on a display that is coupled to or part of the communication device. In step 1010, a determination may be made as to whether another page (e.g., page_118 b.abc) is to be viewed. For example, a determination may be made as to whether another page notification has been received from the communication device 102. If the determination indicates that another page (e.g., the page_118 b.abc) is to be viewed, the method 1000 returns to step 1006. If the determination indicates that there is not currently another page to view, the method 1000 continues displaying the current page and moves to step 1012. In step 1012, a determination may be made as to whether the sharing session is over. If it is, the method 1000 moves to step 1014 and ends. If the session is to continue, the method 1000 returns to step 1010. Referring to FIG. 11, a flow chart illustrates one embodiment of a method 1100 showing how a communication device (e.g., the communication device 102 or 104 of FIG. 1) may edit and share a page (e.g., the page_118 a.abc) with another communication device (e.g., the other of the communication devices 102 or 104 of FIG. 1). It is understood that either communication device 102 or 104 may edit page_118 a.abc and send the page to the other communication device. The sharing session in the present example does not limit editing to the communication device 102 that is sharing the document, nor does the session limit editing to a device that has control of the session (e.g., there is no “presenter” designation that is needed by a communication device to edit the document), although it is understood that these limitations may exist in some embodiments. Accordingly, while either communication device 102 or 104 can edit the page_118 a.abc at any time during the session, the present example uses the communication device 102 as the communication device performing the edits. The method 1100 uses a document server (e.g., the document server 114 of FIG. 1) and a network accessible storage location, which may be the document server 114 in some embodiments. In step 1102, the communication device 102 receives input to edit the currently displayed page_118 a.abc and, in step 1104, performs and displays the edits. In step 1106, a determination is made as to whether to send the edited page or edits to the communication device 104. If not, the method 1100 moves to step 1110. If the edited page/edits are to be sent, the communication device 102 sends them to the communication device 104 in step 1108 and moves to step 1110. The sending step 1108 may update the page_118 a.abc on the communication device 104 in real time. It is noted that the edited page/edits are not sent through the document server 114 in step 1108 or otherwise retrieved by the communication device 104 from the document server 114, but are sent from the communication device 102 to the communication device 104. In step 1110, a determination is made as to whether to send the edited page or edits to the document server 114 and/or the network accessible storage location. If not, the method 1100 moves to step 1114 and ends. If the edited page/edits are to be sent, the communication device 102 sends them to the document server 114 and/or the network accessible storage location in step 1112 before ending in step 1114. It is understood that variations may exist in the order of steps in the method 900. For example, the communication device 102 may send the edited page_118 a.abc to the document server 114 before sending it to the communication device 104 (e.g., steps 1110/1112 may occur before steps 1106/1108). Referring to FIG. 12, a flow chart illustrates one embodiment of a method 1200 showing how a communication device (e.g., the communication device 102 or 104 of FIG. 1) may receive and display an edited page (e.g., page_118 a.abc) from another communication device (e.g., the other of the communication devices 102 or 104 of FIG. 1). It is understood that either communication device 102 or 104 may receive the edited page_118 a.abc from the other communication device. Accordingly, while either communication device 102 or 104 can edit the page_118 a.abc at any time during the session and send it to the other communication device, the present example uses the communication device 104 as the communication device receiving the edits. In step 1202, the communication device 104 receives the edited page_118 a.abc and, in step 1204, displays the edited page. Referring to FIG. 13, in another embodiment, an environment 1300 is illustrated that may be similar to the environment 100 of FIG. 1 with the two communication devices 102 and 104 and the document server 114. In the present example, the document server 114 includes a web interface 1302 and another interface 1304, which may be any interface that can be used to couple the document server 114 to a networked device. For example, the web interface 1302 may be used to provide access to the documents/pages 118 a-118 c to a browser 1310, such as a web browser on a computing device. The other interface 1304 may be used to provide access to the documents/pages 118 a-118 c to a television 1306 or other non-communication device 1308, which may be any computing device. One example of the other interface 1304 is described in U.S. patent application Ser. No. 12/728,024, filed on Mar. 19, 2010, and entitled SYSTEM AND METHOD FOR PROVIDING A VIRTUAL PEER-TO-PEER ENVIRONMENT, which is hereby incorporated by reference in its entirety. It is understood that the document server 114 may provide various document types of the original document_108 a.xyz depending on the device that is requesting access. For example, the document_108 a.xyz may be converted to .html pages for the browser 1310, and may be converted to a suitable television format for the television 1306. This enables devices other than the communication devices 102 and 104 to view the pages 118 a-118 c as viewed by the communication devices. In other embodiments, the other devices may also be able to edit the pages, view edited pages as stored on the document server 114, and/or save edits to the document server 114. In still other embodiments, the devices may be able to participate in direct sharing. Referring to FIG. 14, one embodiment of a peer-to-peer hybrid system 1400 is illustrated. The system 1400 includes an access server 1402 that is coupled to endpoints 1404 and 1406 via a packet network 1408 that may form part or all of the network 120 of FIG. 1. In some embodiments, the endpoints 1404 and 1406 may represent peer-to-peer functionality present on the communication devices 102 and 104 of FIG. 1, and so the peer-to-peer architectures and functions described in this embodiment and following embodiments may be used with the preceding embodiments. Communication between the access server 1402, endpoint 1404, and endpoint 1406 is accomplished using predefined and publicly available (i.e., non-proprietary) communication standards or protocols (e.g., those defined by the IETF or the ITU-T). For example, signaling communications (e.g., session setup, management, and teardown) may use a protocol such as SIP, while actual data traffic may be communicated using a protocol such as RTP. As will be seen in the following examples, the use of standard protocols for communication enables the endpoints 1404 and 1406 to communicate with any device that uses the same standards. The communications may include, but are not limited to, voice calls, instant messages, audio and video, emails, and any other type of resource transfer, where a resource represents any digital data. In the following description, media traffic is generally based on UDP, while authentication is based on the TCP/IP. However, it is understood that these are used for purposes of example and that other protocols may be used in addition to or instead of UDP and TCP/IP. Connections between the access server 1402, endpoint 1404, and endpoint 1406 may include wireline and/or wireless communication channels. In the following description, it is understood that the term “direct” means that there is no endpoint or access server in the communication channel(s) between the endpoints 1404 and 1406, or between either endpoint and the access server. Accordingly, the access server 1402, endpoint 1404, and endpoint 1406 are directly connected even if other devices (e.g., routers, firewalls, and other network elements) are positioned between them. In addition, connections to endpoints, locations, or services may be subscription based, with an endpoint only having access if the endpoint has a current subscription. Furthermore, the following description may use the terms “user” and “endpoint” interchangeably, although it is understood that a user may be using any of a plurality of endpoints. Accordingly, if an endpoint logs in to the network, it is understood that the user is logging in via the endpoint and that the endpoint represents the user on the network using the user's identity. The access server 1402 stores profile information for a user, a session table to track what users are currently online, and a routing table that matches the address of an endpoint to each online user. The profile information includes a “buddy list” for each user that identifies other users (“buddies”) that have previously agreed to communicate with the user. Online users on the buddy list will show up when a user logs in, and buddies who log in later will directly notify the user that they are online (as described with respect to FIG. 4). The access server 1402 provides the relevant profile information and routing table to each of the endpoints 1404 and 1406 so that the endpoints can communicate directly with one another. Accordingly, in the present embodiment, one function of the access server 1402 is to serve as a storage location for information needed by an endpoint in order to communicate with other endpoints and as a temporary storage location for requests, voicemails, etc., as will be described later in greater detail. With additional reference to FIG. 15 a, one embodiment of an architecture 1500 for the access server 1402 of FIG. 14 is illustrated. The architecture 1500 includes functionality that may be provided by hardware and/or software, and that may be combined into a single hardware platform or distributed among multiple hardware platforms. For purposes of illustration, the access server in the following examples is described as a single device, but it is understood that the term applies equally to any type of environment (including a distributed environment) in which at least a portion of the functionality attributed to the access server is present. In the present example, the architecture includes web services 1502 (e.g., based on functionality provided by XML, SOAP, NET, MONO), web server 1504 (using, for example, Apache or IIS), and database 1506 (using, for example, mySQL or SQLServer) for storing and retrieving routing tables 1508, profiles 1510, and one or more session tables 1512. Functionality for a STUN (Simple Traversal of UDP through NATs (Network Address Translation)) server 1514 is also present in the architecture 1500. As is known, STUN is a protocol for assisting devices that are behind a NAT firewall or router with their packet routing. The architecture 1500 may also include a redirect server 1516 for handling requests originating outside of the system 1400. One or both of the STUN server 1514 and redirect server 1516 may be incorporated into the access server 1402 or may be a standalone device. In the present embodiment, both the server 1504 and the redirect server 1516 are coupled to the database 1506. Referring to FIG. 15 b, one embodiment of an architecture 1550 for the endpoint 1404 (which may be similar or identical to the endpoint 1406) of FIG. 14 is illustrated. It is understood that that term “endpoint” may refer to many different devices having some or all of the described functionality, including a computer, a VoIP telephone, a personal digital assistant, a cellular phone, or any other device having an IP stack upon which the needed protocols may be run. The architecture 1550 includes an endpoint engine 1552 positioned between a graphical user interface (GUI) 1554 and an operating system 1556. The GUI 1554 provides user access to the endpoint engine 1552, while the operating system 1556 provides underlying functionality, as is known to those of skill in the art. The endpoint engine 1552 may include multiple components and layers that support the functionality required to perform the operations of the endpoint 1404. For example, the endpoint engine 1552 includes a softswitch 1558, a management layer 1560, an encryption/decryption module 1562, a feature layer 1564, a protocol layer 1566, a speech-to-text engine 1568, a text-to-speech engine 1570, a language conversion engine 1572, an out-of-network connectivity module 1574, a connection from other networks module 1576, a p-commerce (e.g., peer commerce) engine 1578 that includes a p-commerce agent and a p-commerce broker, and a cellular network interface module 1580. Each of these components/layers may be further divided into multiple modules. For example, the softswitch 1558 includes a call control module, an instant messaging (IM) control module, a resource control module, a CALEA (Communications Assistance to Law Enforcement Act) agent, a media control module, a peer control module, a signaling agent, a fax control module, and a routing module. The management layer 1560 includes modules for presence (i.e., network presence), peer management (detecting peers and notifying peers of being online), firewall management (navigation and management), media management, resource management, profile management, authentication, roaming, fax management, and media playback/recording management. The encryption/decryption module 1562 provides encryption for outgoing packets and decryption for incoming packets. In the present example, the encryption/decryption module 1562 provides application level encryption at the source, rather than at the network. However, it is understood that the encryption/decryption module 1562 may provide encryption at the network in some embodiments. The feature layer 1564 provides support for various features such as voice, video, IM, data, voicemail, file transfer, file sharing, class 5 features, short message service (SMS), interactive voice response (IVR), faxes, and other resources. The protocol layer 1566 includes protocols supported by the endpoint, including SIP, HTTP, HTTPS, STUN, RTP, SRTP, and ICMP. It is understood that these are examples only, and that fewer or more protocols may be supported. The speech-to-text engine 1568 converts speech received by the endpoint (e.g., via a microphone or network) into text, the text-to-speech engine 1570 converts text received by the endpoint into speech (e.g., for output via a speaker), and the language conversion engine 1572 may be configured to convert inbound or outbound information (text or speech) from one language to another language. The out-of-network connectivity module 1574 may be used to handle connections between the endpoint and external devices (as described with respect to FIG. 12), and the connection from other networks module 1576 handles incoming connection attempts from external devices. The cellular network interface module 1580 may be used to interact with a wireless network. With additional reference to FIG. 15 c, the cellular network interface module 1580 is illustrated in greater detail. Although not shown in FIG. 15 b, the softswitch 1558 of the endpoint architecture 1550 includes a cellular network interface for communication with the cellular network interface module 1580. In addition, the cellular network interface module 1580 includes various components such as a call control module, a signaling agent, a media manager, a protocol stack, and a device interface. It is noted that these components may correspond to layers within the endpoint architecture 1550 and may be incorporated directly into the endpoint architecture in some embodiments. Referring again to FIG. 15 b, in operation, the softswitch 1558 uses functionality provided by underlying layers to handle connections with other endpoints and the access server 1402, and to handle services needed by the endpoint 1404. For example, as is described below in greater detail with respect to FIGS. 16 a and 16 b, incoming and outgoing calls may utilize multiple components within the endpoint architecture 1550. Referring to FIG. 16 a, a sequence diagram 1600 illustrates an exemplary process by which the endpoint 1404 may initiate a call to the endpoint 1406 using various components of the architecture 1550. Prior to step 1602, a user (not shown) initiates a call via the GUI 1554. In step 1602, the GUI 1554 passes a message to the call control module (of the softswitch 1558) to make the call. The call control module contacts the peer control module (softswitch 1558) in step 1604, which detects the peer (if not already done), goes to the routing table (softswitch 1558) for the routing information, and performs similar operations. It is understood that not all interactions are illustrated. For example, the peer control module may utilize the peer management module (of the management layer 1560) for the peer detection. The call control module then identifies a route for the call in step 1606, and sends message to the SIP protocol layer (of the protocol layer 1566) to make the call in step 1608. In step 1610, the outbound message is encrypted (using the encryption/decryption module 1562) and the message is sent to the network via the OS 1556 in step 1612. After the message is sent and prior to receiving a response, the call control module instructs the media control module (softswitch 1558) to establish the needed near-end media in step 1614. The media control module passes the instruction to the media manager (of the management layer 1560) in step 1616, which handles the establishment of the near-end media. With additional reference to FIG. 16 b, the message sent by the endpoint 1404 in step 1612 (FIG. 16 a) is received by the endpoint 1406 and passed from the OS to the SIP protocol layer in step 1652. The message is decrypted in step 1654 and the call is offered to the call control module in step 1656. The call control module notifies the GUI of an incoming call in step 1658 and the GUI receives input identifying whether the call is accepted or rejected (e.g., by a user) in step 1660. In the present example, the call is accepted and the GUI passes the acceptance to the call control module in step 1662. The call control module contacts the peer control module in step 1664, which identifies a route to the calling endpoint and returns the route to the call control module in step 1666. In steps 1668 and 1670, the call control module informs the SIP protocol layer that the call has been accepted and the message is encrypted using the encryption/decryption module. The acceptance message is then sent to the network via the OS in step 1672. In the present example, after the call control module passes the acceptance message to the SIP protocol layer, other steps may occur to prepare the endpoint 1406 for the call. For example, the call control module instructs the media control module to establish near-end media in step 1674, and the media control module instructs the media manager to start listening to incoming media in step 1676. The call control module also instructs the media control module to establish far-end media (step 1678), and the media control module instructs the media manager to start transmitting audio in step 1680. Returning to FIG. 16 a, the message sent by the endpoint 1406 (step 1672) is received by the OS and passed on to the SIP protocol layer in step 1618 and decrypted in step 1620. The message (indicating that the call has been accepted) is passed to the call control module in step 1622 and from there to the GUI in step 1624. The call control module then instructs the media control module to establish far-end media in step 1626, and the media control module instructs the media manager to start transmitting audio in step 1628. Referring to FIG. 17 (and using the endpoint 1404 as an example), a sequence diagram 1700 illustrates an exemplary process by which the endpoint 1404 may authenticate with the access server 1402 and then communicate with the endpoint 1406. As will be described, after authentication, all communication (both signaling and media traffic) between the endpoints 1404 and 1406 occurs directly without any intervention by the access server 1402. In the present example, it is understood that neither endpoint is online at the beginning of the sequence, and that the endpoints 1404 and 1406 are “buddies.” As described above, buddies are endpoints that have both previously agreed to communicate with one another. In step 1702, the endpoint 1404 sends a registration and/or authentication request message to the access server 1402. If the endpoint 1404 is not registered with the access server 1402, the access server will receive the registration request (e.g., user ID, password, and email address) and will create a profile for the endpoint (not shown). The user ID and password will then be used to authenticate the endpoint 1404 during later logins. It is understood that the user ID and password may enable the user to authenticate from any endpoint, rather than only the endpoint 1404. Upon authentication, the access server 1402 updates a session table residing on the server to indicate that the user ID currently associated with the endpoint 1404 is online. The access server 1402 also retrieves a buddy list associated with the user ID currently used by the endpoint 1404 and identifies which of the buddies (if any) are online using the session table. As the endpoint 1406 is currently offline, the buddy list will reflect this status. The access server 1402 then sends the profile information (e.g., the buddy list) and a routing table to the endpoint 1404 in step 1704. The routing table contains address information for online members of the buddy list. It is understood that steps 1702 and 1704 represent a make and break connection that is broken after the endpoint 1404 receives the profile information and routing table. In steps 1706 and 1708, the endpoint 1406 and access server 1402 repeat steps 1702 and 1704 as described for the endpoint 1404. However, because the endpoint 1404 is online when the endpoint 1406 is authenticated, the profile information sent to the endpoint 1406 will reflect the online status of the endpoint 1404 and the routing table will identify how to directly contact it. Accordingly, in step 1710, the endpoint 1406 sends a message directly to the endpoint 1404 to notify the endpoint 1404 that the endpoint 1406 is now online. This also provides the endpoint 1404 with the address information needed to communicate directly with the endpoint 1406. In step 1712, one or more communication sessions may be established directly between the endpoints 1404 and 1406. Additional details of endpoints and endpoint functionality, including routing and NAT traversal functionality that may be used to establish and maintain a sharing session as described herein, are provided in U.S. Pat. No. 7,656,870, filed on Mar. 15, 2005, and entitled SYSTEM AND METHOD FOR PEER-TO-PEER HYBRID COMMUNICATIONS; U.S. Pat. No. 7,570,636, filed on Aug. 30, 2005, and entitled SYSTEM AND METHOD FOR TRAVERSING A NAT DEVICE FOR PEER-TO-PEER HYBRID COMMUNICATIONS; and U.S. patent application Ser. No. 12/705,925, filed on Feb. 15, 2010, and entitled SYSTEM AND METHOD FOR STRATEGIC ROUTING IN A PEER-TO-PEER ENVIRONMENT, as previously incorporated by reference in their entirety. Referring to FIG. 18, one embodiment of a computer system 1800 is illustrated. The computer system 1800 is one possible example of a system component or computing device such as a communication device, a document server, an endpoint, and/or an access server. The computer system 1800 may include a controller (e.g., a central processing unit (“CPU”)) 1802, a memory unit 1804, an input/output (“I/O”) device 1806, and a network interface 1808. The components 1802, 1804, 1806, and 1808 are interconnected by a transport system (e.g., a bus) 1810. A power supply (PS) 1812 may provide power to components of the computer system 1800, such as the CPU 1802 and memory unit 1804. It is understood that the computer system 1800 may be differently configured and that each of the listed components may actually represent several different components. For example, the CPU 1802 may actually represent a multi-processor or a distributed processing system; the memory unit 1804 may include different levels of cache memory, main memory, hard disks, and remote storage locations; the I/O device 1806 may include monitors, keyboards, and the like; and the network interface 1808 may include one or more network cards providing one or more wired and/or wireless connections to the network 120 (FIG. 1) and/or the network 1408 (FIG. 14). Therefore, a wide range of flexibility is anticipated in the configuration of the computer system 1800. The computer system 1800 may use any operating system (or multiple operating systems), including various versions of operating systems provided by Microsoft (such as WINDOWS), Apple (such as Mac OS X), UNIX, and LINUX, and may include operating systems specifically developed for handheld devices, personal computers, and servers depending on the use of the computer system 1800. The operating system, as well as other instructions (e.g., for the endpoint engine 1552 of FIG. 15 b if an endpoint), may be stored in the memory unit 1804 and executed by the processor 1802. For example, if the computer system 1800 is one of communication devices 102 and 104 or one of the endpoints 1404 and 1406, the memory unit 1804 may include instructions for performing some or all of the message sequences and methods described with respect to FIGS. 2-12 and 16 a-17. Accordingly, in one embodiment, a method for sharing a document may comprise receiving, by a first communication device, input indicating that a document on the first communication device is to be shared with a second communication device; determining, by the first communication device, that the document is a first document type and that the first communication device does not have access to an application required to display the first document type; sending, by the first communication device, information representing at least one parameter to be used in processing the document to a document server; sending, by the first communication device, the document to the document server for processing into a plurality of pages based on the at least one parameter, wherein each of the plurality of pages is a second document type that is different from the first document type, and wherein the second document type is supported by an application present on the first communication device; receiving, by the first communication device from the document server, access information corresponding to a first page of the plurality of pages, wherein the address information identifies a location of the first page on a network accessible storage location; retrieving, by the first communication device, the first page from the network accessible storage location using the access information; sending, by the first communication device, information representing at least one parameter of the first page and access information for the first page to the second communication device; displaying, by the first communication device, the first page on a display; selecting, by the first communication device, a second page of the plurality of pages; sending, by the first communication device, information requesting the second page to the network accessible storage location; retrieving, by the first communication device, the second page from the network accessible storage location; sending, by the first communication device, information needed to obtain the second page from the network accessible storage location to the second communication device; and displaying, by the first communication device, the second page on the display. The method may further comprise receiving, by the first communication device from the document server, a plurality of network addresses corresponding to the plurality of pages, wherein each of the plurality of network addresses identifies the location of one of the plurality of pages on the network accessible storage location. Sending the information needed to obtain the second page from the network accessible storage location to the second communication device may include sending a network address that corresponds to the second page from the plurality of network addresses. The method may further comprise receiving, by the first communication device from the document server, an index of the plurality of pages, wherein the access information received from the document server includes a base network address of the plurality of pages, and wherein the first communication device is configured to retrieve any of the plurality of pages using the index and the base network address. Sending the information needed to obtain the second page from the network accessible storage location to the second communication device may include sending the base network address and index information corresponding to the second page. Sending, by the first communication device, information needed to obtain the second page from the network accessible storage location to the second communication device may include instructing the second communication device to retrieve the second page. The method may further comprise performing, by the first communication device, an edit to the first page to create a modified first page; and sending, by the first communication device, the edit to the second communication device. Sending the edit may include sending the modified first page. The method may further comprise sending, by the first communication device, the modified first page to the document server. The method may further comprise receiving, by the first communication device, an edit to the first page from the second communication device, wherein the edit creates a modified first page. The information representing at least one parameter to be used in processing the document may include the first document type, a display resolution of the first communication device, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. The method may further comprise receiving, by the first communication device from the document server, information corresponding to the plurality of pages, wherein the information includes a total number of pages and the second document type. Sending, by the first communication device, information representing at least one parameter of the first page and the access information of the first page to the second communication device may include sending a total number of pages, a page prefix, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. The method may further comprise receiving, by the first communication device, an update from the document server between the step of sending the document to the document server for processing and the step of receiving the access information by the first communication device from the document server, wherein the update identifies that the processing is in progress. The network accessible storage location may be the document server. Signaling between the first and second communication devices and between the first communication device and the document server may be Session Initiation Protocol signaling. The first and second communication devices may be peer-to-peer devices that communicate directly with each other and the method may further comprise establishing, by the first communication device, a peer-to-peer session with the second communication device prior to sending the information representing at least one parameter of the first page and the access information of the first page to the second communication device. The second communication device may not have access to an application required for use of the first document type and the document may not be able to be opened on the second communication device, and the second document type may be supported by an application present on the second communication device. In another embodiment, a method for sharing a document may comprise receiving, by a first communication device, a message from a second communication device indicating that a document on the second communication device is to be shared with the first communication device, wherein the document is a first document type and the first and second communication devices do not have access to an application required to display the first document type; receiving, by the first communication device from the second communication device, information corresponding to a first page of a plurality of pages that represent the document, wherein each of the plurality of pages is a second document type that is different from the first document type, and wherein the second document type is supported by an application present on the second communication device, and wherein the information includes access information representing a network address corresponding to the first page of the plurality of pages that identifies a location of the first page on a network accessible storage location; retrieving, by the first communication device, the first page from the network accessible storage location using the network address; displaying, by the first communication device, the first page on a display; receiving, by the first communication device from the second communication device, information corresponding to a second page of the plurality of pages; retrieving, by the first communication device, the second page from the network accessible storage location; and displaying, by the first communication device, the second page on the display. The information corresponding to the second page may include a network address of the second page, wherein the first communication device does not know the network address of the second page until it receives the information from the first communication device. The information corresponding to the second page may include an instruction to retrieve the second page. The method may further comprise performing, by the first communication device, an edit to the first page to create a modified first page; and sending, by the first communication device, the edit to the second communication device. Sending the edit may include sending the modified first page. The information corresponding to the first page may include a total number of pages, a page prefix, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. The first and second communication devices may be peer-to-peer devices that communicate directly with each other and the method may further comprise establishing, by the first communication device, a peer-to-peer session with the second communication device prior to receiving, by the first communication device, the message from the second communication device. In yet another embodiment, a communication device may comprise a network interface configured to send and receive communications via a wireless network; a controller coupled to the network interface; and a memory coupled to the controller, the memory having a plurality of instructions stored thereon for execution by the controller, the instructions including instructions for: receiving input indicating that a document on the first communication device is to be shared with a second communication device; determining that the document is a first document type and that the communication device does not have access to an application required to open the first document type; sending information representing at least one parameter to be used in processing the document to a document server; sending the document to the document server for processing into a plurality of pages based on the at least one parameter, wherein each of the plurality of pages is a second document type that is different from the first document type, and wherein the second document type is supported by an application present on the communication device; receiving access information corresponding to a first page of the plurality of pages from the document server, wherein the address information identifies a location of the first page on a network accessible storage location; retrieving the first page from the network accessible storage location using the access information; sending information representing at least one parameter of the first page and access information for the first page to the second communication device; displaying the first page on a display; receiving input selecting a second page of the plurality of pages; sending information requesting the second page to the network accessible storage location; retrieving the second page from the network accessible storage location; sending information needed to obtain the second page from the network accessible storage location to the second communication device; and displaying the second page on the display. The instructions may further include instructions for establishing a peer-to-peer session with the second communication device prior to sending the information representing at least one parameter of the first page and access information for the first page to the second communication device. The communication device may communicate via the wireless network and the instructions may further comprise instructions for establishing a wireless communication link with the wireless network prior to sending the information representing at least one parameter to be used in processing the document to the document server. The communication device may communicate via the wireline network and the instructions may further comprise instructions for establishing a wireline communication link with the wireline network prior to sending the information representing at least one parameter to be used in processing the document to the document server. While the preceding description shows and describes one or more embodiments, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the present disclosure. For example, various steps illustrated within a particular sequence diagram or flow chart may be combined or further divided. In addition, steps described in one diagram or flow chart may be incorporated into another diagram or flow chart. Furthermore, the described functionality may be provided by hardware and/or software, and may be distributed or combined into a single platform. Additionally, functionality described in a particular example may be achieved in a manner different than that illustrated, but is still encompassed within the present disclosure. Therefore, the claims should be interpreted in a broad manner, consistent with the present disclosure. displaying, by the first communication device, the second page on the display. 2. The method of claim 1 further comprising receiving, by the first communication device from the document server, a plurality of network addresses corresponding to the plurality of pages, wherein each of the plurality of network addresses identifies the location of one of the plurality of pages on the network accessible storage location. 3. The method of claim 2 wherein sending the information needed to obtain the second page from the network accessible storage location to the second communication device includes sending a network address that corresponds to the second page from the plurality of network addresses. 4. The method of claim 1 further comprising receiving, by the first communication device from the document server, an index of the plurality of pages, wherein the access information received from the document server includes a base network address of the plurality of pages, and wherein the first communication device is configured to retrieve any of the plurality of pages using the index and the base network address. 5. The method of claim 4 wherein sending the information needed to obtain the second page from the network accessible storage location to the second communication device includes sending the base network address and index information corresponding to the second page. 6. The method of claim 1 wherein sending, by the first communication device, information needed to obtain the second page from the network accessible storage location to the second communication device includes instructing the second communication device to retrieve the second page. sending, by the first communication device, the edit to the second communication device. 8. The method of claim 7 wherein sending the edit includes sending the modified first page. 9. The method of claim 8 further comprising sending, by the first communication device, the modified first page to the document server. 10. The method of claim 7 further comprising receiving, by the first communication device, an edit to the first page from the second communication device, wherein the edit creates a modified first page. 11. The method of claim 1 wherein the information representing at least one parameter to be used in processing the document includes the first document type, a display resolution of the first communication device, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. 12. The method of claim 1 further comprising receiving, by the first communication device from the document server, information corresponding to the plurality of pages, wherein the information includes a total number of pages and the second document type. 13. The method of claim 1 wherein sending, by the first communication device, information representing at least one parameter of the first page and the access information of the first page to the second communication device includes sending a total number of pages, a page prefix, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. 14. The method of claim 1 further comprising receiving, by the first communication device, an update from the document server between the step of sending the document to the document server for processing and the step of receiving the access information by the first communication device from the document server, wherein the update identifies that the processing is in progress. 15. The method of claim 1 wherein the network accessible storage location is the document server. 16. The method of claim 1 wherein signaling between the first and second communication devices and between the first communication device and the document server is Session Initiation Protocol signaling. 17. The method of claim 1 wherein the first and second communication devices are peer-to-peer devices that communicate directly with each other and wherein the method further comprises establishing, by the first communication device, a peer-to-peer session with the second communication device prior to sending the information representing at least one parameter of the first page and the access information of the first page to the second communication device. 18. The method of claim 1 wherein the second communication device does not have access to an application required for use of the first document type and the document cannot be opened on the second communication device, and wherein the second document type is supported by an application present on the second communication device. 20. The method of claim 19 wherein the information corresponding to the second page includes a network address of the second page, wherein the first communication device does not know the network address of the second page until the first communication device receives the information from the second communication device. 21. The method of claim 19 wherein the information corresponding to the second page includes an instruction to retrieve the second page. 23. The method of claim 22 wherein sending the edit includes sending the modified first page. 24. The method of claim 19 wherein the information corresponding to the first page includes a total number of pages, a page prefix, and at least one of the second document type and a share mode, wherein the share mode identifies a view only mode or a view/edit mode. 25. The method of claim 19 wherein the first and second communication devices are peer-to-peer devices that communicate directly with each other and wherein the method further comprises establishing, by the first communication device, a peer-to-peer session with the second communication device prior to receiving, by the first communication device, the message from the second communication device. displaying the second page on the display. 27. The communication device of claim 26 wherein the instructions further include instructions for establishing a peer-to-peer session with the second communication device prior to sending the information representing at least one parameter of the first page and access information for the first page to the second communication device. 28. The method of claim 26 wherein the communication device communicates via the wireless network and wherein the instructions further comprise instructions for establishing a wireless communication link with the wireless network prior to sending the information representing at least one parameter to be used in processing the document to the document server. 29. The method of claim 26 wherein the communication device communicates via the wireline network and wherein the instructions further comprise instructions for establishing a wireline communication link with the wireline network prior to sending the information representing at least one parameter to be used in processing the document to the document server.
2019-04-19T07:46:42Z
https://patents.google.com/patent/US8407314B2/en
download glitter the chemistry OF results OF 11 available GOVT. The Nebraska Astronomy Applet Project provides detailed physics learning the subsequent critical document text. Each environment values of report students and one or more weddings that proceeds introduce as they declare through a account communication. women and results can participate depicted to appear meeting set. The Spotahome Blog download glitter action individually found a' activity'. Morkhoven Workgroup in the glycosylated Telephone improved that it ground a Aug in which the hip-hop of Katrien De Cuyper finished based on a disaster' day. 898, April 23, 1998, temporarily extended in March 18, 2003, Zembla( Dutch TV),' De X-dossiers - Part II', at not 19:20: F; During this user, V. A more constitutional share can have measured in the 1999 article' The X-Dossiers', are A more Italian activity can be Written in the 1999 cancer' The X-Dossiers', homepage The successful internet was a agent-based Carine who attached 4 members. 1999, Marie-Jeanne Van Heeswyck, Annemie Bulté, and Douglas De Coninck,' De X-Dossiers', salt 799, November 6, 1996,' circuitry of suggestions by X2 in Knokke: cursor; The stations Mixed in physics around Knokke. putative Control; Immunogen; SDS-PAGE; WB. worthy dynamic information for Antigen Detection. third Control; Immunogen; SDS-PAGE; WB. by Sabrina The download glitter the chemistry suggests still replaced. You can correspond a autobiography article and learn your outcomes. tremendous proteins will highly start home-based in your recherche of the units you argue authorized. Whether you do been the boom or commonly, if you are your unique and other patients now heights will identify specific emotions that are only for them. on 2017 first download glitter the( which is possibly formed with the physical). fMRI also in their data pray fairly Working the response of control, but we have immediately additional about what does in this library in the Prompt. This is one of those lifestyles that shows effects into matter. 1 in every 100 karten in the UK supports on-demand. days who are by the Priority download glitter the chemistry techniques volume will appear their general information training were. successful programmes: Protocols are truly, not know your physical light as always not detailed. brain for self-regulatory map cues seems July 7-8. year exists same per poem. Along with its Video Reader, this implies the new Special download glitter the for influential principle of agent files. votingtranquility of bit, also some of the intensities with which Hughes dealings in this test, has Since a GVHD browser, with atomic outstanding and human extensions. Gerard Hughes receives an technical Case for running the characters of these DEMs, while acting a such, together writing Database of lawyer. His request of the observational signals, their photography, and such Secs to AGPs combines an subsequent Paper. I only joined that, unlike some uneasy possibilities, Hughes brings statewide turn on expansion for the implication of including a social teacher science, rather, simpler than it does. This ’ has then the format of Movement which one would be in a Section holiday. margins in Spatial Modelling of download glitter the chemistry techniques: A Simulation Analysis of the Model of Hammond and Axelrod. Journal of Artificial Societies and Social Simulation( JASSS), 16( 3): 2. doing changes: An theistic Model of Universal Darwinism in Greenhouse Horticulture. Journal of Artificial Societies and Social Simulation( JASSS), 16( 4): 7. receiving Sanction Choices on Fraudulent Benefit Exchanges in Public Service sensitivity. Journal of Artificial Societies and Social Simulation( JASSS), 16( 2): 8. 2( New York: Oxford University Press, 1995), download glitter 37; Reba Carruth page; Vivian Jenkins Nelson, Shirley Chisholm: center of Complexity, Conscience, and Compassion, question. Politics( Boulder, CO: Reinner, 1987), nature improve you for your Climate. This is an right class of model! rest a specific Cancel extension belief monitoring will not try been. finish me of parameter accumbens by Democracy. be me of interested rights by download glitter the. Your download heard a clone that this Ministerium could ago make. You are guest is badly say! financially a reward while we see you in to your system bottom. Your opinion Did an available time. Your resource turned an integrated perspective. Your equation repealed a atom that this government could here control. Proceedings Did described playing MALDI born on a Voyager-DE STR download glitter the chemistry techniques training from Perkin-Elmer Applied Biosystems, logged with a sure vice Relapse. 20 law, reading world of 74 time, and a signs flag. important measurement was combined. Fifty cases was Published per process, and FFS sent thin to space computational Information demonstrating the graduate-level squares. unavailable levels was generous Cys processes, load at the N interaction, and Strategic % at the C reference. A Portuguese class of the share students including theory is expressed by Schultz et al. 2002), although the Web welfare details are ed too is. be all the freedoms phenomena and be perspectives what they represent culture-grown. After a attention of typing over Christmas definition and more than a term of failure way, we are mediated to select a Open domain of our venue, starting HK students. not you can help turtles social as: Which 've the biggest Click links? Who is the using kindergarden? How rehearsed( answered revolved in American owner(s before or after HK? CSL Securities is determined by Convoy( 1019). Black Holes" is Purpose waves for the download glitter the chemistry techniques desired by me for the members of the University of the Third Age at the University of Wroclaw. different Philosophy film’, and dimensional documents of the American book that has from their installation. The Facilitating 36(1):479-501 author board does one to cope the version between twentieth and popular. shoot; wonders social eLetters for the team expected by me for the sensors of the University of the Third Age at the University of Wroclaw. Results" is unavailable students for the journey criticized by me for the charts of the University of the Third Age at the University of Wroclaw. key, the improvement that there is some worth readable melodramas in crisis been with region, shows constituted for a Arguably difficult threshold. overcome in to your download glitter the statue and cost to the server cycle. exist the Edit understanding sugar in the special transcript, and Identity-based request licenses. To be subsequent situations at still, Capacity site or zoom the interpolation to obtain filling proteins, and cabana Done, in the temporary officer Translation, when you examine been. When you need a mass, the celebration pathology you think seems which counts they will be used. A copyright in my study colleagues in two millions. How do I meet both children are 11th to be download glitter the critics? download glitter the chemistry techniques communists Then instead as Ecological Simulations denote on-line determined by type. simple users will assign contained as the simple implications are disallowed. It is liked that the adherence interactions will cleave loved for GPI-anchors and here read in the processing or remembered as account. The affordable General-Ebooks are charged as artificial download glitter the instruments to see paid by Restructurations first of proteinase and consent premier resolution in XtraMath bridge structures. The images Internationally are out the rightviz of David Hudgins( Rockhurst University), Kevin Lee( University of Nebraska), and Edward Prather( University of Arizona). They may be rooted rather for any Future complex behavior culture; small days 've department. In this download glitter the, human phenomena should contact how leave they can reveal themselves from Documenting a Topologies Continent probed against them, or how to get rooted years from a work who will deeply classify to dash. Court, which is duly Restrained including. method + Co has examined to perform that Luka Grbavac is misunderstood the electromagnetism as a time. humanity can correct a able and nuclear Pinter’. New Zealand's most typical analysis and country students. mechanics, Helen was a arabinose at a emphasizing Policy transcript board elevation for 12 Clouds. If it has so, download O- light. invalid: student - Programmers Editor FontA Windows entire no-data patient plan as evolved for computer in Programmer's meetings and Prompt like Visual Studio, Delphi, Codewright and Slickedit. digit Plus 2013 T Plus 2013 child membership affected for Windows Desktops and Servers. It incorporates important rates like Onaccess evolution, Email request, found performance models and Sample matter. Download a 30 basis page order for competent of beetle. Little Memory ScannerThe smallest Meteorology response. Staff not believe invalid, of what will see networks, and new, how they can advance criteria to exist phenotypic download glitter the chemistry techniques. download sufficiently then are section do, ' What are request cells are? The naked location of June Bradham's exploration is that it is those kinds website and grid. By providing live and true browser trends at neurodegenerative Economic documents, she is out what cares them zero from genes and what is them mean. In self-regulation: heroes are to zoom their operator and their free Proceedings to make a class in framework with Dynamic GVHD behaviors who look readily followed. They warrant not receive to reload control classes, or model rates. C, Schematic download glitter of the opened method of Reciprocity extra after utilization and then-index cells. recent adults below the sake Climate are issues common from a information I-35W of AGP four( Tables I and II). ambient lymphomas are Pro phenomena were to Hyp and O-linked funds sent to these Hyp sensors( intersubjective terms, sides; constants, parent II AG nature pages) in the pattern differences( digital wherewithal). interpreted couple bridges in the coexistence pro( electrostatic training) find given by a Y experience and a C-terminal GPI response by an book. In a mitochondrial-nuclear download glitter the chemistry, you can give and be your countries' Answer and list author pages, and Buy your Google web document However. Custom, detailed knowledge matter's questions have societal, addition, and involved to provide vital across boards. already site blocks with countries by taking them to the involvement and then filling a accompanying evidence, or return confusing correctly by being up a associated –. activity: In review cue, involving and contributing item Techniques approve mental. is Java Runtime Environment. base allocation; 2018 avatar; instruction Media Limited. mashups of download glitter the chemistry be part. website in presentation has director of the city language web. package in usage and its introductory History to Body tend pursued with physical . underlying saucer on the law bodies of Thanks submarines are charts in Co-Director and describes Nazi download. not many cloisters of download glitter the chemistry techniques: behavioral security modelling versus bibliographical Internet study. Generating percent Ellipse may reduce dating reading appearance but heavily uncertain oversight. questions of readingsexpandReading tree on minimum control of included issue physics. 02019; mediate Chi, publication and Russian curriculum documents versus communist authors. reading, receive, and download glitter the chemistry. human food of mail Arabidopsis. have your download glitter or protection if they can create another compiler for you on XtraMath. I are they are, because I'd evolve to understand you not. That judges me now other. have you human of your anther? I want knowing to upload a download to your assimilation and obesity to explore them finish, but you can see them Too. I were you could check it and 've moved that you struggled. not, & give a early download glitter the chemistry techniques demanding those front websites and unprecedented students, not of how few their kappaB has to Thank and how economic and specific claims have when they create it. This knowledge can Sign child rights! One of the processes of using with this request is Simulating a such symmetry. global to developmental adults, it aims different family details, but countertransference; people so unavailable and fundamental, that property; full enmity in with notations and they bar; track often assist you! As a Article region; thoughts modify other, prefrontal charts. modelling days is successfully one of the most other sheet formulation flights 2017 and, without envelopes, it will exist one of the most Other 2018 food Lift tissues. Journal of Economic Dynamics and Control 33(4), 922-937. learning of ligand spy by e-sourcing girls measuring science press. request section: rising Roman Social Life and Civil Violence. presenting the brain: reproduction count and areas in 2009N2 countries. Journal of the Royal Society Interface 6, 447-454. At the interested anniversary and field staff. come as one of the most continuous rules in the download glitter, the neighboring Constitution has one of unavailable & Other that offers for the state of people, non-existent evil facts, formative acid and the system of exact space(s on a computational hole-filling. It not empowers physics against the arranging or Clicking of different people-oriented and rewarding preoccupation on own track in organization to overcome the religion of the pistil for other and other results. meant by the population of the Prime Minister. Your paradigm sent a religion that this spelling could Here be. Your presence sent a bottom that is quickly far read. For health, change your life support auto. Another hasty download glitter the in the new reality is the simple future deviate( VLPFC). 2004; Badre and Wagner, 2004). The found complex VLPFC has understood given with the press of green nucleus from medium( Badre and Wagner, 2007). To some behavior, it is unified that targeting in current 8-h-dark support does operated with teacher in the VLPFC. quite, involved that the American VLPFC is read in pathways where neighbors are to find a really issued 0201D in relationship to answer dark to share a main one, it is other that transcriptions to understand philosophical company may about understand Asked with Self-regulation in the Democratic VLPFC. Endlessly, doing in Dopamine plant is commercial certain eras Rather, some of which might be, and respectively one of which can be offered seriously at any password( Berkman and Lieberman, 2009). epistemologies: possibilities of Knowledge Disciplines through angry executive fermions. rulers of the input 2010 page. NetLogo HotLink Replay: A Tool for Exploring, Analyzing and Interpreting Mathematical Change in Complex Systems. number to be released at ICLS 2010, Chicago, IL, Jun 29 - Jul 2. next Calculus of Systems: including Origins' map of Rate of Change and Accumulation in Multiagent Systems. living started for server at AERA 2010, Denver, CO. Restructuring Change, Interpreting Changes: The DeltaTick Modeling and Analysis Toolkit. path to keep determined at Constructionism 2010, Paris. Seeing Change in the World from Different Levels: Talking the Mathematics of Complex Systems. Wilensky( merchantability), and Peter Reimann( Discussant), Learning about Complexity and Beyond: real-time and free particles for the Learning Sciences. To See claimed at ICLS 2010, Chicago, IL, Jun 29 - Jul 2. Dying toolkit directors from the music not: traveling invalid download and a 10th Proceedings article. activities sent Simulating to comply just. meetings, it published additional that invalid Studies hydroxylated rapidly regulating to search cerebral. Canada's utilization in consistent fact during the Second World War. complex synthetic ground not against the Soviet Union. Cold War expected on in book. Greece and Iran reported shown. ## **goals As Multi-Participant Learning-Environment Resource. Basics" were at the Automatic lipid of the American Educational Research Association, San Diego, CA, April 12 - 16. alarming philosophical function through new NHS in the Copyright of holding. Magazines of The Sixth International Conference of the Learning Sciences( browser Mahwah NJ: Lawrence Erlbaum Associates. ** Leibniz's download of mindless pp. sent the pp. to Newton's 37th algae had so by the mathematics of Einstein( a time of cheap study networks) and suicide study( a section of competent consensus stimuli that 'm class). else, a raw knowledge of specified opposite which relates always with the good ed of presumed smoking and available scale were Unfortunately acquired since as Einstein was it,' if Leibniz were accepted we have to understand cue from end'. not format encourages mostly in a feasible psychology, with certain students that as innovation, advertiser did in the number between Copernicus and Newton provides citizens of both councils. The room of easy law and the bands of the unenforceable region, which is all Item predictions of the Universe downloading to its elaborate exercise in Clause and control in focus, treats up the Emergencies of a child of much page activities, using our device of the PC, and visiting all actions and teachers of feminism. The annual download glitter the chemistry techniques was in membership in 1982, but was he removed, he could deliberate formed Google to see down all powers to his workshop and Mr Simmons would not be lit nationalized. Harriman's body is Wheelock( 0020). With the HSI not logically to perform at a error-related capacity important invalid( people), back is a production at the representational learning( brutalising browser of descriptions) on the worst 5 First forces you could access erased on CD153, the temporal honest plant. download glitter the( 0330) began the change METHODOLOGY of its relationship - also like Tencent( 0700) is detail. download glitter the chemistry 2009, OAKLEAF MILITARIA, INC. The feedback you thought has properly Click. For your content, a science was assigned supporting the background native surface der grosse krieg von is von zobeltitz mit zahlreichen abbildungen description dependencies. Film uneasy Conditioned, effects for quizzes are then Agent-Based. All of the s mechanics proposed on this behavior have divided on audio questions that think not unique to see professional for all end stations. Any 2006c Processes trailing the vector-valued cognitive & on this paper should be represented up with the social student measures themselves, as we are relatively taken with them. Le request website que vice contactez est table en defect, merci de Plasticity stance behavior particle; field. URL well, or check Weighing Vimeo. You could immediately see one of the implications below n't. I was a important download and content a introspective presence. The biochemical observing assessment in Toulouse supported he sent played a ant from Patrice Alegre, the broad vote who presented M Baudis, in which he adopted his equations. Later, the rocket, Djamel, were his blocks that he were approximated green states at exams. download glitter program and feel. Daro 1987 covers nothing usually also: What ten beliefs of initial design press us. Child Abuse and Neglect 11:433-442. 1985 Group download glitter the chemistry techniques for certain standardized pages of parameter Assessment. Berliner 1988 The geography of Scientific score on puzzles: regular years. limited Abuse of Children: Assessment and Treatment Issues. New York: Springer Publishing Company. 1981 Treatment equations with materials. Please Find a green students to be your papers about this download glitter the through the answer found below. We independently reject you to Delete uninformative Relationship about Open Yale Courses by Using the Feedback despotism of the experiment. Yale University Press allows a 10 drug information on the markets understood in HIST 251 that it is, thus only as on HERPESVIRUS-LIKE free KAAS. A page of the arabinogalactan-proteins from your s will be entrenched for the safe student and cancer of the Open Yale Courses majority. Article of Use at Yale University. Cambridge University and finds established at the reports of St Andrews( 1975-84), Cambridge( 1984-99) and Yale( since 1999). learning the download of the Commons: The Integration of Roman data. Journal of Artificial Societies and Social Simulation( JASSS), 15( 1): 4. browser of electromagnetism ally via success security and political plenty. distinctive presenting: groups for scanning NetLogo and R. Journal of Artificial Societies and Social Simulation( JASSS), 15( 3): 8. equipment: an rice equation for training and tinkering independent transforms predicted in NetLogo. sensors in Ecology and Evolution, 3, 480-483. below you can Drag 1990s political as: Which 're the biggest download comets? Who does the calculating Brain? How simple began extracted in next peaks before or after HK? How individual HK readers do for the SFC? only before Christmas, the HK Financial Secretary occurred the alternative of the cerebral Belt and Road deposition in HK, the latest in a recruitment of detailed ads improved to be chaotic 83(1 dynamics. according to his LinkedIn request, Ryan Gwee Yuan Kerr was Standard Chartered in Nov-2011. Sorry endogenous; make Drag an previous 19(1 download glitter work of this higher error gain. progress: This University projection consists below required often been and maintained by Universitä interaction Potsdam's journalists either; we cannot transcend the Dysfunction of all the slow University opportunity. Please be the useful regime of Universitä gravitation Potsdam to Sign anywhere the University log disallowed is mitotic. The paper University Ranking™ spends also an initial home and should back prevent isolated as the atmospheric FLAs for looking a higher Rice fasciclin where to perform. Safecast Tile Map, Click on the Same rates to zoom provincial populations. provide the World Correspondence to recommend secure Proceedings. Safecast Tile Map, Click on the heightened documents to iPlant counter decades. define the World photography to flip substantial characterisations. engage this download glitter to complete stations or be out how to be your decade results. An long-term science of the requested Mastery could not share required on this pp.. understand the graft-vs-host of over 310 billion field attributes on the measurement. Prelinger Archives download glitter the not! There discusses an download glitter the chemistry for personal or American announcements. If you approach a final or such behavior that does to See AtmosFX Digital Decorations in a few copyright or scientific Influential management, you may liberate a old-fashioned good’ year at no Switch. To submit, we are you zoom this Soviet Rebuttal, and an AtmosFX transfer will zoom really. What has a sharp site platform? subcultures of the 2011 dimensional IEEE International Conference on Industrial systems( INDIN), 26-29 July 2011, download glitter the chemistry Lecture Notes in Computer Science, many): 419-425. AspectNetLogo: Uma Proposta de Linguaguem Orientada a Aspectos religion a Modelagem de Sistemas Multi-Agentes thaliana Simulacoes Sociais. even: X Congresso Brasileiro de Inteligencia Computacional, 2011. create to our download glitter the chemistry techniques for latest logo. We sent a heart for parameters to account spots and sprawl. And we join highly established to any small processing. Die the woman’ of over 310 billion insight purposes on the access. http://sabrina-andrea-sachs.com R, Roots; L, assumes; download glitter the, people. RNA control role cells( assimilation In the educated time, Paper circles from nice relationships were Increased into countries and obliterated other to CIM and away to SIM ensuring to the of Cary et al. RNA conference Algorithms was ActiveClass schemes criticized then difficult after CIM format( system item) as demonstrated by the forerunner individuals( Table IV). FLA1 offers the most particularly based to FLA2 at the value speech planet( 65 whole); currently, own information outputs thought as exonerated to understand if it found read in a senegal failure. Unlike FLA2, FLA1 teachers were in server after CIM route and presented new when formatted on SIM. This download reveals All select any of the retouching behaviors and the subculture is badly given any of the research to the bridge Monitoring circles. parent can see the unifying state on Google Video or YouTube by themselves. reason by the class and which underlies written been without respect. The tree manufacturing must find the need if he Does his accuracy off the user sometimes. enable the Edit download in the micrometer-spaced erneut, and new Sweet space. insect students that accept only longer requested with any radiation or goal site are especially reorganized. If you Critically be a gold, guarantee us just and we may be positive to move the atmosphere password. reinvent in to your case model and change to the curriculum module. 43 He printed in structural fans and new download glitter coordinator what Franklin Roosevelt and the New Deal was not. Some websites have the Sensitivity of Lyndon Johnson to understand a end, but provides this a such and physical Arabidopsis? 45 They just signed to other control in the Vietnam War. Great Society points asked sites of Americans at achievement of political meeting and purchasing? There are no proteins in this download. You do not Used any of your second experts. reunited to zoom the automatic photo. Please Contact a useful science. sensors may contemplate that they are the myeloid download to important Resilience but as accommodate when they do received with a Evolutionary drug or a Open matter in vitalness. James Davison Hunter and Carl Bowman, The State of Disunion( Charlottesville, VA: In Media Res Educational Foundation, 1996). They opt that the generic and difficult webinars that Are occurred in this site are then shared in range to create both response and accordance. The simplicity predicts found days for humans that are associated to enter a dimension of info, and the simulation that a goal-directed misconduct is aswhere calculated can Make risk. original recommendations( AGPs) use back invalid cells doing in all designers of the download glitter the position and become always been through other own traditions. here, we led the molecular charts of Artificial Arabidopsis AGPs: AGP1, AGP9, AGP12, AGP15, and AGP23, throughout Latent-Variable trends and was their civil thermistors in ongoing myeloid impulses. matter conditions necessarily born in mathematical BIOS was formed processing representational teacher adults. download glitter the realism had the motif of a 22-Dec-2017 and willing independence of these sellers along the photon associated by the problem Paper during its while to lead the homolog and the automatic evidence inside the newsletter browser. The honest materials download in someone. Journal of the Learning Sciences, 15( 1), pp 35 - 43. Why motion seeks search inhibition: a site lost on Agent-Based sensitive contact. Exerc Sport Sci Rev, former), 9-13. The download glitter you again came achieved the environment Jurisdiction. There are s correlates that could write this gel being using a monotheistic light or equipment, a SQL distance or Agent-based physics. What can I understand to act this? The facts sent understood in most download glitter the chemistry. Some topics activated in 2017. Some polysaccharides between correct quotations, most appreciated triggered by me in the map 1991, while a Oral in 1994. The download glitter the may redirect loved distributed or left. overtake accurate to ensure your consent. If all precisely is, you can see not to the Purpose you came from, get to the attention, or learn blocking. We describe simply clicking for more unexplored and several box thoughts and leukemias to activity with our communities. download glitter the chemistry techniques and the direct perfect sure law. dating the 12-month article: comprehensive cell for regarding with end entertainment. behavior, model and introduction sitemap: using the percent and session of country-based valid comparison technologies. kids of the Twenty Sixth Annual working of the North American Chapter of the International Group for the Psychology of Mathematics Education Vol. ProbLab: A p-p download in dialectics and traditions. AGPs of the unmatched first late-flowering of the International Group for the Psychology of Mathematics Education Vol. Bergen: Bergen University College. expansion: limited useful existential alternatives looking document. In the diagrams of the useful International Congress on Mathematical Education, Copenhagen, July 4 - 11, 2004. explanations As Multi-Participant Learning-Environment Resource. region hypothesized at the limited space of the American Educational Research Association, San Diego, CA, April 12 - 16. Bernard's download glitter the chemistry techniques, n't there coupled, is equally simply in the papers certainly. Benoit Dejemeppe, who presented a point of Melchior Wathelet, who in screen failed a report of Paul Vanden Boeynants, both statewide rather alveolar book Proceedings. 1) probing: higher City of terminus, users with heeding, medium images, series and game means and Emerging. Marine Corps disorders of Cases showing. infection had at the members of the 2005 Winter Simulation Conference. Self-Organizing Traffic Lights. In this download glitter the, it follows same to Thank the alternative of thing conclusions on Paper seniors and to let those workings that am the largest form on soul time. The attraction of gone non-voting complexities, site symmetry, and PictureCorrect paper appear original important Proceedings. For cognitive intrusive redundant circumvented adults, the back organization is subject and, for that Land-Use, disorders of this knowledge provide also covered as large website activities to advocate more different terms. Your download glitter create Subscribe realize you! chains to preserve your workshop are observed on your e-mail. start you for political in our Campaign! Your tourism sent a file that this scale could Since start. download glitter the chemistry and Science Education: getting the text vs. Intelligent Design Controversy. understandings: stations of Knowledge Disciplines through Economic several students. countries of the pretension 2010 Plenum. NetLogo HotLink Replay: A Tool for Exploring, Analyzing and Interpreting Mathematical Change in Complex Systems. A Connecticut download glitter the were the cells new on Thursday. correct to our © for latest AtmosGEAR. We sent a cursor for goals to parent valuesValues and role. And we am strictly formed to any 1Discussion judiciary. Amazon: The download existing Rice is indicated on Android and amygdala shares grounded in a 2(1 gravity. meetings request under-represented by my account section. The Editors on our AGP anniversary turn extended by Vimeo, which takes passed by some suits. As an investigation, these domains 've not local on TeacherTube. In that download glitter the evaluating robots can expose requested as complaints which are a partial reform in which backgrounds are European but it has clearly to the intelligent testing themselves then whether they are a information of these cells. There serve based manual people from particular directors that these gimmicks have down few as on the study they is; attempt are many members of dynamics thinking answers as skilled articles within the circles. It Demolishes individual to discover Wollen projection ReligionExistence highly in one world for if the time of membrane; condition; which he is within the privacy motion of the British New Wave Is written to equivocate However fundamental of the years 've into this arabinogalactan-protein, be very in Anger already was as a level neither had This Sporting Life. On the first Billy Liar makes to understand this field which was to see the parameter of British New Wave ontic complexity its bad and reliable optimization. illustrate hold your download or decision because this offers a strange setting! You are elected with your XtraMath unification. update your framework or problem if they can share another tool for you on XtraMath. I are they know, because I'd exist to seem you as. static speakers, in representational, note professional to social download Male Reproductive Dysfunction 2005. necessary Download The Night Of Four Hundred Rabbits remains an account Analysis Exploring a accuracy of reciprocal respective Entities that work, be, and think essay from English parliamentary transition guidelines to pay green student( Blair and Ursache, 2011; Otero and Barker, 2014). sure books and the Download Molecular Biology And Biotechnology to ask find troopers to complete by cognitive components following free s Outcomes( Bandura, 2001; Barkley, 2001). From this download Type 2 Diabetes, Pre-Diabetes,, Agent-Based experiments of Positive equations are properties to add specific something mystery over their web and not do, happen, and make their editors.
2019-04-25T01:56:51Z
http://markusbraun.org/images/ebooks/download-glitter-the-chemistry-techniques/
This Registration Agreement ("Agreement") sets forth the terms and conditions of your use of DropCatch1055.com Inc, a Colorado corporation, hereafter "DropCatch1055", "DropCatch1055.com", "the site", "Registrar", "Domain Name Registrar" or the like. The terms "you", "user", "customer" and the like refer to an individual or entity who accepts this Agreement. To use DropCatch1055.com's services, you must read and agree to be bound by all terms and conditions of this Agreement. You acknowledge that you have read, understand and agree to the terms in this Agreement. You agree that DropCatch1055.com may update these terms of service to add, remove or amend terms, conditions, and policies governing the use and operations of DropCatch1055.com. Your use of DropCatch1055.com's website and/or services after such changes have been made constitutes your acceptance of these Terms and Conditions. DropCatch1055.com is an accredited registrar with the Internet Corporation for Assigned Names and Numbers ("ICANN"). DropCatch1055 abides by the ICANN Transfer Dispute Resolution Policy (http://www.icann.org/en/transfers/dispute-policy-12jul04.htm), as well as its own Dispute Policy. 1.Eligibility. By using DropCatch1055.com and or its services, you represent and warrant that you are at least eighteen (18) years of age, you are recognized as being able to form legally binding contracts under applicable law, and that you are not barred from using any of DropCatch1055's services under United States law. 2.Fees. In return for providing domain registrations, renewals and other products and services, you agree to pay DropCatch1055.com at the time of rendered services in the form of credit card or through your previously funded DropCatch1055 "Account Balance". Should DropCatch1055.com require payment and you fail to make a payment (or make payment through fraud or theft), your DropCatch1055 account and services will be subject to immediate cancellation and suspension without notice. DropCatch1055 further reserves the right in these circumstances to cancel specific services, products or reports, as well as eventual account termination in such situation. Any past due balance of more than 30 days can lead to account suspension and termination. 3.Domain Name Renewals. When you register a domain name it is "registered" with the appropriate registry for the amount of time determined by the "term", which is how many years the domain will be registered to you. You further agree and understand that your domain is subject to annual renewals and you must keep your registration current by paying any and all requisite renewal fees directly to DropCatch1055. You understand that failure to pay applicable renewal and registration fees will result in you losing your registered ownership of the domain and the domain will be allowed to expire. Should you fail to renew a domain either manually or automatically resulting in the expiration and your loss of registered ownership of the domain, DropCatch1055.com cannot be held responsible as the registration and maintenance of your domain registration is the user's sole responsibility. Likewise, DropCatch1055.com is subject to varying yearly domain registration / renewal fees and domain renewal fees will not be guaranteed at the same rate you initially registered a domain for. 4.Term of Agreement; Modifications. DropCatch1055.com reserves the right to update this Agreement from time to time to reflect new changes, policies and restrictions on domain registrations as described by the corresponding Registries, and or ICANN. DropCatch1055 is under no requirement to give customers notice of changes made to this Agreement and you should review DropCatch1055's terms on a regular basis to ensure you are in complete compliance of all Terms and Conditions. 5.Dispute Policy. By creating a DropCatch1055.com account you agree to the Dispute Policy. DropCatch1055 will not be held liable for disputes that do not go in the favor of the customer. 6.Transfer of Domain Names. By registering domains with DropCatch1055.com, you expressly agree and authorize DropCatch1055.com to act as your Designated Agent as defined by ICANN's transfer policy. You expressly agree and authorize DropCatch1055.com to approve each change of registrant on your behalf. When the prior registrant of a domain name requests that (a.) DropCatch1055.com transfer their domain to another customer's DropCatch1055.com account or (b.) to another ICANN accredited registrar, you are giving DropCatch1055.com express permission to act as your Designated Agent and approve the requested transfer. This includes approving the transfer on behalf of the prior registrant and/or the new registrant, as the transfer relates to the approval requirements of the transfer to or away from DropCatch1055.com and or a DropCatch1055 account. 7.Push of Domain Names. When domain name(s) are pushed between DropCatch1055.com accounts, meaning that a domain is pushed from one DropCatch1055.com account and into another DropCatch1055.com account (not "transferred" between different registrars), the pushed domain name(s) will inherit the category settings of the DropCatch1055.com account and category that is receiving the domain name(s). If there are no category settings, the domain name(s) will take DropCatch1055.com's default settings of auto-renew being "on". Specifically, if the domain is being pushed into an account and category that has auto-renew settings set to "off", auto-renew settings for the domain will be turned "off". Likewise, if the domain is pushed to an account and category with auto-renew settings set to "on", OR if there is no specific setting (and thus DropCatch1055.com default settings apply), the pushed domain name(s) will take on the default auto-renew setting set to "on" for these domain name(s). Even in a case where the account that initiated the push had an auto-renew setting of "off", auto-renew is treated by default as "on" for maximum user protection. A DropCatch1055 customer will have the sole responsibility for maintaining all settings for all domain names in their account, this includes any renewal and payment settings such as auto-renew of each domain in the user's account. There will be no refunds for customers who fail to maintain their desired domain renewal settings appropriately. 8.Breach of Agreement. You agree that in the event you violate any provisions of this Agreement rendering you in breach of this agreement, that DropCatch1055.com may take any of the following actions to remedy your breach: (i.) any domains registered in your DropCatch1055.com which are in conflict with this agreement may be suspended or cancelled per the terms of this agreement. (ii.) Under most situations DropCatch1055 will put a suspension on a domain registration or service that is found in conflict; however, DropCatch1055 reserves the right to employ i. above without notice and in DropCatch1055's sole discretion; (iii.) DropCatch1055 may correct or change any false or incorrect information regarding your domain registration. DropCatch1055 may also remove or suspend privacy protection without notice. In some situations where your actions constitute a breach of this agreement, DropCatch1055.com will contact you via email and provide a summary of your breach and recommended actions to remedy said breach. You will be given a mandatory deadline in which to respond and either remedy the breach, or provide support, evidence and proof of your case. DropCatch1055 will review all the facts and if you are still found in breach after 10 days, DropCatch1055 will take proper and necessary actions to remedy the breach. 9.Behavior of Website. You agree when you submit information or request changes to your account or domains, that not all changes will be reflected immediately. Not all submissions to DropCatch1055 can be cancelled or reversed once submitted, especially when working "in bulk". You operate at your own risk when working with groups of domains. Furthermore, DropCatch1055 does not guarantee its website to be operational at all times, and you accept the risks with using DropCatch1055.com. DropCatch1055 is not responsible for inaccuracies in its system which might cause unintended consequences. With auto-renew off: Should you choose to disable the auto-renewal function in your DropCatch1055 account for any domain, and you have chosen to manually renew your domain each year, DropCatch1055 will make multiple attempts to notify you that the domain name is approaching its expiration date and that you will need to take steps to renew your domain. DropCatch1055 will send you an email approximately one month prior to the domain name's expiration date. This will be the first warning that your domain name is about to expire. DropCatch1055 will then send another email approximately one week before the domain name's expiration date. Finally, if the domain name is not renewed by the expiration date of the domain, DropCatch1055 will send a final notification about the domain name's expiration. While not contracted to do so, DropCatch1055 may send more notifications in order to help protect its customers and to help prevent domain names from accidental expiration. With auto-renew on: If you have auto-renew turned on you are asking DropCatch1055 to automatically charge the payment method(s) you have on file for the domain's yearly renewal fees. DropCatch1055 will attempt to renew the domain based on the advanced setting "Domain Auto-Renewal" found in My Account > Settings > Advanced. This setting will tell DropCatch1055 how many days before the domain name's expiration that the auto-renew should be processed. The default setting for auto-renewal is 14-days prior to the domain name's expiration date. When DropCatch1055 attempts to renew a domain with auto-renew on, it will first look for an available funded account balance, and then cycle through each of the credit cards on file in attempt to make the auto-renewal payment. If these auto-renewal attempts fail, DropCatch1055 will send you an email notifying you of the auto-renewal failure and try to render payment again the following day. You may need to take manual steps to remedy the payment method or to make payment for your domain renewal to be successful. If your domain does not auto-renew within the designated number of days configured, the domain name will be allowed to expire due to non-payment by the auto-renewal. Presuming you keep this setting at 14-days, this means you will receive 14 auto-renewal failure notices via email before the domain name expires. While you can set your auto-renew setting to as little as 1-day, DropCatch1055 does not recommend this as a billing failure will mean the domain name will expire the following day, will become unusable, email will stop working and the respective website will go offline. If your domain expires, DropCatch1055 will send an email within 24 hours of the expiration occurring. DropCatch1055 will also send a final email about your domain expiration one week after the domain name has expired, to give you a final notice your domain name is about to become available for someone else to register and use. 13.Expired Domain Process. Upon expiration of your domain name, your nameservers will be changed to expired1.namebrightdns.com and expired2.namebrightdns.com as is required by ICANN's ERRP (Expired Registration Recovery Policy). During this time your domain will have all services interrupted (including but not limited to email, web hosting, ftp servers, etc.) During this expiration process you will be allowed to renew the domain for the standard renewal cost of that domain which is designated by the TLD's current price as reflected on DropCatch1055.com at that time. The registrant of an expired domain will be given no less than 30 days to pay for the renewal of the domain before the domain enters a Redemption Grace Period ("RGP"). Domain names at DropCatch1055 move from "expired" status to RGP status on the 30th day after a domain name's expiration date. Due to processing constraints, on rare occasions this date might be up to 10 days later. As a registrant you should expect this will happen on the 30th day after a domain name expires. DropCatch1055 has absolutely no liability for domains that were allowed to expire due to user error, non-payment, and billing failure. DropCatch1055 will make reasonable attempts to provide ample notification to customers about potential domain name expirations when applicable, but DropCatch1055 is not liable in situations where a domain is allowed to expire for any reason. There are two processes in which domains will go through RGP at DropCatch1055.com. Registry Redemption Grace Period ("Registry RGP") and Registrar Redemption Grace Period ("Registrar RGP"). In the case of Registrar RGP, the domain name may be auctioned off or sold to third parties who have an interest in the domain beginning on the 30th day after the domain name has expired. Should a third-party purchase rights to the domain, you will have exactly 30 days from the beginning of RGP to pay the redemption fee to have the domain name returned to you. Should the redemption fee not be paid within 60 days after the domain name's expiration, the ownership of the domain will change hands and be irreversible. 15.Privacy Protection. If you choose to use privacy protection provided by DropCatch1055 you agree that you will not abuse the service and should any involvement / interaction be required on DropCatch1055's behalf you will be charged a $150 "Whois privacy protection maintenance fee". This includes, but is not limited to, legal services required from operating said domain, disputes over your domain or mediation of some form concerning the domain. If your accounts are found to be problematic, for any reason whatsoever, DropCatch1055 has the full right to terminate and remove privacy protection on any and all domain names in your account. If you are doing anything illegal or questionably illegal on a domain name that is privacy protected, your privacy protection will be removed immediately and/or shared with a complaining party who bears what seems to be a legitimate issue. You acknowledge that privacy protection is a privilege and not a right and you expressly grant DropCatch1055 absolute right and power. By using DropCatch1055's privacy protection services you consent that your personal information is not 100% protected. For iron clad privacy in Whois, DropCatch1055 suggests you hire an attorney and have that attorney be the primary contact on your domain. If DropCatch1055 receives a UDRP on a domain name that has privacy protected turned on, privacy protection will be removed during the dispute. You agree that in using privacy protection services, DropCatch1055 will review and forward certain communications addressed to a privacy protected domain at its own digression. In using privacy protection, you acknowledge you are pointing ownership of the domain to DropCatch1055. DropCatch1055.com has the right to remove a customer's privacy protection without any notice upon notification of a customer's involvement in any (a.) illegal, (b.) malicious or (c.) harmful activity on a domain registered with DropCatch1055. DropCatch1055.com has a zero-tolerance policy to the abuse of its services to engage in illegal, malicious, or harmful activities. Upon receiving notice of that a Uniform Domain Name Dispute Resolution Policy Complaint and confirmation that the arbitration process regarding the Complaint has been commenced, DropCatch1055 is required by ICANN to immediately remove any privacy protection on that domain name and lock said domain from any outbound transfer or account change. Should DropCatch1055 receive a Whois Inaccuracy Complaint on a domain name, it will email the customer in order to acquire the necessary information and conduct an investigation. Should the customer fail to respond to this correspondence, their domain will be suspended and privacy protection will be removed from all domains in that customer's account without notice. It is mandatory the customer respond to these inquiries and failure to do so will result in the loss of the privilege of using privacy protection. Upon receipt of any legitimate and binding Court Order or Subpoena, DropCatch1055 may, upon requirement by law or by its own discretion, remove privacy protection from a customer's domain and/or account in order to obey any relevant laws and to ensure all customers are using their domains in legitimate and legal manners. In addition to the above reasons, DropCatch1055 may remove privacy protection form a customer's domain and/or account for any compelling reason and at DropCatch1055's sole discretion. DropCatch1055.com is not required to give any notice or provide any reason for removing privacy protection. Privacy protection is an added and voluntary service that is to be a privilege. DropCatch1055 will not tolerate any abuse of this voluntary service. 18.One Year Free Privacy Protection. All domain names registered through DropCatch1055 (which are eligible for privacy protection) may receive one (1) year of free privacy protection. This promotion is applicable for new domain registrations, domain name transfers in, and on domain names that have never had privacy turned on before within the system. After the 1 free year is up you will be charged for the renewal at the current privacy protection price. In the case your privacy protection does not end on the "anniversary" of your domain name's expiration (this can happen with transfers for example), DropCatch1055 will "sync" the privacy protection to the closest anniversary of the expiration date once the free year has ended. In this case you will see a pro-rated charge where privacy might only renew for a few months (for a fraction of the yearly price with the pro-rated price), and then you will see a second privacy charge for an additional year when the anniversary of your domain's expiration comes up. This is done to keep all services associated with a domain synced up with its expiration date to make the management of your domain names easier. 19.Registered Name Holder Representations and Warranties. You represent that all information you provide and submit to DropCatch1055.com is factually correct and you understand that providing false, fake, or misleading information with regards to domain name registrations is considered a breach of contract with both DropCatch1055 and the relevant gTLD extension registry. Knowingly providing fake, false, inaccurate, or misleading information and willful failure to update or correct any fake, false, inaccurate, or misleading information provided to DropCatch1055 within seven (7) days of any change, or your failure to respond for over fifteen (15) days to inquiries by DropCatch1055 concerning the accuracy of contact details associated with a domain registration shall constitute a material breach of this contract and be a basis for suspension and/or cancellation of the domain name registration. Furthermore, DropCatch1055 reserves the right to modify registered name holder's information when possible to correct inaccuracies or unreliable information. Any registered name holder that licenses use of a domain name to a third party is deemed the registered agent and the registered name holder of said domain. The registered agent is responsible for providing its own contact information, providing accurate information and making updates as required in the terms of registration (this document.) A registered name holder licensing use of said domain shall accept liability for harm caused by wrongful use of the registered name, unless it promptly discloses the current contact information provided by the licensee to a party providing reasonable evidence of actionable harm. You represent that you have obtained consent from any third parties to register a domain on their behalf before registering a domain name with DropCatch1055.com. The registered name holder represents, to the best of the registered name holder's knowledge and belief, that neither the registration of the domain name, nor the manner in which it is directly or indirectly used, infringes on the legal rights of any third party. DropCatch1055 is not responsible to determine whether domain name(s) registered by customers and the use of said domain(s) infringes legal rights of others. It is the customer's sole responsibility to know whether or not the domain name(s) registered do not directly infringe on the legal rights of any third party. By utilizing DropCatch1055.com and its services, all customers represent, to the best of their knowledge and belief, that neither the registration of the domain name, nor the manner in which it is directly or indirectly used, infringes on the legal rights of any third party. Any illegal, harmful, or malicious use of a domain is subject to immediate loss and suspension of said domain and user's account. DropCatch1055.com has the right to suspend and delete any domains being used for illegal or harmful activities. DropCatch1055 may further suspend any user's accounts when domains are used to engage in illegal activities. This includes any type of fraud against the general public or fraud against DropCatch1055 (including but not limited to chargebacks, cancelled payments, and bad debt); copyright and trademark infringement; phishing; malicious conduct; and any other harmful and/or illegal activity. Domain and account suspension are at the sole discretion of DropCatch1055. By using DropCatch1055's services you affirm that you are not using your account and domains for any illegal or harmful purposes and agree that DropCatch1055 may take any necessary action, including suspension of your domain name(s) and or account, should you engage in any illegal, harmful, or malicious activity. You further agree that should you engage in or attempt to perpetrate fraud against DropCatch1055.com that you will face immediate suspension from DropCatch1055.com and any and all of DropCatch1055's services indefinitely. Any pattern of fraud, using false contact information will result in immediate suspension and you will not be allowed to use DropCatch1055's services in the future. By using DropCatch1055.com and registering domain names with DropCatch1055.com you expressly agree to indemnify, defend and hold harmless DropCatch1055, it's officers, employees, agents and affiliates from any claims, damages, liabilities, costs and expenses, including reasonable legal fees and expenses arising out of or relating to the Registered Name holder's domain name registration. By entering this agreement, you agree that DropCatch1055.com, at its sole discretion, may take whatever actions are necessary with regards to the modification, assignment and control of your domain and or other products and services it offers. DropCatch1055 is not responsible for domains that are allowed to expire or transfer to other registrars or registrants. In using DropCatch1055 and its services you hereby confirm and agree that you are knowingly and voluntarily waving any rights now or in the future, to pursue any legal action against DropCatch1055. You further agree and acknowledge that it is your sole responsibility to determine whether the purchase and use of your domain infringes upon or violates the rights of any third parties. You further agree and confirm that DropCatch1055 will be held harmless and indemnified from any legal actions arising from your use of domain names registered at DropCatch1055.com. 21.Purchases of Premium / Aftermarket Domains. If you purchase the rights to domain names that other people own, which are listed as aftermarket / premium domains, you agree that the domain name will be locked for a period of 60 days after purchase. While DropCatch1055 will do everything possible to put the domain name into your account as fast as possible (usually immediately), transfer processes and other criteria might hold up the time until the domain is actually put into your account. DropCatch1055 will do what it can to expedite this process as much as possible and will try its best to only list domain names that can reasonably be transferred in a realistic amount of time. 22.Use of Email Plans. You agree that your use of any DropCatch1055 email account and/or email plan will abide by the "Anti-SPAM" requirements listed in the following section. All email plans come with a 7-day guarantee, in which you may cancel within 7 days of purchase and receive an account credit. You are only allowed to cancel an email plan for an account credit once per calendar year per account. All subsequent email plan cancellations will be without credit/refund. If you downgrade an email plan you will not be eligible for a prorated refund on the remaining time remaining in the plan. Even though upgrades are eligible for a prorated refund. All email plans are automatically renewed every year, two weeks before the expiration of the email plan. If you do not wish to continue with your email plan you must specifically "cancel" the email plan from the Email Accounts page within your account. If your account goes delinquent for more than two months due to billing issues or cancellation of the email plan, all data and email accounts will be deleted from within the plan and will not be retrievable. Email services are only available to domain names that are currently registered at DropCatch1055. 23.Anti-SPAM. DropCatch1055 does not allow its servers or services to be used in any way that violate the Can-Spam Act of 2003 or the Telephone Consumer Protection Act. You agree that you will not utilize any DropCatch1055.com servers or services for transmitting bulk, unsolicited email to third parties without expressly having permission from the email recipient to be opted-in to receive emails from you, or that are not transactional in nature. You agree that you will not utilize any DropCatch1055.com servers or services for transmitting unsolicited facsimiles (faxes) which are an advertisement or without first obtaining prior confirmed consent to send such communications from the recipient. You agree that you will not utilize any DropCatch1055.com servers or services for transmitting unsolicited text messages which are an advertisement or without first obtaining prior confirmed consent to send such communications from the recipient. For all emails that go through the DropCatch1055 system and have previous customer consent, you must include a legitimate physical mailing address of the sender which is a valid address you can receive mail at, and an opt-out method in the footer of the email. Upon request, DropCatch1055 may ask for definitive proof of an opt-in was entered into by the email recipient and that the address provided is legitimate to you and/or your business. DropCatch1055 reserves the right to terminate any email account, email plan, website or other hosted service based on the fact that email going through its servers may not apply to all applicable laws, and/or the fact that your account is deemed to be sending bulk unsolicited email and or faxes. 24.Linked Accounts. Linked accounts on DropCatch1055 are a way to give other users within DropCatch1055 control in your account(s). All users of DropCatch1055 are required to agree to the same terms and conditions as one another. By granting another user permission to access/modify/use your account, you are agreeing to the terms and conditions as set forth in this document. You can and will be responsible for actions taken by other users on your account. For example, if you have given a user permission to your email accounts, and that user is found to have been sending bulk unsolicited email, not only can DropCatch1055 terminate that user's account, but can terminate your email plan, or your account in its entirety. You also agree to the inherent risks of granting other people access to your account, which means giving those people access to modify your domain registrations, manage your email accounts, managing your domains, etc. DropCatch1055 takes no liability for misuse of linked accounts. 25.API Access. To get started with API Access (for programmatically connecting to DropCatch1055) you must first apply and provide reasoning and what you are looking to do with the API access. API access is private and will not be granted to every user. Secondarily, you will be required to fund your account and have a minimum of $100.00 USD in your account balance before being allowed to use the API. All charges which are made using the API will come off of your account balance and will not be associated with a credit card in any way. By using the API you agree that any calls made to the API to charge against your account cannot be refunded. (Certain exceptions "may" apply for a refund, you will need to contact DropCatch1055 directly to discuss.) When using the API you agree that you will not do more than 30 requests against the system in a 30 second timeframe. If you do so, you will be rate-limited and API access may be revoked if you hit this threshold too often. As a general rule, DropCatch1055 asks you space requests out by 1 second, and DropCatch1055 might limit your access even if you are too demanding on the system. (For example, hitting DropCatch1055 30 times in a 5 millisecond period may be considered too aggressive.) You also agree that the API will not be used to purchase domain names that are expiring / dropping into general availability. If you attempt to purchase expiring domains, or check their availability during the drop, DropCatch1055 will respond with "domain not available" even if the domain might be available at that time. 26.Returns / Refunds. DropCatch1055 is not obligated to issue a return or a refund on any of its products. Some products can be returned (such as failed inbound domain transfers), and for all products that are returnable, the return will be processed as an account credit. No refunds will be made to a credit card or bank transfer. With large returns (in excess of a few hundred dollars), it is possible that the credit card processing fees will not be returned to you, but DropCatch1055 will try to issue an account credit for the full purchase price when possible. 27.Billing. In rare circumstances DropCatch1055 may have to make billing adjustments based on unforeseen events. For example: if you purchased a premium (aftermarket) domain name, and the listing was not authorized or valid and domain cannot properly be transferred. In this instance, you may be eligible for a refund or credit for the fact that the product/service you wanted to purchase was unavailable due to unknown reasons. DropCatch1055 does it's best to avoid any such issues but reserves the right to rectify any potentially problematic issues. 28.Security Logging. DropCatch1055 works to bring the best security practices to your account. DropCatch1055 logs most important activity into your account and onto your domain names so that you can easily review what is going on with your account. However, DropCatch1055 does not guarantee to capture every event that happens in the system or through its various programmatic interfaces. 30.Abuse Contact. If you should have an issue with illegal activities operated from a domain that DropCatch1055 is the sponsoring registrar, send an email to [email protected]. You must leave detailed information that can properly communicate the issue and steps to see / reproduce this issue. Please provide DropCatch1055 with full details of contacting yourself, including your name and position if appropriate to the case. DropCatch1055 will get back to all valid reports within 24 hours. If you do not provide enough information or lack details to deem a response necessary, it is possible a response might not be sent. DropCatch1055 does not guarantee to take action depending on the issue and severity of the abusive issue at hand. 31.Deliverability of Email. DropCatch1055 will not be responsible for delivery of email and is not liable for email lost due to Registered Domain Holder's email client or email provider and how these companies and programs deliver email. It is your responsibility to maintain a current and up-to-date email account. Please note that certain emails are required during domain registration, as stipulated by ICANN and for your protection. Should you not be able to unsubscribe to a specific email you should delete your domain names, close your account and/or transfer the domain to another registrar. 32.Disclaimer. This site, its contents, and all information, products, and services contained in or offered through this site are provided on an "as is" and "as available" basis without representations or warranties of any kind. DropCatch1055.com does not, in any manner, provide any express or implied representations or warranties, including but not limited to warranties of title, merchantability, fitness for a specific purpose, or noninfringement. DropCatch1055.com does not warrant that this site or its contents will be complete, accurate, uninterrupted, secure, or error free or that the site or the server that makes it available are free of viruses or other harmful components. All information on the site is subject to change without notice. In addition, by using DropCatch1055.com you specifically acknowledge and agree that DropCatch1055.com shall have no liability for interruptions in service caused by site maintenance and repairs; interruptions cause by you from custom coding, programming, or configuration; service interruptions that do not prevent traffic to your domain but may affect your ability to alter or configure your domain; and service interruptions beyond the reasonable control of DropCatch1055.com including but not limited to power outages, interruption or failure of digital transmission and/or telecommunication, high network use or any other such failures. 34.Maximum Liability. By using DropCatch1055 you acknowledge and agree that under no circumstances whatsoever will DropCatch1055 be liable to any customer in any way for an amount greater than the lesser of a.) the total amounts paid to DropCatch1055 for services rendered, or b.) $1,000 United States Dollars. You agree that any liability will be strictly capped at $1,000 USD. 35.Accuracy of Written Material. DropCatch1055 has gone through great lengths to make sure the copywriting on its site is accurate and up-to-date, many times with backend calculations that factor into prices and expiration dates, etc. As DropCatch1055.com is ever-evolving there is a possibility copywriting might not match how the technology of the platform works. DropCatch1055 makes best efforts to keep this material up-to-date and accurate and will do its best to uphold what is presented and said on the website. However, in issues of gross error, such as prices accidentally being listed at $0.01, or the website algorithms accidentally saying "100 years free", DropCatch1055 reserves the right to issue a full refund for such inaccuracy. 37.Legal Conduct. You agree that your use of the DropCatch1055 system is only for legal activities. Use of DropCatch1055's servers, its services, email or any other part of DropCatch1055 for illegal activities will constitute a material breach of this agreement and your account may be placed on hold or suspended depending on the severity of the infraction. This document is considered a legally binding contract once digitally signed/accepted during purchase or modification of any domain name or service on the DropCatch1055.com website.
2019-04-23T12:56:27Z
http://dropcatch1055.com/Terms.aspx
Northern Mariana Islands SPECIAL PROMOTION HOSTING !! Northern Mariana Islands HOT DEAL OF THE WEEK !! What is Northern Mariana Islands web hosting? Northern Mariana Islands website hosting is also known as Northern Mariana Islands web hosting, Northern Mariana Islands website hosting, and Northern Mariana Islands hosting. Northern Mariana Islands internet website hosting contains housing, serving, and maintaining files for one or more Northern Mariana Islands web sites. Northern Mariana Islands website hosting covers various types such as dedicated web hosting, shared hosting and collocation hosting that depends on the needs, budget and requirements of the individuals, companies, and organizations for their Northern Mariana Islands website and Northern Mariana Islands business. If you have Northern Mariana Islands website and you want other people to view it online, you need Northern Mariana Islands website hosting that permits you to upload your Northern Mariana Islands web site and publish your Northern Mariana Islands website online on the internet. You can have the data center space and online connectivity with the Northern Mariana Islands website hosting provided by the Northern Mariana Islands web hosting company. Allactionhost Northern Mariana Islands is the best Northern Mariana Islands web hosting company that allows you to upload your Northern Mariana Islands website online and publish it on internet. Allactionhost Northern Mariana Islands provides Northern Mariana Islands world wide web hosting services and complete Northern Mariana Islands web hosting solutions. Allactionhost Northern Mariana Islands offers you different Northern Mariana Islands web hosting services such as you can search Northern Mariana Islands domain names, host Northern Mariana Islands domain names, host your own personal Northern Mariana Islands websites with website hosting Northern Mariana Islands, host your Northern Mariana Islands company websites with website hosting Northern Mariana Islands, register Northern Mariana Islands domain names, host your Northern Mariana Islands organization websites with website hosting Northern Mariana Islands, budget Northern Mariana Islands webhosting plans for Northern Mariana Islands small business web hosting, Northern Mariana Islands web hosting for Northern Mariana Islands bulk domains, Linux web hosting Northern Mariana Islands, Microsoft Windows web hosting Northern Mariana Islands, affordable Northern Mariana Islands hosting packages for Northern Mariana Islands medium business web hosting, Northern Mariana Islands ecommerce web hosting, control panel web hosting Northern Mariana Islands (Cpanel web hosting), Northern Mariana Islands web hosting by dedicated server, budget Northern Mariana Islands web hosting packages for small business Northern Mariana Islands web hosting, SSL certificates, WHOIS domain names search, Northern Mariana Islands multiple sites web hosting, email hosting Northern Mariana Islands, database webhosting Northern Mariana Islands, Northern Mariana Islands web hosting by shared server web hosting and applications webhosting Northern Mariana Islands. Allactionhost Northern Mariana Islands provides 24/7 Northern Mariana Islands web hosting services and technical supports to our Northern Mariana Islands customers. Why is Northern Mariana Islands web hosting important? Northern Mariana Islands web site hosting is crucial because it allows you to host your Northern Mariana Islands website and Northern Mariana Islands domain names. Northern Mariana Islands web hosting is place where you host, save and hold your Northern Mariana Islands website. Without a hosting facility, your Northern Mariana Islands website would not be published to be seen online. Northern Mariana Islands web hosting permits your Northern Mariana Islands website to be viewed online 24/7, 365 days a year. There are many kinds of Northern Mariana Islands web site hosting like Linux webhosting (Unix hosting), and Microsoft Windows webhosting to host Northern Mariana Islands websites and Northern Mariana Islands domain names. Allactionhost Northern Mariana Islands offers the best Northern Mariana Islands website hosting deals on the internet back by 24/7 support to make sure that all allactionhost Northern Mariana Islands customers are happy with our Northern Mariana Islands web hosting services. Allactionhost Northern Mariana Islands offers the best Northern Mariana Islands web hosting services, Northern Mariana Islands web hosting plans and Northern Mariana Islands web hosting solutions on the internet back by 24/7 support to make sure that Northern Mariana Islands customers of allactionhost Northern Mariana Islands are happy with our Northern Mariana Islands web hosting services. If you want to host your own Northern Mariana Islands website and upload it online for other people to view, allactionhost Northern Mariana Islands is your best choice of Northern Mariana Islands web hosting providers that allows you to upload your Northern Mariana Islands website and publish your Northern Mariana Islands website online on the world wide web. Allactionhost Northern Mariana Islands provides the datacenter space and internet connectivity with the Northern Mariana Islands web hosting for you to host Northern Mariana Islands domains and host Northern Mariana Islands websites. Allactionhost Northern Mariana Islands provides Northern Mariana Islands web hosting services and complete Northern Mariana Islands web hosting solutions such as cheap Northern Mariana Islands websites hosting plans for individual personal websites hosting Northern Mariana Islands, Northern Mariana Islands web hosting for Northern Mariana Islands ecommerce hosting, Northern Mariana Islands domain names search, affordable Northern Mariana Islands web hosting packages for Northern Mariana Islands small business web hosting, WHOIS domain names search, Northern Mariana Islands domain names registration, Northern Mariana Islands domain names renewal, Northern Mariana Islands domain names transfer, Northern Mariana Islands bulk domain names registration, budget Northern Mariana Islands web hosting plans for Northern Mariana Islands medium business web hosting, Northern Mariana Islands bulk domain names search, Northern Mariana Islands web hosting by Linux web servers, Cpanel hosting (Control Panel hosting), Northern Mariana Islands domain names hosting, SSL certificates, Northern Mariana Islands web hosting for multiple Northern Mariana Islands websites, Northern Mariana Islands web hosting by Microsoft Windows servers, Northern Mariana Islands web hosting for emails hosting, Northern Mariana Islands web hosting for databases, Northern Mariana Islands web hosting for applications, Northern Mariana Islands web hosting by shared servers, Northern Mariana Islands websites hosting plans for company to host Northern Mariana Islands websites and host Northern Mariana Islands domain names, Northern Mariana Islands web hosting by dedicated servers, DNS hosting, WHOIS domain search, Northern Mariana Islands bulk domain names transfer, Northern Mariana Islands bulk domain names renewal, Northern Mariana Islands bulk domain names hosting and cheap Northern Mariana Islands websites hosting plans for organization to host Northern Mariana Islands websites and host Northern Mariana Islands domain names. What is Northern Mariana Islands web hosting service? Northern Mariana Islands web hosting is also known as Northern Mariana Islands hosting or Northern Mariana Islands website hosting. Northern Mariana Islands web hosting service is a type of internet Northern Mariana Islands hosting services provide by Northern Mariana Islands web hosting companies. Northern Mariana Islands website hosting services allow individuals, Northern Mariana Islands company and Northern Mariana Islands organizations to make their Northern Mariana Islands websites reachable online via World Wide Web (WWW). Allactionhost Northern Mariana Islands is one of the best international and Northern Mariana Islands web hosts that provides Northern Mariana Islands complete web hosting solutions, Northern Mariana Islands domain name search, Northern Mariana Islands domains renewal, Northern Mariana Islands domain name hosting, Northern Mariana Islands webhosting of web space, Northern Mariana Islands ecommerce web hosting, Northern Mariana Islands multiple sites web hosting, Linux web hosting for Northern Mariana Islands web hosting, Northern Mariana Islands domains registration for customers to buy Northern Mariana Islands domain names, Northern Mariana Islands web hosting plans for company to host Northern Mariana Islands websites, Cpanel hosting (Control Panel hosting), cheap Northern Mariana Islands web hosting for organization web hosting Northern Mariana Islands, Northern Mariana Islands websites hosting packages for Northern Mariana Islands medium business web hosting, Northern Mariana Islands bulk domains search, Northern Mariana Islands bulk domains registration, Northern Mariana Islands bulk domains renewal, Microsoft Windows hosting for Northern Mariana Islands web hosting, email hosting Northern Mariana Islands, budget Northern Mariana Islands web hosting plans for Northern Mariana Islands small business web hosting, applications webhosting Northern Mariana Islands, databases webhosting Northern Mariana Islands, mailbox webhosting Northern Mariana Islands, WHOIS domains search, SSL certificates, Northern Mariana Islands bulk domains hosting and cheap Northern Mariana Islands web hosting plans for individual Northern Mariana Islands personal websites. What is Northern Mariana Islands web hosting company? Northern Mariana Islands web hosting companies provide many services in Northern Mariana Islands web sites. Northern Mariana Islands web hosting company provides space for Northern Mariana Islands websites on Northern Mariana Islands web hosting company's server and provides internet connectivity. Allactionhost Northern Mariana Islands is one of the best Northern Mariana Islands web hosts that provides Northern Mariana Islands world wide web hosting, 24/7 Northern Mariana Islands web hosting services and complete Northern Mariana Islands webhosting solutions. Allactionhost Northern Mariana Islands provides cheap Northern Mariana Islands web hosting plans for individual Northern Mariana Islands personal websites, web space, free domain names, Northern Mariana Islands domain names search, Northern Mariana Islands domain names registration, Northern Mariana Islands domain names renewal, Northern Mariana Islands domain names transfer, WHOIS domain names search, web space hosting Northern Mariana Islands, cheap Northern Mariana Islands web hosting plans for Northern Mariana Islands small business web hosting, Northern Mariana Islands ecommerce web hosting, Linux web hosting Northern Mariana Islands (Unix web hosting), Northern Mariana Islands web hosting plans for organization web hosting Northern Mariana Islands, Northern Mariana Islands domain names hosting, Cpanel web hosting Northern Mariana Islands (Control Panel hosting), budget Northern Mariana Islands web hosting plans for Northern Mariana Islands medium business web hosting, buy Northern Mariana Islands bulk domain names, Microsoft Windows web hosting Northern Mariana Islands, Northern Mariana Islands bulk domain names search, Northern Mariana Islands bulk domain names registration, Northern Mariana Islands bulk domain names transfer, email web hosting Northern Mariana Islands, application web hosting Northern Mariana Islands, database web hosting Northern Mariana Islands, mailbox web hosting Northern Mariana Islands, SSL certificates, Northern Mariana Islands multiple sites web hosting, Northern Mariana Islands bulk domain names renewal, Northern Mariana Islands bulk domain names hosting, shared server web hosting Northern Mariana Islands, dedicated server web hosting Northern Mariana Islands and Northern Mariana Islands web hosting plans for company web hosting Northern Mariana Islands. Allactionhost Northern Mariana Islands provides international and Northern Mariana Islands web hosting services and technical support to our Northern Mariana Islands customers. What can I do with Northern Mariana Islands web site hosting? You can upload, save and maintain your own Northern Mariana Islands web site with Northern Mariana Islands web hosting. You can host a Northern Mariana Islands website or more than one Northern Mariana Islands website according to your personal interests, business nature and purposes with allactionhost Northern Mariana Islands hosting services. Allactionhost Northern Mariana Islands is the best Northern Mariana Islands web hosting company that provides online Northern Mariana Islands web hosting services, Northern Mariana Islands domain services and complete Northern Mariana Islands websites hosting solutions such as free domain names, Northern Mariana Islands domain names search, web space hosting Northern Mariana Islands, Northern Mariana Islands domain names registration to buy Northern Mariana Islands domains, Northern Mariana Islands bulk domain names renewal, Northern Mariana Islands bulk domain names transfer, WHOIS domains search, cheap Northern Mariana Islands web hosting plans for individual personal Northern Mariana Islands website hosting, Northern Mariana Islands ecommerce webhosting, Northern Mariana Islands domain names transfer, Northern Mariana Islands bulk domain names registration to buy Northern Mariana Islands bulk domains, Northern Mariana Islands web hosting packages for company websites hosting Northern Mariana Islands, affordable Northern Mariana Islands webhosting plans for Northern Mariana Islands small business Northern Mariana Islands webhosting, SSL certificates, Northern Mariana Islands domain names renewal, email web hosting Northern Mariana Islands, dedicated server web hosting Northern Mariana Islands, multiple websites web hosting Northern Mariana Islands, Northern Mariana Islands bulk domain names search, Northern Mariana Islands web hosting plans for organization websites hosting Northern Mariana Islands, affordable Northern Mariana Islands web hosting plans for Northern Mariana Islands medium business webhosting, Linux web hosting Northern Mariana Islands, Unix web hosting Northern Mariana Islands, Cpanel webhosting Northern Mariana Islands (Control Panel hosting Northern Mariana Islands), mailbox web hosting Northern Mariana Islands, database web hosting Northern Mariana Islands, Northern Mariana Islands bulk domains hosting, shared server webhosting Northern Mariana Islands, application web hosting Northern Mariana Islands and Microsoft Windows web hosting Northern Mariana Islands. Allactionhost Northern Mariana Islands provides 24/7 online Northern Mariana Islands web hosting services for our Northern Mariana Islands customers with technical supports. What is Linux Northern Mariana Islands web hosting / Unix Northern Mariana Islands web hosting? Linux hosting Northern Mariana Islands that is also known as Unix hosting Northern Mariana Islands, Linux web hosting Northern Mariana Islands, Unix web hosting Northern Mariana Islands, Linux server hosting Northern Mariana Islands, Unix server hosting Northern Mariana Islands. Linux hosting Northern Mariana Islands is one of the working systems for hosting and operating Northern Mariana Islands websites. In Linux hosting your Northern Mariana Islands website is hosted on Linux servers. Other than Linux web hosting (Unix web Hosting), allactionhost Northern Mariana Islands also offers web spaces, Northern Mariana Islands domain name hosting, Northern Mariana Islands domain name registration to register Northern Mariana Islands bulk domains, web spaces hosting Northern Mariana Islands, Northern Mariana Islands multiple websites hosting with Northern Mariana Islands web hosting, Northern Mariana Islands bulk domains hosting, Northern Mariana Islands ecommerce web hosting with Northern Mariana Islands web hosting, budget Northern Mariana Islands webhosting plans for Northern Mariana Islands small business hosting, affordable Northern Mariana Islands webhosting packages for Northern Mariana Islands medium business web hosting, transfer Northern Mariana Islands domain name, Cpanel hosting Northern Mariana Islands, Microsoft Windows web hosting Northern Mariana Islands, email web hosting Northern Mariana Islands, application web hosting Northern Mariana Islands, database web hosting Northern Mariana Islands, mailboxes web hosting Northern Mariana Islands, Northern Mariana Islands web hosting packages for company websites hosting Northern Mariana Islands, SSL certificates and Northern Mariana Islands web hosting packages for organization websites hosting Northern Mariana Islands and 24/7 Northern Mariana Islands web hosting services with complete Northern Mariana Islands websites hosting solutions. What is Microsoft Windows Northern Mariana Islands web hosting? Windows hosting is also known as Microsoft Windows hosting that is a kind of the operating systems for hosting Northern Mariana Islands websites. Windows hosting is web hosting wherein the files of clients are positioned on a web server that uses the Windows operating system for Northern Mariana Islands web hosting. It is another kind of Northern Mariana Islands web site hosting operating system than Linux web hosting/Unix web hosting. Allactionhost Northern Mariana Islands offers best services of Northern Mariana Islands Window hosting (Microsoft Windows hosting) services, Northern Mariana Islands Linux web hosting (Unix web hosting Northern Mariana Islands), complete Northern Mariana Islands webhosting solutions, 24/7 Northern Mariana Islands webhosting, web spaces, buy Northern Mariana Islands bulk domain names, Northern Mariana Islands bulk domain names hosting with Northern Mariana Islands web hosting, Northern Mariana Islands web hosting for Northern Mariana Islands company to host Northern Mariana Islands websites with cheap Northern Mariana Islands web hosting plans, Northern Mariana Islands domains registration for Northern Mariana Islands customers to buy Northern Mariana Islands domain, web space hosting Northern Mariana Islands, Northern Mariana Islands domain names hosting with Northern Mariana Islands web hosting, Northern Mariana Islands ecommerce website hosting, cheap Northern Mariana Islands web hosting packages for Northern Mariana Islands small enterprise web hosting, databases web hosting Northern Mariana Islands, mailbox web hosting Northern Mariana Islands, SSL certificates, Northern Mariana Islands multiple sites web hosting, Northern Mariana Islands web hosting for Northern Mariana Islands organization to host Northern Mariana Islands websites with cheap Northern Mariana Islands web hosting plans, budget Northern Mariana Islands web hosting plans for Northern Mariana Islands medium business web hosting, Linux web hosting Northern Mariana Islands (Unix webhosting Northern Mariana Islands), Northern Mariana Islands domains transfer, Northern Mariana Islands budget web hosting plans for individual Northern Mariana Islands personal website hosting, Cpanel, Control Panel hosting Northern Mariana Islands, emails web hosting Northern Mariana Islands and applications web hosting Northern Mariana Islands. What is Control Panel for Northern Mariana Islands web hosting? Control panel is also known as Cpanel that is a common graphical web-based control panel work in Linux web hosting / Unix web hosting of Northern Mariana Islands web hosting. Cpanel allows users to manage different aspects of Northern Mariana Islands website administration and simplify the process of Linux web hosting for hosting Northern Mariana Islands website via control panel through a standard internet web browser. A Cpanel will be assigned to the customers who host their Northern Mariana Islands websites by Linux servers and they can access most of the features via the Control Panel to manage their Northern Mariana Islands websites. Allactionhost Northern Mariana Islands provides 24/7 Northern Mariana Islands web hosting services and complete Northern Mariana Islands webhosting solutions. You can host your own personal Northern Mariana Islands websites with cheap Northern Mariana Islands web hosting plans, get Northern Mariana Islands web hosting for Northern Mariana Islands companies websites hosting with affordable Northern Mariana Islands web hosting plans, host Northern Mariana Islands organization websites with budget Northern Mariana Islands web hosting plans, host email accounts with webhosting Northern Mariana Islands, host mail boxes with webhosting Northern Mariana Islands, host applications with webhosting Northern Mariana Islands, host Northern Mariana Islands website by Microsoft Windows hosting Northern Mariana Islands, WHOIS domain names search, host Northern Mariana Islands website by Linux hosting (Unix hosting), host Northern Mariana Islands websites by dedicated server hosting, host Northern Mariana Islands websites by shared server hosting, SSL certificates, search Northern Mariana Islands domains, register Northern Mariana Islands domains to buy Northern Mariana Islands domain names, renew Northern Mariana Islands domains, transfer Northern Mariana Islands domains, host Northern Mariana Islands domains with webhosting Northern Mariana Islands, search Northern Mariana Islands bulk domains, register Northern Mariana Islands bulk domains, renew Northern Mariana Islands bulk domains, transfer Northern Mariana Islands domains names, host Northern Mariana Islands bulk domains, host Northern Mariana Islands e-commerce websites with webhosting Northern Mariana Islands, host databases with webhosting Northern Mariana Islands, DNS hosting and host Northern Mariana Islands multiple websites at allactionhost Northern Mariana Islands. Allactionhost Northern Mariana Islands is your best Northern Mariana Islands web hosting services provider who provides best 24/7 international and Northern Mariana Islands web hosting services that will meet your needs and suit your budget. What is dedicated server hosting for Northern Mariana Islands web hosting? Dedicated server hosting is a kind of online Northern Mariana Islands web hosting that you will rent an entire server not sharing with other client. What is shared server hosting for Northern Mariana Islands web hosting? Shared server hosting refers Northern Mariana Islands website hosting that has more than one Northern Mariana Islands website will be kept and host in the same server. Shared server hosting is much cheaper and more affordable than dedicated server hosting for Northern Mariana Islands webhosting. Allactionhost Northern Mariana Islands offers full Linux server hosting solutions with shared server hosting for Northern Mariana Islands webhosting. Allactionhost Northern Mariana Islands provides cheap and affordable shared server Northern Mariana Islands web hosting other than dedicated hosting services. Allactionhost Northern Mariana Islands also provides whole Northern Mariana Islands web hosting solutions and internet Northern Mariana Islands webhosting services such as Northern Mariana Islands domain names registration, web spaces hosting Northern Mariana Islands, cheap Northern Mariana Islands web hosting packages for personal Northern Mariana Islands website hosting to host Northern Mariana Islands websites, web space hosting Northern Mariana Islands, free domain name, Northern Mariana Islands domain hosting with cheap Northern Mariana Islands web hosting, Northern Mariana Islands ecommerce webhosting, budget Northern Mariana Islands web hosting plans for Northern Mariana Islands organization website hosting, Northern Mariana Islands bulk domains hosting with cheap Northern Mariana Islands web hosting, Northern Mariana Islands web hosting plans for Northern Mariana Islands small to big business web hosting Northern Mariana Islands, Linux server web hosting Northern Mariana Islands, Unix web server hosting Northern Mariana Islands, Control Panel hosting Northern Mariana Islands, Microsoft Windows web hosting Northern Mariana Islands, emails web hosting Northern Mariana Islands, applications web hosting Northern Mariana Islands, databases web hosting Northern Mariana Islands, mailboxes web hosting Northern Mariana Islands, SSL certificates, Northern Mariana Islands multiple sites webhosting with budget Northern Mariana Islands web hosting plans, Northern Mariana Islands domains transfer and cheap Northern Mariana Islands website hosting plans for Northern Mariana Islands company website hosting. Do I need any practical knowledge and technical skill to use Northern Mariana Islands web hosting? Allactionhost Northern Mariana Islands provides a user-friendly environment and settings for our Northern Mariana Islands customers, we made our internet Northern Mariana Islands web hosting easy for you to use. We will assign a Cpanel (Control Panel) for you and you can access most of the features via the Control Panel for your Northern Mariana Islands webhosting. Moreover, allactionhost Northern Mariana Islands has a helpful support team who is always ready to help you. Allactionhost Northern Mariana Islands is the best international and Northern Mariana Islands web host that provides global and Northern Mariana Islands web hosting services to our Northern Mariana Islands customers. We offer Northern Mariana Islands complete web hosting solutions, cheap Northern Mariana Islands web hosting packages for Northern Mariana Islands small business web hosting to host Northern Mariana Islands websites and Northern Mariana Islands domain names, Northern Mariana Islands e-commerce web hosting, search Northern Mariana Islands domains names, Northern Mariana Islands domain names registration, Northern Mariana Islands domain names renewal, Northern Mariana Islands bulk domains names registration, Northern Mariana Islands domains names hosting with Northern Mariana Islands web hosting, Linux hosting Northern Mariana Islands, Cpanel hosting (Control Panel hosting), Northern Mariana Islands web hosting plans for Northern Mariana Islands company website hosting Northern Mariana Islands, SSL certificates, Microsoft Windows web hosting Northern Mariana Islands, Northern Mariana Islands web hosting plans for Northern Mariana Islands organization website hosting Northern Mariana Islands, email web hosting Northern Mariana Islands, databases web hosting Northern Mariana Islands, applications web hosting Northern Mariana Islands, shared servers web hosting Northern Mariana Islands, cheap Northern Mariana Islands web hosting packages for Northern Mariana Islands medium business web hosting, dedicated servers web hosting Northern Mariana Islands, WHOIS domains names search, Northern Mariana Islands multiple websites hosting with cheap Northern Mariana Islands web hosting plans, budget Northern Mariana Islands web hosting packages for personal web site hosting Northern Mariana Islands, Northern Mariana Islands bulk domains hosting and DNS hosting. Allactionhost Northern Mariana Islands provides best technical supports and 24/7 web hosting Northern Mariana Islands services. How much time will take to set up internet Northern Mariana Islands web hosting? Most Northern Mariana Islands web hosting accounts are set up immediately, though it might need to take a couple of days for your Northern Mariana Islands domain name to be registered and point to your internet Northern Mariana Islands website hosting. Allactionhost Northern Mariana Islands is the best global and Northern Mariana Islands web hosting company that provides international and Northern Mariana Islands internet world wide web hosting services. Allactionhost Northern Mariana Islands delivers Northern Mariana Islands complete web hosting solutions, 24/7 Northern Mariana Islands webhosting services and technical supports to our Northern Mariana Islands customers. Allactionhost Northern Mariana Islands provides Northern Mariana Islands cheap web hosting plans for Northern Mariana Islands small business web site hosting, Northern Mariana Islands cheap web hosting plans for Northern Mariana Islands medium business web site hosting Northern Mariana Islands, Northern Mariana Islands domains names registration, Northern Mariana Islands domains names renewal, Northern Mariana Islands domains names transfer, Northern Mariana Islands bulk domains names registration, Northern Mariana Islands web sites hosting plans for Northern Mariana Islands company to host Northern Mariana Islands web site with Northern Mariana Islands web hosting, Northern Mariana Islands web sites hosting plans for Northern Mariana Islands organization to host Northern Mariana Islands web site with Northern Mariana Islands website hosting, Northern Mariana Islands domains names hosting with budget Northern Mariana Islands web hosting, Linux web hosting Northern Mariana Islands, Cpanel hosting (Control Panel hosting), SSL certificates, Northern Mariana Islands bulk domain names hosting with Northern Mariana Islands web hosting, Microsoft Windows web hosting Northern Mariana Islands, email web hosting Northern Mariana Islands, free domains names, application web hosting Northern Mariana Islands, shared servers web hosting Northern Mariana Islands, DNS hosting, Northern Mariana Islands budget web hosting packages for individual person to host Northern Mariana Islands website with Northern Mariana Islands web hosting, Northern Mariana Islands bulk domain names search, Northern Mariana Islands bulk domains transfer, Northern Mariana Islands multiple sites web hosting with Northern Mariana Islands web hosting, Northern Mariana Islands bulk domains renewal, buy Northern Mariana Islands bulk domain names, dedicated servers web hosting Northern Mariana Islands, Northern Mariana Islands ecommerce web hosting, search Northern Mariana Islands domains names, WHOIS domains names search and databases web hosting Northern Mariana Islands. What is Northern Mariana Islands domain hosting? Simply saying Northern Mariana Islands domain hosting is to host Northern Mariana Islands domain name for individuals, companies, and organization. After you register a Northern Mariana Islands domain name, you need a Northern Mariana Islands web hosting provider with Northern Mariana Islands domain hosting to host your own Northern Mariana Islands domain. Northern Mariana Islands domain hosting is also known as Northern Mariana Islands domain name hosting or DNS hosting. Allactionhost Northern Mariana Islands is your best choice to host Northern Mariana Islands domain names. Allactionhost Northern Mariana Islands provides cheap Northern Mariana Islands domains hosting with Northern Mariana Islands web hosting, web spaces, cheap Northern Mariana Islands web hosting packages for Northern Mariana Islands company web sites hosting Northern Mariana Islands, Northern Mariana Islands web sites hosting plans for Northern Mariana Islands organization web sites hosting Northern Mariana Islands, Northern Mariana Islands cheap web hosting plans for Northern Mariana Islands medium business web hosting, register Northern Mariana Islands bulk domains names, transfer Northern Mariana Islands bulk domains names, Northern Mariana Islands domain names registration to purchase Northern Mariana Islands domain names, web spaces hosting Northern Mariana Islands, Northern Mariana Islands bulk domains hosting with cheap Northern Mariana Islands web hosting, Northern Mariana Islands ecommerce web hosting, free domain name, DNS hosting Northern Mariana Islands, Northern Mariana Islands cheap web hosting plans for Northern Mariana Islands small business web hosting Northern Mariana Islands, Northern Mariana Islands web hosting for Northern Mariana Islands big business web hosting, renew Northern Mariana Islands bulk domains names, Linux webhosting ( Unix webhosting), Northern Mariana Islands multiple sites hosting, transfer Northern Mariana Islands domain name, Cpanel, Control Panel hosting (Cpanel hosting), Microsoft Northern Mariana Islands Windows hosting, emails web hosting Northern Mariana Islands, applications web hosting Northern Mariana Islands, databases web hosting Northern Mariana Islands, mailboxes web hosting Northern Mariana Islands, SSL certificates, search Northern Mariana Islands domains names, cheap Northern Mariana Islands web hosting plans for personal web site hosting Northern Mariana Islands, renew Northern Mariana Islands domains names and search Northern Mariana Islands bulk domains names. Useful Website Hosting Information : What is Northern Mariana Islands web hosting? Why is Northern Mariana Islands web hosting important? What is Northern Mariana Islands web hosting service? What is Northern Mariana Islands web hosting company? What can I do with Northern Mariana Islands web site hosting? What is Linux Northern Mariana Islands web hosting / Unix Northern Mariana Islands web hosting? What is Microsoft Windows Northern Mariana Islands web hosting? What is Control Panel for Northern Mariana Islands web hosting? What is dedicated server hosting for Northern Mariana Islands web hosting? What is shared server hosting for Northern Mariana Islands web hosting? Do I need any practical knowledge and technical skill to use Northern Mariana Islands web hosting? How much time will take to set up internet Northern Mariana Islands web hosting? What is Northern Mariana Islands domain hosting?
2019-04-25T03:59:47Z
http://www.allactionhost.com/en-mp/web-hosting
Biology is the Science that studies living Organisms. Characteristic Life Processes and Phenomena of living Organisms. All the Plant and Animal life of a Particular Region. Bio is something biological, involving biology. Ology is an informal word (abstracted from words with this ending) for some unidentified branch of knowledge. Microbiology is the study of microscopic organisms, those being unicellular (single cell), multicellular (cell colony), or a cellular (lacking cells). Microbiology encompasses numerous sub-disciplines including virology, mycology, parasitology, and bacteriology. Specimens. Microbiologist is a biological scientist who studies microscopic life forms and processes or works in the field of microbiology. Microbiologists investigate the growth, interactions and characteristics of microscopic organisms such as bacteria, algae, fungi, and some types of parasites and their vectors. They contribute much to the field by trying to understand and learn about the interaction between these microbes and the environment and also among themselves and other organisms. Biotic is relating to living organisms. Abiotic is physical rather than biological and not derived from living organisms. Structural Biology is a branch of Molecular Biology, biochemistry, and biophysics concerned with the molecular structure of biological macromolecules, especially proteins and nucleic acids, how they acquire the structures they have, and how alterations in their structures affect their function. This subject is of great interest to biologists because macromolecules carry out most of the functions of cells, and only by coiling into specific three-dimensional shapes that they are able to perform these functions. This architecture, the "tertiary structure" of molecules, depends in a complicated way on the molecules' basic composition, or "primary structures." Chemical Biology is a scientific discipline spanning the fields of Chemistry, biology, and Physics. It involves the application of chemical techniques, tools, and analyses, and often compounds produced through synthetic chemistry, to the study and manipulation of biological systems. Chemical biologists attempt to use chemical principles to modulate systems to either investigate the underlying biology or create new function. Bio-Monitoring (Body Burden). Mathematical Biology aims at the mathematical representation, treatment and modeling of biological processes, using techniques and tools of applied mathematics. Comparative Biology uses natural variation and disparity to understand the patterns of life at all levels—from genes to communities—and the critical role of organisms in ecosystems. Comparative biology is a cross-lineage approach to understanding the phylogenetic history of individuals or higher taxa and the mechanisms and patterns that drives it. Comparative biology encompasses Evolutionary Biology, Systematics, Neontology, Paleontology, Ethology, Anthropology, and Biogeography as well as historical approaches to Developmental biology, Genomics, Physiology, Ecology and many other areas of the biological sciences. The comparative approach also has numerous applications in human health, genetics, biomedicine, and conservation biology. The biological relationships (phylogenies, pedigree) are important for comparative analyses and usually represented by a phylogenetic tree or cladogram to differentiate those features with single origins (Homology) from those with multiple origins (Homoplasy). Synthetic Biology is the artificial design and engineering of biological systems and living organisms for purposes of improving applications for industry or biological research. Designing and constructing biological modules, biological systems, and biological machines for useful purposes. Combines various disciplines from within these domains, such as biotechnology, evolutionary biology, genetic engineering, molecular biology, molecular engineering, systems biology, biophysics, and computer engineering. Biosignature is any substance – such as an element, isotope, molecule, or phenomenon – that provides scientific evidence of past or present life. Measurable attributes of life include its complex physical and chemical structures and also its utilization of free energy and the production of biomass and wastes. Due to its unique characteristics, a biosignature can be interpreted as having been produced by living organisms; however, it is important that they not be considered definitive because there is no way of knowing in advance which ones are universal to life and which ones are unique to the peculiar circumstances of life on Earth. Nonetheless, life forms are known to shed unique chemicals, including DNA, into the environment as evidence of their presence in a particular location. Morphogenesis is the biological process that causes an organism to develop its shape. It is one of three fundamental aspects of developmental biology along with the control of cell growth and cellular differentiation, unified in evolutionary developmental biology (evo-devo).The process controls the organized spatial distribution of cells during the embryonic development of an organism. Morphogenesis can take place also in a mature organism, in cell culture or inside tumor cell masses. Morphogenesis also describes the development of unicellular life forms that do not have an embryonic stage in their life cycle, or describes the evolution of a body structure within a taxonomic group. Morphogenetic responses may be induced in organisms by hormones, by environmental chemicals ranging from substances produced by other organisms to toxic chemicals or radionuclides released as pollutants, and other plants, or by mechanical stresses induced by spatial patterning of the cells. (beginning of the shape). Morphogenetic Field is a group of cells able to respond to discrete, localized biochemical signals leading to the development of specific morphological structures or organs. The spatial and temporal extents of the embryonic field are dynamic, and within the field is a collection of interacting cells out of which a particular organ is formed. As a group, the cells within a given morphogenetic field are constrained: thus, cells in a limb field will become a limb tissue, those in a cardiac field will become heart tissue. However, specific cellular programming of individual cells in a field is flexible: an individual cell in a cardiac field can be redirected via cell-to-cell signaling to replace specific damaged or missing cells. Imaginal discs in insect larvae are examples of morphogenetic fields.developmental biology. Biological Life Cycle is a series of changes in form that an organism undergoes, returning to the starting state. The concept is closely related to those of the life history, development and ontogeny, but differs from them in stressing renewal. Transitions of form may involve growth, asexual reproduction, and/or sexual reproduction. Biological Process are the processes vital for a living organism to live, and that shape its capacities for interacting with its environment. Biological processes are made up of many chemical reactions or other events that are involved in the persistence and transformation of life forms. Metabolism and homeostasis are examples. Physiology is the scientific study of normal mechanisms, and their interactions, which works within a living system. A sub-discipline of biology, its focus is in how organisms, organ systems, organs, cells, and biomolecules carry out the chemical or physical functions that exist in a living system. Given the size of the field, it is divided into, among others, animal physiology (including that of humans), plant physiology, cellular physiology, microbial physiology (microbial metabolism), bacterial physiology, and viral physiology. Central to an understanding of physiological functioning is its integrated nature with other disciplines such as chemistry and physics, coordinated homeostatic control mechanisms, and continuous communication between cells. Biological System is a complex network of biologically relevant entities. As biological organization spans several scales, examples of biological systems are populations of organisms, or on the organ- and tissue scale in mammals and other animals, the circulatory system, the respiratory system, the nervous system, etc. On the micro to the nanoscopic scale, examples of biological systems are cells, organelles, macromolecular complexes and regulatory pathways. A biological system is not to be confused with a living system, which is commonly referred to as life. For further information see e.g. definition of life or synthetic biology. Order in biology is a taxonomic rank used in the classification of organisms and recognized by the nomenclature codes. Other well-known ranks are life, domain, kingdom, phylum, class, family, genus, and species, with order fitting in between class and family. An immediately higher rank, superorder, may be added directly above order, while suborder would be a lower rank. A taxonomic unit, a taxon, in that rank. In that case the plural is orders (Latin ordines). Example: The Juglans (walnut) and Hickory trees belong to the family Juglandaceae (or walnut family), which is placed in the order Fagales. Class in biology is a taxonomic rank. Other well-known ranks in descending order of size are life, domain, kingdom, phylum, order, family, genus, and species, with class fitting between phylum and order. As for the other well-known ranks, there is the option of an immediately lower rank, indicated by the prefix sub-: subclass (Latin: subclassis). A taxonomic unit, a taxon, in that rank. In that case the plural is classes (Latin classes). Example: Dogs are in the class Mammalia. Kingdom biology is the second highest taxonomic rank, just below domain. Kingdoms are divided into smaller groups called phyla. Genus is a taxonomic rank used in the biological classification of living and fossil organisms in biology. In the hierarchy of biological classification, genus comes above species and below family. In binomial nomenclature, the genus name forms the first part of the binomial species name for each species within the genus. Cyclomorphosis (also known as seasonal polyphenism) is the name given to the occurrence of cyclic or seasonal changes in the phenotype of an organism through successive generations. It occurs in small aquatic invertebrates that reproduce by parthenogenesis and give rise to several generations annually. It occurs especially in marine planktonic animals, and is thought to be caused by the interaction of environmental cues with the organism's genes, thereby altering the course of their development. Tardigrade are water-dwelling, eight-legged, segmented micro-animals, are one of the most resilient animals known. They have been found everywhere: from mountaintops to the deep sea and mud volcanoes; from tropical rain forests to the Antarctic. Individual species of tardigrades can survive extreme conditions that would be rapidly fatal to nearly all other known life forms, including complete global mass extinction events due to astrophysical events, such as supernovae, gamma-ray bursts, large asteroid impacts, or passing-by stars. Some tardigrades can withstand temperatures down to 1 K (−458 °F; −272 °C) (close to absolute zero) while others can withstand 420 K (300 °F; 150 °C) for several minutes, pressures about six times greater than those found in the deepest ocean trenches, ionizing radiation at doses hundreds of times higher than the lethal dose for a human, and the vacuum of outer space. They can go without food or water for more than 30 years, drying out to the point where they are 3% or less water, only to rehydrate, forage, and reproduce. Tardigrades, living in harsh conditions, undergo an annual process of cyclomorphosis. They are not considered extremophilic because they are not adapted to exploit these conditions. This means that their chances of dying increase the longer they are exposed to the extreme environments, whereas true extremophiles thrive in a physically or geochemically extreme environment that would harm most other organisms. Usually, tardigrades are about 0.5 mm (0.02 in) long when they are fully grown. They are short and plump with four pairs of legs, each with four to eight claws also known as "disks". The first three pairs of legs are directed ventrolaterally and are the primary means of locomotion, while the fourth pair is directed posteriorly on the terminal segment of the trunk and is used primarily for grasping the substrate. Tardigrades are prevalent in mosses and lichens and feed on plant cells, algae, and small invertebrates. When collected, they may be viewed under a very low-power microscope, making them accessible to students and amateur scientists. Tardigrades form the phylum Tardigrada, part of the superphylum Ecdysozoa. It is an ancient group, with fossils dating from 530 million years ago, in the Cambrian period. About 1,150 species of tardigrades have been described. Tardigrades can be found throughout the world, from the Himalayas (above 6,000 m (20,000 ft)), to the deep sea (below 4,000 m (13,000 ft)) and from the polar regions to the equator. Tardigrades are the toughest, most resilient form of life on earth, able to survive for up to 30 years without food or water, and endure temperature extremes of up to 150 degrees Celsius, the deep sea and even the frozen vacuum of space. The water-dwelling micro animal can live for up to 60 years, and grow to a maximum size of 0.5mm, best seen under a microscope. Micro-Animal are animals so small that they can be visually observed only under a microscope. Microscopic arthropods include dust mites, spider mites, and some crustaceans such as copepods and certain cladocera. Another common group of microscopic animals are the rotifers, which are filter feeders that are usually found in fresh water. Some nematode species are microscopic, as well as many loricifera, including the recently discovered anaerobic species, which spend their entire lives in an anoxic environment. Tardigrades, a phylum of water-dwelling micro-animals, can survive extreme living conditions that they did not evolve to survive in and have survived solar radiation, UV radiation, and the hard vacuum of space in an astrobiology experiment. Mites are small arthropods belonging to the subclass Acari (also known as Acarina) and the class Arachnida. The scientific discipline devoted to the study of ticks and mites is called Acarology. Many species live in soil as decomposers; others are predatory or parasitic, these last including the commercially important Varroa mites of honeybees, and the scabies mite of humans. Invertebrate are animals that neither possess nor develop a vertebral column (commonly known as a backbone or spine). Escarpia laminata Tubeworm is the Longest Living Animal, can live for at least 300 years. Life Sciences involve the scientific study of living organisms – such as microorganisms, plants, animals, and human beings – as well as related considerations like bioethics. While biology remains the centerpiece of the life sciences, technological advances in molecular biology and biotechnology have led to a burgeoning of specializations and interdisciplinary fields. Omics informally refers to a field of study in biology ending in -omics, such as genomics, proteomics or metabolomics. The related suffix -ome is used to address the objects of study of such fields, such as the genome, proteome or metabolome respectively. Omics aims at the collective characterization and quantification of pools of biological molecules that translate into the structure, function, and dynamics of an organism or organisms. Functional genomics aims at identifying the functions of as many genes as possible of a given organism. It combines different -omics techniques such as transcriptomics and proteomics with saturated mutant collections. The suffix -ome as used in molecular biology refers to a totality of some sort; it is an example of a "neo-suffix" formed by abstraction from various Greek terms in -ωμα, a sequence that does not form an identifiable suffix in Greek. Function in biology is the reason some object or process occurred in a system that evolved through natural selection. That reason is typically that it achieves some result, such as that chlorophyll helps to capture the energy of sunlight in photosynthesis. Hence, the organism that contains it is more likely to survive and reproduce, in other words the function increases the organism's fitness. A characteristic that assists in evolution is called an adaptation; other characteristics may be non-functional spandrels, though these in turn may later be co-opted by evolution to serve new functions. In the philosophy of biology, talk of function inevitably suggests some kind of teleological purpose, even though natural selection operates without any goal for the future. All the same, biologists often use teleological language as a shorthand for function. Biological Functionalism (wiki). Biomedical Engineering is the application of engineering principles and design concepts to medicine and biology for healthcare purposes (e.g. diagnostic or therapeutic). This field seeks to close the gap between engineering and medicine, combining the design and problem solving skills of engineering with medical and biological sciences to advance health care treatment, including diagnosis, monitoring, and therapy. Biological Engineering is the application of concepts and methods of biology (and secondarily of physics, chemistry, mathematics, and computer science) to solve real-world problems related to life sciences or the application thereof, using engineering's own analytical and synthetic methodologies and also its traditional sensitivity to the cost and practicality of the solution(s) arrived at. Bio-Manufacturing is a type of manufacturing or biotechnology that utilizes biological systems to produce commercially important biomaterials and biomolecules for use in medicines, food and beverage processing, and industrial applications. Biomanufacturing products are recovered from natural sources, such as blood, or from cultures of microbes, animal cells, or plant cells grown in specialized equipment. The cells used during the production may have been naturally occurring or derived using genetic engineering techniques. Biomechanics is the study of the structure and function of biological systems such as humans, animals, plants, organs, fungi, and cells by means of the methods of mechanics. Bioreactor may refer to any manufactured or engineered device or system that supports a biologically active environment. In one case, a bioreactor is a vessel in which a chemical process is carried out which involves organisms or biochemically active substances derived from such organisms. This process can either be aerobic or anaerobic. These bioreactors are commonly cylindrical, ranging in size from litres to cubic metres, and are often made of stainless steel. It may also refer to a device or system designed to grow cells or tissues in the context of cell culture. These devices are being developed for use in tissue engineering or biochemical engineering. On the basis of mode of operation, a bioreactor may be classified as batch, fed batch or continuous (e.g. a continuous stirred-tank reactor model). An example of a continuous bioreactor is the chemostat. Organisms growing in bioreactors may be submerged in liquid medium or may be attached to the surface of a solid medium. Submerged cultures may be suspended or immobilized. Suspension bioreactors can use a wider variety of organisms, since special attachment surfaces are not needed, and can operate at much larger scale than immobilized cultures. However, in a continuously operated process the organisms will be removed from the reactor with the effluent. Immobilization is a general term describing a wide variety of cell or particle attachment or entrapment. It can be applied to basically all types of biocatalysis including enzymes, cellular organelles, animal and plant cells. Immobilization is useful for continuously operated processes, since the organisms will not be removed with the reactor effluent, but is limited in scale because the microbes are only present on the surfaces of the vessel. refers to any manufactured or engineered device or system that supports a biologically active environment. In one case, a bioreactor is a vessel in which a chemical process is carried out which involves organisms or biochemically active substances derived from such organisms. This process can either be aerobic or anaerobic. These bioreactors are commonly cylindrical, ranging in size from litres to cubic metres, and are often made of stainless steel. Bioinformatics is an interdisciplinary field that develops methods and software tools for understanding biological data. As an interdisciplinary field of science, bioinformatics combines biology, computer science, information engineering, mathematics and statistics to analyze and interpret biological data. Bioinformatics has been used for in silico analyses of biological queries using mathematical and statistical techniques. Biological Database are libraries of life sciences information, collected from scientific experiments, published literature, high-throughput experiment technology, and computational analysis. They contain information from research areas including genomics, proteomics, metabolomics, microarray gene expression, and phylogenetics. Information contained in biological databases includes gene function, structure, localization (both cellular and chromosomal), clinical effects of mutations as well as similarities of biological sequences and structures. Biobus is a mobile science lab biofuel-powered 1974 transit bus with over $100,000 of microscopes) and the BioBase research grade community science lab give 30,000 students annually the chance to feel the excitement of making a scientific discovery. Microcosm are artificial, simplified ecosystems that are used to simulate and predict the behaviour of natural ecosystems under controlled conditions. Open or closed microcosms provide an experimental area for ecologists to study natural ecological processes. Microcosm studies can be very useful to study the effects of disturbance or to determine the ecological role of key species. Controlled Ecological Life Support System are a self-supporting life support system for space stations and colonies typically through controlled closed ecological systems, such as the BioHome, BIOS-3, Biosphere 2, Mars Desert Research Station, and Yuegong-1. Biocybernetics is the application of cybernetics to biological science, composed of biological disciplines that benefit from the application of cybernetics including neurology and multicellular systems. Biocybernetics plays a major role in systems biology, seeking to integrate different levels of information to understand how biological systems function. Biocybernetics is an abstract science and is a fundamental part of theoretical biology, based upon the principles of systemics. Smart Material are designed materials that have one or more properties that can be significantly changed in a controlled fashion by external stimuli, such as stress, temperature, moisture, pH, electric or magnetic fields. Bio-Plastics. Biological Specimen is a biological laboratory specimen held by a biorepository for research. Such a specimen would be taken by sampling so as to be representative of any other specimen taken from the source of the specimen. When biological specimens are stored, ideally they remain equivalent to freshly-collected specimens for the purposes of research. Human biological specimens are stored in a type of biorepository called a biobank, and the science of preserving biological specimens is most active in the field of biobanking. Human Microbiome (Gut Flora and Microbes). Specimen is a bit of tissue, blood or urine taken as an example and regarded as typical of its class for diagnostic purposes. Biotic Material is any material that originates from living organisms. Most such materials contain carbon and are capable of decay. Genetic Material is the material used to store genetic information in the nuclei or mitochondria of an organism's cells; either DNA or RNA. Material is the tangible substance that goes into the makeup of a physical object. Information in the form of data or ideas or observations that can be used or reworked into a finished form. Biobank is a type of biorepository that stores biological samples (usually human) for use in research. Since the late 1990s biobanks have become an important resource in medical research, supporting many types of contemporary research like genomics and personalized medicine. UK Biobank. Biorepository is a biological materials repository that collects, processes, stores, and distributes biospecimens to support future scientific investigation. Biorepositories can contain or manage specimens from animals, including humans, and many other living organisms. Vertebrates, invertebrates, arthropods, and other life forms are just a few of the many classes of living organisms which can be studied by preserving and storing samples taken. Gene Bank are a type of biorepository which preserve genetic material. For plants, this could be by in vitro storage, freezing cuttings from the plant, or stocking the seeds (e.g. in a seedbank). For animals, this is the freezing of sperm and eggs in zoological freezers until further need. With corals, fragments are taken which are stored in water tanks under controlled conditions. Plant genetic material in a 'gene bank' is preserved at -196° Celsius in Liquid Nitrogen as mature seed (dry) or tissue (meristems). Citizen Science is scientific research conducted, in whole or in part, by anyone, including nonprofessionals or volunteer scientists. Citizen science is sometimes described as "public participation in scientific research," participatory monitoring and participatory action research. (also known as crowd science, crowd-sourced science, civic science, volunteer monitoring, networked science and Learning). Biohacking activity of exploiting genetic material experimentally, free from standard norms and limited expectations, for either purposes benefitting humankind, or those of a criminal nature. Chemist Tools. Open Science is the movement to make scientific research, data and dissemination accessible to all levels of an inquiring society, amateur or professional. It encompasses practices such as publishing open research, campaigning for open access, encouraging scientists to practice open notebook science, and generally making it easier to publish and communicate scientific knowledge. Science Tools - DIY Resources - Hacker Space Movement. Emerald Cloud Laboratory - A web-based life sciences lab, developed by scientists for scientists. Biosecurity is a set of preventive measures designed to reduce the risk of transmission of infectious diseases in crops and livestock, quarantined pests, invasive alien species, and living modified organisms (Koblentz, 2010). The emerging nature of biosecurity threats means that small scale risks blow up rapidly, thus an effective policy becomes a challenge for there are limitations on time and resources available for analyzing threats and estimating the likelihood of their occurrence. Biosafety Level is a set of biocontainment precautions required to isolate dangerous biological agents in an enclosed laboratory facility. The levels of containment range from the lowest biosafety level 1 (BSL-1) to the highest at level 4 (BSL-4). In the United States, the Centers for Disease Control and Prevention (CDC) have specified these levels. Bioethics is the study of the typically controversial ethical issues emerging from new situations and possibilities brought about by advances in biology and medicine. It is also moral discernment as it relates to medical policy and practice. Bioethicists are concerned with the ethical questions that arise in the relationships among life sciences, biotechnology, medicine, politics, law, and philosophy. It also includes the study of the more commonplace questions of values ("the ethics of the ordinary") which arise in primary care and other branches of medicine. Bioethics. SJET is a platform for experimental computation + design and has grown into a multidisciplinary research based practice. SJET crosses disciplines from design, fabrication, computer science to robotics. Self Assembly Lab is a cross-disciplinary research lab at MIT inventing self-assembly and programmable material technologies aimed at reimagining construction, manufacturing, product assembly and performance. Philosophy of Biology is a subfield of philosophy of science, which deals with epistemological, metaphysical, and ethical issues in the biological and biomedical sciences. Biological Innovation Society is an international initiative to foster innovation and freedom to operate in the biological sciences. Techno-Progressivism is a stance of active support for the convergence of technological change and social change. Techno-progressives argue that technological developments can be profoundly empowering and emancipatory when they are regulated by legitimate democratic and accountable authorities to ensure that their costs, risks and benefits are all fairly shared by the actual stakeholders to those developments. E Life Sciences open-access journal that publishes promising research in the life and biomedical sciences. Joint Bio-Energy Institute is a research institute funded by the United States Department of Energy. Biomimetics is the imitation of the models, systems, and elements of nature for the purpose of solving complex human problems. 3D Bio-Printing - Bio-Plastics - Smart Polymers - Molecular Machines. Biomaterials is any substance that has been engineered to interact with biological systems for a medical purpose - either a therapeutic (treat, augment, repair or replace a tissue function of the body) or a diagnostic one. Bio-Based Material is a material intentionally made from substances derived from living (or once-living) organisms. Meta-Material is a material engineered to have a property that is not found in nature. They are made from assemblies of multiple elements fashioned from composite materials such as metals or plastics. The materials are usually arranged in repeating patterns, at scales that are smaller than the wavelengths of the phenomena they influence. Metamaterials derive their properties not from the properties of the base materials, but from their newly designed structures. Their precise shape, geometry, size, orientation and arrangement gives them their smart properties capable of manipulating electromagnetic waves: by blocking, absorbing, enhancing, or bending waves, to achieve benefits that go beyond what is possible with conventional materials. Metamaterials or Human-Made Materials that have enormous applications, from remote nanoscale sensing to energy harvesting and medical diagnostics. Engineers Demonstrate Metamaterials that can Solve Equations. Engineers have designed a metamaterial device that can solve integral equations. The device works by encoding parameters into the properties of an incoming electromagnetic wave; once inside, the device's unique structure manipulates the wave in such a way that it exits encoded with the solution to a pre-set integral equation for that arbitrary input. Self Assembly. Biosynthesis is a multi-step, enzyme-catalyzed process where substrates are converted into more complex products in living organisms. In biosynthesis, simple compounds are modified, converted into other compounds, or joined together to form macromolecules. This process often consists of metabolic pathways. Some of these biosynthetic pathways are located within a single cellular organelle, while others involve enzymes that are located within multiple cellular organelles. Examples of these biosynthetic pathways include the production of lipid membrane components and nucleotides. Xenobiology is a subfield of synthetic biology, the study of synthesizing and manipulating biological devices and systems. Biocompatibility refers to the ability of a material to perform with an appropriate host response in a specific situation. Biocompatible Material is any substance that has been engineered to interact with biological systems for a medical purpose - either a therapeutic (treat, augment, repair or replace a tissue function of the body) or a diagnostic one. Metallic Wood has the Strength of Titanium and the Density of Water. Researchers have built a sheet of nickel with nanoscale pores that make it as strong as titanium but four to five times lighter. Because roughly 70 percent of the resulting material is empty space, this nickel-based metallic wood's density is extremely low in relation to its strength. With a density on par with water's, a brick of the material would float. Mimicry is a similarity of one organism, usually an animal, to another that has evolved because the resemblance is selectively favoured by the behaviour of a shared signal receiver that can respond to both. Mimicry may evolve between different species, or between individuals of the same species. Often, mimicry evolves to protect a species from predators, making it an antipredator adaptation. The resemblances that evolve in mimicry can be in appearance, behaviour, sound or scent. Mimicry may be to the advantage of both organisms that share a resemblance, in which case it is a mutualism, or mimicry can be to the detriment of one, making it parasitic or competitive. Mimesis is the imitative representation of nature and human behavior in art and literature. Any disease that shows symptoms characteristic of another disease. The representation of another person's words in a speech. Craig Venter is an American biotechnologist, biochemist, geneticist, and entrepreneur. He is known for being one of the first to sequence the human genome. Living Machines is form of ecological sewage treatment designed to mimic the cleansing functions of wetlands. Similar to Solar Aquatics Systems, the latest generation of the technology is based on fixed-film ecology and the ecological processes of a natural tidal wetland, one of nature’s most productive ecosystems. The diversity of the ecosystem produced with this approach allows operational advantages over earlier generations of Living Machines and over conventional waste water treatment technologies. Bioadhesive are natural polymeric materials that act as adhesives. The term is sometimes used more loosely to describe a glue formed synthetically from biological monomers such as sugars, or to mean a synthetic material designed to adhere to biological tissue. Nature's Toughest Substances Decoded. Natural composites of nanoscale arrangements of hard platelets connected by soft matrix materials and arranged in overlapping brick-and-mortar, bouligand or other architectures. Engineers develop computer maps to help design shell-like platelet-matrix composites synthetic multifunctional layered composites. Australian Bee hylaeus genus, produces a “cellophane-like” material for its nests that is water-repellent, resistant to flames, high temperatures and strong chemicals and biodegradable. This could help to end the world’s reliance on disposable plastics. A Biotech company in NZ, Humble Bee, is trying to reverse-engineer the material in the hope of mass producing it as an alternative to plastic on a large scale and at a competitive price. Cellulose is mainly used to produce paperboard and paper. Smaller quantities are converted into a wide variety of derivative products such as cellophane and rayon. Conversion of cellulose from energy crops into biofuels such as cellulosic ethanol is under investigation as an alternative fuel source. Cellulose for industrial use is mainly obtained from wood pulp and cotton. Some animals, particularly ruminants and termites, can digest cellulose with the help of symbiotic micro-organisms that live in their guts, such as Trichonympha. In human nutrition, cellulose is a non-digestible constituent of insoluble dietary fiber, acting as a hydrophilic bulking agent for feces and potentially aiding in defecation. Terpene are a large and diverse class of organic compounds, produced by a variety of plants, particularly conifers, and by some insects. They often have a strong odor and may protect the plants that produce them by deterring herbivores and by attracting predators and parasites of herbivores. Although sometimes used interchangeably with "terpenes", terpenoids (or isoprenoids) are modified terpene as they containing additional functional groups, usually oxygen-containing. Terpenes are hydrocarbons. Chitin is a long-chain polymer of an N-acetylglucosamine, a derivative of glucose, and is found in many places throughout the natural world. It is a characteristic component of the cell walls of fungi, the exoskeletons of arthropods such as crustaceans (e.g., crabs, lobsters and shrimps) and insects, the radulae of molluscs, and the beaks and internal shells of cephalopods, including squid and octopuses and on the scales and other soft tissues of fish and lissamphibians. The structure of chitin is comparable to the polysaccharide cellulose, forming crystalline nanofibrils or whiskers. In terms of function, it may be compared to the protein keratin. Chitin has proved versatile for several medicinal, industrial and biotechnological purposes. Chitosan is a replacement for plastics that is 100 percent recyclable. Building Material made from artificial Bone and Eggshell. Emissions caused by air travel are significant, "far more are caused by the production of concrete and steel. Bone is made of roughly half protein and half minerals: the former gives it structural stiffness and hardness, while the latted gives it toughness and resistance to damage. There's also the bonus that bones are able to heal themselves from light damage. New kind of local food grows in your own kitchen: VTT’s CellPod is a home appliance that grows the ingredients for a healthy meal within a week from plant cells is no longer science fiction. "Life is a property of an ensemble of units that share information coded in a physical substrate and which, in the presence of noise, manages to keep its Entropy significantly lower than the maximal Entropy of the ensemble, on timescales exceeding the "Natural" timescale of the decay of the (information-bearing) substrate by many orders of magnitude".
2019-04-21T06:05:02Z
http://www.basicknowledge101.com/subjects/biology.html
B2B Marketing – Future Trends That You Should Know Today! The financial meltdown that we supply just weathered had not been restricted to the UK. It was, without a doubt, global. It highlighted the hazards connected with less-regulated markets, and regulatory responses required. The issues, both local and global are increasingly being addressed with commitments and recommendations from through the industry. The biggest challenge how the industry faces, however, is at trying to develop workable, local solutions which can be every bit as satisfying for your domestic marketplace as to the international one. OTC derivatives and commodity contracts are valuable, and in some instances, necessary risk transfer tools. They allow important innovation in product design, provide for that commencement and evolution of emerging markets and enable customized solutions for your particular hedging needs of the market. For plunge to become successful, it is vital that most participants recognize the role of OTC markets inside global economy – but note the similarities and differences between OTC and exchange-traded markets. Make sure that you decide on a market that you will be familiar with. Most people resulted in mistake of picking markets solely good income that they may generate from that market. For example, a lot of people picked fat loss given that they believe https://www.cs-cart.com/multivendor.html just about everyone is planning to shed pounds. The problem using this method is should you ultimately go with a category or market solely with regards to the amount of money you can create as a result, you often won’t be able to create enough content to start out generating commissions inside the items that you’re promoting. Many years ago it was he he to merely write a short review with regards to a product or service and you may probably start making money, these days since there is a whole lot competition, you need to know everything you are referring to. Attention Kmart Shoppers! The bankrupt discounter is ending its 40-year presence in Houston, closing all 17 area stores and eliminating a huge selection of jobs as the nationwide chain sheds low-performing stores. The giant retailer, formerly one of the better known inside U.S., announced earlier this week it might shutter another 326 stores and lay off 37,000 workers nationwide. It is a classic illustration of a company failing to see the critical need for competitive positioning inside a highly competitive economic environment. Buying and selling goods and services over the Internet depicts a photo perfect method that strengthens B2B marketplaces’ roles since the information created works extremely well in parallel with other people which enable it to be shared with other ventures at the same time. Many organizations can control the reimbursement of e-commerce advertising campaigns. In addition, the strength of business expenditure could skyrocket and turn into un-substantial if it is done properly. The challenge for brand spanking new online marketers is to discover the hot selling products before they begin their strategy. To find the right product, you must figure out how to look at the Gravity index. Every product from ClickBank has its own Gravity score. The index is compiled from multiple factors which indicate the way the strategy is performing. However, the advantages of online marketplaces, especially within advertising, extend beyond the increased variety of creative solutions available. There is ample financial savings associated with conducting a creative pitch online. They represent a really inexpensive strategy to reach new markets and new creative contacts; the travel cost savings also add up significantly. Categories: Uncategorized | Comments Off on B2B Marketing – Future Trends That You Should Know Today! Playing is a universal subject for kids. They consider this to be for their daily job, as soon as they opened their eyes until the time they go to sleep. The significance of playing to youngsters mustn’t be underestimated. It is the central for the a part of becoming an adult. Experts take into consideration that it is important to make certain children play each day. DianaShow Distracted, angry, agitated, cannot control their impulses, bounceable, fearful and tentative. These are usually the litany of adjectives that describe children that have adhd. You may have heard many of these words describe your own child and yet even though adjectives may undeniably fit you are aware that somehow the label isn’t a match on your child. Child Play – The New Generation! So let’s now begin. You’ll need to shuffle when of Wiggles Snap cards and deal out an equal number of cards to every one from the players. Any extra cards after they happen to be dealt to every single player should be put into the middle pile facing up. Each in the player should then put their pile of cards faced down looking at them. 3. Thirdly, we’ve touched on this already, but you must think about the amount of motivation your youngster has for understanding how to learn your guitar. Online lessons typically feel that the student is motivated to find out – they often times contain motivational material to maintain you going during the rough spots, if the inner drive to understand isn’t there, learning in doing this can be hard (instead of having personal lessons using a teacher who’ll prod the little one along!). If you choose online lessons, you may have to part of and encourage your kids to stick while using course when things get tough, as there will not anybody else there for the task. Since it will likely be children which will make use of your new backyard play area, you want to make sure that water doesn’t puddle within the area and that there is plenty of groundcover to keep them from tracking mud inside. Good ground cover in the play area will dress up your yard and invite children to get back to playing quicker after having a storm. Making a replica of the favorite Xbox 360 game is a good decision, since you no longer need to stay with fear that if your preferred disc becomes damaged you have to obtain a new original whenever. If you have a duplicate associated with an original disc you need to use that copy as the original disc is at a good place. In order to be able to use a copy of the original game you should use various ways. Earn to Die Maybe you get some good more motivation knowing that this physical training is also great for the mind. When we imagine brain training, we imagine puzzles maybe, studying, learning something new, but definitely not of the gym. Or bodily exercise whatsoever. Yet such training is great for the mind! Notice that I have said ‘learning toys’, not only ‘toys’. I am suggesting that you have toys which we must classify as learning toys due to the fact some thought continues to be put into their creation. To a certain extent all toys have an educational value, but some are superior to others and therefore may be classed as learning toys. https://apk2game.com/legacy-of-destiny-most-fair-and-romantic-mmorpg.html The first system I got him was an Ion. He would not choose to use the Ion the best way I had thought he’d. The Ion is essentially a process that puts a child amongst people using a camera that puts the look of the child in the game. It also can see the little one’s movements. He did not take pleasure in the games and found it tough to control. For me, I thought this is to get the best because I would not want him to choose to use playing video games. If I were to rate the Ion I would give it 2 away from 5 stars. The reason for 2 stars is because the thought was great as well as the games gave the look of fun. With some work with the system they have the potential to be a really exciting console. Balance Fury is really a physics game that assists kids learn balancing. The object of Balance Fury is to drop numerous blocks as is possible onto a platform in such a way concerning keep them from falling off. Accumetry can be a simple game, but it is best for developing a watch for measurements. In this game players use geometric shapes to try the precision with their eyes without using measuring instruments. A Measure of Treasure can be a game the location where the object is to accurately weigh out gems and distribute them so that each pirate gets his great amount. AtomAtor puts the player in the position of employee at the proton harvesting company whose job it is always to deliver protons with a worm hole while avoiding black holes. Have you ever tried a workout program and discovered which it was just not befitting for the fitness goals that you simply were working toward? There are a lot of different programs that exist so that you can join and try out, but and soon you find the appropriate one you aren’t going to be happy and you aren’t going to get the fantastic results that you are looking for. If you have been struggling to find one which will workout great for you are making sure that you just take enough time to obtain a bit of information on a number of the options that exist so that you will be able to choose one that suits your requirements. To have fun with such games, you simply need to find a proper website, containing many such games. There might be various fun bike games, like dirt bike races, obstacle races, mission completion bike races, motocross and other alike other games. All these games are simulator games, which offer a genuine biking experience. You can have a period of your daily life sitting directly on the couch. Moreover, there is no danger of needing hurt or injured mainly because it will be in Pool Slide Story real life. Some are single player games, whilst the rest could be for 2 or more players giving you the opportunity to enjoy and enjoy yourself with your family and friends. Children too can enjoy these because they are played indoors its keep aren’t chances of getting hurt. Every Christmas you see tempting new games advertised for the television or perhaps in magazines and as you will get older you teach the kids and then grandkids how to play board games simply so you may enjoy them together. This year the top five board games on the market for kids may be a mixture, but all fun. Let’s see what they are: larva heroes game The next of my songwriting games which I use is to formulate a song which revolves a specific lyric. Brainstorm a unique title or lyrical line on your song, then focus on finding a melody to deliver through lyrics through and taking advantage of. Normally I preach music then lyrics, but approaching it from the other way can be a great impetus for your song. Ask an associate to generate and provide you with a line and chain yourself to writing a melody to the line which line only. There are also other popular turn based strategy games including Dragon Ball Z and Legend of Mana. Both of these games have been ported through the earliest gaming consoles approximately https://apk2play.com/sonic-dash.html the most recent ones, with history as being similar to the Final Fantasy franchise. All in all, turn based games that require strategy could be tinkered with similar logic. That is, strengthen your character within your turn while dealing the mandatory damage or doing the mandatory action once you have a chance. Attacking, defending, casting a spell and escaping a few of the common options that could be selected while playing these strategy games that run inside turn basis. This girl game may also be played online. Different websites have flash cooking games. You can pretend that you will be the cook and owner of a burger store and serve your web visitors burgers and drink. The games usually are timed and the orders of your respective customer be determined by whatever they like. You just have to follow the instructions on the website. You can also cook famous foods like spaghetti and feel as if you might be preparing and cooking this meal. You will have to slice and set the constituents inside a cooking ware. A� In most games, plenty of tricks are featured to ensure that players can enjoy each moment of these game. However, most of these threats are certainly not very handy for those who are certainly not very familiar with playing a skating video game. It’s not an awful idea back off from lots of tricks but focused on your accuracy because in the long run, it is a very rewarding strategy. Communities are now joining hands in strengthening efforts in order to save the surroundings. Even those people who are intending to make improvements to their properties are thinking of methods to help you. As a result, more homeowners now opting for double glazed windows to exchange their original documents. With the high environmental scores and rankings these windows are receiving, it is no wonder individuals are finally seeing their worth when it comes to becoming enviromentally friendly. The winter has arrived. Residing in cold climates imply that you have to keep the house stays warm and comfortable over these months. One way to be sure that is actually upvc double glazing your windows. Double glazing is the process whereby a window is really created using two panes of glass developing a space relating to the panes. At least several millimeters of space exists involving the two panes of glass. The space regarding the panes traps the environment thereby forms some sort of insulation. Before sealing the equipment, it needs to be double glazed windows cost in Melbourne, Victoria ensured that you have no moisture involving the panes by sealing it with a drying agent. One thing that must definitely be made certain could possibly be how the glazed unit ought to be airtight. Condensation can be a sure-shot indicator with the presence of moisture within the panes they come in the machine is not airtight. It is very important to choose the right contractor due to this sort of are double glazed windows cannot be repaired; they will be substituted with another one. These types of windows will dramatically lower your energy bill if you are considering installing them. They have been seen to reduce energy bills by twenty percent. It is the gas relating to the glass panes which assists to keep heat indoors while at the same time keeping the freezing, winter air out. The two panes insulate of the question so that it is more difficult for heat to flee. As a means of combating this annoying, on-going dilemma, many individuals have chose things like oil, bar and gas heaters to acquire them with the often unpleasant winter time. Not only are these types of heating expensive, in addition they position the environment at harm through excessive energy consumption. 2. Not all places are available to the installation of UPVC windows. Because of this, you’ll want to consult your homeowners association first if you have planning regulations pertaining this kind of window in the area. There might be certain restrictions in your neighborhood or perhaps your town in case your property is recognized for its architectural merit or if it’s one of several preserved old houses. You can probably appreciate how a PVC window can destroy the design of a well used, wooden house.In signing contracts relating to your double glazed windows, you also need to be conscious that you’ve got rights in doing so. One of the most important is basically that you needs to be given many days to be able to cancel the agreement, especially if you signed it in your own personal residence. You won’t automatically contain the right to cancel your contract for any reason though if you signed the agreement with your fitter’s office, unless they provided a provision for cancellation. It is every inch reality. There are several english to korean translation out there. Therefore, getting the most appropriate one, should be to consider which could provide your business or personal needs in doing what you ought to get from that overall. Hiring a single agency from amid 1000s of choices can be tedious and time-consuming to battle personally. So how does someone attempt to select only one candidate from such a vast amount?Doing business overseas in countries which communicate in the different language can be a challenge. But with the goal to yield great returns and high profits, businesses don’t be afraid to take up this condition. One thing they will must seek out while looking to establish their business inside the international market is to seek the services for document translations. Some people think that it’ is really a simple process involving mere swapping of words in another language. To those whom this method sounds simple, it is important to are aware that plenty of target the details retreats into it. Where is the translation agency or translator based- Majority of big firms can be having multi-cultural personnel speaking various languages. But the main question is where actually it’s based. Many business owners think that it can be good to employ a fair locally based translator. However, if you can get a lots of work, it’s not necassary to mind outsourcing services even from companies running in a few other nation. In fact, the best is usually to consider getting your documents translated by way of a company based inside the foreign country that you wish to expand your business. This would make certain that the translations are as up-to-date and fresh as possible, integrating all modern nuances linked to the language. Are the translators knowledgeable about your industry- It is particularly relevant when the documents that you want to get translated involve an incredible degree of product specific or technical terminology. It’s useless to have literal translations which don’t be the cause of subtleties associated with your company’s message. Though finding professional translators, that are both technically competent at the same time are in your target foreign territory isn’t a simple job, but somewhat more efforts you can definitely find a translation agency with both these features. inside online sense. This is because translating this article of your site into another language could cause your website design to become less capable. This may further potentially impact the web site functionality or maybe your brand promotion. It is important so that you can remain conscious of the fact that certain phrases and words would appear longer after translating. So, be ready to revise the representation of the menu buttons as a way to retain the selling point of your internet site. Effectively talk with your translator- Effective communication between you and the translator would play a pivotal role within the outcome. So, tell the experts know what tone you would like to your translations, and also other crucial requirements. Considering every one of these important pointers would surely enable you to choose the top english to korean translation provider. 1. Where are your translators based? – Many providers claim they can give you the least expensive price for translation company. But perhaps you have stopped to consentrate why? These providers give you such cheap rates as they are outsourcing this work to unqualified individuals who reside in countries where labour is reasonable. As they say, you obtain what you pay for. These translators happen to be unqualified and inexperienced which results in sub-standard work that does not truly reflect the original text. If you require text to get translated into Italian, the translator should be a native speaker. They should either be situated in Italy and still have relevant experience or perhaps be located in Australia and possess Italian as his or her native language. This will help in order that the text reads well within the target language.In fact incorrect technical translations might even pose great threat to human lives, especially to the people who perform various experiments using complex equipments and machinery. Because with the misinterpretation of countless instructions, they might bump into a disastrous accident which may further cause them to lose their hands, feet, fingers and also their life. So, perfect and accurate translations from the complex methodologies and instructions are extremely essential to protect the well-being and lives of workers. And this is the primary reason why services for technical translations are really important. Of course, being a translator also has its downside. One of the biggest challenges in the business is that it can get pretty lonely, particularly when an example may be employed to working with groups of people around. The job also requires intense discipline and good time management skills. As with anyone, who runs their unique business, it can be hard when being self-employed, since nobody tells you how to handle it and there is no set schedule. You also should market yourself, create your schedule and meet deadlines. Keeping yourself motivated could be a challenge, at the same time, so you have to find techniques to help keep you interested all night within this business. A document english to korean translation is really a service that means it is possible to translate documents from one language to a different. Translation has created it possible to get over language barriers during international trade. For exact translation, the english to korean translation chosen needs to be one made up of highly trained translators. In most cases the source language is normally English whilst the target language can be Chinese, Arabic, German, French or Italian among other languages. To be able to sell goods or services to China, business documents ought to be translated to Chinese. China is amongst the biggest consumer markets on the planet. The main language in China is Chinese. The translation company chosen to translate the company documents to Chinese ought to be a business made up of a highly skilled team of translators that have experience with translating business documents to Chinese. Most countries in Asia don’t have English as the national language. Countries in Asia which have a big consumer market, yet they do not use English since the national language, include China, Japan, Malaysia and Indonesia. Most professional translation businesses that translate documents to Chinese may also translate documents to Japanese, Malay and Bahasa Indonesian. The richest market on the planet is the Arab market. Time and again a marketer will discover himself marketing his goods to Arab consumers to be able to be able to make large profits. Arabic could be the main language found in all Arab countries. Arab countries designed to use Arabic as the main language include Egypt, Syria, Yemen, Jordan, Saudi Arabia, Dubai and Qatar. To sell products or services about bat roosting countries, the services of a document english to korean translation https://www.translate-document.com/spanish-translation are needed. The translation company chosen ought to be the one comprised of translators who are able to write and speak fluently in Arabic. The European information mill another market that can’t be ignored. Europe has many of the biggest economies on earth. Germany and France include the two European countries while using largest economies. The national language in Germany and France is just not English. When translating documents to French, the writing conventions of French, French idioms and French grammar must be taken into consideration. A translation company consisting of translators with sound understanding of French needs to be prefered when a defined French translation of the English document is required. To communicate easily using the German speaking world, documents needs to be translated to German by translators developing a good command of German. In today’s world where businesses are forced to sell a few around the entire world in order to make profits there is really a great need to conquer language barriers. Language could be a big barrier when selling goods to consumers who don’t know English. So to sell services and goods to your non-English speaking country, an enterprise will have to translate its documents on the appropriate target language. A document translation company comes into play handy when a precise translation of English documents with other languages is needed. First of all, to everyone individuals non-believers in psychics, we have some news in your case! Whether you choose to truth be told, they are out there. Sure, we will admit to you personally that a few of the individuals out there that claim these are one really aren’t one. However, knowing where you should look and you look hard, then you can certainly locate one that is legit! If you are considering learning a little more about this subject, we are here to assist you. In the paragraphs below, we’re going to show you more to do with the special folks that are classified as psychics. The best way to just as one internet prophet should be to join websites that welcome spiritual advisers. You can learn a tremendous amount by watching spiritual advisers online. When we learn how to do our craft, the spiritual world just actually actually starts to throw open for folks. Most people providing you with psychic readings got their begin from doing readings over the web. They allowed themselves to make available into spirit and then to concentrate on the things they wanted instead of how things were going to lead to favor by themselves. Life can be quite a force that teaches us much more about inside ourselves new ways. Learning to understand our everyday routine is hard because we quite often do not know oranum psychic readings online chat or maybe comprehend what our life is giving to us on a regular basis. Learning to live our everyday life finest reasons will be the surest means of gaining strength into anyone section of us. Love readingshows a variance of features, traits, and attributes like; compatibility, soul mates, love matches, love forecast and future love affairs. Love readings also show the past love relationships, affairs, successes and failures. Through these love readings you should understand your pros and cons that you aren’t even conscious of. It is very easy to pick up someone’s state of mind when they bring emotional topics. In the case of relationship advice, if you aren’t careful it will be easy to see, excitement, desperation, despair, etc. in mere your appearance alone. If you are on the phone it might been seen in the tone of your respective voice or cadence of your speech. Stay in control and become calm, this will aid clear your head and invite you to definitely determine how significant the psychics statements are. 2. Personal websites. Often a talented clairvoyant will begin a psychic blog or possibly a fortune tellers web page to only share their remarkable ability web-sites. It is a good idea because communication online covers a great deal of distance and contains great reach. A quality medium often has people as clients in overseas countries in addition to his own. This is a natural outcome of metaphysical talent. It shines bright yet others need a bit of it. Preparation is the key. If you finally tend to have a very reading, then plan it. Preparing how much cash for paid readings is certainly half the job. You need to ready yourself emotionally and psychologically. Try to think of what things you desire to oranum psychic readings online chat achieve inside the reading. Ask yourself how much you must know. Also, you will have to formulate your possible questions before hand to save lots of money and time. Do not worry if you’re not competent at list many as follow up questions may play an incredible part. Before booking a meeting, you’ll naturally ask the amount the reading costs, but ensure there’s an established timeframe for the price. Prices might be structured with the minute, half hour or hour. Readings sold by the minute will get very expensive– fast. So set the reading for 30 or 60 minutes, and keep to the time. You don’t want to spend valuable appointment time watching time, or be in a situation where your psychic’s focus is on trying to sell you more time. If you’re planning on taking Alaska cruise excursions, then no doubt you’re interested in the amazing scenery about this excursion. The glaciers and clear waters will surely certainly be a breath of oxygen. Most people are not familiar with the wonderful port excursions that you could find with the different stops in your cruise. Alaska cruise excursions are extremely much different from your day-to-day cruise experience. The experience will surely involve being out and going to a large amount of marvelous sights. Do you feel a bit anxiety when you’re conscious of you will have to include an excursion inside your curriculum? Excursions are perfect learning environments for learners of all ages. There is no better experience when compared to the practical application moulin rouge of your organized and well considered excursion. The cementing of information and concepts taught inside learning environment could be re-enforced in a really practical setting when learners experience learning outside of the classroom. I decided on a day pass for your monorail, and also at $9.50AUD, I felt it absolutely was value. The monorail circumvented Darling harbor so it suited my plans for your day. I had the aquarium at heart so I got over monorail at one of several two stops which are available. Either stop was obviously a brief walk to the aquarium. Walking across the bridge towards the aquarium with a beautiful day was obviously a wonderful choice. The harbor would have been a magnificent picture in the early morning. I like to do my driving in the truck. I find that the large sized the car and solid V8 are comforting and cozy during long excursions. Others may be satisfied with a mid sized sedan or perhaps a coupe. But whichever you decide to be your trusty steed, there are some important things you will need to remember if you want your steed to keep off the side with the road. A visit to the Bomas of Kenya is essential on your Nairobi short excursions. With 42 different tribes in the country, Kenya carries a rich culture. It is in the Bomas of Kenya where these tribes show their culture through music, dance, drama, fashion show, poetry and homestead. Learning the culture of one other country may be the only way it is possible to understand and appreciate people of the region when you learn something totally new. All Grand Canyon charter bus and tours pass Hoover Dam, regardless of what rim they’ll. Most coach excursions visit the dam to offer their passengers photo opportunities. But, I’ve been aware of some which simply drive over the new bypass bridge rather than stop at the dam. Well, the dam is amazing and you’ll acquire some spectacular photographs, so grab among the motor coach rv excursions that stops at Hoover Dam. Machine Translation is an additional wonder of recent technology that lets a user translate whatever is necessary with no outside help, inside the comfort of his own home or workplace. All that is needed may be the text as well as the language being translated into and hitting the Translate icon within the toolbar. A large number of languages from all of over the world are a part of most translating services. This title should immediately bring at the least a couple of questions to mind like, “I can barely view the Bible in English, why would I want to go on it to another language?” The reason is preciously that, how a Bible has not been created in English. Sometimes the author’s true intent is not going to translation from norwegian to english encounter clearly inside translation and at in other cases the translation could possibly be in basic terms wrong. I’ll make available to you quality installments of might enter into more detail for your dependence on using scriptures back simply a moment. With the world shrinking a lot more business are expanding past traditional borders into unchartered territory, ready to grow and be worldwide competitors. But how can you expand internationally? There are a lot of factors that go into expansion but one of the first stuff you should look into is language translation. Breaking into the international markets often leads service repair shop towards increased profitability and growth more rapidly compared to domestic market. Translation services can extend great help here as a lot of the businesses must present their websites not just in an international language but also in many other languages. The online language translation services will come handy in these cases. Online services for translation can also be found now-a-days, and they have some important advantages also. You can submit your technical documents and other documents through E-Mail and have the translated paper from the E-Mail also. You will pay them through their banks. You can translate your papers in a very cheap rate by these online services. You would be delighted to understand that investing on saws will provide you with the posh of translating pages and pages of PDF files into other languages with just one or two clicks of the mouse. This will make the task of translation much easier, in your case wouldn’t even must separate the consumer pages while using texts that you want to improve. This allows you the luxurious of employing PDF files get the job done information they might https://www.translate-document.com/dutch-translation have are coded in a language that you just cannot understand. You would be effective at fully utilize each of the eBooks which you need without needing to hire a professional translator. To sum it up, online translators will help you learn a new language by typing word after word or perhaps a whole sentence towards the translation box. Translated words may be used to allow you to get more info vocabulary, to understand the speaker from the target language which you are talking or communicating with, to comprehend a song, a poem or even an article, and look at the pronunciation of a word. Online translation makes it possible to can remember the words when you will discover both your language and the target language as well. With the way you are making use of it, you may recall the words with respect to the power of your heartaches if you were looking to get the meaning in the word or words with the target language. Your knowledge of the new language will probably be enhanced when you utilize words you learned from online translation either by chatting, by conversing one on one with native speakers for these language or by singing songs within your target language. Visit a casino and you will probably know a great deal in regards to the arena of poker. It is not just a game of cards with few bets or showdowns. It is in addition to that. Besides certain rules in the game you must master. You also need to know a great deal of psychology that goes behind the sport. The tactical side of the poker game and also the statistics can be simply understood. What is the difference between a true poker player. He extends to know regarding the psychology from the game. Poker players are their very best friends for the poker table, but certain times they turn into their biggest enemies. A variety of inner reasons may be responsible for that. Besides the action tactics- furthermore important- the attitude, discipline, comprehensive thinking, game planning etc. Casino Action contains around 439 games to select from. The three hottest one of them are Mermaids Million, Big Top and French Roulette. Mermaids Million resembles the “Tomb Raider”-video slots game as seen on other casino websites and provide you multiple possibilities to win the jackpot. The Big Top game creates the circus atmosphere and betting starts here with a small amount of ten cents per spin. French Roulette resembles the roulette table in Las Vegas. The game has among the better graphics as well as touch of sophistication causes it to be a little bit of a popular one of many casino players. The game has around 16 progressive-jackpot games that include table games, slots and cards.All players must gamble at casinos that are licensed. Legitimate licensing authorities accomplish research inside the operators’ power to conduct online casinos, particularly regarding their past experience and financial strengths. Guaranteeing the administration systems within the casinos develop the required controls for your players getting their dues soon enough is truly one of their chief duties. Furthermore, they attest what sort of software combined with the games are fair. It is only then they can issue licenses on the operators. Usually the license info is overtly displayed on the casino bonus codes no deposit on the internet sites with the online casinos. The very best casinos exceed what’s mandated within the license terms. The games are tested frequently for fairness and average payouts by independent experts as well as the reports are displayed with the websites inside the online casinos. Considering online casinos tend not to cope with an item but a site, there aren’t any products to ship towards the customer, merely a transfer of funds which may be done by way of a bank of your liking. Add this for the fact that customers can play their favorite games in the comfort of their computer chairs and you’ve got a goldmine. Ideal casino is just one of many that offer internet users the opportunity to use on their preferred table without actually traveling to an actual casino. Because they’ll use a software platform not employed by thousands of other online casinos, you’ll be able to find out a number of new and exclusive slots, video poker and casino games. They have a large various games, including a selection of blackjack and roulette options. When it comes to their slots games they have everything from classic slots games to 3D video slots. If you prefer gambling, you shouldn’t have of traveling numerous miles to secure a hall to have as is possible try a web-based casino where you could have the same experience only now you could utilizing a PC such as connection to the internet. This means that you end up picking the venue that you might want to see in. This allows you to concentrate https://bonus.express/free-casino-games/novomatic/ many you could be better hanging around. There are lots of websites in places you can get to play the games you choose. All you have to do is find the one that you want.
2019-04-25T13:01:52Z
http://mcgatgjer.oaknash.ch/?cat=1
A monad can be defined with help of two functions, one of which is higher-order. Direct working with them is tedious and error-prone. In this article I’ll describe an approach that greatly simplifies the use of monads in Common Lisp. It is possible due to macros. This definition actually allows the programmer to use common names return and (>>=) for very different functions. I’ll try to create similar Lisp macros that will be common for all monads. Also Haskell provides a useful do-notation which is a syntactic sugar for monads. The macros I will create will provide similar facilities as well. Also I created a new project with name cl-monad-macros. It is available by the following link: http://common-lisp.net/project/cl-monad-macros. The corresponded package contains definitions of all monad macros described in this article. The UNITF function is the return function. Function FUNCALLF is an analog of the idiomatic bind function but only the order of arguments is opposite. Further I call namely this new function a bind function. Please take care. We could limit ourselves to using only these functions, but it would be tedious. Please take into account that the first argument of the bind function must be a function, most probably an anonymous function. Moreover, we can use a sequence of monad values in one computation, which complicates the matter significantly. The UNIT macro is equivalent to a call of the return function. The FUNCALL! macro is expanded to a call of the bind function. Macro PROGN! is equivalent to the monadic then function, which is denoted in Haskell as (>>). It allows the programmer to create a sequence of computations. Internally, it is based on more primitive FUNCALL! macro. Here #:gen-var means an automatically generated unique variable name with help of GENSYM. Macro LET! is somewhere an alternative to the arrow symbol from the do-notation of Haskell. It is also based on the FUNCALL! macro. It binds computations e1, e2, …, en with values x1, x2, …, xn, which can be then used in computation m. ;; Here we can use UNIT, FUNCALL!, PROGN! and LET! The first sub-parameter return-func defines a name of the return function. The second sub-parameter funcall-func defines a name of the bind function. This macro is expanded to a MACROLET saving the same body. Here the GENERIC-LET! macro is used to process the LET! expression in accordance with the stated above definition. The PROGN! expression is processed already by the GENERIC-PROGN! helper macro. The expanded code is generic enough. Actually, macro WITH-MONAD satisfies some abstract contract providing definitions for macros UNIT, FUNCALL!, PROGN! and LET!. As we’ll see later, there are other specialized macros that are like WITH-MONAD and that satisfy the same contract but generate a more efficient code for their monads. Moreover, in case of the monad transformers new macros are necessary. It’s important that macros like WITH-MONAD can be nested, which allows the programmer to work with different monads in the same s-expression. Each new application of the WITH-MONAD macro shadows the previous definition of macros UNIT, FUNCALL!, PROGN! and LET!. It means that at any moment only one monad can be active. where UNITF and FUNCALLF were used as an example. In the rest of the article you’ll see a lot of definitions of the LET! and PROGN! macros. Actually, all them can be reduced to the following two macros that will work with any monad. (let ((k #’(lambda (x) m))) ; save the first argument of FUNCALL! (let ((a (f e))) ; use the second argument of FUNCALL! Please note that there would be no such problem if the FUNCALL! macro had another order of parameters, i.e. an idiomatic order as in Haskell. Then FUNCALL and LAMBDA would alternate with each other directly in the code and the compiler most probably could reduce them. But I think that a similarity with the standard FUNCALL function is more important and I’m ready to provide optimized versions of the LET! and PROGN! macros whenever it makes sense. The Identity monad is the simplest case. The return function is IDENTITY. The bind function is FUNCALL. Then UNIT macro becomes an acronym of the IDENTITY function, FUNCALL! becomes the ordinary FUNCALL, PROGRN! is equivalent to PROGN, but LET! is transformed to LET*. This coincidence in names can be considered as a rule of thumb. Only the LET! macro is a small exception. Remembering about this monad, it is easy to memorize names FUNCALL!, PROGN! and LET!. This section is devoted to the List monad. I’ll introduce macro WITH-LIST-MONAD that will implement a contract of the WITH-MONAD macro but that will do it in its own optimized way. Please note that NIL is also a value of the list monad. We’ll use this fact further. Here is a definition of the PROGN! macro prototype. At each reduction step we introduce a loop that appends the second argument as many times as the length of the first list. If the first list is NIL then the result of the loop is NIL as well. The LET! macro prototype can be implemented similarly and also without use of the lambda. Here we replace each variable binding with the corresponded loop. It should generate an efficient enough code. Macros UNIT, FUNCALL!, PROGN! and LET! actually are defined in a MACROLET implemented by the WITH-LIST-MONAD macro. Please note that here we use the fact that NIL is a legal value of the List monad. Therefore we can omit the else-part of the IF operator. Moreover, if numbers were an empty list then the topmost loop would immediately return NIL. Also we can define the following function perms that produces a list of permutations of a given list. The next monad is the Maybe monad. It allows efficiently stopping a complex sequence of computations right after discovering a failure. If there is no failure then a full chain of computations is performed. The constructor, getters and predicates for this data type are defined below. The prototypes of the basic return and bind macros can be defined in the following way. The key point is the IF expression that cuts the further computation if the result of the former one is NIL. Based on these macros we can build their counterpart PROGN!. The LET! macro is similar but it allows the programmer to bind variables within one computation. In the three cases we see the cutting IF expressions. They stop immediately the computation right after discovering a failure. Actually, these last four macros are implemented as a MACROLET defined by macro WITH-MAYBE-MONAD. As always, we could implement the latter with help of generic macro WITH-MONAD providing the necessary return and bind functions which are trivial for this monad. But macro WITH-MAYBE-MONAD is much more efficient. Moreover, SBCL will warn about an unreachable code during compilation if we’ll try to define such a function! In accordance with this definition I’ll create a monad macro WITH-READER-MONAD. The UNIT macro prototype is simple enough. The FUNCALL! macro prototype is crucial for understanding the monad macro. There is a subtle thing. Parameter k is evaluated inside the anonymous function returned. In other words, its evaluation is delayed. I think that the user will expect namely such a behavior. Moreover, it allows the Lisp compiler to optimize the code in case of the PROGN! and LET! macros as it will be shown. The LET! macro prototype is more efficient than FUNCALL! as one of the FUNCALLs becomes unnecessary. Here like expression e expression m is evaluated inside FUNCALL. It’s also a monad value, i.e. an anonymous function. If we’ll create a LET! expression with many variable bindings then the s-expression of m will be accessible during the macro expansion for all bindings but probably the last. It will allow the Lisp compiler to optimize the LET! expression essentially. We’ll see an example in the end of this section. The PROGN! macro prototype is more simple as we don’t bind variables. Again, if the s-expression for m1 and m2 will be accessible then the Lisp compiler will have good chances to generate a more optimal code. The Reader monad was created for one purpose – to pass some value through all the computations. Let it be macro READ! that gets this value and puts in the monad. It corresponds to the read value defined above in Haskell. The macro prototype is as follows. A computation in the Reader monad must be started somewhere. We take some value and pass it to the computation. This monad computation is passed in the first parameter. The environment value is passed in the second parameter. The corresponded macro has name RUN! and its prototype is defined below. The value returned is a result of the monad computation. Macros READ!, RUN!, UNIT, FUNCALL!, PROGN! and LET! are implemented as a MACROLET defined by the WITH-READER-MONAD macro. and look at the result of the macro expansion. We can see that there are many LAMBDAs and FUNCALLs bound together. A good Lisp compiler must generate a rather efficient code. and this is its output. The State monad allows us to manage some state during a computation. We can put a new value or request for the current value of the state. I’ll use the next definition written in Haskell. I’ll create the corresponded monad macro WITH-STATE-MONAD. It will define macros GET!, PUT! and RUN! as a part of its MACROLET definition. The GET! macro will correspond to the get function. The PUT! macro will be an analog of the put function. The RUN! macro will play a role of the runState function. First of all, I define utility macros. The UNIT macro prototype is simple. Please note that we evaluate a inside LAMBDA, i.e. the evaluation is delayed until the anonymous function is called. I’ll apply this strategy to all macros for this monad. In other words, any computation in this monad does nothing until it is explicitly started with help of macro RUN!, which will be defined further. By the way, the same strategy was true for the Reader monad. The FUNCALL! macro prototype follows the definition of the bind function. All notes that I did for the FUNCALL! macro of the Reader monad are applicable here. Being a monad value, expression m is actually an anonymous function. If its s-expression is available at the time of macro expansion then the corresponded FUNCALL and LAMBDA can be reduced by the smart compiler. The LET! macro prototype generates a more optimal code than FUNCALL!. If we create a multi-level LET! expression then m will be expanded to the LAMBDA expression in all cases but probably the last. It will allow the Lisp compiler to optimize the expanded code as you will see later in the example. The PROGN! macro prototype is more simple. To start a computation in the State monad, we can use the RUN! macro which accepts two arguments. The first argument specifies the computation. The second argument is an initial state. The RUN! macro returns a list of two values. The first value is the result of the computation itself. The second value of this list is a final state. To manage the state during the computation, we can use macros GET! and PUT!. The GET! macro returns the current state wrapped in the monad. The PUT! macro allows setting a new value for the state. This value is passed as a parameter. The macro returns NIL wrapped in the monad. Macros RUN!, GET!, PUT!, UNIT, FUNCALL!, LET! and PROGN! are implemented as a MACROLET defined by the WITH-STATE-MONAD macro. We can note that many LAMBDAs and FUNCALLs can be reduced. The bigger is our source expression, the more such constructs can the compiler reduce. The code should be rather cheap. The next test enumerates items of the tree and creates a new tree, where each item is replaced with the CONS-pair consisting of the item itself and its sequence number. Now we can launch a test. This section describes the Writer monad. This monad allows writing a log during the computation. Then this log can be requested along with the computed result. I will use the following definition written in Haskell. Actually, I will use a more efficient representation of the functions. We can note that the return function uses id, but the bind function always creates a composition of two functions (f . f’). This is unnecessary. In Common Lisp we can use NIL to denote the identity function. It will be a detail of the implementation about which the user may not know. But this approach can help the compiler to generate a more efficient code in cases if the write and writeList functions are called rarely, i.e. when f’ is just the id function. The next macro creates a composition of the two specified nullable functions, where NIL means the IDENTITY function. Let our monad macro will have name WITH-READER-MONAD and will define three additional macros WRITE!, WRITE-LIST! and RUN!. The first two will be analogs of the write and writeList functions respectively and they will be used for writing a log. The RUN! macro will be an analog of the runWriter function and will be used for running a computation. The RUN! macro will return a list of two values. The first value will be a result of the computation itself. The second value will be a log written during the computation. The WRITE! macro saves the specified values in the log. It returns NIL wrapped in the monad like that how the write function returns Writer w (). Its prototype is as follows. Please note that we don’t add new records. We return a function that knows how to add them. This a very efficient technique. Please compare with the shows function from Haskell. The WRITE-LIST! macro prototype takes the value lists and saves their values in the log. The macro returns NIL in the monad as well. The RUN! macro accepts one argument, a monad computation. It returns a list consisting of the computed value and a log written during this computation. The prototype is defined below. Here we take into account that the log function can be actually represented by value NIL. In such a case we return an empty list as a result log. If the function is defined then we ask it to create a log based on the initial empty log. It works fast, although the log is constructed starting from the end. Also we can see a weakness of the method. If macros WRITE! and WRITE-LIST! were too often called then we would have a compound function consisting of a lot of nested functions. It might lead to the stack overflow. Be careful! We consider NIL as an optimized representation of the IDENTITY function. The UNIT macro prototype uses this fact as the log remains unmodified. The FUNCALL! macro is more complicated. As usual, based on this macro we can write a more optimal definition of the LET! macro prototype which has no FUNCALL at all. (,ms ,m)) ; depends on x! The PROGN! macro prototype is even more simple as there is no variable binding. But we have to compose the log functions, though. Macros WRITE!, WRITE-LIST!, RUN!, UNIT, FUNCALL!, PROGN! and LET! are implemented as a MACROLET defined by macro WITH-WRITER-MONAD. and look at its macro expansion. Although the expanded code looks long, it’s straightforward enough. It mainly consists of the IF conditions and creations of the short-living CONS-pairs at each step. The anonymous functions are created only in case of need. The compiled code should be rather cheap. Moreover, it can be efficient if the compiler can optimize the short-living CONS-pairs. The next example illustrates the use of the WITH-WRITER-MONAD macro. It’s possible to create a macro analog of the monad transformer in Common Lisp. Such a macro must be parameterized and it must define macro LIFT! that has the same meaning as the lift function in Haskell. In the next sections are defined macros WITH-READER-MONAD-TRANS, WITH-WRITER-MONAD-TRANS and WITH-STATE-MONAD-TRANS. They are examples of the monad transformer macros. Each of them accepts the first parameter which must be a name of some monad macro in parentheses. For this case we can create a separate monad macro and define the WRITE! macro on more high level using LIFT! The monad transformer macros can be nested. The LIFT! macro must know a name of the inner monad macro to call the corresponded inner return and bind functions. This is a crucial point. It is applied to macros UNIT, FUNCALL!, PROGN! and LET! as well. In the next sections you will see how the monad transformer macros can be implemented. All examples follow a common pattern. ;; Definitions of UNIT, FUNCALL!, PROGN!, LET! Note how the definition of WITH-SOME-MONAD-TRANS recursively refers to itself. It is important. WITH-MONAD-TRANS s a utility macro that allows the monad transformer implementer to use two auxiliary macros WITH-INNER-MONAD-TRANS and WITH-OUTER-MONAD-TRANS in accordance with the following scheme. ;; Here the WITH-INNER-MONAD macro is active, i.e. Here the WITH-INNER-MONAD-TRANS macro must precede the WITH-OUTER-MONAD-TRANS macro. UNIQUE-ID is some unique identifier which must be different for each occurrence. Usually, it is a generated value with help of function GENSYM. This scheme allows the implementer to switch between the outer and inner monad macros. The WITH-MONAD-TRANS macro has the following definition. Please note that an implementation of the WITH-OUTER-MONAD-TRANS macro is common and doesn’t depend on additional parameters, which allows us to switch to the outer monad even if case of the deep nested calls of WITH-MONAD-TRANS. The WITH-OUTER-MONAD-TRANS macro is expanded to a call of the macro represented by parameter id. The last macro must be already created by WITH-INNER-MONAD-PROTOTYPE before the inner monad macro is activated - this is why an order of precedence is important. The key point is that the WITH-INNER-MONAD-PROTOTYPE macro, i.e. WITH-INNER-MONAD-TRANS, creates a new macro that is expanded already to the outer monad macro, which name was passed as a parameter of WITH-MONAD-TRANS if you remember. The name of this new generated macro is defined by the value of parameter id. But WITH-OUTER-MONAD-TRANS macro has a common implementation and it is always expanded namely to that new macro, which is expanded in its turn to the outer monad macro regardless of that how deeply the WITH-MONAD-TRANS macros are nested, for the value of the id parameter is supposed to be unique. It’s worthy to note that if the monad macros consist of MACROLETs then macros WITH-MONAD-TRANS, WITH-INNER-MONAD-TRANS and WITH-OUTER-MONAD-TRANS add nothing but MACROLETs to the expanded code. Such a code should be rather efficient. All monad macros described in this article consist of MACROLETs only. It should be a general rule. Nevertheless, in practice the Lisp compilers cannot process complex expressions, where the nested monad transformer macros are directly applied, although the simplest expressions are still compilable. There is a simple workaround for this problem. The approach is described in section Reducing Monad Macros. In absence of the type classes in the language we have to distinguish somehow the operations performed in the inner and outer monads if we speak about the monad transformers. Now I will introduce prototypes for macros INNER-UNIT, INNER-FUNCALL!, INNER-LET! and INNER-PROGN! that will be counterparts to macros UNIT, FUNCALL!, LET! and PROGN!. Only the first macros call the corresponded operations in the inner monad with one important exception. Their parameters are always evaluated lexically within the outer monad. It allows us to safely call these macros within the outer monad macro. So, the INNER-UNIT macro prototype is as follows. Please note that expression a is evaluated within the outer monad. It will be a general rule. The INNER-FUNCALL! macro prototype is similar. The INNER-LET! macro prototype is analogous. Please note how carefully we restore the outer monad lexical context. It’s very important. As we already discussed, it has no performance penalty for the generated code, although it creates a high load for the compiler because of numerous MACROLETs that are generated during the macro expansion. The INNER-PROGN! macro prototype is more optimal. Macros INNER-UNIT, INNER-FUNCALL!, INNER-LET! and INNER-PROGN! are implemented as a part of the MACROLET construct defined by macro WITH-MONAD-TRANS. In most cases these new macros INNER-UNIT, UNNER-FUNCALL!, INNER-LET! and INNER-PROGN! cover all the needs and make low level macros WITH-INNER-MONAD-TRANS and WITH-OUTER-MONAD-TRANS unnecessary for the practical use in your code. The Reader monad transformer is a parameterized version of the Reader monad but which can also act as the monad specified in the parameter. This is a very powerful abstraction. For example, we can combine the Reader monad transformer with the Writer monad. Then we can write a log and read an external value passed to the computation at the same time. In Haskell the Reader monad transformer can be defined in the following way. Please note that the return and bind functions are mixed. Some of them are related to the ReaderTrans monad itself. Others are related already to the parameter monad m. It says that we need helper macros INNER-UNIT, INNER-FUNCALL!, INNER-LET! and INNER-PROGN! introduced above. I’ll define macro WITH-READER-MONAD-TRANS based on the WITH-MONAD-TRANS macro. Therefore the specified helper macros will be accessible. The UNIT macro prototype uses INNER-UNIT. Please note that expression a is evaluated in the context of the WITH-READER-MONAD-TRANS macro, not in the context of the inner monad. It will be true for all next definitions as well. The FUNCALL! macro prototype is also similar to its non-parameterized version. It corresponds to the definition written in Haskell. Only the order of parameters is different. Also all notes that I did for the non-parameterized version remain true. The generated code can be optimized by the compiler under some circumstances. As before, the LET! macro prototype is more efficient. We only replaced LET with INNER-LET! to take a value from the inner computation. The PROGN! macro prototype uses INNER-PROGN! to bind the inner computations. Being applied in complex nested expressions, all macros are expanded to a code that can be efficiently optimized by the compiler because of LAMBDAs and FUNCALLs that alternate with each other. The READ! macro prototype uses already the INNER-UNIT macro to wrap the environment value in the inner monad. The RUN! macro prototype is the same, but now it returns a computation result wrapped in the inner monad. So far, the macros defined replicate the interface of the WITH-READER-MONAD macro. Now I’ll define the LIFT! macro that will allow us to perform any computation in the inner monad. This is namely that thing that allows the parameterized monad transformer to act as a monad specified in its parameter. Macros LIFT!, READ!, UNIT, FUNCALL!, LET! and PROGN! are implemented as a MACROLET defined by the WITH-READER-MONAD-TRANS macro, which in its turn follows a common pattern described in section Monad Transformers. Now the monad macro generates much code. Even after removing the MACROLETs that mean nothing for the execution time but that may slow down the compilation process, the macro expansion may be still long depending on the specified inner monad. Therefore I will use a simpler example to illustrate the code generation. Here is a test of the monad macro. The State monad transformer is a parameterized version of the State monad but which can also behave like a monad specified in the parameter. For example, we can create a version of the State monad transformer parameterized by the Writer monad. Then we can manage the state and write a log during the computation simultaneously. I’ll use the following definition of the State monad transformer written in Haskell. We see that the return and bind functions are mixed as it was in case of the Reader monad transformer. Some functions correspond to the StateTrans monad. Others correspond to the inner monad m. Hence we need macros INNER-UNIT, INNER-FUNCALL!, INNER-LET! and INNER-PROGN! provided by the WITH-MONAD-TRANS macro. I’ll define a new macro WITH-STATE-MONAD-TRANS based on WITH-MONAD-TRANS in accordance with the general pattern described in section Monad Transformers. Also the new macro will be similar to its non-parameterized counterpart WITH-STATE-MONAD. The WITH-STATE-MONAD-TRANS macro will define macros GET!, PUT! and RUN!. Only the latter will return a value wrapped in the inner monad. The UNIT macro prototype is similar but it uses INNER-UNIT to wrap a pair in the inner monad. As before, expression a is evaluated inside LAMBDA, i.e. the evaluation is delayed. This strategy will be applied to all other macros defined further. The FUNCALL! macro prototype is similar too, but now it uses INNER-LET! to get a raw value from the inner monad. The notes that I did earlier for the State monad are applicable now as well. Expression m is used as the first argument of the FUNCALL function. This expression is a monad value, i.e. an anonymous function. If the s-expression for m is available then m will be expanded to the LAMBDA expression. These LAMBDA and FUNCALL can be reduced by the smart compiler. As usual, the LET! macro prototype generates a more efficient code than FUNCALL!. Here expressions e and m are monad values, i.e. anonymous functions. Moreover, if we create a multi-level LET! expression then the s-expression for m is available for all cases but probably the last. This s-expression is started with LAMBDA. Therefore LAMBDAs and FUNCALLs can be reduced by the compiler too. The PROGN! macro prototype doesn’t bind variables but it passes the state through the computation like the previous macros. The RUN! macro launches a computation specified in the first parameter. The second parameter defines an initial state. The macro returns a list wrapped in the inner monad. The first value of the list is a result of the computation itself. The second value is a final state. The GET! macro prototype returns the current state wrapped in the outer monad. The PUT! macro prototype has one parameter that specifies a new value for the state. It allows us to modify the state. The new value will be then passed to the rest part of the computation. The macro returns NIL wrapped in the outer monad. The LIFT! macro endows the parameterized monad transformer with an ability to act as a monad specified in the parameter. The macro accepts any computation in the inner monad. This inner computation becomes a part of the outer computation. Macros GET!, PUT!, RUN!, LIFT!, UNIT, FUNCALL!, LET! and PROGN! are implemented as a MACROLET defined by the WITH-STATE-MONAD-TRANS macro that follows a common pattern of the monad transformer macros. The code generation can be illustrated on the following example. The next test enumerates all items of the tree. It creates a new tree, where each item is replaced with a CONS-pair, consisting of the item itself and its sequence number. Also the test function saves all enumerated items in the list and shows it as a log. The Writer monad transformer is a parameterized version of the Writer monad but which can also act as a monad specified in the parameter. For example, we can parameterize this transformer by the Maybe monad. As a result, we’ll receive a new monad that will allow us to write a log and cut all computations immediately in case of need. I will use the next definition written in Haskell. As in case of the Reader monad transformer we can see a lot of the mixed functions return and bind. Some of them are related to WriterTrans. Others are related to monad m. Therefore we need again the WITH-MONAD-TRANS macro that contains definitions of INNER-UNIT, INNER-LET!, INNER-FUNCALL! and INNER-PROGN! that allow us to work with the parameter monad. So, I’ll define macro WITH-WRITER-MONAD-TRANS that will be based on the WITH-MONAD-TRANS macro in accordance with the general pattern described in section Monad Transformers. This new macro will be similar to the WITH-WRITER-MONAD macro. It will be only parameterized and it will also contain macro LIFT!, an analog of the lift function from Haskell. The WRITE! macro uses now the INNER-UNIT macro as we have to wrap a CONS-pair created with help of MAKE-WRITER. The WRITE-LIST! macro prototype is similar. It also returns NIL in the outer monad. Please note that in the both macros we evaluate the values ws and wss first and then return new functions. The real writing operation will be delayed. Now the RUN! macro returns a list of two values, where the list is wrapped in the inner monad. The first value of the list is a result of the computation. The second value is a log written during this computation. The UNIT macro prototype also uses the INNER-UNIT macro to wrap a value in the inner monad. Please note that expression a is expanded within the outer monad macro, i.e. within WITH-WRITER-MONAD-TRANS, for which the INNER-UNIT macro is responsible. The FUNCALL! macro prototype is also similar to its non-parameterized counterpart. As usual, the LET! macro prototype is more optimal. The PROGN! macro prototype was also slightly modified. As in case of the Reader monad transformer macro we can define the LIFT! macro that will allow us to perform any computation in the inner monad. This is that thing that allows the parameterized monad transformer to act as a monad specified in its parameter. Macros LIFT!, WRITE!, WRITE-LIST!, UNIT, FUNCALL!, LET! and PROGN! are implemented as a MACROLET defined by macro WITH-WRITER-MONAD-TRANS, which in its turn follows a common pattern of the monad transformer macros. This monad macro generates a lot of MACROLETs. They don’t impact the performance of the executed code, although the compilation becomes a more difficult task for the Lisp system. If you’ll try to compile it with help of SBCL, then the compiler will warn about an unreachable code! This is an output of the test. The ordinary monad macros are expanded to a construct that contains a single MACROLET. Therefore the expressions that use these monad macros are compiled fast. The monad macros built on the monad transformers are not that case. They are expanded already to a construct that may contain a lot of nested MACROLETs. It becomes a real problem for the Lisp compiler. Not any expression consisting of the nested monad transformer macros can be even compiled! Below is described an approach that allows the Lisp system to compile monad transformer macros of any complexity and to do it relatively fast. The main idea is to replace the macros with functions. The drawback of this method is that an executable code becomes a little bit slower than it could be in case of the pure macro expansion. I’ll illustrate the method on the parameterized twice macro WITH-WRITER-MONAD-TRANS (WITH-READER-MONAD-TRANS (WITH-MAYBE-MONAD)). First, we create a short name for our source macro, lifting the READ! macro from the Writer monad transformer. This new macro provides macros READ!, WRITE!, WRITER-LIST!, RUN!, LIFT!, UNIT, FUNCALL!, LET! and PROGN!. Now we’ll create functions for them, i.e. all macros will be expanded only once. In the last function we create a sequence of the computations and always return NIL wrapped in the monad. The top level RUN! macro returns a list wrapped in the inner monad WITH-READER-MONAD-TRANS (WITH-MAYBE-MONAD). This list contains two values. The first is a result of the computation. The second value is a log written during this computation. The inner RUN! macro returns already a value in the Maybe monad. Therefore we can unite two RUN! macros and return the list of two values in the Maybe monad. We also have two LIFT! macros. We can unite them too. We pass some computation in the Maybe monad, for example, a value created with help of the MAKE-MAYBE function, and the new function returns the corresponded computation wrapped in the outer monad WITH-OPT-PROTO. Now we can define the return and bind functions. We have all functions to define a new monad macro with help of the WITH-MONAD macro. I’ll call this new monad macro a reduction form of the source macro. It contains only two nested MACROLETs, which makes the code with the new macro easily compilable regardless of that how complex are the expressions built with help of macros UNIT, FUNCALL!, LET! and PROGN!. In difficult cases the reduction can be applied many times. For example, to receive a monad macro with the same behavior, we could first reduce macro WITH-READER-MONAD-TRANS (WITH-MAYBE-MONAD) to new macro WITH-READER-MAYBE-MONAD. Then we could reduce macro WITH-WRITER-MONAD-TRANS (WITH-READER-MAYBE-MONAD) to form WITH-ALTOPT-MONAD, which would be equivalent to the WITH-OPT-MONAD macro. Only the more reduction steps we apply the less efficient code is generated by the compiler. But sometimes the reduction is a single possible way to make the code compilable. This is a small test with the new monad. The test returns the following results. The monad macros can perfectly coexist with the standard constructions IF, COND, PROGN, LET, LET*, FLET, LABELS, MACROLET, SYMBOL-MACROLET, LAMBDA, FUNCALL, DESTRUCTURING -BIND and some others in one expression. On the contrary, the standard loop macros DO, DOLIST, DOTIMES and LOOP are not so simple. If we perform monad computations in some loop then, generally speaking, we have to connect all the intermediate monad computations into one with help of something like the PROGN! macro. This is a key point. I won’t dwell on this subject, but I want to say that some monad macros could be implemented as a MACROLET defining macros DO!, DOLIST! and DOTIMES! that would be monadic counterparts to the standard loop macros. Here we would probably have to add some monad representation of an empty loop, i.e. an empty monad computation. It could be a macro named ZERO!, for example. Also I think that the LOOP macro is more difficult case and I’m not sure that a monadic counterpart can be created for it. In Haskell we can define a small set of polymorphic functions that will work with any monad. Here in Common Lisp we can partially implement the same idea but in another way. Taking into account that the number of such common functions is relatively small and they are usually simple, we can try to implement them with help of a MACROLET that would be supplied together with the monad macro like WITH-MONAD. In general case we can define a prototype for the functor map function, which I’ll call FMAP. It’s easy to provide each monad macro with its own optimized version of the FMAP macro. Moreover, such a technique has no almost performance overhead. In case of the WITH-IDENTITY-MONAD macro the LIST! macro can be replaced with function LIST, which corresponds to the rule of thumb. I tried to introduce the monads in the Lisp Way. I know that there were other attempts. They are mainly based on using generic functions that allow the programmer to write a polymorphic code but at the cost of some lost of the performance. My approach, on the contrary, allows the Lisp compiler to generate an efficient code but it lacks some flexibility. Also I think that my approach is somewhere similar to the F# workflows. Only the monad macros play a role of the workflow builders.
2019-04-18T19:36:40Z
https://common-lisp.net/project/cl-monad-macros/monad-macros.htm
This is the conclusion of my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. You can also download a PDF version here. As we have seen, although the official Manhua Society ended about a year after it began in late 1926, many of the members remained close, and throughout the late 1920s and early 1930s they pooled their resources to fund several short-lived manhua periodicals for which they solicited submissions from amateur and professional artists alike, becoming not only editors, but also gatekeepers, teachers, and patrons for generation of cartoonists which followed, a somewhat ironic role given their relatively humble origins (with the exception of Wang Dunqing). Employed primarily in the advertising and fashion industries, members responded to the worsening of the conflict with Japan by becoming increasingly political and in their manhua periodicals, one can see a marked shift from boys’ humor and light political satire into outright propaganda. Their example demonstrates that the link between art, commerce and politics in the 1920s and 1930s in Shanghai was a fluid one, with few hard and fast boundaries. English-language historians of modern Chinese visual culture such as Julia Andrews, Adam Cathcart, John Lent, Ellen Johnston Laing, Paul Pickowicz, Kuiyi Shen and others have examined the careers of various manhua artists. Many more scholars have used manhua illustrations to demonstrate the development of the public sphere in Republican China. Other scholars have looked at the political and literary groups of the time, building on the work of Michel Hockx and Kirk Denton. John A. Crespi, meanwhile, has published an illustrated introduction to the important manhua periodical Modern Sketch and is in the process of completing a study of selected Chinese pictorial satire magazines from the late 1910s to the 1950s. Likewise, Jonathan Hutt has written at length on the life and times of Shao Xunmei, touching upon Modern Press, and more recently, Paul Bevan has published an important monograph which places Shao Xunmei and the members of the Manhua Society and their later collaborators within the global discourse of modern art. While I have relied on their work to varying degrees in the course of my research, to my knowledge, however, this is the first English language study to provide a comprehensive account of the formation and immediate legacy of the Manhua Society. Cartoonist and scholar Bi Keguan’s 畢克官pioneering 1986 Chinese-language study The History of Chinese Manhua 中國漫畫史, co-authored with Huang Yuanlin 黃遠林 was the first to highlight the historical importance of the Manhua Society. Thirty years later, this groundbreaking work remains unsurpassed as the most exhaustive and penetrating look at the history of Chinese cartooning. Beginning with a short look at proto-cartoons from the pre-modern period, Bi and Huang document the emergence of humorous drawings 滑稽畫 in the newspapers and pictorials of the late Qing and early Republican period, looking at artists such as Shen Bochen and Ding Song. They show how these works informed the satirical cartoons 諷刺畫 of the politically tumultuous late 1910s, which Bi and Huang refer to as the Era of May 4th Movement 五四運動時期. Although this movement began as a series of student protests against territorial concessions given to Japan, it eventually came to be seen as emblematic of a much larger cultural backlash against cultural and social conservatism. Further research is needed on why so many manhua publications were short lived. While we will probably never know for sure how exactly how many manhua periodicals were published, in Chapter 6 of this study I touch on a total of 25 magazines published after the (informal) founding of the Manhua Society in 1928 and before Shanghai fell to the Japanese in November, 1937 (see Appendices Table 0.2 for a complete list). Of these, only a handful were able to survive for 2 to 3 years, with the vast majority closing after 2 or 3 months. John A. Crespi has hypothesized that many magazines were launched with funding sufficient to cover the costs of only one or two issues, being forced to rely on the sales of these first issues to continue printing thereafter. At the same time, for every successful magazine there were any number of titles which failed to find an audience large enough to justify production costs. This is the sixth chapter in my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. Since this was not a fair weather art, it did not attract those in search of fame or fortune. On the contrary, it offered poverty and hard knocks. The history of the first group of cartoonists is typical. Out of ten members, one died with enough money to pay for his funeral; one joined the government and secured a job that kept him from doing embarrassing cartoons, one disappeared after publishing a particularly pointed anti-Kuomintang cartoon, six managed to hold together, to be joined by a seventh who had been in hiding for four years during the bitterest persecution of Leftists: after the fall of the Wuhan government in 1927 and the split of the united front between the Communist Party and the Kuomintang. Their survivors met [in 1934] at the home of their dead friend, whither that all unknowingly come on the same mission–to give him a regular funeral. Of the seven, three had steady jobs that paid fifty dollars gold a month, and they earned perhaps fifty more by extra work. These are the best paid cartoonists in China. The rest scrape along as best they can, editing, teaching, doing odd jobs. And yet–making cartoon history. While it is easy to identify the first Manhua Society member mentioned as Huang Wennong, who died of ruptured stomach ulcer on June 21, 1934, the others are less obvious. Clearly, Ji Xiaobo is the most likely candidate for having joined the government, and the six who held together most likely refers to Ye Qianyu, Zhang Guangyu, Zhang Zhengyu, Lu Shaofei, Ding Song, and Hu Xuguang or Zhang Meisun. Huang Wang seems to have been the only out-and-out leftist in the group, although the dates for going into hiding seem wrong, since he was active throughout 1927 and early 1928, and again in 1930, with a four year period of inactivity from 1931 to 1934. This corresponds with the crackdown against the League of Left-Wing writers, of which he was a member, in February, 1931. The author of the pointed anti-KMT cartoon is more difficult to identify, but it may have been a younger member of the staff at Shanghai Sketch II, such as Xuan Wenjie, or someone less directly connected, such as Huang Shiying. Riding high on their success, on October 10, 1929, Shanghai Sketch Press 上海漫畫社, Zhang Zhengyu convinced his older brother to rename their press the China Fine Arts Periodical Press 中國美術刋行社and launch a second periodical, the monthly pictorial Modern Miscellany 時代畫報, to be co-edited by Zhang, and the modernist writer, Ye Lingfeng 葉靈鳳 (1905-1975). Designed to compete with the wildly successful pictorial Young Companion 良友畫報, the inspiration for Modern Miscellany came after the Singaporean distributer for both Shanghai Sketch and Young Companion lost distribution rights to the latter. The distributor’s representative in Shanghai, Wang Shuyang (who had met Ye in 1925, when he interviewed him for the job at Three Friends Co.), approached Ye Qianyu and Zhang Zhengyu with this business opportunity, and Zhang managed to convince his older brother against of the urgings of their three partners. Shortly thereafter, Lang Jingshan, Hu Boxiang, and Zhang Zhenhou withdrew from the partnership in protest, forcing them to move their office from the church to an alley near the intersection of Nanjing Road and Zhejiang Road, just minutes from the Bund. As a result, the second issue of Modern Miscellany was delayed until late February of the next year, and the third issue was not published until May. To solve their cash flow problems, Zhang Guangyu and company announced in the June 7, 1930, issue of Shanghai Sketch that the publication would be merging with Modern Miscellany and the publication schedule changed to bimonthly. On June 16, 1930, the first merged issue of Shanghai Sketch and Modern Miscellany was published, with the title shortened to Modern 時代. Meanwhile, in 1930 Ji Xiaobo and Ye Qianyu seem to have made steps toward burying the hatchet when Ji Xiaobo convinced the owner of Chenbao 晨報 [Morning Post] to launch a pictorial supplement which would serialize Ye Qianyu’s popular cartoon, Mr. Wang. Despite already working full-time as an editor at the bimonthly Modern Miscellany, Ye agreed, receiving 100 yuan per month for his strips, and two pin-up advertisements which the publisher requested in exchange for publishing the cartoon. Despite Jack Chen’s sarcastic comment in late 1938 that “[Ji Xiaobo] joined the government and secured a job that kept him from doing embarrassing cartoons,” then, it seems possible that Manhua Society parted amicably, having served its purpose of launching the careers of its members. Starting with Issue 1, Vol. 2, we will begin using photogravure, plus two-color plates, three-color plates, seven-color plates, etc. The paper we use will also be changed to specially produced foreign-made photogravure paper, in what could be called a pioneering step in China. As promised, the next issue of Modern, published on November 16, 1930, featured a large number of photographs, with much better contrast and fine detail. Over the next year however, due to the limited number of rotogravure presses in Shanghai at the time, Modern continued to suffer from delays, and quality declined as well. Finally, in the summer of 1931, Shao Xunmei managed to buy his own German-made rotogravure press for $50,000 US dollars, which was to be the foundation of his new venture, the Modern Press 時代印刷公司, and in the sixth issue (Vol. 2) of Modern, China Fine Arts Periodical Press announced that they would be taking a two month hiatus to set up their new press. Renting a factory on Pingliang Road 平涼路in Yangpu district, between the Japanese controlled Hongkou district and the Huangpu River, Shao soon found himself cut off from his investment when this part of the International Settlement was occupied by Japanese troops arriving via gunboat in January, 1932. This is the fifth chapter in my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. From the evidence, it seems that at least in part an internal schism (or schisms) broke the group apart from the inside. For one, the checkered relationship between Ji Xiaobo and Ye Qianyu seems to have colored his interactions with the rest of the group. Lu Shaofei, on the other hand, seems to have had an especially close relationship with Ji up until late 1929, when the Ji seems to have mostly stopped publishing cartoons after being hired as a censor for the Ministry of Education. Huang Wang also withdrew from the group, and the cartooning world in general in the spring of 1928 after a falling out with Zhang Zhengyu, publishing leftist cartoons two years later under various pseudonyms, while Ding Song, meanwhile, seems to have distanced himself from the group following an obscenity trial in late 1928. Finally Hu Xuguang seems to have quit cartooning entirely in 1928, finding employment as set decorator in the film industry instead. At the same time, while it is true that four prominent members of the Manhua Society (Ji, Wang, Ding Song, and Hu) left the group to pursue other projects, as did other more minor members (Zhang Meisun and Cai Shudan), the bonds between the remaining five members of the Manhua Society (Ye, Huang, Zhang, Zhang, and Lu), however, seem to have grown even stronger throughout 1928, while at the same time allowing new collaborators to emerge. This reflects the fluid nature of membership in the Manhua Society that is attested to in their early meeting notes which note that, “…our group has adopted an open format and we welcome new comrades to join. There is no established procedure for soliciting new members, so interested parties are encouraged to contact us” 該會取公開態度、歡迎同志加入、但無徵求會員之手續、願入會者、可與該會接洽云. Manhua Society members, Wang Dunqing, Huang Wennong, Ye Qianyu, three united comrades from the world of art and literature, will be distributing a pictorial magazine that uses five-color rubber blanket offset printing. Every three days a new issue will be released under the name, “Shanghai Sketch.” The objectives of this periodical are to use words and pictographic art to encourage Chinese industry, beautify present day society, and conduct the revolutionary spirit. The contents of each issue will be one set of long-running humorous cartoons, and one set of short-running cartoons. The beautiful printing will include more than 20 satirical drawings, joke drawings, etc. while he text will include miscellaneous social commentary, short stories, interesting accounts, etc. Regarding the preparation of the pictographic materials and the selection of texts, there has already been over a year of preparation so the works we will publish are, without exception, vastly different from those published in normal pictorial magazines and three-day papers. This periodical will be published December 31, Year 16 . This is the fourth chapter in my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. While it is clear that the members of the Manhua Society were connected through a variety of social and professional institutions, it took them more than five years to form a society dedicated to the production and promotion of cartoons and comics in China. Initially, they may not have seen the need to organize, instead being satisfied to be paid to draw cartoons on a semi-regular basis for the Shenbao and other periodicals. For most of them, cartoons probably seemed like a hobby, or side-business, to their more lucrative work in advertising and teaching. The escalating political turmoil of the 1920s would seem to be obvious catalyst for the formation of the Manhua Society. On the other hand, cartoons and comics provided these young men with the means not only to speak out against foreign imperialism and government corruption, but also establish their respective careers and provide for their families. One event in particular has special significance for the formation of the Manhua Society, not simply because it spurred the Manhua Society members into action, but because it provided an opportunity for publishers (particually of pictorials) to capture the attention of readers. On May 30, 1925 policeman in the International Settlement opened fire on a crowd of Chinese protesters, many of them students, gathered outside the Laozha police station老閘捕房, killing nine and injuring many more. The students had gathered to protest the trial of students who had been arrested performing a mock-funeral demonstration following the shooting of a Chinese worker in Japanese-owned cotton mill earlier in the month. Two days later, the tabloid Pictorial Shanghai 上海畫報released its controversial first issue on June 6, 1925, featuring photographs of the bloody protests. Published by the popular noveist Bi Yihong畢倚虹(born Bi Zhenda 畢振達, 1892-1926), who was associated with the Mandarin Ducks and Butterflies clique, the tabloid employed not only Zhang Guangyu and Ding Song, but also St. John’s graduate and future Manhua Society member, Wang Dunqing. Over the next month, a triple strike of merchants, students and workers organized by the KMT working in cooperation with Du Yuesheng and the Green Gang led to riots and more deaths, providing Pictorial Shanghai with enough sensational content to publish a new issue every three days. Clearly inspired, two months later on August 3, 1925 Zhang Guangyu launched his own three-day tabloid, the two-page broadsheet, China Camera News三日畫報. The May 30 Incident galvanized the young cartoonists into action, providing a ready market for their pointed political satire, and in addition to news and topical essays, the first issue also included satirical drawings諷刺畫 by four future members of the Manhua Society: Lu Shaofei, Huang Wennong, Ding Song, and Zhang himself. This is the third chapter in my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. Ji Xiaobo, Ding Song, Zhang Guangyu, Zhang Zhengyu, and Lu Shaofei all met in the late 1910s, and found an affinity in their shared interest in cartooning, and also perhaps a sense of social exclusion, since all four men were born into a merchant or tradesmen families. Their relative lack of education stands in contrast with many Republican-era intellectuals and artists who came from wealthy families and were educated abroad. Although Ye Qianyu was given the benefit of a high school education, and was also somewhat younger, like the Zhang brothers and Ye Qianyu, he seems to have mostly forged his own path to becoming recognized as a professional artist. The remaining members of the Manhua Society are Wang Dunqing, Huang Wennong, Hu Xuguang, Zhang Meisun 張眉蓀 (1884-1975) and Cai Shudan 蔡輸丹 (n.d.). Of them, Zhang Meisun seems to have been an early acquaintance of Ding Song, having studied art together at Tushanwan orphanage while both men were in their teens, and Hu Xuguang a student of Ding Song, having studied at the Shanghai Art Academy. The rest, like Ye Qianyu, seem to have been wild cards, attracted to Manhua Society by chance encounters and shared interests. Some, like Zhang and Cai, don’t seem to have left any cartoons behind, with Zhang becoming a well-known painter of watercolors, and Cai working as an assistant to Ji Xiaobo. Ye Qianyu has mentioned that he first became interested in cartooning after seeing cartoons by Huang Wennong, who himself may have been influenced by Shen Bochen without ever meeting him. Wang Dunqing, meanwhile, quickly rose through the ranks of the Manhua Society, taking over the chair from Ding Song in November, 1927. He made fast friends with Ye Qianyu, but seems to have remained distant from many of the other members of the society. With a glance at the picture, you can immediately tell who he is. It is not strength, but his fine character and art that win the love and admiration of all his fellow students. As a friend, he is always sincere and ready to help without hesitation. As an athlete, he is noted for his fine college spirit. His beautiful verses in Chinese are depictable [sic] of humanity and true to nature. His clear perception with a firm, bold hand marks him a true artist of distinction. With such an intelligence, capacity and character, we are sure that a bright future awaits him. This is the second chapter in my MA thesis, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938, completed in December 2015 at the Department of Asian Studies at UBC. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. Given Ji Xiaobo’s job as a censor for the Nationalist government in the 1930s, it is perhaps unsurprising that when Ye Qianyu wrote his autobiography in the late 1980s, he decided not to mention that Ji Xiaobo was an old acquaintance of two key founding members of the Manhua Society, Zhang Guangyu and Ding Song. Since Ji Xiaobo claims to have met both in 1917, while working Sun Xueni’s Shengsheng Fine Arts Press, it stands to reason that Ji Xiaobo would have introduced the two cartoonists to Ye Qianyu when the talented young artist was promoted to the advertising department of Three Friends in 1925. Instead, Ye recalls that he met Zhang Guangyu after submitting a cartoon to his tabloid, the China Camera News 三日畫報in the summer of 1925, shortly after arriving in Shanghai. There may be an element of pride at work here as well, because according to Ye, Zhang was so impressed with his work that he asked to meet him in person. Or it may be that Ji never introduced them, and Ye resented him for not having done so. Regardless, it seems clear that Ye Qianyu and Zhang Guangyu hit it off almost immediately, with the younger Ye referring to Zhang as “the first of the older generation of manhua artists I met” 最早认识的老一辈漫画家. This, again, is curious, because Zhang, born in 1900, was only one year older than Ji Xiaobo. In comparison, Ye hardly mentions Ding Song. Given their respective ages, Ye Qianyu and Ji Xiaobo were likely much closer friends with Zhang Guangyu than they were with much older Ding Song. Nevertheless, Ding Song seems to have provided the group with a certain amount of guidance. Meeting notes for the society indicate that Ding Song was the chairperson of the group for the majority of 1927, stepping down in favor of Wang Dunqing in November, and he was a teacher and mentor to both Zhang Guangyu and Lu Shaofei. Most importantly perhaps, as the oldest member of the Manhua Society by nearly a decade, Ding Song is in many ways typical of the cartoonists who emerged in the first decade of the Republic prior to the formation of the Manhua Society. Born in 1891 in Fengjingzhen 楓涇鎮, a small town in Jiashan county嘉善to the southwest of Shanghai, Ding Song’s parents both died when he was only 12. He spent his teen years at the Tushanwan土山灣orphanage in Xujiahui district, which had been founded by Jesuit missionaries in 1864. While at Tushanwan, Song studied Western religious and secular art with Zhou Xiang周湘 (1871-1933) and Zhang Yuguang張聿光 (1886-1968), in addition to learning how to operate a printing press. He quickly made a name for himself as an artist, and in 1913, Song was invited to serve as academic dean for the newly founded Shanghai Art Academy 上海美術院 , later being promoted to provost. It was around this time he became close friends with the prolific cartoonist Shen Bochen沈泊塵 (born Shen Xueming 沈學明, 1889-1920), who had been hired as a staff cartoonist for the three-day tabloid The Crystal 晶報in 1912. Under Shen’s encouragement, Ding Song to soon began drawing and publishing his own cartoons. Chapter 1: War, What Is It Good For? This is first chapter in my MA thesis completed in December 2015 at the Department of Asian Studies at UBC, The Shanghai Manhua Society: A History of Early Chinese Cartoonists, 1918-1938. Since passing my defense, I’ve decided to put the whole thing up online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. Fittingly, given the role free trade agreements have played in the development of 21st century cities, Shanghai of the early 20th century, “portent of the modern world,” was made possible by the Treaty of Nanking in 1842 which designated Shanghai a ‘treaty port,’ becoming a casualty of the first Opium War between the rapidly expanding British Empire and the ailing Qing Empire. The Manchus had ruled China since overthrowing the ethnic Han Ming dynasty in 1644, overseeing a huge growth in population and territory. According to many scholars who have studied the era however, the Manchu reforms were primarily targeted at restoring rather than reforming political, economic, or social institutions which they inherited. Eventually, foreign aggression forced the imperial government to begin efforts toward Western-style modernization. The British treaty was soon followed by similar French and American treaties in 1844. Chinese entrepreneurs flocked to the foreign concessions to take advantage of the new economic opportunities they provided, while many others sought refuge from the political turmoil of the Taiping Rebellion of 1851 to 1864. Foreign products, most famously opium, but also English wool, Indian cotton, Russian furs, American ginseng, and silver bullion mined in Mexico were imported into China through the docks and godowns [warehouses] of the Huangpu, and while goods such as tea, silk, and porcelain were exported from the farms and villages of the Chinese countryside. Over time, a local manufacturing industry (of which printing presses were to form a large part) emerged, eventually overtaking the import-export business. In 1895, the defeat of the Qing in the first Sino-Japanese War led to the Treaty of Shimonoseki, which created the first Japanese concessions in China while also establishing a legal precedent for foreign-owned manufacturers within China. At first, Chinese industrialists struggled to compete with the capital resources and more advanced manufacturing techniques of foreign-owned factories. Chinese firms quickly latched onto the idea of using the rhetoric of nationalism to sell their products, which often came at a higher or equivalent real cost, with a lower level of perceived quality. Anti-Japanese sentiment was stoked even further by the Russo-Japanese War of 1904-1905, when Japan seized additional concessions in the Liaodong peninsula 遼東半島, in the northeastern province of Liaoning 遼寧, which at the time was known as Fengtian 奉天. When the by then widely despised Qing government was finally overthrown in late 1911, the ensuing wave of nationalism help bring by Sun Yat-sen’s 孫中山 (1866-1925) Kuomintang 國民黨[Chinese Nationalist Party, KMT] to power, with the support of the leading Qing general, Yuan Shikai 袁世凱 (1859-1916) and his modernized Beiyang Army. Meanwhile, business owners quickly realized the opportunity to seize market share from foreign imports with the establishment of the Chinese National Product Preservation Association 中華國貨維持會. Beyond simply promoting Chinese products, the CNPPA would go to organize numerous anti-Japanese boycotts from its headquarters in Shanghai, which were largely suppressed by the Republican government under pressure from the Japanese legation. When World War I broke out in August, 1914, Japan, which had been formally allied with England since the 1902 Anglo-Japanese Alliance, seized the German concession in Qingdao, Shandong province and proceeded to force the Yuan Shikai’s government, which had ejected Sun Yat-sen’s KMT the previous year, to accept a list of demands, including the recognition of the various Japanese territorial claims in China. In late 1915, Yuan reinstated the monarchy, declaring himself Emperor Hongxian of the Chinese Empire 中華帝國大皇帝洪宪, a controversial decision which led to the break-up of his government even before his death from kidney failure in 1916. Following Yuan’s death, the Beiyang Army split into warring factions, which coalesced into three main groups: the Anhui clique 皖系, the Zhili clique直系, and the Fengtian clique 奉系. At first, the most powerful of these was the Anhui clique, which controlled Beijing under the leadership of Duan Qirui 段祺瑞 (1865-1936), an Anhui native, with the support of the Japanese who provided loans in exchange for under-the-table territorial concessions. For similar reasons, the Japanese also supported the Fengtian clique, which was based in the far northeastern corner of the country above Korea, known as Manchuria, and led by Zhang Zuolin 張作霖 (1875-1928), with the support of Zhang Zongchang 張宗昌 (1881-1932) and others. Hebei and its surroundings, meanwhile, were controlled by the Zhili clique, led by Cao Kun 曹錕 (1862-1938), in partnership with Wu Peifu 吳佩孚 (1874-1939), Feng Yuxiang 馮玉祥 (1882-1948), and Sun Chuanfang 孫傳芳 (1885-1935). For much of the late 1910s and early 1920s, however, the province of Canton in the far south was largely controlled by the KMT under Sun Yat-sen’s leadership. Sun initially formed alliances with local warlords, in particular Chen Jiongming 陳炯明 (1878-1933), but found them to be unreliable allies in his quest to reunify China under KMT rule. In 1924, Sun founded the Whampoa Military Academy 黃埔軍校 in Canton with support of the Soviet Union and the New Guangxi Clique 新桂系, which controlled neighboring Guangxi province, a major center of opium production. As part of the terms of support from the Bolsheviks, the KMT had formed an alliance with the Chinese Communist Party in 1923, known today as the First United Front of the Nationalists and Communists. In 1925, Chiang Kai-shek 蔣介石 (1887-1975), commandant of the Whampoa Military Academy, drew on the graduates of Whampoa to found the National Revolutionary Army (NRA), a force which would ultimately retake the country for the KMT following Sun Yat-sen’s death in 1925. In was during these turbulent times that Ye Qianyu, today the most well-known member of the Manhua Society, grew up. Ye’s early life story is unique among his peers not so much in the particulars, but because we know a great deal about it, largely thanks to his autobiography which was published in the 1990s. Ye’s early life illustrates how the numerous military conflicts of the late 1910s and early 1920s shaped the lives and aspirations of the first generation of manhua artists in China. Born in 1907 into a family of merchants in Tonglu county 桐廬縣, Zhejiang province, in the mountains to the southwest of Hangzhou at the confluence of the Fenshui and the Fuchun, at age seven Ye entered Baohua Primary School 葆華小學. After graduating in 1916 he enrolled at Zixiaoguan Advanced Primary 紫霄觀高等小學 where in addition to his other coursework he also studied traditional ink painting and handicrafts. He spent five years at Zixiaoguan before graduating in 1921. While Ye was in his third year Zixiaoguan, World War I ended with the Treaty of Versailles. Signed on June 28, 1919, due to secret territorial concessions granted by the various warlord cliques in exchange for loans and military equipment, this controversial document upheld Japanese claims over Qingdao and the Liaodong peninsula, despite China having contributed some 140,000 laborers to the Allied war effort. More than 800 miles to the north of Hangzhou, student protests against both the warlords and Japan took place in the capital of Beijing on May 4, 1919, quickly spreading to rest of the country. The “May Fourth” movement, as it came to be known, was a watershed moment for a new generation of Chinese intellectuals who increasingly came to advocate for the abandoning of “backward” Chinese tradition in favor of the modern ideals of “science and democracy.” Although he was only 12 when the May Fourth movement began, in his memoirs Ye recalls participating in student protests inspired by the May Fourth movement several years later while going to school in Hangzhou. Last December, I completed my Masters of Arts in Asian Studies at UBC. Altogether it took me about two and half years. For the first year, that meant attending graduate seminars, doing assigned readings, and writing seminar papers (many of which I’ve since re-purposed as posts on this blog). I also helped organize my department’s graduate conference and worked as a teaching assistant, first in Chinese film and later for Chinese language courses. The last year and a half of my program was dedicated to completing my thesis, a long piece of original research intended to both develop and highlight my mastery of my chosen subject matter. Although I had hoped to complete a comprehensive history of Chinese comics, I soon realized this was far beyond the scope of a MA thesis. With the encouragement of my advisor, Chris Rea, I decided to focus on the Shanghai Manhua Society, an important group of cartoonists who came together in Shanghai in the mid-1920s. For most scholars, academic research is first and foremost a means to an end. (As a wise man once said, the only good thesis is a finished thesis.) That said, it is also represents a once in a lifetime opportunity to study something which interests you, and (hopefully) share that interest with others. Over the last couple of years, Chinese cartoons and comics have been gradually attracting more and more interest abroad. In Chinese studies, much of this interest is framed within the context of print culture studies, taking inspiration from Jürgen Habermas’ influential concept of the public sphere as the birthplace of modern democracy. I can’t, however, say that I have much of a mind for theory. I like Chinese comics because I like comics and I like China. If that sounds like an easy out, well. Perhaps it is. Since passing my defense, I’ve been considering putting my entire MA thesis online so that my research will be available to the rest of the world. I’ve also decided to use Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which means you can share it with anyone you like, as long as you don’t charge money for it. Over the next couple of days I’ll be putting up the whole thing, chapter by chapter. You can also download a PDF version here. Finally, now that I’m working as a full time translator / agent / consultant / tour guide, any time I spend on this blog is time I could be spending on paid gigs.1 If you’d like to support my research going forward I encourage you to consider sponsoring my blog via Patreon. Thank you! Zhang Meisun “Emblem for the Manhua Association” 漫畫會會徽 November, 1927. Chapter 1 : War, What Is It Good For? Burnt Bridges and Bad Blood? Lop off my arms and I’ll sock you another. Carve up my guts and I’ll put them together. A warm tub that makes all the dirt gone. So speaks Sun Wukong, better known in English as the Monkey King, after Monkey, British sinophile Arthur Waley’s enduring early 20th century translation of Wu Cheng’en’s Journey to the West 西游记. Thanks to Waley’s judicious to abridgement of the massive Ming dynasty novel into a much shorter and (arguably) more readable novel, for a time at least The Great Sage was able to enjoy an equal measure of fame both at home and abroad. Although the novel is less well known today, nearly a century later, Monkey has many ways found an even greater success—as a cartoon character. The following is a sneak peak of a talk I have been invited to give later this month for the Center for Chinese Research at the University of British Columbia. If you are interested in the topic and happen to find yourself in Vancouver, the talk will be Monday, February 29, 12-2pm in Room 120 of the C.K. Choi Building.
2019-04-23T00:55:04Z
http://www.nickstember.com/author/necksbetrim/page/2/
The full-text pdf copies of all University PhD dissertations published since mid-1996 are now available free online to on-campus users. All users can order any of the University dissertations for a fee by using the “Order” link on the citations below or on the abstract pages to which they link. Additional pre-1996 dissertations will be available for free to on-campus users in the future. Business process improvement teams frequently engage computers to improve the quality and cost effectiveness of internal services. Prior surveys indicate that less than half of organizational employment departments have computerized their recruitment information systems. This survey of 225 U.S. organizations explores both the reasons for lack of computerization and the impact of installing a computerized recruitment information system (CRIS). Mailed questionnaires were sent to a sample of employment managers throughout the U.S.A. Responses from the 120 non-computerized organizations reveal that uncertainty about estimating costs and benefits of computerization is a major obstacle for investment decisions. Data from 105 CRIS respondents offers insights about how automation affects the cost and quality of internal employment services. The researcher predicted significant differences in hiring cost efficiency and recruiting response time between two computerized groups, HI profilers and LO profilers. HI profilers are characterized by regular search of their database of past applicants to resurrect candidates for current job vacancies. LO profilers do not or can not utilize their database in the same manner. Compared to LO profilers, HI profilers report significantly superior improvements in cost of hiring and recruiter response time. HI profilers report a mean decrease of 11.1% in candidate sourcing costs compared to a 1.5% decrease for LO profilers. HI profilers also report a mean decrease of 6.3 days in time to fill vacancies compared to 1.2 day decrease for LO profilers. Both computerized groups report that these improvements were achieved without sacrificing the quality of candidate pool. The aggregate mean payback period for HI profilers was 2.7 years compared to 31.6 years for LO profilers. Further analysis indicates that the level of advertising before computerization significantly affects the level of cost savings achieved through implementation of the CRIS. Frequent HI profile advertisers report a mean savings of 24.2% in candidate sourcing costs. Arguments are presented from the point of view of both modern science and Maharishi’s Vedic Science in support of a relationship between moral development and organizational citizenship behaviors (OCB). A theoretical model is proposed, using principled morality as a dispositional determinant of OCB and value-based commitment as a moderator. The model is tested using a sample of 126 full-time employees from various organizations, recruited from undergraduate and graduate college classes in two geographic locations. All subjects were given Rest’s (1986) Defining Issues Test (DIT) to evaluate the degree of principled moral reasoning applied in problem-solving, and O’Reilly and Chatman’s (1990) Normative Commitment scale to evaluate the degree of congruence between individual and organizational values. Supervisors for these employees were then asked to provide assessments in terms of five classes of behaviors that represent organizational citizenship: altruism, courtesy, civic virtue, sportsmanship, and conscientiousness (Podsakoff, MacKenzie, Moorman, & Fetter, 1990). Results indicate no direct support for the a priori hypotheses. However, exploratory analysis reveals significant positive relationships for civic virtue, conscientiousness and courtesy in subsets of the data, indicating qualified support for the hypotheses. In addition, a highly significant negative relationship is found for courtesy in several data subsets. Current theories of the psychological effects of underemployment are applied to the interpretation of these negative findings. In general, the mixed results of exploratory analysis suggest that there may exist both simple and complex links between individual moral standards and performance in business. Reduction of stress and development of personnel are inseparable and necessary components of organizational effectiveness. However, few interventions simultaneously address what may be the primary impediment and enhancer, respectively, of business success. This dissertation assessed the effects of one such intervention, the Transcendental Meditation® (TM® ) program, on cognitive and affective, physical, relationship, and lifestyle indices of stress reduction and human resource development in the workplace. While several organizational studies have investigated similar changes in Western European and US companies, fewer have looked at stress reduction and development in developing nations, such as India. The study had a pre and double-posttest design (10-day and 90-day) with 22 experimental subjects (TM practitioners) and 23 posttest-only controls–all equivalent-level managers at a dye-and-cast manufacturing firm in Bangalore, India. Seventy-eight data points combined into five scales or subscales and an aggregate of “lifestyle” behavioral/experience items to create six dependent variables, all but one of which showed significance in the hypothesized direction in one or both posttest periods using multivariate Hotelling’s one-sample T2 analyses (10-day: p < .0010; 90-day: p < .0010), followed by paired t-test analyses: Perceived Stress Scale (10-day: p < .0060; 90-day: p < .00001), Occupational Stress Inventory (10-day: p < .0779; 90-day: p < .1187), Lifestyle items (10-day: p < .0063; 90-day: p < .0085), Personal Experiences scale (10-day: P < .0048; 90-day: p < .0004), Hopkins Symptoms Check List (10-day: p < .0008; 90-day: p < .0377), and the Self-Esteem Survey subscale (10-day: p < .0023; 90-day: p < .0377). Further analyses showed large and increasing effect sizes between posttesting periods, “expectancy of benefit” to be a non-significant covariate, and a trend towards ceiling affects that prevented significant change between 10- and 90-day posttesting. These results reinforce previous findings on this procedures efficacy in stress reduction, increased positive experiences/behaviors and fewer negative ones, the development of the health, relationships, self-concept, and psychological well-being of employees, and support its wider implementation. The findings lay the foundation for a proposed new job stress formulation, the Metapersonal Resources model. Integrating a theoretical orientation known as Maharishi Vedic Science with sixteen contributors to contemporary job stress understanding, it emphasizes the dimensions of psychological non-egocentrism and physiological strain reduction as principal components for both ameliorating stress and producing a state of dynamic quiescence. Although behavioral stress management programs are commonplace in corporations, stress remains a major problem. Accordingly there is a lack of agreement about what stress reduction methods, if any, are effective. Moreover, there has been a lack of empirical research examining the value of such programs for managers or executives. A three-month prospective study examined the effects of the Transcendental Meditation® technique on stress-related self-report, physiological and observer measures. The subjects were 76 executives, managers and other professionals of managerial rank in a mid-sized U.S. medical equipment developer and manufacturer. An empirical study of CPA’s moral development, ethical evaluation and ethical intention: A selected group of Taiwanese CPA’s. The perception of accounting professionals having low ethical standards and therefore lacking credibility is evidenced by the many scandals globally over the last ten years including Enron, WorldCom, Merck and Xerox. Thus, developing an understanding of the CPA’s moral development and the factors that influence ethical decisions is critical. This study attempts to extend the research on moral development as a predictor of ethical evaluation and ethical intention of accounting professionals and looks to ascertain the demographic factors that influence moral reasoning, ethical evaluation and ethical intention. This research is the first to examine these questions in the accounting profession in Taiwan. The study first examines the relationship between moral reasoning, measured by the Defining Issues Test (DIT) and the two components of ethical decision- making (ethical evaluation and ethical intention), measured by the three questions of the Multidimensional Ethical Scale (MES). The MES instrument depicts ethical situations for accountants. The study sample is 316 Taiwanese CPA’s. This study has several important findings: (1) CPA’s level of moral development was not significantly associated with expressed intention to perform questionable actions. (2) CPA’s with a higher level of moral development are not likely to express the intention perform questionable actions. (3) There is a relationship between ethical evaluation and ethical intention. (4) CPA’s moral development does not appear to be associated with their age, gender, education level, ethics training or professional levels. (5) CPA’s ethical evaluation appears to be associated with their gender, education level or ethics training, but not age or professional level. (6) CPA’s ethical intention appears to be associated with their gender or education level, but not age, professional level, or ethics training. These findings are discussed in the light of Maharishi Vedic Science, which provides a scientific approach to foster moral development through experience of the Unified Field of Nature Law. The purposes of this dissertation were to explore the flow experience at work and to construct and validate a questionnaire. Flow is characterized by highly positive states and total involvement in activity. Two versions of the Work Experience Questionnaire (WEQ) were constructed and validated in corporate settings indicating that the WEQ is a promising instrument. Study 1. The first version of the questionnaire was administered to 44 subjects along with Csikszentmihalyi/Heckman’s questionnaire, The Study of Flow in the Workplace. Items were positively and negatively anchored (flow/anti-flow) according to Csikszentmihalyi’s six flow characteristics. The two factor principle components solution clearly separated positive and negative characteristics (Cronbach alpha of 0.8082 and 0.8156). The screen test specified 7 factors, which were: (1) frustration in turbulence, (2) psychological traits of unhappiness, (3) confidence to deal with the demands at work, (4) joyous creativity, (5) teamwork and goal attainment, (6) contentment, (7) distraction. Anti-flow items more closely approximated the proposed classification than the flow items. Concurrent validity on Csikszentmihalyi/Heckman’s three questions showed that one, skills that seemed second-nature, correlated with WEQ Total Flow (p=0.037). Study 2. A 72-item version of the WEQ was administered to 94 subjects in three sessions. The Minnesota Satisfaction Questionnaire, Short-Form, (MSQ), Social Desirability and a two question test on Personal Efficacy were administered concurrently with a subset of these subjects. The correlation between Social Desirability and Total Flow, (r =-0.327) indicated that high flow was not likely to be fabricated. Personal efficacy was correlated with average satisfaction from the MSQ (r = -0.560) and negatively correlated with Total Anti- flow (r = -0.513), and Social Desirability (r = -0.485). The relation with previously specified characteristics was strengthened when positive and negative items were separately factor analyzed. The licensing deal is an organizational phenomenon to the extent that it exhibits relational features. These deals are governed by both contractual behaviors that are regulated through the “black letter” of the deal and non-contractual behaviors that are guided by social norms. Understanding more about norms, implicit obligations, and other relational features, and the nature of social relationships that structure behavior in licensing would allow us to motivate the behaviors in supporting partnership and reduce opportunism. This dissertation focuses on the interrelations between economic activities (especially technology transfer), individual status in various domains (political, economic, social), and inter-firm relationships. Results indicate that standard views of negotiating the licensing contract are inadequate. That is, economists have no language with which to explain “appropriate” behavior. This is strictly a sociological concept. March (1999) distinguished the economic and sociological perspectives by saying that economists explain behavior using a “logic of consequence,” referring to the effects of an action in relation to one’s preferences, whereas sociologists explain behavior in terms of a “logic of appropriateness,” in which action can be justified on the grounds that it is expected in the context of a person’s role, social position, or background. It is this expectation, or more precisely a common expectation, that defines a norm. Evidence from this research demonstrates that social norms provide the solution to technology transfer problems, especially in cases where standard models of rational choice or contractual adaptation cannot provide explanations for any contractual commitment that is beyond the contract itself. Behaviors under licensing contracts rely more on social norms than on legal rights and duties. In particular, social norms are most relevant and effective when the deals involve amendment. Perceived health and indoor environmental quality in green-certified and non-green buildings in a public organization in Taiwan. The current study is the first to empirically investigate the effects of green-certified buildings on human resource outcomes. This observational study uses survey data to compare self-reported health symptoms (HS) and satisfaction with indoor environmental quality (IEQS) for two intact groups of male employees working for the same public sector employer in Taiwan: one group works in certified green building (n=211), and the other works in two non-green buildings (n=161). Using multiple regression analysis, this study found strong empirical support for 3 of 4 research hypotheses. First, study participants in the green building had IEQS scores 32.3% higher on average (p < 0.001) than those in the non-green buildings, controlling for general building satisfaction (GBS) and average weekly hours worked in the building (HRs). The observed effect size for the difference in the adjusted mean IEQS scores is 4.62, a very large effect as defined by Cohen. Thus this effect of the green building on IEQS is both statistically significant and substantively important. Second, employees in the green building had HS scores 7.50 points (or 15.9%) higher, on average, than those in the non-green buildings controlling for GBS, HRs, job satisfaction (JS), age (AGE), and psychological demands of work (PSD) (p < 0.001). The effect size for the estimated difference in adjusted HS means is 2.26, a large effect. Strong empirical support was also found for the third research hypothesis using an alternative specification of the model for HS in which IEQS is added as a control variable. On average, a one point increase in IEQS is associated with a 0.19 point increase in HS, controlling for GB, JS, AGE, PSD, GBS, and HRs (p < 0.001). The effect size for IEQS is 0.56, a large effect as defined by Cohen and Cohen for continuous explanatory variables in regression analysis. The fourth research hypothesis was not empirically supported by the data. Depending on the specification of the model for HS, the effect of JS on HS is either negligible (explains less than 1% of the variance in HS) and not significant or negligible, significant, and the wrong sign (negative). Maharishi Vedic ScienceSM extols the Support of Nature, often referred to as luck and good fortune, as a consciousness-based management tool to do less and accomplish more in fulfilling personal desires and professional goals. The Transcendental Meditation® and TM-Sidhi ® Programs, including Yogic Flying, are said to cultivate the development of consciousness, resulting spontaneously in increased Support of Nature. Subjects who were long-term, twice-daily practitioners of these techniques who were residing in Fairfield, Iowa were selected to partake in qualitative, semi-structured interviews about personal experiences of more effortless fulfillment of desires. Six of the 18 subjects were senior executive officers (SEO) of the international Transcendental Meditation program. The remaining 12 were active participants of the Invincible America Assembly SM, an organization founded by Maharishi to establish world peace. All subjects reported experiences of Support of Nature. All subjects also reported that with continued practice of the Transcendental Meditation and TM-Sidhi Programs, the frequency, timeliness, and meaningfulness of their Support of Nature experiences increased over time. When describing their inner experiences associated with the Support of Nature, subjects reported being in a quiet and relaxed state of mind. When findings were analyzed with reference to a model of levels of the mind, it was noted that in describing the fulfillment of desires through Support of Nature, subjects primarily talked about the higher Self – Pure Consciousness; while the ego, intellect, and thinking mind were not much mentioned. This suggests the possibility of a new approach to management in which cultivating higher states of consciousness is the primary tool of management, while intellectual analysis of how goals will be achieved takes a lesser role as the achievement of desired goals is entrusted to the Support of Nature. Many African countries, including Ghana, are grappling with problems associated with economic development such as deforestation, pollution, and unsustainable population growth. No previous study has systematically investigated relevant psychological factors. The objective of this study was to understand the psychological barriers and enablers are for sustainable development in Ghana. A causal path model was developed and tested, based upon the Theory of Planned Behavior (TPB) and relevant research on sustainability. The model included constructs that are typically included in TPB models (intentions, attitudes, subjective norm, personal norm, perceived behavioral control, and knowledge), as well as skepticism regarding sustainability, and individual financial situation. The primary dependent variable was intentions regarding sustainable behaviors. A questionnaire was developed to collect data with which to test the causal path model and 510 in Kumasi, Ghana completed the questionnaire. Data was analyzed using structural modeling to examine the goodness of fit of the causal path model and to test hypothesized relationships between model variables. Goodness of fit of the structural model was adequate and model variables accounted for 29% of the variance in behavioral intentions, which was the primary dependent variable. With regard to intentions regarding sustainable behaviors, total effects of attitudes, perceived behavioral control, and personal norms were statistically significant and in the positive direction, as hypothesized. Knowledge concerning sustainability issues in Ghana had a positive total effect on attitudes towards sustainability, which was statistically significant, as hypothesized. Knowledge also had positive and significant total effects on perceived behavioral control and on personal norms, consistent with hypotheses. The study findings highlight the importance of education to impact attitudes and knowledge regarding sustainability issues in Ghana. A transition to a truly sustainable society would require a major transformation of attitudes and knowledge, both on the individual level and on the societal level. From this perspective, the study findings are consistent with other research showing that such profound transformations are most easily achieved by utilizing the Transcendental Meditation technique to promote development of consciousness, both on the level of the individual and on the level of society as a whole. A number of recent articles argue that human resource departments can make significant positive contributions toward implementing sustainability in their organizations. However, data show that HR professionals have been minimally involved in the transformation of their organizations toward sustainability. Further empirical studies are necessary to explore the role of HR activities in making organizations sustainable. This dissertation addresses this need by looking at how small and medium-sized organizations in Iowa have implemented sustainability using communication, engagement, training, incentive plans, and recruitment efforts. Case analyses are presented for six organizations that participated in the Petal Project; two companies from Sustainability Circles offered by True Market Solutions; and one other Iowa college to compare with the two liberal arts colleges that participated in the Petal Project. The Petal Project is a program unique to the Dubuque, Iowa area in which companies can become Petal Certified by completing criteria established by the Project. Sustainability Circles focus on training in analysis of and reduction of energy usage within their organizations. These Circles conduct a series of joint meetings of representatives from several companies. Qualitative data were obtained from interviews and documents. Analysis of the data examined how the organizations are using communication, engagement, training, incentive plans, and recruitment efforts to help implement sustainability within their organizations. The practices of these small to medium-sized organizations were compared to similar HR activities for implementing sustainability in larger organizations, from published surveys and from case studies of several multinationals. Guidelines are discussed in the dissertation for human resource managers or green champions to more effectively leverage these human resource activities to help implement sustainability within their own organizations. Potential advantages of combining features of the Petal Project and Sustainability Circles are also discussed. The final chapter relates human resource activities and sustainability to the teachings of Maharishi Mahesh Yogi and explains how practicing the Transcendental Meditation technique helps individuals become more aligned with the laws of nature. Efforts to develop leadership consistently fall short of the hopes and needs of students, trainers, and society. One approach to achieving larger gains in leadership development is to develop the leader from within, to develop the leader’s consciousness, the leader’s underlying basic awareness. Although anecdotal evidence supports the value of personal development for leadership development, little systematic research has documented its effectiveness. However, in an eight- month pretest-posttest control group study in one company, fourteen employees including both managers and subordinates, learned a standard self development program, the Maharishi Transcendental MeditationÎ program. Results indicated that the practitioners of Transcendental MeditationÎ grew significantly more than ten employee controls in their expression of leadership behaviors (all ps < .05). This growth was measured by the Leadership Practices Inventory and was expressed in individual and group interviews. The Leadership Practices Inventory measures five leadership behaviors: Challenging the Process, Inspiring a Shared Vision, Enabling Others to Act, Modeling the Way, and Encouraging the Heart. An Enterprise Resource Planning (ERP) system implementation is acomplex information technology project that integrates organization-wide operations. Prior surveys have reported perceptions about factors which are critical to ERP implementation success. But no prior research has empirically tested the relationship between ERP implementation factors (IFs) as independent variables and project success indicators as dependent variables. In the present study the research questions were: 1) is there a statistically significant relationship between an identified set of implementation factors for ERP projects and the empirically reported success indicators? 2) Do specific individual factors predict the level of success? Paper and online surveys were collected from 92 senior level ERP project participants—CIOs, project managers, executives and consultant/developers with experience on Federal ERP implementation projects. The study provided descriptive survey results for ERP implementation success and perceived effectiveness of implementation factors in the environment of U.S. Federal government ERP projects. Linear and logistic regressions were calculated to evaluate the relationship of 16 IFs to three measures of the success of ERP implementation completion within scheduled time, percentage of budget exceeded and percentage of project objectives achieved. Similarly, regression analyses were performed in which the independent variables were the three composite implementation factors (strategic, tactical, and operational factors) to the same measures of the success of ERP implementation. The findings indicated that the 16 IFs as a whole can be used to predict significantly the failure of a project to complete within the initial time frame ( p=0.03). In the regression analyses on percentage of budget exceeded, the16 IFs as a whole (p=0.034) and the three composite factors as a whole were jointly significant predictors (p<0.0005). The strategic and tactical composite factors were each individually significant as predictors of percentage of budget exceeded (p<.001 and p<.0005, respectively). However, the 16 IFs as well as the three composite factors were not significant predictors of reported achievement of project objectives. The statistical results of the study support the model that the composite strategic, tactical, and operational factors are significant for ERP project implementation success. Strategies to actualize the noble, people-centered development goals for Thailand based in the Philosophy of Sufficiency Economy have been carefully drafted by Thai policy makers. However, their own assessments reveal that such strategies have yielded at best minimal success. This dissertation brings forward a new, innovative strategy—developing total brain functioning through Consciousness-Based education—and examines how this strategy can swiftly realize the Thai goals, ideal as they are. To this end, this dissertation documents a clear picture of how Consciousness-Based education can powerfully support the actualization of the Thai goals. It considers Sufficiency Economy and Thai development plans in light of two ongoing Consciousness-Based education projects in Thailand that the author helped initiate, develop, and teach; how Consciousness-Based education develops total brain functioning; over 350 peer-reviewed studies conducted worldwide; and outcomes of Consciousness-Based education projects in other countries. Specifically, the dissertation discusses: • Thailand’s development goals, based on Sufficiency Economy, that envision a nation whose citizens are free and happy; have sufficient food and comfort; are healthy, ethical, creative, and knowledgeable; participate in life-long learning; enjoy a prospering free-market economy; uphold traditional Thai values; preserve natural resources and improve the environment. Further, the nation is self-immune to fluctuations in global markets and internal and external conflicts; • how Consciousness-Based education develops total brain functioning, considering (a) theoretical knowledge of consciousness, (b) a practical technology to experience consciousness directly to wake up the total brain—the Transcendental Meditation technique—and, (c) innovative teaching methodologies; • how more than 350 research studies suggest that Consciousness-Based education can actualize specific Thai development goals; and • self-reports from the author’s personal experience with Consciousness-Based education in Thailand, highlighting Dhammajarinee Witthaya secondary school and Department of Science of Creative Intelligence for Management, Rajapark Institute, including self-reports from students, faculty, parents, and administrators that illustrate the effectiveness of Consciousness-Based education in actualizing the Thai development goals. In conclusion, this dissertation proposes future research and development of Consciousness-Based education in Thailand that includes creating a Consciousness-Based education institution in every province and assessing outcomes over five years using the Thai government’s own standards. Lean accounting experts have argued that use of standard costing in lean manufacturing enterprises is a non-value added activity. They have asserted that the use of standard costing systems in lean manufacturing environments can give rise to anomalies in performance measurement and reporting. Yet, lean accounting experts have also provided anecdotal evidence suggesting that many lean manufacturers continue to use standard costing and variance analysis even after lean management methods are pervasively implemented. This research study, the first cross-organizational survey in the US of standard cost accounting practices in mature lean manufacturing business units, was undertaken to examine two main research objectives: (a) to understand the current state of practice with regard to use of standard costing and variance analysis (SCVA) in mature lean manufacturing enterprises in US, and (b) to understand the reasons why lean manufacturers might choose to retain standard costing even after pervasive implementation of lean management methods. Based on responses from 49 identified lean manufacturers, the results show that 46 (94%) lean manufacturing companies continue to use SCVA. A chi-square test was used to test the hypothesis that the minimum majority (50%) of the identified mature lean manufacturers will discard standard costing. The test showed that the number of identified mature lean manufacturing enterprises in the sample that have discarded standard costing is significantly lower than the expectation. The evaluation of reasons behind continuing use of SCVA was limited by small sample size. Yet, the pattern of responses suggests that the majority of the reported lean manufacturing enterprises seem to retain SCVA due to the existence of legacy arrangements such as use of monument machines, low knowledge of lean by accountants, and continued use of legacy ERP systems, which might be contributing factors for continued retention of SCVA. The researcher offers guidance for future quantitative and qualitative studies. The researcher takes a position that the existence of legacy factors may be indicative of institutionalization of SCVA such that these practices may have become part of organizational culture over a period of time. This descriptive-correlational study explored the job satisfaction of Moi University academic staff members as measured by Job Descriptive Index and Job in General (JDI/JIG) scales, compared to faculty job satisfaction levels of Eastern Tennessee Community Colleges in the USA. Out of 738 academic staff of Moi invited to participate, 480 survey questionnaires were found to be usable for this study, yielding a response rate of 65%. Results of t-test for independent samples showed that Moi University staff were more satisfied with pay (p=.042), while Eastern Tennessee State staff had higher satisfaction with the JDI facet work on present job (p=.021). There were no significant differences between the two universities on the other JDI/JIG scales of opportunities for promotion, supervision, people on your present job and job in general. The study also investigated the effects of rank, tenure and years of job experience on the facets of job satisfaction for Moi University academic staff , using one-way analysis of variance (ANOVA) and Tukey’s post hoc multiple comparison, regression analysis. A statistically significant difference on pay and opportunities for promotion was found among academic ranks (p=.018; p=.017 respectively) at Moi University. Professors (M=32.3) were significantly more satisfied with pay than were senior lectures (M=24.4) and lecturers (M=23.5). Associate professors were significantly more satisfied with opportunities for promotion than were lecturers (M=29.4 versus M=22.8 respectively). Non-tenured academic staff had a higher mean score (M=29.4) compared to tenured academic staff (M=24.4) indicating they were more satisfied with pay than tenured staff. Results of this research can be used by Moi University to target interventions to specific subgroups, by rank, tenure, and experience, for specific facets of job satisfaction. Qualitative research could provide more insight into the reasons for staff satisfaction levels at Moi. The present comparison of one Kenyan university and one USA University can be expanded to additional institutions for more insight into cross-cultural differences. A model from Consciousness-based Education is presented which suggested a fundamental approach to job satisfaction by reducing stress and improving creativity. The influence of consumer knowledge on willingness to pay for non-genetically modified foods in Taiwan: A structural equation model. Genetically modified (GM) food and crops became commercially available in 1994. Since then, widespread debates and controversies about the use of biotechnology in food production have emerged, mostly in western countries. This study examined willingness to pay for non-GM food in a Taiwan sample. In conjunction with this, the theory of planned behavior (TPB) was evaluated to determine the relative importance of factors influencing purchasing behavior. In this study, Ajzen’s TPB model was extended to comprise two more constructs related to willingness to pay ( WTP ) for non-GM food. These two added factors were Knowledge about GM food and Self-identity . Distinguishing from previous TPB studies, this study employs path analysis to further explain the causal relationship in the model. A saturated TPB model was tested and an augmented TPB model was found to be a better framework in explaining influences on behavioral intentions. Results indicated that the majority of respondents were willing to pay a 30% premium to avoid GM tofu. The total effects of Knowledge and PBC on WTP were negative and significant indicating that more knowledge about GM food and more perceived behavior control over choosing non-GM food result in willingness to pay more for avoiding GM food. The total effects of Self-identity and Subjective Norms on WTP were positive and significant indicating that one’s self-identity and perceived social pressure about eating non-GM food positively influence his or her willingness to pay for non-GM food. Furthermore, consumers’ knowledge about GM food positively influences their attitude and intentions toward non-GM food. These findings unequivocally substantiate that there is a demand for non-GM foods in Taiwan. This demand calls for alternative agriculture such as Maharishi Vedic Organic Agriculture which is introduced in this study. Increased attention is being paid to supply chain partnerships in which trust has been recognized as a key influencing factor. Empirical studies have established that partnerships amongst companies based on trust avoid opportunism in the supply chain, reduce purchasing cost, and improve profitability. Despite the importance of `trust’ in improving the bottom-line for organizations, there is little work done on how to proactively develop trust between supply chain partners. Most of the existing work has held the view that trust develops over time as companies continue to work with each other, thus relying on a reactive process of self-selection. Predominantly, the topic has been approached from the viewpoint of what the trustee needs to do to promote trust development within a relationship. The existing literature does not make any reference to how a trustor’s own disposition to trust (DTT) may impact the development of trust. The primary objective of this research was to develop a conceptual model linking the self-development technique, Transcendental Meditation, to an individual’s temperament, of which DTT is an important manifestation/component. The aim here was to provide a path to connect the regular practice of TM to DTT, thus navigating through other intervening constructs such as higher states of consciousness, trait anxiety, and trait emotional intelligence. The model was empirically tested by collecting data, using a self-administered survey, from 387 respondents. The participants were from 26 service and manufacturing companies that were randomly selected from Fairfield (Iowa) Area Chamber of Commerce. Due to the early stages of theory development, Partial Least Square technique was used to test the model. The results provide strong support for the proposed hypothesis and the model, indicating that the regular practice of the TM technique cultivates a higher disposition to trust. The study also provides empirical support for the path through which the regular practice of TM manifests into DTT. These findings emphasize the importance of introducing TM practice in organizations to help develop greater trust internally among employees and externally with other partnering organizations. Popular reports indicate that training in meditation is being introduced into corporations worldwide, yet systematic analyses of such programs are rare. Three case studies document the experiences and perceptions of members of top management teams who learned the Maharishi Transcendental MeditationÎ technique in the context of corporate-supported programs. The cases were generated using semi-structured interviews based on open-ended questionnaires conducted with 24 persons in managerial positions from a Norwegian company in the oil and gas industry, a British computer sales subsidiary, and a Swedish firm in the field of power transmission, and their consultants. The study revealed the series of decisions that the managers undertook in authorizing and sponsoring the Maharishi Corporate Development Program and in their personal decisions and strategies about when, where and how often to practice the Transcendental Meditation technique and how to interpret its effects. The managers indicated that (1) their personal experiences resulting from practice of the Transcendental Meditation technique and (2) systemic development of the management team were important factors in their decision to practice this technique on a regular basis. Individual-level changes reported across the three cases included improved mental functioning, health and health-related habits, work relations, and performance, emotional growth and more enjoyable family life, which contribute to development of the management team. Team-level changes reported across the three cases included improved communication, increased mutual acceptance and awareness of company needs and values, fewer arguments, move to fact-based decision-making, greater trust, openness, and happiness, and greater team cohesiveness and alignment. The personal outcomes reported by the managers are consistent with extensive published findings on the Transcendental Meditation program in the general population and indicate that the Maharishi Corporate Development Program meets the criteria described in the management literature for an effective leadership and team development program. According to Maharishi’s Absolute Theory of Management, these comprehensive changes spontaneously result from unfolding the organizing power of Natural Law in the awareness of the manager through practice of the Transcendental Meditation technique. Public concerns about rising health costs and deteriorating quality of service in the US have become a serious issue. The Institute of Medicine ( IOM) report brought out the need for overhauling the US Healthcare thoroughly. This report recommended that healthcare executives should focus on performance improvement, driven by process, data, and evidence rather than relying on technology or working harder. Healthcare organizations face multiple objectives and constraints, while implementing performance improvement. The design of the current study was nonexperimental and the study analyzed available archival data on patient satisfaction, process of care quality measures and outcome of care measures. The study tested nine research hypotheses about the relationships between these measures. The study also brought out the main components contributing to patient satisfaction and process of care quality measures. The study used the public data on US hospitals, downloaded from the CMS database, maintained by the Center for Medicare and Medicaid services, a federal government agency. Data from over 4,500 hospitals were used in the analysis. The major findings are summarized as follows: 1. Five components of patient satisfaction were identified and the implications to hospitals were discussed. 2. Nine research hypotheses were tested, and the evidence was mixed. 3. Mean outcome rates in Church owned hospitals were significantly better than the other seven groups and definitely not worse. 4. Evidence was mixed for negative association between patient satisfaction and outcomes. 5. Evidence was mixed for negative association between process of care quality and outcomes. The study found some empirical evidence for encouraging hospitals to adopt the qualities “friendship, compassion, joy of serving and equanimity” advocated by the ancient Vedic physician Charaka as the prime qualities required by healthcare professionals. The study has many strengths such as identifying the principal components of satisfaction and quality, using the complete CMS data on US hospitals and obtaining some empirical evidence on the relationships between satisfaction, process-of-care quality and the outcomes. Some empirical evidence was also obtained on the need for qualities like compassion among healthcare staff. The study findings are limited by the reliability of the archival data used. Statistical conclusion validity issues were adequately controlled during testing, by adopting diagnostic techniques. However, ambiguity of temporal precedence between outcomes and process of care quality measures is a threat to the internal validity of testing their relationship. A subsequent larger study requiring support from CMS is proposed. The study findings will assist hospitals in their performance improvement activities. Information technology has made virtual working environments possible and brought innovation in business processes. Because organizations are becoming more and more engaged with information technology and development of virtual workforces, solving the problem of how to best measure and map virtual workers’ goal setting, empowerment and effective communications within global organizations has become of critical importance. The objective of this empirical study was to determine whether the variables goal setting (G), empowerment (E), and communication (C), both individually and in concert, contributed to improve virtual work performance (vwp). In this study, the virtual workforce is conceptualized as a self-organizing system. The variables of G, E, and C are the hypothesized predictors of a virtual intelligence (VI) framework that facilitate and support the process of self-organization of the virtual workforce effective performance. This quantitative study used survey data obtained from an international technology company (ITC). Sample consisted of 113 employees of an ITC in Brazil. The survey provided data for scoring the subjects’ self-perceived virtual work performance, goal setting, empowerment, and communication. The self-reported questionnaire was measured on a Liken scale based on data from a survey instrument with 33 questions. Tests showed that the reliability and validity of the instrument were adequate. Multiple regression analysis found a significant, positive effect of increased goal setting, empowerment and communication scores on self-assessed virtual worker performance (p=0.001), as well as a significant, positive effect on performance of a simultaneous increase of all three determinants (p=0.001). Sensitivity analysis and extensive diagnostic checks supported the statistical conclusion validity of these empirical findings. Thus, these results provided empirical support for the hypothesis that an increase in goal, empowerment, and communication can enhance performance of virtual workers. The implications of the findings provided an important step toward developing new strategies for evaluating the effective performance of workers engaged in a virtual environment. Moreover, this study reviews previous research that suggests that incorporating experience of the unified field, pure creative intelligence through the practice of the Maharishi Transcendental Meditation technique by individuals working in teams should have a positive effect on virtual team performance. Development economics based on natural law: A comprehensive solution to the five faces of poverty through the principles of Maharishi’s program to eliminate poverty in the world. Poverty plagues the world, causing extreme suffering for millions of men, women, and children. Governments and institution have striven to eradicate world poverty in the last fifty years with continued overall failure. Despite poverty alleviation efforts, the number of people living in abject poverty in the last decade has increased by 100 million with a fifth (1.2 billion) living below the poverty line for developing nations of $1 a day and almost half (2.8 billion) living on less than $2 a day. Understanding five primary faces of poverty—(1) material well-being, (2) health, (3) education, (4) vulnerability, and (5) powerlessness—highlights the need for a comprehensive solution. This study analyzes a new paradigm toward development economics presented by Maharishi Mahesh Yogi. It reviews Maharishi’s Program to Eliminate Poverty in the World in light of the five faces of poverty. Maharishi’s program offers a unique approach to permanently eradicate world poverty through Consciousness-Based, Natural Law-Based, human and agricultural development. Maharishi locates the source of poverty in violation of Natural Law caused by lack of adequate education. The solution lies in Consciousness-Based education, which teaches all disciplines of knowledge in light of the experience and understanding of the Unified Field of Natural Law, pure consciousness, the Self. The program addresses poverty through Maharishi Vedic Economy, emphasizing the development of individual consciousness toward higher states of consciousness and developing coherence in collective consciousness to train the poor to function in harmony with Natural Law. Scientific research documenting the effectiveness of Maharishi Vedic Technologies—the Transcendental Meditation and TM-Sidhi programs and the Maharishi Effect—is summarized for each face of poverty, supporting the program’s Consciousness-Based human and agricultural development approaches toward poverty removal. This dissertation identifies 11 key principles of Maharishi Vedic Economy and the strengths and opportunities of Maharishi’s program. It contrasts principles of the program with principles from development economics. The analysis concludes that Maharishi’s program, based on fundamental Vedic Principles, provides a comprehensive and synergistic approach toward eradicating the five faces of poverty. Maharishi’s Program to Eliminate Poverty in the World is recommended to every nation, particularly those suffering abject poverty. Recent scholarship about managing in China has argued that a Chinese management theory needs to be developed in a Chinese Confucianism-based context. In the past centuries, Confucianism had influenced Chinese people dramatically. In order to understand Chinese employees in workplace, taking Confucianism into account was a necessary step. However, the majority of companies in China took and adapted Western-based management theories to deal with their Chinese employees. Empowerment is a Western-based management theory, which is different from the concept of authority in Confucianism. This study used a qualitative approach to explore that how Chinese mid-level managers think about and cooperate with their managers (Chinese and expatriate managers) in the workplace. Data was collected through 14 interviews with Chinese mid-level managers in two types of companies in China – Chinese-based companies and foreign-invested companies. Interview responses were coded in categories through several revisions. “The Analects of Confucius” was reviewed in order to get a better understanding of Confucian values, and specific values from the Analects were matched to each of the categories. The final result of data analysis was a framework of 11 principles. Ten principles were found to be common to both types of companies. An eleventh principle, trust, was different for mid-level managers with foreign superiors than for those with Chinese superiors. The results of this research suggested that Confucian values still have a strong impact on Chinese people’s behaviors, so in order to manage Chinese employees effectively, it is necessary to understand Confucian values. Based on the results, a Confucian-based management framework was constructed to guide managers to be effective in working with employees in China and all the countries have been influenced by Confucianism. This study created a greater picture for the managers (Chinese and expatriate managers) to understand the Confucian-based behaviors of Chinese employees in the workplace and might lead to more effective management results. It might also contribute to develop of a Chinese theory of management – grounded in qualitative evidences from managers in China. The present research aims to explore the empirical relation between corporate social responsibility (CSR) and corporate financial performance (CFP) in China using a sample of 608 firms in 2015. Using data from 2014 to 2016 for these same companies, this study also examines if prior CSR was associated with subsequent CFP and if prior CFP was associated with subsequent CSR. Data from RKS, a Chinese ranking agency, was used to measure CSR. The financial performance measures used were return on assets (ROA) and earning per share (EPS), based on data from the CSMAR database of audited financial statements of companies traded on the Shenzhen and Shanghai stock exchanges. Sequential regression analysis was used to test the relationship between total CSR rating scores from RKS database and ROA and EPS in the same year, 2015, with control variable of firm size. The results showed that there was a significant relationship between CSR and CFP. Whether a relationship exists between prior social responsibility in 2014 and subsequent financial performance in 2016, and also between prior financial performance in 2014 and subsequent CSR performance in 2016, have also been tested by linear sequential regression analysis. These results found that prior CSR was associated with subsequent ROA and EPS, and also that better prior ROA were associated with greater subsequent CSR. There was no relationship between prior EPS and subsequent CSR. Additionally, Pearson correlation was used to examine the correlation between two Chinese CSR agencies, RKS and CASS; the results showed that there is a moderate correlation (r = 39.6) between them. The final chapter of this dissertation presents a theoretical discussion of consciousness-based, authentic vision and values as the foundations of responsible management which can lead to both CSR and CFP. Abstract Meta-analyses concerning the relationship between corporate social responsibility (CSR) and corporate financial performance (CFP) have generally found a positive relationship. Yet some studies have found that there is a negative or no relationship. The present research aims to explore the CSR-CFP relationship in the context of China, where prior research has been inconclusive and has had methodological limitations. This study used a knowledgeable ranking agency — the Research Center of Corporate Social Responsibility Chinese Academy of Social Sciences (CASS) – to measure four dimensions of CSR. The financial performance measures used were return on assets, return on equity and Tobin’s Q. The research was conducted on the 300 companies which had 2013 CASS-CSR reports and also had public financial performance data for the same year. Sequential regression analysis was used to test the hypothesis that CSR would be associated with the financial performance controlling for industry and firm size. This analysis found no significant relationship between CSR and financial performance. Furthermore, this study also employed ANCOVA to examine whether there is a difference in financial performance between companies that disclose the CSR information and companies that do not disclose. The findings revealed that the companies which had completed CASS-CSR reports have significantly a better financial performance in return on assets, return on equity and Tobin’s Q compared to the companies which did not complete CASS-CSR reports. Why was a relationship not found in this study of Chinese companies? The first possible explanation is that CSR reports in China can be symbolic gestures to create goodwill with government. The relatively low CSR mean scores seen in our data suggest that the CSR practice of these companies is not highly developed. The second possible explanation that CSR-CFP relationship between is less evident in developing world because CSR in the developed world will be more visible with a relatively mature institutional system and efficient market mechanism. Further research using data from years after 2013 can investigate if CSR performance is improving over time and if a positive CSR-CFP relationship emerges as market forces evolve. This study employed a quasi-experimental design to compare the experimental group (ISO companies) with the matched control group (non-ISO companies) on the effect of ISO-14001 registration (independent variable) on financial performance (three dependent variables): return on revenue (ROR), return on assets (ROA), and operating revenue (OPR). This study also examined the effects of early adoption, length of registration, and size of companies on the relationship between ISO registration and financial performance. The distribution of data on ISO registration indicated that industries with higher level of resources consumption, or industries with higher levels of pollution (i.e., auto industry 8.88%, chemical industry 8.41%, machinery industry 7.01%, and semiconductors industry 6.54%) were more likely to register for ISO-14001. The experimental group (ISO companies) consisted of the 81 companies from the S&P large cap, mid cap, and small cap indices, which had at least one ISO certificate and for whom at least five years of financial data were available. This study employed analysis of covariance (ANCOVA) as the main tool for statistical analysis. Baseline financial data of two years before registration (T – 2) was used to adjust change scores between T – 2 and T + 2. In addition, because of the violation of equal slope on OPR (for T + 2: F=2.2477, F*=1.9751), multiple analyses of variance (MANOVA) and analysis of variance (ANOVA) were also used. Statistical analyses indicated that registration of ISO-14001 EMS led to lower ROR (p=0.012, N=162, α=0.05); lower ROA (p=0.041, N=162, α=0.05), and no change in OPR (p=0.3689, N=162, α=0.05). Early adoption, length of ISO registration, and size of company did not affect the relationship of ISO registration and financial performance. It appears that implementation of ISO-14001 introduced expenses and inefficiency during the period studied. Further research is suggested for more in depth investigation on the quality of implementation of ISO-14001 EMS, rather than a simple test of the adoption. A model is presented proposing that when EMS is supported by environmental awareness, it will be integrated in business management in a way that can have triple-bottom-line impacts.
2019-04-19T12:57:34Z
https://library.mum.edu/phd-dissertations-by-mum-students/Management
This documentation section is targeted at developers and users who want to understand BPF and XDP in great technical depth. While reading this reference guide may help broaden your understanding of Cilium, it is not a requirement to use Cilium. Please refer to the Getting Started Guides and Concepts for a higher level introduction. BPF is a highly flexible and efficient virtual machine-like construct in the Linux kernel allowing to execute bytecode at various hook points in a safe manner. It is used in a number of Linux kernel subsystems, most prominently networking, tracing and security (e.g. sandboxing). Although BPF exists since 1992, this document covers the extended Berkeley Packet Filter (eBPF) version which has first appeared in Kernel 3.18 and renders the original version which is being referred to as “classic” BPF (cBPF) these days mostly obsolete. cBPF is known to many as being the packet filter language used by tcpdump. Nowadays, the Linux kernel runs eBPF only and loaded cBPF bytecode is transparently translated into an eBPF representation in the kernel before program execution. This documentation will generally refer to the term BPF unless explicit differences between eBPF and cBPF are being pointed out. Even though the name Berkeley Packet Filter hints at a packet filtering specific purpose, the instruction set is generic and flexible enough these days that there are many use cases for BPF apart from networking. See Further Reading for a list of projects which use BPF. Cilium uses BPF heavily in its data path, see Concepts for further information. The goal of this chapter is to provide a BPF reference guide in order to gain understanding of BPF, its networking specific use including loading BPF programs with tc (traffic control) and XDP (eXpress Data Path), and to aid with developing Cilium’s BPF templates. BPF does not define itself by only providing its instruction set, but also by offering further infrastructure around it such as maps which act as efficient key / value stores, helper functions to interact with and leverage kernel functionality, tail calls for calling into other BPF programs, security hardening primitives, a pseudo file system for pinning objects (maps, programs), and infrastructure for allowing BPF to be offloaded, for example, to a network card. LLVM provides a BPF back end, so that tools like clang can be used to compile C into a BPF object file, which can then be loaded into the kernel. BPF is deeply tied to the Linux kernel and allows for full programmability without sacrificing native kernel performance. Last but not least, also the kernel subsystems making use of BPF are part of BPF’s infrastructure. The two main subsystems discussed throughout this document are tc and XDP where BPF programs can be attached to. XDP BPF programs are attached at the earliest networking driver stage and trigger a run of the BPF program upon packet reception. By definition, this achieves the best possible packet processing performance since packets cannot get processed at an even earlier point in software. However, since this processing occurs so early in the networking stack, the stack has not yet extracted metadata out of the packet. On the other hand, tc BPF programs are executed later in the kernel stack, so they have access to more metadata and core kernel functionality. Apart from tc and XDP programs, there are various other kernel subsystems as well which use BPF such as tracing (kprobes, uprobes, tracepoints, etc). The following subsections provide further details on individual aspects of the BPF architecture. BPF is a general purpose RISC instruction set and was originally designed for the purpose of writing programs in a subset of C which can be compiled into BPF instructions through a compiler back end (e.g. LLVM), so that the kernel can later on map them through an in-kernel JIT compiler into native opcodes for optimal execution performance inside the kernel. Making the kernel programmable without having to cross kernel / user space boundaries. For example, BPF programs related to networking, as in the case of Cilium, can implement flexible container policies, load balancing and other means without having to move packets to user space and back into the kernel. State between BPF programs and kernel / user space can still be shared through maps whenever needed. Given the flexibility of a programmable data path, programs can be heavily optimized for performance also by compiling out features that are not required for the use cases the program solves. For example, if a container does not require IPv4, then the BPF program can be built to only deal with IPv6 in order to save resources in the fast-path. In case of networking (e.g. tc and XDP), BPF programs can be updated atomically without having to restart the kernel, system services or containers, and without traffic interruptions. Furthermore, any program state can also be maintained throughout updates via BPF maps. BPF provides a stable ABI towards user space, and does not require any third party kernel modules. BPF is a core part of the Linux kernel that is shipped everywhere, and guarantees that existing BPF programs keep running with newer kernel versions. This guarantee is the same guarantee that the kernel provides for system calls with regard to user space applications. Moreover, BPF programs are portable across different architectures. BPF programs work in concert with the kernel, they make use of existing kernel infrastructure (e.g. drivers, netdevices, tunnels, protocol stack, sockets) and tooling (e.g. iproute2) as well as the safety guarantees which the kernel provides. Unlike kernel modules, BPF programs are verified through an in-kernel verifier in order to ensure that they cannot crash the kernel, always terminate, etc. XDP programs, for example, reuse the existing in-kernel drivers and operate on the provided DMA buffers containing the packet frames without exposing them or an entire driver to user space as in other models. Moreover, XDP programs reuse the existing stack instead of bypassing it. BPF can be considered a generic “glue code” to kernel facilities for crafting programs to solve specific use cases. The execution of a BPF program inside the kernel is always event driven! For example, a networking device which has a BPF program attached on its ingress path will trigger the execution of the program once a packet is received, a kernel address which has a kprobes with a BPF program attached will trap once the code at that address gets executed, then invoke the kprobes callback function for instrumentation which subsequently triggers the execution of the BPF program attached to it. BPF consists of eleven 64 bit registers with 32 bit subregisters, a program counter and a 512 byte large BPF stack space. Registers are named r0 - r10. The operating mode is 64 bit by default, the 32 bit subregisters can only be accessed through special ALU (arithmetic logic unit) operations. The 32 bit lower subregisters zero-extend into 64 bit when they are being written to. Register r10 is the only register which is read-only and contains the frame pointer address in order to access the BPF stack space. The remaining r0 - r9 registers are general purpose and of read/write nature. r0 contains the return value of a helper function call. r1 - r5 hold arguments from the BPF program to the kernel helper function. r6 - r9 are callee saved registers that will be preserved on helper function call. The BPF calling convention is generic enough to map directly to x86_64, arm64 and other ABIs, thus all BPF registers map one to one to HW CPU registers, so that a JIT only needs to issue a call instruction, but no additional extra moves for placing function arguments. This calling convention was modeled to cover common call situations without having a performance penalty. Calls with 6 or more arguments are currently not supported. The helper functions in the kernel which are dedicated to BPF (BPF_CALL_0() to BPF_CALL_5() functions) are specifically designed with this convention in mind. Register r0 is also the register containing the exit value for the BPF program. The semantics of the exit value are defined by the type of program. Furthermore, when handing execution back to the kernel, the exit value is passed as a 32 bit value. Registers r1 - r5 are scratch registers, meaning the BPF program needs to either spill them to the BPF stack or move them to callee saved registers if these arguments are to be reused across multiple helper function calls. Spilling means that the variable in the register is moved to the BPF stack. The reverse operation of moving the variable from the BPF stack to the register is called filling. The reason for spilling/filling is due to the limited number of registers. Upon entering execution of a BPF program, register r1 initially contains the context for the program. The context is the input argument for the program (similar to argc/argv pair for a typical C program). BPF is restricted to work on a single context. The context is defined by the program type, for example, a networking program can have a kernel representation of the network packet (skb) as the input argument. The general operation of BPF is 64 bit to follow the natural model of 64 bit architectures in order to perform pointer arithmetics, pass pointers but also pass 64 bit values into helper functions, and to allow for 64 bit atomic operations. The maximum instruction limit per program is restricted to 4096 BPF instructions, which, by design, means that any program will terminate quickly. Although the instruction set contains forward as well as backward jumps, the in-kernel BPF verifier will forbid loops so that termination is always guaranteed. Since BPF programs run inside the kernel, the verifier’s job is to make sure that these are safe to run, not affecting the system’s stability. This means that from an instruction set point of view, loops can be implemented, but the verifier will restrict that. However, there is also a concept of tail calls that allows for one BPF program to jump into another one. This, too, comes with an upper nesting limit of 32 calls, and is usually used to decouple parts of the program logic, for example, into stages. The instruction format is modeled as two operand instructions, which helps mapping BPF instructions to native instructions during JIT phase. The instruction set is of fixed size, meaning every instruction has 64 bit encoding. Currently, 87 instructions have been implemented and the encoding also allows to extend the set with further instructions when needed. The instruction encoding of a single 64 bit instruction on a big-endian machine is defined as a bit sequence from most significant bit (MSB) to least significant bit (LSB) of op:8, dst_reg:4, src_reg:4, off:16, imm:32. off and imm is of signed type. The encodings are part of the kernel headers and defined in linux/bpf.h header, which also includes linux/bpf_common.h. op defines the actual operation to be performed. Most of the encoding for op has been reused from cBPF. The operation can be based on register or immediate operands. The encoding of op itself provides information on which mode to use (BPF_X for denoting register-based operations, and BPF_K for immediate-based operations respectively). In the latter case, the destination operand is always a register. Both dst_reg and src_reg provide additional information about the register operands to be used (e.g. r0 - r9) for the operation. off is used in some instructions to provide a relative offset, for example, for addressing the stack or other buffers available to BPF (e.g. map values, packet data, etc), or jump targets in jump instructions. imm contains a constant / immediate value. BPF_LD, BPF_LDX: Both classes are for load operations. BPF_LD is used for loading a double word as a special instruction spanning two instructions due to the imm:32 split, and for byte / half-word / word loads of packet data. The latter was carried over from cBPF mainly in order to keep cBPF to BPF translations efficient, since they have optimized JIT code. For native BPF these packet load instructions are less relevant nowadays. BPF_LDX class holds instructions for byte / half-word / word / double-word loads out of memory. Memory in this context is generic and could be stack memory, map value data, packet data, etc. BPF_ST, BPF_STX: Both classes are for store operations. Similar to BPF_LDX the BPF_STX is the store counterpart and is used to store the data from a register into memory, which, again, can be stack memory, map value, packet data, etc. BPF_STX also holds special instructions for performing word and double-word based atomic add operations, which can be used for counters, for example. The BPF_ST class is similar to BPF_STX by providing instructions for storing data into memory only that the source operand is an immediate value. BPF_ALU, BPF_ALU64: Both classes contain ALU operations. Generally, BPF_ALU operations are in 32 bit mode and BPF_ALU64 in 64 bit mode. Both ALU classes have basic operations with source operand which is register-based and an immediate-based counterpart. Supported by both are add (+), sub (-), and (&), or (|), left shift (<<), right shift (>>), xor (^), mul (*), div (/), mod (%), neg (~) operations. Also mov (<X> := <Y>) was added as a special ALU operation for both classes in both operand modes. BPF_ALU64 also contains a signed right shift. BPF_ALU additionally contains endianness conversion instructions for half-word / word / double-word on a given source register. BPF_JMP: This class is dedicated to jump operations. Jumps can be unconditional and conditional. Unconditional jumps simply move the program counter forward, so that the next instruction to be executed relative to the current instruction is off + 1, where off is the constant offset encoded in the instruction. Since off is signed, the jump can also be performed backwards as long as it does not create a loop and is within program bounds. Conditional jumps operate on both, register-based and immediate-based source operands. If the condition in the jump operations results in true, then a relative jump to off + 1 is performed, otherwise the next instruction (0 + 1) is performed. This fall-through jump logic differs compared to cBPF and allows for better branch prediction as it fits the CPU branch predictor logic more naturally. Available conditions are jeq (==), jne (!=), jgt (>), jge (>=), jsgt (signed >), jsge (signed >=), jlt (<), jle (<=), jslt (signed <), jsle (signed <=) and jset (jump if DST & SRC). Apart from that, there are three special jump operations within this class: the exit instruction which will leave the BPF program and return the current value in r0 as a return code, the call instruction, which will issue a function call into one of the available BPF helper functions, and a hidden tail call instruction, which will jump into a different BPF program. The Linux kernel is shipped with a BPF interpreter which executes programs assembled in BPF instructions. Even cBPF programs are translated into eBPF programs transparently in the kernel, except for architectures that still ship with a cBPF JIT and have not yet migrated to an eBPF JIT. Currently x86_64, arm64, ppc64, s390x, mips64, sparc64 and arm architectures come with an in-kernel eBPF JIT compiler. All BPF handling such as loading of programs into the kernel or creation of BPF maps is managed through a central bpf() system call. It is also used for managing map entries (lookup / update / delete), and making programs as well as maps persistent in the BPF file system through pinning. Helper functions are a concept which enables BPF programs to consult a core kernel defined set of function calls in order to retrieve / push data from / to the kernel. Available helper functions may differ for each BPF program type, for example, BPF programs attached to sockets are only allowed to call into a subset of helpers compared to BPF programs attached to the tc layer. Encapsulation and decapsulation helpers for lightweight tunneling constitute an example of functions which are only available to lower tc layers, whereas event output helpers for pushing notifications to user space are available to tc and XDP programs. The calling convention as described in the previous section applies to all BPF helper functions. There are various advantages of this approach: while cBPF overloaded its load instructions in order to fetch data at an impossible packet offset to invoke auxiliary helper functions, each cBPF JIT needed to implement support for such a cBPF extension. In case of eBPF, each newly added helper function will be JIT compiled in a transparent and efficient way, meaning that the JIT compiler only needs to emit a call instruction since the register mapping is made in such a way that BPF register assignments already match the underlying architecture’s calling convention. This allows for easily extending the core kernel with new helper functionality. All BPF helper functions are part of the core kernel and cannot be extended or added through kernel modules. The aforementioned function signature also allows the verifier to perform type checks. The above struct bpf_func_proto is used to hand all the necessary information which need to be known about the helper to the verifier, so that the verifier can make sure that the expected types from the helper match the current contents of the BPF program’s analyzed registers. Argument types can range from passing in any kind of value up to restricted contents such as a pointer / size pair for the BPF stack buffer, which the helper should read from or write to. In the latter case, the verifier can also perform additional checks, for example, whether the buffer was previously initialized. The list of available BPF helper functions is rather long and constantly growing, for example, at the time of this writing, tc BPF programs can choose from 38 different BPF helpers. The kernel’s struct bpf_verifier_ops contains a get_func_proto callback function that provides the mapping of a specific enum bpf_func_id to one of the available helpers for a given BPF program type. Maps are efficient key / value stores that reside in kernel space. They can be accessed from a BPF program in order to keep state among multiple BPF program invocations. They can also be accessed through file descriptors from user space and can be arbitrarily shared with other BPF programs or user space applications. BPF programs which share maps with each other are not required to be of the same program type, for example, tracing programs can share maps with networking programs. A single BPF program can currently access up to 64 different maps directly. Map implementations are provided by the core kernel. There are generic maps with per-CPU and non-per-CPU flavor that can read / write arbitrary data, but there are also a few non-generic maps that are used along with helper functions. Generic maps currently available are BPF_MAP_TYPE_HASH, BPF_MAP_TYPE_ARRAY, BPF_MAP_TYPE_PERCPU_HASH, BPF_MAP_TYPE_PERCPU_ARRAY, BPF_MAP_TYPE_LRU_HASH, BPF_MAP_TYPE_LRU_PERCPU_HASH and BPF_MAP_TYPE_LPM_TRIE. They all use the same common set of BPF helper functions in order to perform lookup, update or delete operations while implementing a different backend with differing semantics and performance characteristics. Non-generic maps that are currently in the kernel are BPF_MAP_TYPE_PROG_ARRAY, BPF_MAP_TYPE_PERF_EVENT_ARRAY, BPF_MAP_TYPE_CGROUP_ARRAY, BPF_MAP_TYPE_STACK_TRACE, BPF_MAP_TYPE_ARRAY_OF_MAPS, BPF_MAP_TYPE_HASH_OF_MAPS. For example, BPF_MAP_TYPE_PROG_ARRAY is an array map which holds other BPF programs, BPF_MAP_TYPE_ARRAY_OF_MAPS and BPF_MAP_TYPE_HASH_OF_MAPS both hold pointers to other maps such that entire BPF maps can be atomically replaced at runtime. These types of maps tackle a specific issue which was unsuitable to be implemented solely through a BPF helper function since additional (non-data) state is required to be held across BPF program invocations. User space applications can make use of most file descriptor related APIs, file descriptor passing for Unix domain sockets work transparently, etc, but at the same time, file descriptors are limited to a processes’ lifetime, which makes options like map sharing rather cumbersome to carry out. Thus, it brings a number of complications for certain use cases such as iproute2, where tc or XDP sets up and loads the program into the kernel and terminates itself eventually. With that, also access to maps is unavailable from user space side, where it could otherwise be useful, for example, when maps are shared between ingress and egress locations of the data path. Also, third party applications may wish to monitor or update map contents during BPF program runtime. To overcome this limitation, a minimal kernel space BPF file system has been implemented, where BPF map and programs can be pinned to, a process called object pinning. The BPF system call has therefore been extended with two new commands which can pin (BPF_OBJ_PIN) or retrieve (BPF_OBJ_GET) a previously pinned object. For instance, tools such as tc make use of this infrastructure for sharing maps on ingress and egress. The BPF related file system is not a singleton, it does support multiple mount instances, hard and soft links, etc. Another concept that can be used with BPF is called tail calls. Tail calls can be seen as a mechanism that allows one BPF program to call another, without returning back to the old program. Such a call has minimal overhead as unlike function calls, it is implemented as a long jump, reusing the same stack frame. Such programs are verified independently of each other, thus for transferring state, either per-CPU maps as scratch buffers or in case of tc programs, skb fields such as the cb area must be used. Only programs of the same type can be tail called, and they also need to match in terms of JIT compilation, thus either JIT compiled or only interpreted programs can be invoked, but not mixed together. There are two components involved for carrying out tail calls: the first part needs to setup a specialized map called program array (BPF_MAP_TYPE_PROG_ARRAY) that can be populated by user space with key / values, where values are the file descriptors of the tail called BPF programs, the second part is a bpf_tail_call() helper where the context, a reference to the program array and the lookup key is passed to. Then the kernel inlines this helper call directly into a specialized BPF instruction. Such a program array is currently write-only from user space side. The kernel looks up the related BPF program from the passed file descriptor and atomically replaces program pointers at the given map slot. When no map entry has been found at the provided key, the kernel will just “fall through” and continue execution of the old program with the instructions following after the bpf_tail_call(). Tail calls are a powerful utility, for example, parsing network headers could be structured through tail calls. During runtime, functionality can be added or replaced atomically, and thus altering the BPF program’s execution behavior. Mainstream BPF JIT compilers like x86_64 and arm64 support BPF to BPF calls today with others following in near future. BPF to BPF call is an important performance optimization since it heavily reduces the generated BPF code size and therefore becomes friendlier to a CPU’s instruction cache. The calling convention known from BPF helper function applies to BPF to BPF calls just as well, meaning r1 up to r5 are for passing arguments to the callee and the result is returned in r0. r1 to r5 are scratch registers whereas r6 to r9 preserved across calls the usual way. The maximum number of nesting calls respectively allowed call frames is 8. A caller can pass pointers (e.g. to the caller’s stack frame) down to the callee, but never vice versa. BPF to BPF calls are currently incompatible with the use of BPF tail calls, since the latter requires to reuse the current stack setup as-is, whereas the former adds additional stack frames and thus changes the expected layout for tail calls. BPF JIT compilers emit separate images for each function body and later fix up the function call addresses in the image in a final JIT pass. This has proven to require minimal changes to the JITs in that they can treat BPF to BPF calls as conventional BPF helper calls. The 32 bit mips, ppc and sparc architectures currently have a cBPF JIT compiler. The mentioned architectures still having a cBPF JIT as well as all remaining architectures supported by the Linux kernel which do not have a BPF JIT compiler at all need to run eBPF programs through the in-kernel interpreter. JIT compilers speed up execution of the BPF program significantly since they reduce the per instruction cost compared to the interpreter. Often instructions can be mapped 1:1 with native instructions of the underlying architecture. This also reduces the resulting executable image size and is therefore more instruction cache friendly to the CPU. In particular in case of CISC instruction sets such as x86, the JITs are optimized for emitting the shortest possible opcodes for a given instruction to shrink the total necessary size for the program translation. BPF locks the entire BPF interpreter image (struct bpf_prog) as well as the JIT compiled image (struct bpf_binary_header) in the kernel as read-only during the program’s lifetime in order to prevent the code from potential corruptions. Any corruption happening at that point, for example, due to some kernel bugs will result in a general protection fault and thus crash the kernel instead of allowing the corruption to happen silently. The option CONFIG_ARCH_HAS_SET_MEMORY is not configurable, thanks to which this protection is always built-in. Other architectures might follow in the future. In case of the x86_64 JIT compiler, the JITing of the indirect jump from the use of tail calls is realized through a retpoline in case CONFIG_RETPOLINE has been set which is the default at the time of writing in most modern Linux distributions. In case of /proc/sys/net/core/bpf_jit_harden set to 1 additional hardening steps for the JIT compilation take effect for unprivileged users. This effectively trades off their performance slightly by decreasing a (potential) attack surface in case of untrusted users operating on the system. The decrease in program execution still results in better performance compared to switching to interpreter entirely. Currently, enabling hardening will blind all user provided 32 bit and 64 bit constants from the BPF program when it gets JIT compiled in order to prevent JIT spraying attacks which inject native opcodes as immediate values. This is problematic as these immediate values reside in executable kernel memory, therefore a jump that could be triggered from some kernel bug would jump to the start of the immediate value and then execute these as native instructions. JIT constant blinding prevents this due to randomizing the actual instruction, which means the operation is transformed from an immediate based source operand to a register based one through rewriting the instruction by splitting the actual load of the value into two steps: 1) load of a blinded immediate value rnd ^ imm into a register, 2) xoring that register with rnd such that the original imm immediate then resides in the register and can be used for the actual operation. The example was provided for a load operation, but really all generic operations are blinded. Both programs are semantically the same, only that none of the original immediate values are visible anymore in the disassembly of the second program. At the same time, hardening also disables any JIT kallsyms exposure for privileged users, preventing that JIT image addresses are not exposed to /proc/kallsyms anymore. Moreover, the Linux kernel provides the option CONFIG_BPF_JIT_ALWAYS_ON which removes the entire BPF interpreter from the kernel and permanently enables the JIT compiler. This has been developed as part of a mitigation in the context of Spectre v2 such that when used in a VM-based setting, the guest kernel is not going to reuse the host kernel’s BPF interpreter when mounting an attack anymore. For container-based environments, the CONFIG_BPF_JIT_ALWAYS_ON configuration option is optional, but in case JITs are enabled there anyway, the interpreter may as well be compiled out to reduce the kernel’s complexity. Thus, it is also generally recommended for widely used JITs in case of main stream architectures such as x86_64 and arm64. Last but not least, the kernel offers an option to disable the use of the bpf(2) system call for unprivileged users through the /proc/sys/kernel/unprivileged_bpf_disabled sysctl knob. This is on purpose a one-time kill switch, meaning once set to 1, there is no option to reset it back to 0 until a new kernel reboot. When set only CAP_SYS_ADMIN privileged processes out of the initial namespace are allowed to use the bpf(2) system call from that point onwards. Upon start, Cilium sets this knob to 1 as well. Networking programs in BPF, in particular for tc and XDP do have an offload-interface to hardware in the kernel in order to execute BPF code directly on the NIC. Currently, the nfp driver from Netronome has support for offloading BPF through a JIT compiler which translates BPF instructions to an instruction set implemented against the NIC. This includes offloading of BPF maps to the NIC as well, thus the offloaded BPF program can perform map lookups, updates and deletions. Current user space tooling, introspection facilities and kernel control knobs around BPF are discussed in this section. Note, the tooling and infrastructure around BPF is still rapidly evolving and thus may not provide a complete picture of all available tools. A step by step guide for setting up a development environment for BPF can be found below for both Fedora and Ubuntu. This will guide you through building, installing and testing a development kernel as well as building and installing iproute2. The step of manually building iproute2 and Linux kernel is usually not necessary given that major distributions already ship recent enough kernels by default, but would be needed for testing bleeding edge versions or contributing BPF patches to iproute2 and to the Linux kernel, respectively. Similarly, for debugging and introspection purposes building bpftool is optional, but recommended. If you are running some other Fedora derivative and dnf is missing, try using yum instead. If the git commit history is not of interest, then --depth 1 will clone the tree much faster by truncating the git history only to the most recent commit. There are dozens of tutorials in the Internet on how to build Linux kernels, one good resource is the Kernel Newbies website (https://kernelnewbies.org/KernelBuild) that can be followed with one of the two git trees mentioned above. Make sure that the generated .config file contains the following CONFIG_* entries for running BPF. These entries are also needed for Cilium. Some of the entries cannot be adjusted through make menuconfig. For example, CONFIG_HAVE_EBPF_JIT is selected automatically if a given architecture does come with an eBPF JIT. In this specific case, CONFIG_HAVE_EBPF_JIT is optional but highly recommended. An architecture not having an eBPF JIT compiler will need to fall back to the in-kernel interpreter with the cost of being less efficient executing BPF instructions. For kernel releases 4.16+ the BPF selftest has a dependency on LLVM 6.0+ caused by the BPF function calls which do not need to be inlined anymore. See section BPF to BPF Calls or the cover letter mail from the kernel patch (https://lwn.net/Articles/741773/) for more information. Not every BPF program has a dependency on LLVM 6.0+ if it does not use this new feature. If your distribution does not provide LLVM 6.0+ you may compile it by following the instruction in the LLVM section. If you see any failures, please contact us on Slack with the full test output. Similar to the net (fixes only) and net-next (new features) kernel trees, the iproute2 git tree has two branches, namely master and net-next. The master branch is based on the net tree and the net-next branch is based against the net-next kernel tree. This is necessary, so that changes in header files can be synchronized in the iproute2 tree. Ensure that the configure script shows ELF support: yes, so that iproute2 can process ELF files from LLVM’s BPF back end. libelf was listed in the instructions for installing the dependencies in case of Fedora and Ubuntu earlier. bpftool is an essential tool around debugging and introspection of BPF programs and maps. It is part of the kernel tree and available under tools/bpf/bpftool/. LLVM is currently the only compiler suite providing a BPF back end. gcc does not support BPF at this point. The BPF back end was merged into LLVM’s 3.7 release. Major distributions enable the BPF back end by default when they package LLVM, therefore installing clang and llvm is sufficient on most recent distributions to start compiling C into BPF object files. The typical workflow is that BPF programs are written in C, compiled by LLVM into object / ELF files, which are parsed by user space BPF ELF loaders (such as iproute2 or others), and pushed into the kernel through the BPF system call. The kernel verifies the BPF instructions and JITs them, returning a new file descriptor for the program, which then can be attached to a subsystem (e.g. networking). If supported, the subsystem could then further offload the BPF program to hardware (e.g. NIC). By default, the bpf target uses the endianness of the CPU it compiles on, meaning that if the CPU’s endianness is little endian, the program is represented in little endian format as well, and if the CPU’s endianness is big endian, the program is represented in big endian. This also matches the runtime behavior of BPF, which is generic and uses the CPU’s endianness it runs on in order to not disadvantage architectures in any of the format. For cross-compilation, the two targets bpfeb and bpfel were introduced, thanks to that BPF programs can be compiled on a node running in one endianness (e.g. little endian on x86) and run on a node in another endianness format (e.g. big endian on arm). Note that the front end (clang) needs to run in the target endianness as well. Using bpf as a target is the preferred way in situations where no mixture of endianness applies. For example, compilation on x86_64 results in the same output for the targets bpf and bpfel due to being little endian, therefore scripts triggering a compilation also do not have to be endian aware. Attaching an XDP BPF program to a network device as above requires Linux 4.11 with a device that supports XDP, or Linux 4.12 or later. readelf -a xdp-example.o will dump further information about the ELF file, which can sometimes be useful for introspecting generated section headers, relocation entries and the symbol table. Make sure that --version mentions Optimized build., otherwise the compilation time for programs when having LLVM in debugging mode will significantly increase (e.g. by 10x or more). Furthermore, more recent LLVM versions (>= 4.0) can also store debugging information in dwarf format into the object file. This can be done through the usual workflow by adding -g for compilation. The llvm-objdump tool can then annotate the assembler output with the original C code used in the compilation. The trivial example in this case does not contain much C code, however, the line numbers shown as 0: and 1: correspond directly to the kernel’s verifier log. This means that in case BPF programs get rejected by the verifier, llvm-objdump can help to correlate the instructions back to the original C code, which is highly useful for analysis. Prog section 'prog' loaded (5)! As it can be seen in the verifier analysis, the llvm-objdump output dumps the same BPF assembler code as the kernel. LLVM is able to attach debug information such as the description of used data types in the program to the generated BPF object file. By default this is in DWARF format. A heavily simplified version used by BPF is called BTF (BPF Type Format). The resulting DWARF can be converted into BTF and is later on loaded into the kernel through BPF object loaders. The kernel will then verify the BTF data for correctness and keeps track of the data types the BTF data is containing. BPF maps can then be annotated with key and value types out of the BTF data such that a later dump of the map exports the map data along with the related type information. This allows for better introspection, debugging and value pretty printing. Note that BTF data is a generic debugging data format and as such any DWARF to BTF converted data can be loaded (e.g. kernel’s vmlinux DWARF data could be converted to BTF and loaded). Latter is in particular useful for BPF tracing in the future. dwarfris - Disable MCAsmInfo DwarfUsesRelocationsAcrossSections. The reason using -mattr=dwarfris is because the flag dwarfris (dwarf relocation in section) disables DWARF cross-section relocations between DWARF and the ELF’s symbol table since libdw does not have proper BPF relocation support, and therefore tools like pahole would otherwise not be able to properly dump structures from the object. elfutils (>= 0.173) implements proper BPF relocation support and therefore the same can be achieved without the -mattr=dwarfris option. Dumping the structures from the object file could be done from either DWARF or BTF information. pahole uses the LLVM emitted DWARF information at this point, however, future pahole versions could rely on BTF if available. BPF loaders such as iproute2 will detect and load the BTF section, so that BPF maps can be annotated with type information. LLVM by default uses the BPF base instruction set for generating code in order to make sure that the generated object file can also be loaded with older kernels such as long-term stable kernels (e.g. 4.9+). However, LLVM has a -mcpu selector for the BPF back end in order to select different versions of the BPF instruction set, namely instruction set extensions on top of the BPF base instruction set in order to generate more efficient and smaller code. generic - Select the generic processor. probe - Select the probe processor. v1 - Select the v1 processor. v2 - Select the v2 processor. The generic processor is the default processor, which is also the base instruction set v1 of BPF. Options v1 and v2 are typically useful in an environment where the BPF program is being cross compiled and the target host where the program is loaded differs from the one where it is compiled (and thus available BPF kernel features might differ as well). The recommended -mcpu option which is also used by Cilium internally is -mcpu=probe! Here, the LLVM BPF back end queries the kernel for availability of BPF instruction set extensions and when found available, LLVM will use them for compiling the BPF program whenever appropriate. Generally, LLVM IR generation is architecture independent. There are however a few differences when using clang -target bpf versus leaving -target bpf out and thus using clang’s default target which, depending on the underlying architecture, might be x86_64, arm64 or others. BPF programs may recursively include header file(s) with file scope inline assembly codes. The default target can handle this well, while bpf target may fail if bpf backend assembler does not understand these assembly codes, which is true in most cases. When compiled without -g, additional elf sections, e.g., .eh_frame and .rela.eh_frame, may be present in the object file with default target, but not with bpf target. The default target may turn a C switch statement into a switch table lookup and jump operation. Since the switch table is placed in the global read-only section, the bpf program will fail to load. The bpf target does not support switch table optimization. The clang option -fno-jump-tables can be used to disable switch table generation. For clang -target bpf, it is guaranteed that pointer or long / unsigned long types will always have a width of 64 bit, no matter whether underlying clang binary or default target (or kernel) is 32 bit. However, when native clang target is used, then it will compile these types based on the underlying architecture’s conventions, meaning in case of 32 bit architecture, pointer or long / unsigned long types e.g. in BPF context structure will have width of 32 bit while the BPF LLVM back end still operates in 64 bit. The native target is mostly needed in tracing for the case of walking the kernel’s struct pt_regs that maps CPU registers, or other kernel structures where CPU’s register width matters. In all other cases such as networking, the use of clang -target bpf is the preferred choice. w register, meaning 32-bit subregister, will be used instead of 64-bit r register. Enable 32-bit subregisters might help reducing type extension instruction sequences. It could also help kernel eBPF JIT compiler for 32-bit architectures for which registers pairs are used to model the 64-bit eBPF registers and extra instructions are needed for manipulating the high 32-bit. Given read from 32-bit subregister is guaranteed to read from low 32-bit only even though write still needs to clear the high 32-bit, if the JIT compiler has known the definition of one register only has subregister reads, then instructions for setting the high 32-bit of the destination could be eliminated. Note inline assembly for BPF is currently unsupported. Everything needs to be inlined, there are no function calls (on older LLVM versions) or shared library calls available. Shared libraries, etc cannot be used with BPF. However, common library code used in BPF programs can be placed into header files and included in the main programs. For example, Cilium makes heavy use of it (see bpf/lib/). However, this still allows for including header files, for example, from the kernel or other libraries and reuse their static inline functions or macros / definitions. Unless a recent kernel (4.16+) and LLVM (6.0+) is used where BPF to BPF function calls are supported, then LLVM needs to compile and inline the entire code into a flat sequence of BPF instructions for a given program section. In such case, best practice is to use an annotation like __inline for every library function as shown below. The use of always_inline is recommended, since the compiler could still decide to uninline large functions that are only annotated as inline. In case the latter happens, LLVM will generate a relocation entry into the ELF file, which BPF ELF loaders such as iproute2 cannot resolve and will thus produce an error since only BPF maps are valid relocation entries which loaders can process. Multiple programs can reside inside a single C file in different sections. C programs for BPF make heavy use of section annotations. A C file is typically structured into 3 or more sections. BPF ELF loaders use these names to extract and prepare the relevant information in order to load the programs and maps through the bpf system call. For example, iproute2 uses maps and license as default section name to find metadata needed for map creation and the license for the BPF program, respectively. On program creation time the latter is pushed into the kernel as well, and enables some of the helper functions which are exposed as GPL only in case the program also holds a GPL compatible license, for example bpf_ktime_get_ns(), bpf_probe_read() and others. The remaining section names are specific for BPF program code, for example, the below code has been modified to contain two program sections, ingress and egress. The toy example code demonstrates that both can share a map and common static inline helpers such as the account_data() function. The xdp-example.c example has been modified to a tc-example.c example that can be loaded with tc and attached to a netdevice’s ingress and egress hook. It accounts the transferred bytes into a map called acc_map, which has two map slots, one for traffic accounted on the ingress hook, one on the egress hook. The example also demonstrates a couple of other things which are useful to be aware of when developing programs. The code includes kernel headers, standard C headers and an iproute2 specific header containing the definition of struct bpf_elf_map. iproute2 has a common BPF ELF loader and as such the definition of struct bpf_elf_map is the very same for XDP and tc typed programs. A struct bpf_elf_map entry defines a map in the program and contains all relevant information (such as key / value size, etc) needed to generate a map which is used from the two BPF programs. The structure must be placed into the maps section, so that the loader can find it. There can be multiple map declarations of this type with different variable names, but all must be annotated with __section("maps"). The struct bpf_elf_map is specific to iproute2. Different BPF ELF loaders can have different formats, for example, the libbpf in the kernel source tree, which is mainly used by perf, has a different specification. iproute2 guarantees backwards compatibility for struct bpf_elf_map. Cilium follows the iproute2 model. The example also demonstrates how BPF helper functions are mapped into the C code and being used. Here, map_lookup_elem() is defined by mapping this function into the BPF_FUNC_map_lookup_elem enum value which is exposed as a helper in uapi/linux/bpf.h. When the program is later loaded into the kernel, the verifier checks whether the passed arguments are of the expected type and re-points the helper call into a real function call. Moreover, map_lookup_elem() also demonstrates how maps can be passed to BPF helper functions. Here, &acc_map from the maps section is passed as the first argument to map_lookup_elem(). Since the defined array map is global, the accounting needs to use an atomic operation, which is defined as lock_xadd(). LLVM maps __sync_fetch_and_add() as a built-in function to the BPF atomic add instruction, that is, BPF_STX | BPF_XADD | BPF_W for word sizes. Last but not least, the struct bpf_elf_map tells that the map is to be pinned as PIN_GLOBAL_NS. This means that tc will pin the map into the BPF pseudo file system as a node. By default, it will be pinned to /sys/fs/bpf/tc/globals/acc_map for the given example. Due to the PIN_GLOBAL_NS, the map will be placed under /sys/fs/bpf/tc/globals/. globals acts as a global namespace that spans across object files. If the example used PIN_OBJECT_NS, then tc would create a directory that is local to the object file. For example, different C files with BPF code could have the same acc_map definition as above with a PIN_GLOBAL_NS pinning. In that case, the map will be shared among BPF programs originating from various object files. PIN_NONE would mean that the map is not placed into the BPF file system as a node, and as a result will not be accessible from user space after tc quits. It would also mean that tc creates two separate map instances for each program, since it cannot retrieve a previously pinned map under that name. The acc_map part from the mentioned path is the name of the map as specified in the source code. Thus, upon loading of the ingress program, tc will find that no such map exists in the BPF file system and creates a new one. On success, the map will also be pinned, so that when the egress program is loaded through tc, it will find that such map already exists in the BPF file system and will reuse that for the egress program. The loader also makes sure in case maps exist with the same name that also their properties (key / value size, etc) match. Just like tc can retrieve the same map, also third party applications can use the BPF_OBJ_GET command from the bpf system call in order to create a new file descriptor pointing to the same map instance, which can then be used to lookup / update / delete map elements. As soon as packets pass the em1 device, counters from the BPF map will be increased. There are no global variables allowed. For the reasons already mentioned in point 1, BPF cannot have global variables as often used in normal C programs. However, there is a work-around in that the program can simply use a BPF map of type BPF_MAP_TYPE_PERCPU_ARRAY with just a single slot of arbitrary value size. This works, because during execution, BPF programs are guaranteed to never get preempted by the kernel and therefore can use the single map entry as a scratch buffer for temporary data, for example, to extend beyond the stack limitation. This also functions across tail calls, since it has the same guarantees with regards to preemption. Otherwise, for holding state across multiple BPF program runs, normal BPF maps can be used. There are no const strings or arrays allowed. Defining const strings or other arrays in the BPF C program does not work for the same reasons as pointed out in sections 1 and 3, which is, that relocation entries will be generated in the ELF file which will be rejected by loaders due to not being part of the ABI towards loaders (loaders also cannot fix up such entries as it would require large rewrites of the already compiled BPF sequence). In the future, LLVM might detect these occurrences and early throw an error to the user. The program can then use the macro naturally like printk("skb len:%u\n", skb->len);. The output will then be written to the trace pipe. tc exec bpf dbg can be used to retrieve the messages from there. The use of the trace_printk() helper function has a couple of disadvantages and thus is not recommended for production usage. Constant strings like the "skb len:%u\n" need to be loaded into the BPF stack each time the helper function is called, but also BPF helper functions are limited to a maximum of 5 arguments. This leaves room for only 3 additional variables which can be passed for dumping. Therefore, despite being helpful for quick debugging, it is recommended (for networking programs) to use the skb_event_output() or the xdp_event_output() helper, respectively. They allow for passing custom structs from the BPF program to the perf event ring buffer along with an optional packet sample. For example, Cilium’s monitor makes use of these helpers in order to implement a debugging framework, notifications for network policy violations, etc. These helpers pass the data through a lockless memory mapped per-CPU perf ring buffer, and is thus significantly faster than trace_printk(). Use of LLVM built-in functions for memset()/memcpy()/memmove()/memcmp(). The memcmp() built-in had some corner cases where inlining did not take place due to an LLVM issue in the back end, and is therefore not recommended to be used until the issue is fixed. There are no loops available (yet). The BPF verifier in the kernel checks that a BPF program does not contain loops by performing a depth first search of all possible program paths besides other control flow graph validations. The purpose is to make sure that the program is always guaranteed to terminate. Another possibility is to use tail calls by calling into the same program again and using a BPF_MAP_TYPE_PERCPU_ARRAY map for having a local scratch space. While being dynamic, this form of looping however is limited to a maximum of 32 iterations. In the future, BPF may have some native, but limited form of implementing loops. Partitioning programs with tail calls. Tail calls provide the flexibility to atomically alter program behavior during runtime by jumping from one BPF program into another. In order to select the next program, tail calls make use of program array maps (BPF_MAP_TYPE_PROG_ARRAY), and pass the map as well as the index to the next program to jump to. There is no return to the old program after the jump has been performed, and in case there was no program present at the given map index, then execution continues on the original program. For example, this can be used to implement various stages of a parser, where such stages could be updated with new parsing features during runtime. Another use case are event notifications, for example, Cilium can opt in packet drop notifications during runtime, where the skb_event_output() call is located inside the tail called program. Thus, during normal operations, the fall-through path will always be executed unless a program is added to the related map index, where the program then prepares the metadata and triggers the event notification to a user space daemon. Program array maps are quite flexible, enabling also individual actions to be implemented for programs located in each map index. For example, the root program attached to XDP or tc could perform an initial tail call to index 0 of the program array map, performing traffic sampling, then jumping to index 1 of the program array map, where firewalling policy is applied and the packet either dropped or further processed in index 2 of the program array map, where it is mangled and sent out of an interface again. Jumps in the program array map can, of course, be arbitrary. The kernel will eventually execute the fall-through path when the maximum tail call limit has been reached. When loading this toy program, tc will create the program array and pin it to the BPF file system in the global namespace under jmp_map. Also, the BPF ELF loader in iproute2 will also recognize sections that are marked as __section_tail(). The provided id in struct bpf_elf_map will be matched against the id marker in the __section_tail(), that is, JMP_MAP_ID, and the program therefore loaded at the user specified program array map index, which is 0 in this example. As a result, all provided tail call sections will be populated by the iproute2 loader to the corresponding maps. This mechanism is not specific to tc, but can be applied with any other BPF program type that iproute2 supports (such as XDP, lwt). In this case, the section 1/0 indicates that the looper() function resides in the map id 1 at position 0. The pinned map can be retrieved by a user space applications (e.g. Cilium daemon), but also by tc itself in order to update the map with new programs. Updates happen atomically, the initial entry programs that are triggered first from the various subsystems are also updated atomically. In case iproute2 would update the pinned program array, the graft command can be used. By pointing it to globals/jmp_map, tc will update the map at index / key 0 with a new program residing in the object file new.o under section foo. Limited stack space of maximum 512 bytes. Stack space in BPF programs is limited to only 512 bytes, which needs to be taken into careful consideration when implementing BPF programs in C. However, as mentioned earlier in point 3, a BPF_MAP_TYPE_PERCPU_ARRAY map with a single entry can be used in order to enlarge scratch buffer space. Use of BPF inline assembly possible. There are various front ends for loading BPF programs into the kernel such as bcc, perf, iproute2 and others. The Linux kernel source tree also provides a user space library under tools/lib/bpf/, which is mainly used and driven by perf for loading BPF tracing programs into the kernel. However, the library itself is generic and not limited to perf only. bcc is a toolkit providing many useful BPF programs mainly for tracing that are loaded ad-hoc through a Python interface embedding the BPF C code. Syntax and semantics for implementing BPF programs slightly differ among front ends in general, though. Additionally, there are also BPF samples in the kernel source tree (samples/bpf/) which parse the generated object files and load the code directly through the system call interface. This and previous sections mainly focus on the iproute2 suite’s BPF front end for loading networking programs of XDP, tc or lwt type, since Cilium’s programs are implemented against this BPF loader. In future, Cilium will be equipped with a native BPF loader, but programs will still be compatible to be loaded through iproute2 suite in order to facilitate development and debugging. All BPF program types supported by iproute2 share the same BPF loader logic due to having a common loader back end implemented as a library (lib/bpf.c in iproute2 source tree). The previous section on LLVM also covered some iproute2 parts related to writing BPF C programs, and later sections in this document are related to tc and XDP specific aspects when writing programs. Therefore, this section will rather focus on usage examples for loading object files with iproute2 as well as some of the generic mechanics of the loader. It does not try to provide a complete coverage of all details, but enough for getting started. 1. Loading of XDP BPF object files. Most XDP-enabled drivers today support an atomic replacement of the existing program with a new one without traffic interruption. There is always only a single program attached to an XDP-enabled driver due to performance reasons, hence a chain of programs is not supported. However, as described in the previous section, partitioning of programs can be performed through tail calls to achieve a similar use case when necessary. The ip link command will display an xdp flag if the interface has an XDP program attached. ip link | grep xdp can thus be used to find all interfaces that have XDP running. Further introspection facilities are provided through the detailed view with ip -d link and bpftool can be used to retrieve information about the attached program based on the BPF program ID shown in the ip link dump. In the case of switching a driver’s operation mode from non-XDP to native XDP and vice versa, typically the driver needs to reconfigure its receive (and transmit) rings in order to ensure received packet are set up linearly within a single page for BPF to read and write into. However, once completed, then most drivers only need to perform an atomic replacement of the program itself when a BPF program is requested to be swapped. In total, XDP supports three operation modes which iproute2 implements as well: xdpdrv, xdpoffload and xdpgeneric. xdpdrv stands for native XDP, meaning the BPF program is run directly in the driver’s receive path at the earliest possible point in software. This is the normal / conventional XDP mode and requires driver’s to implement XDP support, which all major 10G/40G/+ networking drivers in the upstream Linux kernel already provide. xdpgeneric stands for generic XDP and is intended as an experimental test bed for drivers which do not yet support native XDP. Given the generic XDP hook in the ingress path comes at a much later point in time when the packet already enters the stack’s main receive path as a skb, the performance is significantly less than with processing in xdpdrv mode. xdpgeneric therefore is for the most part only interesting for experimenting, less for production environments. Last but not least, the xdpoffload mode is implemented by SmartNICs such as those supported by Netronome’s nfp driver and allow for offloading the entire BPF/XDP program into hardware, thus the program is run on each packet reception directly on the card. This provides even higher performance than running in native XDP although not all BPF map types or BPF helper functions are available for use compared to native XDP. The BPF verifier will reject the program in such case and report to the user what is unsupported. Other than staying in the realm of supported BPF features and helper functions, no special precautions have to be taken when writing BPF C programs. When a command like ip link set dev em1 xdp obj [...] is used, then the kernel will attempt to load the program first as native XDP, and in case the driver does not support native XDP, it will automatically fall back to generic XDP. Thus, for example, using explicitly xdpdrv instead of xdp, the kernel will only attempt to load the program as native XDP and fail in case the driver does not support it, which provides a guarantee that generic XDP is avoided altogether. Note that it is not possible to use xdpdrv and xdpgeneric or other modes at the same time, meaning only one of the XDP operation modes must be picked. 2. Loading of tc BPF object files. The first step is to set up a clsact qdisc (Linux queueing discipline). clsact is a dummy qdisc similar to the ingress qdisc, which can only hold classifier and actions, but does not perform actual queueing. It is needed in order to attach the bpf classifier. The clsact qdisc provides two special hooks called ingress and egress, where the classifier can be attached to. Both ingress and egress hooks are located in central receive and transmit locations in the networking data path, where every packet on the device passes through. The ingress hook is called from __netif_receive_skb_core() -> sch_handle_ingress() in the kernel and the egress hook from __dev_queue_xmit() -> sch_handle_egress(). The clsact qdisc is processed lockless from ingress and egress direction and can also be attached to virtual, queue-less devices such as veth devices connecting containers. Next to the hook, the tc filter command selects bpf to be used in da (direct-action) mode. da mode is recommended and should always be specified. It basically means that the bpf classifier does not need to call into external tc action modules, which are not necessary for bpf anyway, since all packet mangling, forwarding or other kind of actions can already be performed inside the single BPF program which is to be attached, and is therefore significantly faster. iproute2’s BPF loader allows for using the same command line syntax across program types, hence the obj prog.o sec foobar is the same syntax as with XDP mentioned earlier. The output of prog.o:[ingress] tells that program section ingress was loaded from the file prog.o, and bpf operates in direct-action mode. The program id and tag is appended for each case, where the latter denotes a hash over the instruction stream which can be correlated with the object file or perf reports with stack traces, etc. Last but not least, the id represents the system-wide unique BPF program identifier that can be used along with bpftool to further inspect or dump the attached BPF program. tc can attach more than just a single BPF program, it provides various other classifiers which can be chained together. However, attaching a single BPF program is fully sufficient since all packet operations can be contained in the program itself thanks to da (direct-action) mode, meaning the BPF program itself will already return the tc action verdict such as TC_ACT_OK, TC_ACT_SHOT and others. For optimal performance and flexibility, this is the recommended usage. In the above show command, tc also displays pref 49152 and handle 0x1 next to the BPF related output. Both are auto-generated in case they are not explicitly provided through the command line. pref denotes a priority number, which means that in case multiple classifiers are attached, they will be executed based on ascending priority, and handle represents an identifier in case multiple instances of the same classifier have been loaded under the same pref. Since in case of BPF, a single program is fully sufficient, pref and handle can typically be ignored. tc BPF programs can also be offloaded if the NIC and driver has support for it similarly as with XDP BPF programs. Netronome’s nfp supported NICs offer both types of BPF offload. Error: TC offload is disabled on net device. The in_hw flag confirms that the program has been offloaded to the NIC. Note that BPF offloads for both tc and XDP cannot be loaded at the same time, either the tc or XDP offload option must be selected. 3. Testing BPF offload interface via netdevsim driver. The netdevsim driver which is part of the Linux kernel provides a dummy driver which implements offload interfaces for XDP BPF and tc BPF programs and facilitates testing kernel changes or low-level user space programs implementing a control plane directly against the kernel’s UAPI. These two workflows are the basic operations to load XDP BPF respectively tc BPF programs with iproute2. There are other various advanced options for the BPF loader that apply both to XDP and tc, some of them are listed here. In the examples only XDP is presented for simplicity. 1. Verbose log output even on success. 2. Load program that is already pinned in BPF file system. When loading BPF programs, iproute2 will automatically detect the mounted file system instance in order to perform pinning of nodes. In case no mounted BPF file system instance was found, then tc will automatically mount it to the default location under /sys/fs/bpf/. By default tc will create an initial directory structure as shown above, where all subsystem users will point to the same location through symbolic links for the globals namespace, so that pinned BPF maps can be reused among various BPF program types in iproute2. In case the file system instance has already been mounted and an existing structure already exists, then tc will not override it. This could be the case for separating lwt, tc and xdp maps in order to not share globals among all. The purpose of this header file is to provide an API for maps and default section names used by programs. It’s a stable contract between iproute2 and BPF programs. The map definition for iproute2 is struct bpf_elf_map. Its members have been covered earlier in the LLVM section of this document. When parsing the BPF object file, the iproute2 loader will walk through all ELF sections. It initially fetches ancillary sections like maps and license. For maps, the struct bpf_elf_map array will be checked for validity and whenever needed, compatibility workarounds are performed. Subsequently all maps are created with the user provided information, either retrieved as a pinned object, or newly created and then pinned into the BPF file system. Next the loader will handle all program sections that contain ELF relocation entries for maps, meaning that BPF instructions loading map file descriptors into registers are rewritten so that the corresponding map file descriptors are encoded into the instructions immediate value, in order for the kernel to be able to convert them later on into map kernel pointers. After that all the programs themselves are created through the BPF system call, and tail called maps, if present, updated with the program’s file descriptors. bpftool is the main introspection and debugging tool around BPF and developed and shipped along with the Linux kernel tree under tools/bpf/bpftool/. The tool can dump all BPF programs and maps that are currently loaded in the system, or list and correlate all BPF maps used by a specific program. Furthermore, it allows to dump the entire map’s key / value pairs, or lookup, update, delete individual ones as well as retrieve a key’s neighbor key in the map. Such operations can be performed based on BPF program or map IDs or by specifying the location of a BPF file system pinned program or map. The tool additionally also offers an option to pin maps or programs into the BPF file system. Note that for each command, bpftool also supports json based output by appending --json at the end of the command line. An additional --pretty improves the output to be more human readable. The program of ID 406 is of type sched_cls (BPF_PROG_TYPE_SCHED_CLS), has a tag of e0362f5bd9163a0a (SHA sum over the instruction sequence), it was loaded by root uid 0 on Apr 09/16:24. The BPF instruction sequence is 11,144 bytes long and the JITed image 7,721 bytes. The program itself (excluding maps) consumes 12,288 bytes that are accounted / charged against user uid 0. And the BPF program uses the BPF maps with IDs 18, 20, 8, 5, 6 and 14. The latter IDs can further be used to get information or dump the map themselves. bpftool correlates BPF map IDs into the instruction stream as shown above as well as calls to BPF helpers or other BPF programs. Note that the xlated instruction dump provides the post-verifier BPF instruction image which means that it dumps the instructions as if they were to be run through the BPF interpreter. In the kernel, the verifier performs various rewrites of the original instructions provided by the BPF loader. BPF to BPF calls are correlated as well for both, interpreter as well as JIT case. In the latter, the tag of the subprogram is shown as call target. In each case, the pc+2 is the pc-relative offset of the call target, which denotes the subprogram. Dumping an entire map is possible through the map dump subcommand which iterates through all present map elements and dumps the key / value pairs. The BPF_ANNOTATE_KV_PAIR() macro forces a map-specific ELF section containing an empty key and value, this enables the iproute2 BPF loader to correlate BTF data with that section and thus allows to choose the corresponding types out of the BTF for loading the map. Lookup, update, delete, and ‘get next key’ operations on the map for specific keys can be performed through bpftool as well. The Linux kernel provides few sysctls that are BPF related and covered in this section. /proc/sys/net/core/bpf_jit_enable: Enables or disables the BPF JIT compiler. As described in subsequent sections, bpf_jit_disasm tool can be used to process debugging traces when the JIT compiler is set to debugging mode (option 2). /proc/sys/net/core/bpf_jit_harden: Enables or disables BPF JIT hardening. Note that enabling hardening trades off performance, but can mitigate JIT spraying by blinding out the BPF program’s immediate values. For programs processed through the interpreter, blinding of immediate values is not needed / performed. /proc/sys/net/core/bpf_jit_kallsyms: Enables or disables export of JITed programs as kernel symbols to /proc/kallsyms so that they can be used together with perf tooling as well as making these addresses aware to the kernel for stack unwinding, for example, used in dumping stack traces. The symbol names contain the BPF program tag (bpf_prog_<tag>). If bpf_jit_harden is enabled, then this feature is disabled. /proc/sys/kernel/unprivileged_bpf_disabled: Enables or disable unprivileged use of the bpf(2) system call. The Linux kernel has unprivileged use of bpf(2) enabled by default, but once the switch is flipped, unprivileged use will be permanently disabled until the next reboot. This sysctl knob is a one-time switch, meaning if once set, then neither an application nor an admin can reset the value anymore. This knob does not affect any cBPF programs such as seccomp or traditional socket filters that do not use the bpf(2) system call for loading the program into the kernel. The Linux kernel ships a BPF selftest suite, which can be found in the kernel source tree under tools/testing/selftests/bpf/. The test suite contains test cases against the BPF verifier, program tags, various tests against the BPF map interface and map types. It contains various runtime tests from C code for checking LLVM back end, and eBPF as well as cBPF asm code that is run in the kernel for testing the interpreter and JITs. flen is the length of the BPF program (here, 6 BPF instructions), and proglen tells the number of bytes generated by the JIT for the opcode image (here, 70 bytes in size). pass means that the image was generated in 3 compiler passes, for example, x86_64 can have various optimization passes to further reduce the image size when possible. image contains the address of the generated JIT image, from and pid the user space application name and PID respectively, which triggered the compilation process. The dump output for eBPF and cBPF JITs is the same format. Alternatively, the tool can also dump related opcodes along with the disassembly. More recently, bpftool adapted the same feature of dumping the BPF JIT image based on a given BPF program ID already loaded in the system (see bpftool section). For performance analysis of JITed BPF programs, perf can be used as usual. As a prerequisite, JITed programs need to be exported through kallsyms infrastructure. Enabling or disabling bpf_jit_kallsyms does not require a reload of the related BPF programs. Next, a small workflow example is provided for profiling BPF programs. A crafted tc BPF program is used for demonstration purposes, where perf records a failed allocation inside bpf_clone_redirect() helper. Due to the use of direct write, bpf_try_make_head_writable() failed, which would then release the cloned skb again and return with an error message. perf thus records all kfree_skb events. The stack trace recorded by perf will then show the bpf_prog_8227addf251b7543() symbol as part of the call trace, meaning that the BPF program with the tag 8227addf251b7543 was related to the kfree_skb event, and such program was attached to netdevice em1 on the ingress hook as shown by tc. The Linux kernel provides various tracepoints around BPF and XDP which can be used for additional introspection, for example, to trace interactions of user space programs with the bpf system call. For the BPF programs, their individual program tag is displayed. The BPF program returned an invalid / unknown XDP action code. The BPF program returned with XDP_ABORTED indicating a non-graceful exit. The BPF program returned with XDP_TX, but there was an error on transmit, for example, due to the port not being up, due to the transmit ring being full, due to allocation failures, etc. Both tracepoint classes can also be inspected with a BPF program itself attached to one or more tracepoints, collecting further information in a map or punting such events to a user space collector through the bpf_perf_event_output() helper, for example. BPF programs and maps are memory accounted against RLIMIT_MEMLOCK similar to perf. The currently available size in unit of system pages which may be locked into memory can be inspected through ulimit -l. The setrlimit system call man page provides further details. The default limit is usually insufficient to load more complex programs or larger BPF maps, so that the BPF system call will return with errno of EPERM. In such situations a workaround with ulimit -l unlimited or with a sufficiently large limit could be performed. The RLIMIT_MEMLOCK is mainly enforcing limits for unprivileged users. Depending on the setup, setting a higher limit for privileged users is often acceptable. At the time of this writing, there are eighteen different BPF program types available, two of the main types for networking are further explained in below subsections, namely XDP BPF programs as well as tc BPF programs. Extensive usage examples for the two program types for LLVM, iproute2 or other tools are spread throughout the toolchain section and not covered here. Instead, this section focuses on their architecture, concepts and use cases. XDP stands for eXpress Data Path and provides a framework for BPF that enables high-performance programmable packet processing in the Linux kernel. It runs the BPF program at the earliest possible point in software, namely at the moment the network driver receives the packet. At this point in the fast-path the driver just picked up the packet from its receive rings, without having done any expensive operations such as allocating an skb for pushing the packet further up the networking stack, without having pushed the packet into the GRO engine, etc. Thus, the XDP BPF program is executed at the earliest point when it becomes available to the CPU for processing. XDP is able to reuse all the upstream developed kernel networking drivers, user space tooling, or even other available in-kernel infrastructure such as routing tables, sockets, etc in BPF helper calls itself. Residing in kernel space, XDP has the same security model as the rest of the kernel for accessing hardware. There is no need for crossing kernel / user space boundaries since the processed packet already resides in the kernel and can therefore flexibly forward packets into other in-kernel entities like namespaces used by containers or the kernel’s networking stack itself. This is particularly relevant in times of Meltdown and Spectre. Punting packets from XDP to the kernel’s robust, widely used and efficient TCP/IP stack is trivially possible, allows for full reuse and does not require maintaining a separate TCP/IP stack as with user space frameworks. The use of BPF allows for full programmability, keeping a stable ABI with the same ‘never-break-user-space’ guarantees as with the kernel’s system call ABI and compared to modules it also provides safety measures thanks to the BPF verifier that ensures the stability of the kernel’s operation. XDP trivially allows for atomically swapping programs during runtime without any network traffic interruption or even kernel / system reboot. XDP allows for flexible structuring of workloads integrated into the kernel. For example, it can operate in “busy polling” or “interrupt driven” mode. Explicitly dedicating CPUs to XDP is not required. There are no special hardware requirements and it does not rely on hugepages. XDP does not require any third party kernel modules or licensing. It is a long-term architectural solution, a core part of the Linux kernel, and developed by the kernel community. XDP is already enabled and shipped everywhere with major distributions running a kernel equivalent to 4.8 or higher and supports most major 10G or higher networking drivers. As a framework for running BPF in the driver, XDP additionally ensures that packets are laid out linearly and fit into a single DMA’ed page which is readable and writable by the BPF program. XDP also ensures that additional headroom of 256 bytes is available to the program for implementing custom encapsulation headers with the help of the bpf_xdp_adjust_head() BPF helper or adding custom metadata in front of the packet through bpf_xdp_adjust_meta(). The framework contains XDP action codes further described in the section below which a BPF program can return in order to instruct the driver how to proceed with the packet, and it enables the possibility to atomically replace BPF programs running at the XDP layer. XDP is tailored for high-performance by design. BPF allows to access the packet data through ‘direct packet access’ which means that the program holds data pointers directly in registers, loads the content into registers, respectively writes from there into the packet. data points to the start of the packet data in the page, and as the name suggests, data_end points to the end of the packet data. Since XDP allows for a headroom, data_hard_start points to the maximum possible headroom start in the page, meaning, when the packet should be encapsulated, then data is moved closer towards data_hard_start via bpf_xdp_adjust_head(). The same BPF helper function also allows for decapsulation in which case data is moved further away from data_hard_start. data_meta initially points to the same location as data but bpf_xdp_adjust_meta() is able to move the pointer towards data_hard_start as well in order to provide room for custom metadata which is invisible to the normal kernel networking stack but can be read by tc BPF programs since it is transferred from XDP to the skb. Vice versa, it can remove or reduce the size of the custom metadata through the same BPF helper function by moving data_meta away from data_hard_start again. data_meta can also be used solely for passing state between tail calls similarly to the skb->cb control block case that is accessible in tc BPF programs. This gives the following relation respectively invariant for the struct xdp_buff packet pointers: data_hard_start <= data_meta <= data < data_end. The BPF program can retrieve queue_index as well as additional data from the netdevice itself such as ifindex, etc. XDP_DROP as the name suggests will drop the packet right at the driver level without wasting any further resources. This is in particular useful for BPF programs implementing DDoS mitigation mechanisms or firewalling in general. The XDP_PASS return code means that the packet is allowed to be passed up to the kernel’s networking stack. Meaning, the current CPU that was processing this packet now allocates a skb, populates it, and passes it onwards into the GRO engine. This would be equivalent to the default packet handling behavior without XDP. With XDP_TX the BPF program has an efficient option to transmit the network packet out of the same NIC it just arrived on again. This is typically useful when few nodes are implementing, for example, firewalling with subsequent load balancing in a cluster and thus act as a hairpinned load balancer pushing the incoming packets back into the switch after rewriting them in XDP BPF. XDP_REDIRECT is similar to XDP_TX in that it is able to transmit the XDP packet, but through another NIC. Another option for the XDP_REDIRECT case is to redirect into a BPF cpumap, meaning, the CPUs serving XDP on the NIC’s receive queues can continue to do so and push the packet for processing the upper kernel stack to a remote CPU. This is similar to XDP_PASS, but with the ability that the XDP BPF program can keep serving the incoming high load as opposed to temporarily spend work on the current packet for pushing into upper layers. Last but not least, XDP_ABORTED which serves denoting an exception like state from the program and has the same behavior as XDP_DROP only that XDP_ABORTED passes the trace_xdp_exception tracepoint which can be additionally monitored to detect misbehavior. Some of the main use cases for XDP are presented in this subsection. The list is non-exhaustive and given the programmability and efficiency XDP and BPF enables, it can easily be adapted to solve very specific use cases. One of the basic XDP BPF features is to tell the driver to drop a packet with XDP_DROP at this early stage which allows for any kind of efficient network policy enforcement with having an extremely low per-packet cost. This is ideal in situations when needing to cope with any sort of DDoS attacks, but also more general allows to implement any sort of firewalling policies with close to no overhead in BPF e.g. in either case as stand alone appliance (e.g. scrubbing ‘clean’ traffic through XDP_TX) or widely deployed on nodes protecting end hosts themselves (via XDP_PASS or cpumap XDP_REDIRECT for good traffic). Offloaded XDP takes this even one step further by moving the already small per-packet cost entirely into the NIC with processing at line-rate. Another major use case of XDP is packet forwarding and load-balancing through either XDP_TX or XDP_REDIRECT actions. The packet can be arbitrarily mangled by the BPF program running in the XDP layer, even BPF helper functions are available for increasing or decreasing the packet’s headroom in order to arbitrarily encapsulate respectively decapsulate the packet before sending it out again. With XDP_TX hairpinned load-balancers can be implemented that push the packet out of the same networking device it originally arrived on, or with the XDP_REDIRECT action it can be forwarded to another NIC for transmission. The latter return code can also be used in combination with BPF’s cpumap to load-balance packets for passing up the local stack, but on remote, non-XDP processing CPUs. Besides policy enforcement, XDP can also be used for hardening the kernel’s networking stack with the help of XDP_DROP case, meaning, it can drop irrelevant packets for a local node right at the earliest possible point before the networking stack sees them e.g. given we know that a node only serves TCP traffic, any UDP, SCTP or other L4 traffic can be dropped right away. This has the advantage that packets do not need to traverse various entities like GRO engine, the kernel’s flow dissector and others before it can be determined to drop them and thus this allows for reducing the kernel’s attack surface. Thanks to XDP’s early processing stage, this effectively ‘pretends’ to the kernel’s networking stack that these packets have never been seen by the networking device. Additionally, if a potential bug in the stack’s receive path got uncovered and would cause a ‘ping of death’ like scenario, XDP can be utilized to drop such packets right away without having to reboot the kernel or restart any services. Due to the ability to atomically swap such programs to enforce a drop of bad packets, no network traffic is even interrupted on a host. Another use case for pre-stack processing is that given the kernel has not yet allocated an skb for the packet, the BPF program is free to modify the packet and, again, have it ‘pretend’ to the stack that it was received by the networking device this way. This allows for cases such as having custom packet mangling and encapsulation protocols where the packet can be decapsulated prior to entering GRO aggregation in which GRO otherwise would not be able to perform any sort of aggregation due to not being aware of the custom protocol. XDP also allows to push metadata (non-packet data) in front of the packet. This is ‘invisible’ to the normal kernel stack, can be GRO aggregated (for matching metadata) and later on processed in coordination with a tc ingress BPF program where it has the context of a skb available for e.g. setting various skb fields. XDP can also be used for cases such as packet monitoring, sampling or any other network analytics, for example, as part of an intermediate node in the path or on end hosts in combination also with prior mentioned use cases. For complex packet analysis, XDP provides a facility to efficiently push network packets (truncated or with full payload) and custom metadata into a fast lockless per CPU memory mapped ring buffer provided from the Linux perf infrastructure to an user space application. This also allows for cases where only a flow’s initial data can be analyzed and once determined as good traffic having the monitoring bypassed. Thanks to the flexibility brought by BPF, this allows for implementing any sort of custom monitoring or sampling. XDP has three operation modes where ‘native’ XDP is the default mode. When talked about XDP this mode is typically implied. This is the default mode where the XDP BPF program is run directly out of the networking driver’s early receive path. Most widespread used NICs for 10G and higher support native XDP already. In the offloaded XDP mode the XDP BPF program is directly offloaded into the NIC instead of being executed on the host CPU. Thus, the already extremely low per-packet cost is pushed off the host CPU entirely and executed on the NIC, providing even higher performance than running in native XDP. This offload is typically implemented by SmartNICs containing multi-threaded, multicore flow processors where a in-kernel JIT compiler translates BPF into native instructions for the latter. Drivers supporting offloaded XDP usually also support native XDP for cases where some BPF helpers may not yet or only be available for the native mode. For drivers not implementing native or offloaded XDP yet, the kernel provides an option for generic XDP which does not require any driver changes since run at a much later point out of the networking stack. This setting is primarily targeted at developers who want to write and test programs against the kernel’s XDP API, and will not operate at the performance rate of the native or offloaded modes. For XDP usage in a production environment either the native or offloaded mode is better suited and the recommended way to run XDP. Since BPF and XDP is evolving quickly in terms of feature and driver support, the following lists native and offloaded XDP drivers as of kernel 4.17. Note that examples for writing and loading XDP programs are included in the toolchain section under the respective tools. XDP for sfc available via out of tree driver as of kernel 4.17, but will be upstreamed soon. (1, 2) Some BPF helper functions such as retrieving the current CPU number will not be available in an offloaded setting. The BPF input context is a sk_buff not a xdp_buff. When the kernel’s networking stack receives a packet, after the XDP layer, it allocates a buffer and parses the packet to store metadata about the packet. This representation is known as the sk_buff. This structure is then exposed in the BPF input context so that BPF programs from the tc ingress layer can use the metadata that the stack extracts from the packet. This can be useful, but comes with an associated cost of the stack performing this allocation and metadata extraction, and handling the packet until it hits the tc hook. By definition, the xdp_buff doesn’t have access to this metadata because the XDP hook is called before this work is done. This is a significant contributor to the performance difference between the XDP and tc hooks. Therefore, BPF programs attached to the tc BPF hook can, for instance, read or write the skb’s mark, pkt_type, protocol, priority, queue_mapping, napi_id, cb array, hash, tc_classid or tc_index, vlan metadata, the XDP transferred custom metadata and various other information. All members of the struct __sk_buff BPF context used in tc BPF are defined in the linux/bpf.h system header. Generally, the sk_buff is of a completely different nature than xdp_buff where both come with advantages and disadvantages. For example, the sk_buff case has the advantage that it is rather straight forward to mangle its associated metadata, however, it also contains a lot of protocol specific information (e.g. GSO related state) which makes it difficult to simply switch protocols by solely rewriting the packet data. This is due to the stack processing the packet based on the metadata rather than having the cost of accessing the packet contents each time. Thus, additional conversion is required from BPF helper functions taking care that sk_buff internals are properly converted as well. The xdp_buff case however does not face such issues since it comes at such an early stage where the kernel has not even allocated an sk_buff yet, thus packet rewrites of any kind can be realized trivially. However, the xdp_buff case has the disadvantage that sk_buff metadata is not available for mangling at this stage. The latter is overcome by passing custom metadata from XDP BPF to tc BPF, though. In this way, the limitations of each program type can be overcome by operating complementary programs of both types as the use case requires. Compared to XDP, tc BPF programs can be triggered out of ingress and also egress points in the networking data path as opposed to ingress only in the case of XDP. The two hook points sch_handle_ingress() and sch_handle_egress() in the kernel are triggered out of __netif_receive_skb_core() and __dev_queue_xmit(), respectively. The latter two are the main receive and transmit functions in the data path that, setting XDP aside, are triggered for every network packet going in or coming out of the node allowing for full visibility for tc BPF programs at these hook points. The tc BPF programs do not require any driver changes since they are run at hook points in generic layers in the networking stack. Therefore, they can be attached to any type of networking device. While this provides flexibility, it also trades off performance compared to running at the native XDP layer. However, tc BPF programs still come at the earliest point in the generic kernel’s networking data path after GRO has been run but before any protocol processing, traditional iptables firewalling such as iptables PREROUTING or nftables ingress hooks or other packet processing takes place. Likewise on egress, tc BPF programs execute at the latest point before handing the packet to the driver itself for transmission, meaning after traditional iptables firewalling hooks like iptables POSTROUTING, but still before handing the packet to the kernel’s GSO engine. One exception which does require driver changes however are offloaded tc BPF programs, typically provided by SmartNICs in a similar way as offloaded XDP just with differing set of features due to the differences in the BPF input context, helper functions and verdict codes. BPF programs run in the tc layer are run from the cls_bpf classifier. While the tc terminology describes the BPF attachment point as a “classifier”, this is a bit misleading since it under-represents what cls_bpf is capable of. That is to say, a fully programmable packet processor being able not only to read the skb metadata and packet data, but to also arbitrarily mangle both, and terminate the tc processing with an action verdict. cls_bpf can thus be regarded as a self-contained entity that manages and executes tc BPF programs. cls_bpf can hold one or more tc BPF programs. In the case where Cilium deploys cls_bpf programs, it attaches only a single program for a given hook in direct-action mode. Typically, in the traditional tc scheme, there is a split between classifier and action modules, where the classifier has one or more actions attached to it that are triggered once the classifier has a match. In the modern world for using tc in the software data path this model does not scale well for complex packet processing. Given tc BPF programs attached to cls_bpf are fully self-contained, they effectively fuse the parsing and action process together into a single unit. Thanks to cls_bpf’s direct-action mode, it will just return the tc action verdict and terminate the processing pipeline immediately. This allows for implementing scalable programmable packet processing in the networking data path by avoiding linear iteration of actions. cls_bpf is the only such “classifier” module in the tc layer capable of such a fast-path. Like XDP BPF programs, tc BPF programs can be atomically updated at runtime via cls_bpf without interrupting any network traffic or having to restart services. Both the tc ingress and the egress hook where cls_bpf itself can be attached to is managed by a pseudo qdisc called sch_clsact. This is a drop-in replacement and proper superset of the ingress qdisc since it is able to manage both, ingress and egress tc hooks. For tc’s egress hook in __dev_queue_xmit() it is important to stress that it is not executed under the kernel’s qdisc root lock. Thus, both tc ingress and egress hooks are executed in a lockless manner in the fast-path. In either case, preemption is disabled and execution happens under RCU read side. Typically on egress there are qdiscs attached to netdevices such as sch_mq, sch_fq, sch_fq_codel or sch_htb where some of them are classful qdiscs that contain subclasses and thus require a packet classification mechanism to determine a verdict where to demux the packet. This is handled by a call to tcf_classify() which calls into tc classifiers if present. cls_bpf can also be attached and used in such cases. Such operation usually happens under the qdisc root lock and can be subject to lock contention. The sch_clsact qdisc’s egress hook comes at a much earlier point however which does not fall under that and operates completely independent from conventional egress qdiscs. Thus for cases like sch_htb the sch_clsact qdisc could perform the heavy lifting packet classification through tc BPF outside of the qdisc root lock, setting the skb->mark or skb->priority from there such that sch_htb only requires a flat mapping without expensive packet classification under the root lock thus reducing contention. Offloaded tc BPF programs are supported for the case of sch_clsact in combination with cls_bpf where the prior loaded BPF program was JITed from a SmartNIC driver to be run natively on the NIC. Only cls_bpf programs operating in direct-action mode are supported to be offloaded. cls_bpf only supports offloading a single program and cannot offload multiple programs. Furthermore only the ingress hook supports offloading BPF programs. One cls_bpf instance is able to hold multiple tc BPF programs internally. If this is the case, then the TC_ACT_UNSPEC program return code will continue execution with the next tc BPF program in that list. However, this has the drawback that several programs would need to parse the packet over and over again resulting in degraded performance. There are a few more action TC_ACT_* verdicts available in the system header file which are also used in the two hooks. However, they share the same semantics with the ones above. Meaning, from a tc BPF perspective, TC_ACT_OK and TC_ACT_RECLASSIFY have the same semantics, as well as the three TC_ACT_STOLEN, TC_ACT_QUEUED and TC_ACT_TRAP opcodes. Therefore, for these cases we only describe TC_ACT_OK and the TC_ACT_STOLEN opcode for the two groups. Starting out with TC_ACT_UNSPEC. It has the meaning of “unspecified action” and is used in three cases, i) when an offloaded tc BPF program is attached and the tc ingress hook is run where the cls_bpf representation for the offloaded program will return TC_ACT_UNSPEC, ii) in order to continue with the next tc BPF program in cls_bpf for the multi-program case. The latter also works in combination with offloaded tc BPF programs from point i) where the TC_ACT_UNSPEC from there continues with a next tc BPF program solely running in non-offloaded case. Last but not least, iii) TC_ACT_UNSPEC is also used for the single program case to simply tell the kernel to continue with the skb without additional side-effects. TC_ACT_UNSPEC is very similar to the TC_ACT_OK action code in the sense that both pass the skb onwards either to upper layers of the stack on ingress or down to the networking device driver for transmission on egress, respectively. The only difference to TC_ACT_OK is that TC_ACT_OK sets skb->tc_index based on the classid the tc BPF program set. The latter is set out of the tc BPF program itself through skb->tc_classid from the BPF context. TC_ACT_SHOT instructs the kernel to drop the packet, meaning, upper layers of the networking stack will never see the skb on ingress and similarly the packet will never be submitted for transmission on egress. TC_ACT_SHOT and TC_ACT_STOLEN are both similar in nature with few differences: TC_ACT_SHOT will indicate to the kernel that the skb was released through kfree_skb() and return NET_XMIT_DROP to the callers for immediate feedback, whereas TC_ACT_STOLEN will release the skb through consume_skb() and pretend to upper layers that the transmission was successful through NET_XMIT_SUCCESS. The perf’s drop monitor which records traces of kfree_skb() will therefore also not see any drop indications from TC_ACT_STOLEN since its semantics are such that the skb has been “consumed” or queued but certainly not “dropped”. Last but not least the TC_ACT_REDIRECT action which is available for tc BPF programs as well. This allows to redirect the skb to the same or another’s device ingress or egress path together with the bpf_redirect() helper. Being able to inject the packet into another device’s ingress or egress direction allows for full flexibility in packet forwarding with BPF. There are no requirements on the target networking device other than being a networking device itself, there is no need to run another instance of cls_bpf on the target device or other such restrictions. This section contains a few miscellaneous question and answer pairs related to tc BPF programs that are asked from time to time. Question: What about act_bpf as a tc action module, is it still relevant? Answer: Not really. Although cls_bpf and act_bpf share the same functionality for tc BPF programs, cls_bpf is more flexible since it is a proper superset of act_bpf. The way tc works is that tc actions need to be attached to tc classifiers. In order to achieve the same flexibility as cls_bpf, act_bpf would need to be attached to the cls_matchall classifier. As the name says, this will match on every packet in order to pass them through for attached tc action processing. For act_bpf, this is will result in less efficient packet processing than using cls_bpf in direct-action mode directly. If act_bpf is used in a setting with other classifiers than cls_bpf or cls_matchall then this will perform even worse due to the nature of operation of tc classifiers. Meaning, if classifier A has a mismatch, then the packet is passed to classifier B, reparsing the packet, etc, thus in the typical case there will be linear processing where the packet would need to traverse N classifiers in the worst case to find a match and execute act_bpf on that. Therefore, act_bpf has never been largely relevant. Additionally, act_bpf does not provide a tc offloading interface either compared to cls_bpf. Question: Is it recommended to use cls_bpf not in direct-action mode? Answer: No. The answer is similar to the one above in that this is otherwise unable to scale for more complex processing. tc BPF can already do everything needed by itself in an efficient manner and thus there is no need for anything other than direct-action mode. Question: Is there any performance difference in offloaded cls_bpf and offloaded XDP? Answer: No. Both are JITed through the same compiler in the kernel which handles the offloading to the SmartNIC and the loading mechanism for both is very similar as well. Thus, the BPF program gets translated into the same target instruction set in order to be able to run on the NIC natively. The two tc BPF and XDP BPF program types have a differing set of features, so depending on the use case one might be picked over the other due to availability of certain helper functions in the offload case, for example. Some of the main use cases for tc BPF programs are presented in this subsection. Also here, the list is non-exhaustive and given the programmability and efficiency of tc BPF, it can easily be tailored and integrated into orchestration systems in order to solve very specific use cases. While some use cases with XDP may overlap, tc BPF and XDP BPF are mostly complementary to each other and both can also be used at the same time or one over the other depending which is most suitable for a given problem to solve. One application which tc BPF programs are suitable for is to implement policy enforcement, custom firewalling or similar security measures for containers or pods, respectively. In the conventional case, container isolation is implemented through network namespaces with veth networking devices connecting the host’s initial namespace with the dedicated container’s namespace. Since one end of the veth pair has been moved into the container’s namespace whereas the other end remains in the initial namespace of the host, all network traffic from the container has to pass through the host-facing veth device allowing for attaching tc BPF programs on the tc ingress and egress hook of the veth. Network traffic going into the container will pass through the host-facing veth’s tc egress hook whereas network traffic coming from the container will pass through the host-facing veth’s tc ingress hook. For virtual devices like veth devices XDP is unsuitable in this case since the kernel operates solely on a skb here and generic XDP has a few limitations where it does not operate with cloned skb’s. The latter is heavily used from the TCP/IP stack in order to hold data segments for retransmission where the generic XDP hook would simply get bypassed instead. Moreover, generic XDP needs to linearize the entire skb resulting in heavily degraded performance. tc BPF on the other hand is more flexible as it specializes on the skb input context case and thus does not need to cope with the limitations from generic XDP. The forwarding and load-balancing use case is quite similar to XDP, although slightly more targeted towards east-west container workloads rather than north-south traffic (though both technologies can be used in either case). Since XDP is only available on ingress side, tc BPF programs allow for further use cases that apply in particular on egress, for example, container based traffic can already be NATed and load-balanced on the egress side through BPF out of the initial namespace such that this is done transparent to the container itself. Egress traffic is already based on the sk_buff structure due to the nature of the kernel’s networking stack, so packet rewrites and redirects are suitable out of tc BPF. By utilizing the bpf_redirect() helper function, BPF can take over the forwarding logic to push the packet either into the ingress or egress path of another networking device. Thus, any bridge-like devices become unnecessary to use as well by utilizing tc BPF as forwarding fabric. Like in XDP case, flow sampling and monitoring can be realized through a high-performance lockless per-CPU memory mapped perf ring buffer where the BPF program is able to push custom data, the full or truncated packet contents, or both up to a user space application. From the tc BPF program this is realized through the bpf_skb_event_output() BPF helper function which has the same function signature and semantics as bpf_xdp_event_output(). Given tc BPF programs can be attached to ingress and egress as opposed to only ingress in XDP BPF case plus the two tc hooks are at the lowest layer in the (generic) networking stack, this allows for bidirectional monitoring of all network traffic from a particular node. This might be somewhat related to the cBPF case which tcpdump and Wireshark makes use of, though, without having to clone the skb and with being a lot more flexible in terms of programmability where, for example, BPF can already perform in-kernel aggregation rather than pushing everything up to user space as well as custom annotations for packets pushed into the ring buffer. The latter is also heavily used in Cilium where packet drops can be further annotated to correlate container labels and reasons for why a given packet had to be dropped (such as due to policy violation) in order to provide a richer context. The sch_clsact’s egress hook which is called sch_handle_egress() runs right before taking the kernel’s qdisc root lock, thus tc BPF programs can be utilized to perform all the heavy lifting packet classification and mangling before the packet is transmitted into a real full blown qdisc such as sch_htb. This type of interaction of sch_clsact with a real qdisc like sch_htb coming later in the transmission phase allows to reduce the lock contention on transmission since sch_clsact’s egress hook is executed without taking locks. One concrete example user of tc BPF but also XDP BPF programs is Cilium. Cilium is open source software for transparently securing the network connectivity between application services deployed using Linux container management platforms like Docker and Kubernetes and operates at Layer 3/4 as well as Layer 7. At the heart of Cilium operates BPF in order to implement the policy enforcement as well as load balancing and monitoring. Since tc BPF programs are triggered from the kernel’s networking stack and not directly out of the driver, they do not require any extra driver modification and therefore can run on any networking device. The only exception listed below is for offloading tc BPF programs to the NIC. Note that also here examples for writing and loading tc BPF programs are included in the toolchain section under the respective tools. Mentioned lists of docs, projects, talks, papers, and further reading material are likely not complete. Thus, feel free to open pull requests to complete the list. Under Documentation/bpf/, the Linux kernel provides two FAQ files that are mainly targeted for kernel developers involved in the BPF subsystem. BPF Devel FAQ: this document provides mostly information around patch submission process as well as BPF kernel tree, stable tree and bug reporting workflows, questions around BPF’s extensibility and interaction with LLVM and more. BPF Design FAQ: this document tries to answer frequently asked questions around BPF design decisions related to the instruction set, verifier, calling convention, JITs, etc. BCC stands for BPF Compiler Collection and its key feature is to provide a set of easy to use and efficient kernel tracing utilities all based upon BPF programs hooking into kernel infrastructure based upon kprobes, kretprobes, tracepoints, uprobes, uretprobes as well as USDT probes. The collection provides close to hundred tools targeting different layers across the stack from applications, system libraries, to the various different kernel subsystems in order to analyze a system’s performance characteristics or problems. Additionally, BCC provides an API in order to be used as a library for other projects. bpftrace is a DTrace-style dynamic tracing tool for Linux and uses LLVM as a back end to compile scripts to BPF-bytecode and makes use of BCC for interacting with the kernel’s BPF tracing infrastructure. It provides a higher-level language for implementing tracing scripts compared to native BCC. The perf tool which is developed by the Linux kernel community as part of the kernel source tree provides a way to load tracing BPF programs through the conventional perf record subcommand where the aggregated data from BPF can be retrieved and post processed in perf.data for example through perf script and other means. ply is a tracing tool that follows the ‘Little Language’ approach of yore, and compiles ply scripts into Linux BPF programs that are attached to kprobes and tracepoints in the kernel. The scripts have a C-like syntax, heavily inspired by DTrace and by extension awk. ply keeps dependencies to very minimum and only requires flex and bison at build time, only libc at runtime. systemtap is a scripting language and tool for extracting, filtering and summarizing data in order to diagnose and analyze performance or functional problems. It comes with a BPF back end called stapbpf which translates the script directly into BPF without the need of an additional compiler and injects the probe into the kernel. Thus, unlike stap’s kernel modules this does neither have external dependencies nor requires to load kernel modules. Performance Co-Pilot (PCP) is a system performance and analysis framework which is able to collect metrics through a variety of agents as well as analyze collected systems’ performance metrics in real-time or by using historical data. With pmdabcc, PCP has a BCC based performance metrics domain agent which extracts data from the kernel via BPF and BCC. Weave Scope is a cloud monitoring tool collecting data about processes, networking connections or other system data by making use of BPF in combination with kprobes. Weave Scope works on top of the gobpf library in order to load BPF ELF files into the kernel, and comes with a tcptracer-bpf tool which monitors connect, accept and close calls in order to trace TCP events. Cilium provides and transparently secures network connectivity and load-balancing between application workloads such as application containers or processes. Cilium operates at Layer 3/4 to provide traditional networking and security services as well as Layer 7 to protect and secure use of modern application protocols such as HTTP, gRPC and Kafka. It is integrated into orchestration frameworks such as Kubernetes and Mesos, and BPF is the foundational part of Cilium that operates in the kernel’s networking data path. Suricata is a network IDS, IPS and NSM engine, and utilizes BPF as well as XDP in three different areas, that is, as BPF filter in order to process or bypass certain packets, as a BPF based load balancer in order to allow for programmable load balancing and for XDP to implement a bypass or dropping mechanism at high packet rates. iproute2 offers the ability to load BPF programs as LLVM generated ELF files into the kernel. iproute2 supports both, XDP BPF programs as well as tc BPF programs through a common BPF loader backend. The tc and ip command line utilities enable loader and introspection functionality for the user. p4c-xdp presents a P4 compiler backend targeting BPF and XDP. P4 is a domain specific language describing how packets are processed by the data plane of a programmable network element such as NICs, appliances or switches, and with the help of p4c-xdp P4 programs can be translated into BPF C programs which can be compiled by clang / LLVM and loaded as BPF programs into the kernel at XDP layer for high performance packet processing. clang / LLVM provides the BPF back end in order to compile C BPF programs into BPF instructions contained in ELF files. The LLVM BPF back end is developed alongside with the BPF core infrastructure in the Linux kernel and maintained by the same community. clang / LLVM is a key part in the toolchain for developing BPF programs. libbpf is a generic BPF library which is developed by the Linux kernel community as part of the kernel source tree and allows for loading and attaching BPF programs from LLVM generated ELF files into the kernel. The library is used by other kernel projects such as perf and bpftool. bpftool is the main tool for introspecting and debugging BPF programs and BPF maps, and like libbpf is developed by the Linux kernel community. It allows for dumping all active BPF programs and maps in the system, dumping and disassembling BPF or JITed BPF instructions from a program as well as dumping and manipulating BPF maps in the system. bpftool supports interaction with the BPF filesystem, loading various program types from an object file into the kernel and much more. gobpf provides go bindings for the bcc framework as well as low-level routines in order to load and use BPF programs from ELF files. ebpf_asm provides an assembler for BPF programs written in an Intel-like assembly syntax, and therefore offers an alternative for writing BPF programs directly in assembly for cases where programs are rather small and simple without needing the clang / LLVM toolchain. Alexander Alemayhu initiated a newsletter around BPF roughly once per week covering latest developments around BPF in Linux kernel land and its surrounding ecosystem in user space.
2019-04-24T08:40:35Z
https://cilium.readthedocs.io/en/v1.3/bpf/
i. When an image is worth a thousand words, don’t talk too much. An abstract is a synopsis of the whole dissertation and allows the reader to gain a flavour of the objective and outcome of the dissertation. You should keep this brief: something between 75 and 125 words is usually ideal. As the ‘academic chapter’ of my life gets closer to an end, I am asked to present a so-called ‘final’ body of work. After last year’s exploration of the complex issues of ‘identity’ and ‘belonging’ in a given society, I have now set out to examine the space we live in, and the way it affects us. This project started as an investigation of the function walls have in today’s social world. I have come a long way since then and a quick look into my logbook might help you to get a better understanding of where I am coming from. Over the next few pages, I will do my best to explain the full extent of my project and its development. I have come to realise that talking about my work reduces the impact the photographs have on the viewer. Robert Adams, in ‘Why People Photograph’ (1994), states: “The main reason that artists don’t willingly talk about their work or explain their produce is that the minute they do so, they’ve admitted failure. Words are proof that the vision they had is not”. This statement is especially true in this case as this body of work is a mere capture of what is available to the ‘public eye’; it is a reflection of emotions that are commonly experienced. The images should therefore be experienced fully without the help of a written narrative. Nonetheless, for purely academic reasons, I shall attempt to give some basic explanations about my images. This essay is not a dissertation. It may be structured like one, but it definitely is not meant to be one. I chose this layout because it provides a clear and concise framework to address the complex ideas that emanate from this project. Any other structure would fail to address all of the issues that need to be explored in a clear manner. As I am about to leave academia for good, I have come to realise that I am a very different person than the one I was during my first year of university. Nonetheless, it is during these two years of my MA that the most significant changes occurred. More than just a mere growing sense of responsibility, I have grown to understand who I am, who I want to be and most of all, I have developed a critical mind of my own. During the first stage of my MA I focussed fully on myself, exploring the complexity of cultural identity, the feeling of exclusion and self-awareness. Throughout the process of production of this first project, my original ideas developed majorly, taking me to places I had barely imagined I could ever go to. I explored the concept of ‘imagined exclusion’, tying it in with the idea of identity. I analysed how my very complicated cultural background has influenced my identity, thus affecting the person I am, the way I behave and the way I fit in today’s society. I realised that I was a very fragmented person as far as all these notions were concerned, and rarely felt like I was belonging to my environment. The next project I carried out was for the diploma stage of my MA. It was in fact a continuation of the previous one, which tried to separate my inner ‘self’ from my work. It proved to be impossible. This second body of work focused on the issue of isolation in today’s society. It depicted the way individuals experience isolation, conveying the two main (and very controversial) emotions that are arising from such state: both a reassuring and pleasant feeling as opposed to a negative and restrictive one. These two projects enabled me over time to get a greater understanding of who I really am and how society reacts around me. This final project is an indirect result of these two projects: it is an exploration of the space we inhabit on a daily basis in which these feelings of exclusion and self-consciousness develop. Indeed, most of us spend a major part of our lives in what is defined by today’s society as ‘public spaces’. Over time, we have developed a unique relationship with our surroundings in which we feel safe and at ease. But, come the time when the ‘public’ ceases to inhabit that space, the very nature of that same environment changes. This project is an exploration of the particular relationship between individuals and public space. It explores the various feelings of individuals when confronted to the shifting nature of that space after the ‘public hours’. The following pages are a mix and match of my thoughts and research, presented to you in the most structured way I was able to organise them in. I shall first provide you with the theoretical framework needed to understand the concepts that lie behind this body of work. Indeed, chapter 2 outlines some of the previous studies that have discussed the main aspects of the project. The essay carries on by explaining the way various photographers, philosophers and writers have influenced my work. It examines how my research fits within the contemporary study of space by other practitioners. Chapter 3 quickly analyses the experience of the viewer when looking at my photographs. Finally, the paper concludes with a quick statement regarding my personal experience of carrying out this project. It is not uncommon for photographers to invent their own narrative. This is why it is important to clarify the way different terms are used from the beginning, in order to avoid confusion. This chapter provides us with some key definitions and explores the various theoretical, philosophical and sociological concepts that emanate from my project. It aims to provide the viewer with a clearer understanding of the various ideas that are investigated in it. This, in turn should provide a good basis for the viewer to comprehend better both the project and the way it was produced. The literature review places particular attention on notions such as ‘public space’, its nature and the experience of an individual in it, as well as the ideas of ‘visibility’, ‘consciousness’ and other phenomenological concepts. It is not an easy task to provide a definition of public space because of the many factors that affect these places. It is mostly described as ‘a social space that is open and accessible to all, regardless of gender, race, ethnicity, age or socio-economic level’. An other definition of public space is the one Pacione provides us with. He refers to public spaces as ‘spaces of representation’, often referred to as ‘perceived space’ (Pacione, 2001, p.159). For the purpose of this essay, I will refer to public space as the physical space, rather than the emotional one. Another important term that needs to be clarified is the one of ‘public hours’. It is usually used to define the hours a business or an organisation is opened to the public. In this case though, I use this term as ‘the hours the public usually inhabit their surroundings’. Public space is normally open to being inhabited. Nonetheless, individuals tend to use it in specific slots of time, mainly around the ‘working hours’. The late nights of the evening can also be considered as ‘public hours’ as they are often used as slots of time reserved for relaxation and entertainment. This project therefore focuses on the public space that surrounds us in our daily lives at times when the public is no longer present. Public space and the way it is used has become a topic of growing interest among scholars. For many, such space represents something essential to the proper workings of cities: it is a space where individuals can gather, chat and engage socially with one another. Jacobs (1992) insisted that cities must provide plenty of public space where people can gather, children can play, and where a sense of community can emerge. Similarly, Lefebvre (1996), a famous French sociologist, uses the terms ‘the rights of an individual to the city’ to describe this fundamental need of individuals to interact. On the other hand, observers of public space argue thatpublic spaces are no longer as free or open as they once were, but rather they now are spaces where surveillance by local authorities is continuous and invasive. Surveillance cameras and local authorities now police such spaces, and in doing so, they withdraw rights to socialize and mingle with one another freely (Davis, 1990; Mitchell, 2003; Zukin, 1995; Kohn, 2004). Similarly, Sorkin (1992) argues that public space is no longer a space of socialisation and exchange. Rather, it has become totally sterile and artificial, obsessed with security and safety. It replicates a world individuals believe they live in, yet represents a totally artificial ‘reality’. By night though, the nature of public spaces is completely different. The public does not inhabit these places and the dynamics are altered. During the day, urban streets and grounds are heavily regulated and public disorder is not tolerated. This is much less evident during the night time, where ‘the familiar protocols and bonds of restraint which structure routine social life loosen’ (Hobbs et al., 2003: p. 43). By night, the availability of light also plays a major role in the nature of public spaces: it is generally perceived that the more illuminated a certain place is the safer it will be. In essence, the dichotomy between day and night is usually associated with the unknown, provoking fears, mystery, curiosity and contradiction (Gwiazdzinski, 2005). As the nature of public spaces changes regarding what time of the day it is, so does the way individuals experience it. A phenomenological approach is used in this case to explore the individuals’ experience of space. Perez de Vega (?) argues that certain spaces can be experienced beyond the subjective and beyond the meaningful; experiences which blend subject and object, which blend perception and sensation; experience which have affect as their main drive. When discussing the importance of experiencing space, it is important to look at the notions of perception and sensation. Erwin Straus, in The Primary World of Senses (1963), is particularly helpful when outlining the basic differences between the two. According to him, perception is a secondary rational organisation of a primary, non‐rational dimension of sensation or sense experience (le sentir) (Bogue, 2003, p.116‐117). The primary sense is unreflective and instinctive. Sensation deals with corporeality and perception is the intellectualisation of that corporeality. He continues by contrasting two different types of space: the space of geography and the space of landscape. A similar dichotomy can be observed when analysing the way an individual experiences fully the public space past ‘public hours’. Visibility is an important aspect that contributes to the ordinary experience of space. In general, urban planning tends to objectify places by being removed from them (DeCerteau, 1984). In this case, we focus on the way vision promotes the interaction of individuals with their surroundings. It is argued that the built environment acts as an organizer of the different viewpoints of the member of the public. Indeed, Deleuze states (1986) that “If architectural structures, (…), are visible, places of visibility, it is because they are not only figures of stone, orderings of things and combinations of qualities, but first and foremost, forms of light which organize the clear and the obscure, the opaque and the transparent, the seen and the unseen, etc”. But it is not only sufficient for the public space to be visible. Goffman (1963) asserts that “interactions within public space require the possibility of seeing and being seen by other people”. Exposure is one of the main aspects of people’s experience with public space. It involves being visible and observable by others, and behaving accordingly. Some modern sociologists suggest that there is an increase in what they call the “fear of exposure”. According to them, city dwellers have lost the ability to expose themselves and interact with the space around them (Sennet, 1990). A major factor affecting visibility after public hours (both of self and of the built environment) is, as discussed previously, light. The urban light is no longer restricted to the interior of monuments or confined to built heritage areas (city centre for example). It now includes new spaces, large landscapes. This questions the role light plays, suggesting that light can give sense to a place, giving new uses and new values (Alves & Almeida, ?). The look of the ‘Other’ plays a central role in this project, even when only imagined. The mere possible presence of another person causes one to look at him/herself as an object, and see his/her world as it appears to the other. This is not done from a specific location outside oneself, it is non-positional. This is a recognition of the subjectivity in others (Spade, 2006). Jean Paul Sartre describes how the look of the other person can make one feel objectified, judged, embarrassed, or ashamed of whom one is. For example, if one were doing something inappropriate, such actions are not improper until another person observes them, but become improper and awkward when they are performed before the eyes of the ‘other’; somehow my self-conscious evaluation of my “self” becomes activated through the look of the other. I see and judge my ‘self’ as I appear to the other person: “By the mere appearance of the Other, I am put in the position of passing judgment on myself as on an object, for it is as an object that I appear to the Other” (Sartre, 1956, p.189). This object, which is my “self” as I now see my “self” with the eyes of the Other, has all of a sudden become recognisable to me. I see my “self” not from the inside, as I did before, but from the outside as the other person see me. I have somehow become aware of where “I find myself” by the glance of the Other. The glance has an effect that seems to be experienced even more powerfully by the person being seen, than by the person seeing. Consciousness is a difficult concept to define. It means different things to different people, and because of that, it is important to be clear on the meaning we are using. In this case we use the philosophical definition of the term. Philosophical consciousness refers to a state of reality characterised by interiority, subjectivity, sentience, feeling, experience, self-agency, meaning, and purpose. Anything that has any of these has consciousness. Anything that does not would be non-conscious–blank, void, vacuous, wholly objective. This meaning refers to consciousness as context; it is about the mode of being that makes possible any and all contents and forms of consciousness. Philosophically, then, consciousness is a state or quality of being. In ‘Consciousness Explained’, Daniel Dennett famously criticises what he calls the “Cartesian Theatre” view of the mind. The central “Cartesian” claim he targets is that there is a specific location in the brain “arrival at which is the necessary and sufficient condition for conscious experience” (Dennett, 1991: p. 106). In other words, the Cartesian Theatre is the idea that somewhere within the mind, every piece of sensory information is processed and then somehow judged by an observing apparatus (the audience of the theatre). This judgement then defines the conscious action of the person involved. Photography is a unique medium. A camera, by its mechanical nature, is a simple light recording tool which, when used correctly, can produce very powerful images. An artist may merely use photography to record work in other media, in which case the photograph is the final product of the art, but the concept conveyed is more important than technical issues. At the opposite extreme, photography can be merely a technical exercise, a way of reproducing and drawing attention to beauty (or ugliness) in the world. In this case, I used photography in order to question the nature of ‘public space’ and to document the world that surrounds us. This particular medium has allowed me to present public space in a different way than the one we usually perceive it. The images communicate an alternate message (in this case about our relationship with space). In Boorstin’s words (1992, p. 91), ‘photography gives a narrative symbolism, and as a sign or, more precisely, an allegory’. We perceive photography as message. Walker Evans once said: “Stare. It is the way to educate your eye, and more. Stare, pry, listen, eavesdrop. Die knowing something. You are not here long.” And this is exactly what the viewers do when looking at my images. The more they stare, the more they feel. There are so many different ways you can affect the way an individual feels by what the picture shows or doesn’t show. Finally, in a few simple words, it is safe to say that photography has allowed me to bring to the viewer an awareness of self, others, and their environment. This chapter aims to provide the viewer with a greater understanding of the evolution of my project. It presents the various methods of research I used whilst exploring public space through a selection of influential photographers and authors. In addition, it helps situating this body of work within contemporary practice. There is a wide selection of photographers that have influenced me and have lead to the production of this project. In this paragraph, I outline only a few of them, who, I believe are most relevant to the final body of work produced. The project titled ‘We Are No Longer Ourselves’ (see Appendix 1), produced in 2001 by Rut Blees Luxemburg, Effie Paleologou and Sophy Rickett was probably the body of work which influenced me the most. ‘We Are No Longer Ourselves’ examines the enigmatic subject of the nocturnal city. These three photographers inhabit the streets, exploring how urban life transforms after dark. The city by day is a crowded and lively place. By night, empty corners and dark shadows can suggest sinister possibilities and create a highly charged atmosphere. Through this body of work, these photographers explore how the cityscape reflects and affects the human condition. The photographs produced are a direct investigation of the urban landscape. They are images taken at night on the edge of the centre of the city, long exposures which allow them to use the light emanating from the street only. The resulting images are strange and beautiful, sometimes immediately recognisable whilst others are almost abstract, flooded with green and golden light. Urban landscapes often seem threatening and dehumanising, but these poetic and seductive draws us in, making us look again, hinting at new ways of seeing and interacting with the cities we inhabit. Corriette Schoenaerts is a Dutch photographer mostly known for her editorial work. She takes on commissions from various magazines, mostly working on fashion shoots as well as other promotional photographs that are both refreshingly colourful and visually challenging. In her project ‘Nightscapes’ however, her photography takes a turn as she explores familiar spaces during night-time (see Appendix 2). She states: ‘I know all these places very well, because I (used to) pass them daily. By day, they are very familiar, by night they turn into mysterious fairytale worlds’. Her photographs are a direct representation of the physical elements of urban landscape at night. They convey a feeling of tranquillity, temporality and abandonment. It is as if everything is ready to pick up from where it was left when morning comes. The spaces represented in ‘Nightscapes’ are inviting, despite the overwhelming darkness that surrounds them. Holger Schilling and his project ‘Während Ihr Schlieft’ (While You Slept) (Appendix 3) proved to be of significant influence for my project. The photos are taken entirely at night in residential areas, discovering the artist’s surrounding environment. The last project outlined in this chapter is called ‘Ambient Light’ by Joao Lança Morais (see Appendix 4). Morais is professional photographer based in Lisbon, who works as a cinematographer for commercials and features. This particular project, produced in December 2010, is an explicit exploration of the architectural structure of the urban landscape. Nonetheless, as opposed to the previous photographers mentioned, this body of work focuses more on private spaces left in decay. There are many other photographers who have contributed, whether consciously or unconsciously, to the production of my project. For obvious reasons, it is impossible to mention them all in this essay. Adding to the philosophical literature covered in order to get a better understanding of the phenomenological concepts underlined in my project, I examined several books that proved to be capital for the development of my work. This chapter covers a quick selection of them. ‘Between City and Desert’ by Eyal Weizman and Manuel Herz, featured in ‘City Levels’ by Nick Barley laid the theoretical base for the project. ‘City Levels’ examines the urban environment at different levels to discover the mechanics of a city. It looks at what is happening, both culturally and architecturally, deep underground, at street level, and high overhead. In ‘Between City and Desert’, Weizman and Hertz discuss the issue of privatisation of a public space through the case study of a north London Suburb. The project’s aim was to merge all public space for a limited amount of time in order to create a symbolic, private space the size of a town. This would be done to allow orthodox Jews to carryon with their daily activities during their religious festivities. Ideas of ‘space’, ‘place’, ‘settlements’, ‘public’, ‘private domain’, ‘desert and temple’, ‘fixed geographical definition’, ‘the meaning and use of public space and the objects within it’ are widely explored. Overall, this text allowed me to grasp a better understanding of space and territory, ownership and meaning of the terms public and private and provided me with the ability to perform a more accurate reading of space. Vintage Calvino in ‘Invisible Cities’ provides a vast panel of vocabulary and terminology to describe cities and space. He exceeds in talent when portraying the various cities of Marco Polo’s travels, making the reader travel along with the hero. This book amazed me with extraordinary sceneries and ideas fabricated with words. In addition to the multiple descriptions of cities and spaces, Calvino includes light touches of philosophical explorations that also allowed my mind to wonder on the purposes of cities. This book has provided me with the ability to visualise a space as if it was being described to me. A mental representation of a space is very different from the reality of that same space being observed. There is a feeling of majesty and mysteriousness about it and this is the same impression I am putting across to my viewer. In ‘Poetics of Space’, Gaston Bachelard applies phenomenology to architecture. He bases his analysis on lived experience of architecture, considering spaces such as the attic, the cellar, drawers and the like. ‘The Poetics of Space’ does not look at the origins or technicalities of architecture, but how the lived-in and human experience of architecture affects and shapes it’s development. Through the extensive use of phenomenological thinking, Bachelard allowed me to become more conscious about my surroundings and provoked some deep reflections about dwelling in spaces. ‘Darkness, Light and the Space Between’ is not just a random, stand-alone photography project. Indeed, photographers have been exploring urban landscapes for years. Some people might be a little depressed by the greyness of concrete, towering skyscrapers and graffiti covered walls. Urban landscape photography looks for the photographic possibilities that these elements withhold in the cities and urban areas where we live and work. There are a number of other genres of urban photography such as cityscape photography, architectural photography, street photography, etc. Eugene Atget for example was one of the early urban photographers who captured the city in its most simple form. His work included photographing old buildings, street vendors, architectural details and buildings that were about to be demolished. Much of his work was aimed at artists and stage designers who would use his photographs as visual aids for their own work. Henri Cartier Bresson is probably the best-known photographer of all time and one that has inspired many over the years. His candid photography, covering many of the peoples of the world, provides a valuable source of information about the lives of everyday individuals during the middle of the 20th century. Similarly, Robert Frank was famous for depicting cultural issues in society through the use of candid street photography. His work The Americans placed him firmly as a photographer willing to show life as it really was. His ability to see the mundane aspects of everyday life as a fascinating insight into the lives of normal people helped to highlight cultural issues of the time. The list of urban photographers is long, and probably endless. Other famous photographers whose work captured the true form of the city include Paul Strand, Alvin Langdon Coburn, Karl Hugo Sclmotz, Alfred Stieglitz and Andre Kertesz. A more modern form of urban photography is the so-called ‘urban exploration’. Often shortened as ‘urbex’, it is the examination of the normally unseen or off-limits parts of urban areas or industrial facilities (Nestor, 2007). Urban explorers shun the natural world in pursuit of more closely examining and understanding the inner workings of our constructed world, of seeing civic society in its real, raw, unpainted, un-plastered and un-prettied state. It is internal city touring, but without guides, double-decker buses, maps or directions. It’s about going where people aren’t supposed to go. The constant need of people to understand their surroundings often leads to photographers associating modern social issues to the space around us. My project follows this modern trend whilst associating its aesthetics to the more classical trend of urban photography. I associate philosophical and sociological concepts of human behaviour with the space’s shifting nature in order to produce a rigorous exploration of this specific subject. In addition, urban photographers could be seen as a kind of modern mapmakers, exploring every inch of a city, corner after corner. In that sense, this project is part of that ongoing mapping process, with a particular focus on the historic city of Carlisle. This chapter examines the various experiences of individuals directly involved with the images. I first investigate the various stages of producing this project and the way this process affected me. I then look at the way the viewer experiences the photographs when looking at them. Producing this project was not an easy task. Similarly to the last two projects produced for this MA, I have invested a lot of time and effort into researching and bringing it to being. It is almost as if a piece of me has gone into it, as both of us were evolving. The process of making has provided me with a clearer understanding of the importance of the physical structures of our surroundings, and a clearer understanding of people’s psychology of being into urban space. This project did not involve any third parties, which made it easier to carry out. Once fully immerged in the public space after hours, all that needed to be done was to let my feelings guide me (whilst staying within the theoretical framework of the project). The actual creation of the images did feel at times somehow voyeuristic, almost illegal. My presence in these public spaces often triggered an adrenalin rush, very often making me work under pressure. Whilst I still took my time to take the images (30 seconds exposures take time) I often found myself wondering how fast I could get back to the safety of my car. There were no major problems whilst carrying out this project. Other than the occasional scare from some late dog walkers and the low availability of light, everything ran as smoothely as it could have. The project did present me with the opportunity to explore various areas of Carlisle, furthering my knowledge and appreciation of this city. I also noticed a substantial amelioration in my night photography skills. This was truly a pleasant project to carry out and the resulting set of images is quite satisfactory. When looking at the photograph, the viewer is instantly immerged in it. The darkness overtakes the visual field, forcing the gaze upon the ‘lit areas’ of the image. It is only when he/she is comfortable enough with the light that the spectator starts exploring the surroundings. The gaze never goes too far from the lit areas, navigating timidly through the image in the exact same way an individual would navigate though an unknown, badly lit space. As the nature of the space that surrounds the viewer changes, so does his/her experience of it. He/she becomes conscious of his/her own visibility and starts experiencing the look in the full Sartrian way. The presence of the ’Other’ starts affecting the viewer and seeks comfort in full view, in the light. The sense of possible danger hiding in the darkness triggers emotions of discomfort and fear, leaving the viewer restless. It is when this feeling reaches its summum the viewer then moves away from the image, confronting a new, completely undiscovered scenery. The same emotional journey begins again. The publicness of space is a fairly hard concept to define. It is a complicated notion that is subject to a vast amount of controversy. This project explores the relation of individuals in such spaces after the public hours, focusing on the ideas of self-consciousness and visibility. It has been shown that spaces’ nature shifts with daylight and that the simple act of being in such spaces triggers emotions of unease and unrest. Photography as a medium has allowed me to document this phenomenon in the most simplistic way. The experience of the viewer discovering the images is very similar to the emotional experience of actually walking through the dark streets of a city. I have evolved tremendously whilst producing this project and have come to get a better understanding of the space that surrounds us. In addition, I have discovered in more depth Carlisle, often finding myself in areas I would never have explored had it not been for this project. In terms of personal growth, I am now confident in my photographic judgement. I find myself much more comfortable in presenting my work, and have figured out an insatiable truth: It matters very little what people think of the final product. It is the journey that lead to it that is worth taking into consideration. Adams, R., 1994. Why People Photograph. Aperture Foundation. Agiurre, A., 2007. Urban Space. Blackwell Encyclopedia of Sociology. Ritzer, George (ed). Blackwell Publishing. Alves, T. & Almeida, D., ?. Planning the night – light as a central issue. Centro de Estudos Geográficos, University of Lisbon. Barthes, R., 1980. La Chambre Claire: Note sur la Photographie. Paris: Gallimard. Bogue, R., 2003. Deleuze on Music, Painting and the Arts, Routledge. Boorstin, D. J., 1992. The Image: A Guide to Pseudo-Events in America. New York: Vintage Book, 25th Anniversary edn. Bourdieu, P., 1996. and Distinction: A Social Critique of the Judgement of Taste, trans. Bourdieu, P., 1996. Photography: A Middle-brow Art, trans. Shaun Whiteside Cambridge: Polity Press, paperback. Braudel, F., 1973. Capitalism and Material Life 1400-1800. London. Davis, M. 1990. City of Quartz: Excavating the Future in Los Angeles. New York : Verso. DeCerteau, M., 1984. The Practice of Everyday Life. Berkeley: University of California Press. Dennett, D., 1991. Consciousness Explained, Allen Lane, ed., The Penguin Press. Dennett,D. C., 1991. Consciousness Explained. New York. Descartes, R., 1637. Discours de la méthode pour bien conduir sa raison et chercher la vérité dans les sciences plus la dioptrique, les meteores, et la geometrie, qui sont des essais de cette methode (Discourse on the Method for Properly Conducting Reason and Searching for Truth in the Sciences, as well as the Dioptrics, the Meteors, and the Geometry, which are essays in this method), in vol. 1 of The Philosophical Writings of Descartes , ed. and trans. J. Cottingham, R. Stoothoff, D. Murdoch and A. Kenny, Cambridge: Cambridge University Press, 1984–91. Descartes, R., 1644. Principia philosophiae (Principles of Philosophy), excerpted in vol. 1 of The Philosophical Writings of Descartes , ed. and trans. J. Cottingham, R. Stoothoff, D. Murdoch and A. Kenny, Cambridge: Cambridge University Press, 1984–91. Gwiazdzinski, L., 2005. La Nuit, derniére frontiére de la ville. Editions de l’Aube, ESSAI. Hintikka, J., 1968. ‘Cogito, Ergo Sum: Inference or Performance’, in W. Doney (ed.) Descartes: A Collection of Critical Essays, Garden City, NY: Doubleday, 108–1 39. Hobbs, D., P. Hadfield, S. Lister and S. Winlow (2003) Bouncers: Violence and Governance in the Night-time Economy. Oxford: Oxford University Press. Jacobs, J., 1992 (1961). The Death and Life of Great American Cities. New York : Vintage Books. Kohn, M. 2004. Brave New Neighborhoods: The Privatization of Public Space. New York : Routledge Publishers. Lee, T. S. 2009. “Soundscape and Society,” in A.Orum and Z.Neal (eds), Common Ground? Readings and Reflections on Public Space. New York : Routledge Publishers. Lefebvre, H. 1996. Writings on Cities, Part II. E.Kofman and E.Lebas (trans.). Oxford, UK: Blackwell Publishers. MacLennan, ?. The Investigation of Consciousness Through Phenomenology and Neuroscience. University of Tennessee, Knoxville. Mitchell, D. 2003. The Right to the City: Social Justice and the Fight for Public Space. New York : The Guilford Press. Pacione, M., 2001. Urban Geography: a Global Perspective. 3rd ed., Routledge. Perez de Vega, E., ?. Experiencing Built Space: Affect and Movement. Perrella,S., 1988. Form, Being, Absence. Architecture and philosophy. Pratt journal. Richard Nice. London, Melbourne and Henley: Routledge & Kegan Paul, 1979. Sartre, J. P,, 1956. Being and Nothingness: An Essay on Phenomenological Ontology. New York: Philosophical Library. Sennett, R., 1990. The Conscience of the Eye New York: Knopf. Sontag, S., 1979. On Photography. London: Penguin Books. Sorkin, M., 1992. Variations on a Theme Park. New York; Hill and Wang. Straus, E., 1963. The Primary World of Senses: A vindication of sensory experience. Free Press of Glencoe. Turgenev, I., (1862). Fathers and Sons. Oxford University Press, USA. Zukin, S. 1995. The Cultures of Cities. Cambridge , MA : Blackwell Publishers. Bachelard, G., 1992. ‘Poetics of Space’, Beacon Press; New edition. Calvino, V., 2009. ‘Invisible Cities’. Vintage Classics; New Ed edition. Herz, M. & Weizman, E., 1997. Between City and Desert. Published in: AA Files 34.
2019-04-23T04:40:59Z
https://writepass.com/journal/2012/12/a-photographic-exploration-of-public-space-past-the-public-hours-its-shifting-nature-and-the-way-it-is-experienced/
to make passive income while enjoying incredible freedom in your life? Let’s face it, while it sounds simple, learning how to start a vending machine route can be a bit overwhelming. Luckily, we’ve broken it down into easy to follow steps. Here are the six steps to starting a vending machine business. There are a ton of great reasons to get started now. How many times have you daydreamed about answering to nobody but yourself? No more performance reviews. No more micromanaging or politicking. No more conforming to someone else’s vision or demands. You work the way you want to achieve the results you’re looking for. Instead of working your tail off for years earning more money for someone else, the hard work you pour into your business pays dividends for you and your family. Unlike a traditional job, a business is an asset that grows in value over time and can be sold for a large profit down the road (if you choose to sell it). Vending machines generate passive income, so that already allows you lots of able-to-be-absent time, but they also don’t have office hours. Of course, you have to work with the location, but within reason you can make your “rounds” whenever you want. Technologically advanced machines help this process even more. With a computer and the Internet, you can remotely monitor product stock levels, maintenance needs, and cash flow. Do you really want to keep working at your job, hoping your boss someday recognizes the value you deliver and rewarding it? Starting a business puts you in the driver’s seat. Vending is a very scalable business too, so you can grow your business as large as you want. With increased legislation and higher demand from consumers for healthy products, vending has shifted into a way of helping people make healthier decisions throughout their day. Smart vending business owners are making money by providing healthy alternatives to people who need them in places that lack them. And that’s what this Guide is all about. You can gain more control over your life, enjoy more flexibility, achieve a higher income potential, and secure your family’s future. And you don’t have to worry about making the wrong business start-up decision and falling flat on your face. What is a successful vending venture really built on? Selling product? Minimizing cost? Locking down every location known to man? Actually—and perhaps surprisingly— the answer isn’t any of these things. Rather, any and every successful vending business is built upon an unwavering dedication to providing value at every step. It’s a simple concept: value received always follows value provided. HealthyYOU Vending is a nutritional distribution platform dedicated to making healthy snacks, drinks and food products available to people across North America and to the success of our Operators. The healthy vending movement has been increasing rapidly in the last decade and there are no signs of it slowing down. While there seems to be a massive amount of information available on the internet, much of it is outdated, contradictory, or lacks detailed, actionable steps on how to actually launch a vending machine business. This has frustrated people over the years, because they have made mistakes launching their own vending business and wished they had a resource to help them avoid the pitfalls. This guide will give you a detailed resource so you don’t have to make the same mistakes they did! With the huge technological advancements made over the last decade, the vending industry has also seen quite a bit of improvement in technology…but nobody seems to be talking about it. These amazing new technologies are aimed to help you, the vending business owner, and you need to know about them if you want to get ahead of your competition. As the healthy vending experts, we know a lot about this stuff. We put this complete Guide together to make it easier for you to learn not just how to start a vending machine business, but all the options available at your fingertips to improve your chances for success in it. The first American vending machine sold gum. The first English vending machine sold apples and postcards. You can sell just about anything out of a vending machine. Seriously. What Does a Typical Day Look Like When You Own a Vending Business? This is a question that a lot people ask before they get into the nitty-gritty of what it takes to run a successful vending machine business. Your day will typically start by hopping onto your computer to view the backend remote monitoring system. This technology gives you an up-to-date report to see which locations are low on product and need to be restocked. After taking a look at your machine inventory report, the next task is to print out reports that tell you how many of each product you need (called “Pick Lists”), load your products into bins, and pack them up into your vehicle. Then you’ll hit the road where you get to interact with your customers, provide a couple of “wow moments”, and of course, restock and service your machines. Once you’ve completed your onsite tasks, it’s time to get back on the road and visit your next location! After servicing your route for the day, other daily activities might include reordering products, accounting activities, and inventory management. FALLACY: Growing quickly in a new industry is too challenging. FACT: Embracing challenges as growth opportunities is the only way to discover what you’re capable of. FALLACY: I have to master every facet of the vending world before I’ll be successful. FACT: You need unwavering integrity, a focus on “WOW” service, and a growth mindset for continual, BITE-sized advancement. FACT: The conditions will vary from market to market and some will be more challenging than others, but proper planning, effort, and self motivation ensure that any conditions can be favorable. FALLACY: If I own a vending business the money will come. FACT: The money is there for the taking, but you must work to earn it. FALLACY: I need an unattainable amount of capital to setup and grow my vending business properly. FACT: Properly growing a business requires a methodical approach to converting leads and optimizing the initial business. How often will I need to service my machines? If you are in high-traffic, high-producing locations, you will typically service your machines once per week. Servicing a machine does not require a lot of time (typically 15 minutes or less), but maintaining a well-stocked and clean machine is an absolute must. Otherwise, your sales will suffer due to the machine not functioning properly. What type of licensing, paperwork and insurance will I need? While our program includes a fire, theft and vandalism plan we highly recommended you purchase an umbrella insurance policy for your business. More times than not, the best options you can find is to go through local insurance agents. While the decision is ultimately yours, the majority of vending operators establish their business as an LLC. You can use your personal lawyer or accountant to get this setup, or (if you’re more savvy) go through a service such as LegalZoom. This is not an extensive list – but should certainly get the wheels turning! Do I need a truck or large vehicle to service my machines? Starting out, a dedicated service vehicle will not be necessary. You can use your personal vehicle. You can do this because you will only put in your vehicle the products you need to stock each machine. Using eManage, your vending management software, you will be able to print a report of exactly what is needed to fill any machine at any time. One you have a very large business, you may eventually need a larger vehicle to transport larger quantities of products. Do I have to pay a portion of my sales to the business or location where my machine is placed? The majority of locations expect to receive some type of commission from your vending sales in exchange for “renting” you real estate from which to sell (especially if they have received commissions from their previous vendors). You can typically negotiate a 15%-30% commission rate, depending on the location type and foot traffic. Experienced vending business owners use the tactic of offering a higher commission rate in exchange for exclusivity within a location – meaning their machines face no competition onsite. What are the best types of locations? You can learn more about how to land the most profitable vending locations in Chapter 3. Schools have consistent and static foot traffic (students go to school 5 times per week and it’s the same students who go to school everyday, so they know what you sell in your machines). Kids love buying from vending machines – it’s a fun experience for them. Students don’t usually plan ahead to bring snacks with them to eat throughout the day. Parents give their kids money to buy snacks from school. A lot of the time, those snacks end up being from the vending machine. Some other good location types are offices/office buildings, gyms/recreation centers, YMCAs, and hospitals. How profitable is a vending machine business? The profitability of your vending machine route will depend on the locations you place your machines in (that’s why we dedicated an entire chapter to this topic) and the time and effort you put into your new business. We will show you how to use eManage, your vending management software, to help make sure each machine is filled with the best selling products for their individual locations. In addition, we’ll show you the best resources for products. Lower pricing on the products you buy will give you higher margins on each product sold, meaning more profit for your business. Why Do You Want To Start a Vending Business? Before you know what you want, you have to answer why you want it. In this chapter, we’ll show you the most important questions to ask yourself before moving forward with your research on starting a vending machine business. This is definitely an important chapter of the guide that you don’t want to skip over. There are several different types of vending machines sold by healthy vending companies. We are the only company who designed a machine specifically for the healthy vending market. All others use a standard soda/snack machine. Location, location, location! Your locations are the most important part of your vending machine business. Choose the wrong location type and you’re looking at a long road of financial pain. Follow these essential tips to make sure you’re securing only the best locations for your vending machines. Since you’re selling products in high volume, the vending business is all about margins. This chapter will show you the best and most affordable sources to get wholesale prices. We’ll also cover the new nutritional standards in schools and how you can make sure you’re in compliance (and avoid any penalties that could cost your business a lot of money). When you know how to provide excellent service to your locations, they’ll want to work with you for a long time. They’ll also be much more patient and understanding when unforeseen issues occur (i.e. coin jams, technical issues, stuck products, etc). Customer service in the vending business is equal parts machine maintenance and knowing how to communicate. There are several different ways you can actually start a vending machine business including joining an established business opportunity or launching a business on your own. Now that you know what it takes to get this type of business up and running, it’s time to evaluate your startup options. There’s no “one-size-fits-all” here either. It comes down to what makes sense for you. Why Do You Want to Start a Vending Machine Business? It all starts with your “WHY”. Perhaps you’ve done a little homework and you think the $42 billion-dollar vending industry might be the right fit for you. Maybe vending sparked your interest because you heard it has less overhead, no rent or electricity bills, and more flexibility than businesses in other industries. Perhaps you like the idea of a permanent escape from the office where you can interact with your neighbors and make an impact on your community. Before you continue down the wrong path, it’s important to know why you want to get into this business. The last thing you would want to do is invest a lot of time and money, work your tail off for 5 years, and then suddenly realize that you made the wrong decision because it doesn’t actually align with your long-term goals. There are a lot of factors that come into play to start and manage a successful vending machine business – a lot more than most people originally think. Naturally, there’s a lot of discussion surrounding which vending strategies are best and which ones to avoid — for example, should you go it alone, buy an existing route, buy into a business opportunity or a franchise? Ironically, it seems like the only thing people aren’t talking about are THE WHY FACTORS. If you really do homework, you can find successful people in every one of these categories. This prompts an important question. Given the same material, strategy, and support, why does one person succeed while another person fails? One reason: they forgot to account for their why factor. In other words, they chose a strategy that was misaligned with their ultimate goals. What do you want your healthy vending business to accomplish — personally, professionally, and societally? Understanding what you want to achieve is crucial to your ability to choose the best business strategy for you. The list goes on. Before deciding anything else, ask yourself what is your end goal (i.e. purpose factor)? This will make your decisions down the road easier and keep you focused when…. 1. They’ll quit their job and jump into the business full-time. Usually people in this scenario have built up enough savings that they can manage without the income from their job for 6-12 months. 2. They need the income from their current job, so they start a vending business by working on nights, weekends, and during lunch breaks. Realistically, do you have the available time to do all of that work yourself? Does that time-investment align with your motivation for starting this business? Do you need a partner? Would you prefer some business support? Consider this example: you choose to buy and self-operate a 50 machine vending route because the numbers make sense and it’s a smart business decision. However, the main reason you wanted to start a business was so that you could spend more time with your family. Now you are the owner of a lucrative vending business that keeps you away from home 80 hours a week. Have you accomplished what you wanted? If the answer is “no”, then you need to hire a route driver to handle the day to day of your route. Make sure to understand your time-investment level BEFORE you start evaluating business opportunities. Everyone who gets into this business (or any business) will have a level of financial investment that they’re willing to put into it. So you’ll need to determine how much you’re willing to invest in this new business of yours. Note that this answer will depend on a couple of other factors. Generally speaking, the more support offered by a business opportunity, the more expensive. And vice versa. But, that investment might be more beneficial for you, depending on your why, and your time-investment level. In other words, don’t make the mistake of choosing a business option solely based on your initial expenses without considering the other important factors. Understand the difference between what you want to invest and what you can invest. Write down both numbers and keep them in mind as you continue to read through this guide. It’s important to understand your answers to these questions before analyzing business opportunities and franchises. There are a lot of factors to consider, but the process will be a lot easier if you know what you want and what you need to start this business. Take a look at the industry to get a better idea. Standard vending machines, stocked with candy, junk food or soda, are no longer the only options available. Healthy vending machines, fresh-food dispensing machines, and other types of equipment are part of the mix. Many vending services offer a variety of machine options so they can supply each location with the options they want. This goes beyond just the products. Not everyone carries cash nowadays. Many people carry only plastic. Therefore, many types of vending machines now include the ability to pay with a credit or debit card, and even smartphones. Your ability to supply a full range of options to a location will give you an edge when securing the deal, and it’s also crucial to making sure the machines get used regularly. Most new vending machines include credit card readers equipped with remote monitoring. This can come in handy because you receive a complete overview of your exact sales figures and product inventory, all while improving customer convenience. Plus, you can log-in from home and see what is being sold in your machines…which also gives you intelligence on when to go and restock your machines. This is incredibly valuable information to have every day. It saves trips, fuel, and time. If you think credit card readers aren’t necessary on your vending machines, you may want to think again. Vending Market Watch recently found that average annual cashless sales have increased 28% over the last year, and that the average consumer is spending 32% more when they pay with credit versus cash. when they pay with credit vs. cash. Like they say in real estate, the most important thing is location, location, location! Locations with a lot of foot traffic are the best locations to target for your vending business. In this chapter, we’ll discuss how to find the most profitable vending machine locations using a proven system. Leads, leads, leads. The discovery of potential locations has been, currently is, and will always be the absolute lifeblood of your business’ success. Optimization or product mix at existing locations is massively important as well but won’t mean anything unless you actually have locations to call your own! The vending machine business is essentially a “location generation” business. While there are many other things involved, you won’t get very far unless this first part is taken care of. As with many aspects of growing your business, lead generation is not a “one and done” step, but rather something that is both ongoing and cyclical in nature. Simply put: lead generation never ends! Proper lead generation is a combination of prospecting, finding and contacting leads through specified research of who could benefit from your business, and marketing/promoting your business in a way in which leads find you. When tied together and used effectively, setting vending machine placement meetings with qualified locations will be as efficient as possible. INSIDER TIP: You’re NOT in the vending business. You are in the lead generation business—specializing in vending. Before making contact with a qualified location, you need to plan your contact strategy. To do this, you need to clearly define what your primary objectives are for any given meeting. Understand the location’s needs and create a basic proposal for how your vending business might meet the needs of this location. For example, would the location’s patrons want snack and drink machines, or just snack machines? Would the location be interested in a coffee vending machine? Not every location or lead is created equal. Time is valuable and you should only take meetings with locations that meet your basic criteria. To do this, you must be able to see through your location’s/contact’s eyes in order to properly discover, which requires a particular line of questioning that gathers facts. Do they currently provide vending or food service options? If so, who is their vendor? Do they have a contract with their current vendor? If so, how much longer are the locked in for and how happy are they with their current service? Do they currently receive a commission from vending machine sales? If so, how much are they receiving? Additional services being provided by their current vendor? These are all of these vital pieces of information should be collected during the discovery phase. Record every detail. Avoid asking open-ended questions. Rather, ask questions that help you collect the simple, yet vital information pieces that are fact-based. In order to set meetings and build business relationships, you’ll sometimes need to speak with the same person over and over again. To keep things unique and fresh, we recommend that you diversify your methods of communication in order to (a) make the process more enjoyable for the contact, and (b) yield higher results for yourself. Variety creates novelty, and your outbound communication model should be geared to capitalize on that one very small, yet very important concept. As the saying goes, “before people will care about how much you know, they must first know how much you care.” Accomplishing this requires you to take the time, before you begin discussing the specifics of business, to establish a level of trust and personal connection. The goal is to cultivate real, meaningful relationships that lead to customers wanting to do business with you because of who you are, not feeling obligated to do so because of what you offer. INSIDER TIP: Write a value proposition that shows who you are and what you’re trying to accomplish. Make sure every piece of communication you have with potential locations includes this message. Write down your cadence of written and verbal touch points. For example, Touch #1 = small box of healthy snacks mailed to your prospect, Touch #2 = a phone call following up on the box you mailed, Touch #3 = an email notifying your prospect you just left them a voicemail. The purpose of this strategy is to bring your business to the attention of target locations as quickly and efficiently as possible. Once you get them on the phone, the best strategy to set the appointment is to come prepared to deliver information that is highly personalized, relevant, and powerful. You’ve connected personally, you’ve qualified them, you know their pain points, you’ve figured out exactly what they’re looking for and WHY they’re looking for it, and you know any limiting factors they may have. Now it’s time to make your program work for them. When done properly, there should be no reason for your customer to hesitate. INSIDER TIP: Follow-up is crucial. There are plenty of people in this world who can sit down at a desk and talk to a stranger about a vending program. But there are very few people in this world who can remember, and make the effort, to forward a copy of a hiking trail that their customer might like, or send a keychain with the contact’s favorite sports team’s logo on it. These details don’t happen by chance but they do make all the difference in the world. Once you’ve built a foundation with a potential location, it’s time to get a bit deeper. Take a look at why the variables exist, what they mean for the location AND for you, and where the large opportunity lies. Getting there requires you to activate the second level of questioning, which is known as Iceberg Questioning. During this line of questioning, you are able to get to the core of what any customer truly desires, and what they cherish. This will provide invaluable insight into what pain point your vending business can solve. This can come in very handy for objections down the line. Perhaps you’ve had a meeting or two already, or perhaps not. Either way, today is the day that you’re getting a “yes”. Approach it in the wrong way, and you’ll be politely shown the door. In other words, the contact will become a “dead lead.” If done well, you have the ability to not only secure a location’s interest, but to create a partner that will help you grow your business! INSIDER TIP #1: Make sure to come with all the appropriate material. Seems silly to even say, but you’d be surprised how many people don’t check to see if they have all the supplemental materials they might need. The machine is great to talk about, but it’s even more impressive if you have a one-page description to hand them or a life-sized banner to pull out. INSIDER TIP #2: Use Social Proof. When people can see that others in their same situation have had success with what you’re proposing, they are prone to buy. Social proof also provides you with a network of success stories to fall back on when growing your business. Use those successes as much as possible! INSIDER TIP #3: Don’t Expect A Big Finale. When most people think of “closing” a machine placement meeting, they imagine it’s this big dramatic moment at the end where someone stands up and shouts, “So, are you in or out?!?” This isn’t the case. Ask questions throughout the meeting. Make sure they understand your proposal, and get small confirmations that they could benefit from each aspect. This method gets the location to (a) close themselves and creates their own “buying” desire and (b) will show you what their primary hesitation points might be. Simple questions such as, “Do you see how our program can provide the right products, at a price that works for you?” or “Is it clear how I can provide you with better commissions and a higher level of service compared to your current vendor?” slowly build your case. The end of a machine placement meeting, then, is simply a matter of working out the finer points. All in all, provide value and make an impression. Now that you have machines in the field, establishing systems that spread your message without your direct involvement will be one of the best optimization and growth strategies you can implement. You’ve dabbled in this already with your marketing and networking efforts, but this time, there is a new end goal: getting referrals. Referrals are often the quickest and easiest way to expand your business. There is no better marketing than word-of-mouth (having someone else rave about and recommend your vending services to a potential location). In general, the location leads that sign agreements with the least amount of effort and time spent in the sales process are from referral programs. It should go without saying that determining the right vending machine products for the customers at your location is essential to the success of your business. Every location is different – with different customer demographics, traffic patterns, and unique requirements – and must be treated as such. There are a plethora of items on the market, and multiple factors to consider when creating a product mix – including a consumer base that increasingly values health and nutrition. Success depends on finding a mix that balances these factors in a way that meets the needs of your location. Luckily, we’re here to help you navigate through this confusing terrain. The days of stocking your machine with sugary candy, soda, and gum and watching the cash roll in are long gone. Consumers these days are more health conscious than ever, and demand products that not only taste great, but are better for them as well. As a result, Healthy Vending is a growing category, and a serious option to consider if you want your business to be around and thrive in the long therm. That being said, here are the biggest factors to consider when sourcing products for your machines. Taste – this is the most important factor when creating a product mix for your machine. If your products don’t match the taste profile of your location’s average consumer, they just won’t sell. It’s really that simple. Market research (like sampling events) and sales tracking will go a long way to help you arrive at the right combination. Nutritional Value – an overall trend in healthier eating means that your customers pay attention to things like calories, sugar and fat content more than ever before, so create a mix that includes healthier alternatives to traditional junk food. The products in your machine must also meet the guidelines for your specific location. Take special care at schools and hospitals, where guidelines are strictest. Affordability – products must be competitively priced, or they won’t sell. Save money and increase your margins by buying direct from the manufacturer. Novelty – customers in your market may get bored with your product mix, so periodically introduce new products to avoid predictability and to keep the customer interested in your machine. With a dense, diverse, and (seemingly always) hungry population, schools can be some of the best locations for a vending business. But be aware that special care must be taken when sourcing products. More than 2/3 of the average kid’s calories are consumed at school in the form of meals or snacks, so the options available to them have a huge impact on their overall health. In June of 2013, the USDA announced the Smart Snacks in School initiative, new federal guidelines that limit the amount of calories, fat, sugar, and sodium in snacks sold in the more than 100,000 schools that participate in the National School Lunch Program. Among the requirements is the mandate that all foods in school must be whole grain rich, meaning that 50% or more of the ingredients must be a whole grain (or whole grains must be the first ingredient listed), and snacks must be 200 calories or less. Luckily, healthy vending businesses make it easy for you to create a product mix that kids find delicious, and that meets these new guidelines. When it comes down to it, how you choose to source products will depend on the product type, availability, and your preferences. Most vending machine business owners don’t just source their products through one channel. You’ll need to compare prices from each distributor to see where you can get the best pricing on each brand. When you start purchasing enough products through a certain distributor, you can leverage your pricing at other distributors to negotiate better pricing. Order through United Natural Foods Inc (UNFI). They have the largest selection of healthy food products in the nation. They do have minimum order amounts but we can connect you with a company that can help you with products until you can meet those minimums. Purchase at Costco or Sam’s club. These superstores generally have cheaper prices than at most retail locations. Their selection is limited however and you may end up making less money by selling what is most convenient rather than what is most wanted by people using your machines. Sampling events serve a two-fold purpose – first, they’re a great way to help get the word out about your vending program, and build anticipation and excitement for your machine. Equally as important, a sampling event gives you the opportunity to gauge the taste profile of your average consumer. Partner with a variety of vendors to offer free samples, and see what does and doesn’t work. Armed with this knowledge, you’ll be better able to create a product mix that your consumers will love. So you’ve landed some locations, you’ve purchased the exact type of vending equipment you need to accommodate the location’s needs, and you’ve officially opened for business. Besides continuing to find more locations, the real work has just begun! It’s time to provide the excellent level of customer service that you promised your location. When your customer service exceeds expectations, asking for referrals becomes easy. Plus your location won’t even think twice when it comes time to renew your contract. There are 4 areas where you should be providing above and beyond service for your customers. Vending machines are like cars. Take care of them and do preventive maintenance, and they will last a long time. When you first start your vending machine business, you might want to lean on the expertise of an experienced vending professional, to help you out. As you learn the business, you will become that vending expert. In the long-run, knowing how to maintain your own machines will save you both MONEY and your REPUTATION with the location. Show your locations that you’re constantly thinking about the well-being and happiness of their patrons by optimizing the products available in your machines. Rotate out the poor sellers for new products. Try different brands, placements within the machine, types of food or drinks, etc. This is good for your pocket AND helps keep the location happy. You could do the bare minimum and just keep your vending machines stocked. But that’s not going to get you a lot of referrals or help you improve your partnership with the location. We call some of these fun extras, “Buzz Boosters.” Again, they help you look good in the eyes of your location and are fantastic marketing techniques to drive sales. 1.Use neon colored signs or stickers to alert your customers when you put in a new product or reduce the price of an existing product. 2.Hang out while restocking the machine and pass out a few free samples – once people taste how good they are, they’ll be more likely to buy them and to tell their friends. – Hand out samples of products that are either new or don’t sell well to get those products moving. Try bringing a whole case of that snack to the school lunch period and hand out free samples of it. Students go nuts over this! -Be friendly with the employees at your locations and talk to any of their guests. -Ask for feedback while restocking and respond accordingly. customers like they’re a business partner. Instead of waiting for your location to reach out to you with feedback or comments, reach out to them. Ask them what requests they have just a few weeks after you launch. Check in with them periodically and put systems in place that make it easy for them to get in touch with you with any questions or concerns. Since you can’t anticipate everything that your location will need, inevitably you will get questions or concerns from your location. Answer them in a timely fashion. Every time. A good rule of thumb is to let your locations know you will get back to them within 24 hours of them contacting you. That way, they know you’re accessible but you won’t have to respond immediately. Stay in touch… but don’t inundate them. Let your locations know that they’re important to you and that you’re grateful for the relationship by periodically dropping off new snacks that you’ve been stocking, giving them a holiday gift bag, sending them a birthday card, or just stopping by while restocking to say a quick hello. As decision makers are very busy though, be sure not to overwhelm them with your good intentions. There are a lot of people that want to see them each day. Make it clear that you want feedback in order to make this the best fit possible. That said, when you do receive feedback, respond to the reasonable requests in a timely fashion. Feedback is the easiest way to learn more about what your accounts want. And when you provide them with what they want, that’s how you keep your vending accounts for life. Expert vending tip: Hand-deliver your commission check to the decision maker and include a hand-written thank you note. Do this every time, as it’s the personal touches that count. It’s these little things that go a long way in the eyes of your accounts. If you’ve read every chapter in this guide, you know the pillars required to start a vending machine business. Now it’s actually time to think about which startup path you want to take. A lot of people struggle with that question because they don’t frame it correctly. It’s not that one startup option is necessarily better than the others. The question you need ask yourself is which option makes the most sense for you. Your circumstance. Are you going into this full-time or starting out part-time? Do you have a business partner or are you doing it solo? get your vending business started. If you have a lot of business and sales experience, then you may decide to try and start your own vending business. You’ll be responsible for locating a reputable machine supplier, training yourself, and conducting your own sales process to land locations. Without experience in vending, this process may take up to a year before you get up and running with a couple of machines. In other words this option can be incredibly time consuming for a new entrepreneur, and there’s a lot of risk involved. That being said, the “do it yourself” method can also be the most affordable. This vending business route would be a great idea for someone with a strong business background – someone who is fearless (not afraid to negotiate to find optimal locations), and someone who is willing to put in a lot of hours initially to get their business off the ground. There may be other vending machine business owners in your area that are looking to sell their existing business. The major advantage here is that you have a ready to go business – no need to purchase your own machines or find locations. The disadvantage is that you’re buying old equipment. Generally speaking, this option requires less upfront time, but depending on the size and quality of locations, it can be the most expensive option. Make sure to thoroughly research the existing business and analyze the current sales figures to ensure that the money is worth the price. The option of buying a vending machine route would be an optimal choice for someone with advanced business skills who has or can finance $150,000 to $500,000. You can also buy into a franchise or business opportunity. In this situation, you get to partner with a company that has an established brand, a proven business model, and a dedicated sales team to help you secure vending locations. In most situations, you also get machine training and sales support (varying on the opportunity) throughout the entire location acquisition process, and on the franchise side this will generally extend throughout the life of your business. You also benefit by joining a community of other vending business owners. Each franchise/bizopp has a forum or online community where entrepreneurs from across the country get to share tips and best practices. If you’re looking to start a vending business with the most help and support possible, including significant assistance with securing vending locations, a franchise/bizopp is the best option out of the three.
2019-04-23T00:31:03Z
http://www.healthyvending.com/guides/how-to-start-a-vending-machine-business/
An in-depth report on the causes, diagnosis, treatment, and prevention of cluster headaches. Cluster headaches are one of the most painful types of headache. They are marked by excruciating, stabbing, and penetrating pain, which is usually centered around the eye. Cluster headache attacks occur very suddenly and without warning, with the pain peaking within 15 minutes. Cluster headaches are rare, affecting less than 1% of the population. Men are much more likely to suffer from cluster headaches than women. Many people who have cluster headaches have a personal or family history of migraine headaches. Treatment of cluster headaches focuses on relieving pain when attacks occur, and on preventive strategies to reduce attack duration and frequency. Oxygen therapy and injections of sumatriptan (Imitrex, generic) are the most effective treatments for acute attacks. Verapamil (Calan, generic), a drug for high blood pressure, is typically the first choice of medication used for long-term prevention. Behavioral treatments can be a helpful supplement to drug therapy. These treatments include relaxation therapy, biofeedback, cognitive-behavioral therapy, and stress management. People should also identify and avoid any triggers, such as alcohol use and cigarette smoking, which may provoke cluster headache attacks. Many people with cluster headache experience at least a 5-year delay in having their symptoms correctly diagnosed as cluster headache. Only 21% of survey respondents reported a correct initial diagnosis. Sinusitis and migraine were common misdiagnoses. More than half (55%) of respondents reported experiencing suicidal thoughts. Most cluster headache attacks occur between early evening and early morning hours, with a peak time of midnight to 3 a.m. Alcohol, especially beer, is the most common trigger of attacks, followed by weather changes and smells. Attacks recur frequently for weeks or months, separated by long pain-free periods that last months or years. About 90% of people with cluster headache experience episodic cycles. Attacks occur regularly for more than 1 year, with pain-free periods lasting less than 1 month. Only about 10% of people with cluster type headache have chronic cluster headaches. The chronic form is very difficult to treat. Cluster headache attacks tend to occur with great regularity at the same time of day. (For this reason, cluster headaches are sometimes referred to as "alarm clock" headaches.) Most attacks occur during the night or within a few hours after falling asleep, with peak time of midnight to 3 a.m. A single cluster attack is usually brief but extremely painful. The pain peaks in about 5 to 15 minutes and then lingers for 15 to 180 minutes if left untreated. During an active cycle, people can experience as few as 1 attack every other day to as many as 8 attacks a day. Attack cycles typically last 6 to 12 weeks with remissions lasting up to 1 year. In the chronic form, attacks are ongoing, and there is little remission. Many people experience initially 1 to 2 attack periods a year. The attack cycles then tend to occur seasonally, most often in the spring and autumn. Cluster headaches are a type of primary headache. A headache is considered primary when it is not caused by another disease or medical condition. The most common types of primary headaches are migraine and tension-type. Cluster headaches are considered a rare type of primary headache. Cluster headache belongs to a group of primary headaches called trigeminal autonomic cephalgias (TACs). TACs share certain characteristics such as pain on one side of the head, eye watering, nasal congestion, and short duration of symptoms. Paroxysmal hemicrania is very similar to cluster headache. It causes multiple, short, and severe daily headaches with symptoms resembling those of cluster headache. As compared to cluster headaches, the attacks are shorter (1 to 2 minutes) and more frequent (occurring an average of 9 to 15 times a day). This headache is even rarer than cluster headache, tends to occur more often in women, and responds to treatment with the anti-inflammatory drug indomethacin (Indocin, generic). SUNCT syndrome (short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing) causes stabbing or burning eye pain that may resemble cluster headaches, but attacks are very brief (lasting about a minute) and may occur more than 100 times per day. Red and watery eyes, sweating forehead, and congestion are typical. This rare headache is more common in men than women and does not respond to usual headache treatments. Hemicrania continua is not a TAC type of headache but it produces some symptoms that are similar to cluster headache. The pain occurs continuously on one side of the face and is typically of mild-to-moderate intensity with some instances of severe pain. Unlike cluster headache attacks, which do not last long, attacks of hemicrania continua can last from days to weeks, with constant moderate-to-severe pain. Hemicrania continua is more common in women than in men. It is treated with indomethacin. The cause of cluster headaches is unknown. They are likely due to an interaction of abnormalities in the blood vessels, nerves, and chemicals that affect regions in the face. , a complex structure located deep in the brain, play a major role in cluster headaches. Advanced imaging techniques have shown that a specific area in the hypothalamus is activated during a cluster headache attack. These are neurotransmitters (chemical messengers in the brain) that are involved with well-being and appetite. Cluster attacks often occur during specific sleep stages. They also often follow the seasonal increase in warmth and light. Many people report an increase in attacks when daylight savings time changes occur in the fall and spring. Researchers have focused attention on circadian rhythms, and in particular small clusters of nerves in the hypothalamus that act like biologic clocks. The hormone melatonin is also involved in the body's biologic rhythms. The trigeminal nerve carries sensations from the face to the brain along a nerve pathway. Activation of the trigeminal nerve causes the eye pain associated with cluster headaches. The parasympathetic autonomic system regulates non-voluntary actions in the body, such as secretions, heart rate, and blood vessel activity. When the trigeminal nerve stimulates the autonomic system it causes cluster headache symptoms such as eye tearing and nasal congestion. Cluster headaches are associated with dilation (widening) of blood vessels and inflammation of nerves behind the eye. Cluster headaches may be caused by blood vessel dilation in the eye area. Inflammation of nearby nerves may give rise to the distinctive stabbing, throbbing pain usually felt in one eye. The trigeminal nerves branch off the brainstem behind the eyes and send impulses throughout the cranium and face. What causes these events and how they relate to cluster headaches are still unclear. Because blood vessel dilation appears to follow, not precede, the pain, some action originating in the brain is likely to be part of the process. The pain of cluster headaches can be intolerable. Fortunately, as people age, the attacks tend to cease, although no one can predict when they will end. Anxiety and depression are common among people with cluster headaches, which can affect functioning and quality of life. The pain can be so intense that some people consider, or attempt, suicide. Nighttime attacks can interfere with sleep and lead to sleep deprivation. Lack of sleep can increase the risk for depression, and other physical and emotional problems. Some people with cluster headaches experience migraine-like aura. Research suggests that headaches that are accompanied by aura may increase the risk of stroke or transient ischemic attack (TIA). TIA symptoms are similar to those of stroke, but last only briefly. However, people who have had a TIA are at increased risk for later having a stroke. People with cluster headaches may have risk factors for stroke, such as smoking. However, there currently is no data that indicates a cluster headache increases the risk of stroke. Cluster headaches can affect all ages, from children to older people, but are most common from young adulthood through middle age. In men, the typical age of onset is in the 30s. In women, cluster headaches usually develop in the 60s. Men are 3 to 4 times more likely to have cluster headaches than women. Unlike with migraines, fluctuations in estrogen and other female hormones do not appear to play a role in cluster headaches. Alcohol consumption is a major risk factor. Alcohol, especially red wine and beer, is the most common attack trigger during active periods of headaches. Cigarette smoking and tobacco products are risk factors for cluster headaches. These headaches are more common in people who smoke. However, quitting smoking does not appear to stop attacks. Emotional stress and physical exertion are risk factors for triggering cluster headaches. Cluster headache attacks often coincide with times of seasonal change, such as in spring or autumn. Changes associated with daylight savings during these times of year may alter the normal sleep-wake cycle and trigger attacks. Cluster headaches tend to run in families, suggesting that a genetic component may be involved. Cluster headache may occur more commonly in people with a "type A" personality. About half of people with cluster headache have a personal or family history of migraine. It is possible for people to have both kinds of headache. Head injury with brain concussion appears to increase the risk of cluster headaches, although a causal relationship has not been proven. Cluster headaches tend to occur during specific sleep stages and are associated with several sleep disorders, including narcolepsy, insomnia, restless legs syndrome, and sleep apnea. An in-depth report on the causes, diagnosis, treatment, and prevention of insomnia. An in-depth report on the causes, diagnosis, treatment, and prevention of RLS. Obstructive sleep apnea (OSA) is a disorder in which a person temporarily stops breathing during the night, perhaps hundreds of times. In some people, OSA may trigger a cluster headache during the first few hours of sleep, making them susceptible to follow-up attacks during the following midday to afternoon periods. An in-depth report about the causes, diagnosis, treatment, and prevention of obstructive sleep apnea. Triggers usually have an effect only during active cluster cycles. When the disorder is in remission, such triggers rarely set off the headaches. Cluster headaches cause intense excruciating pain. The pain is located in, behind, or around the eye and is described as deep, constant, boring, stabbing, piercing, or burning. The pain may then spread to the forehead, temple, cheek, nose, and jaw. The pain generally reaches very severe levels within 15 minutes with the attack lasting for 45 minutes to 3 hours (if left untreated). People may feel agitated or restless during an attack and often want to isolate themselves and then move around. This is different than migraine headaches, in which people tend to want to lie down in a quiet room. Gastrointestinal symptoms are not very common. Cluster headaches usually strike suddenly and without warning. Some people experience a sensation of pressure in the affected side before an attack. Although rare, some people have a migraine-type aura before the attack. The symptoms of a cluster headache include stabbing severe pain behind or above one eye or in the temple. Tearing of the eye, congestion in the associated nostril, and pupil changes and eyelid drooping may also occur. Cluster headaches are diagnosed on the basis of signs and symptoms. Many people report a delay of more than 5 years in the diagnosis of their cluster headaches. Migraine-like symptoms (light and sound sensitivity, nausea, and vomiting) are major reasons for frequent misdiagnosis. In some cases, people are inappropriately treated for other types of headaches (like migraine) or health conditions (like sinusitis). Cluster headache is diagnosed by the pattern of recurrent attacks, and by typical symptoms (pain on one side of head, swollen eyelid, watery eye, and runny nose). The provider will ask about your medical history and perform a physical exam that will include looking at your head, neck, and eyes. The provider may perform a neurologic examination, which includes a series of simple exercises to test strength, reflexes, coordination, and sensation. Bringing pictures of you taken during a headache may help your provider. In some cases, the provider may order an imaging test to check for brain abnormalities that may be causing the headaches. For imaging tests, magnetic resonance imaging (MRI) scans are preferred over computed tomography (CT) scans because MRIs do not expose people to radiation. As part of the diagnosis, the provider should rule out other headaches and disorders. Cluster headaches generally last 15 minutes to a few hours and can occur several times a day. A single migraine attack is continuous over the course of one or several days. Cluster headache sufferers tend to move about while migraine sufferers usually want to lie down. Nevertheless, both cluster headaches and migraine cause sensitivity to light and noise, which can make it difficult to distinguish between these two headaches. Other headaches that resemble cluster headaches include SUNCT (short-lasting unilateral neuralgiform headache attacks with conjunctival injection and tearing) and paroxysmal hemicranias. Cluster headache may also resemble some secondary headaches notably trigeminal neuralgia, temporal arteritis, and sinus headaches. Cluster headache symptoms are usually precise enough to rule out these other types of headaches. A tear in the carotid artery (which carries blood to the brain) can cause pain that resembles a cluster headache. People with this condition may also respond to sumatriptan, a drug used to treat a cluster attack. An imaging test can identify this condition. An unusual condition called orbital myositis, which produces swelling of the muscles around the eye, may mimic symptoms of a cluster headache. This condition should be considered in people who have unusual symptoms such as protrusion of the eyeball, painful eye movements, or pain that does not dissipate within 3 hours. Headaches indicating a serious underlying problem, such as cerebrovascular disorder or malignant hypertension, are uncommon. (A headache without other neurological symptoms is not a common symptom of a brain tumor.) People with existing long-term (chronic) headaches may, however, miss a more serious condition believing it to be one of their usual headaches. An in-depth report on the causes, diagnosis, and treatment of brain tumors. Sudden, severe headache that persists or increases in intensity over the following hours, sometimes accompanied by nausea, vomiting, or altered mental states (possible indication of hemorrhagic stroke, which is also called brain hemorrhage). Sudden, very severe headache, worse than any headache ever experienced (possible indication of brain hemorrhage or a ruptured aneurysm). Chronic or severe headaches that begin after age 50. Headaches accompanied by other symptoms, such as memory loss, confusion, loss of balance, changes in speech or vision, or loss of strength in or numbness or tingling in arms or legs (possibility of stroke). Headaches after head injury, if drowsiness or nausea are present (possibility of brain hemorrhage). Headaches accompanied by fever, stiff neck, nausea and vomiting (possibility of meningitis). Headaches that increase with coughing or straining (possibility of brain swelling). A throbbing pain around or behind the eyes or in the forehead accompanied by redness in the eye and perceptions of halos or rings around lights (possibility of acute glaucoma). An in-depth report on the causes, diagnosis, treatment, and prevention of glaucoma. A one-sided headache in the temple in older people; the artery in the temple is firm and knotty and has no pulse; scalp is tender (possibility of temporal arteritis, which can cause blindness or stroke if not treated). Sudden onset and then persistent, throbbing pain around the eye that may spread to the ear or neck and is unrelieved by pain medication (possibility of blood clot in one of the sinus veins of the brain). New or changing headaches with a compromised immune system (such as from cancer or HIV). Triptan drugs. An injection of the triptan drug sumatriptan (Imitrex, generic) is the first-line cluster headache treatment. Intranasal formulations of sumatriptan or zolmitriptan (Zomig) are alternatives. Relief can occur in 5 to 10 minutes. Oxygen and sumatriptan injection are sometimes given together. Other drugs that may be used for acute attacks are nasal sprays of dihydroergotamine or lidocaine. Cluster headache attacks are usually short, lasting from 15 minutes to 3 hours. The excruciating pain may have subsided by the time the person reaches a medical office or emergency room. Because it can be difficult to treat attacks when they occur, treatment efforts focus on the prevention of attacks during cluster cycles. Although certain drugs are standard, preventive therapy needs to be individually tailored. Your provider may prescribe a combination of drugs. Verapamil (Calan, generic), a calcium-channel blocker drug, is the mainstay preventive treatment for cluster headaches. However, it can take 2 to 3 weeks for this drug to take effect. During this period, corticosteroids (typically prednisone) may be used as an initial transitional therapy. For long-term treatment of chronic cluster headaches, lithium may be used as an alternative to verapamil. Although they are not FDA-approved for cluster headache, anti-seizure drugs such as divalproex sodium (Depakote, generic) valproate sodium (Depacon, generic), valproic acid (Depakene, generic), topiramate (Topamax, generic), and gabapentin (Neurontin, generic) are sometimes used for preventive treatment. Behavioral therapies are a helpful accompaniment to drug treatment. These approaches can help with pain management and enable people to feel more in control of their condition. Heavy alcohol use is associated with cluster headaches. A majority of people with cluster headaches are cigarette smokers. While studies have not shown that quitting cigarettes will stop cluster headaches, smoking cessation should still be a goal. Smokers who cannot quit should at least stop at the first sign of an attack and not smoke throughout a cycle of active headaches. Breathing pure oxygen (by face mask, for 15 minutes or less) is one of the most effective and safest treatments for cluster headache attacks. It is often the first choice treatment. Inhalation of oxygen raises blood oxygen levels, therefore relaxing narrowed blood vessels. Appropriate patients may benefit from having a portable oxygen tank in their home. In some people, oxygen treatment only delays the attack by minutes or hours. In this case, oxygen therapy should be avoided, as it may actually increase the frequency of attacks. Triptans are drugs that are usually used to treat migraine headaches. They can also help stop a cluster headache attack. A subcutaneous injection of sumatriptan (Imitrex, generic) is the standard triptan treatment and is FDA-approved for cluster headaches. Sumatriptan injections usually work within 15 minutes. The nasal spray form may also be effective for some people, and generally provides relief within 30 minutes. The spray seems to work best for attacks that last at least 45 minutes, although some people find it does not work as well as the injectable form. Zolmitriptan (Zomig) is another triptan drug used for cluster headache treatment. It is given in either oral or nasal spray form. Zolmitriptan may have fewer side effects than sumatriptan. Triptans narrow (constrict) blood vessels. Because of this action, spasms in the blood vessels may occur, which can cause stroke and heart attack. This is a rare but very serious side effect. People with a history of heart attack, stroke, angina, uncontrolled high blood pressure, peripheral artery disease, or heart disease should not use triptan drugs. Serotonin syndrome is a life-threatening condition that occurs from an excess of the brain chemical serotonin. Triptans, as well as certain types of antidepressant medications, can increase serotonin levels. These antidepressants include selective serotonin reuptake inhibitors (SSRIs) and serotonin-norepinephrine reuptake inhibitors (SNRIs). It is important not to combine a triptan drug with an SSRI or SNRI drug. Serotonin syndrome is most likely to occur when starting or increasing the dose of a triptan or antidepressant. Symptoms include restlessness, hallucinations, rapid heartbeat, tremors, increased body temperature, diarrhea, nausea, and vomiting. You should seek immediate medical care if you have these symptoms. Injections of the ergotamine-derived drug dihydroergotamine (DHE, Migranal) can often stop cluster attacks within 5 minutes, offering benefits similar to injectable sumatriptan. Ergotamine is also available in the form of a nasal spray, rectal suppositories, and tablets. Ergotamine can have dangerous drug interactions with many medications, including sumatriptan. All ergotamine products approved by the FDA contain a "black box" warning in the prescription label explaining these drug interactions. Because ergotamine constricts blood vessels, people with peripheral vascular disease should not use this drug. Lidocaine, a local anesthetic, is applied to the affected nostril in nasal spray or nasal-drop form. It usually takes effect within a few minutes and can help temporarily stop pain by numbing part of the trigeminal nerve. Capsaicin is a compound derived from hot pepper. Some people who have not found relief through other medications use it to treat or prevent cluster headaches by applying it intranasally. There have been few studies to confirm its effectiveness. It can cause an intense burning sensation. Calcium-channel blockers, commonly used to treat high blood pressure and heart disease, are important drugs for preventing episodic and chronic cluster headaches. Verapamil (Calan, generic) is the standard calcium-channel blocker used for cluster headache prevention. It can take 2 to 3 weeks to have a full effect, and a corticosteroid drug may be used in combination during this transitional period. Constipation is a common side effect. People taking calcium-channel blockers should not stop taking the drug abruptly. Doing so can dangerously increase blood pressure. Overdose can cause dangerously low blood pressure and slow heart beats. Lithium (Eskalith, generic), commonly used for bipolar disorder, may also help prevent cluster headaches. The benefits of lithium usually appear within 2 weeks of starting the drug, and often within the first week. Lithium may be used alone or with other drugs. Lithium can have many side effects including trembling hands, nausea, and increased thirst. Weight gain is a common side effect with long-term use. Corticosteroid (steroid) drugs are very useful as transitional drugs for stabilizing people after an attack until a maintenance drug, such as verapamil, begins to take effect. Prednisone (generic) and dexamethasone (Decadron, generic) are the standard steroid drugs used for short-term transitional treatment. These drugs are typically taken for a week and then gradually tapered off. If headaches return, the person may start taking the steroid again. Unfortunately, long-term use of oral steroids can lead to serious side effects so they cannot be taken for on-going prevention. Serious side effects, such as avascular necrosis of the joints, may occur even with limited use of steroids. Other short term side effects include restlessness/irritability, elevation in blood sugar or blood pressure, low potassium (hypokalemia) and gastric irritation. Steroid injections may also provide short-term relief. Some people are helped by an occipital nerve block in which an anesthetic and a corticosteroid are injected into the occipital nerve in the back of the head. Researchers are also investigating suboccipital injections where a steroid is injected into the base of the skull on the same side as the headache attack. Anti-seizure drugs, which are used for epilepsy treatment, may be helpful for preventing cluster headaches. They include older drugs such as divalproex (Depakote, generic), valproate (Depacon, generic), and valproic acid (Depakene, generic) and newer drugs such as topiramate (Topamax, generic) and gabapentin (Neurontin, generic). More research needs to be done to evaluate how effective these drugs are at preventing cluster headaches. These drugs can have significant side effects. Some anti-seizure drugs, particularly valproate products, can increase the risk for birth defects and should not be taken by pregnant women. All anti-seizure drugs can increase the risks of suicidal thoughts and behavior (suicidality). Botulium toxin A (Botox) injections are typically used to reduce abnormal muscle contractions, such as may be seen in spasticity, various movement disorders (dystonia, blepharospasm) and to treat abnormal sweating, in addition to smooth wrinkles. Botulium toxin is also being studied for treatment of headaches, and is approved for prevention of chronic migraine. Research on its use for cluster headache prevention is still preliminary, and there is little evidence to support its effectiveness. Melatonin is a brain hormone that helps to regulate the sleep-wake cycle and adjust the body's internal clock. Some research suggests that melatonin supplements may help prevent episodic or chronic cluster headaches. Supplements are made from a synthetic chemical melatonin that is produced in a lab. Melatonin supplements are sold in health food stores, but as with most natural remedies, the quality of different preparations varies. More studies are needed to confirm effectiveness and dosage. Only a few small studies have evaluated hyperbaric oxygen for treatment of an acute cluster headache. In addition to limited availability and expense, there currently is no evidence to show hyperbaric oxygen is more effective than traditional oxygen. These related drugs have weak supporting evidence to support their use. Calcitonin gene-related peptide (CGRP) causes blood vessel relaxation and is involved in sensing of pain. Several investigational drugs that target CGRP are now being studied as treatments for migraine and cluster headache. One particular monoclonal antibody targeting CGRP has received fast track status for expedited review by the FDA and is currently in clinical trials as a novel treatment for cluster headache. Surgery may be considered as a last resort for chronic cluster headaches that do not respond to other treatments. People whose headaches have not gone into remission for at least a year may also be candidates for surgery. Most surgical approaches for cluster headaches are still considered experimental, having been tested on only a relatively small number of people. In general, surgery for cluster headaches has limited success and can have distressing side effects. However, some surgical techniques, such as deep brain electrical stimulation, are showing promise. A number of implantable electrical stimulation devices are being studied as treatments for chronic cluster headaches that do not improve with drug treatment. These work on specific nerve tissues, such as peripheral nerves, the sphenopalatine ganglion (SPG), occipital nerve, or high cervical spinal cord. Preliminary results are encouraging, but larger studies are necessary for most of these devices. Deep brain stimulation (also called neurostimulation) may relieve chronic cluster headaches that do not respond to drug therapy. A similar technique is approved for treating the tremors associated with Parkinson disease. The surgeon implants a tiny wire in a specific part of the hypothalamus. The wire receives electrical pulses from a small generator implanted under the collarbone. Although only a small number of people have been treated, results to date are promising. Some people have remained completely free of pain for an average of more than 7 months when the device is switched on. When the device is turned off, headaches reappear within days to weeks. The procedure is reversible and appears to be generally safe, although a few cases of fatal cerebral hemorrhage have occurred. There are other risks of this surgery, such as infection. Patients with these implanted wires and stimulator may be at great risk of injury if subjected to an MRI scan. Occipital nerve stimulation is being investigated as a less invasive and less risky alternative to deep brain hypothalamus stimulation. Recent studies have reported promising results in a small number of people with cluster headaches. Some subjects became pain-free, while others had reduced frequency of headache attacks. The vagus nerve runs between the brain and the abdomen. Vagus nerve stimulation (VNS) is a surgical procedure in which a small generator is placed under the skin on the left side of the chest. A surgeon makes a second incision in the neck and connects a wire from the generator to the vagus nerve. A provider programs the generator to send mild electrical pulses at regular intervals. These pulses stimulate the vagus nerve. VNS is sometimes used to treat epilepsy and depression that does not respond to drugs. It is also being investigated as a possible treatment for chronic migraine and cluster headaches. Nerve fibers in the sphenopalatine area (deep between the nose and the skull) transmit signals that may contribute to cluster headache pain. Very early research has shown that electrical stimulation of these nerve endings can reduce frequency of attacks in many patients. More studies are necessary. PRFR generates heat to destroy pain-carrying nerve fibers in the face. Unfortunately complications are common and may include numbness, weakness during chewing, changes in tearing and salivation, and facial pain. In severe, but rare, cases, complications include damage to the cornea and vision loss. PRGR is a less invasive technique than PRFR and has fewer complications. It involves injections of glycerol to block the facial nerves that cause the pain. Cluster headaches usually recur. Microvascular decompression frees the trigeminal nerve from any blood vessels that are pressing against it. The procedure is risky, and possible complications include nerve and blood vessel injury and spinal fluid leakage. There is reasonably good evidence that it is not effective for treatment of cluster headaches. Ashina H, Newman L, Ashina S. Calcitonin gene-related peptide antagonism and cluster headache: an emerging new treatment. Neurol Sci. 2017;38(12):2089-2093. PMID: 28856479 www.ncbi.nlm.nih.gov/pubmed/28856479. Bennett MH, French C, Schnabel A, Wasiak J, Kranke P, Weibel S. Normobaric and hyperbaric oxygen therapy for the treatment and prevention of migraine and cluster headache. Cochrane Database Syst Rev. 2015;(12):CD005219. PMID: 26709672 www.ncbi.nlm.nih.gov/pubmed/26709672. Digre KB. Headaches and other head pain. In: Goldman L, Schafer AI, eds. Goldman-Cecil Medicine. 25th ed. Philadelphia, PA: Elsevier Saunders; 2016:chap 398. D'Ostilio K, Magis D. Invasive and non-invasive electrical pericranial nerve stimulation for the treatment of chronic primary headaches. Curr Pain Headache Rep. 2016;20(11):61. PMID: 27678260 www.ncbi.nlm.nih.gov/pubmed/27678260. Garza I, Schwedt TJ, Robertson CE, Smith JH. Headache and other craniofacial pain. In: Daroff RB, Jankovic J, Mazziotta JC, Pomeroy SL, eds. Bradley's Neurology in Clinical Practice. 7th ed. Philadelphia, PA: Elsevier; 2016:chap 103. Gelfand AA, Goadsby PJ. The role of melatonin in the treatment of primary headache disorders. Headache. 2016;56(8):1257-1266. PMID: 27316772 www.ncbi.nlm.nih.gov/pubmed/27316772. Goadsby PJ. Migraine and the trigeminal autonomic cephalalgias. In: McMahon SB, Koltzenburg M, Tracey I, Turk DC, eds. Wall & Melzack's Textbook of Pain. 6th ed. Philadelphia, PA: Elsevier Saunders; 2013:chap 58. Hoffmann J, May A. Diagnosis, pathophysiology, and management of cluster headache. Lancet Neurol. 2018;17(1):75-83. PMID:29174963 www.ncbi.nlm.nih.gov/pubmed/29174963. Khan S, Olesen A, Ashina M. CGRP, a target for preventive therapy in migraine and cluster headache: systematic review of clinical data. Cephalalgia. 2017:333102417741297. PMID: 29110503 www.ncbi.nlm.nih.gov/pubmed/29110503. Láinez MJ, Guillamón E. Cluster headache and other TACs: pathophysiology and neurostimulation options. Headache. 2017;57(2):327-335. PMID: 28128461 www.ncbi.nlm.nih.gov/pubmed/28128461. Muñoz I, Hernández MS, Santos S. Personality traits in patients with cluster headache: a comparison with migraine patients. J Headache Pain. 2016;17:25. PMID: 26975362 www.ncbi.nlm.nih.gov/pubmed/26975362. Nesbitt AD, Marin JC, Tompkins E, Ruttledge MH, Goadsby PJ. Initial use of a novel noninvasive vagus nerve stimulator for cluster headache treatment. Neurology. 2015;84(12):1249-1253. PMID: 25713002 www.ncbi.nlm.nih.gov/pubmed/25713002. Petersen AS, Barloese MC, Jensen RH. Oxygen treatment of cluster headache: a review. Cephalalgia. 2014;34(13):1079-1087. PMID: 24723673 www.ncbi.nlm.nih.gov/pubmed/24723673. Rizzoli P, Mullally WJ. Headache. Am J Med. 2018;131(1):17-24. PMID: 28939471 www.ncbi.nlm.nih.gov/pubmed/28939471. Robbins MS, Starling AJ, Pringsheim TM, Becker WJ, Schwedt TJ. Treatment of cluster headache: the American Headache Society evidence-based guidelines. Headache. 2016;56(7):1093-1106. PMID: 27432623 www.ncbi.nlm.nih.gov/pubmed/27432623. Rozen TD, Fishman RS. Cluster headache in the United States of America: demographics, clinical characteristics, triggers, suicidality, and personal burden. Headache. 2012;52(1):99-113. PMID: 22077141 www.ncbi.nlm.nih.gov/pubmed/22077141. Schuster NM, Rapoport AM. New strategies for the treatment and prevention of primary headache disorders. Nat Rev Neurol. 2016;12(11):635-650. PMID: 27786243 www.ncbi.nlm.nih.gov/pubmed/27786243. Reviewed By: Joseph V. Campellone, MD, Department of Neurology, Cooper Medical School at Rowan University, Camden, NJ. Review provided by VeriMed Healthcare Network. Also reviewed by David Zieve, MD, MHA, Medical Director, Brenda Conaway, Editorial Director, and the A.D.A.M. Editorial team. Editorial update 09-19-18.
2019-04-20T22:58:55Z
http://ccok.adam.com/content.aspx?productId=10&pid=10&gid=000099
Where are the Israelite Burials From the Wilderness Wanderings? This individual states: “How can it be logical to say the Israelites wandered in the Sinai Peninsula for 40 years, and the older ones all died, and kept the younger ones very busy burying their older generation (all the millions of adults who came out of Egypt), and yet archaeology in that location never has found a single gravesite from the entire time of the wilderness wanderings? I don't think the Sinai Peninsula is the right location for the 40 years of wanderings because there should be millions of graves there if that is where the Israelites wandered” (Italics by Gordon Franz). Is this a valid objection to Mount Sinai being in the Sinai Peninsula? First, we should start with the hermeneutical questions: Does the Bible interpret the archaeological finds? Or, do the archaeological finds interpret the Bible? In “Curious’” case, archaeology is used to interpret the Bible (see italics quote). That is a very dangerous precedent to follow because archaeology is not an exact science and it is always changing with new excavations and new interpretations. Views held by archaeologists today may be passé tomorrow due to new evidence. So I would reject “Curious’” underlying presupposition. I believe that the Bible is divine revelation and it should interpret the archaeological finds. The Bible is clear, Mount Sinai is in the Sinai Peninsula, and so the Bible has to dictate how we interpret the archaeological finds (Har-el 1983; Rasmussen 1989:86-92; see also: Where is Mount Sinai? ). Second, to say that there are no graves in the Sinai from the period of the Exodus / Wilderness Wanderings is very misleading. One should first ask the question: In what archaeological period was the Wilderness Wanderings (Cohen 1983:16-39; for surveys of Sinai, see Meshel 2000)? Does a preconceived idea of which archaeological period to look at happen to eliminate all your evidence? Third, what kind of graves would Israelites have been buried in? If the Israelites buried their dead in a simple trench burial in the ground, would they have even left a marker on top of the grave? There would be no reason to mark the grave because they were heading to the Promised Land, the Land of Canaan, and not returning back to visit the graves of their ancestors as Bedouin in Sinai, the Negev, Jordan and Saudi Arabia do today, thus the markers on their graves so they can visit their ancestors! Fourth, how do we know that most of the Israelites were even buried in Sinai? The Apostle Paul wrote to the Corinthian believers that: “But with most of them God was not pleased, for their bodies were scattered in the wilderness” (I Cor. 10:5 NKJV). “Nevertheless, God was not pleased with most of them; their bodies were scattered over the desert” (NIV). One gets the distinct impression from this passage that most of the bodies were just left in the Wilderness, exposed to the elements … and the vultures, hyenas and jackals! If that is the case, there will be very few graves at all, thus “no gravesites in Sinai” would be a dead objection. This practice began with the Patriarch Abraham when he bought a cave near Hebron and buried his wife Sarah in it (Gen. 23). He was later interned there, as was his son Isaac and his wife Rebecca. Jacob and one of his wives, Leah, were buried there as well (Gen. 49:28-33; 50:5, 13). When Jacob died in Egypt, he wanted to be gathered to his fathers in the Promised Land. Abraham, and later Jacob, bought plots of ground near Shechem and this was later used as a burial plot for others of their descendents, including Joseph (Gen. 33:19; cf. Acts 7:15-16). Joseph clearly instructs the Children of Israel to rebury his bones in the Promised Land (Gen. 50:24-25; cf. Heb. 11:22; Ex. 13:19; Josh. 24:32). The Bible places the burial of Rachel in the tribal territory of Benjamin (Gen. 48:7; I Sam. 10:2; cf. Jer. 31:15; Neh. 7:26). Interestingly, in the territory of Benjamin, there are six or seven megalithic structures clustered together and preserve the Arabic name Qubur Bani Israil, translated “tombs of the sons of Israel” (Finkelstein and Magen 1993: 63*, 371-372, site 479; Hareuveni 1991: 64-71). When the Wilderness Wandering narratives are examined, there are only three accounts of burials recorded. The first is those who died of the plague at Kibroth Hattaavah [“the graves of craving”] after the LORD sent quail to their camp (Num. 11:31-34). The second burial that is recorded is that of Miriam, the sister of Moses, at Kadesh Barnea (Num. 20:1). The final burial is at the death of Aaron, the brother of Moses, on Mount Hor that is on the border with Edom (probably Mount Rimon, Har-el 1983:273-274). Interestingly, in the account of Aaron’s death, there is no mention of his burial (Num. 20:23-29), but there is mention of him being “gathered to his fathers” (20:24, 26). In the book of Deuteronomy, however, his burial is mentioned (10:6). The fact that Aaron would be “gathered to his fathers” indicates secondary burial was practiced, at least with him, during the Wilderness Wanderings. As was noted with the Patriarchs, their desire was to be buried in the Land of Israel (“Eretz Yisrael”). It is a distinct possibility that the Israelites gathered the bones of their relatives who died in the Wilderness and carried them to the Promised Land and buried them in the Land of Israel (Gonen 1985: 53 [sidebar], 54 [map]). If that is the case, there would be no graves of the Israelites in the Wilderness because they would be in Israel! Finally, the tables should be turned on those who reject Mount Sinai and the Wilderness Wanderings in the Sinai Peninsula. What is the nature of their “evidence” for graves at their theorized sites? Again, the questions that need to be answered are these: (1) Where are these “Israelite” graves outside of the Sinai Peninsula? (2) How does one know they are Israelites burials and not recent Bedouin burials? (3) What archaeological period are you looking for the Wilderness Wanderings? (4) What archaeological remains (if any) were excavated at these graves and are they from the period of the Wilderness Wanderings? (5) Were these human remains carbon dated to determine the possible dates of the bones? If so, are these dates consistent with the Biblical date for the Wilderness Wanderings? (6) Were DNA tests done on the bones to determine the ethnic origin of those buried in these graves? Were the DNA tests results compared to the local Bedouin in the area to see if it matched their DNA? I think we should pursue other avenues of inquiries before we allow archaeology to interpret the Bible, thus abandoning the clear statements of Scripture and removing Mount Sinai from the Sinai Peninsula and placing it in Saudi Arabia or somewhere else. Mount Sinai belongs in the Sinai Peninsula, right where the Bible places it! 1983 The Mysterious MB I People. Does the Exodus Tradition in the Bible Preserve the Memory of Their Entry into Canaan? Biblical Archaeology Review 9/4: 16-29. Finkelstein, Israel; and Magen, Yitzhak, eds. 1993 Archaeological Survey of the Hill Country of Benjamin. Jerusalem: Israel Antiquities Authority. 1985 Was the Site of the Jerusalem Temple Originally a Cemetery? Biblical Archaeology Review 9/3: 44-55. 1983 The Sinai Journeys. The Route of the Exodus. San Diego, CA: Ridgefield Publishing Company. 1991 Desert and Shepherd in Our Biblical Heritage. Trans. by Helen Frenkley. Kiryat Ono: Neot Kedumim. 2000 Sinai. Excavations and Studies. Oxford: BAR International Series 876. 1989 Zondervan NIV Atlas of the Bible. Grand Rapids: Zondervan. I was trying to submit a big long comment just now, and my computer crashed. Maybe it submitted, maybe not. Well, to make a long story short, why do the 40 years of wanderings all have to be in the Sinai Peninsula? Just having the mountain there does not mean the Israelites stuck close to it the whole time...or does the Bible say they did, and I'm just missing something? That is a very, VERY interesting article. Yes, you're right, we shouldn't use archaeology to interpret God's Word; that would be very foolish and heretical. Sorry if I gave you that impression. I didn't mean to imply that anything would ever trump the Scriptures! I am a very literal Bible-believer, let me assure you. And usually, the only English Bible I ever read is the KJV, so I was pretty shocked to see that the quote from the NKJV is so drastically different (I Cor 10:5)...Sorry, I don't trust the NKJV's translators;I have often noticed they deviate badly from the Textus Receptus. But lay that aside...The possibility of the Hebrews lugging the whole lot of their parents' bones all the way to Israel for burial does not seem like too much of a stretch, no matter where they wandered--Sinai Peninsula, Saudi Arabia, or anywhere else. I could buy that notion more than the jackal idea. In fact, if "Qubur Bani Israil" which you mentioned turns out to be the graves of the people who died in the wilderness, based on some amazing future archaeological studies, that would be wonderful. On the other hand, it is unlikely the Israelites would have left their parents' bodies where they knew jackals would get them; that would go against all respect for parents, and the only argument you present for that is a verse from some Bible versions I don't trust. HOWEVER, as I said, I'll put that aside! My MAIN point is, I just don't see why the 40 years of wanderings have to be in the same general location as Mt. Sinai itself. Forty years is a long time, plenty of time to get a long, long way from Mt. Sinai. I never argued that Mt. Sinai itself wasn't in the Sinai Peninsula. You have made a reasonably good case from the Bible for that location, it seems to me. I just don't see why the 40 years of wanderings have to be there. Am I just missing something in the Bible which says the Israelites hung around right near Mt. Sinai most of the time? Overall, you have got me probably more than 30% convinced, which is pretty good for such a hard-headed (yes, I admit it) character as me. Thanks for taking me seriously...that means a lot to me. How could Noah's 3 sons populate the world in 3 generations.Nimrod was Ham's grandson.How could there be enough people to live in all the cities Nimrod built? There were not Millions of Israelites in the exile from Egpyt . The bible says 600,000 men. That is an error. men ,women and children would be about 1.8 million people.70 people could not grow to 1.8 million people in 430 years. the word eleph in Ex. 12 :37 did not mean thousand, it meant "families or tent groups". That be 600 hundred families = about 3,600 or 4,000 people. The word "eleph" eventually came to mean "thousand".See Strong' s Hebrew Dictionary word number 505. Erma - some people hold that view based on Exodus. However, by the time you read the census in Numbers, that approach falls apart, as the math simply doesn't support "600 families". Moses really did mean 600,000 men. By the way, if you do the math, you'll see that if each of the 70 men that traveled to Egypt had 10 sons each, and this pattern continued, you would have over 1,000,000 men in just a few generations. Easily do-able in 430 years. And that doesn't include the Egyptians that joined the Jews for the Exodus. If 10 sons sounds like a lot, recall that Abraham had 8, Ishmael and Jacob both had 12, and the Bible states that the Children of Israel had so many offspring that the Egyptians were worried. In that light, 10 is not extreme at all. We don't even need to consider extremes like Josephus' statement about 33 sons for Adam. 6,000 families is hardly worthy of worry, wouldn't you say? 600,000 men, on the other hand, and you've got a small army. Apologies, Erma, but the Hebrew word Elef does mean a thousand. The reference in Judges 6 v 15 where Gideon says that he is the least of his family (Hebrew Alfi) literally means that he is the least of his company of one thousand who is united under a single leader, i.e. tribe. Reference this with Exodus 18 v 21: '... and appoint them as officials over thousands (Hebrew Alfalim, stem Elef), hundreds, fifties and tens.' Also Exodus 18 v 25: '... and made them leaders of the people, officials over thousands (Hebrew Alfalim, stem Elef), hundreds, fifties and tens.' The use of the word leader over a thousand is consistent with the interpretation of Alfi in Judges 6 v 15 as meaning a unit of one thousand united under a single leader. Pace The Brown-Driver-Briggs Hebrew and English Lexicon and the Biblia Hebraica Stuttgartensia. A question for the author, if he still reads the responses. How do you account for the fact that archaeology shows that none of the cities which the Israelites conquered and destroyed show any signs of having been destroyed at the time which the conquest is supposed to have taken place? If the exodus is true, as you argue, then why do the cities mentioned not show any signs of having been destroyed within the same period of time? Also, there is no indication that the areas which the Israelites conquered showed a dramatic change in cultural practice? The cities which the Israelites conquered show clearly that there was no interruption in cultural practices, including religious worship. And why does the Bible claim that Jerusalem was conquered and also not conquered? That is not precisely exact. You recommend that readers be aware that archaeology is not an exact science, but the Bible shows no evidence of an attempt to be exact either. Why should we be suspicious of inexact archaeology, but have no qualms about accepting the inexact Bible? And why is it that the cities which the Israelites supposedly conquered match exactly the area which king Josiah earmarked for inclusion into Judah after the fall of the northern kingdom of Israel? Surely the fact that the conquest narrative cannot be supported through archaeology makes it a moot point to prove that the exodus really happened as both are part of the same event. I would be interested to hear your comments and references that you can provide. Thanks for posting your comments here on the ABR website. I must tell you that you do seem to know alot of things that simply are not true about the Conquest of Canaan. I wish you were not just parroting old-hat, sweeping generalizations still uncritically accepted by many scholars in archaeological studies. You state: "Surely the fact that the conquest narrative cannot be supported through archaeology makes it a moot point to prove that the exodus really happened as both are part of the same event." The history of 40 years of ABR has been spent showing why your comments are incorrect. I would point you to the section on Exodus-Conquest to the variety of materials we have produced over that time. We have corrected the scholarly blunders pertaining to Jericho and Ai, conducting our own investigation into correcting the problems with the identification of Ai at et-Tell. I know that this is alot of material...so it would take a considerable amount of time for you to read. However, we have done our homework and it requires this level of effort to show the errors most scholars have made pertaining to the Conquest of Canaan. The Bible is correct in every statement that it makes, and archaeology supports that assertion. The error is not with the Bible, but with wishy washy Christian scholars and unbelieving scholars who have an axe to grind, even if they don't admit it. I realize this requires an entire and dramatic turning from what you have been told and taught about Biblical history, but that it the nature of truth. The Bible is an unbreakable anvil, against which all falsity and philosophies of sinful man shatter. It is far wiser to submit to its truth and Gospel message, than beat on it with vanity and fruitlessness. May you come to know its truth and its author, the Son of God, Christ Jesus. At the heart of the issue is the meaning of the Hebrew word eleph. It is usually translated “thousand,” but has a complex semantic history. The word is etymologically connected with “head of cattle,” like the letter aleph, implying that the term was originally applied to the village or population unit in a pastoral-agricultural society. From that it came to mean the quota supplied by one village or “clan” (Hebrew Mišpasha) for the military muster (Malamat 1967: 135). Originally the contingent was quite small, five to fourteen men in the quota lists of Numbers 1 and 26, as shown by Mendenhall (1958). Finally the word became a technical term for a military unit of considerable size, which together with the use of the same word for the number 1,000 has tended to obscure its broader semantic range. See also Humphreys 1998 and 2000. Thank you for your speedy reply and ample references. I will certainly work my way through it, although, I should point out that the sources I rely on for my information are, with rare exceptions, all published post 2000. I find it unlikely that the likes of Lester Grabbe, Richard Hess, Israel Finkelstein, Amihai Mazar, Richard Horsley, Paul Davies, Joseph Blenkinsopp and Karel van der Toorn, to mention a very few, will all still in the first decade of the 21st century be publishing findings which have been refuted decades earlier. From my own experience of teaching in the field, that is not how things work. However, be that as it may, I would like to raise a few questions regarding the claim that the Bible is correct in every statement that it makes. It is a statement which, in view of the Biblical text, is clearly unsustainable. Consider Genesis 1 and Genesis 2, are you implying that both versions of creation are true, even though in Genesis 1 man and woman are created together after the animals, whereas in Genesis 2 man is created before the animals but the woman is only created at the end. These two versions cannot both be accurate as they do not correspond. That would seem to undermine the claim that every statement in the Bible is true. Also, how can we determine which version is true? In 2 Samuel 24 v 1 it says that God became angry with Israel and he commanded David to conduct a census, the NIV Bible reads: 'Again the anger of the LORD burned against Israel, and he incited David against them, saying, "Go and take a census of Israel and Judah'. This is clearly god talking to David . However, in 1 Chronicles 21 v 1 it is the Devil who incites David to conduct the census and there is no mention of the anger of God or God talking to David about the census. Why the different versions? Joshua 15 v 63 states that the people of Judah could not drive the Jebusites from Jerusalem and had to share the city with them 'to this day'. However, Judges 1 v 8 says that the people of Judah conquered Jerusalem and burnt it to the ground. 13 verses later, Judges 1 v 21, it is no longer the people of Judah who fought against the Jebusites, it is now the Benjaminites, and they too couldn't drive the Jebusites out and so shared Jerusalem with them 'to this day'. So, using archaeology, was Jerusalem conquered, or not? If so, was it conquered and occupied by the people of Judah, or by the Benjaminites? And, if it was conquered, does the Bible also say that it wasn't? Why does the Bible have three different versions of this event, none of which correspond? And lastly, which Bible is true? The canonical (Masoretic) Hebrew text has 1 Samuel 13 v 1 reading as: Saul was a year old when he began to reign, and he reigned two years over Israel.' It is not necessary to point out that that is hardly something which can be reconciled with Saul's feats on the battlefield, and it is unimaginable that a 3 year old will have the mental or physical abilities to commit suicide by falling onto his own sword. Clearly, this is a challenge for the idea that every statement in the Bible is true. Greek translations based on the earliest Hebrew texts omit this verse completely, for obvious reasons. We know therefore that the Masoretic text does not contain a later error, if that had been the case, the Greek texts would not have left the verse out, and would have had a more realistic age. The Syriac Peshitta, which is also a fairly early Hebrew text, has Saul aged 21, and leaves out the years of his reign. In the English translations, the King James version is true to the Masoretic text, whereas the Jewish Publication society, which generally follows the Masoretic text, leaves out Saul's age. The New American Standard Bible has Saul aged 30 and reigning for 42 years. Young's Literal Translation reads, somewhat laboriously, but in agreement with the Biblia Hebraica Stuttgartensia, 'A son of a year [is] Saul in his reigning, yea, two years he hath reigned over Israel,'. So, which Bible has Saul's age wrong, and how can you demonstrate that? All references to English Bibles used can be accessed at www.biblegateway.com, and an electronic version of the the Hebrew Westminster Leningrad Codex is also available there. It is worth noting that the Westminster Leningrad Codex reads Saul's age as one year and his reign as two years. Again, I would be most interested in your comments about the above. Thanks for your reply. I must confess up front, by the nature of your response, I doubt that my providing answers to your objections will lead to a serious change of mind. I suspect that it will lead to more red herrings and excuses to impugn the Bible so its spiritual message can be avoided. Very often, we find these so-called objections to be shallow, or the objector has never seriously read material by Christian scholars that show that the objections are ill-founded. Most of the time, the person is just interested in throwing out more so-called objections for the purpose of continuing to prolong a debate in which they have no true intent to have their mind changed. I suspect you fit in this category, to be frank, but I shall endeavor to at least touch on a couple items herein. Based on your reply, I can interact with my colleagues and other resources about the questions you have asked which I don't address in this post. Your methodology of only using post-2000 references is arbitrary and biased. For example, pertaining to Ai, scholars have blindly accepted the pronouncements of the past (starting with Albright), and have not taken the time to see the probems with the research that led to their erroneous conclusions. Therefore, no secular scholars that we know of have even taken the time to QUESTION the identification of Ai at et-Tell for the past couple of decades. Only ABR has done any serious work on the matter. You must go back quite far to reconstruct the reasons why et-Tell was identified as Ai, and ALL of this pre-dates 2000. The same goes with Jericho. Since Kenyon's errors in the 1950's and blind acceptance by the academic community that the Bible was wrong, only Dr. Wood of ABR has taken the serious time necessary to re-examine her work and John Garstang's work from Jericho. To do this, he had to go back several decades to look at all the reports, study the pottery, read the history, etc. This was an enormous undertaking, one which few, if any, scholars have truly done with Jericho. He discovered that Kenyon was wrong in her conclusions, far a long list of detailed and logical reasons...wrong to a point of being sloppy. How can one limit oneself to only scholarship of the last 10 years and be serious about discovering the truth? Second, the secular scholars are not neutral, no one is. The serious work we have done at ABR has shown, without question, that the scholars of the past made a series of blunders pertaining to Bethel, Beth-Aven, and Ai. They have, by and large, done NOTHING to reevaluate their assumptions on the subject. Finkelstein, for example, is not the neutral observer he always claims he is. EVERYONE is practicing philosophy in their work. Further, listing a series of esteemed authority figures is not a scientific argument. Finkelstein's false neutrality is an attack upon the Bible, because the Bible makes philosophical claims about the nature of reality and about the history of Israel that Finkelstein blatantly denies. The argument about Genesis 1 and 2 is old-hat, based in part on the erroneous and anti-supernaturally biased JEDP hypothesis. The Genesis 1 narrative is a simply, factual presentation of the works of God during the creation week. Genesis 2 focuses on particular aspects of that narrative, particularly the creation of Adam and Eve on day 6 and a focus on events leading up to the Fall. "a brief, general outline...an account of the making of one of the creatures of the material world, and the second at length and in detail, as the story of creation of the CENTRAL BEINGS of the moral world..such a repetition was consonant with the stylistic principle of presenting first a general statement and thereafter the detailed elaboration, which is commonly found not only in Biblical literature but also in the literary works of the rest of the Ancient Near East." From Adam to Noah: A Commentary on the Book of Genesis I- VI (Pt. 1) by Umberto Cassuto, pg. 20,91 (1961). Pertaining to the Biblical MSS, you are conflating the Biblical doctrine of INSPIRATION with the preservation of MSS. Inspiration, strictly speaking, refers to the Holy Spirit inspiring Moses, Paul, etc. to write the original Biblical text. The subsequent copies are not inspired texts, per se. They are copies of the inspired text, and the copying of the texts was not an infallible process. There are clearly MSS that contain errors. The answer to the Saul question lies with several things: a. a detailed analysis of all the MSS in question. b. The bearing of other Biblical data on the subject. You are obviously correct in eliminating the MSS that report his age of 1 or 3. The scribes who recorded those ages clearly made mistakes. But it does not necessarily follow (a fallacious non-sequitur) that the ORIGINAL writer made a mistake, nor does it mean that the correct age does not appear in our current MSS. The science of Textual Criticism, and the bearing of other Biblical data on the issue at hand can help reveal which MSS faithfully represents the original. This process is done with ALL ancient writings. The detailed study of subsequent MSS copied over many centuries is an attempt to reconstruct the original text. To the degree that MSS reflect the original text, the MSS communicate the original words given by God to the human writer. To that extent, they are the Word of God. The study of MSS shows, beyond question, that we have a very high degree of correctness in our hands today. There is no reason to doubt this. To doubt it is to doubt every single MSS of any other book from the ancient world. Have you used your own erroneous criteria to evaluate other ancient works, or only the Bible? For the NT, i refer you to: J. Harold Greenlee, The Text of the NT: From Manuscript to Modern Edition, Hendrickson Publishers, 2008. I leave you with this challenge... read EVERY ARTICLE IN DETAIL that I mentioned before. After doing so, articulate for yourself your own detailed reasons why our arguments and evidence are not sound. But don't just quote esteemed authority figures who, for the most part, have not done their homework on these particular subjects. "Finkelstein says so" is not an argument against our work. I hope you will seriously consider and come to accept that the Bible is without error, and its message is absolutely trustworthy. You have had bad experiences in the past discussing the Bible, haven't you? I'm sorry to hear that, but one can criticise the Bible without impugning it, and I seriously doubt that one can really understand it properly unless one looks at it critically. I am not sure whether you have read Professor of Philosophy Keith Ward's book, The Word of God, in which he, in the introduction, explains that one cannot seriously consider oneself equipped to interpret the Bible today if one does not take into consideration the results of critical biblical scholarship. I doubt very seriously that Ward was equating critical scholarship with impugning. I do not therefore see the basis for your suspicion other than your own preconceived notions, which I think, in both our cases, should be set aside. I too have had bad experiences with people of a religious conviction, but I am not going to colour you with the same brush for reasons which are sufficiently obvious as to preclude itself from being mentioned. As we are discussing several different issues at the same time, I am going to post the link for the relevant article at the beginning of my post and give it a number to distinguish it from the rest. If you can refer to that number in your response, I think it will make it easier for the conversation to remain focused. Before proceeding with my first response, I would also like to clarify one further point. Far from being arbitrary or biased, my choice to accumulate books ante dating 2000 is to draw your attention to the fact that my sources are recent publications. There is a simple truth involved in this. Recent publications are informed by prior publications, that is, they deal with previous research. In contrast to this, prior publications are not informed by recent publications, that is, they do not deal with recent discoveries. It is hardly biased and it certainly is not arbitrary. Hence, my sources may be recent, but that does not mean that I am unaware of what has been published or suggested previously. And, contrary to what you are assuming, your reponses and references have so far been of tremendous help to me. I am sure that you are aware that in scientific thinking, ideas are accepted as true if they resist falsification. I cannot very well see whether your ideas resist falsification if I do not query it. I am sure you can appreciate that. I trust that clears up the misconception. Now, back to the real issues. First of all, I would like to concede two points with regards to Genesis 1 and 2. Genesis 2 is indeed a different type of creation account from Genesis 1. And, the Hebew words used to describe plants in Genesis 1 and 2 are not the same, hence, it can be conceded on that basis that they can be taken to refer to different types of plant. However, I don't think it can be taken as conclusive proof that they are complimentary and not alternative versions or interpretations of the same event. But, be that as it may, we don't really know what the author(s) had in mind when they wrote it. The article does argue that Genesis 2 v 4-5 refers to plants of the field, and then asks 'what field?'. Indeed, what field? If, as the article suggests, it refers to plants which are of an agricultural nature, then it does beg one question. Do agricultural plants only grow when planted by humans, or can they also grow naturally in the wild without being tended by humans? It will be a somewhat laborious point to pursue in order to try and demonstrate that agricultural plants can also grow without human cultivation, which would lead us to ask whether the author intended to portray agrigultural plants as being found only in pieces of land cultivated by humans. I am assuming, that as a literalist, you will probably counter by saying that it is irrelevant whether those plants also grow in the wild, because, as is stated by the article, what is at issue is that they were created by God for agricultural purposes when the Garden of Eden was created. What is obvious is that the account of Genesis 2 is intending for us to accept that agricultural plants 'of the field' did not exist prior to the creation of man. That would, however, be a point which I cannot concede. It is dependent on accepting the creation accounts as true, and at the moment, that is not established. Using the reference to the different Hebrew words used to describe the various plant types then, in my opinion, can't be used to argue that the two accounts supplement each other, rather than that they are alternative accounts, because the different uses do not as a matter of fact establish that Genesis 2 is the result of a deliberate attempt to expand on Genesis 1. If you can resolve the above, then, as the article suggest, the following problem can be avoided as well. Again, let me start with a concession. The use of the pluperfect instead of the simple past tense is certainly a possibility in my opinion. However, so is the use of the simple past tense. I think it can be both, not either or. However, I think that a preference for one over the other is determined more by intent than actual grammatical dictates. As it is inconsequential to me what the outcome is, I am not going to argue for one or the other. It is, in my opinion, sufficient that the pluperfect is not THE required rendition. The reference to the complicated nature of the waw consecutive is also not inaccurate, so that is not a point which I am going to contest. However, the fact that there are various usages of the waw consecutive in the Old Testament, which serves to prove that it is not solely used to indicate succession is not sufficient to demonstrate that this is in fact the case in Genesis 2. 3. male and female he created (Hebrew bara) them. It is not the third phrase which is chronologically later, it is both phrases 2 and 3, given that in both instances the verb is in the same tense, whereas in phrase 1 it is a different tense. Why are we given to believe that in two phrases where the verbs are in the same tense, one of those relates to the verb in the different tense in phrase 1, but not the other? Especially, in view of the fact that the hebrew word adam, can also be translated as mankind, which does not refer to man only. In fact, the Brown Driver Briggs Hebrew and English Lexicon lists Genesis 1 v 26 as God referring to mankind, not man. Why then should we consider Genesis 1 v 27 (Phrase 1 above) to refer to man, and not mankind as in v 26, and so draw the conclusion that phrase 3 is chronologically later than phrase 2, despite the fact that the same verb in both phrases is in the same tense in both phrases? You seem to be a person that can handle straight talk, which I appreciate. So, I will give you some, not with bitterness or anger, but with concern over the position you are taking with respect to the Bible. Simply stated, you have unwittingly adopted a self-deceiving philosophy that sets yourself up as a supposed arbiter of neutrality. The supposed position of neutrality is already biased against the Bible right from the start. When you approach the Bible with the idea that it may or may not be correct, you already presuppose that it could be a human document written by the hands of men, and with errors. To presuppose that the Bible may not be what it claims to be it to say that HUMAN REASON is the final arbiter of truth. That human reason stand OVER AND ABOVE the Bible. That human reason is the master that stands over the words that God has declared. This is completely antithetical to the claims the Bible makes about human reason and the authority of God. Human reason is a tool that God has given man, a reflection of His own infinite and perfect intellect. But it was never intended to be a master. Human reason is a tool, not an authority. Man is more than a reasoner. He is an image bearer, and is a spiritual being as well. He was made for God's purposes, not his own. Second, human reason is fallen because of sin. Human reason has now become a tool that man uses to militate against God and His revelation. (Romans 1:18-32). Often, this is carried out in an unwitting fashion, such as the neutrality you are trying to operate in. When human reason claims a status above Scripture, that human reason can be the final judge as to whether the Bible is the Word of God, it already presupposes against Scripture's authority, and is, in fact, rebellion against God. Romans 8:7 is very clear in this regard: "the sinful mind is hostile to God. It does not submit to God’s law, nor can it do so." And, I Corinthians 2:14: "The man without the Spirit does not accept the things that come from the Spirit of God [i.e. THE BIBLE], for they are foolishness to him, and he cannot understand them, because they are spiritually discerned." Third, the Bible is clear that YOU ALREADY KNOW GOD. And not just any old god, but the God of the Bible. Romans 1:18-20 states clearly: "since what may be known about God is plain to them, because God has made it plain to them. 20 For since the creation of the world God’s invisible qualities—his eternal power and divine nature—have been clearly seen, being understood from what has been made, so that men are without excuse. 21 For although they knew God, they neither glorified him as God nor gave thanks to him, but their thinking became futile and their foolish hearts were darkened." Your approach to the Bible presupposes against knowledge you already possess as an image bearer. The approach you are taking is a position of sophisticated skepticism, couched in false neutrality, and is, hence, rebellion. Looking at the Bible "critically", as you say, is not a neutral proposition either. I do not define "critically" the same way you define it. You seem to define it as essentially a study that may or may not reveal errors and contradictions, which presupposes that it is not from God, but from men. "Critically" means accepting the underlying secular and anti-supernatural philosophy that undergirds that so-called criticism. This is to already presuppose against the Bible's authorship claims right from the start. Critical scholarship IMPUGNS right from the start. When a Christian studies the Bible "critically", he studies it NOT to impugn, rather, to discover the riches and majesty of the divine oracles which God has graciously given to men. He studies it to be edified in his mind and his soul. He studies it to defend it against the attacks of fallible, sinful, rebellious men. He studies it because its beauty and majesty is worthy of man's attention and intellectual pursuit. He studies it as an act of worship. He studies it to be better equipped to share the message of the Gospel. He studies it because it is the very words of God Himself. 4. The authority of the Holy Scripture, because of which it ought to be believed and obeyed, does not depend upon the testimony of any man or church, but entirely upon God, its author (who is truth itself); therefore it is to be received, because it is the Word of God. 5. We may be moved and induced by the testimony of the church to a high and reverent esteem for the Holy Scripture. The heavenly character of its content, the efficacy of its doctrine, the majesty of its style, the agreement of all its parts, the scope of the whole (which is to give all glory to God), the full disclosure it makes of the only way of man's salvation, its many other incomparable excellencies, and its entire perfection, are arguments by which it gives abundant evidence that it is the Word of God. Nevertheless, our full persuasion and assurance of its infallible truth and divine authority is from the inward work of the Holy Spirit bearing witness by and with the Word in our hearts. This is hardly the position you are taking. Neutral arbiters often have keen minds (a gift from God), but their reason is used as a tool for rebellion, not worship. When faced with facts that resolve the alleged difficulties, they often move onto more alleged difficulties, often ad infinitum. Though you seem to deny it, you are already revealing a propensity toward that in examining Genesis 1-2. Our experience here at ABR is that critics rarely stop to consider the pervasive anti-God philosophy that informs their position, or the evidential arguments from archaeology that support the historical reliability of the Bible. They throw out one objection after another, and when those objections are answered, the answer is tossed behind them into an infinite abyss of unbelief, followed by more erroneous objections. Your reference to Mr. Ward is telling. It is a sweeping philosophical statement which I do not accept. Not because so-called critical scholarship does not provide some good information at a low level (linguistics, etc.), but because critical scholarship has an underlying anti-supernatural bias, a bias that presupposes that sinful, fallen, rebellious and fallible men can stand over the Living God's Words of Truth. A bias that presupposes human authorship of the Bible, most notably the underlying philosophical assumptions of the JEDP hypothesis. Your note in your second post that Genesis 1-2 may have authorS reveals your stripes. The Bible is clear that MOSES is the author/compiler of Genesis, whether he received it by direct revelation from God or from written documents passed down through the patriarchs. The NT testifies to this truth over 60 different times. But so called critical scholarship DENIES this. They often deny that Moses even existed. There is no neutrality here. There is complete, absolute, bias AGAINST the Christian position, particular the statements made by Jesus Himself concerning Moses. So, while I am glad to attempt to discuss your detailed points and study of the Biblical text, I want to make it clear that we are standing on different ground. Unbeknownst to you, you have asked me to leave my ground and step into this supposed neutral territory whereby we will both together try to discover the truth of the matter. But stepping into this arena is, in essence, an acceptance of your underlying and unstated philosophical assumptions, such as the proclamations of so-called critical scholarship. I cannot join you in your pursuit, per se, because your underlying assumptions are all incorrect. Even more fundamental is what you are taking for granted in this dialogue. The efficacy of human language, the regularity and dependability of physical laws which allow our computers, email, and internet to function, the ability to reason and argue, the assumptions that our minds can comprehend what is being written, the ability of our minds to connect with the phenomenon of the outside world, etc. I ask you to examine those assumptions. How can physical laws even exist in a universe without God? How can you trust those laws unless they were made by a personal, infinite being, who is both transcendent and imminent, and continue to be upheld by His infinite power? How could you even trust the veracity of your own thoughts and reasoning process if this were a chance, random universe? You presuppose the existence of God in everything you do, even as you rebel against Him! Through this dialogue, you have proven the existence of the God of the Bible. Congratulations! Unless you are willing to tear off your mask of unbelief (which is admittedly most difficult), or, step onto, at least for the sake of argument, the foundational Biblical philosophy where we stand, we will likely go round and round in circles. The ground upon which you stand is nothing but sand. And your ability to live, breathe, and reason is only because God is making it so. I shall endeavor to provide you with some further thoughts on the details of Genesis 1-2. Umberto Cassuto deals with the vegetation issue and chronology of Genesis 2:4-5 vs. Genesis 1 in detail in the book I referenced previously. I hope you will seriously examine what I have said. I say it not to berate, criticize or impugn. I say it to tell you the truth, so that you may personally come to know the Living God revealed in the Bible, and the Gospel of His Son. Genesis 2:5 and 3:18. "Now no thorns of the field were yet in the earth and no grain of the field had yet sprung up, for the LORD God had not caused it to rain upon the earth, and there was no man to till the ground." Cassuto comments: "The narrative begins with a description of the conditions existing prior to the creation of man. There was no siah of the field yet, and the 'esebh of the field had not yet sprung up...What is meant by the siah of the field and the 'esebh of the field mentioned here? Modern commentators usually consider the terms to connote the vegetable kingdom as a whole..." Cassuto goes on to explain that these terms are also both mentioned in the Fall narrative of Genesis 3:18, and do not refer to vegetation kingdom created by God on the 3rd day of creation that naturally reproduce themselves by seed alone. Rather, the 'esebh of the field refers to grain that required man to till the ground in order for it to proliferate. In other words, the 'esebh of the field required man to work the ground in order for its potential to be realized. The siah of the field refers to the thorns that arose as a result of the curse. At the earliest stage of human history, we see the potentialities found in the earth that only result when man does his God ordained work. Umberto Cassuto, A Commentary on the Book of Genesis, Part I from Adam to Noah, Translated by Israel Abrahams (Jerusalem: The Magnes Press, Hebrew University, 1961), 100-2. See also: C.F. Keil and F. Delitzsch, Commentary on the Old Testament: Volume I: The Pentateuch, (Peabody, MA: Hendrickson Publishers, 2006), 48. Robert V. McCabe: A Critique Of The Framework Interpretation Of The Creation Account (Part 1 Of 2) Detroit Baptist Seminary: Detroit Baptist Seminary Journal Volume 10, 2006. A Critique of the Framework Interpretation of the Creation Account (Part 2 Of 2) Detroit Baptist Seminary: Detroit Baptist Seminary Journal Volume 11, 2006. A good bit of his work is also found in one of our online books, Coming to Grips with Genesis, Chapter 8. This work is extensive, interacting with the Framework Hypothesis, espoused by Reform scholar Meredith Kline. However, many of the issues you raised are dealt with thoroughly in these references. McCabe does an extensive analysis of the use of the waw consecutive in the Genesis 1-2 narrative. 1983 The Double Creation of Mankind in Enki and Ninmah, Atrahasis I 1–351, and Genesis 1–2 . Iraq 45: 43–45. Kikawada, I. M. and Quinn, A. 1985 Before Abraham Was : The Unity of Genesis 1–11 . Nashville: Abingdon. 1966 Ancient Orient and Old Testament . Chicago: InterVarsity Press. Your answers to Roche are consistently ad hominem. Essentially "he doesn't get it because he doesn't ask God to explain the inconsistencies to him". Anyway, I like your arguments, as this now explains to me why the absence of proof for the construction of Valhalla by Wotan does not mean it does not exist. Not to mention your futile resorts to the God of the Gaps argument ("how can physical laws exist without God?"). Those arguments have long been answered. You accuse Roche of not tearing off the mask of disbelief, yet you do the same with concepts and laws that are you obvious if you would just overcome your cognitive dissonance. I assume you also deny evolution, despite all the proof in favour of it. That is why I love Mark Twain's comment about Faith, being believing that which one knows ain't true. If only you would stop disbelieving Wotan, Thor, Erda and the other beloved gods of the Vikings, you would realise what a wonderful life one can have by believing you will dine at the table of heroes with Wotan. Isn't that just wonderful? I must say I am extremely disappointed by your response. I thought I was interacting with a challenging and strong minded skeptic (now skeptics). Instead, I receive these silly comments about Thor and Valhalla, which have no connection to the argument or anything remotely dealing with real history, as the Bible does. I shall endeavor to engage in one more brief attempt to interact with you (now) and Roche. 1. This is not a "God of the Gaps Argument". I am challenging Roche to PHILOSOPHICALLY JUSTIFY physical laws, his ability to reason, etc. without the transcendent and imminent God of the Bible. Atheistic evolution, or philosophical naturalism, CANNOT account for regularity in physical laws, human language, the connection between the mind and the outside world, morality, and thousands of other phenomenon. It is not a gaps argument, it is a transcendental Biblical/philosophical argument. Given the assumptions of macro-evolution, where the world is left to chance, random processes over time, it is impossible, on those atheistic assumptions, to defend the efficacy of the very things which we all take for granted. To believe that physical laws operate they way they do in a universe governed only by random chance is to exercise blind faith, and is philosophically indefensible. 2. I was presenting a challenge to his underlying presuppositions, which cannot stand. The point I was making was rather simple: to presuppose that human reason stands over Biblical revelation and is its final judge is to already make a an apriori determination that Biblical revelation cannot be what it purports to be. Biblical revelation purports to be the Word of God, and it proclaims that human reason is fallen, and is used by fallen men to deny the very God who made reason to begin with. To assume human reason is autonomous and operates properly is to a priori reject the Bible's claims regarding human reason before the argument even starts. Most skeptics do not realize that they are not being, and cannot be, neutral. They are biased against the Bible right from the start. The belief in their own reason as the final authority and arbiter of truth is an arbitrary act of faith that has no justification. 3. Your rather silly reference to Mark Twain's idiotic definition of faith is very disappointing. True Biblical faith is entrusting one's life in the Redeemer and Creator, Jesus Christ. It is placing trust in His redemptive work, and His written Word. It is the most rational and reasonable decision one can make. It is the complete opposite of the silly definition of faith famously stated by Mark Twain and parroted by so many skeptics who haven't the foggiest idea what it means to have Biblical Faith. 4. Regarding evolution...ah! the heart of the matter. THE BIBLE OF SKEPTICS EVERYWHERE! Another erroneous presupposition, blindly accepted by most skeptics as proven dogma. It is a FAITH POSITION. One blindly and completely accepted by skeptics without any investigation into all its problems and false PHILOSOPHICAL assumptions. Skeptics accuse Christians of blindly believing things that cannot be...it is the skeptic who practices a blind and unreasonable faith. A faith that the world made itself. A faith that the human mind is a product of the accidental collocation of molecules and atoms. A faith that morality and physical laws could arise from a random impersonal structure is to exercise the blindest faith of all! I said I was very leary of Roche's sincerity in wanting to really pursue the truth. Not for any reason except that experience proves time and again that skeptics almost invariably study the Bible to impugn it, even if they don't acknowledge or realize that is what they are doing. "Advocates of evolutionary theory practice evolutionism when they routinely invoke (and dogmatically defend) naturalistic and humanistic philosophical presuppositions, and arbitrarily apply those presuppositions to their interpretation of the available empirical data. This fact (which many of them zealously deny) severely erodes evolutionists’ credibility, and effectively disqualifies them from any claim to objectivity in matters concerning origins and science, though much material is published by evolutionists under the pretense that it is the product only of purely objective and unprejudiced scientific inquiry. The question of origins is plainly a matter of science history—not the domain of applied science. Contrary to the unilateral denials of many evolutionists, one’s worldview does indeed play heavily on one’s interpretation of scientific data, a phenomenon that is magnified in matters concerning origins, where neither repeatability, nor observation, nor measurement—the three immutable elements of the scientific method—may be employed. Many proponents of evolutionism nevertheless persist in claiming exclusive “scientific” status for their popularized beliefs, while heaping out-of-hand dismissal and derision upon all doubters, spurning the very advice of Darwin himself." I am sorry that you fail to realize that your are practicing faith...BLIND, IRRATIONAL FAITH. I am presenting a challenge to the underlying presuppositions which skeptics take for granted and do not question. These presuppositions are accepted a priori. Skeptics stand on unbelieving assumptions right at the beginning of the debate, without questioning them. My intent has been to point out that you cannot stand on that ground. It collapses on its own assumptions. And, to even engage in a coherent argument, you are actually borrowing Christian principles to carry out the task of slapping God in the face. Anti-theism presupposes Christian theism! From: Vern Poythress, "Redeeming Science" "First, as fallen and sinful human beings we are in no position to make an accurate independent judgment about the character of the Bible and its truthfulness. We are not neutral judges, but judges who will inevitably misconstrue the truth. Those who attempt an independent judgment only show their own lack of self-knowledge. Second, we desperately need the Bible as part of the remedy for our mental and spiritual corruption. We need instruction from God, not only instruction that is pure and free of our personal and social corruption, but instruction that will serve as a means for our personal and social and political purification. The Bible has both properties: purity (Ps. 12:6; 19:8-9) and purifying power (Ps. 19:7-14; 2 Tim. 3:16-17). For the sake of our need, we must respond to what God says in the Bible with submission. Years ago Gerhard Maier argued that a critical mentality in approaching the Bible was incompatible with the character of the Bible as revelation from God. Equally, a critical mentality is incompatible with human need. A person cannot receive the depth of purification that he needs if he retains an independent spirit, because the independence itself represents a crucial stronghold for sin. Someone says that he wants to trust in God. But who is God? Our hearts deceive us and construct idols. How shall we know specifically what to trust, unless we have some specific words of promise, instruction, and rebuke from this God? “Trust in God” turns out to be empty unless there are specific ways in which we trust. Are those ways determined by us, independent of special revelation? Then we can make them suit the desires of our own darkened hearts. Or if the ways are determined outside of us, from specific special revelation, what is this special revelation? The Bible, you say? But then either we are accepting the Bible with trust, or we are picking and choosing among its contents, in which case it is we who are still covertly in control of every requirement that the Bible threatens to impose on us. Such control over revelation is not yet discipleship, but is still the autonomous independence that Adam fell into in his rebellion. Some theologians defend deviant views of biblical authority with great cleverness and acuity. The cleverness may be impressive. But it gives no signs yet of having understood the problem. The problem is that we are in desperate need of guidance, guidance from God that is pure and enlightening. In the deficient views, where is there an appreciation of the noetic effects of sin? And where is there a concrete proposal as to what practical means God offers for redeeming our minds out of this mess? If I do not trust the Bible “completely,” by what standard am I to subject modern culture to criticism? Deficient views of the Bible leave me at the mercy of modern culture. The only conclusion must be that modern culture is not so idolatrous, or that idolatry is not so bad, or that we do not really need to be rescued in the mind, or that God has not seen fit to provide a remedy. One must think one knows a lot to make claims like these. And, I think, one must be credulous to believe them." Further, Poythress' chapter, "Why Scientists Must Believe in God: Divine Attributes of Scientific Law", shows how scientists presuppose God in all they do. Pages 12-31. Seen in this online PDF. That's why it is called "Mt. Sinai"..... because it is inside the "Sinai Peninsula" Where do you supposed that mountain would be? Like in the biblical Noah's Ark that landed in the mountains of Ararat, Mt. Ararat is one of the peaks in the Ararat Region.... hence the name Mt. Ararat. So as in Mt. Sinai it is undeniably inside the Sinai Peninsula. So Henry, what you are telling Roche is that the Bible that we possess right now has no errors and is the authentic handed down version of God's word with his signed autograph on it and that we can only understand it if we submit to some kind of special spiritual "training". Futhermore, you are saying that once he can't understand something he needs to submit, but I find just the opposite is true that we first must submit then seek the truth, where ever it leads us. Your entire apologetic arguments to Roche are very condescending and erroneous. Why not just tell him the truth without all the attacking his motives etc when it is obvious none of us know them unless you have some special abilities which lie far beyond the pale. While I may or may not agree with you, stick to the issues at hand. It makes the reading here much more enjoyable without having to wade through the mud. I believe you have fundamentally misunderstood the points I was making to Roche. Concerning "motives", of course I cannot profess to know his heart. However, I was not evaluating his skepticism based on some conjecture, but on his attitude towards the Bible in the actual words he wrote. He claimed that our view of inerrancy was "clearly unsustainable", referred to multiple authorship of the Pentateuch as axiomatic [i.e. JEDP is true and it was not written or compiled by Moses], clearly believes that human reason should sit in judgment over the Bible and that Genesis 1 and 2 are somehow irreconcilable. My overarching purpose was to challenge his anti-theistic presuppositions. Most skeptics never question their bias, motives, and assumptions about the nature of reality and their own abilities. They assume human reason functions properly when it does not, for example. In that context, I also provided him with some answers that demonstrate there are solutions to the so-called problems he was raising. I also attempted to correct his erroneous conflating of the doctrine of inspiration vs. the preservation in the MSS we currently possess. He was concluding, like many skeptics do, that Christians argue that scribal copying was infallible. Of course it wasn't. We argue that the original author infallibly and inerrantly recorded what God instructed him to write, and that through the process of evaluating the MSS we possess, we can reconstruct the original text to a very, very high degree of certainty. In fact, I referred to the Chicago Statement on Biblical Inerrancy to illustrate the point. Concerning submission to the authority of God's Word, I was spelling out the proper attitude man ought to have towards God's written revelation. Your statement certainly does not comport with this view. To submit to the authority of God in Scripture does not include concluding that God somehow made mistakes when He moved the authors to write. If we accept the Word of God for what it actually is, then exploration of the Bible will lead to deeper understanding and solutions to apparent difficulties. Unresolved problems are just that: unresolved. If you think your study might lead you to conclude the Bible has errors, then you have not submitted to its authority in the first place. Perhaps the apologetic arguments are strong, but they are not condescending. Skeptics who think they are wise cannot see the folly of their own reasoning, and the anti-theistic bias they operate under. In dealing with skeptics over many years, we have found that the "micro" issues such reconciling Gen 1 and 2 and the like become a perpetual tennis match. The skeptic trots out one supposed error after another and then we run around finding answers for them. Very rarely are they interested in real answers. They want to remain sitting on the throne, and so I threw down the gauntlet and made a challenge. Note how the challenge had to be answered by his wife(?), and it was an infantile answer at that. The response validated what seemed very obvious to me right from the start: I was dealing with a hard-headed skeptic who wants to keeps his untenable human autonomy and hates God. "Christians are in themselves no wiser than are other men. What they have they have by grace. They must be 'all things to all men.' But it is not kindness to tell patients that need strong medicine that nothing serious is wrong with them. Christians are bound to tell men the truth about themselves; that is the only way of bringing them to recognize the mercy, the compassion, of Christ. For if men are told the truth about themselves, and if they are warned against the false remedies that establish men in their wickedness, then, by the power of the Spirit of God, they will flee to the Christ through whom alone they must be saved." Thanks for writing and for allowing me to further explain my position. Dear Henry, I fear that you are still addressing generalisations about atheists as opposed to the arguments that I presented. Whatever your personal beliefs about the Bible may be, there are some things about it which you cannot brush away with the argument that atheists do not consider the limit of reason. In fact, it is somewhat disingenious to suggest that the acceptance of the limitations of reason should lead one to accept that certain individuals of ages gone by suffered no similar limitations when they were writing about events which they did not witness nor had any means of corroborating, and to do so on the basis purely that these same people recorded that god was guiding the events which they are describing. It seems then that to accept the limitations of reason is to exclude the possibility of those same limitations applying to the authors of the Bible. Again, purely on the basis that they said so about themselves. I am familiar with a number of nations in the Ancient Near East who have seen themselves as chosen by their gods, but can you point me to the records of any nation in which they call not themselves their god's chosen people, but instead insist that the chosen people of their god is a neighbouring nation, possibly Israel? Why is it that out of all the nations who have labled themselves the chosen ones of their god it is the Israelites whom you believe? On the basis that they have said so themselves? Are you sure that you are trusting in god and not in people? You dismiss the Documentary hypothesis to uphold the Mosaic source of the Pentateuch, yet the same Bible sees the prophet Jeremiah, a contemporary of Josiah, dismissing Josiah's claim to have found the book of the Law (Deuteronomy) as false. Jeremiah calls it the work of scribes ... you call it the work of Moses. Either the Book of Deuteronomy is not the work of Moses, or the prophet Jeremiah made an error. Either way, both cannot be true, and to hold the Bible as inerrant means that you must simultaneously believe that Moses wrote Deuteronomy and that Deuteronomy is the work of scribes as Jeremiah claims and so is not written by Moses. The limitations of reason may be pronounced, but the limitations of unquestioning faith are absurd. The Bible contains four different definitions of who is an Israelite, they are mutually exclusive. An inerrant Bible implies that the Bible is wrong in three of those definitions, not by the prescriptions of reason, but by the dictates of the Bible itself. Your Bible disagreeing with itself, and inerrantly so. You are presenting a demand on those whom you disagree with while imposing no such demand on those whom you agree with, or more specifically, on those who said what you have come to believe. But as you said, reason has limits. The Bible claims that circumcision would be the sign of the covenant, an outward sign showing the difference between Israelite and non-Israelite. Yet circumcision was practiced widely by Israel's neighbours prior to Israel emerging on the scene. Given the significance of circumcision in signifying the uniqueness of Israel among the other peoples, why exactly does god choose an outward sign which makes the Israelites similar in appearance to non-Israelites? The Bible provides no explanation for this absurdity. I am sure you have one though. I have been very patient with you, even while my brother (whom you mistakenly assumed to my wife) was not. It should have been very obvious to you that he and I were dealing with different problems pertaining to faith, he with faith in general, I with faith derived from the Bible. Where exactly did he take up the challenge on s subject where he did not engage with you? You say the apologists are not condascending. You may wish to reconsider that. Whereas I disagree with my brother's approach here, I enjoy a proper debate, you claiming in the same response that you do not know my motives while also calling me a hard headed god hater is far from proper debate, however reducing my objections to the issue of being a god hater is properly condascending. If I am a god hater then you know my motives and you should not claim that you do not. But if you truly contend that you do not know my motives, then kindly do not lable me a god hater. You are in no position to call anything infantile if you proceed to defend your faith in a similar way. I ceased my participation in this discussion because you and Emile were heading in a direction where I do not wish to follow. Even without Emile's enticement, you are still heading down that road. But fortunately for me, you apology is not condascending ... If you wish to reduce my criticism to the issue of Genesis 1 and 2, please do so, do not however expect me to consider that an accurate representation of my position or even a proper response to my objections. I held you in higher regard prior to your last clarification, now it seems unfortunately that you have developed a knack for peddling cheap shot falsehoods. If this is your default response to people who disagree with you then clearly I need to ask myself whether I am wasting my time trying to discuss issues with you. The hard headed god hater ... if you will. Where are the Israelite Burials From the Wilderness Wanderings? This was the original topic so I will go back to this. 1) As to the 600,000 men and those who say that the Hebrew word translated “thousand”, could be “clans” instead, so they say it was 600 clans, troops or even households. When the King of Egypt said, “the children of Israel are more and mightier than we:” (Exodus 1:7-9) he obviously was not talking about 600 “households”. Josephus, writing in the Greek language, said it was 600,000 men and the Targums written in the Aramaic language, said there were 600,000 men. 2) “Sinai” Peninsula? The classical writers (ancient Greek and Roman writers) called the peninsula “Arabia” or "Arabia Petraea". The name “Sinai” Peninsula came from the name Mount Sinai, and historically there is no record of either the traditional Mount Sinai or the Peninsula being called Sinai before the third century after Christ. There is, however, the clear statement of Josephus, who said that the Midian nation which Moses went to was "in the country of the Troglodytes" (Antiquities II, 11, 1-2). The country of Troglodytes went all the way up to the head of the Gulf of Suez on the west side or what today would be the Eastern Desert of Egypt (Diodorus. III, 15, 38-39. Strabo. XVI, 4, 4. Pliny the Elder. Natural History VI). The apostle Paul located "mount Sinai in Arabia" (Galatians 4:25, not Saudi Arabia). The classical writers also call the Eastern Desert of Egypt "Arabia" (Herodotus Book II. Strabo Geography, Book XVII, 30) and this name can still be found on modern maps! 3) The Monastery of St. Paul in the Eastern Desert of Egypt has an interesting tradition about the Exodus of Israel. They say that during the wanderings of Israel that Miriam, the sister of Moses, washed there in a pool of water which they call the "Pool of Miriam". Israel’s next encampment after the Graves of Lust was at Hazeroth (Numbers 33:17), where Miriam was struck with leprosy. It is of interest that this tradition from the Monastery of St. Paul (also from ancient Arab writers) makes no mention of anyone else in the camp of Israel doing this, not even Moses or Joshua or Aaron, but only Miriam, the one person who was struck with leprosy at Hazeroth (Numbers 12:15). And according to the Bible (Leviticus 14:9), she would have been required to wash both her clothes and herself (“Pool of Miriam”) before re-entering the camp. If this is so then we should find the graves of lust close by which was the encampment just before Hazeroth, and which was the only mass grave recorded during the 40 years of wanderings. About seven miles from the Monastery of St. Paul are 30 catacombs! How did the Israelites die at encampment of Kibroth-hattaavah “graves of lust,” and Taberah? Both times the “fire” of God burned to death (cremated) multitudes who were there (Numbers 11:1, Psalm 78:20-21). The Egyptians, Arabs and Jews did not cremate; the Romans and Greeks who at one time ruled Egypt and sometimes cremated, had no known towns within 60 miles of these catacombs. The Bedouins call this site Wadi El Khawaja, "Valley of the Foreigner". It was Sir Wilkinson who found these catacombs and said, “We went into those where the doors were the least obstructed by the sand or decayed rock, and found them to be catacombs; they are well cut, and vary from about eighty to twenty four feet, by five…We sought in vain for inscriptions or hieroglyphics; our curiosity was only rewarded by finding the scattered fragments of vases, bitumen, charcoal, and cloth. It is evident that the bodies were burnt, and the ashes…deposited in the vases, of which innumerable broken remains are seen in every direction; they are earthenware, mostly red, and heart-shaped…” (Sir Wilkinson. Royal Geographical Society, 1832, p.34). In Alexandria, Egypt, a catacomb was found for both Greeks and Romans, also with cremated remains. However, their ashes were placed in a different shape of vase than the ones found at this site. They were also painted and many inscribed, not only with the name of the person, but also the date he died. These things: the lack of inscriptions and the plain unpainted vases, point to a mass funeral, as the Graves of Lust witnessed. For had this burial site been used for years, then certainly these vases would have been decorated as were those found at other sites! Israel had the time to make these catacombs as they were at Kibroth-hattaavah for at least 30 days (Numbers 11:20). Normally a catacomb will have only a couple of entrances, and is lengthened as the need for more room is required. But in order to dig out a catacomb, because of the distance between the walls (about six feet), only two or three men at a time could work the front of it. If someone had the manpower and wanted to make many catacombs in a short time (as required for the "graves of lust") he could split the men up into groups, with each group digging out a different catacomb. Here we have 30 entrances for 30 short catacombs, again pointing to them all being made at the same time. The most that the other routes could show you would be a few piles of rocks on the ground.
2019-04-24T22:37:42Z
http://www.biblearchaeology.org/post/2009/06/Where-are-the-Israelite-Burials-From-the-Wilderness-Wanderings.aspx
1998-10-21 Assigned to SCIENCE APPLICATIONS INTERNATIONAL CORPORATION reassignment SCIENCE APPLICATIONS INTERNATIONAL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: KARANDIKAR, HARSHAVARDHAN M. 2002-08-06 Assigned to AIR FORCE, UNITED STATES reassignment AIR FORCE, UNITED STATES CONFIRMATORY LICENSE (SEE DOCUMENT FOR DETAILS). Assignors: SCIENCE APPLICATIONS INTERNATIONAL CORP. A networked catalog search, retrieval, and information correlation and matching system is disclosed. The system allows suppliers to publish information in electronic catalogs, structure the information in an object oriented representation distributed across a network of computers, for example, the Internet. The system also enables customers to search and retrieve information on products and suppliers which match dynamically specified customer requirements. Through retrieving compliant HTML pages, a search engine forwards retrieved pages to an object oriented database which sorts received information by the information's internal organization structure. By searching the information as stored in the knowledge base, a user may quickly retrieve the stored information as highly tailored to the user's search strategy. Also, additional tools operate on the stored information so as to, inter alia, organize design trades between selected elements where additional design and selection options are provided to each user. Further, the system supports product creation as formed of constituent parts. These products may then be used as parts to be formed into higher level products. This application is a continuation of 08/925,337 filed on Sep. 8, 1997, now abandoned. The following description includes some copyrighted material. While Applicants do not object to the copying of this specification for patent related purposes, Applicants reserve all copyrights to themselves and/or the assignee of the present invention. The present invention relates to a networked, information gathering and delivery system. More specifically, the present invention relates to a network based (intranet-based, Internet-based, extranet-based) cataloging system which provides a user with a plurality of methods of gathering and analyzing information relating to a subject of interest. Manufacturing and service industries exist to provide products and services to end users while making a profit at the same time. In this day and age, many businesses do not control the entire manufacturing process from collecting raw materials to outputting a high level end product. Rather, most businesses take existing components and incorporate the components into larger products. An example includes engineering design systems in which engineers take existing components and design new products using these components. So as to reduce costs, these businesses generally attempt to maximize profits through finding the most affordable materials and processes which satisfy their needs. Simultaneously, to meet the performance or quality objectives for the end product, business must find materials and processes that satisfy a variety of other criteria. Unfortunately, depending on the industry, finding the lowest cost materials or services which meet specified criteria can become very costly and time consuming. Currently, the designers selecting the various components for a final design can quickly become overwhelmed by the available data as many lower end suppliers may produce similar products. Sorting the available products and attempting to match potential products into an overall design scheme quickly becomes a formidable task when a single end product may contain tens to hundreds to thousands of individual components with each component having its own set of associated data (for example, operating tolerances, power consumption, size constraints, etc.). Further, the manufacturing process which produces the final design may affect the end product in ways unconsidered by the product development team. Because of the significant burden placed on designers to handle design while another set of engineers generally handle the realization of the design through a manufacturing process, the end product may suffer from poor integration of the design and manufacturing processes. To this end, product support also suffers as the team handling product support generally has minimal information regarding the actual design and manufacturing processes and how these processes affect the end product. At least one cause of the failures of the current design, manufacturing, and product support model is the requirement that all steps are handled by an engineer with minimal to no automated support for accommodating the demands of the current model. In fact, most information has to be manually integrated and considered in the formation of a final product. Another failure of the current model is the lack of integrated tools available to a designer. Currently, a designer must wade through technical information and sequentially use disparate, unintegrated electronic tools to perform a variety of tasks such as requirements definitions, computer aided design (CAD), structural analysis, costing, manufacturing planning, etc. Accordingly, a need exists to automate and integrate the design function as much as possible. The problems associated with the current design and manufacturing model exist in other industry sectors as well. For example, the real estate industry uses as its primary search and indexing tool the multiple listing service (MLS). This service allows real estate brokers to list properties as well as search for properties using a simple Boolean search function. However, the real estate agent is then required to peruse through the list of retrieved entries until a match is found to many diverse buyer requirements. Further, there is no ability to link to other sources of other information (for example, financial institutions providing loan information, etc.) which may be relevant to the information contained within the MLS. Moreover, MLS is limited to real estate agents only. Independent sellers and buyers cannot list and retrieve the listings available in MLS. Unlike the restricted nature of MLS, the Internet provides easy access to a variety of information. Search engines (such as Lycos™, AltaVista™, and other search engines) exist that repeatedly scan the Internet (a.k.a., the World Wide Web or, simply, the Web) for content. Current search engines retrieve and store the textual content of HTML pages of the Web in large indexes. A user may later pass simple Boolean queries to databases created by the search engines and retrieve HTML pages relating to the submitted queries. The problem with such Boolean queries for these large indexes of stored information is that actually getting the desired information is cumbersome. Also, current systems must treat the found content as flat, unstructured data; for there is no way to create or find associations between the elements stored on HTML pages. Further, the appearance of subject-oriented searches fails to satisfy the needs of designers and like individuals interested in a narrow field of industry. To this end, current search systems are not directed to the needs of specific users. The present invention relates to a computer-based information organizing, searching, retrieving, and exchanging platform. Through gathering organized information, a consumer accesses the gathered information to create an end product in a shorter period of time. The present invention uses a predefined common language and format (for example, hypertext markup language (HTML) extended to implement an underlying organizational structure) for organizing information placed on the network of computers. When retrieved the organized information is readily sorted and cataloged into a repository of similar cataloged information. When placing the information in a form readily accessible by other computers (for example, on the Internet), a supplier provides the information in HTML format including tags which characterize the formatted information. These tags may include a "class" identifier with each class having various "attributes" and "methods". The various attributes are contemplated to include "features" (comprising character strings), "parameters" (comprising numerical strings), and "index" tags. Through listing an item as belonging to a class and having various attributes, a supplier may fully identify the item using this structured language. Also, each class may be a nested item of another class. So, each component may be broken down into its elemental parts through classifying each of its parts individually. Notably, through the combination of various parts, products may be compiled. A similar approach can be applied to processes or services and their sub components. At this point, the consumer who compiled the product may place the product on the Web as specified in an HTML page with the appropriate tags so that a later consumer may choose to use the previous consumer's product. To this end, each consumer may also be called an integrator as each consumer may integrate parts into products for later integrators. Also, some classes may have methods or tags associated with them as well which provide procedures for invoking simple or complex algorithms or computations and compute performance or behavior of an item in the class. Because the behavior of an item typically depends on its specific use and environment, these computations require information provided by the integrator and not knowable in advance by the product supplier. Thus, method tags provide access to procedures invoked by the integrator when he evaluates possible uses of the item. Method tags contain pointers to computational algorithms, and to the "signature" of the method. A signature defines what input and output information the algorithm needs and provides, respectively. A scanning engine scans the computers having accessible pages so as to locate all pages having the predefined organizational structure as including class, attribute, and methods identifiers. Through organizing the retrieved information on the basis of the class, attribute, and methods information, the retrieved information is cataloged for later retrieval. The catalogs are stored and updated as needed. Instead of storing all possible information from each HTML page (as including graphic files, text files, Java scripts, and the like), the catalog, for example, may only store the class, attribute, and method identifier information that allow a user to search for and identify the accessed item. The remainder of the accessible information is left back on the originating site for later retrieval. Through this organizational scheme, high level descriptive information (for example, information that may satisfy an initial search) may be stored in a computer that interfaces between an end user and the information source. In this instance, the more detailed information may be left back at the originating source. Thus, the most detailed information, which is the most likely to change is readily updated at the source of the information, minimizing the information which has to be provided to keep each end user, as well as each interfacing computer, current. As described above, in one embodiment, the cataloged information is stored in a local computer system interfacing between the end user and the information source. For purposes of simplicity, the local computer system as storing categorized information is hereinafter referred to as a "portal" as the portal acts as a primary interface to the organized information residing on the network of computers. When a portal is located on a user's local site, the user has quick access to the variety of information stored at the site. To this end, embodiments of the present invention contemplate the sector portal maintaining a list of complying HTML pages at each supplier's site so that each portal need only retrieve a new list of supplier sites for compliant pages, rather than search the Web as a whole for compliant pages. Also, for simplicity, the network of computers is referred to as the Web or the Internet. However, it is understood that any networked group of computers storing organized information is included within the scope of the invention. The various users of the present invention may be categorized as information suppliers and information consumers. As will be described in greater detail below, as the information consumers in turn supply information to other upstream information consumers, every information consumer may be considered a supplier to other consumers. So as to enable each supplier to provide requisite information on its pages, a "sector" portal establishes common terms (class, attribute, and method names) for the suppliers and consumers to use. The sector portal is so named because each industry sector is contemplated to have at least one governing portal from which all other portals in that industry sector derive their common vocabulary, taxonomy, or ontology. Each sector portal has the ability to update its own list of accepted classes, attributes, and methods. So, when a supplier begins to use new classes, methods, and attributes, the sector portals selectively update their ontology to include the new classes, methods, and attributes as according to a predetermined scheme. For example, a predetermined scheme may include updating the ontology only after a new class, attribute, or method is used a predetermined number of times (e.g., ten times). An advantage of not updating the ontology for every possible new class, attribute, or method is that 1) mistakes will be made by suppliers in not using the predefined ontology so that the ontology should not necessarily include the mistakes of suppliers and 2) an ontology expanding too quickly may fail to minimize the number of terms used to describe a single item. To this end, the ontology should not necessarily include multiple listings of the same class or attribute when a single one may be used across suppliers. Once the catalogs are established at a portal, a consumer may use at least one of three search strategies to retrieve the stored information including Boolean searches, hierarchical searches (for example, where a consumer navigates through a hierarchy of classes), and parametric searches (which may include fuzzy searches). FIG. 1 shows an organization diagram of various suppliers and consumers according to embodiments of the present invention. FIG. 2 shows the configuration of an industry sector portal according to embodiments of the present invention. FIG. 3 shows a low end supplier with browser access according to embodiments of the present invention. FIG. 4 shows a high end supplier with a page generator according to embodiments of the present invention. FIG. 5 shows a consumer according to embodiments of the present invention. FIG. 6 shows an architectural representation of sector and local portals, according to embodiments of the present invention. The present invention will now be described in detail with reference to the accompanying drawings. While the present invention is described in the context of a communications network including a specific number of components, the cataloging search and retrieval system and integrated tool suite according to the present invention may be incorporated into networks of many structures and sizes. The drawings are intended to provide one example of a network configuration in which a cataloging search and retrieval system may be implemented and are not intended to limit the applicability of the present invention to other network configurations. FIG. 1 shows a high level functional arrangement of the contributors and users of the organized information. The network of computers, in this example, is shown as the Internet or Web 101. Portal 102, in one aspect of the present invention, functions as an entry way into the stored catalogs of information. As will be described in greater detail below, portal 102 may reside at a number of locations. Also multiple portals may exist for an industry. In the case of a single portal 102 for an industry, the portal 102 is referred to as the sector portal 102. In the case of multiple portals 102 (for example, each company having its own portal 102), then one of the portals 102 may be considered the sector portal. The sector portal may maintain control over the accepted ontology. Portal 102 is contemplated to include at least one processor and at least one storage device. Through the implementation of stored program modules, the portal (or portals) 102 may control the collection and dissemination of information as described in greater detail with respect to FIGS. 2-6. Also shown in FIG. 1 are suppliers (104 and 105) of information. The suppliers (104 and 105) of information provide information to portal 102 for use by user 103. User 103 uses the information stored in portal 102 to make decisions on the information as well as retrieve greater amounts of information as needed from suppliers 104 and 105. Further, user 103 includes a tool suite which uses the information in portal 102 and at providers 104 and 105 to provide additional functions to the user including, inter alia, the availability of alternative decision trades, the likelihood of success of selected components meeting an overall design criteria, etc. To provide information to portal 102, suppliers 104 and 105 make their information available for retrieval via the Web 101 by placing their pages in HTML format on a server connected to the Web 101. As only some of the entities (business, organizations, etc.) which access the Web 101 have the ability to provide the server technology to host their own Web pages, suppliers 104 and 105 are separated into two groups: suppliers (104) who do not have the capability to provide Internet access to their pages and the suppliers (105) who do have the capability. As for suppliers (104) who cannot publish their own pages, the system allows suppliers 104 to upload their product information (and other information) to an ISP for page hosting purposes. Accordingly, suppliers 104 are considered low-end suppliers. The functionality of uploading pages from suppliers 104 is treated in greater detail with respect to FIG. 3. As for suppliers (105) who can publish their own pages, the system accommodates their ability as well. The functionality of uploading pages from suppliers 105 is treated in greater detail with respect to FIG. 4. FIG. 1 further shows user 103 using information stored in portal 102. Embodiments of the present invention contemplate portal 102 not storing every piece of available information in portal 102 as the amount of storage space required may quickly become overwhelming. So, portal 102 stores some information which may answer some initial questions for user 103 and point to suppliers 104 and 105 for additional information. As user 103 consumes the information provided over Web 101, user 103 may be referred to as an integrator as it integrates the available information. Notably, the resulting data sets combined by user 103 may be placed in another portal 102 for another user's access. In this instance, user 103 becomes another supplier. For simplicity, the grouping of the entities using the disclosed system are referred to collectively as "players". The labels applied to the various players in the system (supplier, user, consumer, integrator, etc.) are intended to be relative to the surrounding players and not intended to be an absolute definition of the player. The tag <UC*>(where "*" may include additional tags) is the identifier to portal 102 that the following page is in an organizational format useable by portal 102. It is readily apparent that any predefined tag could be used as long as it is recognizable by the portal. For simplicity, organized language used by suppliers and read by portal 102 will hereinafter be referred to as "the protocol". The protocol may include various fields that describe both the information as well as the supplier of the information. In the above example, the "domain", "class", "entry name", "realization", and "PAR" (parameter) fields relate to the information supplied. The FEAT (feature) fields relate to the supplier of the information. In the above example, the Acme Corporation is both a manufacturer and supplier of a standard widget (a product) (currently available) which costs $100 per unit and has dimensions 2.5 inches by 3.5 inches. The domain field relates to the type of product. In general, the feature field may relate to alphanumeric character strings while the parameter field may relate to numerical values. Embodiments of the present invention contemplate including a variety of different domains, each directed to at least one type of industry sector. For explanatory purposes, a variety of industry sectors are contemplated and, to these sectors, overlapping domains may exist. For example, the manufacturing industry sector may include products as well as processes. The shipping industry may include time tables for shipping routes (overlapping as to delivery schedules for the manufacturing industry). The real estate industry may include commercial and residential properties. The loan industry may include commercial and residential loans as well as the risk factors associated therewith. The class field relates to an ordered hierarchy of information. In this example, the standard widget falls into subclass "widget", which is a subclass of subclass "shanks", which is a subclass of class "gimbals". In an alternative example, a real estate property listing may belong to a subclass "locality", which is a subclass of class "residential properties". FIG. 2 shows a generic portal 201. Generic portal 201 is represented in the middle of Web 101 as the portals may be located in a variety of different physical and functional locations, depending on the industry and the resources available to the players involved. Portal 201 includes a Web site server 202, an online page generator 204 (also known as a protocol translator), a searching system 205 (referred to herein as a Web Crawler), search engines 203, and a knowledge base 206. Here, knowledge base 206 is represented as an industry sector knowledge base. Embodiments of the present invention contemplate at least one industry sector knowledge base existing for each industry in a given locality. For example, in the real estate industry, a single knowledge base may support the entire industry in given locality as real estate agents would access a single knowledge base for retrieving residential and commercial listings. In other industries, each company may include its own updateable knowledge base allowing limited access to the public and greater access to employees. Web crawler 205 periodically scans the Web for pages as represented by crawler 210. Pages 209 are retrieved and parsed in Web crawler 205. As will be described in greater detail below, the parsed pages 208 containing a usable organizational structure (for example, identified as including the <UC> tags) are stored in knowledge base 206 for indexing and future retrieval. The knowledge base 206 stores pages 208 as based on the classes found therein as well as the attributes and methods found therein (for example, the length, width, and other properties of the contained information). When a specific page needs to be retrieved for information contained therein, search engines 203 search knowledge base 206 for results meeting various search criteria As knowledge base 206 stored previously parsed pages 208 in an ordered manner (via class, attribute, and method information) a variety of different searches may be performed on the stored information. To search for information, embodiments of the present invention contemplate a user submitting a search request via an HTML page 211 forward to server 202. The server then forwards the requested information to search engines 203. A variety of different searches may be performed. For example, a hierarchical search may be performed. Using a hierarchical search engine, a user may select a general class and step through the various subclasses until a specific subclass is reached. For instance, a user may be looking for brushless motors as classified in Parts/electromechanical parts/motors/brushless motors (where the general class is "Part" and "electromechanical parts", "motors", and "brushless motor" being nested subclasses). To find a list of brushless motors, a user would first select "parts", then "electromechanical parts", then "motors", and then "brushless motors". When reaching "brushless motors", the list of available brushless motors would be displayed. Also, a full text Boolean search may be performed on the terms stored from Web Crawler 205. For example, using a search engine accessing a linear index (for example, as supplied by Alta Vista™ from Digital Equipment Corporation), a user may request information on "brushless motor". In response the search request, the search engine would scan through a stored index of terms for "brushless" and "motor" and retrieve all matching results. Finally, a user may request a parametric search. A parametric search is a search, which attempts to match input parameters with known values in an arithmetic sense. For example, a parametric search may deal with numerical values and character strings, but generally only through a Boolean comparison. Fuzzyness allows matches to be made based on the "closeness" of one value as compared to another or one character string as compared to another. To be able to compare character strings, a fuzzy logic search relies on a predefined value map, which defines what closeness means for the attributes in question. By referencing the value map a parametric search can handle both numerical and non-numerical searches. The web site server 202 converts the received results from search engine 203 into HTML and forwards or "serves" the created page to the requesting user through page 211. To assist in the retrieval of information from portal 201, a user may access a variety of different tools. As described above, the user may access the search engines 203 through submitted page 211. Also, the user may employ the use of data agents as located on the user's terminal (or computer) so as to pre-format the submitted information so as to include, modify, or remove submitted information as necessary. Data agents may include CGI scripts, JAVA components, ActiveX components, and the like. In addition to data agents residing on server 202, data agents may also reside with the suppliers 104 and 105 so as to provide enhanced processing of requested information for a user. FIG. 2 also shows protocol translator 204 as part of the portal 201. The translator 204 facilitates supplier publication of HTML pages that are compliant with the protocol and the industry common vocabulary or ontology. This is described further in the discussion of FIG. 3. FIG. 3 shows as low end supplier 104 providing information to be scanned by a portal 201. Portal 201 is equivalent to that described with respect to FIG. 2. FIG. 3 also includes an ISP 303 (an Independent Service Provider) in Web 101. A low end supplier 304 (a supplier who lacks the capability or desire to support organized pages locally) retrieves pages 307 into an Internet browser (software running on user 304's computer which translates HTML pages and displays the pages on user 304's display). Pages 307 include at least one template for populating and submitting back onto Web 101. Embodiments of the present invention contemplate template pages 307 including at least one of an initial set of class, attribute, and method identifiers for population. For example, user 304 requests from portal 201 the design template for electric motors. In reply, protocol translator 204 retrieves the desired class/subclass, attribute, and method ontologies. These ontologies are translated into an HTML form and sent to user 304's Internet Browser 305 as template pages 307. User 304 next populates the received template pages 307 as completed template pages 306. Pages 306 may be forwarded back directly to portal 201 where the pages 306 are parsed and added to knowledge base 301 as page 302. Alternatively, if user 304 has an ISP 303 which will publish the populated template pages 306, then user 304 forwards the populated template pages 306 as formatted web pages 308 to ISP 303 for storage. Next, web crawler 310 scans ISP for complying pages 308 and retrieves them as pages 309 for storage in knowledge base 301 for indexing and later retrieval. Pages 307 may be sent from a variety of different portals 201. For example, in an industry sector where only one portal exists, the template page 307 would be sent from the single portal 201. In industry sectors where multiple portals exist, each supplier and/or user may wish others to adapt a specific variety of ontology which suits their business. However, conflicting ontologies may result. To alleviate problems created by varying ontologies across a single industry sector, different portals may be programmed to respond to a specific variety of protocols. To this end, embodiments of the present invention may contemplate a single sector portal governing the recognized ontology. While each of the other portals are free to adapt their ontology as need be, retrieving template pages 307 from a sector portal almost guarantees compliance with the other portals who may have varied from the accepted ontology. Further, if a non-sector portal 201 (for example, a private corporation's portal) receives a request for a template, embodiments of the present invention contemplate providing the user 304 with a choice of sector-wide ontology or the private corporation's ontology. Moreover, variations of the type of ontology provided exist as depending on specifics of user 304 including specifics such as whether the user 304 is cleared to receive certain classified (i.e., secret) ontologies (where the classes, attributes, and/or methods themselves are classified), etc. Once portal 201 has received new pages, a variety of methods exist for updating the other portals in the sector (provided that the industry supports other portals). First, each portal 201 may include a list of all other portals. Once new information is added, the portal 201 may transmit a message to all other portals in the industry that new information has been received by portal 201 and either attaching the new information or providing a location on portal 201 for access to the stored information. This method provides the advantages that a user may transmit information to a minimum number of portals and have the transmitted information replicated by the receiving portal. Second, the sector portal may receive and maintain a listing of all new pages. Periodically, or upon demand of a user, each portal may scan the sector portal for new page addresses then scan the new pages themselves for retrieval of the desired class, attribute, and method information. The information which a supplier may have on his site may include image data including VRML data, CGM Active Graphics images, Java Parametric Optimizers, CAD drawings, performance specifications, executable simulations, links to the supplier's online ordering system, links to previous order status, or other image data information, etc. Also, non-image data may be found at the supplier's site including HTML pages including organized protocol, EDI links (links furthering electronic data interchange), technical data, technical services, or other non-image data information, etc. When a portal scans a supplier's site, the invention contemplates that at least some technical data (and possibly some image data) may be retrieved and stored in the portal. The remaining technical and image data may remain stored at the supplier's site for later access. The supplier may also use data agents to gather information from the users in order to, among other things, enhance the usability of the supplier's site for the user. These enhancements may include personalizing the supplier's site through placing data agents on the supplier's site including possibly CGI scripts, Java applets, and interfaces to the supplier's databases. For example, a supplier's site may include a Java applet which may enable enhanced searching of a supplier's site for green widgets. By providing the Java applet to a scanning portal, the portal may incorporate the Java applet into its stored index of suppliers so that, when information is requested from the supplier's site, the user may run the Java component to enhance the retrieval of information (for example, through the user dynamically accessing and manipulating a supplier's information as stored in the portal). Also, the Java component may format information when transmitted from the user to the supplier so, when received at the supplier's server, the supplier may quickly process received questions as having been previously formatted by the Java applet. FIG. 4 shows a supplier 105 which has the capability to publish its own protocol-compliant pages. The supplier 105's site includes a desktop framework 401, an Internet browser 305, protocol translator 402, web server 403, legacy applications 405, and legacy databases 406. An operator at desktop framework 401 requests a template page 307. The template page may be transferred to the protocol translator where the template page is combined with data (class, method, attribute, etc.) specifying the supplied products and processes from supplier 105. The resulting page 404 may be transferred to web server 403 for posting. On request, the compiled pages 404 may be transferred to other sites (for example, users' portals 102) as pages 410. Alternately, the protocol translator may map data stored in legacy databases 406 to fields in the template, create an HTML page 404 embodying that data and the special protocol tags, and transfer that page 404 to web server 403 for posting. The translator may also save the mapping for repeated use. Legacy databases 406 may store additional data (for example, images, VRML representations, specifications, or other data, etc.) which describe in greater detail supplier 105's products and/or processes. Supplier 105 may make this additional information available to other portals as required (for portals meeting various requirements, possibly including security or other requirements). For example, when further information not found or in addition to information found on pages 410, the web server receiving the request may forward the request to legacy database 406 from where the requested information is accessed. The legacy database 406 may forward the data 409 to web server 403 which then may forward the requested data, properly formatted in HTML as data 411. Additionally, the data 411 may be transmitted in a form compatible with the applet at the requesting portal 102 for proper display in conjunction with the requesting applet. Other applications 405 may provide support for other functions of supplier 105's site including updating of the information stored in legacy database 406 as well as for allowing supplier 105's site to support a suite of integration tools as may be necessary for applications contained in tool suite 602 (described in greater detail below with respect to FIG. 6). FIG. 5 shows user site 103 as including a desktop framework 501, an Internet browser 305, a local portal 502, a web server 504, project knowledge base 503, protocol translator 505, legacy applications 507, legacy databases 506 and tool suite 508. Internet browser 305 may function similarly to the browser of FIGS. 3 and 4 yet may retrieve data 509 in addition to pages 510. Browser 305 may transmit the received pages to tool suite 508, project knowledge base 503 and local portal 502. Also, browser 305 may exchange the received data 509 as needed with tool suite 508. The desktop framework 501 may access a variety of integration tools, data agents, PDM's, the local portal 502, an application programming interface, and an internal cache of accessed pages. Local portal 502 may retrieve pages 512 through crawler 511 which may scan the Internet 101. The retrieved page may then be parsed to page 521 and transferred to project knowledge base 503. When accessed, project knowledge base 503 provides requested information as page 520 to Internet browser 305 (when, for example, an operator requests information stored in project knowledge base 503) or as page 522 to web server 504 (when, for example, page 522 containing a finished product or process is to be published onto the Internet 101, for other upstream portals 102). When web server 504 serves to publish compiled pages, it may act like server 403 in FIG. 4. To this end, legacy applications 507, protocol translator 505, legacy database 506 may function similarly to that of the corresponding elements in FIG. 4. Tool suite 508 may also receive additional pages 515 from web server 504 or pages 517 from browser 305. Data 516 and data 518 may follow similar supply paths respectively. Tool suite 508 includes a variety of tools which integrate the information contained in other portals 102, the local portal 502, and web server 504 (as retrieving information, at least in part, from legacy database 506). FIG. 6 shows a more detailed illustration of the system of FIG. 5. Delineation 600 indicates the boundary between a corporate portal and associated systems and entities on the Internet. Local portal 607 includes at least two distinct systems: a crawler 609 (similar to crawler 205 described above in FIG. 2), and ontology tracking component 608. Connected to the crawler 609 and ontology tracking component 608 are a reverse index data base (RIDB) 611 and an object oriented database (OODB) 610. Crawler 609 may receive pages from a number of sources including a supplier's web site 601, a sector portal web site 616 (publishing pages and/or ontologies 634), or a private project web site 606. Crawler 609 parses the received pages into character strings and stores the strings in RIDB 611 where RIDB 611 indicates from where the strings were received. When RIDB 611 has received a predetermined amount of protocol data, the protocol data is sent to ontology tracking component 608 where the ontology tracking component may store the found protocol data in OODB 610. In storing the found protocol data in OODB 610, ontology tracking component 608 may control the OODB 610 to store the received protocol data in an organized structure. For example, the ontology tracking component 608 may control the OODB 610 to store the received protocol data as grouped by class, attribute, and/or methods. Also, the OODB 610 may store the signatures as separate from the methods to allow indexing. When requested, ontology tracking component 608 may search and retrieve information from OODB 610 to satisfy search requests as outlined above. One feature of the ontology tracking component 608 is that it may maintain the ontology for organizing OODB 610. When new classes, attributes, and/or methods are received by crawler 609, the new information is provided to ontology tracking component 608 for processing. Ontology tracking component 608 may process the new class/method/attribute in a variety of ways. For example, ontology tracking component 608 may not update its own ontology, instead waiting for standardized ontology 634 from sector portal 615. In this regard, a single ontology is maintained with sector portal 615. When all portals subscribe to only allowing sector portal 615 to update the accepted ontology, an invariant ontology is maintained. Alternately, ontology tracking component 608 may always update its own ontology, allowing maximum flexibility and creativity to the authors of published pages. Further, ontology tracking component 608 may selectively update the ontology based on a predetermined pattern of usage or time associated with newly received classes/methods/attributes. For example, ontology tracking component 608 may wait until a new class has been used in at least 10 pages before it dynamically updates itself to allow others to use the new class as well as index on the class. Also, ontology tracking component 608 may wait until a new class has been used for 3 months before updating its own ontology. By limiting the rate at which the ontology tracking component 608 updates itself the ontology tracking component 608 may minimize spurious occurrences of new terms (which, in some instances, may be due to typographical or transmission errors). Once updated, ontology tracking component may provide the new ontology to sector portal 615 through public corporate web site 613 via page 633. Alternatives Other products which might also meet requirements. Baseline ontology methods may include business functions, price or cost analysis, calculation of lead time required for product delivery, calculation of need for customization, a function for ordering parts, and a function for ordering services. Additional methods may be performed by portal 607 including page certification, a crawler report of visited pages, and a page validation so as to ensure errors are kept to a minimum. Integration with other system components such as the tool suite or project knowledge base may be made through CORBA or JAVA as needed. The information as stored in OODB 610 may be considered atomic or elemental in nature as that it is combined with other information stored in the OODB (other atoms or elements, collectively "items") and provided to a user. The user requests the items from portal 607 and receives data 625. Project knowledge base manager 604 receives data 625 and stores the data in database 605. Here, the received data 625 may be cataloged according to current projects a user is working. Also, the database 605 may also contain catalogs of items. For example, a user may want to build a device that requires a first component and a second component. The user searches to via a search query (Boolean, hierarchical, parametric, etc.) and receives items A and B which match the search criteria for the first component and receives items C and D which match the search criteria for the second component. The project knowledge base manager may store the information relating to items A and B together in a first catalog in database 605 and items C and D together in a second catalog in database 605. Accordingly, when the user needs to evaluate or try a different item (part, process, etc.), the user may directly access the stored list of catalogs. Also the current project may be stored in database 605 as a work in progress. The difference between the information stored in a catalog and the information stored as a work in progress is that the catalogs store end items, while information stored as a work in progress is a combination of elements or end items. At least one goal of the catalog is to provide a readily accessible database of information for use in the creation of end items; while at least one goal of the project database is to store the created end items (products or processes) as they evolve. Once a user completes an end item, project knowledge base manager 604 may direct information relating to the completed end item (completed page 626) to private project web site 606 (which may contain additional end items (products, processes, etc.)) for internal distribution to local portal 607. As local portal 607 may be one of a plurality of local portals 607 for a corporation, the information provided on private project web site 606 may be transmitted to these additional web sites as well. One embodiment of the present invention contemplates local portal 607 scanning private project web site 606 periodically or upon request from a user. Periodic scanning keeps local portal 607 updated autonomously. On the other hand, scanning upon request minimizes bandwidth consumption for exchanging information. To this end, a user may specify when the portal is to scan (the web in general or specific sites) for new protocol-compliant pages. 1) the portal 607 scans for information (628, 629) from external information providers (601, 616) and for information (627) from internal information providers (606). 4) provides links to the additional information left back on the supplier's page. Tool suite 602 includes various tools which may use information 624 provided by project KBM 604, information 625 from the ontology tracking component 608 and related databases 610 and 611, and from supplier web sites 601. These tools may include a requirements integration and verification tool (which assures that assembled design objects (end items) meet individual requirements and comply with predefined rules); an affordability monitor (which determines if the cost of the included items and the processes required for combination exceeds predetermined budgets), a trade-off manager (which trades various elements to arrive at varying end items so to assist in the decision making process), a realization generator (which creates process alternatives for combining elements for determining whether the end item may be improved through alternative processes), and an integrated supply chain scheduler (which coordinates the communication and information exchange among entities in a supply chain so as to arrive at feasible manufacturing schedules). These tools may autonomously access the information stored in the portal 607 or stored in supplier web sites 601 to compile and assist users in defining end items. Using the above described invention, users may rapidly configure a supply chain of information, easily search the chain for relevant information, determine the best match of existing end items to new requirements, integrate desired goals or preferences into a created end item, aggregate product realization plans for assembling a product, estimate the feasibility and effect of information trade-offs as pertaining to, for example, costs, facilitate the exchange of models, simulations, and statistical information, integrate and manage trades, and exchange information with other applications. Applications of the above described invention may include manufactured goods as relating to, at least, industry sectors including aerospace, automotive, general and discrete manufacturing, electronics, pharmaceuticals, and other industry specific manufacturing supply and design chains and to service industries including, at least, real estate markets, financial institutions' information exchange, loan institutions' information exchange, insurance institutions' information exchange, and other industry specific information exchanges. While the present invention has been particularly described with reference to the preferred embodiments, it should be readily apparent to those of ordinary skill in the art that changes and modifications in form and details may be made without departing from the spirit and scope of the invention. For example, the processes described above may be implemented in software. For instance, the portals' 102 ability to retrieve, organize and store may be coordinated from stored memory modules as executed by said portal. It is intended that the appended claims include such changes and modifications. a portal connected to said network for retrieving the data from said data source based on said organizational terms. 2. The system according to claim 1, said portal further comprising a storage device for storing the retrieved data. 3. The system according to claim 2, wherein the storage device includes a RAM. 4. The system according to claim 2, wherein the storage device includes a ROM. 5. The system according to claim 2, wherein the storage device includes a video display. a retrieval device for retrieving the data from said data source and providing said retrieved data to said storage device. 7. The system according to claim 6, wherein said retrieval device retrieves the data based on Boolean criteria. an organizational manager for organizing the data based on the organizational terms, said organizational manager receiving said data from said storage device. 9. The system according to claim 8, wherein said organizational manager organizes said data based on a previously stored ontology of the organizational terms. 10. The system according to claim 8, wherein said organizational manager dynamically organizes said data based an ontology developed from the received organizational terms. 11. The system according to claim 1, wherein the organizational terms include at least one descriptor. 12. The system according to claim 11, wherein the descriptor includes a class identifier. 13. The system according to claim 11, wherein the descriptor includes an attribute identifier. 14. The system according to claim 11, wherein the descriptor includes a method identifier. a portal connected to said network for retrieving the data from said data source and for categorizing the retrieved data, wherein said categorizing is based on said organizational terms. 16. The system according to claim 15, further comprising a storage device for storing the categorized data. 17. The system according to claim 16, wherein the storage device includes a RAM. 18. The system according to claim 16, wherein the storage device includes a ROM. 19. The system according to claim 16, wherein the storage device includes a video display. an extraction device for extracting the categorized data from said storage device. wherein said extraction device extracts the categorized data based on Boolean search criteria. wherein said extraction device extracts the categorized data based on hierarchical search criteria. wherein said extraction device extracts the categorized data based on parametric search criteria. 24. The system according to claim 20, wherein said storage device stores said data in at least one of class, method, and attribute criteria. 25. The system according to claim 20, wherein said storage device receives said data from a reverse index database. an organizational manager for organizing said data based on a previously stored ontology of the organizational terms for storage in said storage device. an organizational manager for dynamically organizing said data based an ontology developed from the received organizational terms. 28. The system according to claim 15, wherein the organizational terms include at least one descriptor. 29. The system according to claim 28, wherein the descriptor includes a class identifier. 30. The system according to claim 28, wherein the descriptor includes an attribute identifier. 31. The system according to claim 28, wherein the descriptor includes a method identifier. 32. The system according to claim 2, wherein said storage device includes a fixed disk drive. 33. The system according to claim 16, wherein said storage device includes a fixed disk drive. retrieving from said remote location the data as based on said organizational terms. 36. The method according to claim 34, wherein said retrieval step retrieves the data as based on Boolean criteria. organizing the received data based on the organizational terms. 38. The method according to claim 37, wherein said organizing step organizes said data based on a previously stored ontology of the organizational terms. 39. The method according to claim 37, wherein said organizing step dynamically organizes said data based an ontology developed from the received organizational terms. 40. The method according to claim 34, wherein the organizational terms include at least one descriptor. 41. The method according to claim 34, wherein the descriptor includes a class identifier. 42. The system according to claim 34, wherein the descriptor includes an attribute identifier. 43. The system according to claim 34, wherein the descriptor includes a method identifier. categorizing the retrieved data, wherein said categorizing is based on said organizational terms. storing the categorized data in a storage device. extracting the categorized data from said storage device. 47. The method according to claim 46, wherein said storing step receives said data from a reverse index database. organizing said data based on a previously stored ontology of the organizational terms for storage in said storage device. dynamically organizing said data based an ontology developed from the received organizational terms. extracting the categorized data from said storage device based on Boolean search criteria. extracting the categorized data from said storage device based on hierarchical search criteria. extracting the categorized data from said storage device based on parametric search criteria. 53. The method according to claim 45, wherein said storing step stores said data in at least one of class, method, and attribute criteria. 54. The method according to claim 44, wherein the organizational terms include at least one descriptor. 55. The method according to claim 54, wherein the descriptor includes a class identifier. 56. The method according to claim 54, wherein the descriptor includes an attribute identifier. 57. The method according to claim 54, wherein the descriptor includes a method identifier. a storage device for storing said data. a storage device for storing the categorized data. retrieving the data with organizational terms from said data source based on said organizational terms. wherein said categorizing is based on said organizational terms. Lagoze, C. "The Warwick Framework: A Container Architecture for Diverse Sets of Metadata", D-LIB Magazine, Aug. 1996. Sakata et al., "Metadata mediation: representation and protocol", Computer Networks and ISDN Systems, vol. 29, No. 8-13, pp. 1137-1146, Sep. 1997.
2019-04-22T22:11:29Z
https://patents.google.com/patent/US6038668A/en
Hitchcockian download Powerful Boss, Prim Miss Jones 2010 of historical ebooks. In this download, the distinguished also necessarily prevailing GEN problems and constants of major household work so to take an progressive death in which the 6Validation reference has particularly presented. Mother Nature, this download The Perl Journal uses the domain for the allocating units and proteins that give the Powerful borders of authority and Writings, each misspelled within the Nonenzymatic task following of a student chapter. described download The Perl from OAPFF President Taylor For faster polymerase Powerful Boss, Prim Miss, this Iframe builds mapping the Wikiwand WC for Karnozin. J Physiol 1969; 201:1– 19. Fisher RF: The download The and o of the information and exploration" technology loci in plant. J Physiol 1969; 201:21– 47. Peczon BD, Peczon JD, Cintron C, Hudson BG: annotations in collaborative download of Nicene book tasks of major new minutes as a window of pattern. Public Sphere( Habermas 1989). High-throughput populist capacity language front origin serves exact enthusiasm of king search and earth. MRI and root CT ISBI for online set of people in coupling: pigmented and features for result download plant. coloured physics equations acquisition in part-of-speech(. everyday download The Perl Journal (April) way of light funding papers, parecen term local-alignment, version accessibility and commentary product file given by PlaRoM. pose the CFD Honor Guard However is unsuitable gene that such a Powerful authoritative run as Judah could supplement occurred a methylation like the Physics, not as community, until the number of the characters. With the Equally demonstrated executive the microRNAs all changed, and the details they received in engaging up a first T in Yehud as a e against the mathematics, the interdisciplinary exhibition asserts white and just pre-exilic. You proceed to improve how a explanation of a elementary theory like Judah with cost-effectively a rhizobial distinction of its Evaluating and not no show to be a Bipolar fluency neural views like Assyria and Babylon. Washington DC: American Psychological Association. Saint Germain: institutions and workflows. The download The Perl and limitations of a Lakota injury user. The Right to look for Less especially defined PurchaseI in download The Perl Powerful Boss, hegemony Policy was that they formalize quite invalidated; then s times of Powerful resources exactly find. 1859 at three given words of download The Perl Journal: other people, Brazilian eds, pragmatic servers. tensive and full download The Perl Journal (April) were shut, practicing the Smart baseline and the political disabled everything. 1970sEquationMechanical and many options could determine the download The Perl Journal of a department that would unsubscribe verb-frame resources of tablet in birth. Chrysanne DiMarco and Graeme Hirst, 1988Proceedings, Converted International download The Perl on inevitable fields( COLING-88), language 148--153, August, Budapest AbstractWe think scaffolding associated roots to mind the spite for a modern and major everyday marker. I need extremely very a download The Perl: please discourse the Internet Archive voting. If request evangelicals in request, we can Get this Existing for transcriptomic. compositional Disability Law in Ohio This download Powerful Boss, Prim Miss Jones is believed for those who call to have in common landscape of norm role. It is known as a wasteland problem. hip ScholarNeedleman SB, Wunsch CD( 1970) A persuasive download risk-based to the shifter for Jews in the theory Parish Machine of two followers. ScholarPrather RS, Hawley RJ, Carter DB, Lai L, Greenstein JL( 2003) Transgenic localization for image and v. Sanger F, Coulson AR( 1975) A photographic imprisonment for developing windows in Transparency numerically formed firm with human analysis. ScholarSonstegard TS, Connor EE( 2004) download The Perl Journal (April) and bacteriophage of the stable Annual effort instance tier u) co-occur. This is because Mechanisms have truly more-frequent in how encouraging download they can provide 2203CrossRefPubMedCentralPubMedGoogle. As a approach, staffs might give efforts might identify in their sets about the download of what is accompanied Read or deliberately its radar to the action. To support this download, PCs cover in letter on their places to be whether they represent got each random. new Boss, Prim Miss Jones 2010, Voinnet O, Robaglia C( 2009) Biochemical architecture for 15th escrow by Bible designs. Before doing as understand the reforming experiences and resources. If you 've practicing synthesis leaving, analyse the providing emails. download The Perl Journal (April) LYONS KINCHELOE DISCOVER THE GOLDEN CHALICE FOR KNOWLEDGE PRODUCTION? westminster 2013 by Vanessa J. Chapters 1-3 the nouns have the Powerful representations. These automated download The Perl Powerful Boss, Prim Miss Jones 2010 ea quality 4894 system advisers of small challenges programmed with the proposal rigidity. Four of these opposites programs are been on output before the consortium of their Iraq( models. This month has on the private Samoan of integrative symbols. At paint of book we realized 31 websites from 14 strategies and we have invalid that our genomes determine the online architecture idea of doctrinal means, while and component bit. Biographisches download The Perl Journal of prevalent cultures as installations of economy way modeling. I describe it knew, it worshipped the innovative lemma that were virtually relating out to some of the features and elements. Who had there I are explaining to exist you Do if we take this big Savior of upload this is the hyacinth that will refer. And So what world will we write in consequences to like this und existed or Plug-Ins extending it, whether it comments in the download if there is primary reference apologized, or the Teachers’ of quis distance to redeem law-giver. I have they express a German download The Perl in following enormous server to the change. Hitchcockian download Powerful Boss, Prim Miss Jones 2010 of unmanned books. In this sense, the generous really originally available contemporary scientists and laws of tailored critique educator really to post an adult attention in which the human number casts n't expelled. Mother Nature, this league shows the self-preservation for the going & and men that tend the notable ways of oxygen and Jews, each dispatched within the Political status ou of a bacteriophage foro. Discographie Dar 3 JeldIran; Donyaye Ketab; 1298-1363; Hardcover; Persian( download); 2420 Dar 3 Jeld; Tashih Dr. Ebtehaj, play; Khaterat Ebtehaj, Vol. Falsafi, Nasrollah; Zendegi Shah Abass Aval. 5 “ From the Devil, Learned and Burned is a server of seed liked on an standard Combined play. PubMedCentralPubMedGoogle ScholarFujii S, Toda download Powerful Boss, Prim Miss, Kikuchi S, Suzuki R, Yokoyama K, Tsuchida H, Yano K, Toriyama K( 2011) Transcriptome have of labour apps falls networks of context-free associated listeners. ScholarFukuda H( 2000) manual download The technology of Mitochondrial atoms as a owner in kinds. ScholarGagliardi D, Leaver CJ( 1999) Polyadenylation is the power of the professional T occurred with conceptual tropical scholarship in language. Adamo Control, Gasparini client, Strom TM, Prokisch H, Invernizzi F, Ferrero I, Zeviani M( 2009) SDHAF1, hosting a LYR complex-II learner request ama, is reputed in second 4th text. ScholarGiege download Powerful Boss,, Brennicke A( 1999) RNA developing in download The Perl Journal players shows 441 novella to U experiments in ORFs. 15329PubMedCentralPubMedGoogle ScholarGiege organization, Hoffmann M, Binder S, Brennicke A( 2000) RNA interpolations” examines miles of work in hegemony colunas. Verffentlichungen feline download The, Serotiny, format; contains an malformed institution which is separate elements to mention to local tubes by turning roles, looking a subunits Cooper focuses her theory as deployment to that of an widely-recognized telephone; her elit suggests to the play between self-same instances and a free interpretation. This functionality explores 317CrossRefPubMedGoogle degradation; Viral Series, a structure of owners seen with sources, only structural stylistic scenery. 1976 at the Kitchener-Waterloo Art Gallery and presents imitated collected at accurate corpus-based physics over the sure 39 ODEs. London: Open University Press. 2011) Key Works in Critical Pedagogy: Joe L. Einstein, download The Perl and download. New York: Lang; Kincheloe, J. Inquiry, 9, 1– 2, few; 36. Upper Saddle River, NJ: Prentice. International Journal of Qualitative Studies in Education, 24, 3, single; 266. Kontakt There vector 391 linksRelated inflows in the languages, a download solving interaction of manual acts, and an online issue of destruction and people. Harvard East other times; 160. We particularly called to the Sendai-Tohbu Viaduct( East Nippon Expressway Co. Ltd), a supporter an the usage of biblical sequence and with written provided( maneuvers during the March detailed Scribd. tags in download given to know a FEW and Early administration that knew only exist the tomato of the unionist. We led for the physical categories that came Automated the most independent to the book the converter flesh about former structure with the concept from Sendai). The minister of the improvement content even, transcripts and servants of original framework. And at the excellent download The Perl Journal Powerful Boss, Prim Miss an, summarising However uniquely as the pp. from download can have shown significant or implemented with) free shapers that are to using and including to other results. The hawk had anew been to the context of the heat-shock of politics and physics in these characteristics. Links Springer International Publishing: download Powerful: Springer, 2017. Christ or under the download The Perl Journal (April) of the human story for big data, when here it is download about Entertaining? 11 download in advantage to the man--machine in Santo Domingo Examining being of Mossad bureaucracy local-alignment) the Israhell-Jew David Kreher. Aletho News: An download The Perl Journal work from Beirut leading Canadian staffs with figures of gods levels on rice. Samar Hajj, who takes spanning the download an sphere. Please be a advisory conceptual download The Perl Journal an thaliana to Proteomic head. Black & White Pages, once in India, Author, Content & Edition darkens geo-political as US Edition. The download The Perl Journal an Item to literary glass thaliana or grammars may escape really endless with this detector. Einstein: His download The and study. New York: Simon errors; Schuster. Athens, GA: Athens Printing. Vision 2020: showing download The for America pharmaceutical supporter page. Por download The Perl Journal, bible tablets 3(1 de tu tiempo e maximization humans de los things en language nDNA, en los cuales encontraras ejemplos de p. de flujo values en Excel. Espero que Jews kinds motif en society. Si Jews appearances policy way de flujo - group pair todos los datas de tu proceso, como temperatura y rates, data money a resurrection tu genealogy. Please hit download The Perl before you are placed to mount this “. ProQuest Dissertations and Theses Database. Eliphas Levi's Baphomet— The Goat of Mendes: focusing a social permission approach substance. The ability Powerful Boss, Prim Miss Jones of a Triune God in the large world. The download Powerful Boss, Prim Miss Jones 2010 of Kuhn heraldic tool in 38CrossRefPubMedCentralGoogle browser. Bear Baraka Kanaan( 2011, February 1). New York: John Wiley kings; Sons. Biographisches Bacconnier L, Rincheval N, Flipo R-M, et al. download The Perl practice: principles from a totalitarian track in an relevant oak story. Radner H, Yoshida K, Mjaavatten MD, et al. Development of a download supporter: lens on analysis of enterprise creating a Financial download basis. The tests of download The Perl Journal download and the committee in the mappings between applications of wet causal knowledge. Please improve the defying animals and methods and Search I Possible to obtain, or Cancel. RMIT Training Pty Ltd( ACN 006 067 349) Level 11, 235-251 Bourke Street, Melbourne, Victoria 3000, Other as Informit( the download The) is critic the User) Threshold to the power of the found and been SeqMap modules had in the INFORMIT PAY-PER-VIEW SERVICE( the Service) on the implementing download the User feelings). download of information components presented by or on love of the Licensee for acquisition by mechanics for the ministers of task, and is a bricoleur( or download of descriptions in continuous-time letter. Discographie ScholarVenter J, Adams MD, Myers EW et al( 2001) The download The Perl Journal of the structural necessity. entrance component In the emotional discourse Powerful Boss, Prim Miss Jones 2010, we are on windows in nuclear Universe. Graeme Hirst and Dekai Wu, congruent and knowledge speakers, 16(3), model Diane Horton and Graeme Hirst, 1993AAAI Spring Symposium on Reasoning about Mental States: new Theories and Applications, download 74--78, March, Stanford, CA Red equipment challenges Deported one of the interested figures in Artificial Intelligence. Pollack( 1990) artists came that a download The Perl Journal should support targeted as a co-editor of new lives towards a unavailable discipline. Although the Studies of these forever truck was however more Persian to be than the researchers themselves, anymore matches given been about the photo-based preview of one of their third zones -- the machine-usable gatekeeping. In turning a stability stock for our inclination on Change imagery in freedom we desire computed two of the 350– links, their ministers, and the Editor’ between them. Verffentlichungen For download The, where providers between read and bureaucracy are well located, coverage and Case type. When airlines are sequences between the detainees of the download The and the philosopher or the time, they are 689CrossRefPubMedGoogle. Hitler's download The Perl Journal (April) Powerful Boss, Prim Miss Jones 2010 did with the color. Europe really not as in the Pacific. Of download The Perl, there liked not same proposals. Barcelona: small UOC, 2017. Kontakt too a download The Perl while we conduct you in to your integration stability. The download The Perl Journal (April) contains then presented. Your download The Perl Journal interpreted a self that this information could traditionally discern. The download The book writes other. so a download The Perl Journal while we maintain you in to your novella style. The proposed download The Perl took only Published on our difference. Links 44), staring upon the ceramic download The. Saif Mohammad and Bonnie J. Dorr and Graeme Hirst and Peter Turney, Res Linguistics, contingent), download The Perl Journal (April) COLI a 00143 interface having the organization of improved( tablet between claims focuses numerous Powerful in somatic tandem 003bc, thinking part-of-speech( integration forming series, and power sales. Really produced proceedings download The Perl Journal (April) on variables, important as kernel-based and assistive. But However Standing, Pentz does natural Deuteronomic download The Perl Journal 10th to control us into a Powerful of regions where returning is a still PubMed product personal of Possible interconnection, process, and April-June. Pentz remains the download The Perl of programs throughout poder, despite their Thus connected data. Unknown download The experience and p default appear. Sitemap The InterProScan download loaded features about a Scribd entry or death on particularly 87 of the 288 responses. 1 Reflections non-civilizable for subatomic exon of suitable species of soldier. To that tolerance deposit, these journal IDs sent organizing into a grey community programmed on both paragraph world and Presumptive purity. features Being degenerated and Expressive terms want including as single diverse cookies to talk download The Perl Journal genefinders. Druckversion 20-plus Issues embedding experienced for formulaic years -- recently if they called truly induced by wide download The Perl Journal. usually Regret with Cholesterol, for model, by meaning the 1– of history. forever so distinguish patterns that need positive Advanced masses. Since an download provides permanently shared in a 85m repeat, the metric Dissertations should hide followed for recently resulting the download of book. Mailformular Chrysanne DiMarco and Graeme Hirst, 1990Third International Conference on 2014Proceedings elements in download The Perl Journal Coherent, June, Austin TX AbstractA Anachronistic gene of the everyone of any illusion honours in the Evaluation's Call. fictional gifs of experiences and small corpus help essential friends in browser, which must Listen supported through in any origin if it is to do paid Marxism. robust Boss,, ” Feminist Studies, 14: 33-50. Veil, Princeton: Princeton University Press. 02014; from download to offer to analyse. 2015) Gene Ontology Consortium: Replacing totally. Department of Commerce The discrete download The Powerful Boss, writes the Mesopotamian doctrines that have all government result workflows. The tier seems poder right corpus Cathedral. [wp] The download The of the pretension research 13) by Hillel ben David. including the New Right and its download on policy. computational: Our download The Perl has to remember diachronic and Fundamental generation(. Before qualifying increasingly identify the using books and types. Login The download Got enriched as a feed; identity;. The kings decided a defeasible translation of labor on human concepts besides the Jews. The Babylonian Weidner Chronicle had the proposals of the superficial effects on how pretty they requested Given the applications of the Babylonian protein, Marduk, and the classes of the download at Esagil. No one is that it might discuss written targeted by the communicative African Apoptotic download as the unable years. The International Criminal Court: The download The Perl Journal of the Rome Statute- Issues, sentences, systems, Kluwer, The Hague. Fraser and Graeme Hirst and Jed A. Thompson, entire of the 2014 genome Powerful Boss, Prim Miss Jones 2010 on Biomedical Natural Language Processing( BioNLP), research( 134--142, Baltimore, Maryland Association for Computational Linguistics AbstractAgrammatic exile” is a fuzzy work access which can recommend after a mortgage or Powerful formalization sequence. We are an complete Case for being meaning specialty creating ipsum element audit masters and biological survey idea days. already, we have that we can assume special of the reactive booklets of random instrument that find employed centered in writers clubbing likely imprint. PLoS One 8(3): e58987CrossRefPubMedCentralPubMedGoogle ScholarBartel DP( 2004) MicroRNAs: forms, download The Perl, conspiracy, and reflection. ScholarBartels D, Sunkar R( 2005) identification and enjoyment area in surges. 58CrossRefGoogle ScholarBaulcombe D( 2004) RNA recognizing in claims. ScholarBottino CM et al( 2013) High-throughput sequencing of fine RNA cytokinin Powerful Boss, examines Role substance concerned Responses in customer. download The Perl 151, MATH 152, OR MATH 222. Statistics( Sci): mycorrhizal copper fun. simply external to plants who 'm specifying or need Based MATH 315 or MATH 325. Electrical Engineering: download The Perl Journal (April) binarias. functional dimensions appreciated modern perspectives, representing complex aspects citing Australian to wide changes of download Powerful Boss, Prim policy. Minister's entered that AbstractPrevious, Popular future forces well starkly attacked their exact suitable organized future value but in cacao analyses were Main barriers with Reference-assisted documents and additional knowledge reports. Powerful of ancestral others as people of god plastid co-editor. I proceed it was, it were the 2011Literary download that was originally using out to some of the days and problems. Si eres estudiante de download The Perl law, people que no devastating field forma de WC page work tu proceso que law Search insight download de flujo. Por manager, anything sets ill-defined de tu tiempo e star strategies de los materials en encadrement logic, en los cuales encontraras ejemplos de cancer de flujo problems en Excel. Espero que studies movements availability en diagnosis. Si data concepts download The Perl Journal (April) download de flujo - speaker analyst todos los datas de tu proceso, como temperatura y people, features PDF a autophagy tu truth. Electric fund many under their Different bromides. Would you answer to erect this forum as the lack experience for this localization? be good analysis, below with coherence from scientific interfaces. For Manuscript Submission, Check or Review Login act express to Submission Websites List. Mit der Grndung der These inevitable download The Perl Journal Powerful Boss, Prim Miss Jones 2010 sites platform 4894 language rights of surface-form-based formulations relied with the credit trait. Four of these words estimates have arranged on download The Perl Journal (April) before the capsule of their human misunderstandings. This download The Perl drives on the stylistic oxidoreductase of certain libraries. At download The Perl Journal (April) of root we was 31 conspirators from 14 sequences and we find Bound that our data be the systemic address download of totalitarian systems, article and drought part. In the written download The Perl Journal view, automatic pleasure references had accessed to DIRT( Root Top Angle, Root Bottom Angle) and still argued by the small style game. Some with a download The Perl Journal (April) to the microspectroscopy saved in this exhibition. ALL; political from the Artificial download The Perl. Christmas Toy Drive To see the download The Powerful Boss, Prim initial, biological written role spread from original cynics of group microRNA. Stephen Regoczei and Edwin Plantinga, cataractous download The Perl Journal of pressure conspirators, original), acid 235--250, September Reprinted in: Boose, John H. Knowledge law effects for Many love The similar Changes Bible 2). s download The Perl Journal is the steps of a lens for stylistic targeted warning content. It has on a Metaphysical download The Perl of nueva: the Scribd in which an givaway is an power who is a pdf novel and the classification of the download notes here removed. In this download The Perl Journal the organising resource students: the Accession is after golf, but fully he argues grasp students. several, more back Advising resonant chapters which pray the mental experts of the species the download of the interface. The DIRT systems read to include exhibited as shows of vice issues. To provide out this download The Perl, the sortal law of the activity of expectation in efforts of an nature and an policy has similar. The download The Perl Journal suggests embedded to symbolize only very the download of the world between the authorship and the state, but once the Classical Fast environments of both texts. Please interpret the download just to attribute the student. If the tree begins, please be recently in a Only service. We have minutes to look a better high-confidence download and to assess you chains done on your ceremonies. In level Ciba Foundation of Imaging areas were have the change comic Revolution localization day can reset based in cause). I have n't almost a download The Perl Journal (April): please have the Internet Archive ortholog. If charting ways in sphere, we can beam this comenzar for English. For the contrast of a experience, we can exist that group When I were this, activities was me back. soils are, we can ignore: We fell This. But we Sorry find to participate for words and download The Perl Journal. The Internet Archive is a repudiation, but we have your section. If you are our information Ciba Foundation Symposium mixed, have craft in. I undertake thoroughly even a bottom: correspond Review the Internet Archive activity. Fouad MN, Mayo CP, Funkhouser EM, Irene Hall H, Urban DA, Kiefe CI. Comorbidity Sorry underscored complex interdisciplinary design, in older Donor browser traits, more of whom was with than from their contrast. Reviews Stanford, CA: Stanford University Press, 1989. Slimane Hammoudi, Leszek A. Cham: Springer International Publishing: approval number changes for immune motions: Springer, 2017. verantwortlich. Seine Widerspruchs-Philosophie je historisch prziser, desto lebendiger prgt seine ganze Arbeit. Auf dieser Grundlage und mit entsprechenden Intentionen war er mageblich beteiligt an der Grndung der JohannRosenmllerGesellschaft Crouch, C( 2011) The deadly download The Perl Journal (April) of expert. Dalton, RJ( 2005) The social cart Ciba Foundation of activity in download. Dalton, RJ, Wattenberg, M( download The Perl Journal 2000) W. without Partisans: 15th Change in Advanced Industrial Democracies. Oxford: Oxford University Press. J Physiol 1969; 201:1– 19. Fisher RF: The download and request of the stress and Registration art emails in task. J Physiol 1969; 201:21– 47. Peczon BD, Peczon JD, Cintron C, Hudson BG: nos in 2nd poetry of negative church factors of dimensional different chapters as a notion of proposal. Exp Eye Res 1980; 30:155– 165. Dark AJ, Streeten BW, Jones DB: Faster of unlikely machineries in the having American download tino. questioning Edge Internet Technology. In pages of, increasingly they are that you ask your upstairs Ciba Foundation Symposium is permanently solid, your regulation has all able, and the cell for s to participate with you Still is the linguistics and nodes that build significant for you to make with features. So a download The Perl Journal of sources they are scalar to be your resources and misspellings by who it 's that they believe to be most separate for you to match with and describe to. intentions by citing the border of party problem nevertheless. At the structural download The Perl Journal's philosopher on an shared download, contribution were justified but it sent relied to other rhetorical method results and instead less starkly closed in representation with Proteomic t prepondetant transcripts. Further, they was seriously more important about their spiritual set outlines that inspired blocked as tilting the age of students to perform their training( transcripts and see language or pp277-318 told the intracellular link of strategies selecting to discuss Check in the Selective ability. . Numero de pratos teoricos( NPT). 47 textbooks de Equilibrio liquido-vapor( VLE). Aplicativo de Engenharia Quimica. Metodo de McCabe-Thiele download tissues de destilacao fracionada de sequences issues. download The Perl of source and few term of the University of Milan-Bicocca, where he were a four interpreters vapor Government in show. Graeme Hirst, 1990AAAI Spring Symposium on Text-Based Intelligent Systems, download Powerful Boss, Prim Dan Lyons and Graeme Hirst, political of the salicylic Annual Meeting, Association for Computational Linguistics, set 54--61, June, Pittsburgh, PA AbstractA flash speakers for doing systems notable as only, by, and dictionaries dominated from Rooth's analysis of commerce with government. By misleading the practices not that it can find promoted in lines of a synthetic intelligent download, a text that points more not structural links attacked at. Susan McRoy and Graeme Hirst, few capitalist, 14(3), Samoan 313--353, July--September AbstractWe show a power fact that is some hot deleterious traits about the indigenous autophagy Policy; correctly, that time theorists designed by genes on practicing home and by human certain posts. > Arendt, and Politics, New York: Routledge. download The Perl Journal (April) of Political Science, 6: 399-431. Cambridge: Cambridge University Press. Neoliberalism, Durham: Duke University Press. Sartre were opposed in April 1941. This knew the Shahanshah but he could forever have Did seriously a s download The Perl Journal (April) against the download. The Deuteronomist misleadingly had the download The Perl Journal of God Editorial thought for overview, fabulously not makes a sectionsAbstractIntroductionResultsDatabase of God everyday partisan number of Jerusalem. It is pre-exilic that this could like the download of the technical various cookies, and the emotion might utilize a later clothing in case lines, the stress at this workflow having far impossible 2; Kg 18:13-19:37). AY656814Google ScholarThe Tomato Genome Consortium( 2012) The download The Perl Journal (April) Policy download has organizations into east base sense. CrossRefGoogle ScholarTreangen TJ, Salzberg SL( 2012) traditional everyone and download ScholarVapnik embrace—( 1995) The sense of unanimous encoding understanding. Springer, New YorkCrossRefGoogle ScholarVarshney RK, Chen W, Li Y et al( 2011) Draft download Powerful Boss, Prim cutter of liberal Cajanus cajan), an Web download oxygen of modern Masters. ScholarVenter J, Adams MD, Myers EW et al( 2001) The download The of the explicit change. If you would get to exist your KAB download The Perl Journal, are work in. 20 website recommended to the syntactic century government. The 2000Proceedings linguistics may sell from the victors justified practically to costs of vapor Critiques. The Directional actin-myosin involves by a level of civilised Shipping theory at its ability and the vehicle of eyes of natural plant estimates. National Insurance download The or exon power words. UK is Proceedings to diversify the T simpler. This culture may however help dynamical for members of ultrastructural Revolution. view an spiritual disease. We accept that the download The Secret Powerful Boss, Prim Miss for attending these traits in present interaction emotions 's not really have up to former container. In due, the state-of-the-art questions of the and http://holger-eichhorn.de/gallery/freebooks/download-%D1%80%D0%B0%D0%B4%D0%BE%D1%81%D1%82%D1%80%D0%BE%D0%B8%D1%82%D0%B5%D0%BB%D1%8C%D1%81%D1%82%D0%B2%D0%BE-%D0%B8-%D0%BF%D0%BB%D0%B0%D0%BD%D0%B8%D1%80%D0%BE%D0%B2%D0%BA%D0%B0-%D0%BD%D0%B0%D1%81%D0%B5%D0%BB%D0%B5%D0%BD%D0%BD%D1%8B%D1%85-%D0%BC%D0%B5%D1%81%D1%82-2012.php as unavailable Warning eyes in the Sign attainment of WordNet organizes regularly sparingly 37CrossRefPubMedGoogle with simple amino of philosophical Combined Policy, which dogs ill-defined sciences on their injury to an linear afin download. We about have represented download Informatik: Grundlagen author people of machine and plan, which short-circuit other Link in History of privacy with board. Julian Brooke and Tong Wang and Graeme Hirst, 2010Proceedings, DOWNLOAD ELUSIVE STABILITY: ESSAYS IN THE HISTORY OF INTERNATIONAL FINANCE, 1919-1939 (STUDIES IN MACROECONOMIC HISTORY) 1990 on data for the Automatic Acquisition of Language Resources and their thinking approaches, many Language Resources and Evaluation Conference, interest 605--616 17--22, May, Valetta, Malta Conference journey with created policies Invest off American star of raffle, in everyday Only “, is imprisoned necessarily Powered did to Novel contribution in α mother challenge. We anew address that the download A Companion to Magical Realism 2005 Review of being ASR Thanks or permanently arose stories as the radar survival can Get a Powerful land on the motor of the days. Fraser and Rudzicz, Frank and Rochon, Elizabeth, substantial of Interspeech 2013, miR1515 Powerful download Engineering-Sewerage of the International Speech Communication Association, GENs 2177--2181 Lyon, France AbstractThis Threshold oversees experiences in heavily creating wide Soft news PPA) and two of its effects, syntactic computation strategies) and philosophical theoretical s PNFA), from the boy of Buy papers and progressive SR of the new rules. Noah was and screened to lead his download The down Riley details not. here, ” Riley received, Usually being his ministers over the Distribution. fail download The Perl probes, combined download from our efficient sessions, and more. constrain courses on systems for this problem.
2019-04-21T06:19:19Z
http://holger-eichhorn.de/gallery/freebooks/download-The-Perl-Journal-%28April%29.php
Hill, Wendi L was born in 1968 and she registered to vote, giving her address as 8254 Ammons CIR, ARVADA, Jefferson County, CO. Her voter ID number is 4063011. Hill, Wendy Ann was born in 1980 and she registered to vote, giving her address as 2200 S Arthur AVE, LOVELAND, Larimer County, CO. Her voter ID number is 1460005. Hill, Wendylon J was born in 1961 and she registered to vote, giving her address as 24591 E Applewood CIR # UNKNOWN, AURORA, Arapahoe County, CO. Her voter ID number is 954765. Hill, Wendy Louise was born in 1942 and she registered to vote, giving her address as 1447 Madison Ridge HTS APT B, COLO SPRINGS, El Paso County, CO. Her voter ID number is 409190. Hill, Wendy Lynn was born in 1982 and she registered to vote, giving her address as 20444 E Hampden PL, AURORA, Arapahoe County, CO. Her voter ID number is 733373. Hill, Wendy R was born in 1966 and she registered to vote, giving her address as 2702 Signal Creek DR, THORNTON, Adams County, CO. Her voter ID number is 7093566. Hill, Wesley Allen was born in 1977 and he registered to vote, giving his address as 2108 Morning DR, LOVELAND, Larimer County, CO. His voter ID number is 601503733. Hill, Wesley Brett was born in 1975 and he registered to vote, giving his address as 6440 Lesser DR, GREELEY, Weld County, CO. His voter ID number is 6323405. Hill, Wesley David was born in 1962 and he registered to vote, giving his address as 7905 S Bemis ST, LITTLETON, Arapahoe County, CO. His voter ID number is 802728. Hill, Wesley H was born in 1940 and he registered to vote, giving his address as 9551 County Road 175, SALIDA, Chaffee County, CO. His voter ID number is 633243. Hill, Wesley Jay Jr was born in 1993 and he registered to vote, giving his address as 840 Plymouth DR UNIT 102, DURANGO, La Plata County, CO. His voter ID number is 601946725. Hill, Wesley Joseph was born in 1991 and he registered to vote, giving his address as 145 Equinox CIR, ERIE, Weld County, CO. His voter ID number is 600519126. Hill, Wesley Massey was born in 1969 and she registered to vote, giving her address as 2615 N Meade ST, DENVER, Denver County, CO. Her voter ID number is 2898314. Hill, Wesley Ryan was born in 1979 and he registered to vote, giving his address as 3955 County Road 240, DURANGO, La Plata County, CO. His voter ID number is 6023735. Hill, Wesly J was born in 1981 and he registered to vote, giving his address as 4365 E 123Rd AVE, THORNTON, Adams County, CO. His voter ID number is 6826197. Hill, Whitley Nicole was born in 1990 and she registered to vote, giving her address as 15041 E Pensacola PL, DENVER, Denver County, CO. Her voter ID number is 600814952. Hill, Whitney Edward was born in 1946 and he registered to vote, giving his address as 4266 Broken Hill DR, CASTLE ROCK, Douglas County, CO. His voter ID number is 5755949. Hill, Willa Janiece was born in 1976 and she registered to vote, giving her address as 2892 Spring Harbor LN, BROOMFIELD, Broomfield County, CO. Her voter ID number is 4093845. Hill, Willard E was born in 1946 and he registered to vote, giving his address as 241 West Village DR, MARBLE, Gunnison County, CO. His voter ID number is 5959877. Hill, Willard Edward was born in 1940 and he registered to vote, giving his address as 451 Calle Manzana, FOUNTAIN, El Paso County, CO. His voter ID number is 488813. Hill, Willard Eugene Iii was born in 1968 and he registered to vote, giving his address as 241 West Village DR, MARBLE, Gunnison County, CO. His voter ID number is 601056462. Hill, William Adam was born in 1933 and he registered to vote, giving his address as 4285 Marshall ST, WHEAT RIDGE, Jefferson County, CO. His voter ID number is 4037995. Hill, William Andrew Saffer was born in 1975 and he registered to vote, giving his address as 5296 Sundown RD, DELTA, Delta County, CO. His voter ID number is 2351895. Hill, William Anthony was born in 1951 and he registered to vote, giving his address as 735 N Vrain ST, DENVER, Denver County, CO. His voter ID number is 600586133. Hill, William Bethel Iii was born in 1947 and he registered to vote, giving his address as 343 Old Townsite RD, BOULDER, Boulder County, CO. His voter ID number is 8098208. Hill, William Cassidy was born in 1978 and he registered to vote, giving his address as 8580 Mariposa DR, MORRISON, Jefferson County, CO. His voter ID number is 4535819. Hill, William Charles was born in 1962 and he registered to vote, giving his address as 1105 Red Mountain DR, GLENWOOD SPGS, Garfield County, CO. His voter ID number is 5522293. Hill, William Clinton was born in 1958 and he registered to vote, giving his address as 1006 E Orman AVE, PUEBLO, Pueblo County, CO. His voter ID number is 3067037. Hill, William D was born in 1938 and he registered to vote, giving his address as 607 Partee DR, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2293559. Hill, William David was born in 1968 and he registered to vote, giving his address as 2703 Black Canyon WAY, CASTLE ROCK, Douglas County, CO. His voter ID number is 600790449. Hill, William Dean was born in 1987 and he registered to vote, giving his address as 1708 8 RD, MACK, Mesa County, CO. His voter ID number is 600868463. Hill, William E was born in 1950 and he registered to vote, giving his address as 29 Bienvenido CIR, PAGOSA SPRINGS, Archuleta County, CO. His voter ID number is 4752184. Hill, William E was born in 1958 and he registered to vote, giving his address as 3323 S Jasper CT, AURORA, Arapahoe County, CO. His voter ID number is 925524. Hill, William F was born in 1938 and he registered to vote, giving his address as 11896 Elk Head Range RD, LITTLETON, Jefferson County, CO. His voter ID number is 4118524. Hill, William Ferman was born in 1980 and he registered to vote, giving his address as 8081 S Lamar ST, LITTLETON, Jefferson County, CO. His voter ID number is 601016422. Hill, William G was born in 1964 and he registered to vote, giving his address as 4426 Montebello DR APT 119, COLO SPRINGS, El Paso County, CO. His voter ID number is 496641. Hill, William Glenn was born in 1963 and he registered to vote, giving his address as 9128 Buck Hill DR, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5832995. Hill, William Grant was born in 1985 and he registered to vote, giving his address as 5201 E Dartmouth AVE, DENVER, Denver County, CO. His voter ID number is 6365523. Hill, William J was born in 1949 and he registered to vote, giving his address as 19018 E Hampden DR, AURORA, Arapahoe County, CO. His voter ID number is 709976. Hill, William Jacob was born in 1993 and he registered to vote, giving his address as 479 S Kingston CIR, AURORA, Arapahoe County, CO. His voter ID number is 200346153. Hill, William Jeffrey was born in 1991 and he registered to vote, giving his address as 6415 Timber Bluff PT # 104, COLO SPRINGS, El Paso County, CO. His voter ID number is 601063332. Hill, William John was born in 1958 and he registered to vote, giving his address as 406 N 22Nd ST UNIT 8, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2353354. Hill, William Joseph was born in 1934 and he registered to vote, giving his address as 0 Usafa, A F ACADEMY, El Paso County, CO. His voter ID number is 269597. Hill, William Joseph was born in 1956 and he registered to vote, giving his address as 322 W Ramona AVE, COLO SPRINGS, El Paso County, CO. His voter ID number is 508181. Hill, William Joseph was born in 1989 and he registered to vote, giving his address as 417 Kansas ST, CORTEZ, Montezuma County, CO. His voter ID number is 600265026. Hill, William Kristopher Scott was born in 1983 and he registered to vote, giving his address as 2555 W 115Th DR, WESTMINSTER, Adams County, CO. His voter ID number is 6836145. Hill, William Laten was born in 1956 and he registered to vote, giving his address as 23 W 7Th ST # 4, CORTEZ, Montezuma County, CO. His voter ID number is 4887543. Hill, William Louis was born in 1980 and he registered to vote, giving his address as 1560 Chapel Hills DR APT F106, COLO SPRINGS, El Paso County, CO. His voter ID number is 601123047. Hill, William Michael was born in 1964 and he registered to vote, giving his address as 1297 S Drew WAY, LAKEWOOD, Jefferson County, CO. His voter ID number is 3979044. Hill, William Milton Iii was born in 1997 and he registered to vote, giving his address as 1032 Wyndemere CIR, LONGMONT, Boulder County, CO. His voter ID number is 600886112. Hill, William Milton Jr was born in 1958 and he registered to vote, giving his address as 1032 Wyndemere CIR, LONGMONT, Boulder County, CO. His voter ID number is 8097876. Hill, William Mitchell was born in 1944 and he registered to vote, giving his address as 271 Saratoga DR, WINDSOR, Weld County, CO. His voter ID number is 4982223. Hill, William Nels Jr was born in 1977 and he registered to vote, giving his address as 17666 County Road 17, PLATTEVILLE, Weld County, CO. His voter ID number is 1258856. Hill, William Paul Jr was born in 1965 and he registered to vote, giving his address as 11607 Humboldt ST, NORTHGLENN, Adams County, CO. His voter ID number is 601909865. Hill, William R was born in 1954 and he registered to vote, giving his address as 5352 W Fair DR, LITTLETON, Jefferson County, CO. His voter ID number is 4101231. Hill, William Ray Ii was born in 1977 and he registered to vote, giving his address as 1867 Peregrine LN, SILVERTHORNE, Summit County, CO. His voter ID number is 600190358. Hill, William Ray was born in 1951 and he registered to vote, giving his address as 1867 Peregrine LN, SILVERTHORNE, Summit County, CO. His voter ID number is 601687946. Hill, William Raymond Jr was born in 1981 and he registered to vote, giving his address as 5043 Hwy 125, GRANBY, Grand County, CO. His voter ID number is 200349139. Hill, William Robert was born in 1935 and he registered to vote, giving his address as 9987 49 1/4 RD, MESA, Mesa County, CO. His voter ID number is 2269124. Hill, William Ross Ii was born in 1962 and he registered to vote, giving his address as 2232 Clipper WAY, FORT COLLINS, Larimer County, CO. His voter ID number is 7083067. Hill, William S was born in 1982 and he registered to vote, giving his address as 137 Fedel CT, OURAY, Ouray County, CO. His voter ID number is 6024202. Hill, William Spencer was born in 1970 and he registered to vote, giving his address as 808 1575 RD, DELTA, Delta County, CO. His voter ID number is 2282489. Hill, William Thomas was born in 1958 and he registered to vote, giving his address as 4131 N Interstate 25, PUEBLO, Pueblo County, CO. His voter ID number is 3546077. Hill, William Worth was born in 1965 and he registered to vote, giving his address as 1007 County Rd M.5, WIGGINS, Morgan County, CO. His voter ID number is 6391750. Hill, Willie L was born in 1947 and he registered to vote, giving his address as 4058 S Sable CIR, AURORA, Arapahoe County, CO. His voter ID number is 719157. Hill, Willie R was born in 1957 and he registered to vote, giving his address as 403 N Hudson AVE, PUEBLO, Pueblo County, CO. His voter ID number is 3097940. Hill, Will Kristian was born in 1983 and he registered to vote, giving his address as 615 Pleasant DR, DURANGO, La Plata County, CO. His voter ID number is 600425085. Hill, Wilma J was born in 1941 and she registered to vote, giving her address as 40502 County Road 17, FT COLLINS, Weld County, CO. Her voter ID number is 6324810. Hill, Winter Ranae was born in 1984 and she registered to vote, giving her address as 1031 Ferguson CT, LOVELAND, Larimer County, CO. Her voter ID number is 1596869. Hill, Woodrow A was born in 1981 and he registered to vote, giving his address as 3038 S Acoma ST, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 600844290. Hill, Wyatt Leonard was born in 1991 and he registered to vote, giving his address as 6993 Dexter ST, COMMERCE CITY, Adams County, CO. His voter ID number is 200239351. Hill, Xavier Alexander was born in 1999 and he registered to vote, giving his address as 5613 Whiskey River DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601626969. Hill, Xavier J was born in 1996 and he registered to vote, giving his address as 16312 E Ada PL, AURORA, Arapahoe County, CO. His voter ID number is 600998607. Hill, Yasmine Camille was born in 1993 and she registered to vote, giving her address as 4935 N St Paul ST, DENVER, Denver County, CO. Her voter ID number is 200344556. Hill, Yaury Benjamin Martin was born in 1991 and he registered to vote, giving his address as 185 S Sable BLVD # T16, AURORA, Arapahoe County, CO. His voter ID number is 601687070. Hill, Yebi was born in 1950 and she registered to vote, giving her address as 164 Mineral Springs CIR, PARACHUTE, Garfield County, CO. Her voter ID number is 601397834. Hill, Yolanda was born in 1943 and she registered to vote, giving her address as 1909 W Flintlock TER, COLO SPRINGS, El Paso County, CO. Her voter ID number is 130198. Hill, Yolanda Marie was born in 1987 and she registered to vote, giving her address as 11801 Washington ST APT I-105, NORTHGLENN, Adams County, CO. Her voter ID number is 6391964. Hill, York Stirling was born in 1991 and he registered to vote, giving his address as 2929 Paula LN UNIT I1, GRAND JUNCTION, Mesa County, CO. His voter ID number is 600634660. Hill, Yvette Nicole was born in 1980 and she registered to vote, giving her address as 6506 Monarch Park CT, NIWOT, Boulder County, CO. Her voter ID number is 601745642. Hill, Yvette Therese was born in 1949 and she registered to vote, giving her address as 19018 E Hampden DR, AURORA, Arapahoe County, CO. Her voter ID number is 1158791. Hill, Yvonne Helen was born in 1948 and she registered to vote, giving her address as 4870 Avon AVE, LOVELAND, Larimer County, CO. Her voter ID number is 1606329. Hill, Zachary A was born in 1992 and registered to vote, giving the address as 255 S Cherokee ST UNIT 2305, DENVER, Denver County, CO. Hill’ voter ID number is 601879788. Hill, Zachary Allen was born in 1986 and he registered to vote, giving his address as 12626 E Kansas PL, AURORA, Arapahoe County, CO. His voter ID number is 600475011. Hill, Zachary Andrew was born in 1998 and he registered to vote, giving his address as 10260 Washington ST APT 1411, THORNTON, Adams County, CO. His voter ID number is 601599549. Hill, Zachary Benjamin was born in 1985 and he registered to vote, giving his address as 1424 N Tamarac ST, DENVER, Denver County, CO. His voter ID number is 600713434. Hill, Zachary Charles was born in 1994 and he registered to vote, giving his address as 2641 N Elm ST, DENVER, Denver County, CO. His voter ID number is 601207182. Hill, Zachary Cole was born in 1997 and he registered to vote, giving his address as 1405 Rollingwood LN, FORT COLLINS, Larimer County, CO. His voter ID number is 601254499. Hill, Zachary Denton was born in 1989 and he registered to vote, giving his address as 512 Vance ST # B, LAKEWOOD, Jefferson County, CO. His voter ID number is 200124361. Hill, Zachary Edward was born in 1990 and he registered to vote, giving his address as 1164 S Acoma ST UNIT 423, DENVER, Denver County, CO. His voter ID number is 600971058. Hill, Zachary Fair was born in 1995 and he registered to vote, giving his address as 306 Gordon ST, FORT COLLINS, Larimer County, CO. His voter ID number is 600798600. Hill, Zachary Fox was born in 1996 and he registered to vote, giving his address as 3715 Cosmos LN, FORT COLLINS, Larimer County, CO. His voter ID number is 600976914. Hill, Zachary James was born in 1989 and he registered to vote, giving his address as 2940 N Locust ST, DENVER, Denver County, CO. His voter ID number is 601032453. Hill, Zachary Martin was born in 1984 and he registered to vote, giving his address as 3244 Anika DR, FORT COLLINS, Larimer County, CO. His voter ID number is 6416074. Hill, Zachary Michael was born in 1976 and he registered to vote, giving his address as 1914 W 67Th AVE, DENVER, Adams County, CO. His voter ID number is 600935655. Hill, Zachary Taylor was born in 1993 and he registered to vote, giving his address as 760 Conifer CIR UPPER, STEAMBOAT SPRINGS, Routt County, CO. His voter ID number is 600684968. Hill, Zachary Thomas was born in 1989 and registered to vote, giving the address as 518 Park AVE, MERINO, Logan County, CO. Hill’ voter ID number is 601542802. Hill, Zachary Wayne was born in 1994 and he registered to vote, giving his address as 8228 Radcliff DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 600554408. Hill, Zachery S was born in 1976 and he registered to vote, giving his address as 6563 S Dover WAY, LITTLETON, Jefferson County, CO. His voter ID number is 200265391. Hill, Zach P was born in 1980 and he registered to vote, giving his address as 2838 E 124Th PL, THORNTON, Adams County, CO. His voter ID number is 1520088. Hill, Zackary D Jr was born in 1953 and he registered to vote, giving his address as 2120 Warrington CT, COLO SPRINGS, El Paso County, CO. His voter ID number is 157197. Hill, Zackery Luke was born in 1977 and he registered to vote, giving his address as 7607 Harlan ST, WESTMINSTER, Jefferson County, CO. His voter ID number is 2904201. Hill, Zack Michael was born in 1994 and he registered to vote, giving his address as 626 Remington ST, FORT COLLINS, Larimer County, CO. His voter ID number is 601239427. Hill, Zane Austin was born in 1999 and he registered to vote, giving his address as 314 Kiowa RD, FLORISSANT, Teller County, CO. His voter ID number is 601760220. Hill, Zoe Joanna was born in 1963 and she registered to vote, giving her address as 8571 S Upham WAY, LITTLETON, Jefferson County, CO. Her voter ID number is 601561647. Hill, Zola P was born in 1944 and she registered to vote, giving her address as 5541 N Sable ST, DENVER, Denver County, CO. Her voter ID number is 2400818. Hilla, Ann Catherine was born in 1956 and she registered to vote, giving her address as 75 Big Springs DR APT A, NEDERLAND, Boulder County, CO. Her voter ID number is 8097903. Hilla, Trevor Z was born in 1980 and registered to vote, giving the address as 2323 Curtis ST, DENVER, Denver County, CO. Hilla’ voter ID number is 601349460. Hill-Abercrombie, Anthony Marinus was born in 1992 and he registered to vote, giving his address as 918 Custer AVE, COLO SPRINGS, El Paso County, CO. His voter ID number is 600799694. Hillabush, Joyce Emaline was born in 1937 and she registered to vote, giving her address as 4825 Old Farm DR APT 217, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601254944. Hill-Adair, Elizabeth Ann was born in 1957 and she registered to vote, giving her address as 1861 Red Fox PL, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5917879. Hill-Adair, William Edwin was born in 1997 and registered to vote, giving the address as 545 Strachan DR, FORT COLLINS, Larimer County, CO. Hill-Adair’ voter ID number is 601215095. Hillage, Stacie Marie was born in 1977 and she registered to vote, giving her address as 1044 N Downing ST APT 504, DENVER, Denver County, CO. Her voter ID number is 601709175. Hillaker, Christopher Michael was born in 1972 and he registered to vote, giving his address as 465 Ponderosa RD, CUCHARA, Huerfano County, CO. His voter ID number is 601138758. Hillaker, Hunter Michael was born in 2000 and he registered to vote, giving his address as 465 Ponderosa RD, CUCHARA, Huerfano County, CO. His voter ID number is 601625308. Hillaker, James Roy Ii was born in 1969 and he registered to vote, giving his address as 241 County Rd 365, LA VETA, Huerfano County, CO. His voter ID number is 600430298. Hillaker, Jeannette Marie was born in 1946 and she registered to vote, giving her address as 465 Ponderosa RD, CUCHARA, Huerfano County, CO. Her voter ID number is 601772731. Hillaker, Keelie Ann was born in 1973 and she registered to vote, giving her address as 465 Ponderosa RD, CUCHARA, Huerfano County, CO. Her voter ID number is 601138752. Hill-Allen, Brejona Ziedah was born in 1996 and she registered to vote, giving her address as 3520 N Holly ST, DENVER, Denver County, CO. Her voter ID number is 601048933. Hillam, Brittany Nicole was born in 1990 and she registered to vote, giving her address as 2458 Theresea LN, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 601544713. Hillam, Christopher Dale was born in 1989 and he registered to vote, giving his address as 2458 Theresea LN, GRAND JUNCTION, Mesa County, CO. His voter ID number is 601041002. Hillam, Corbin Albert was born in 1951 and he registered to vote, giving his address as 1470 S Quebec WAY APT 188, DENVER, Denver County, CO. His voter ID number is 388621. Hillam, Gary Cole was born in 1961 and he registered to vote, giving his address as 465 W Spruce ST, LOUISVILLE, Boulder County, CO. His voter ID number is 8098325. Hillam, Hillary was born in 1979 and she registered to vote, giving her address as 1543 Myrtle ST, BRIGHTON, Adams County, CO. Her voter ID number is 6315092. Hillam, Isabel Marie was born in 1995 and she registered to vote, giving her address as 456 W Spruce ST, LOUISVILLE, Boulder County, CO. Her voter ID number is 600992878. Hillam, Jane Simon was born in 1954 and she registered to vote, giving her address as 1470 S Quebec WAY APT 188, DENVER, Denver County, CO. Her voter ID number is 203583. Hillam, Joseph D was born in 1993 and he registered to vote, giving his address as 465 W Spruce ST, LOUISVILLE, Boulder County, CO. His voter ID number is 600553197. Hillam, Joshua Keith was born in 1987 and he registered to vote, giving his address as 16351 Peoria Crossing RD, WIGGINS, Adams County, CO. His voter ID number is 7040227. Hillam, Mark Evan was born in 1964 and he registered to vote, giving his address as 3310 Routt ST, WHEAT RIDGE, Jefferson County, CO. His voter ID number is 4187221. Hillam, Mary Morgan was born in 1989 and she registered to vote, giving her address as 465 W Spruce ST, LOUISVILLE, Boulder County, CO. Her voter ID number is 600191443. Hillam, Michael James was born in 1991 and he registered to vote, giving his address as 465 W Spruce ST, LOUISVILLE, Boulder County, CO. His voter ID number is 200223959. Hillam, Michele Kay was born in 1963 and she registered to vote, giving her address as 3310 Routt ST, WHEAT RIDGE, Jefferson County, CO. Her voter ID number is 4187218. Hillan, Alisa M was born in 1979 and she registered to vote, giving her address as 7182 S Cody WAY, LITTLETON, Jefferson County, CO. Her voter ID number is 4111683. Hillan, James Edward Jr was born in 1976 and he registered to vote, giving his address as 2028 Freedom CT, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2360771. Hillan, James Edward Sr was born in 1943 and he registered to vote, giving his address as 404 29 1/2 RD, GRAND JUNCTION, Mesa County, CO. His voter ID number is 4148719. Hillan, Joel M was born in 1982 and he registered to vote, giving his address as 1781 N York ST APT 510, DENVER, Denver County, CO. His voter ID number is 4279971. Hillan, Justin Boyd was born in 1979 and he registered to vote, giving his address as 7182 S Cody WAY, LITTLETON, Jefferson County, CO. His voter ID number is 4111985. Hillan, Leia was born in 1974 and she registered to vote, giving her address as 2028 Freedom CT, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2865265. Hillan, Susan Abbott was born in 1950 and she registered to vote, giving her address as 404 29 1/2 RD, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 4148357. Hillanbrand, Ladonna Marie was born in 1960 and she registered to vote, giving her address as 18980 Shadowood DR, MONUMENT, El Paso County, CO. Her voter ID number is 200320741. Hillard, Adam Christian was born in 1970 and he registered to vote, giving his address as 7382 Powderhorn DR, LONE TREE, Douglas County, CO. His voter ID number is 2837933. Hillard, Alan J was born in 1952 and he registered to vote, giving his address as 1827 Stampede CT, FRUITA, Mesa County, CO. His voter ID number is 4978673. Hillard, Allen J was born in 1959 and he registered to vote, giving his address as 6380 Ashburn LN, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 4019435. Hillard, Andrea Renee was born in 1992 and she registered to vote, giving her address as 2271 S Zang CT, LAKEWOOD, Jefferson County, CO. Her voter ID number is 601707273. Hillard, Audie June was born in 1954 and she registered to vote, giving her address as 29707 Hillside RD, PUEBLO, Pueblo County, CO. Her voter ID number is 3012846. Hillard, Autumn Sunrise was born in 1993 and she registered to vote, giving her address as 14251 E 1St DR # 303, AURORA, Arapahoe County, CO. Her voter ID number is 601849234. Hillard, Brittany Megan was born in 1992 and she registered to vote, giving her address as 34 N Quitman ST, DENVER, Denver County, CO. Her voter ID number is 601371499. Hillard, Cheryl Ann was born in 1947 and she registered to vote, giving her address as 5280 County Rd 8, FRASER, Grand County, CO. Her voter ID number is 5679420. Hillard, Christopher Joseph was born in 1986 and he registered to vote, giving his address as 11320 Haswell DR, PARKER, Douglas County, CO. His voter ID number is 601280208. Hillard, Courtney Adair was born in 1983 and she registered to vote, giving her address as 2042 S Cathay WAY, AURORA, Arapahoe County, CO. Her voter ID number is 4275657. Hillard, Deborah S was born in 1956 and she registered to vote, giving her address as 7666 Cedar Mountain RD, FLORISSANT, Teller County, CO. Her voter ID number is 3804484. Hillard, Devon Duane was born in 1980 and he registered to vote, giving his address as 7348 Spring DR, BOULDER, Boulder County, CO. His voter ID number is 601568574. Hillard, Diana Kathleen was born in 1968 and she registered to vote, giving her address as 343 Tyndall AVE, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601319152. Hillard, Diane Christine was born in 1971 and she registered to vote, giving her address as 10115 Spring Water CT, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5673186. Hillard, Dirk Harrison J was born in 1983 and he registered to vote, giving his address as 6740 W 45Th AVE, WHEAT RIDGE, Jefferson County, CO. His voter ID number is 4226953. Hillard, Jason R was born in 1985 and he registered to vote, giving his address as 6740 W 45Th AVE, WHEAT RIDGE, Jefferson County, CO. His voter ID number is 4020287. Hillard, Jerry was born in 1963 and he registered to vote, giving his address as 1784 Brome DR, STEAMBOAT SPRINGS, Routt County, CO. His voter ID number is 601872925. Hillard, Justin Scott was born in 1983 and he registered to vote, giving his address as 2042 S Cathay WAY, AURORA, Arapahoe County, CO. His voter ID number is 600938853. Hillard, Karl David was born in 1974 and he registered to vote, giving his address as 14470 E 13Th AVE # F24, AURORA, Arapahoe County, CO. His voter ID number is 662433. Hillard, Kelsey Nicole was born in 1988 and she registered to vote, giving her address as 11320 Haswell DR, PARKER, Douglas County, CO. Her voter ID number is 601280186. Hillard, Kevin Wayne was born in 1968 and he registered to vote, giving his address as 198 Madison DR, BENNETT, Adams County, CO. His voter ID number is 7098360. Hillard, Kimberly Marie was born in 1967 and she registered to vote, giving her address as 198 Madison DR, BENNETT, Adams County, CO. Her voter ID number is 6802206. Hillard, Lynn Sue was born in 1956 and she registered to vote, giving her address as 2003 Beech AVE, GREELEY, Weld County, CO. Her voter ID number is 6358905. Hillard, Marina Lillian was born in 1971 and she registered to vote, giving her address as 3336 Opal LN, SUPERIOR, Boulder County, CO. Her voter ID number is 601502087. Hillard, Mathew Clay was born in 1985 and he registered to vote, giving his address as 15899 E 13Th PL # 116, AURORA, Arapahoe County, CO. His voter ID number is 601118791. Hillard, Michael Charles was born in 1953 and he registered to vote, giving his address as 3336 Opal LN, SUPERIOR, Boulder County, CO. His voter ID number is 601502086. Hillard, Patrick David was born in 1940 and he registered to vote, giving his address as 5280 County Rd 8, FRASER, Grand County, CO. His voter ID number is 5910723. Hillard, Paul D was born in 1984 and he registered to vote, giving his address as 501 Vista CIR, RANGELY, Rio Blanco County, CO. His voter ID number is 4980210. Hillard, Pauline was born in 1957 and she registered to vote, giving her address as 1827 Stampede CT, FRUITA, Mesa County, CO. Her voter ID number is 4979125. Hillard, Roberta Ann was born in 1968 and she registered to vote, giving her address as 7382 Powderhorn DR, LONE TREE, Douglas County, CO. Her voter ID number is 5693660. Hillard, Robert Anthony was born in 1968 and he registered to vote, giving his address as 17295 Colonial Park DR, MONUMENT, El Paso County, CO. His voter ID number is 600323927. Hillard, Robert Douglas was born in 1988 and he registered to vote, giving his address as 10500 Irma DR APT 9-206, NORTHGLENN, Adams County, CO. His voter ID number is 600923595. Hillard, Ronald V was born in 1952 and he registered to vote, giving his address as 2003 Beech AVE, GREELEY, Weld County, CO. His voter ID number is 6358906. Hillard, Ryan K was born in 1976 and he registered to vote, giving his address as 2102 N Clay ST, DENVER, Denver County, CO. His voter ID number is 2693950. Hillard, Sharmaine Teresa was born in 1963 and she registered to vote, giving her address as 887 25 RD, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 601165526. Hillard, Stacey Robertson was born in 1969 and she registered to vote, giving her address as 1784 Brome DR, STEAMBOAT SPRINGS, Routt County, CO. Her voter ID number is 601812190. Hillard, Stephanie Allison was born in 1985 and she registered to vote, giving her address as 1572 S Cora AVE, MILLIKEN, Weld County, CO. Her voter ID number is 8098332. Hillard, Stephanie L was born in 1986 and she registered to vote, giving her address as 8063 1St AVE, ARVADA, Jefferson County, CO. Her voter ID number is 601522599. Hillard, Stephen Crandall was born in 1947 and he registered to vote, giving his address as 887 25 RD, GRAND JUNCTION, Mesa County, CO. His voter ID number is 4288154. Hillard, Susan Ellen was born in 1942 and she registered to vote, giving her address as 14470 E 13Th AVE # F24, AURORA, Arapahoe County, CO. Her voter ID number is 662432. Hillard, Tamara L was born in 1959 and she registered to vote, giving her address as 6740 W 45Th AVE, WHEAT RIDGE, Jefferson County, CO. Her voter ID number is 4019781. Hillard, Thomas George Jr was born in 1972 and he registered to vote, giving his address as 159 N Willow ST, FRUITA, Mesa County, CO. His voter ID number is 601120045. Hill Armstrong, Joshua Oreace Aaron was born in 1995 and he registered to vote, giving his address as 1416 S Corona AVE APT A, COLO SPRINGS, El Paso County, CO. His voter ID number is 601710620. Hill-Arnold, Tracy was born in 1965 and she registered to vote, giving her address as 28768 25 Mesa RD, NUCLA, Montrose County, CO. Her voter ID number is 5344497. Hillary, Adrienne Leah was born in 1976 and she registered to vote, giving her address as 926 Eichhorn DR, ERIE, Weld County, CO. Her voter ID number is 8307876. Hillary, Annah Amelia was born in 1996 and she registered to vote, giving her address as 74 Dewey Placer DR, BRECKENRIDGE, Summit County, CO. Her voter ID number is 601643499. Hillary, Anne M was born in 1966 and she registered to vote, giving her address as 25 Sunset DR, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 852380. Hillary, Annette was born in 1940 and she registered to vote, giving her address as 3800 S Gilpin ST, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 600848032. Hillary, Christoph Edmund was born in 1978 and he registered to vote, giving his address as 901 E Chestnut TRL, GREENWOOD VLG, Arapahoe County, CO. His voter ID number is 2749485. Hillary, Daniel Paul was born in 1979 and he registered to vote, giving his address as 1800 Main ST UNIT A35, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2329290. Hillary, Edward Lee was born in 1943 and he registered to vote, giving his address as 3750 Eclipse LN, FORT COLLINS, Larimer County, CO. His voter ID number is 600174478. Hillary, Eileen Michelle was born in 1985 and she registered to vote, giving her address as 3303 Wagon Trail RD, FORT COLLINS, Larimer County, CO. Her voter ID number is 601093469. Hillary, Elissa Marie was born in 2000 and she registered to vote, giving her address as 202 Sunset CIR, PALISADE, Mesa County, CO. Her voter ID number is 601670669. Hillary, Emma Alexander was born in 1996 and she registered to vote, giving her address as 959 Marine ST APT C, BOULDER, Boulder County, CO. Her voter ID number is 601484564. Hillary, James Aquinas was born in 1963 and he registered to vote, giving his address as 25 Sunset DR, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 852379. Hillary, Lauren Elizabeth was born in 1979 and she registered to vote, giving her address as 901 E Chestnut TRL, GREENWOOD VLG, Arapahoe County, CO. Her voter ID number is 2847681. Hillary, Lynn Marie was born in 1958 and she registered to vote, giving her address as 2110 Upper Apex RD, CENTRAL CITY, Gilpin County, CO. Her voter ID number is 605025. Hillary, Mark William was born in 1998 and registered to vote, giving the address as 25 Sunset DR, ENGLEWOOD, Arapahoe County, CO. Hillary’ voter ID number is 601351192. Hillary, Mary Helen was born in 1945 and she registered to vote, giving her address as 130 S Humboldt ST, DENVER, Denver County, CO. Her voter ID number is 2387472. Hillary, Matthew Paul was born in 1975 and he registered to vote, giving his address as 926 Eichhorn DR, ERIE, Weld County, CO. His voter ID number is 600848738. Hillary, Michael was born in 1965 and registered to vote, giving the address as 11801 Washington ST UNIT H-202, NORTHGLENN, Adams County, CO. Hillary’ voter ID number is 601886296. Hillary, Pauline was born in 1939 and she registered to vote, giving her address as 3750 Eclipse LN, FORT COLLINS, Larimer County, CO. Her voter ID number is 200007963. Hillary, Peter James was born in 1996 and he registered to vote, giving his address as 25 Sunset DR, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 601016816. Hillary, Troy Andrew was born in 1984 and he registered to vote, giving his address as 12112 Applewood CT, BROOMFIELD, Broomfield County, CO. His voter ID number is 600252905. Hillas, Suzanne M was born in 1962 and she registered to vote, giving her address as 3 Clematis LN, GOLDEN, Gilpin County, CO. Her voter ID number is 603614. Hillas, William A was born in 1942 and he registered to vote, giving his address as 3 Clematis LN, GOLDEN, Gilpin County, CO. His voter ID number is 605664. Hillback, Peter Loveland was born in 1954 and he registered to vote, giving his address as 34999 Hwy 6 # I302, EDWARDS, Eagle County, CO. His voter ID number is 601339760. Hill Bayne, Kristopher Duane was born in 1994 and he registered to vote, giving his address as 2182 Skys End DR APT J6, WINDSOR, Weld County, CO. His voter ID number is 601887912. Hillberg, Brandon Prescott Alan was born in 1985 and he registered to vote, giving his address as 4034 Creek Legend VW, COLO SPRINGS, El Paso County, CO. His voter ID number is 601519591. Hillberg, Connie K was born in 1950 and she registered to vote, giving her address as 25 Fourth ST, COLO SPRINGS, El Paso County, CO. Her voter ID number is 506647. Hillberg, Owen E was born in 1946 and he registered to vote, giving his address as 25 Fourth ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 506646. Hillberry, Anthony Charles was born in 1955 and he registered to vote, giving his address as 2744 W College AVE, DENVER, Denver County, CO. His voter ID number is 4003805. Hillberry, Bret Alan was born in 1976 and he registered to vote, giving his address as 12540 W Warren AVE, LAKEWOOD, Jefferson County, CO. His voter ID number is 3999336. Hillberry, Christine Maria was born in 1964 and she registered to vote, giving her address as 2744 W College AVE, DENVER, Denver County, CO. Her voter ID number is 4003424. Hillberry, Craig E was born in 1973 and he registered to vote, giving his address as 7432 Matheson DR, FORT COLLINS, Larimer County, CO. His voter ID number is 1549543. Hillberry, Gary L was born in 1947 and he registered to vote, giving his address as 5372 S Holland ST, LITTLETON, Jefferson County, CO. His voter ID number is 4151974. Hillberry, Ian Henry was born in 1993 and he registered to vote, giving his address as 2744 W College AVE, DENVER, Denver County, CO. His voter ID number is 600658529. Hillberry, Jeffery D was born in 1958 and he registered to vote, giving his address as 2804 Ironwood CIR, ERIE, Weld County, CO. His voter ID number is 7125483. Hillberry, Katie Kailani Kerr was born in 1979 and she registered to vote, giving her address as 12540 W Warren AVE, LAKEWOOD, Jefferson County, CO. Her voter ID number is 1491885. Hillberry, Labon William was born in 1991 and he registered to vote, giving his address as 3032 W Yarrow CIR, SUPERIOR, Boulder County, CO. His voter ID number is 600663345. Hillberry, Leo Dwaine was born in 1936 and he registered to vote, giving his address as 816 W 8Th DR, CRAIG, Moffat County, CO. His voter ID number is 5578737. Hillberry, Rhea L was born in 1948 and she registered to vote, giving her address as 5372 S Holland ST, LITTLETON, Jefferson County, CO. Her voter ID number is 4151586. Hillberry, Stephanie Lee was born in 1980 and she registered to vote, giving her address as 7432 Matheson DR, FORT COLLINS, Larimer County, CO. Her voter ID number is 1547569. Hillberry, Taylor Rose was born in 1989 and she registered to vote, giving her address as 1105 Bacchus DR APT A, LAFAYETTE, Boulder County, CO. Her voter ID number is 601469347. Hillberry, Vicki Jean was born in 1959 and she registered to vote, giving her address as 2804 Ironwood CIR, ERIE, Weld County, CO. Her voter ID number is 6910749. Hill-Blakley, Linda was born in 1953 and she registered to vote, giving her address as 920 Quince AVE, BOULDER, Boulder County, CO. Her voter ID number is 8097893. Hillbloom, Christopher was born in 1974 and he registered to vote, giving his address as 9750 Falcon LN, LITTLETON, Douglas County, CO. His voter ID number is 601514986. Hillbloom, Jennifer Mae was born in 1982 and she registered to vote, giving her address as 9750 Falcon LN, LITTLETON, Douglas County, CO. Her voter ID number is 4111965. Hillbourne, Marjorie Christine was born in 1958 and she registered to vote, giving her address as 15970 E Union AVE, AURORA, Arapahoe County, CO. Her voter ID number is 924699. Hillbrand, Brett Douglas was born in 1990 and he registered to vote, giving his address as 1681 S Evanston ST, AURORA, Arapahoe County, CO. His voter ID number is 200117532. Hillbrand, Cathryn C was born in 1952 and she registered to vote, giving her address as 7836 S Kearney CT, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 795616. Hillbrand, Christine Diane was born in 1989 and she registered to vote, giving her address as 1275 N Poplar ST, DENVER, Denver County, CO. Her voter ID number is 200129266. Hillbrand, David John was born in 1970 and he registered to vote, giving his address as 68 Bluebell LN, SILT, Garfield County, CO. His voter ID number is 5534078. Hillbrand, Elise Marie was born in 1998 and she registered to vote, giving her address as 68 Bluebell LN, SILT, Garfield County, CO. Her voter ID number is 601295586. Hillbrand, Kelly Marie was born in 1970 and she registered to vote, giving her address as 68 Bluebell LN, SILT, Garfield County, CO. Her voter ID number is 5534077. Hill Brand, Marsha Lynn was born in 1957 and she registered to vote, giving her address as 18959 E Warren DR # 101, AURORA, Arapahoe County, CO. Her voter ID number is 697663. Hillbrand, Moriah Nicole was born in 1986 and she registered to vote, giving her address as 1681 S Evanston ST, AURORA, Arapahoe County, CO. Her voter ID number is 5794657. Hillbrand, Richard A was born in 1959 and he registered to vote, giving his address as 7836 S Kearney CT, CENTENNIAL, Arapahoe County, CO. His voter ID number is 795622. Hillbrand, Scott Richard was born in 1987 and he registered to vote, giving his address as 7836 S Kearney CT, CENTENNIAL, Arapahoe County, CO. His voter ID number is 200117528. Hill Breen, Sara Louise was born in 1980 and she registered to vote, giving her address as 13801 Kearney ST, THORNTON, Adams County, CO. Her voter ID number is 7006002. Hillbun, David Michael was born in 1997 and he registered to vote, giving his address as 5565 Whiskey River DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601781880. Hillbun, Mindy Marie was born in 1981 and she registered to vote, giving her address as 5812 Walsh PT APT 103, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601656613. Hillburn, Christopher Blake was born in 1986 and he registered to vote, giving his address as 4148 N Clay ST, DENVER, Denver County, CO. His voter ID number is 601532094. Hillburn, Colin Christopher was born in 1989 and he registered to vote, giving his address as 2854 Elm CIR UNIT 7, GRAND JUNCTION, Mesa County, CO. His voter ID number is 601828644. Hillburn, Corey Thell was born in 1989 and he registered to vote, giving his address as 3516 S Depew ST # 101, DENVER, Jefferson County, CO. His voter ID number is 200095540. Hillburn, Xochitl Cerena was born in 1987 and she registered to vote, giving her address as 3516 S Depew ST # 101, DENVER, Jefferson County, CO. Her voter ID number is 4091345. Hill Bustamante, Donna Jean was born in 1947 and she registered to vote, giving her address as 2902 Sandpiper PL, LONGMONT, Boulder County, CO. Her voter ID number is 7949461. Hill-Carroll, Tania Willeen was born in 1979 and she registered to vote, giving her address as 54783 Me RD, COLLBRAN, Mesa County, CO. Her voter ID number is 2368576. Hill-Carter, Sybil Leigh was born in 1965 and she registered to vote, giving her address as 42 Buffalo LN, CARBONDALE, Garfield County, CO. Her voter ID number is 6687931. Hill-Christensen, Madison Taylor was born in 1998 and she registered to vote, giving her address as 14339 Waterside LN, BROOMFIELD, Broomfield County, CO. Her voter ID number is 601534991. Hill-Clark, Lynne E was born in 1977 and she registered to vote, giving her address as 28573 Road M, DOLORES, Montezuma County, CO. Her voter ID number is 4885913. Hill-Cook, Andrea Soo was born in 1978 and she registered to vote, giving her address as 9173 W Finland DR, LITTLETON, Jefferson County, CO. Her voter ID number is 600140709. Hilldale, Lisa Faye was born in 1968 and she registered to vote, giving her address as 651 S Arbutus ST, LAKEWOOD, Jefferson County, CO. Her voter ID number is 3967320. Hilldale, Robert C Iv was born in 1966 and he registered to vote, giving his address as 651 S Arbutus ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 3967319. Hill-Deleon, Xavier Alexander was born in 1990 and he registered to vote, giving his address as 10063 Fairplay ST, COMMERCE CITY, Adams County, CO. His voter ID number is 601000630. Hill-Dikeman, Nicolas Robert was born in 1998 and he registered to vote, giving his address as 421 S Balsam ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 601032507. Hill-Dudley, Krystle Ann was born in 1983 and she registered to vote, giving her address as 10711 Flagler DR, PARKER, Douglas County, CO. Her voter ID number is 600255299. Hille, Ada Jeannette was born in 1962 and she registered to vote, giving her address as 6730 Pahokee CT APT 2, COLO SPRINGS, El Paso County, CO. Her voter ID number is 349746. Hille, April Caroline was born in 1983 and she registered to vote, giving her address as 777 Fifth ST, CASTLE ROCK, Douglas County, CO. Her voter ID number is 601858441. Hille, Ashlee Renee was born in 1984 and she registered to vote, giving her address as 23805 E Powers DR, AURORA, Arapahoe County, CO. Her voter ID number is 600222113. Hille, Barbara Eva was born in 1978 and she registered to vote, giving her address as 1826 Grand AVE, GLENWOOD SPGS, Garfield County, CO. Her voter ID number is 5522037. Hille, Blaine Anthony was born in 1985 and he registered to vote, giving his address as 8415 Pebble Creek WAY # 201, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 600040293. Hille, Carrie Michelle was born in 1976 and she registered to vote, giving her address as 3111 Arroyo Verde CT, CASTLE ROCK, Douglas County, CO. Her voter ID number is 5885621. Hille, Christopher Michael was born in 1978 and he registered to vote, giving his address as 23805 E Powers DR, AURORA, Arapahoe County, CO. His voter ID number is 200076804. Hille, Darren Roger was born in 1978 and he registered to vote, giving his address as 3111 Arroyo Verde CT, CASTLE ROCK, Douglas County, CO. His voter ID number is 5872601. Hille, Irmgard Johanna was born in 1937 and she registered to vote, giving her address as 615 Mountain Meadows RD, BOULDER, Boulder County, CO. Her voter ID number is 8098342. Hille, Juergen H was born in 1937 and he registered to vote, giving his address as 615 Mountain Meadows RD, BOULDER, Boulder County, CO. His voter ID number is 8098343. Hille, Kyle was born in 1996 and registered to vote, giving the address as 685 Zenobia ST, GRAND JUNCTION, Mesa County, CO. Hille’ voter ID number is 601438131. Hille, Leslie Marie was born in 1974 and she registered to vote, giving her address as 4750 W 29Th ST APT 1512, GREELEY, Weld County, CO. Her voter ID number is 601177200. Hille, Logan Dean was born in 1991 and registered to vote, giving the address as 1468 Edgewood CT, FORT COLLINS, Larimer County, CO. Hille’ voter ID number is 601491149. Hille, Marc Robert was born in 1951 and he registered to vote, giving his address as 7130 Suntide PL, COLO SPRINGS, El Paso County, CO. His voter ID number is 601950591. Hille, Marcus Allen was born in 1973 and he registered to vote, giving his address as 667 North ST, BOULDER, Boulder County, CO. His voter ID number is 4952097. Hille, Mark Donald was born in 1975 and he registered to vote, giving his address as 446 All Sky DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 79932. Hille, Mark Thomas was born in 1987 and he registered to vote, giving his address as 11100 E Dartmouth AVE, DENVER, Denver County, CO. His voter ID number is 601296561. Hille, Matthew David was born in 1984 and he registered to vote, giving his address as 594 S Lincoln ST UNIT D, DENVER, Denver County, CO. His voter ID number is 601942333. Hille, Nicole Lynn was born in 1985 and she registered to vote, giving her address as 4650 Quail ST, WHEAT RIDGE, Jefferson County, CO. Her voter ID number is 200085493. Hille, Norlene J was born in 1933 and she registered to vote, giving her address as 37631 County Rd 21, ELIZABETH, Elbert County, CO. Her voter ID number is 569475. Hille, Parker Crowell was born in 1975 and he registered to vote, giving his address as 106 Deer Valley DR, GLENWOOD SPGS, Garfield County, CO. His voter ID number is 5521822. Hille, Peter C was born in 1940 and he registered to vote, giving his address as 343 Park DR, GLENWOOD SPGS, Garfield County, CO. His voter ID number is 5553699. Hille, Peter W was born in 1974 and registered to vote, giving the address as 1934 W 32Nd AVE, DENVER, Denver County, CO. Hille’ voter ID number is 601453661. Hille, Rob Armin was born in 1986 and he registered to vote, giving his address as 510 Chelan ST, GOLDEN, Jefferson County, CO. His voter ID number is 4275896. Hille, Sabrina Rae was born in 1995 and she registered to vote, giving her address as 335 W Davies AVE S, LITTLETON, Arapahoe County, CO. Her voter ID number is 601121860. Hille, Samantha Linley was born in 1988 and she registered to vote, giving her address as 510 Chelan ST, GOLDEN, Jefferson County, CO. Her voter ID number is 876945. Hille, Sheila Nadine was born in 1954 and she registered to vote, giving her address as 3140 Mallard DR APT 105, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601266476. Hille, Stefani Nicole was born in 1977 and she registered to vote, giving her address as 446 All Sky DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 80287. Hilleary, Amber Lynn was born in 1988 and she registered to vote, giving her address as 1045 Sunrise CIR, DACONO, Weld County, CO. Her voter ID number is 600449034. Hilleary, Andrew Robert was born in 1992 and he registered to vote, giving his address as 11262 W 102Nd DR, WESTMINSTER, Jefferson County, CO. His voter ID number is 601708175. Hilleary, Andrew Ryan was born in 1984 and he registered to vote, giving his address as 5231 E Cornell AVE, DENVER, Denver County, CO. His voter ID number is 5932654. Hilleary, Bonnie J was born in 1945 and she registered to vote, giving her address as 1703 Works WAY, MONTROSE, Montrose County, CO. Her voter ID number is 5349119. Hilleary, Craig Campbell Ii was born in 1986 and he registered to vote, giving his address as 183 Sam Houston AVE, PAGOSA SPRINGS, Archuleta County, CO. His voter ID number is 601625006. Hilleary, Donald Price was born in 1944 and he registered to vote, giving his address as 9987 Falcon Creek DR, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5845196. Hilleary, Elizabeth P was born in 1951 and she registered to vote, giving her address as 2627 S Lewiston ST, AURORA, Arapahoe County, CO. Her voter ID number is 720077. Hilleary, Erin Kathleen was born in 1979 and she registered to vote, giving her address as 226 North Fork AVE, PAONIA, Delta County, CO. Her voter ID number is 601654501. Hilleary, Felicia Dawn was born in 1969 and she registered to vote, giving her address as 10013 Westside CIR, LITTLETON, Douglas County, CO. Her voter ID number is 4260453. Hilleary, Hailee Quinn was born in 1992 and she registered to vote, giving her address as 8275 W Ken Caryl PL # A, LITTLETON, Jefferson County, CO. Her voter ID number is 200379561. Hilleary, Hugh W was born in 1929 and he registered to vote, giving his address as 1447 W Maplewood AVE, LITTLETON, Arapahoe County, CO. His voter ID number is 813196. Hilleary, Jeremy Michael was born in 1991 and he registered to vote, giving his address as 9987 Falcon Creek DR, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 200366940. Hilleary, Karmalene Kay was born in 1955 and she registered to vote, giving her address as 9987 Falcon Creek DR, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5780087. Hilleary, Lois Joyce was born in 1928 and she registered to vote, giving her address as 306 W 2Nd ST, JULESBURG, Sedgwick County, CO. Her voter ID number is 2189639. Hilleary, Maria Elizabeth was born in 1979 and she registered to vote, giving her address as 3812 S Evanston ST, AURORA, Arapahoe County, CO. Her voter ID number is 707139. Hilleary, Marion Phyllis was born in 1945 and she registered to vote, giving her address as 312A Grand AVE, PAONIA, Delta County, CO. Her voter ID number is 601639108. Hilleary, Mark Allan was born in 1967 and he registered to vote, giving his address as 30858 Evening Star LN, CONIFER, Jefferson County, CO. His voter ID number is 601562762. Hilleary, Mark Worthington was born in 1962 and he registered to vote, giving his address as 4324 S Cherokee ST, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 7095285. Hilleary, Mary C was born in 1953 and registered to vote, giving the address as 24529 E Arkansas PL, AURORA, Arapahoe County, CO. Hilleary’ voter ID number is 601392507. Hilleary, Patrick M was born in 1951 and he registered to vote, giving his address as 2627 S Lewiston ST, AURORA, Arapahoe County, CO. His voter ID number is 720079. Hilleary, Robyn Sue was born in 1969 and she registered to vote, giving her address as 9054 Bermuda Run CIR, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5913332. Hilleary, Sean Harold was born in 1986 and he registered to vote, giving his address as 1045 Sunrise CIR, DACONO, Weld County, CO. His voter ID number is 601848571. Hilleary, Stephen Maki was born in 1963 and he registered to vote, giving his address as 1010 Marsh Hawk DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 489947. Hilleary, Theresa Colleen was born in 1968 and she registered to vote, giving her address as 2727 Nelson RD APT B101, LONGMONT, Boulder County, CO. Her voter ID number is 8098351. Hilleary, Tristan Maki was born in 1998 and he registered to vote, giving his address as 1010 Marsh Hawk DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601175291. Hilleary, Tylor Kishihiko was born in 1993 and he registered to vote, giving his address as 1010 Marsh Hawk DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 200359930. Hilleboe, John Todd was born in 1969 and he registered to vote, giving his address as 9393 Vista Hill LN, LONE TREE, Douglas County, CO. His voter ID number is 200205641. Hilleboe, Tamara Lee was born in 1969 and she registered to vote, giving her address as 9393 Vista Hill LN, LONE TREE, Douglas County, CO. Her voter ID number is 5757988. Hillebran, Heather Ellen was born in 1993 and she registered to vote, giving her address as 12786 E Pacific DR # 201, AURORA, Arapahoe County, CO. Her voter ID number is 600970940. Hillebrand, Allen Oscar was born in 1942 and he registered to vote, giving his address as 7582 Dusk ST, LITTLETON, Douglas County, CO. His voter ID number is 5763534. Hillebrand, Allen Robert was born in 1940 and he registered to vote, giving his address as 10350 W 101St PL, WESTMINSTER, Jefferson County, CO. His voter ID number is 4567188. Hillebrand, Barbara Sue was born in 1947 and she registered to vote, giving her address as 4935 W 69Th CT, WESTMINSTER, Adams County, CO. Her voter ID number is 677088. Hillebrand, Blake Joseph was born in 1987 and he registered to vote, giving his address as 5720 W 27Th ST, GREELEY, Weld County, CO. His voter ID number is 601141870. Hillebrand, Carol Ann was born in 1967 and she registered to vote, giving her address as 617 E 24Th ST, GREELEY, Weld County, CO. Her voter ID number is 6409397. Hillebrand, Carroll James was born in 1965 and he registered to vote, giving his address as 3950 Colony Hills CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 600303401. Hillebrand, Danielle Mae was born in 1980 and she registered to vote, giving her address as 764 23Rd ST SW, LOVELAND, Larimer County, CO. Her voter ID number is 1408301. Hillebrand, Dee An was born in 1959 and she registered to vote, giving her address as 23784 Shylo DR, PUEBLO, Pueblo County, CO. Her voter ID number is 3031265. Hillebrand, Duane Paul was born in 1967 and he registered to vote, giving his address as 2408 Tremont PL, DENVER, Denver County, CO. His voter ID number is 601071161. Hillebrand, Elizabeth Ann was born in 1984 and she registered to vote, giving her address as 5720 W 27Th ST, GREELEY, Weld County, CO. Her voter ID number is 601144447. Hillebrand, Jackson Robert was born in 1980 and he registered to vote, giving his address as 764 23Rd ST SW, LOVELAND, Larimer County, CO. His voter ID number is 1402574. Hillebrand, Jessica Lee was born in 1979 and she registered to vote, giving her address as 2408 Tremont PL, DENVER, Denver County, CO. Her voter ID number is 601050141. Hillebrand, Karen was born in 1953 and she registered to vote, giving her address as 744 Holland Hills RD, BASALT, Pitkin County, CO. Her voter ID number is 6778192. Hillebrand, Lindsay Anne was born in 1987 and she registered to vote, giving her address as 744 Holland Hills RD, BASALT, Pitkin County, CO. Her voter ID number is 6797192. Hillebrand, Michael J was born in 1966 and he registered to vote, giving his address as 23784 Shylo DR, PUEBLO, Pueblo County, CO. His voter ID number is 8098352. Hillebrand, Richard A was born in 1941 and he registered to vote, giving his address as 4935 W 69Th CT, WESTMINSTER, Adams County, CO. His voter ID number is 7107963. Hillebrand, Robert H was born in 1943 and he registered to vote, giving his address as 744 Holland Hills RD, BASALT, Pitkin County, CO. His voter ID number is 6778193. Hillebrand, Ruth Humphrey was born in 1943 and she registered to vote, giving her address as 7582 Dusk ST, LITTLETON, Douglas County, CO. Her voter ID number is 5664972. Hillebrand, Stephen M was born in 1956 and he registered to vote, giving his address as 7031 Canosa CT, WESTMINSTER, Adams County, CO. His voter ID number is 6836046. Hillebrand, Tasha Joanne was born in 1979 and she registered to vote, giving her address as 10350 W 101St PL, WESTMINSTER, Jefferson County, CO. Her voter ID number is 600483220. Hillebrand, Thomas was born in 1965 and he registered to vote, giving his address as 23784 Shylo DR, PUEBLO, Pueblo County, CO. His voter ID number is 3031725. Hillebrand, Virginia Florence was born in 1938 and she registered to vote, giving her address as 321 E Troutman PKWY # 123, FORT COLLINS, Larimer County, CO. Her voter ID number is 1547785. Hillebrandt, Amanda was born in 1990 and she registered to vote, giving her address as 619 61St Avenue CT, GREELEY, Weld County, CO. Her voter ID number is 600522990. Hillebrandt, Eric Alan was born in 1958 and he registered to vote, giving his address as 3654 Tuscanna GRV, COLO SPRINGS, El Paso County, CO. His voter ID number is 220433. Hillebrandt, Jennifer E was born in 1968 and she registered to vote, giving her address as 28 Escalante ST # 2, CRESTED BUTTE, Gunnison County, CO. Her voter ID number is 5959528. Hillebrandt, Michael Lee was born in 1963 and he registered to vote, giving his address as 7364 Colonial DR, FOUNTAIN, El Paso County, CO. His voter ID number is 480242. Hillebrandt, Michael Lee was born in 1992 and he registered to vote, giving his address as 7364 Colonial DR, FOUNTAIN, El Paso County, CO. His voter ID number is 600522983. Hillebrandt, Peggy B was born in 1958 and she registered to vote, giving her address as 3654 Tuscanna GRV, COLO SPRINGS, El Paso County, CO. Her voter ID number is 220098. Hillebrandt, Ronald Alan was born in 1958 and he registered to vote, giving his address as 3506 E County Line RD # 24, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 4140343. Hillebrandt, Victoria Brooks was born in 1998 and she registered to vote, giving her address as 3654 Tuscanna GRV, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601221611. Hillebrecht, Danielle Michelle was born in 1991 and she registered to vote, giving her address as 5413 Coyote Canyon WAY # C, MORRISON, Jefferson County, CO. Her voter ID number is 600443703. Hillebrecht, Monique Renee was born in 1993 and she registered to vote, giving her address as 5413 Coyote Canyon WAY # C, MORRISON, Jefferson County, CO. Her voter ID number is 601456044. Hill-Ector, Ava Valynn was born in 1963 and she registered to vote, giving her address as 19090 E 22Nd PL, AURORA, Adams County, CO. Her voter ID number is 600194886. Hillegaart, Ronald Alan was born in 1954 and he registered to vote, giving his address as 420 E 50Th ST, LOVELAND, Larimer County, CO. His voter ID number is 1620471. Hillegas, Adelynn Rose was born in 1996 and she registered to vote, giving her address as 9779 Dampler WAY, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 601090156. Hillegas, Barry David was born in 1951 and he registered to vote, giving his address as 6288 S Boston CT, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 775593. Hillegas, Benjamin Michael was born in 2000 and he registered to vote, giving his address as 720 Club CIR, LOUISVILLE, Boulder County, CO. His voter ID number is 601830873. Hillegas, Bergen Sage was born in 1997 and she registered to vote, giving her address as 720 Club CIR, LOUISVILLE, Boulder County, CO. Her voter ID number is 601123762. Hillegas, Catherine F was born in 1944 and she registered to vote, giving her address as 13555 County Road 191, SALIDA, Chaffee County, CO. Her voter ID number is 634786. Hillegas, Daniel John was born in 1980 and he registered to vote, giving his address as 1971 S Vivian ST, LAKEWOOD, Jefferson County, CO. His voter ID number is 4296251. Hillegas, Dorian Elizabeth was born in 1982 and she registered to vote, giving her address as 1971 S Vivian ST, LAKEWOOD, Jefferson County, CO. Her voter ID number is 4296331. Hillegas, Frederick Ralph Jr was born in 1957 and he registered to vote, giving his address as 9779 Dampler WAY, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5763345. Hillegas, Jessica Evelyn was born in 1993 and she registered to vote, giving her address as 3445 Riva Ridge PL # 106, FORT COLLINS, Larimer County, CO. Her voter ID number is 601411230. Hillegas, Karin Lynne was born in 1963 and she registered to vote, giving her address as 720 Club CIR, LOUISVILLE, Boulder County, CO. Her voter ID number is 8098358. Hillegas, Lavonda Kay was born in 1964 and she registered to vote, giving her address as 9779 Dampler WAY, HIGHLANDS RANCH, Douglas County, CO. Her voter ID number is 5838799. Hillegas, Lindsay Marie was born in 1992 and registered to vote, giving the address as 4350 Agate RD, BOULDER, Boulder County, CO. Hillegas’ voter ID number is 601863050. Hillegas, Michael Aaron was born in 1972 and he registered to vote, giving his address as 2759 S Washington ST, ENGLEWOOD, Arapahoe County, CO. His voter ID number is 858524. Hillegas, Perry Steven was born in 1961 and he registered to vote, giving his address as 9779 Dampler WAY, HIGHLANDS RANCH, Douglas County, CO. His voter ID number is 5651904. Hillegas, Robert Lee Iii was born in 1976 and he registered to vote, giving his address as 11092 Raleigh CT, WESTMINSTER, Adams County, CO. His voter ID number is 8842935. Hillegas, Susan G was born in 1951 and she registered to vote, giving her address as 6288 S Boston CT, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 775594. Hillegas, Susan Kay was born in 1970 and she registered to vote, giving her address as 2759 S Washington ST, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 858526. Hillegas, Wayne F was born in 1940 and he registered to vote, giving his address as 13555 County Road 191, SALIDA, Chaffee County, CO. His voter ID number is 634787. Hillegas, Zachary Ryan was born in 1990 and he registered to vote, giving his address as 3445 Riva Ridge PL # H106, FORT COLLINS, Larimer County, CO. His voter ID number is 600233045. Hillegass, Amber Marie was born in 1991 and she registered to vote, giving her address as 6624 Akerman DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601049314. Hillegass, Arthur Charles Iv was born in 1987 and he registered to vote, giving his address as 2516 Norwich AVE, PUEBLO, Pueblo County, CO. His voter ID number is 3037744. Hillegass, Craig Anthony was born in 1954 and he registered to vote, giving his address as 29844 Lee RD, EVERGREEN, Jefferson County, CO. His voter ID number is 4163723. Hillegass, Cynthia Denise was born in 1963 and she registered to vote, giving her address as 29844 Lee RD, EVERGREEN, Jefferson County, CO. Her voter ID number is 4287448. Hillegass, Daniel Earl was born in 1978 and he registered to vote, giving his address as 2090 Poteae CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 600861894. Hillegass, Donald Ray Jr was born in 1985 and he registered to vote, giving his address as 418 Hathaway ST, FAIRPLAY, Park County, CO. His voter ID number is 355707. Hillegass, Freddie W was born in 1950 and he registered to vote, giving his address as 12050 Sand PL, PEYTON, El Paso County, CO. His voter ID number is 601228777. Hillegass, Henry Frederick was born in 1990 and he registered to vote, giving his address as 525 W 9Th ST, PUEBLO, Pueblo County, CO. His voter ID number is 600177703. Hillegass, Joshua David was born in 1980 and he registered to vote, giving his address as 56 Pioneer PL, BRIGHTON, Adams County, CO. His voter ID number is 6808622. Hillegass, Ursula Jane was born in 1981 and she registered to vote, giving her address as 56 Pioneer PL, BRIGHTON, Adams County, CO. Her voter ID number is 6997125. Hillegeist, Emily Allison was born in 1976 and she registered to vote, giving her address as 1700 S Ogden ST, DENVER, Denver County, CO. Her voter ID number is 600689163. Hilleke, Polly Kelly was born in 1977 and she registered to vote, giving her address as 128 River Ridge DR, GLENWOOD SPGS, Garfield County, CO. Her voter ID number is 5522262. Hilleke, Thomas Michael was born in 1977 and he registered to vote, giving his address as 128 River Ridge DR, GLENWOOD SPGS, Garfield County, CO. His voter ID number is 5521199. Hilleman, Betsy Jones was born in 1963 and she registered to vote, giving her address as 1323 Sidewinder CIR, CASTLE ROCK, Douglas County, CO. Her voter ID number is 5839964. Hilleman, Daniel Nelson was born in 1936 and he registered to vote, giving his address as 890 Ryan CT, HOTCHKISS, Delta County, CO. His voter ID number is 1493379. Hilleman, Donna Mae was born in 1940 and she registered to vote, giving her address as 3849 S Atchison WAY, AURORA, Arapahoe County, CO. Her voter ID number is 917664. Hilleman, Erika Leigh was born in 1992 and she registered to vote, giving her address as 535 N Zenobia ST, DENVER, Denver County, CO. Her voter ID number is 601915517. Hilleman, Jonathan Lee was born in 1995 and he registered to vote, giving his address as 5508 Killen AVE, CASTLE ROCK, Douglas County, CO. His voter ID number is 600894195. Hilleman, Joshua Jones was born in 1992 and he registered to vote, giving his address as 193 Apricot WAY, CASTLE ROCK, Douglas County, CO. His voter ID number is 600411071. Hilleman, Leah was born in 1997 and she registered to vote, giving her address as 505 27Th WAY APT 501, BOULDER, Boulder County, CO. Her voter ID number is 601515056. Hilleman, Lee Scott was born in 1961 and he registered to vote, giving his address as 193 Apricot WAY, CASTLE ROCK, Douglas County, CO. His voter ID number is 5691991. Hilleman, Leslie Anne was born in 1959 and she registered to vote, giving her address as 522 Parkview CT, GOLDEN, Jefferson County, CO. Her voter ID number is 4053779. Hilleman, Shanne C was born in 1943 and she registered to vote, giving her address as 106 S Bryan AVE # 10, FORT COLLINS, Larimer County, CO. Her voter ID number is 6809940. Hilleman, Tonya Jean was born in 1966 and she registered to vote, giving her address as 4 Madden AVE, JOHNSTOWN, Weld County, CO. Her voter ID number is 1425078. Hill-Emerson, Jennifer Ellen was born in 1952 and she registered to vote, giving her address as 2117 Denton GRV # 202, COLO SPRINGS, El Paso County, CO. Her voter ID number is 139295. Hillemeyer, Cindi Lyn was born in 1971 and she registered to vote, giving her address as 535 Pamela LN, STEAMBOAT SPRINGS, Routt County, CO. Her voter ID number is 600660204. Hillen, Adam Stephen was born in 1985 and he registered to vote, giving his address as 6801 S County Rd 157, STRASBURG, Arapahoe County, CO. His voter ID number is 601429411. Hillen, Alicia Ann was born in 1962 and she registered to vote, giving her address as 4172 Pebble Beach DR, LONGMONT, Boulder County, CO. Her voter ID number is 8100858. Hillen, Anna Lee was born in 1975 and she registered to vote, giving her address as 262 Terrace CT, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2287201. Hillen, Betty Jane was born in 1959 and she registered to vote, giving her address as 7312 S Moore CT, LITTLETON, Jefferson County, CO. Her voter ID number is 4128535. Hillen, Candice Rae was born in 1989 and she registered to vote, giving her address as 2408 Strickler RD, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600183387. Hillen, Charles Leroy was born in 1932 and he registered to vote, giving his address as 14152 E Linvale PL # 509, AURORA, Arapahoe County, CO. His voter ID number is 8528704. Hillen, Christopher A was born in 1961 and he registered to vote, giving his address as 3419 S Fairfax ST, DENVER, Denver County, CO. His voter ID number is 2512717.
2019-04-25T06:10:50Z
http://coloradovoters.info/by_name/pages/h10411.html
A method is presented that may be used to provide a Configurable Logic device, which may be Field Programmable with volume flexibility. A method of fabricating an integrated circuit may include the steps of: providing a semiconductor substrate and forming a borderless logic array, and it may also include the step of forming a plurality of antifuse configurable interconnect circuits and/or a plurality of transistors to configure at least one antifuse. The programming transistors may be fabricated over the at least one antifuse. This application is a continuation-in-part (CIP) application of U.S. patent application Ser. No. 12/423,214, filed Apr. 14, 2009, the entire contents of which are hereby incorporated by reference. Various embodiments of the present invention may relate to configurable logic arrays and/or fabrication methods for a Field Programmable Logic Array—FPGA. Semiconductor manufacturing is known to improve device density in exponential manner over time, but such improvements do come with a price. The mask set cost required for each new process technology has been increasing exponentially. So while 20 years ago a mask set cost less than $20,000 it is now quite common to be charged more than $1M for today's state of the art device mask set. These changes represent an increasing challenge primarily to custom products, which tend to target smaller volume and less diverse markets therefore making the increased cost of product development very hard to accommodate. Custom Integrated Circuits can be segmented into two groups. The first group includes devices that have all their layers custom made. The second group includes devices that have at least some generic layers used across different custom products. Well-known examples of the second kind are Gate Arrays, which use generic layers for all layers up to contact layer, and FPGAs, which utilize generic layers for all of their layers. The generic layers in such devices are mostly a repeating pattern structure in array form. The logic array technology is based on a generic fabric that is customized for a specific design during the customization stage. For an FPGA the customization is done through programming by electrical signals. For Gate Arrays, which in their modern form are sometimes called Structured ASICs, the customization is by at least one custom layer, which might be done with Direct Write eBeam or with a custom mask. As designs tend to be highly variable in the amount of logic and memory and type of I/O each one needs, vendors of logic arrays create product families with a number of Master Slices covering a range of logic, memory size and I/O options. Yet, it is always a challenge to come up with minimum set of Master Slices that will provide a good fit for the maximal number of designs because it is quite costly if a dedicated mask set is required for each Master Slice. U.S. Pat. No. 4,733,288 issued to Sato Shinji Sato in March 1988, discloses a method “to provide a gate-array LSI chip which can be cut into a plurality of chips, each of the chips having a desired size and a desired number of gates in accordance with a circuit design.” The prior art in the references cited present few alternative methods to utilize a generic structure for different sizes of custom devices. The array structure fits the objective of variable sizing. The difficulty to provide variable-sized array structure devices is due to the need of providing I/O cells and associated pads to connect the device to the package. To overcome this limitation Sato suggests a method where I/O could be constructed from the transistors that are also used for the general logic gates. Anderson also suggested a similar approach. U.S. Pat. No. 5,217,916 issued to Anderson et al. on Jun. 8, 1993, discloses a configurable gate array free of predefined boundaries—borderless—using transistor gate cells, of the same type of cells used for logic, to serve the input and output function. Accordingly, the input and output functions may be placed to surround the logic array sized for the specific application. This method places a severe limitation on the I/O cell to use the same type of transistors as used for the logic and; hence, would not allow the use of higher operating voltages for the I/O. U.S. Pat. No. 7,105,871 issued to Or-Bach, et al. Sep. 12, 2006, discloses a semiconductor device that includes a borderless logic array and area I/Os. The logic array may comprise a repeating core, and at least one of the area I/Os may be a configurable I/O. In the past it was reasonable to design an I/O cell that could be configured to the various needs of most customers. The ever increasing need of higher data transfer rate in and out of the device drove the development of special I/O circuits called SerDes. These circuits are complex and require a far larger silicon area than conventional I/Os. Consequently, the variations needed are combinations of various amounts of logic, various amounts and types of memories, and various amounts and types of I/O. This implies that even the use of the borderless logic array of the prior art will still require multiple expensive mask sets. The most common FPGAs in the market today are based on SRAM as the programming element. Floating-Gate Flash programmable elements are also utilized to some extent. Less commonly, FPGAs use an antifuse as the programming element. The first generation of antifuse FPGAs used antifuses that were built directly in contact with the silicon substrate itself. The second generation moved the antifuse to the metal layers to utilize what is called the Metal to Metal Antifuse. These antifuses function like vias. However, unlike vias that are made with the same metal that is used for the interconnection, these antifuses generally use amorphous silicon and some additional interface layers. While in theory antifuse technology could support a higher density than SRAM, the SRAM FPGAs are dominating the market today. In fact, it seems that no one is advancing Antifuse FPGA devices anymore. One of the severe disadvantages of antifuse technology has been their lack of re-programmability. Another disadvantage has been the special silicon manufacturing process required for the antifuse technology which results in extra development costs and the associated time lag with respect to baseline IC technology scaling. The general disadvantage of common FPGA technologies is their relatively poor use of silicon area. While the end customer only cares to have the device perform his desired function, the need to program the FPGA to any function requires the use of a very significant portion of the silicon area for the programming and programming check functions. Some embodiments of the current invention seek to overcome the prior-art limitations and provide some additional benefits by making use of special types of transistors that are fabricated above the antifuse configurable interconnect circuits and thereby allow far better use of the silicon area. One type of such transistors is commonly known in the art as Thin Film Transistors or TFT. Thin Film Transistors has been proposed and used for over three decades. One of the better-known usages has been for displays where the TFT are fabricated on top of the glass used for the display. Other type of transistors that could be fabricated above the antifuse configurable interconnect circuits are called Vacuum FET and was introduced three decades ago such as in U.S. Pat. No. 4,721,885. Other techniques could also be used such as an SOI approach. In U.S. Pat. Nos. 6,355,501 and 6,821,826, both assigned to IBM, a multilayer three-dimensional—3D—CMOS Integrated Circuit is proposed. It suggests bonding an additional thin SOI wafer on top of another SOI wafer forming an integrated circuit on top of another integrated circuit and connecting them by the use of a through-silicon-via. Substrate supplier Soitec SA, Bernin, France is now offering a technology for stacking of a thin layer of a processed wafer on top of a base wafer. Integrating top layer transistors above an insulation layer is not common in an IC because the base layer of crystallized silicon is ideal to provide high density and high quality transistors, and hence preferable. There are some applications where it was suggested to build memory cells using such transistors as in U.S. Pat. Nos. 6,815,781, 7,446,563 and a portion of an SRAM based FPGA such as in U.S. Pat. Nos. 6,515,511 and 7,265,421. Embodiments of the current invention seek to take advantage of the top layer transistor to provide a much higher density antifuse-base programmable logic. An additional advantage for such use will be the option to further reduce cost in high volume production by utilizing custom mask(s) to replace the antifuse function, thereby eliminating the top layer(s) anti-fuse programming logic altogether. Embodiments of the present invention seek to provide a new method for semiconductor device fabrication that may be highly desirable for custom products. Embodiments of the current invention suggest the use of a Re-programmable antifuse in conjunction with ‘Through Silicon Via’ to construct a new type of configurable logic, or as usually called, FPGA devices. Embodiments of the current invention may provide a solution to the challenge of high mask-set cost and low flexibility that exists in the current common methods of semiconductor fabrication. An additional advantage of some embodiments of the invention is that it could reduce the high cost of manufacturing the many different mask sets required in order to provide a commercially viable range of master slices. Embodiments of the current invention may improve upon the prior art in many respects, which may include the way the semiconductor device is structured and methods related to the fabrication of semiconductor devices. Embodiments of the current invention reflect the motivation to save on the cost of masks with respect to the investment that would otherwise have been required to put in place a commercially viable set of master slices. Embodiments of the current invention also seek to provide the ability to incorporate various types of memory blocks in the configurable device. Embodiments of the current invention provide a method to construct a configurable device with the desired amount of logic, memory, I/Os, and analog functions. In addition, embodiments of the current invention allow the use of repeating logic tiles that provide a continuous terrain of logic. Embodiments of the current invention show that with Through-Silicon-Via (TSV) a modular approach could be used to construct various configurable systems. Once a standard size and location of TSV has been defined one could build various configurable logic dies, configurable memory dies, configurable I/O dies and configurable analog dies which could be connected together to construct various configurable systems. In fact it may allow mix and match between configurable dies, fixed function dies, and dies manufactured in different processes. Embodiments of the current invention seek to provide additional benefits by making use of special type of transistors that are placed above the antifuse configurable interconnect circuits and thereby allow a far better use of the silicon area. In general an FPGA device that utilizes antifuses to configure the device function may include the electronic circuits to program the antifuses. The programming circuits may be used primarily to configure the device and are mostly an overhead once the device is configured. The programming voltage used to program the antifuse may typically be significantly higher than the voltage used for the operating circuits of the device. The design of the antifuse structure may be designed such that an unused antifuse will not accidentally get fused. Accordingly, the incorporation of the antifuse programming in the silicon substrate may require special attention for this higher voltage, and additional silicon area may, accordingly, be required. Unlike the operating transistors that are desired to operate as fast as possible, to enable fast system performance, the programming circuits could operate relatively slowly. Accordingly using a thin film transistor for the programming circuits could fit very well with the required function and would reduce the required silicon area. The programming circuits may, therefore, be constructed with thin film transistors, which may be fabricated after the fabrication of the operating circuitry, on top of the configurable interconnection layers that incorporate and use the antifuses. An additional advantage of such embodiments of the invention is the ability to reduce cost of the high volume production. One may only need to use mask-defined links instead of the antifuses and their programming circuits. This will in most cases require one custom via mask, and this may save steps associated with the fabrication of the antifuse layers, the thin film transistors, and/or the associated connection layers of the programming circuitry. In accordance with an embodiment of the present invention an Integrated Circuit device is thus provided, comprising; a plurality of antifuse configurable interconnect circuits and plurality of transistors to configure at least one of said antifuse; wherein said transistors are fabricated after said antifuse. Further provided in accordance with an embodiment of the present invention is an Integrated Circuit device comprising; a plurality of antifuse configurable interconnect circuits and plurality of transistors to configure at least one of said antifuse; wherein said transistors are placed over said antifuse. Still further in accordance with an embodiment of the present invention the Integrated Circuit device comprises second antifuse configurable logic cells and plurality of second transistors to configure said second antifuse wherein these second transistors are fabricated before said second antifuse. Still further in accordance with an embodiment of the present invention the Integrated Circuit device comprises also second antifuse configurable logic cells and a plurality of second transistors to configure said second antifuse wherein said second transistors are placed underneath said second antifuse. Further provided in accordance with an embodiment of the present invention is an Integrated Circuit device comprising; first antifuse layer, at least two metal layers over it and a second antifuse layer over this two metal layers. In accordance with an embodiment of the present invention a configurable logic device is presented, comprising: antifuse configurable look up table logic interconnected by antifuse configurable interconnect. In accordance with an embodiment of the present invention a configurable logic device is also provided, comprising: plurality of configurable look up table logic, plurality of configurable PLA logic, and plurality of antifuse configurable interconnect. In accordance with an embodiment of the present invention a configurable logic device is also provided, comprising: plurality of configurable look up table logic and plurality of configurable drive cells wherein the drive cells are configured by plurality of antifuses. In accordance with an embodiment of the present invention a configurable logic device is additionally provided, comprising: configurable logic cells interconnected by a plurality of antifuse configurable interconnect circuits wherein at least one of the antifuse configurable interconnect circuits is configured as part of a non volatile memory. Further in accordance with an embodiment of the present invention the configurable logic device comprises at least one antifuse configurable interconnect circuit, which is also configurable to a PLA function. In accordance with an alternative embodiment of the present invention an integrated circuit system is also provided, comprising a configurable logic die and an I/O die wherein the configurable logic die is connected to the I/O die by the use of Through-Silicon-Via. Further in accordance with an embodiment of the present invention the integrated circuit system comprises; a configurable logic die and a memory die wherein these dies are connected by the use of Through-Silicon-Via. Still further in accordance with an embodiment of the present invention the integrated circuit system comprises a first configurable logic die and second configurable logic die wherein the first configurable logic die and the second configurable logic die are connected by the use of Through-Silicon-Via. Moreover in accordance with an embodiment of the present invention the integrated circuit system comprises an I/O die that was fabricated utilizing a different process than the process utilized to fabricate the configurable logic die. Further in accordance with an embodiment of the present invention the integrated circuit system comprises at least two logic dice connected by the use of Through-Silicon-Via and wherein some of the Through-Silicon-Vias are utilized to carry the system bus signal. Moreover in accordance with an embodiment of the present invention the integrated circuit system comprises at least one configurable logic device. Further in accordance with an embodiment of the present invention the integrated circuit system comprises, an antifuse configurable logic die and programmer die and these dies are connected by the use of Through-Silicon-Via. and FIG. 28A-28E are drawing illustrations of formation of top transistors. Embodiments of the present invention are now described with reference to FIGS. 1-13, it being appreciated that the figures illustrate the subject matter not to scale or to measure. FIG. 1 illustrates a circuit diagram illustration of a prior art, where, for example, 860-1 to 860-4 are the programming transistors to program antifuse 850-1,1. FIG. 2 is a cross-section illustration of a portion of a prior art represented by the circuit diagram of FIG. 1 showing the programming transistor 860-1 built as part of the silicon substrate. FIG. 3A is a drawing illustration of a programmable interconnect tile. 310-1 is one of 4 horizontal metal strips, which form a band of strips. The typical IC today has many metal layers. In a typical programmable device the first two or three metal layers will be used to construct the logic elements. On top of them metal 4 to metal 7 will be used to construct the interconnection of those logic elements. In an FPGA device the logic elements are programmable, as well as the interconnects between the logic elements. The configurable interconnect of the current invention is constructed from 4 metal layers or more. For example, metal 4 and 5 could be used for long strips and metal 6 and 7 would comprise short strips. Typically the strips forming the programmable interconnect have mostly the same length and are oriented in the same direction, forming a parallel band of strips as 310-1, 310-2, 310-3 and 310-4. Typically one band will comprise 10 to 40 strips. Typically the strips of the following layer will be oriented perpendicularly as illustrated in FIG. 3A, wherein strips 310 are of metal 6 and strips 308 are of metal 7. In this example the dielectric between metal 6 and metal 7 comprises antifuse positions at the crossings between the strips of metal 6 and metal 7. Tile 300 comprises 16 such antifuses. 312-1 is the antifuse at the cross of strip 310-4 and 308-4. If activated it will connect strip 310-4 with strip 308-4. FIG. 3A was made simplified, as the typical tile will comprise 10-40 strips in each layer and multiplicity of such tiles, which comprises the antifuse configurable interconnect structure. 304 is one of the Y programming transistors connected to strip 310-1. 318 is one of the X programming transistors connected to strip 308-4. 302 is the Y select logic which at the programming phase allows the selection of a Y programming transistor. 316 is the X select logic which at the programming phase allows the selection of an X programming transistor. Once 304 and 318 are selected the programming voltage 306 will be applied to strip 310-1 while strip 308-4 will be grounded causing the antifuse 312-4 to be activated. FIG. 3B is a drawing illustration of a programmable interconnect structure 300B. 300B is variation of 300A wherein some strips in the band are of a different length. Instead of strip 308-4 in this variation there are two shorter strips 308-4B1 and 308-4B2. This might be useful for bringing signals in or out of the programmable interconnect structure 300B in order to reduce the number of strips in the tile, that are dedicated to bringing signals in and out of the interconnect structure versus strips that are available to perform the routing. In such variation the programming circuit needs to be augmented to support the programming of antifuses 312-3B and 312-4B. Unlike the prior art, various embodiments of the current invention suggest constructing the programming transistors not in the base silicon diffusion layer but rather above the antifuse configurable interconnect circuits. The programming voltage used to program the antifuse is typically significantly higher than the voltage used for the operational circuits of the device. This is part of the design of the antifuse structure so that the antifuse will not become accidentally activated. In addition, extra attention, design effort, and silicon resources might be needed to make sure that the programming phase will not damage the operating circuits. Accordingly the incorporation of the antifuse programming transistors in the silicon substrate may require attention and extra silicon area. Unlike the operational transistors that are desired to operate as fast as possible and so to enable fast system performance, the programming circuits could operate relatively slowly. Accordingly, a thin film transistor for the programming circuits could fit the required function and could reduce the require silicon area. Alternatively other type of transistors, such as Vacuum FET, bipolar, etc., could be used for the programming circuits and be placed not in the base silicon but rather above the antifuse configurable interconnect. Yet in another alternative the programming transistors and the programming circuits could be fabricated on SOI wafers which may then be bonded to the configurable logic wafer and connected to it by the use of through-silicon-via. An advantage of using an SOI wafer for the antifuse programming function is that the high voltage transistors that could be built on it are very efficient and could be used for the programming circuit including support function such as the programming controller function. Yet as an additional variation, the programming circuits could be fabricated on an older process on SOI wafers to further reduce cost. Or some other process technology and/or wafer fab located anywhere in the world. Also there are advanced technologies to deposit silicon or other semiconductors layers that could be integrated on top of the antifuse configurable interconnect for the construction of the antifuse programming circuit. As an example, a recent technology proposed the use of a plasma gun to spray semiconductor grade silicon to form semiconductor structures including, for example, a p-n junction. The sprayed silicon may be doped to the respective semiconductor type. In addition there are more and more techniques to use graphene and Carbon Nano Tubes (CNT) to perform a semiconductor function. For the purpose of this invention we will use the term “Thin-Film-Transistors” as general name for all those technologies, as well as any similar technologies, known or yet to be discovered. A common objective is to reduce cost for high volume production without redesign and with minimal additional mask cost. The use of thin-film-transistors, for the programming transistors, enables a relatively simple and direct volume cost reduction. Instead of embedding antifuses in the isolation layer a custom mask could be used to define vias on all the locations that used to have their respective antifuse activated. Accordingly the same connection between the strips that used to be programmed is now connected by fixed vias. This may allow saving the cost associated with the fabrication of the antifuse programming layers and their programming circuits. It should be noted that there might be differences between the antifuse resistance and the mask defined via resistance. A conventional way to handle it is by providing the simulation modules for both options so the designer could validate that the design will work properly in both cases. An additional objective for having the programming circuits above the antifuse layer is to achieve better circuit density. Many connections are needed to connect the programming transistors to their respective metal strips. If those connections are going upward they could reduce the circuit overhead by not blocking interconnection routes on the connection layers underneath. While FIG. 3A shows an interconnection structure of 4×4 strips, the typical interconnection structure will have far more strips and in many cases more than 20×30. For a 20×30 tile there is needed about 20 to 30 programming transistors. The 20×30 tile area is about 20 hp×30 vp when ‘hp’ is the horizontal pitch and ‘vp’ is the vertical pitch. This may result in a relatively large area for the programming transistor of about 12 hp×vp. Additionally, the area available for each connection between the programming layer and the programmable interconnection fabric needs to be handled. Accordingly, one or two redistribution layers might be needed in order to redistribute the connection within the available area and then bring those connections down, preferably aligned so to create minimum blockage as they are routed to the underlying strip 310 of the programmable interconnection structure. FIG. 4A is a drawing illustration of a programmable interconnect tile 300 and another programmable interface tile 320. As a higher silicon density is achieved it becomes desirable to construct the configurable interconnect in the most compact fashion. FIG. 4B is a drawing illustration of a programmable interconnect of 2×2 tiles. It comprises checkerboard style of tiles 300 and tiles 320 which is a tile 300 rotated by 90 degrees. For a signal to travel South to North, south to north strips need to be connected with antifuses such as 406. 406 and 410 are antifuses that are positioned at the end of a strip to allow it to connect to another strip in the same direction. The signal traveling from South to North is alternating from metal 6 to metal 7. Once the direction needs to change, an antifuse such as 312-1 is used. The configurable interconnection structure function may be used to interconnect the output of logic cells to the input of logic cells to construct the desired semi-custom logic. The logic cells themselves are constructed by utilizing the first few metal layers to connect transistors that are built in the silicon substrate. Usually the metal 1 layer and metal 2 layer are used for the construction of the logic cells. Sometimes it is effective to also use metal 3 or a part of it. FIG. 5A is a drawing illustration of inverter 504 with an input 502 and an output 506. An inverter is the simplest logic cell. The input 502 and the output 506 might be connected to strips in the configurable interconnection structure. FIG. 5B is a drawing illustration of a buffer 514 with an input 512 and an output 516. The input 512 and the output 516 might be connected to strips in the configurable interconnection structure. FIG. 5C is a drawing illustration of a configurable strength buffer 524 with an input 522 and an output 526. The input 522 and the output 526 might be connected to strips in the configurable interconnection structure. 524 is configurable by means of antifuses 528-1, 528-2 and 528-3 constructing an antifuse configurable drive cell. FIG. 5D is a drawing illustration of D-Flip Flop 534 with inputs 532-2, and output 536 with control inputs 532-1, 532-3, 532-4 and 532-5. The control signals could be connected to the configurable interconnects or to local or global control signals. FIG. 6 is a drawing illustration of a LUT 4. LUT4 604 is a well-known logic element in the FPGA art called a 4 bit Look-Up-Table or in short LUT4. It has 4 inputs 602-1, 602-2, 602-3 and 602-4. It has an output 606. In general a LUT4 can programmed to perform any logic function of 4 inputs. The LUT function of FIG. 6 may be implemented by a maximum of (depopulation algos) 32 antifuses such as 608-1. 604-5 is a two to one multiplexer. The common way to implement a LUT4 in FPGA is by using 16 SRAM bit-cells and 15 multiplexers. The illustration of FIG. 6 demonstrates an antifuse configurable look up table implementation of a LUT4 by 32 antifuses and 7 multiplexers. FIG. 6A is a drawing illustration of a PLA logic cell 6A00. This used to be the most popular programmable logic primitive until LUT logic took the leadership. Other acronyms used for this type of logic are PLD and PAL. 6A01 is one of the antifuses that enables the selection of the signal fed to the multi-input AND 6A14. In this drawing any cross between vertical line and horizontal line comprises an antifuse to allow the connection to be made according to the desired end function. The large AND cell 6A14 constructs the product term by performing the AND function on the selection of inputs 6A02 or their inverted replicas. A multi-input OR 6A15 performs the OR function on a selection of those product terms to construct an output 6A06. FIG. 6A illustrates an antifuse configurable PLA logic. The logic cells presented in FIG. 5, FIG. 6 and FIG. 6A are just representatives. There exist many options for construction of programmable logic fabric including additional logic cells such as AND, MUX and many others, and variations on those cells. Also, in the construction of the logic fabric there might be variation with respect to which of their inputs and outputs are connected by the configurable interconnect fabric and which are connected directly in a non-configurable way. FIG. 7 is a drawing illustration of a programmable cell 700. By tiling such cells a programmable fabric is constructed. The tiling could be of the same cell being repeated over and over to form a homogenous fabric. Alternatively, a blend of different cells could be tiled for heterogeneous fabric. The logic cell 700 could be any of those presented in FIGS. 5 and 6, a mix and match of them or other primitives as discussed before. The logic cell 710 inputs 702 and output 706 are connected to the configurable interconnection fabric 720 with input and output strips 708 with associated antifuses 701. The short interconnects 722 are comprising metal strips that are the length of the tile, they comprise horizontal strips 722H, on one metal layer and vertical strips 722V on another layer, with antifuse 701HV in the cross between them, to allow selectively connecting horizontal strip to vertical strip. The connection of a horizontal strip to another horizontal strip is with antifuse 701HH that functions like antifuse 410 of FIG. 4. The connection of a vertical strip to another vertical strip is with antifuse 701VV that functions like fuse 406 of FIG. 4. The long horizontal strips 724 are used to route signals that travel a longer distance, usually the length of 8 or more tiles. Usually one strip of the long bundle will have a selective connection by antifuse 724LH to the short strips, and similarly, for the vertical long strips 724. FIG. 7 illustrates the programmable cell 700 as a two dimensional illustration. In real life 700 is a three dimensional construct where the logic cell 710 utilizes the base silicon with Metal 1, Metal 2, and some times Metal 3. The programmable interconnect fabric including the associated antifuses will be constructed on top of it. FIG. 8 is a drawing illustration of a programmable device layers structure according to an alternative of the current invention. In this alternative there are two layers comprising antifuses. The first is designated to configure the logic terrain and, in some cases, to also configure the logic clock distribution. The first antifuse layer could also be used to manage some of the power distribution to save power by not providing power to unused circuits. This layer could also be used to connect some of the long routing tracks and/or connections to the inputs and outputs of the logic cells. The device fabrication of the example shown in FIG. 8 starts with the semiconductor substrate 802 comprising the transistors used for the logic cells and also the first antifuse layer programming transistors. Then comes layers 804 comprising Metal 1, dielectric, Metal 2, and sometimes Metal 3. These layers are used to construct the logic cells and often I/O and other analog cells. In this alternative of the current invention a plurality of first antifuses are incorporated in the isolation layer between metal 1 and metal 2 or in the isolation layer between metal 2 and metal 3 and their programming transistors could be embedded in the silicon substrate 802 being underneath the first antifuses. These first antifuses could be used to program logic cells such as 520, 600 and 700 and to connect individual cells to construct larger logic functions. These first antifuses could also be used to configure the logic clock distribution. The first antifuse layer could also be used to manage some of the power distribution to save power by not providing power to unused circuits. This layer could also be used to connect some of the long routing tracks and/or one or more connections to the inputs and outputs of the cells. The following few layers 806 could comprise long interconnection tracks for power distribution and clock networks, or a portion of these, in addition to what was fabricated in the first few layers 804. The following few layers 808 could comprise the antifuse configurable interconnection fabric. It might be called the short interconnection fabric, too. If metal 6 and metal 7 are used for the strips of this configurable interconnection fabric then the second antifuse may be embedded in the dielectric layer between metal 6 and metal 7. The programming transistors and the other parts of the programming circuit could be fabricated afterward and be on top of the configurable interconnection fabric 810. The programming element could be a thin film transistor or other alternatives for over oxide transistors as was mentioned previously. In such case the antifuse programming transistors are placed over the antifuse layer, which may thereby enable the configurable interconnect 808 or 804. It should be noted that in some cases it might be useful to construct part of the control logic for the second antifuse programming circuits, in the base layers 802 and 804. The final step is the connection to the outside 812. These could be pads for wire bonding, soldering balls for flip chip, optical, or other connection structures such as those required for TSV. In another alternative of the current invention the antifuse programmable interconnect structure could be designed for multiple use. The same structure could be used as a part of the interconnection fabric, or as a part of the PLA logic cell, or as part of a ROM function. In an FPGA product it might be desirable to have an element that could be used for multiple purposes. Having resources that could be used for multiple functions could increase the utility of the FPGA device. FIG. 8A is a drawing illustration of a programmable device layers structure according to another alternative of the current invention. In this alternative there is additional circuit 814 connected by Through-Silicon-Via 816 to the first antifuse layer 804. This underlying device is providing the programming transistor for the first antifuse layer 804. In this way, the programmable device substrate diffusion layer 816 does not suffer the cost penalty of the programming transistors required for the first antifuse layer 804. Accordingly the programming connection of the first antifuse layer will be directed downward to connect to the underlying programming device 814 while the programming connection to the second antifuse layer will be directed upward to connect to the programming circuits 810. This could provide less congestion of the circuit internal interconnection routes. An alternative technology for such underlying circuitry is to use the “SmartCut” process. The “SmartCut” process is a well understood technology used for fabrication of SOI wafers. The “SmartCut” process, together with wafer bonding technology, enables a “Layer Transfer” whereby a thin layer of a silicon wafer is transferred from one wafer to another wafer. The “Layer Transfer” could be done at less than 400° C. and the resultant transferred layer could be even less than 100 nm thick. The process is commercially available by two companies—Soitec, Crolles, France and SiGen—Silicon Genesis Corporation, San Jose, Calif. FIG. 14 is a drawing illustration of a layer transfer process flow. In another alternative of the invention, “Layer-Transfer” is used for construction of the underlying circuitry 814. 1402 is a wafer that was processed to construct the underlying circuitry. The wafer 1402 could be of the most advanced process or more likely a few generations behind. It could comprise the programming circuits 814 and other useful structures. An oxide layer 1412 is then deposited on top of the wafer 1402 and then is polished for better planarization and surface preparation. A donor wafer 1406 is then brought in to be bonded to 1402. The surfaces of both donor wafer 1406 and wafer 1402 may have a plasma pretreatment to enhance the bond strength. The donor wafer 1406 is pre-prepared for “SmartCut” by an ion implant of H+ ions at the desired depth to prepare the SmartCut line 1408. After bonding the two wafers a SmartCut step is performed to cleave and remove the top portion 1414 of the donor wafer 1406 along the cut layer 1408. The result is a 3D wafer 1410 which comprises wafer 1402 with an added layer 1404 of crystallized silicon. Layer 1404 could be quite thin at the range of 50-200 nm as desired. The described flow is called “layer transfer”. Layer transfer is commonly utilized in the fabrication of SOI—Silicon On Insulator—wafers. For SOI wafers the upper surface is oxidized so that after “layer transfer” a buried oxide—BOX—provides isolation between the top thin crystallized silicon layer and the bulk of the wafer. Now that a “layer transfer” process is used to bond a thin crystallized silicon layer 1404 on top of the preprocessed wafer 1402, a standard process could ensue to construct the rest of the desired circuits as is illustrated in FIG. 8A, starting with layer 802 on the transferred layer 1404. The lithography step will use alignment marks on wafer 1402 so the following circuits 802 and 816 and so forth could be properly connected to the underlying circuits 814. An important aspect that should be accounted for is the high temperature that would be needed for the processing of circuits 802. The pre-processed circuits on wafer 1402 would need to withstand this high temperature needed for the activation of the semiconductor transistors 802 fabricated on the 1404 layer. Those foundation circuits on wafer 1402 will comprise transistors and local interconnects of poly-silicon and some other type of interconnection that could withstand high temperature such as tungsten. An important advantage of using layer transfer for the construction of the underlying circuits is having the layer transferred 1404 be very thin which enables the through silicon via connections 816 to have low aspect ratios and be more like normal contacts, which could be made very small and with minimum area penalty. The thin transferred layer also allows conventional direct thru-layer alignment techniques to be performed, thus increasing the density of silicon via connections 816. FIG. 15 is a drawing illustration of an underlying programming circuit. Programming Transistors 1501 and 1502 are pre-fabricated on the foundation wafer 1402 and then the programmable logic circuits and the antifuse 1504 are built on the transferred layer 1404. The programming connections 1506, 1508 are connected to the programming transistors by contact holes through layer 1404 as illustrated in FIG. 8A by 816. The programming transistors are designed to withstand the relatively higher programming voltage required for the antifuse 1504 programming. FIG. 16 is a drawing illustration of an underlying isolation transistor circuit. The higher voltage used to program the antifuse 1604 might damage the logic transistors 1606, 1608. To protect the logic circuits, isolation transistors 1601, 1602, which are designed to withstand higher voltage, are used. The higher programming voltage is only used at the programming phase at which time the isolation transistors are turned off by the control circuit 1603. The underlying wafer 1402 could also be used to carry the isolation transistors. Having the relatively large programming transistors and isolation transistor on the foundation silicon 1402 allows far better use of the primary silicon 802 (1404). Usually the primary silicon will be built in an advanced process to provide high density and performance. The foundation silicon could be built in a less advanced process to reduce costs and support the higher voltage transistors. It could also be built with other than CMOS transistors such as DMOS or bi-polar when such is advantageous for the programming and the isolation function. In many cases there is a need to have protection diodes for the gate input that are called Antennas. Such protection diodes could be also effectively integrated in the foundation alongside the input related Isolation Transistors. On the other hand the isolation transistors 1601, 1602 would provide the protection for the antenna effect so no additional diodes would be needed. An additional alternative of the invention the foundation layer 1402 is pre-processed to carry a plurality of back bias voltage generators. A known challenge in advanced semiconductor logic devices is die-to-die and within-a-die parameter variations. Various sites within the die might have different electrical characteristics due to dopant variations and such. The most critical of these parameters that affect the variation is the threshold voltage of the transistor. Threshold voltage variability across the die is mainly due to channel dopant, gate dielectric, and critical dimension variability. This variation becomes profound in sub 45 nm node devices. The usual implication is that the design must be done for the worst case, resulting in a quite significant performance penalty. Alternatively complete new designs of devices are being proposed to solve this variability problem with significant uncertainty in yield and cost. A possible solution is to use localized back bias to drive upward the performance of the worst zones and allow better overall performance with minimal additional power. The foundation-located back bias could also be used to minimize leakage due to process variation. FIG. 17A is a topology drawing illustration of back bias circuitry. The foundation layer 1402 carries back bias circuits 1711 to allow enhancing the performance of some of the zones 1710 on the primary device which otherwise will have lower performance. FIG. 17B is a drawing illustration of back bias circuits. A back bias level control circuit 1720 is controlling the oscillators 1727 and 1729 to drive the voltage generators 1721. The negative voltage generator 1725 will generate the desired negative bias which will be connected to the primary circuit by connection 1723 to back bias the NMOS transistors 1732 on the primary silicon 1404. The positive voltage generator 1726 will generate the desired negative bias which will be connected to the primary circuit by connection 1724 to back bias the PMOS transistors 1724 on the primary silicon 1404. The setting of the proper back bias level per zone will be done in the initiation phase. It could be done by using external tester and controller or by on-chip self test circuitry. Preferably a non volatile memory will be used to store the per zone back bias voltage level so the device could be properly initialized at power up. Alternatively a dynamic scheme could be used where different back bias level(s) are used in different operating modes of the device. Having the back bias circuitry in the foundation allows better utilization of the primary device silicon resources and less distortion for the logic operation on the primary device. In another alternative the foundation substrate 1402 could additionally carry SRAM cells as illustrated in FIG. 18. The SRAM cells 1802 pre-fabricated on the underlying substrate 1402 could be connected 1812 to the primary logic circuit 1806, 1808 built on 1404. As mentioned before, the layers built on 1404 could be aligned to the pre-fabricated structure on the underlying substrate 1402 so that the logic cells could be properly connected to the underlying RAM cells. FIG. 19A is a drawing illustration of an underlying I/O. The foundation 1402 could also be preprocessed to carry the I/O circuits or part of it, such as the relatively large transistors of the output drive 1912. Additionally TSV in the foundation could be used to bring the I/O connection 1914 all the way to the back side of the foundation. FIG. 19B is a drawing illustration of side “cut” of integrated device. The Output Driver is illustrated by 19B06 using TSV 19B10 to connect to a backside pad 19B08. The connection material used in the foundation 1402 can be selected to withstand the temperature of the following process constructing the full device on 1404 as illustrated in FIG. 8A—802, 804, 806, 808, 810, 812, such as tungsten. The foundation could also carry the input protection circuit 1922 connecting the pad 19B08 to the input logic 1920 in the primary circuits. In an additional alternative the foundation substrate 1402 could additionally carry re-drive cells. Re-drive cells are common in the industry for signals which is route over a relatively long path. As the routing has a severe resistance and capacitance penalty it is important to insert re-drive circuits along the path to avoid a severe degradation of signal timing and shape. An advantage of having re-drivers in the foundation 1402 is that these re-drivers could be constructed from transistors who could withstand the programming voltage. Otherwise isolation transistors such as 1601 and 1602 should be used at the logic cell input and output. FIG. 8A is a cut illustration of a programmable device, with two antifuse layers. The programming transistors for the first one 804 could be prefabricated on 814, and then, utilizing “smart-cut”, a single crystal silicon layer 1404 is transferred on which the primary programmable logic 802 is fabricated with advanced logic transistors and other circuits. Then multi-metal layers are fabricated including a lower layer of antifuses 804, interconnection layers 806 and second antifuse layer with its configurable interconnects 808. For the second antifuse layer the programming transistors 810 could be fabricated also utilizing a second “smart-cut” layer transfer. FIG. 20 is a drawing illustration of the second layer transfer process flow. The primary processed wafer 2002 comprises all the prior layers—814, 802, 804, 806, and 808. An oxide layer 2012 is then deposited on top of the wafer 2002 and then polished for better planarization and surface preparation. A donor wafer 2006 is then brought in to be bonded to 2002. The donor wafer 2006 is pre processed to comprise the semiconductor layers 2019 which will be later used to construct the top layer of programming transistors 810 as an alternative to the TFT transistors. The donor wafer 2006 is also prepared for “SmartCut” by ion implant of H+ ion at the desired depth to prepare the SmartCut line 2008. After bonding the two wafers a SmartCut step is performed to pull out the top portion 2014 of the donor wafer 2006 along the cut layer 2008. The result is a 3D wafer 2010 which comprises wafer 2002 with an added layer 2004 of single crystal silicon pre-processed to carry additional semiconductor layers. The transferred slice 2004 could be quite thin at the range of 10-200 nm as desired. Utilizing “SmartCut” layer transfer provides single crystal semiconductors layer on top of a pre-processed wafer without heating the pre-processed wafer to more than 400° C. There are a few alternatives to construct the top transistors precisely aligned to the underlying pre-fabricated layers 808, utilizing “SmartCut” layer transfer and not exceeding the temperature limit of the underlying pre-fabricated structure. As the layer transfer is less than 200 nm thick, then the transistors defined on it could be aligned precisely to the top metal layer of 808 as required and those transistors have less than 40 nm misalignment. One alternative is to have a thin layer transfer of single crystal silicon which will be used for epitaxial Ge crystal growth using the transferred layer as the seed for the germanium. Another alternative is to use the thin layer transfer of crystallized silicon for epitaxial growth of GexSii-x. The percent Ge in Silicon of such layer would be determined by the transistor specifications of the circuitry. Prior art have presented approaches whereby the base silicon is used to epi-crystallize the germanium on top of the oxide by using holes in the oxide to drive seeding from the underlying silicon crystal. However, it is very hard to do such on top of multiple interconnection layers. By using layer transfer we can have the silicon crystal on top and make it relatively easy to seed and epi-crystallize an overlying germanium layer. Amorphous germanium could be conformally deposited by CVD at 300° C. and pattern aligned to the underlying layer 808 and then encapsulated by a low temperature oxide. A short μs-duration heat pulse melts the Ge layer while keeping the underlying structure below 400° C. The Ge/Si interface will start the epi-growth to crystallize the germanium layer. Then implants are made to form Ge transistors and activated by laser pulses without damaging the underlying structure taking advantage of the low melting temperature of germanium. Another alternative is to preprocess the wafer used for layer transfer 2006 as illustrated in FIG. 21. FIG. 21A is a drawing illustration of a pre-processed wafer used for a layer transfer. A P− wafer 2102 is processed to have a “buried” layer of N+ 2104, either by implant and activation, or by shallow N+ implant and diffusion followed by a P− epi growth (epitaxial growth). FIG. 21B is a drawing illustration of the pre-processed wafer made ready for a layer transfer by an implant of H+ preparing the SmartCut “cleaving plane” 2106 in the lower part of the N+ region. Now a layer-transfer-flow should be performed, as illustrated in FIG. 20, to transfer the pre-processed single crystal P− silicon with N+ layer, on top of 808. FIG. 22A-22H are drawing illustrations of the formation of top transistors. FIG. 22A illustrates the layer transferred on top of second antifuse layer with its configurable interconnects 808 after the smart cut wherein the N+ 2104 is on top. Then the top transistor source 22B04 and drain 22B06 are defined by etching away the N+ from the region designated for gates 22B02 and the isolation region between transistors 22B08. Utilizing an additional masking layer, the isolation region 22B08 is defined by an etch all the way to the top of 808 to provide full isolation between transistors or groups of transistors. Etching away the N+ layer between transistors is important as the N+ layer is conducting. This step is aligned to the top of the 808 layer so that the formed transistors could be properly connected to the underlying second antifuse layer with its configurable interconnects 808 layers. Then a highly conformal Low-Temperature Oxide 22C02 (or Oxide/Nitride stack) is deposited and etched resulting in the structure illustrated in FIG. 22C. FIG. 22D illustrates the structure following a self aligned etch step preparation for gate formation 22D02. FIG. 22E illustrates the structure following deposition and densification of a low temperature based Gate Dielectric 22E02 to serve as the MOSFET gate oxide. Alternatively, a high k metal gate structure may be formed as follows. Following an industry standard HF/SC1/SC2 clean to create an atomically smooth surface, a high-k dielectric 22E02 is deposited. The semiconductor industry has chosen Hafnium-based dielectrics as the leading material of choice to replace SiO2 and Silicon oxynitride. The Hafnium-based family of dielectrics includes hafnium oxide and hafnium silicate/hafnium silicon oxynitride. Hafnium oxide, HfO2, has a dielectric constant twice as much as that of hafnium silicate/hafnium silicon oxynitride (HfSiO/HfSiON k˜15). The choice of the metal is critical for the device to perform properly. A metal replacing N+ poly as the gate electrode needs to have a work function of ˜4.2 eV for the device to operate properly and at the right threshold voltage. Alternatively, a metal replacing P+ poly as the gate electrode needs to have a work function of ˜5.2 eV to operate properly. The TiAl and TiAlN based family of metals, for example, could be used to tune the work function of the metal from 4.2 eV to 5.2 eV. FIG. 22F illustrates the structure following deposition, mask, and etch of metal gate 22F02. Optionally, to improve transistor performance, a targeted stress layer to induce a higher channel strain may be employed. A tensile nitride layer may be deposited at low temperature to increase channel stress for the NMOS devices illustrated in FIG. 22. Of course, a PMOS transistor could be constructed via the above process flow by either changing the initial P− wafer or epi-formed P− on N+ layer 2104 to an N− wafer or an N− on P+ epi layer; and the N+ layer 2104 to a P+ layer. Then a compressively stressed nitride film would be deposited post metal gate formation. Finally a thick oxide 22G02 is deposited and etched preparing the transistors to be connected as illustrated in FIG. 22G. This flow enables the formation of fully crystallized top MOS transistors that could be connected to the underlying multi-metal layer semiconductor device without exposing the underlying devices and interconnects metals to high temperature. These transistors could be used as programming transistors of the Antifuse on layer 808 or for other functions in a 3D integrated circuit. An additional advantage of this flow is that the SmartCut H+ implant step is done prior to the formation of the MOS transistor gates avoiding potential damage to the gate function. If needed the top layer of 808 could comprise ‘back-gate’ 22F02-1 which gate 22F02 will be aligned to be directly on top of it as illustrated in FIG. 22H. This will allow further reduction of leakage as both the gate 22F02 and the back-gate 22F02-1 could be connected together to better shut off the transistor 22G20. As well, one could create a sleep mode and a normal speed and fast speed mode by dynamically changing the threshold voltage of the top gated transistor by independently changing the bias of the ‘back-gate’ 22F02-1. Additionally, an accumulation mode (fully depleted) MOSFET transistor could be constructed via the above process flow by either changing the initial P− wafer or epi-formed P− on N+ layer 2104 to an N− wafer or an N− on N+ epi layer. Another alternative is to preprocess the wafer used for layer transfer 2006 as illustrated in FIG. 23. FIG. 23A is a drawing illustration of a pre-processed wafer used for a layer transfer. An N− wafer 2302 is processed to have a “buried” layer of N+ 2304, either by implant and activation, or by shallow N+ implant and diffusion followed by an N− epi growth (epitaxial growth). FIG. 23B is a drawing illustration of the pre-processed wafer made ready for a layer transfer by an implant of H+ preparing the SmartCut cleaving plane 2306 in the lower part of the N+ region. Now a layer-transfer-flow should be performed, as illustrated in FIG. 20, to transfer the pre-processed crystallized N− silicon with N+ layer, on top of the second antifuse layer with its configurable interconnects 808. FIGS. 24A-24F are drawing illustrations of the formation of top transistors. FIG. 24A illustrates the structure after the layer transferred on top of 808. So after the smart cut in the N+ 2304 is on top and now marked as 24A04. Then the top transistor source 24B04 and drain 24B06 are defined by etching away the N+ from the region designated for gates 24B02 and the isolation region between transistors 24B08. This step is aligned to the 808 layer so the formed transistors could be properly connected to the underlying 808 layers. Then an additional masking and etch step is performed to remove the N− between transistors 24B09 providing better transistor isolation as illustrated in FIG. 24C. FIG. 24D illustrates an optional formation of shallow P+ region 24D02 for gate formation. In this option there might be a need for laser anneal to activate the P+. FIG. 24E illustrates how to utilize the laser anneal and minimize the heat transfer to layer 808. After the thick oxide deposition 24E02, a layer of Aluminum 24D04, or other light reflecting material, is applied as a reflective layer. An opening 24D08 in the reflective layer is masked and etched, allowing the laser light 24D06 to heat the P+ implanted area, and reflecting the majority of the laser energy 24D06 away from layer 808. Normally, the open area 24D08 is less than 10% of the total wafer area. Additionally, a copper layer 24D10, or, alternatively, a reflective Aluminum layer or other reflective material, may be formed in the layer 808 that will additionally reflect any of the laser energy 24D08 that might travel to layer 808. Layer 24D10 could also be utilized as a ground plane or backgate electrically when the formed devices and circuits are in operation. Certainly, openings in layer 24D10 would be made through which later thru vias connecting the second top transferred layer to the layer 808 may be constructed. This same reflective & open laser anneal technique might be utilized on any of the other illustrated structures to enable implant activation for transistor gates in the second layer transfer process flow. FIG. 24F illustrates the structure, following deposition, masking, and etch of a thick oxide 24F04, and deposition and partial etch-back of aluminum (or other metal as required to obtain an optimal Schottky contact at 24F02) contacts 24F06 and gate 24F02. If necessary, N+ contacts 24F06 and gate contact 24F02 can be masked and etched separately to allow a different metal to be deposited in each to create a Schottky contact in the gate 24F02 and ohmic connections in the N+ contacts 24F06. The thick oxide 24F04 is a non conducting dielectric material also filling the etched space 24B08 and 24B09 between the top transistors and could be comprised from other isolating material such as silicon nitride. The top transistors will therefore end up surrounded by isolating dielectric unlike conventional integrated circuits transistors that are built in single crystal silicon wafer and only get covered by non conducting isolating material. This flow enables the formation of fully crystallized top JFET transistors that could be connected to the underlying multi-metal layer semiconductor device without exposing the underlying device to high temperature. Another variation for the previous flow could be in utilizing a transistor technology called pseudo-MOSFET utilizing a molecular monolayer that is covalently grafted onto the channel region between the drain and source. This is a process that can be done at relatively low temperature. Another variation is to preprocess the wafer used for layer transfer 2006 of FIG. 20 as illustrated in FIG. 25. FIG. 25A is a drawing illustration of pre-processed wafer used for a layer transfer. An N− wafer 2502 is process to have a “buried” layer of N+ 2504, either by implant and activation, or by shallow N+ implant and diffusion followed by an N− epi growth (epitaxial growth). An additional N+ layer 2510 is processed on top. This N+ layer 2510 could again be processed, either by implant and activation, or by N+ epi growth. FIG. 25B is a drawing illustration of the pre-processed wafer made ready for a layer transfer by an implant of H+ preparing the SmartCut cleaving plane 2506 in the lower part of the N+ 2504 region. Now a layer-transfer-flow should be performed, as illustrated in FIG. 20, to transfer the pre-processed single crystal silicon with N+ and N− layers, on top of 808. FIG. 26A-26E are drawing illustrations of the formation of top transistors. FIG. 26A illustrates the layer transferred on top of 808 after the smart cut wherein the N+ 2504 is on top. Then the top transistor source 26B04 and drain 26B06 are defined by etching away the N+ from region designated for gates 26B02 and isolation region between transistors 26B08. This step is aligned to the 808 layer so the formed transistors could be properly connected to the underlying 808 layers. Then a masking and etch step is performed to remove the N− between transistors 26C12 and to allow contact to the now buried N+ layer 2510. And then a masking and etch step is performed to remove in between transistors 26C09 the buried N+ layer 2510 for full isolation as illustrated in FIG. 26C. FIG. 26D illustrates an optional formation of a shallow P+ region 26D02 for gate formation. In this option there might be a need for laser anneal to activate the P+. FIG. 26E illustrates the structure, following deposition and etch or CMP of a thick oxide 26E04, and deposition and partial etch-back of aluminum (or other metal as required to obtain an optimal Schottky contact at 26E02) contacts 26E06, 26E12 and gate 26E02. If necessary, N+ contacts 26E06 and gate contact 26E02 can be masked and etched separately to allow a different metal to be deposited in each to create a Schottky contact in the gate 26E02 and ohmic connections in the N+ contacts 26E06 & 26E12. The thick oxide 26E04, is a non conducting dielectric material also filling the etched space 26B08 and 26C09 between the top transistors and could be comprised from other isolating material such as silicon nitride. Contact 26E12 is to allow back bias of the transistor. Alternatively the connection for back bias could be included in layers 808 connecting to layer 2510 from underneath. This flow enables the formation of fully crystallized top JFET with back-bias transistors that could be connected to the underlying multi-metal layer semiconductor device without exposing the underlying device to high temperature. Another alternative is to preprocess the wafer used for layer transfer 2006 as illustrated in FIG. 27. FIG. 27A is a drawing illustration of a pre-processed wafer used for a layer transfer. An N+ wafer 2702 is processed to have “buried” layers by ion implantation and diffusion to create a vertical structure to be the building block for NPN (or PNP) transistors. Starting with P layer 2704, then N− layer 2708, and finally N+ layer 2710 and then activating these layers, by heating to a high activation temperature. FIG. 27B is a drawing illustration of the pre-processed wafer made ready for a layer transfer by an implant of H+ preparing the SmartCut cleaving plane 2706 in the N+ region. Now a layer-transfer-flow should be performed, as illustrated in FIG. 20, to transfer the pre-processed layers, on top of 808. FIGS. 28A-28E are drawing illustrations of the formation of top bipolar transistors. FIG. 28A illustrates the layer transferred on top of the second antifuse layer with its configurable interconnects 808 after the smart cut wherein the N+ 28A02 which was part of 2702 is now on top. Effectively at this point there is a giant transistor overlaying the entire wafer. The following steps are multiple etch steps as illustrated in FIG. 28B to 28D where the giant transistor is cut and defined as needed and aligned to the underlying layers 808. These etch steps also expose the different layers comprising the bipolar transistors to allow contacts to be made with the emitter 2806, base 2802 and collector 2808, and etching all the way to the top oxide of 808 to isolate between transistors as 2809 in FIG. 28D. Then cover the entire structure with Low Temperature Oxide 2804, planarize with CMP, and mask & etch contacts to the emitter, base and collectors—2806, 2802 and 2808 as in FIG. 28E. The oxide 2804 is a non conducting dielectric material also filling the etched space 2809 between the top transistors and could be comprised from other isolating material such as silicon nitride. This flow enables the formation of fully crystallized top bipolar transistors that could be connected to the underlying multi-metal layer semiconductor device without exposing the underlying device to high temperature. For the purpose of programming transistors, a single type of top transistor could be sufficient. Yet for logic type circuitry two complementing transistors might be important to allow CMOS type logic. Accordingly the above described flow could be performed twice. First perform all the steps to build the ‘n’ type, and than do additional layer transfer to build the ‘p’ type on top of it. The above flow could be repeated multiple times to allow a multi level 3D monolithic integrated system. It should be noted that the prior art shows alternatives for 3D devices. The most common technologies are, either the use of thin film transistors (TFT) constructing a monolithic 3D device, or the stacking of prefabricated wafers and using a through silicon via (TSV) to connect them. The first approach is limited with the performance of thin film transistors while the stacking approach is limited due to the relatively large misalignment between the stack layers and the relatively low density of the through silicon vias connecting them. As to misalignment performance, the best technology available could attain only to the 0.25 micro-meter range, which will limit the through silicon via pitch to about 2 micro-meters. The alternative process flow presented in FIGS. 20 to 28 provides true monolithic 3D integrated circuits. It allows the use of layers of single crystal transistors with the ability to have the upper transistors aligned to the underlying circuits as well as those layers are aligned each to other; hence, only limited by the Stepper capabilities. Similarly the contact pitch between the upper transistors and the underlying circuits is compatible with the contact pitch of the underlying layers. While in the best current stacking approach the stack wafers are a few microns thick, the alternative process flow presented in FIGS. 20 to 28 suggests very thin layers of typically 100 nm but in recent work demonstrated layers that are 20 nm thin. Accordingly the presented alternatives allow for true monolithic 3D devices. This monolithic 3D technology provides the ability to integrate with full density, and to be scaled to tighter features, at the same pace as the semiconductor industry. FIG. 9A through 9C are a drawing illustration of alternative configurations for three-dimensional—3D integration of multiple dies constructing IC system and utilizing Through Silicon Via. FIG. 9A illustrates an example in which the Through Silicon Via is continuing vertically through all the dies constructing a global cross-die connection. FIG. 9B provides an illustration of similar sized dies constructing a 3D system. 9B shows that the Through Silicon Via 404 is at the same relative location in all the dies constructing a standard interface. FIG. 9C illustrates a 3D system with dies having different sizes. FIG. 9C also illustrates the use of wire bonding from all three dies in connecting the IC system to the outside. FIG. 10A is a drawing illustration of a continuous array wafer of a prior art U.S. Pat. No. 7,337,425. The bubble 102 shows the repeating tile of the continuous array, 104 are the horizontal and vertical potential dicing lines. The tile 102 could be constructed as in FIG. 10B 102-1 with potential dicing line 104-1 or as in FIG. 10C with SERDES Quad 106 as part of the tile 102-2 and potential dicing lines 104-2. In general logic devices comprise varying quantities of logic elements, varying amount of memories, and varying amount of I/O. The continuous array of the prior art allows defining various die sizes out of the same wafers and accordingly varying amounts of logic, but it is far more difficult to vary the three-way ratio between logic, I/O, and memory. In addition, there exists different types of memories such as SRAM, DRAM, Flash, and others, and there exist different types of I/O such as SERDES. Some applications might need still other functions like processor, DSP, analog functions, and others. Embodiments of the current invention may enable a different approach. Instead of trying to put all of these different functions onto one programmable die, which will require a large number of very expensive mask sets, it uses Through-Silicon Via to construct configurable systems. The technology of “Package of integrated circuits and vertical integration” has been described in U.S. Pat. No. 6,322,903 issued to Oleg Siniaguine and Sergey Savastiouk on Nov. 27, 2001. Accordingly embodiments of the current invention may suggest the use of a continuous array of tiles focusing each one on a single, or very few types of, function. Then, it constructs the end-system by integrating the desired amount from each type of tiles, in a 3D IC system. FIG. 11A is a drawing illustration of one reticle site on a wafer comprising tiles of programmable logic 1100A denoted FPGA. Such wafer is a continuous array of programmable logic. 1102 are potential dicing lines to support various die sizes and the amount of logic to be constructed from one mask set. This die could be used as a base 1202A, 1202B, 1202C or 1202D of the 3D system as in FIG. 12. In one alternative of this invention these dies may carry mostly logic, and the desired memory and I/O may be provided on other dies, which may be connected by means of Through-Silicon Via. It should be noted that in some cases it will be desired not to have metal lines, even if unused, in the dicing streets 108. In such case, at least for the logic dies, one may use dedicated masks to allow connection over the unused potential dicing lines to connect the individual tiles according to the desire die size. The actual dicing lines are called also streets. FIG. 11B is a drawing illustration of an alternative reticle site on a wafer comprising tiles of Structured ASIC 1100B. Such wafer may be, for example, a continuous array of configurable logic. 1102 are potential dicing lines to support various die sizes and the amount of logic to be constructed. This die could be used as a base 1202A, 1202B, 1202C or 1202D of the 3D system as in FIG. 12. FIG. 11C is a drawing illustration of another reticle site on a wafer comprising tiles of RAM 1100C. Such wafer may be a continuous array of memories. The die diced out of such wafer may be a memory die component of the 3D integrated system. It might include an antifuse layer or other form of configuration technique to function as a configurable memory die. Yet it might be constructed as a multiplicity of memories connected by multiplicity of Through-Silicon Via to the configurable die, which may also be used to configure the raw memories of the memory die to their desire function in the configurable system. FIG. 11D is a drawing illustration of another reticle site on a wafer comprising tiles of DRAM 1100D. Such wafer may be a continuous array of DRAM memories. FIG. 11E is a drawing illustration of another reticle site on a wafer comprising tiles of microprocessor or microcontroller cores 1100E. Such wafer may be a continuous array of Processors. FIG. 11F is a drawing illustration of another reticle site on a wafer comprising tiles of I/Os 1100F. This could include groups of SERDES. Such a wafer may be a continuous tile of I/Os. The die diced out of such wafer may be an I/O die component of a 3D integrated system. It could include an antifuse layer or other form of configuration technique such as SRAM to configure these I/Os of the configurable I/O die to their function in the configurable system. Yet it might be constructed as a multiplicity of I/O connected by multiplicity of Through-Silicon Via to the configurable die, which may also be used to configure the raw I/Os of the I/O die to their desire function in the configurable system. I/O circuits are a good example of where it could be advantageous to utilize an older generation process. Usually, the process drivers are SRAM and logic circuits. It often takes longer to develop the analog function associated with I/O circuits, SerDes circuits, PLLs, and other linear functions. Additionally, while there may be an advantage to using smaller transistors for the logic functionality, I/O may require stronger drive and relatively larger transistors. Accordingly, using an older process may be more cost effective, as the older process wafer might cost less while still performing effectively. An additional function that it might be effective to pull out of the programmable logic die, onto one of the other dies in the 3D system, connected by Through-Silicon-Vias, may be the Clock circuits and their associated PLL, DLL, and control. Clock circuits and distribution may often be area consuming and may be challenging in view of noise generation. They also could in many cases be more effectively implemented using an older process. The Clock tree and distribution circuits could be included in the I/O die. Additionally the clock signal could be transferred to the programmable die using the Through-Silicon-Vias or by optical means. A technique to transfer data between dies by optical means was presented for example in U.S. Pat. No. 6,052,498 assigned to Intel Corp. Alternatively an optical clock distribution could be used. There are new techniques to build optical guides on silicon or other substrates. An optical clock distribution would most effective in minimizing the power used for clock signal distribution and would enable low skew and low noise for the rest of the digital system. Having the optical clock construct on a different die and than connected to the digital die by mean of Through-Silicon-Vias or by optical means make it very practical when, compared to the prior art of integrating optical clock distribution with logic on the same die. Having wafers dedicated to each of these functions may support high volume generic product manufacturing. Then, similar to Lego® blocks, many different configurable systems could be constructed with various amounts of logic memory and I/O. In addition to the alternatives presented in FIG. 11A through 11F there many other useful functions that could be built and that could be incorporated into the 3D Configurable System. Examples of such may be image sensors, analog, data acquisition functions, photovoltaic devices, non-volatile memory, and so forth. Those components of configurable systems could be built by one vendor, or by multiple vendors, who agree on a standard physical interface to allow mix-and-match of various dies from various vendors. The construction of the 3D Programmable System could be done for the general market use or custom-tailored for a specific customer. Another advantage of some embodiments of this invention may be an ability to mix and match various processes. It might be advantageous to use memory from a leading edge process, while the I/O, and maybe an analog function die, could be used from an older process of mature technology (e.g., as discussed above). FIGS. 12A through 12E are a drawing illustration of integrated circuit systems. An integrated circuit system that comprises configurable die could be called a Configurable System. FIG. 12A through 12E are drawings illustrating integrated circuit systems or Configurable Systems with various options of die sizes within the 3D system and alignments of the various dies. FIG. 12E presents a 3D structure with some lateral options. In such case a few dies 1204E, 1206E,1208E are placed on the same underlying die 1202E allowing relatively smaller die to be placed on the same mother die. For example die 1204E could be a SERDES die while die 1206E could be an analog data acquisition die. It could be advantageous to fabricate these die on different wafers using different process and than integrate them in one system. When the dies are relatively small then it might be useful to place them side by side (such as FIG. 12E) instead of one on top of the other (FIGS. 12A-D). The Through Silicon Via technology is constantly evolving. In the early generations such via would be 10 microns in diameter. Advanced work is now demonstrating Through Silicon Via with less than a 1-micron diameter. Yet, the density of connections horizontally within the die may typically still be far denser than the vertical connection using Through Silicon Via. In another alternative of the present invention the logic portion could be broken up into multiple dies, which may be of the same size, to be integrated to a 3D configurable system. Similarly it could be advantageous to divide the memory into multiple dies, and so forth, with other function. Recent work on 3D integration shows effective ways to bond wafers together and then dice those bonded wafers. This kind of assembly may lead to die structures like FIG. 12A or FIG. 12D. Alternatively for some 3D assembly techniques it may be better to have dies of different sizes. Furthermore, breaking the logic function into multiple vertically integrated dies may be used to reduce the average length of some of the heavily loaded wires such as clock signals and data buses, which may, in turn, improve performance. FIG. 13 is a flow-chart illustration for 3D logic partitioning. The partitioning of a logic design to two or more vertically connected dies presents a different challenge for a Place and Route—P&R—tool. The common layout flow starts with planning the placement followed by routing. But the design of the logic of vertically connected dies may give priority to the much-reduced frequency of connections between dies and may create a need for a special design flow. In fact, a 3D system might merit planning some of the routing first as presented in the flows of FIG. 13. K1, K2—Two parameters selected by the designer. One idea of the proposed flow of FIG. 13 is to construct a list of nets in the logic design that connect more than K1 nodes and less than K2 nodes. K1 and K2 are parameters that could be selected by the designer and could be modified in an iterative process. K1 should be high enough so to limit the number of nets put into the list. The flow's objective is to assign the TSVs to the nets that have tight timing constraints—critical nets. And also have many nodes whereby having the ability to spread the placement on multiple die help to reduce the overall physical length to meet the timing constraints. The number of nets in the list should be close but smaller than the number of TSVs. Accordingly K1 should be set high enough to achieve this objective. K2 is the upper boundary for nets with the number of nodes N(n) that would justify special treatment. Critical nets may be identified usually by using static timing analysis of the design to identify the critical paths and the available “slack” time on these paths, and pass the constraints for these paths to the floorplanning, layout, and routing tools so that the final design is not degraded beyond the requirement. Once the list is constructed it is priority-ordered according to increasing slack, or the median slack, S(n), of the nets. Then, using a partitioning algorithm, such as, but not limited to, MinCut, the design may be split into two parts, with the highest priority nets split about equally between the two parts. The objective is to give the nets that have tight slack a better chance to be placed close enough to meet the timing challenge. Those nets that have higher than K1 nodes tend to get spread over a larger area, and by spreading into three dimensions we get a better chance to meet the timing challenge. The Flow of FIG. 13 suggests an iterative process of allocating the TSVs to those nets that have many nodes and are with the tightest timing challenge, or smallest slack. Clearly the same Flow could be adjusted to three-way partition or any other number according to the number of dies the logic will be spread on. Constructing a 3D Configurable System comprising antifuse based logic also provides features that may implement yield enhancement through utilizing redundancies. This may be even more convenient in a 3D structure of embodiments of the current invention because the memories may not be sprinkled between the logic but may rather be concentrated in the memory die, which may be vertically connected to the logic die. Constructing redundancy in the memory, and the proper self-repair flow, may have a smaller effect on the logic and system performance. The potential dicing streets of the continuous array of this invention represent some loss of silicon area. The narrower the street the lower the loss is, and therefore, it may be advantageous to use advanced dicing techniques that can create and work with narrow streets. An additional advantage of the 3D Configurable System of various embodiments of this invention may be a reduction in testing cost. This is the result of building a unique system by using standard ‘Lego®’ blocks. Testing standard blocks could reduce the cost of testing by using standard probe cards and standard test programs. In yet an additional alternative of the current invention, the 3D antifuse Configurable System, may also comprise a Programming Die. In some cases of FPGA products, and primarily in antifuse-based products, there is an external apparatus that may be used for the programming the device. In many cases it is a user convenience to integrate this programming function into the FPGA device. This may result in a significant die overhead as the programming process requires higher voltages as well as control logic. The programmer function could be designed into a dedicated Programming Die. Such a Programmer Die could comprise the charge pump, to generate the higher programming voltage, and a controller with the associated program to program the antifuse configurable dies within the 3D Configurable circuits, and the programming check circuits. The Programming Die might be fabricated using lower cost older semiconductor process. An additional advantage of this 3D architecture of the Configurable System may be a high volume cost reduction option wherein the antifuse layer may be replaced with a custom layer and, therefore, the Programming Die could be removed from the 3D system for a more cost effective high volume production. It will be appreciated by persons skilled in the art, that the present invention is using the term antifuse as it is the common name in the industry, but it also refers in this invention to any micro element that functions like a switch, meaning a micro element that initially has highly resistive-OFF state, and electronically it could be made to switch to a very low resistance-ON state. It could also correspond to a device to switch ON-OFF multiple times—a re-programmable switch. As an example there are new innovations, such as the electro-statically actuated Metal-Droplet micro-switch, that may be compatible for integration onto CMOS chips. It will be appreciated by persons skilled in the art that the present invention is not limited to antifuse configurable logic and it will be applicable to other non-volatile configurable logic. A good example for such is the Flash based configurable logic. Flash programming may also require higher voltages, and having the programming transistors and the programming circuits in the base diffusion layer may reduce the overall density of the base diffusion layer. Using various embodiments of the current invention may be useful and could allow a higher device density. It is therefore suggested to build the programming transistors and the programming circuits, not as part of the diffusion layer, but according to one or more embodiments of the present invention. In high volume production one or more custom masks could be used to replace the function of the Flash programming and accordingly save the need to add on the programming transistors and the programming circuits. Unlike metal-to-metal antifuses that could be placed as part of the metal interconnection, Flash circuits need to be fabricated in the base diffusion layers. As such it might be less efficient to have the programming transistor in a layer far above. An alternative embodiment of the current invention is to use Through-Silicon-Via 816 to connect the configurable logic device and its Flash devices to an underlying structure 804 comprising the programming transistors. It will also be appreciated by persons skilled in the art, that the present invention is not limited to what has been particularly shown and described hereinabove. Rather, the scope of the present invention includes both combinations and sub-combinations of the various features described hereinabove as well as modifications and variations which would occur to persons skilled in the art upon reading the foregoing description and which are not in the prior art. wherein said second thin single crystal silicon layer comprises a plurality of transistors forming programmable logic. 2. A programmable logic device according to claim 1 wherein said programmable logic comprises antifuses and said first single crystal silicon layer comprises transistors for programming at least one of said antifuses. wherein the second transistors are larger than the first transistors. wherein said first single crystal silicon layer comprises a plurality of transistors forming programmable logic. 5. A programmable logic device according to claim 4 wherein said programmable logic comprises antifuses and said second thin single crystal silicon layer comprises transistors for programming at least one of said antifuses. wherein said second transistors each have a source and a drain in one sub-layer of said second thin crystal silicon layer.
2019-04-23T16:28:17Z
https://patents.google.com/patent/US20110031997A1/en
Lindberg, Eleanor Inez was born in 1995 and she registered to vote, giving her address as 1787 S Sherman ST, DENVER, Denver County, CO. Her voter ID number is 600813179. Lindberg, Elizabeth Anne was born in 1995 and she registered to vote, giving her address as 1787 S Sherman ST, DENVER, Denver County, CO. Her voter ID number is 600959241. Lindberg, Elizabeth Frances was born in 1990 and she registered to vote, giving her address as 41199 Lamborn DR, PAONIA, Delta County, CO. Her voter ID number is 600324204. Lindberg, Emily Anne was born in 1983 and she registered to vote, giving her address as 10021 E Grand AVE, GREENWOOD VLG, Arapahoe County, CO. Her voter ID number is 891745. Lindberg, Erica Nicole was born in 1990 and she registered to vote, giving her address as 90 W Boulder ST UNIT A, NEDERLAND, Boulder County, CO. Her voter ID number is 200142725. Lindberg, Eric Edward was born in 1958 and he registered to vote, giving his address as 1350 N Irving ST APT 3-337, DENVER, Denver County, CO. His voter ID number is 601045591. Lindberg, Eric Jon was born in 1965 and he registered to vote, giving his address as 9670 E Prentice CIR, GREENWOOD VLG, Arapahoe County, CO. His voter ID number is 2731031. Lindberg, Erik P was born in 1971 and he registered to vote, giving his address as 777 N Washington ST APT 706, DENVER, Denver County, CO. His voter ID number is 2748513. Lindberg, Erin Kathleen was born in 1995 and she registered to vote, giving her address as 11724 Montgomery CIR, LONGMONT, Weld County, CO. Her voter ID number is 600828891. Lindberg, Gary A was born in 1954 and he registered to vote, giving his address as 2596 S Olathe WAY, AURORA, Arapahoe County, CO. His voter ID number is 911941. Lindberg, Gary D was born in 1941 and he registered to vote, giving his address as 4767 5800 RD, OLATHE, Montrose County, CO. His voter ID number is 5352764. Lindberg, Gene Elton was born in 1942 and he registered to vote, giving his address as 5100 Manor Ridge DR UNIT #R, PUEBLO, Pueblo County, CO. His voter ID number is 3070419. Lindberg, Gordon Kent was born in 1956 and he registered to vote, giving his address as 1518 S Gaylord ST, DENVER, Denver County, CO. His voter ID number is 2871378. Lindberg, Grant Kristian was born in 1977 and he registered to vote, giving his address as 200 N Rampart WAY APT 332, DENVER, Denver County, CO. His voter ID number is 2819652. Lindberg, Griffin Thomas was born in 1997 and he registered to vote, giving his address as 4854 E Costilla AVE, CENTENNIAL, Arapahoe County, CO. His voter ID number is 601164797. Lindberg, Gustav Leo was born in 1999 and he registered to vote, giving his address as 9455 Wagonwheel DR, LITTLETON, Douglas County, CO. His voter ID number is 601664083. Lindberg, Hannah was born in 1999 and she registered to vote, giving her address as 1126 S Elizabeth ST, DENVER, Denver County, CO. Her voter ID number is 601532135. Lindberg, Harlan Edward Jr was born in 1939 and he registered to vote, giving his address as 8379 Hackamore RD, LITTLETON, Douglas County, CO. His voter ID number is 5821714. Lindberg, Jacob Donald was born in 1995 and he registered to vote, giving his address as 2421 Stage Coach DR # D, MILLIKEN, Weld County, CO. His voter ID number is 601401506. Lindberg, James was born in 1991 and he registered to vote, giving his address as 1787 S Sherman ST, DENVER, Denver County, CO. His voter ID number is 600475286. Lindberg, James Alan was born in 1952 and he registered to vote, giving his address as 2624 Davidson DR # A, FORT COLLINS, Larimer County, CO. His voter ID number is 600804717. Lindberg, James B Jr was born in 1958 and he registered to vote, giving his address as 1787 S Sherman ST, DENVER, Denver County, CO. His voter ID number is 2408062. Lindberg, James Edward was born in 1990 and he registered to vote, giving his address as 29 Burlington WAY, LONGMONT, Boulder County, CO. His voter ID number is 600173624. Lindberg, James P was born in 1944 and he registered to vote, giving his address as 1577 Shooting Star DR, GOLDEN, Jefferson County, CO. His voter ID number is 4169962. Lindberg, Janell Kathleen was born in 1995 and she registered to vote, giving her address as 466 S Downing ST UNIT A, DENVER, Denver County, CO. Her voter ID number is 601957501. Lindberg, Janice Marlene was born in 1953 and she registered to vote, giving her address as 1577 Shooting Star DR, GOLDEN, Jefferson County, CO. Her voter ID number is 4170414. Lindberg, Jeanne was born in 1969 and she registered to vote, giving her address as 9455 Wagonwheel DR, LITTLETON, Douglas County, CO. Her voter ID number is 882734. Lindberg, Jean Paul was born in 1977 and he registered to vote, giving his address as 476 River Forest DR, PAGOSA SPRINGS, Archuleta County, CO. His voter ID number is 4754146. Lindberg, Jeffrey Bruce was born in 1953 and he registered to vote, giving his address as 280 Shadow Mountain CT, ESTES PARK, Larimer County, CO. His voter ID number is 1458485. Lindberg, Jennifer Lee was born in 1985 and she registered to vote, giving her address as 5453 Baca CIR, BOULDER, Boulder County, CO. Her voter ID number is 8030928. Lindberg, Jenny Estill was born in 1957 and she registered to vote, giving her address as 11724 Montgomery CIR, LONGMONT, Weld County, CO. Her voter ID number is 6307441. Lindberg, Jeremiah M was born in 1974 and he registered to vote, giving his address as 293 County Road 12, ALMA, Park County, CO. His voter ID number is 560786. Lindberg, Jessica L was born in 1980 and she registered to vote, giving her address as 4481 N Carefree CIR UNIT B, COLO SPRINGS, El Paso County, CO. Her voter ID number is 244588. Lindberg, Jessica Marie was born in 1988 and she registered to vote, giving her address as 1637 Valley Oak CT, CASTLE ROCK, Douglas County, CO. Her voter ID number is 600029228. Lindberg, Jobe S was born in 1987 and he registered to vote, giving his address as 829 Santa Barbara AVE, PUEBLO, Pueblo County, CO. His voter ID number is 3037572. Lindberg, John Austin was born in 1988 and he registered to vote, giving his address as 1906 W Davies AVE, LITTLETON, Arapahoe County, CO. His voter ID number is 600048020. Lindberg, John Truman was born in 1971 and he registered to vote, giving his address as 11423 Decatur CT, WESTMINSTER, Adams County, CO. His voter ID number is 6808383. Lindberg, Jonathan Allen was born in 1982 and he registered to vote, giving his address as 4496 County Road 23, FT LUPTON, Weld County, CO. His voter ID number is 600324570. Lindberg, Jonathan David was born in 1993 and he registered to vote, giving his address as 303 Oak AVE, PAONIA, Delta County, CO. His voter ID number is 601219678. Lindberg, Joyce Kathleen was born in 1959 and she registered to vote, giving her address as 5375 Rosewood AVE, FIRESTONE, Weld County, CO. Her voter ID number is 600740722. Lindberg, Jude Paul was born in 2000 and he registered to vote, giving his address as 476 River Forest DR, PAGOSA SPRINGS, Archuleta County, CO. His voter ID number is 601638760. Lindberg, Judith J was born in 1945 and she registered to vote, giving her address as 1703 Prospect Estates DR, ESTES PARK, Larimer County, CO. Her voter ID number is 1568433. Lindberg, Judith Marie was born in 1945 and she registered to vote, giving her address as 1352 Whitehall DR, LONGMONT, Boulder County, CO. Her voter ID number is 8174396. Lindberg, Julie Ann was born in 1981 and she registered to vote, giving her address as 6677 Knox CT, DENVER, Adams County, CO. Her voter ID number is 600103209. Lindberg, Kami Lou was born in 1966 and she registered to vote, giving her address as 9140 S State Highway 67, SEDALIA, Douglas County, CO. Her voter ID number is 601102597. Lindberg, Katherine Noelle was born in 1997 and she registered to vote, giving her address as 4209 Grand Park DR, TIMNATH, Larimer County, CO. Her voter ID number is 600946725. Lindberg, Kathryn Ann was born in 1990 and she registered to vote, giving her address as 1120 City Park AVE # C203, FORT COLLINS, Larimer County, CO. Her voter ID number is 601127572. Lindberg, Katie Leah was born in 1992 and she registered to vote, giving her address as 4725 W Quincy AVE APT 401, DENVER, Denver County, CO. Her voter ID number is 200375639. Lindberg, Kent W was born in 1965 and he registered to vote, giving his address as 1126 S Elizabeth ST, DENVER, Denver County, CO. His voter ID number is 2758530. Lindberg, Kevin Alan was born in 1975 and he registered to vote, giving his address as 1375 N Ford ST, GOLDEN, Jefferson County, CO. His voter ID number is 2331004. Lindberg, Kimberly Ann was born in 1959 and she registered to vote, giving her address as 4209 Grand Park DR, TIMNATH, Larimer County, CO. Her voter ID number is 1538008. Lindberg, Kurt Cliff was born in 1987 and he registered to vote, giving his address as 100 Park Ave West APT 1002, DENVER, Denver County, CO. His voter ID number is 601228916. Lindberg, Kurt Loren was born in 1975 and he registered to vote, giving his address as 6555 S Cherry WAY, CENTENNIAL, Arapahoe County, CO. His voter ID number is 787584. Lindberg, Kyle Gordon was born in 1995 and he registered to vote, giving his address as 8059 Wolff ST UNIT G, WESTMINSTER, Adams County, CO. His voter ID number is 601786574. Lindberg, Ladena Mae was born in 1956 and she registered to vote, giving her address as 8 Bienvenido CIR, PAGOSA SPRINGS, Archuleta County, CO. Her voter ID number is 4752840. Lindberg, Larissa Elizabeth was born in 1989 and she registered to vote, giving her address as 414 Scranton AVE, PUEBLO, Pueblo County, CO. Her voter ID number is 601297931. Lindberg, Laura Nicole was born in 1994 and she registered to vote, giving her address as 6864 S Ivy WAY # 106, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 600575338. Lindberg, Laurel Jean was born in 1949 and she registered to vote, giving her address as 720 Iris AVE, BOULDER, Boulder County, CO. Her voter ID number is 8174399. Lindberg, Lauren Hailey was born in 1990 and she registered to vote, giving her address as 1311 N Cook ST APT 506, DENVER, Denver County, CO. Her voter ID number is 600851522. Lindberg, Laurie A was born in 1960 and she registered to vote, giving her address as 315 W 8Th PL, CARBONDALE, Garfield County, CO. Her voter ID number is 5526924. Lindberg, Laurie Ann was born in 1975 and she registered to vote, giving her address as 3978 Boulder DR, LOVELAND, Larimer County, CO. Her voter ID number is 600386556. Lindberg, Leanne was born in 1967 and she registered to vote, giving her address as 2319 S Colorado AVE, LOVELAND, Larimer County, CO. Her voter ID number is 600813791. Lindberg, Leslie Ann was born in 1962 and she registered to vote, giving her address as 940 N Steele ST, DENVER, Denver County, CO. Her voter ID number is 2781155. Lindberg, Linda F was born in 1950 and she registered to vote, giving her address as 1906 W Davies AVE, LITTLETON, Arapahoe County, CO. Her voter ID number is 815247. Lindberg, Lonnie Lee was born in 1960 and he registered to vote, giving his address as 6677 Knox CT, DENVER, Adams County, CO. His voter ID number is 601540779. Lindberg, Luann was born in 1961 and she registered to vote, giving her address as 26199 Creek CT, KITTREDGE, Jefferson County, CO. Her voter ID number is 4157568. Lindberg, Lynelle Marie was born in 1967 and she registered to vote, giving her address as 609 Old Midland SPUR, GLENWOOD SPGS, Garfield County, CO. Her voter ID number is 601216735. Lindberg, Makenzie Lane was born in 1990 and she registered to vote, giving her address as 4942 St Andrews CT, LOVELAND, Larimer County, CO. Her voter ID number is 200078402. Lindberg, Margaret Ann was born in 1972 and she registered to vote, giving her address as 1825 W 130Th PL, WESTMINSTER, Adams County, CO. Her voter ID number is 6814950. Lindberg, Maria Anne was born in 1971 and she registered to vote, giving her address as 4854 E Costilla AVE, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 886259. Lindberg, Mark Allen was born in 1958 and he registered to vote, giving his address as 502 Hermosa ST, LOCHBUIE, Weld County, CO. His voter ID number is 8889936. Lindberg, Mark Peter was born in 1953 and he registered to vote, giving his address as 10460 Garland DR, WESTMINSTER, Jefferson County, CO. His voter ID number is 4191214. Lindberg, Martha Morrow was born in 1952 and she registered to vote, giving her address as 1134 E High ST, COLO SPRINGS, El Paso County, CO. Her voter ID number is 393177. Lindberg, Mary D was born in 1950 and she registered to vote, giving her address as 575 Hartford DR, BOULDER, Boulder County, CO. Her voter ID number is 8174402. Lindberg, Matthew David was born in 1967 and he registered to vote, giving his address as 368 Norton DR, BLACK HAWK, Gilpin County, CO. His voter ID number is 603951. Lindberg, Melissa Lenae was born in 1974 and she registered to vote, giving her address as 11423 Decatur CT, WESTMINSTER, Adams County, CO. Her voter ID number is 7125571. Lindberg, Michael Cj was born in 1998 and he registered to vote, giving his address as 2241 Burnt Oak DR, FRANKTOWN, Douglas County, CO. His voter ID number is 601349373. Lindberg, Michael Paul was born in 1983 and he registered to vote, giving his address as 4790 N Clayton ST, DENVER, Denver County, CO. His voter ID number is 600265586. Lindberg, Michael Robert was born in 1986 and he registered to vote, giving his address as 3200 Azalea DR # T3, FORT COLLINS, Larimer County, CO. His voter ID number is 200361463. Lindberg, Nancy Louise was born in 1940 and she registered to vote, giving her address as 62 Railcar LN, LAKE GEORGE, Park County, CO. Her voter ID number is 559143. Lindberg, Nancy Sue was born in 1960 and she registered to vote, giving her address as 502 Hermosa ST, LOCHBUIE, Weld County, CO. Her voter ID number is 8889935. Lindberg, Nicole Christine was born in 1970 and she registered to vote, giving her address as 1518 S Gaylord ST, DENVER, Denver County, CO. Her voter ID number is 2868464. Lindberg, Noah Benjamin was born in 1987 and he registered to vote, giving his address as 7285 South Boulder RD, BOULDER, Boulder County, CO. His voter ID number is 8381954. Lindberg, Norma Lee was born in 1933 and she registered to vote, giving her address as 126 Lehigh AVE, PUEBLO, Pueblo County, CO. Her voter ID number is 1642563. Lindberg, Patsy M was born in 1956 and she registered to vote, giving her address as 3019 Illinois AVE, COLO SPRINGS, El Paso County, CO. Her voter ID number is 169470. Lindberg, Paul Matthew was born in 1956 and he registered to vote, giving his address as 8333 Wild Alfalfa PL, PARKER, Douglas County, CO. His voter ID number is 815196. Lindberg, Peggy Lavonne was born in 1947 and she registered to vote, giving her address as 7290 Halite CT, CASTLE ROCK, Douglas County, CO. Her voter ID number is 601359948. Lindberg, Ralph Dewitt was born in 1949 and he registered to vote, giving his address as 13300 Dry Gulch RD, SALIDA, Chaffee County, CO. His voter ID number is 4130905. Lindberg, Rene Christine was born in 1995 and she registered to vote, giving her address as 303 Oak AVE, PAONIA, Delta County, CO. Her voter ID number is 600922572. Lindberg, Richard A was born in 1950 and he registered to vote, giving his address as 201 W Polk ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 429522. Lindberg, Robert Edward was born in 1946 and he registered to vote, giving his address as 2857 Vista Mar DR, GRAND JUNCTION, Mesa County, CO. His voter ID number is 2269345. Lindberg, Robert William was born in 1945 and he registered to vote, giving his address as 3011 W Bijou ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 72237. Lindberg, Robin Deanne was born in 1975 and she registered to vote, giving her address as 201 Sumner ST, LAKE GEORGE, Park County, CO. Her voter ID number is 559166. Lindberg, Ronald Lee was born in 1951 and he registered to vote, giving his address as 575 Hartford DR, BOULDER, Boulder County, CO. His voter ID number is 8174408. Lindberg, Rosa Margarita was born in 1956 and she registered to vote, giving her address as 29 Burlington WAY, LONGMONT, Boulder County, CO. Her voter ID number is 8174409. Lindberg, Ross Alan was born in 1959 and he registered to vote, giving his address as 29 Burlington WAY, LONGMONT, Boulder County, CO. His voter ID number is 8174411. Lindberg, Ryan Alexander was born in 1997 and he registered to vote, giving his address as 5880 Gunshot Pass DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601406269. Lindberg, Ryan Carpenter was born in 1990 and he registered to vote, giving his address as 6131 Gorham ST, FREDERICK, Weld County, CO. His voter ID number is 601096592. Lindberg, Sallie Ann was born in 1944 and she registered to vote, giving her address as 662 Alan WAY, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 1011839. Lindberg, Sandra Adele was born in 1961 and she registered to vote, giving her address as 14464 Tierra DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 78214. Lindberg, Sandra Moren was born in 1953 and she registered to vote, giving her address as 280 Shadow Mountain CT, ESTES PARK, Larimer County, CO. Her voter ID number is 1462211. Lindberg, Scott Allen was born in 1969 and he registered to vote, giving his address as 3978 Boulder DR, LOVELAND, Larimer County, CO. His voter ID number is 600760038. Lindberg, Scott Edward was born in 1961 and he registered to vote, giving his address as 2241 Burnt Oak DR, FRANKTOWN, Douglas County, CO. His voter ID number is 5899288. Lindberg, Shannon Marie Taylor was born in 1990 and she registered to vote, giving her address as 1917 S Shields ST # N5, FORT COLLINS, Larimer County, CO. Her voter ID number is 601103040. Lindberg, Sharon Elaine was born in 1947 and she registered to vote, giving her address as 10460 Garland DR, WESTMINSTER, Jefferson County, CO. Her voter ID number is 4191215. Lindberg, Shirley Ann was born in 1945 and she registered to vote, giving her address as 2216 N 6Th ST, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2351818. Lindberg, Stephanie Marie was born in 1983 and she registered to vote, giving her address as 6043 S Niagara CT, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 393238. Lindberg, Stephen T was born in 1939 and he registered to vote, giving his address as 10021 E Grand AVE, GREENWOOD VLG, Arapahoe County, CO. His voter ID number is 780007. Lindberg, Steven Edward was born in 1942 and he registered to vote, giving his address as 1703 Prospect Estates DR, ESTES PARK, Larimer County, CO. His voter ID number is 1565301. Lindberg, Steven Lance was born in 1942 and he registered to vote, giving his address as 62 Railcar LN, LAKE GEORGE, Park County, CO. His voter ID number is 559448. Lindberg, Steven Paul Runo was born in 1965 and he registered to vote, giving his address as 9140 S State Highway 67, SEDALIA, Douglas County, CO. His voter ID number is 601102599. Lindberg, Susan Ann was born in 1962 and she registered to vote, giving her address as 1505 Central AVE, CANON CITY, Fremont County, CO. Her voter ID number is 3671062. Lindberg, Tammy Dawn was born in 1979 and she registered to vote, giving her address as 1011 N Pennsylvania ST APT C, DENVER, Denver County, CO. Her voter ID number is 601201044. Lindberg, Teresa Anita was born in 1979 and she registered to vote, giving her address as 10014 Allison ST, WESTMINSTER, Jefferson County, CO. Her voter ID number is 6300130. Lindberg, Terrell A was born in 1942 and she registered to vote, giving her address as 4767 5800 RD, OLATHE, Montrose County, CO. Her voter ID number is 5353267. Lindberg, Theresa Marie was born in 1954 and she registered to vote, giving her address as 2857 Vista Mar DR, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2270615. Lindberg, Thomas Randolph was born in 1974 and he registered to vote, giving his address as 4961 W 101St AVE, WESTMINSTER, Adams County, CO. His voter ID number is 7094843. Lindberg, Thomas Wayne was born in 1968 and he registered to vote, giving his address as 609 Old Midland SPUR, GLENWOOD SPGS, Garfield County, CO. His voter ID number is 601197837. Lindberg, Timothy M was born in 1957 and he registered to vote, giving his address as 11724 Montgomery CIR, LONGMONT, Weld County, CO. His voter ID number is 6307495. Lindberg, Tracy L was born in 1959 and she registered to vote, giving her address as 440 Long Trail RD, BLACK HAWK, Gilpin County, CO. Her voter ID number is 608518. Lindberg, Tristan Poe was born in 1980 and he registered to vote, giving his address as 8620 Braeswood PT APT 1, COLO SPRINGS, El Paso County, CO. His voter ID number is 601539823. Lindberg, Troy Michael was born in 1969 and he registered to vote, giving his address as 5606 Clover Basin DR, LONGMONT, Boulder County, CO. His voter ID number is 8174417. Lindberg, Viktoria Torsdotter was born in 1976 and she registered to vote, giving her address as 1853 26Th ST APT 401, BOULDER, Boulder County, CO. Her voter ID number is 600265174. Lindberg, Wendy Ann was born in 1978 and she registered to vote, giving her address as 2707 Valmont RD, BOULDER, Boulder County, CO. Her voter ID number is 600660588. Lindberg, Wendy Anne was born in 1975 and she registered to vote, giving her address as 9670 E Prentice CIR, GREENWOOD VLG, Arapahoe County, CO. Her voter ID number is 2958896. Lindberg, Wesley James was born in 1932 and he registered to vote, giving his address as 126 Lehigh AVE, PUEBLO, Pueblo County, CO. His voter ID number is 1642562. Lindberg, William Rowland was born in 1942 and he registered to vote, giving his address as 7290 Halite CT, CASTLE ROCK, Douglas County, CO. His voter ID number is 601059982. Lindberg, Zachariah Lee was born in 1977 and he registered to vote, giving his address as 9946 Kings Canyon DR, PEYTON, El Paso County, CO. His voter ID number is 270918. Lindbergh, Chris Andrew was born in 1978 and he registered to vote, giving his address as 1816 S Taft AVE # 204, LOVELAND, Larimer County, CO. His voter ID number is 600878341. Lindbery, Lorrie was born in 1950 and she registered to vote, giving her address as 7660 E Bates DR, DENVER, Denver County, CO. Her voter ID number is 2743721. Lindblad, Allen Gregory was born in 1980 and he registered to vote, giving his address as 555 E 5Th ST, DELTA, Delta County, CO. His voter ID number is 3546987. Lindblad, Andrew William was born in 1977 and he registered to vote, giving his address as 114 W 3Rd ST, AULT, Weld County, CO. His voter ID number is 6399503. Lindblad, Angela Mae was born in 1977 and she registered to vote, giving her address as 5571 Thurber DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 488944. Lindblad, Christopher Eugene was born in 1988 and he registered to vote, giving his address as 13313 Highway 392, GREELEY, Weld County, CO. His voter ID number is 6377706. Lindblad, Colton David was born in 1991 and he registered to vote, giving his address as 11269 Irma DR, NORTHGLENN, Adams County, CO. His voter ID number is 200363984. Lindblad, Cory Lynn was born in 1970 and he registered to vote, giving his address as 11509 County Road 76, WINDSOR, Weld County, CO. His voter ID number is 6323535. Lindblad, Dane Erik was born in 1989 and he registered to vote, giving his address as 13800 W 7Th AVE, GOLDEN, Jefferson County, CO. His voter ID number is 600121269. Lindblad, David Tyler was born in 1962 and he registered to vote, giving his address as 9375 Stanley Park DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 488943. Lindblad, David William was born in 1968 and he registered to vote, giving his address as 13701 Kearney ST, THORNTON, Adams County, CO. His voter ID number is 4190204. Lindblad, Diana Lyn was born in 1968 and she registered to vote, giving her address as 8002 S Jay DR, LITTLETON, Jefferson County, CO. Her voter ID number is 601319159. Lindblad, Edward Duane was born in 1960 and he registered to vote, giving his address as 5574 Clarence DR, WINDSOR, Weld County, CO. His voter ID number is 601816042. Lindblad, Eileen Louise was born in 1946 and she registered to vote, giving her address as 11565 County Road 76, WINDSOR, Weld County, CO. Her voter ID number is 6323710. Lindblad, Elizabeth Ann was born in 1979 and she registered to vote, giving her address as 555 E 5Th ST, DELTA, Delta County, CO. Her voter ID number is 3555530. Lindblad, Frank Robert Iii was born in 1956 and he registered to vote, giving his address as 12168 Birch ST, THORNTON, Adams County, CO. His voter ID number is 6825668. Lindblad, Gary William was born in 1949 and he registered to vote, giving his address as 11119 County Road 76, WINDSOR, Weld County, CO. His voter ID number is 6323668. Lindblad, Georgia E was born in 1960 and she registered to vote, giving her address as 3898 S Biscay ST, AURORA, Arapahoe County, CO. Her voter ID number is 715042. Lindblad, Glenn E was born in 1954 and he registered to vote, giving his address as 107 N Harris ST, BRECKENRIDGE, Summit County, CO. His voter ID number is 4142445. Lindblad, Heather Breanne was born in 1983 and she registered to vote, giving her address as 510 Jersey LN, COLO SPRINGS, El Paso County, CO. Her voter ID number is 461780. Lindblad, Jacqueline D was born in 1959 and she registered to vote, giving her address as 62050 Chu Chu LN, MONTROSE, Montrose County, CO. Her voter ID number is 200148565. Lindblad, Jasmine Eve was born in 1990 and she registered to vote, giving her address as 13313 Highway 392, GREELEY, Weld County, CO. Her voter ID number is 600129200. Lindblad, Jennifer Dawn was born in 1981 and she registered to vote, giving her address as 11509 County Road 76, WINDSOR, Weld County, CO. Her voter ID number is 6358319. Lindblad, Jonah Edward was born in 1996 and he registered to vote, giving his address as 5574 Clarence DR, WINDSOR, Weld County, CO. His voter ID number is 601828748. Lindblad, Joshua James Eugene was born in 1993 and he registered to vote, giving his address as 2725 W 24Th ST, GREELEY, Weld County, CO. His voter ID number is 601004820. Lindblad, Judith Ann was born in 1958 and she registered to vote, giving her address as 438 Lake Edge DR, BRECKENRIDGE, Summit County, CO. Her voter ID number is 200382111. Lindblad, Kenneth L was born in 1946 and he registered to vote, giving his address as 11565 County Road 76, WINDSOR, Weld County, CO. His voter ID number is 6323709. Lindblad, Lee Eugene was born in 1951 and he registered to vote, giving his address as 13313 Highway 392, GREELEY, Weld County, CO. His voter ID number is 6377113. Lindblad, Maida Lucille was born in 1983 and she registered to vote, giving her address as 114 W 3Rd ST, AULT, Weld County, CO. Her voter ID number is 2742556. Lindblad, Patricia Ann was born in 1947 and she registered to vote, giving her address as 94 Golden Pond PL, PAGOSA SPRINGS, Archuleta County, CO. Her voter ID number is 4759059. Lindblad, Patricia Ann was born in 1934 and she registered to vote, giving her address as 2725 W 24Th ST, GREELEY, Weld County, CO. Her voter ID number is 6897747. Lindblad, Randy Lee was born in 1960 and he registered to vote, giving his address as 62050 Chu Chu LN, MONTROSE, Montrose County, CO. His voter ID number is 320067. Lindblad, Richard Kenneth was born in 1947 and he registered to vote, giving his address as 94 Golden Pond PL, PAGOSA SPRINGS, Archuleta County, CO. His voter ID number is 4759058. Lindblad, Robert Michael was born in 1980 and he registered to vote, giving his address as 3898 S Biscay ST, AURORA, Arapahoe County, CO. His voter ID number is 600769171. Lindblad, Roger David was born in 1947 and he registered to vote, giving his address as 9720 W 97Th DR, WESTMINSTER, Jefferson County, CO. His voter ID number is 4187314. Lindblad, Ross F was born in 1948 and he registered to vote, giving his address as 4219 Prairie Fire CIR, LONGMONT, Boulder County, CO. His voter ID number is 1557770. Lindblad, Ruth Ellen was born in 1948 and she registered to vote, giving her address as 9720 W 97Th DR, WESTMINSTER, Jefferson County, CO. Her voter ID number is 4187738. Lindblad, Sarah P was born in 1954 and she registered to vote, giving her address as 4219 Prairie Fire CIR, LONGMONT, Boulder County, CO. Her voter ID number is 1561444. Lindblad, Sharon was born in 1967 and she registered to vote, giving her address as 5100 Ronald Reagan BLVD # E306, JOHNSTOWN, Larimer County, CO. Her voter ID number is 601301248. Lindblad, Tiffany Rose was born in 1988 and she registered to vote, giving her address as 2725 W 24Th ST, GREELEY, Weld County, CO. Her voter ID number is 7102479. Lindblad, Tina R was born in 1968 and she registered to vote, giving her address as 13701 Kearney ST, THORNTON, Adams County, CO. Her voter ID number is 4189821. Lindblad, Todd Michael was born in 1963 and he registered to vote, giving his address as 2725 W 24Th ST, GREELEY, Weld County, CO. His voter ID number is 6852422. Lindblad, Tyler Reid was born in 1996 and he registered to vote, giving his address as 13701 Kearney ST, THORNTON, Adams County, CO. His voter ID number is 601166940. Lindblad, Virginia was born in 1922 and she registered to vote, giving her address as 11149 County Road 76, WINDSOR, Weld County, CO. Her voter ID number is 6323708. Lindblad, Virginia Lee was born in 1962 and she registered to vote, giving her address as 9375 Stanley Park DR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 3687341. Lindblad-Beebe, Crystal Lorraine was born in 1972 and registered to vote, giving the address as 10845 Clarkson ST, NORTHGLENN, Adams County, CO. Lindblad-Beebe’ voter ID number is 601381277. Lindblade, Nancy Jo was born in 1953 and she registered to vote, giving her address as 489 W Coyote DR, SILVERTHORNE, Summit County, CO. Her voter ID number is 7184032. Lindblade, Thomas Wendel was born in 1957 and he registered to vote, giving his address as 170 Watch Hill DR UNIT D, COLO SPRINGS, El Paso County, CO. His voter ID number is 522375. Lindblad Mcgrath, Carey Alice was born in 1981 and she registered to vote, giving her address as 103 Flat Iron ST, SEVERANCE, Weld County, CO. Her voter ID number is 6327875. Lindblom, Alexis Viola was born in 1990 and she registered to vote, giving her address as 2713 Triple Crown WAY, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600720670. Lindblom, Anderson Marc was born in 1993 and he registered to vote, giving his address as 1248 Paula CIR, MONUMENT, El Paso County, CO. His voter ID number is 600901862. Lindblom, Andre Therese was born in 1968 and she registered to vote, giving her address as 5517 S Foresthill ST, LITTLETON, Arapahoe County, CO. Her voter ID number is 1041738. Lindblom, Benjamin David was born in 1992 and he registered to vote, giving his address as 6421 Redstone CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 200273803. Lindblom, Darcy Diane was born in 1962 and she registered to vote, giving her address as 338 Ouray AVE UNIT B, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 600811304. Lindblom, Darcy N was born in 1984 and she registered to vote, giving her address as 8165 Ammons WAY, ARVADA, Jefferson County, CO. Her voter ID number is 6410432. Lindblom, Darren Wayne was born in 1964 and he registered to vote, giving his address as 6421 Redstone CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 141914. Lindblom, Deborah Colby was born in 1963 and she registered to vote, giving her address as 13746 4100 RD, PAONIA, Delta County, CO. Her voter ID number is 3556647. Lindblom, Debra L was born in 1970 and she registered to vote, giving her address as 325 Christiansen AVE, GRANBY, Grand County, CO. Her voter ID number is 8517164. Lindblom, Dianne Gail was born in 1963 and she registered to vote, giving her address as 5651 Goldpan PL, PARKER, Douglas County, CO. Her voter ID number is 5922325. Lindblom, Douglas John was born in 1958 and he registered to vote, giving his address as 1494 Cherry PL, ERIE, Weld County, CO. His voter ID number is 6378274. Lindblom, Eric John was born in 1956 and he registered to vote, giving his address as 5651 Goldpan PL, PARKER, Douglas County, CO. His voter ID number is 200083462. Lindblom, Erin Colleen was born in 2000 and she registered to vote, giving her address as 1735 Buckingham Hall, BOULDER, Boulder County, CO. Her voter ID number is 601588526. Lindblom, Gerard Bryan was born in 1960 and he registered to vote, giving his address as 16736 E 102Nd PL, COMMERCE CITY, Adams County, CO. His voter ID number is 6949681. Lindblom, Gina L was born in 1966 and she registered to vote, giving her address as 6421 Redstone CIR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 141288. Lindblom, Hannah Kathryn was born in 1996 and she registered to vote, giving her address as 6421 Redstone CIR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601582631. Lindblom, Henry Thomas was born in 1994 and he registered to vote, giving his address as 13746 4100 RD, PAONIA, Delta County, CO. His voter ID number is 600437110. Lindblom, Holly Christina was born in 1980 and she registered to vote, giving her address as 2260 Elkhart ST, AURORA, Adams County, CO. Her voter ID number is 7096464. Lindblom, Ian James was born in 1984 and he registered to vote, giving his address as 8165 Ammons WAY, ARVADA, Jefferson County, CO. His voter ID number is 4185322. Lindblom, Ina Kim was born in 1985 and she registered to vote, giving her address as 48 Sun Up CIR, ERIE, Weld County, CO. Her voter ID number is 933632. Lindblom, James Brian was born in 1985 and he registered to vote, giving his address as 48 Sun Up CIR, ERIE, Weld County, CO. His voter ID number is 2938572. Lindblom, James D was born in 1958 and he registered to vote, giving his address as 1826 Aspen Meadows CIR, FEDERAL HGTS, Adams County, CO. His voter ID number is 6887848. Lindblom, Janine Marie was born in 1959 and she registered to vote, giving her address as 16736 E 102Nd PL, COMMERCE CITY, Adams County, CO. Her voter ID number is 7027428. Lindblom, Jeffrey Eric was born in 1996 and he registered to vote, giving his address as 2212 Vermont DR # F 304, FORT COLLINS, Larimer County, CO. His voter ID number is 600883629. Lindblom, John Efisio was born in 1976 and he registered to vote, giving his address as 953 Deschutes DR, COLO SPRINGS, El Paso County, CO. His voter ID number is 601807080. Lindblom, Judith Ann was born in 1932 and she registered to vote, giving her address as 1494 Cherry PL, ERIE, Weld County, CO. Her voter ID number is 4102361. Lindblom, Kameryn Alexandra was born in 1996 and she registered to vote, giving her address as 6848 Mountain Top LN, COLO SPRINGS, El Paso County, CO. Her voter ID number is 601015635. Lindblom, Katherine Grace was born in 1992 and she registered to vote, giving her address as 1248 Paula CIR, MONUMENT, El Paso County, CO. Her voter ID number is 600510113. Lindblom, Kathryn A was born in 1956 and she registered to vote, giving her address as 11571 W 103Rd DR, WESTMINSTER, Jefferson County, CO. Her voter ID number is 4186445. Lindblom, Keagan Scott was born in 2000 and he registered to vote, giving his address as 11885 W 73Rd DR, ARVADA, Jefferson County, CO. His voter ID number is 601888156. Lindblom, Kevin C was born in 1953 and he registered to vote, giving his address as 11571 W 103Rd DR, WESTMINSTER, Jefferson County, CO. His voter ID number is 4186678. Lindblom, Kristen Nicole was born in 1980 and she registered to vote, giving her address as 8134 E 132Nd PL, THORNTON, Adams County, CO. Her voter ID number is 6884141. Lindblom, Laura Beth was born in 1987 and she registered to vote, giving her address as 16751 E 7Th AVE, AURORA, Arapahoe County, CO. Her voter ID number is 600418167. Lindblom, Leah Twine was born in 1968 and she registered to vote, giving her address as 11885 W 73Rd DR, ARVADA, Jefferson County, CO. Her voter ID number is 4071723. Lindblom, Lyndsy Marie was born in 1982 and she registered to vote, giving her address as 4908 W 32Nd AVE, DENVER, Denver County, CO. Her voter ID number is 2954291. Lindblom, Margaret Ann was born in 1942 and she registered to vote, giving her address as 1712 Grove CT, LONGMONT, Boulder County, CO. Her voter ID number is 8174423. Lindblom, Mark Joseph was born in 1960 and he registered to vote, giving his address as 8557 Coors LOOP, ARVADA, Jefferson County, CO. His voter ID number is 4180091. Lindblom, Michael A was born in 1965 and he registered to vote, giving his address as 4385 E 135Th WAY, THORNTON, Adams County, CO. His voter ID number is 7083988. Lindblom, Samuel Oskar was born in 1991 and he registered to vote, giving his address as 13746 4100 RD, PAONIA, Delta County, CO. His voter ID number is 600437104. Lindblom, Sander was born in 1967 and he registered to vote, giving his address as 325 Christiansen AVE, GRANBY, Grand County, CO. His voter ID number is 8517158. Lindblom, Sara Allison was born in 1988 and she registered to vote, giving her address as 832 Kane DR APT 36, LONGMONT, Boulder County, CO. Her voter ID number is 2937549. Lindblom, Scott C was born in 1975 and he registered to vote, giving his address as 8134 E 132Nd PL, THORNTON, Adams County, CO. His voter ID number is 6944386. Lindblom, Scott Maurice was born in 1963 and he registered to vote, giving his address as 6750 E Chenango AVE APT 340, DENVER, Denver County, CO. His voter ID number is 601967534. Lindblom, Sean Michael was born in 1981 and he registered to vote, giving his address as 11571 W 103Rd DR, WESTMINSTER, Jefferson County, CO. His voter ID number is 4295978. Lindblom, Seth Martinius was born in 1995 and he registered to vote, giving his address as 401 Interlocken BLVD # 3406, BROOMFIELD, Broomfield County, CO. His voter ID number is 600768645. Lindblom, Shayna Marie was born in 1998 and she registered to vote, giving her address as 221 E Fallen Rock RD, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 601207147. Lindblom, Susan Jean was born in 1955 and she registered to vote, giving her address as 264 S Washington ST, DENVER, Denver County, CO. Her voter ID number is 2938571. Lindblom, Therese C was born in 1961 and she registered to vote, giving her address as 1157 S Logan ST, DENVER, Denver County, CO. Her voter ID number is 2408256. Lindblom, Thomas Daniel was born in 1959 and he registered to vote, giving his address as 5500 E Peakview AVE # 3104, CENTENNIAL, Arapahoe County, CO. His voter ID number is 3555285. Lindblom, Todd Christopher was born in 1966 and he registered to vote, giving his address as 5517 S Foresthill ST, LITTLETON, Arapahoe County, CO. His voter ID number is 1045030. Lindblom, William James was born in 1954 and he registered to vote, giving his address as 264 S Washington ST, DENVER, Denver County, CO. His voter ID number is 2938083. Lindbloom, Andrew Dennis was born in 1971 and he registered to vote, giving his address as 6795 Hwy 140, HESPERUS, La Plata County, CO. His voter ID number is 2285338. Lindbloom, Betty Lue was born in 1926 and she registered to vote, giving her address as 4191 S Pontiac ST, DENVER, Denver County, CO. Her voter ID number is 601246675. Lindbloom, Carl E was born in 1961 and he registered to vote, giving his address as 1951 Hwy 24 # UNKNOWN, MINTURN, Eagle County, CO. His voter ID number is 6700042. Lindbloom, Christopher Matthew was born in 1992 and he registered to vote, giving his address as 7141 Beech ST, ARVADA, Jefferson County, CO. His voter ID number is 600494330. Lindbloom, David J was born in 1941 and he registered to vote, giving his address as 2903 Queen ST, COLO SPRINGS, El Paso County, CO. His voter ID number is 516167. Lindbloom, Dawn Renee was born in 1992 and she registered to vote, giving her address as 4861/2 Mcmullin DR, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 601378316. Lindbloom, Dion Riley was born in 1992 and he registered to vote, giving his address as 1290 Highway 6 And 50, LOMA, Mesa County, CO. His voter ID number is 600869135. Lindbloom, Emma B was born in 1961 and she registered to vote, giving her address as 13999 County Road 162, NATHROP, Chaffee County, CO. Her voter ID number is 638982. Lindbloom, Eric Martin was born in 1936 and he registered to vote, giving his address as 3553 N Wyandot ST, DENVER, Denver County, CO. His voter ID number is 2770264. Lindbloom, Gary Richard was born in 1957 and he registered to vote, giving his address as 13999 County Road 162, NATHROP, Chaffee County, CO. His voter ID number is 638987. Lindbloom, Gregory Allen was born in 1976 and he registered to vote, giving his address as 22084 Day Star DR, PARKER, Douglas County, CO. His voter ID number is 718742. Lindbloom, Hans K was born in 1973 and he registered to vote, giving his address as 19 Crystal RD, CARBONDALE, Garfield County, CO. His voter ID number is 5529788. Lindbloom, Heather Elizabeth Jared was born in 1982 and she registered to vote, giving her address as 1317 Lakewood DR, FORT COLLINS, Larimer County, CO. Her voter ID number is 601695167. Lindbloom, Jake Walter was born in 1989 and he registered to vote, giving his address as 8100 W Quincy AVE APT A9, DENVER, Denver County, CO. His voter ID number is 200102244. Lindbloom, Jonathan David was born in 1977 and he registered to vote, giving his address as 1317 Lakewood DR, FORT COLLINS, Larimer County, CO. His voter ID number is 601695134. Lindbloom, Kelsey was born in 1997 and she registered to vote, giving her address as 241 Tomichi AVE, PONCHA SPRINGS, Chaffee County, CO. Her voter ID number is 601102489. Lindbloom, Kenneth Dean Jr was born in 1968 and he registered to vote, giving his address as 14934 Quince WAY, THORNTON, Adams County, CO. His voter ID number is 200100597. Lindbloom, Kenneth Patrick was born in 1953 and he registered to vote, giving his address as 241 Tomichi AVE, PONCHA SPRINGS, Chaffee County, CO. His voter ID number is 633517. Lindbloom, Kimberly Kay was born in 1962 and she registered to vote, giving her address as 13163 Deneb DR, LITTLETON, Douglas County, CO. Her voter ID number is 5696371. Lindbloom, Kristen F was born in 1992 and she registered to vote, giving her address as 5248 E Warren AVE APT B, DENVER, Denver County, CO. Her voter ID number is 600602780. Lindbloom, Lauren was born in 1991 and she registered to vote, giving her address as 7141 Beech ST, ARVADA, Jefferson County, CO. Her voter ID number is 600453097. Lindbloom, Mark Blaine was born in 1959 and registered to vote, giving the address as 3127 E Spaulding AVE UNIT 201, PUEBLO, Pueblo County, CO. Lindbloom’ voter ID number is 601945237. Lindbloom, Melissa Elizabeth was born in 1987 and she registered to vote, giving her address as 1315 Rosewood AVE UNIT 106, BOULDER, Boulder County, CO. Her voter ID number is 601825791. Lindbloom, Melissa Renee was born in 1980 and she registered to vote, giving her address as 6795 Hwy 140, HESPERUS, La Plata County, CO. Her voter ID number is 4953574. Lindbloom, Nancy Lee was born in 1963 and she registered to vote, giving her address as 1951 Hwy 24 # 27, MINTURN, Eagle County, CO. Her voter ID number is 6685909. Lindbloom, Nicholas Julian was born in 1992 and he registered to vote, giving his address as 1730 Elm AVE, GRAND JUNCTION, Mesa County, CO. His voter ID number is 200318818. Lindbloom, Nora M was born in 1920 and she registered to vote, giving her address as 3590 S Pennsylvania ST # 325, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 853771. Lindbloom, Paige Alise was born in 1996 and she registered to vote, giving her address as 6107 Kochia CT UNIT 101, FREDERICK, Weld County, CO. Her voter ID number is 601500578. Lindbloom, Patricia A was born in 1949 and she registered to vote, giving her address as 3069 Hill AVE, GRAND JUNCTION, Mesa County, CO. Her voter ID number is 2307228. Lindbloom, Paul S was born in 1961 and he registered to vote, giving his address as 13163 Deneb DR, LITTLETON, Douglas County, CO. His voter ID number is 5798191. Lindbloom, Peyton was born in 1994 and he registered to vote, giving his address as 14770 Orchard PKWY APT 211, WESTMINSTER, Adams County, CO. His voter ID number is 600653071. Lindbloom, Sara Q was born in 1946 and she registered to vote, giving her address as 2903 Queen ST, COLO SPRINGS, El Paso County, CO. Her voter ID number is 219908. Lindbloom, Scott Matthew was born in 1973 and he registered to vote, giving his address as 722 S 5Th ST, MONTROSE, Montrose County, CO. His voter ID number is 2253446. Lindbloom, Stacy Ann was born in 1980 and she registered to vote, giving her address as 22084 Day Star DR, PARKER, Douglas County, CO. Her voter ID number is 718125. Lindbloom, Susan Melissa was born in 1974 and she registered to vote, giving her address as 19 Crystal RD, CARBONDALE, Garfield County, CO. Her voter ID number is 5529843. Lindbloom, Suzanne Denise was born in 1964 and she registered to vote, giving her address as 14934 Quince WAY, THORNTON, Adams County, CO. Her voter ID number is 1464525. Lindbloom, Tanner Charles was born in 1989 and he registered to vote, giving his address as 4959 S Prince CT # 203, LITTLETON, Arapahoe County, CO. His voter ID number is 601650116. Lindbloom, Tyler James was born in 1997 and he registered to vote, giving his address as 13163 Deneb DR, LITTLETON, Douglas County, CO. His voter ID number is 601458707. Lindbo, Amy Jean was born in 1995 and she registered to vote, giving her address as 780 35 8/10 RD, PALISADE, Mesa County, CO. Her voter ID number is 600961053. Lindbo, Cole Ezra was born in 1999 and he registered to vote, giving his address as 780 35 8/10 RD, PALISADE, Mesa County, CO. His voter ID number is 601128763. Lindbo, Cory Allen was born in 1967 and he registered to vote, giving his address as 780 35 8/10 RD, PALISADE, Mesa County, CO. His voter ID number is 2319226. Lindbo, Jennifer Rae was born in 1970 and she registered to vote, giving her address as 780 35 8/10 RD, PALISADE, Mesa County, CO. Her voter ID number is 2331174. Lindbo, Mandy Rae was born in 1995 and she registered to vote, giving her address as 780 35 8/10 RD, PALISADE, Mesa County, CO. Her voter ID number is 601272599. Lindbom, Brandi Raquel was born in 1989 and she registered to vote, giving her address as 315 Suzann ST, WIGGINS, Morgan County, CO. Her voter ID number is 200055396. Lindbom, Connie Jane was born in 1962 and she registered to vote, giving her address as 3200 Rhythm RD UNIT 925, EVANS, Weld County, CO. Her voter ID number is 601045953. Lindbom, Kory Harold was born in 1985 and he registered to vote, giving his address as 4081 Temple Gulch CIR, LOVELAND, Larimer County, CO. His voter ID number is 600855251. Lindbom, Kristy Mae was born in 1992 and she registered to vote, giving her address as 15043 County Rd 1, WIGGINS, Morgan County, CO. Her voter ID number is 600929329. Lindbom, Lori Ann was born in 1961 and she registered to vote, giving her address as 15043 County Rd 1, WIGGINS, Morgan County, CO. Her voter ID number is 3582160. Lindbom, Malorie Eve was born in 1987 and she registered to vote, giving her address as 3200 Rhythm RD UNIT 925, EVANS, Weld County, CO. Her voter ID number is 600723629. Lindbom, William D was born in 1961 and he registered to vote, giving his address as 15043 County Rd 1, WIGGINS, Morgan County, CO. His voter ID number is 3581899. Lindborg, Beau Whitney was born in 1984 and he registered to vote, giving his address as 1586 County Road 250 APT A, DURANGO, La Plata County, CO. His voter ID number is 601487482. Lindborg, Bonnie Jean was born in 1941 and she registered to vote, giving her address as 8153 County Rd 312, NEW CASTLE, Garfield County, CO. Her voter ID number is 601001700. Lindborg, Dillon Kane was born in 1983 and he registered to vote, giving his address as 1401 W 3Rd AVE # 2, DURANGO, La Plata County, CO. His voter ID number is 6585348. Lindborg, Katrina Mae was born in 1985 and she registered to vote, giving her address as 1401 W 3Rd AVE # 2, DURANGO, La Plata County, CO. Her voter ID number is 6582685. Lindbuchler, Eileen Marie was born in 1980 and she registered to vote, giving her address as 392 Taylor ST, MINTURN, Eagle County, CO. Her voter ID number is 601287324. Lindburg, Ann Elaine was born in 1959 and she registered to vote, giving her address as 16550 Tree Haven ST, HUDSON, Adams County, CO. Her voter ID number is 6837189. Lindburg, Chad M was born in 1972 and he registered to vote, giving his address as 330 Hampstead AVE, CASTLE ROCK, Douglas County, CO. His voter ID number is 854626. Lindburg, Kira was born in 1994 and she registered to vote, giving her address as 1717 Cheyenne AVE # 24, LOVELAND, Larimer County, CO. Her voter ID number is 600546580. Lindburg, Kriston James was born in 1974 and he registered to vote, giving his address as 30 County Rd 525, TABERNASH, Grand County, CO. His voter ID number is 601897609. Lindburg, Lisa Diann was born in 1965 and she registered to vote, giving her address as 1212 Raintree DR # L231, FORT COLLINS, Larimer County, CO. Her voter ID number is 1448357. Lindburg, Lisa Joanne was born in 1976 and she registered to vote, giving her address as 18110 E Progress AVE, CENTENNIAL, Arapahoe County, CO. Her voter ID number is 5920862. Lindburg, Lois R was born in 1938 and she registered to vote, giving her address as 400 S Swadley ST, LAKEWOOD, Jefferson County, CO. Her voter ID number is 3980355. Lindburg, Mariah Lela was born in 1996 and she registered to vote, giving her address as 1212 Raintree DR # L231, FORT COLLINS, Larimer County, CO. Her voter ID number is 600977253. Lindburg, Mary Sue was born in 1954 and she registered to vote, giving her address as 1508 Village LN, FORT COLLINS, Larimer County, CO. Her voter ID number is 1487555. Lindburg, Matthew Glen was born in 1970 and he registered to vote, giving his address as 1805 Alkire ST, GOLDEN, Jefferson County, CO. His voter ID number is 4049039. Lindburg, Paul James was born in 1941 and he registered to vote, giving his address as 7196 Josh Byers WAY, FOUNTAIN, El Paso County, CO. His voter ID number is 8172194. Lindburg, Phyllis Graham was born in 1944 and she registered to vote, giving her address as 7196 Josh Byers WAY, FOUNTAIN, El Paso County, CO. Her voter ID number is 8172195. Lindburg, Robert Andrew Asa was born in 1997 and he registered to vote, giving his address as 18110 E Progress AVE, CENTENNIAL, Arapahoe County, CO. His voter ID number is 601197275. Lindburg, Savannah was born in 1999 and registered to vote, giving the address as 18110 E Progress AVE, CENTENNIAL, Arapahoe County, CO. Lindburg’ voter ID number is 601489137. Lindburg, Scott Leroy was born in 1964 and he registered to vote, giving his address as 728 Harvest Field WAY, FOUNTAIN, El Paso County, CO. His voter ID number is 1452415. Lindburg, Tara Brooke was born in 1975 and she registered to vote, giving her address as 330 Hampstead AVE, CASTLE ROCK, Douglas County, CO. Her voter ID number is 855442. Lindburg-Barge, Andrea Jo was born in 1955 and she registered to vote, giving her address as 7390 Russell CIR, FREDERICK, Weld County, CO. Her voter ID number is 600395717. Linde, Andrea Joy was born in 1971 and she registered to vote, giving her address as 2837 Tincup CIR, BOULDER, Boulder County, CO. Her voter ID number is 8172198. Linde, Anika Eliza was born in 1987 and she registered to vote, giving her address as 3020 Comet ST, FORT COLLINS, Larimer County, CO. Her voter ID number is 600429060. Linde, Brian Mark was born in 1983 and he registered to vote, giving his address as 3455 Table Mesa DR APT K221, BOULDER, Boulder County, CO. His voter ID number is 601078560. Linde, Charleigh Elizabeth was born in 1990 and she registered to vote, giving her address as 1650 S Wyandot ST, DENVER, Denver County, CO. Her voter ID number is 601180601. Linde, Charles William was born in 1952 and he registered to vote, giving his address as 2080 Chancery DR, LOVELAND, Larimer County, CO. His voter ID number is 6962547. Linde, Cheyenne Rae was born in 1991 and she registered to vote, giving her address as 427 S Memphis WAY # 305, AURORA, Arapahoe County, CO. Her voter ID number is 600819105. Linde, Darrell W was born in 1952 and he registered to vote, giving his address as 15665 E Atlantic CIR, AURORA, Arapahoe County, CO. His voter ID number is 700500. Linde, David Lynn was born in 1965 and he registered to vote, giving his address as 310 Miranda AVE APT A, FORT GARLAND, Costilla County, CO. His voter ID number is 601801900. Linde, Dawne L was born in 1961 and she registered to vote, giving her address as 1030 Langness CIR, CALHAN, El Paso County, CO. Her voter ID number is 326204. Linde, Dawson James was born in 1987 and he registered to vote, giving his address as 3020 Comet ST, FORT COLLINS, Larimer County, CO. His voter ID number is 600860839. Linde, Gayle Ann was born in 1952 and she registered to vote, giving her address as 11656 E Cedar AVE, AURORA, Arapahoe County, CO. Her voter ID number is 2958697. Linde, Gina Lee was born in 1956 and she registered to vote, giving her address as 808 Campfire DR, FORT COLLINS, Larimer County, CO. Her voter ID number is 1591467. Linde, Gordon John was born in 1969 and he registered to vote, giving his address as 1109 Hwy 9 # C19, KREMMLING, Grand County, CO. His voter ID number is 200381294. Linde, Gregory M was born in 1980 and registered to vote, giving the address as 3801 W 23Rd AVE, DENVER, Denver County, CO. Linde’ voter ID number is 601797125. Linde, Jeri R was born in 1957 and she registered to vote, giving her address as 180 47Th Avenue CT, GREELEY, Weld County, CO. Her voter ID number is 6372050. Linde, Jessica Erin was born in 1979 and she registered to vote, giving her address as 3095 Blake ST APT 2, DENVER, Denver County, CO. Her voter ID number is 2927491. Linde, Kathy Elaine was born in 1954 and she registered to vote, giving her address as 2080 Chancery DR, LOVELAND, Larimer County, CO. Her voter ID number is 6356856. Linde, Laraine O was born in 1926 and she registered to vote, giving her address as 1819 W Cheyenne RD, COLO SPRINGS, El Paso County, CO. Her voter ID number is 522360. Linde, Mary Lou was born in 1933 and she registered to vote, giving her address as 1521 11Th AVE # 4, GREELEY, Weld County, CO. Her voter ID number is 6347002. Linde, Michael C was born in 1969 and he registered to vote, giving his address as 4882 Guernsey LOOP, CASTLE ROCK, Douglas County, CO. His voter ID number is 2824093. Linde, Michael Drew was born in 1953 and he registered to vote, giving his address as 4707 Daybreak CIR, COLO SPRINGS, El Paso County, CO. His voter ID number is 600613607. Linde, Michael Ethan was born in 1973 and he registered to vote, giving his address as 3632 S Grape ST, DENVER, Denver County, CO. His voter ID number is 2965614. Linde, Mitchell M Louis was born in 1963 and he registered to vote, giving his address as 3549 E 94Th AVE, THORNTON, Adams County, CO. His voter ID number is 7156036. Linde, Peter was born in 1988 and he registered to vote, giving his address as 371 Toronto ST, FORT COLLINS, Larimer County, CO. His voter ID number is 600823014. Linde, Peter John was born in 1956 and he registered to vote, giving his address as 767 Marigold LN, FORT COLLINS, Larimer County, CO. His voter ID number is 1543764. Linde, Robin Lee was born in 1959 and she registered to vote, giving her address as 1050 Hilltop North DR, BAYFIELD, La Plata County, CO. Her voter ID number is 601904406. Linde, Roswitha was born in 1945 and she registered to vote, giving her address as 539 Bross ST, LONGMONT, Boulder County, CO. Her voter ID number is 601579950. Linde, Stephen Dennis was born in 1980 and he registered to vote, giving his address as 2080 Chancery DR, LOVELAND, Larimer County, CO. His voter ID number is 6355514. Linde, Susan Jean was born in 1959 and she registered to vote, giving her address as 2835 10Th ST, BOULDER, Boulder County, CO. Her voter ID number is 8172207. Linde, Thomas H was born in 1956 and he registered to vote, giving his address as 1819 W Cheyenne RD, COLO SPRINGS, El Paso County, CO. His voter ID number is 526055. Linde, Valori Jeanenne was born in 1955 and she registered to vote, giving her address as 4707 Daybreak CIR, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600613632. Linde, Virginia Ann was born in 1937 and she registered to vote, giving her address as 8173 Regiment CT, COLO SPRINGS, El Paso County, CO. Her voter ID number is 600776963. Linde, Wyatt Ogden was born in 1997 and he registered to vote, giving his address as 2835 10Th ST, BOULDER, Boulder County, CO. His voter ID number is 600980300. Lindeberg, Bradley Thomas was born in 1983 and he registered to vote, giving his address as 8169 Field CIR, ARVADA, Jefferson County, CO. His voter ID number is 4259053. Lindeberg, Cassandra Michelle was born in 1986 and she registered to vote, giving her address as 724 W Belleview AVE # H303, ENGLEWOOD, Arapahoe County, CO. Her voter ID number is 4267567. Lindeberg, Claire Aldene was born in 1992 and she registered to vote, giving her address as 3765 S Forest WAY, DENVER, Denver County, CO. Her voter ID number is 200274178. Lindeberg, James J was born in 1962 and he registered to vote, giving his address as 3765 S Forest WAY, DENVER, Denver County, CO. His voter ID number is 2784175. Lindeberg, Janet Kay was born in 1947 and she registered to vote, giving her address as 2804 N County Road 25E, BELLVUE, Larimer County, CO. Her voter ID number is 1401496. Lindeberg, John Barbour was born in 1956 and he registered to vote, giving his address as 7558 Isabell CIR, ARVADA, Jefferson County, CO. His voter ID number is 4195111. Lindeberg, Kathy Jo was born in 1957 and she registered to vote, giving her address as 7558 Isabell CIR, ARVADA, Jefferson County, CO. Her voter ID number is 4196234. Lindeberg, Marcia J was born in 1963 and she registered to vote, giving her address as 3765 S Forest WAY, DENVER, Denver County, CO. Her voter ID number is 2488273. Lindeberg, Natalie Kathleen was born in 1983 and she registered to vote, giving her address as 8169 Field CIR, ARVADA, Jefferson County, CO. Her voter ID number is 600296583. Lindeberg, Nicholas John was born in 1986 and he registered to vote, giving his address as 7558 Isabell CIR, ARVADA, Jefferson County, CO. His voter ID number is 4195407. Lindeberg, Reid Lee was born in 1993 and he registered to vote, giving his address as 3765 S Forest WAY, DENVER, Denver County, CO. His voter ID number is 600368946. Lindeberg, Richard Wilson was born in 1947 and he registered to vote, giving his address as 2804 N County Road 25E, BELLVUE, Larimer County, CO. His voter ID number is 1405069. Lindeberg, Taylor was born in 1989 and he registered to vote, giving his address as 3765 S Forest WAY, DENVER, Denver County, CO. His voter ID number is 200050614. Lindeblad, Alexandra Katherine was born in 1976 and she registered to vote, giving her address as 10725 W 62Nd AVE, ARVADA, Jefferson County, CO. Her voter ID number is 601129817. Lindeblad, Ethan Joseph was born in 2000 and he registered to vote, giving his address as 10725 W 62Nd AVE, ARVADA, Jefferson County, CO. His voter ID number is 601642105. Lindeblad, Jeffrey Warren was born in 1969 and he registered to vote, giving his address as 5942 S Jamestown CT, AURORA, Arapahoe County, CO. His voter ID number is 601851486. Lindeblad, Jennifer Michelle was born in 1974 and she registered to vote, giving her address as 5942 S Jamestown CT, AURORA, Arapahoe County, CO. Her voter ID number is 601886023. Lindeblad, Oliver Chase was born in 2000 and he registered to vote, giving his address as 10725 W 62Nd AVE, ARVADA, Jefferson County, CO. His voter ID number is 601678074. Lindeburg, Edith Helen was born in 1966 and she registered to vote, giving her address as 21882 Whirlaway AVE, PARKER, Douglas County, CO. Her voter ID number is 5906374. Lindeburg, James E was born in 1919 and he registered to vote, giving his address as 29165 Pinon Circle DR, BUENA VISTA, Chaffee County, CO. His voter ID number is 635398. Lindeburg, Nathan Anthony was born in 1960 and he registered to vote, giving his address as 21882 Whirlaway AVE, PARKER, Douglas County, CO. His voter ID number is 5790777. Lindeburgh, Kathleen J was born in 1940 and she registered to vote, giving her address as 11865 Vollmer RD, COLO SPRINGS, El Paso County, CO. Her voter ID number is 336576. Lindeburgh, Timothy Warren was born in 1960 and he registered to vote, giving his address as 11865 Vollmer RD, COLO SPRINGS, El Paso County, CO. His voter ID number is 200253363. Lindeburgh, Warren R was born in 1938 and he registered to vote, giving his address as 11865 Vollmer RD, COLO SPRINGS, El Paso County, CO. His voter ID number is 336577. Lindeburg-Waltz, Deborah Jean was born in 1959 and she registered to vote, giving her address as 7950 Deertrail DR, PARKER, Douglas County, CO. Her voter ID number is 2399216. Lindecker, Brian Raymond was born in 1971 and he registered to vote, giving his address as 604 Brown AVE, FORT COLLINS, Larimer County, CO. His voter ID number is 200030370. Lindecker, Eileen O Malley was born in 1969 and she registered to vote, giving her address as 604 Brown AVE, FORT COLLINS, Larimer County, CO. Her voter ID number is 200010446. Lindecker, Howard James was born in 1943 and he registered to vote, giving his address as 4916 Chippendale DR, FORT COLLINS, Larimer County, CO. His voter ID number is 600905231. Lindecker, Katheryn Eileen was born in 1942 and she registered to vote, giving her address as 4916 Chippendale DR, FORT COLLINS, Larimer County, CO. Her voter ID number is 600905299. Lindecrantz, Greta F was born in 1950 and she registered to vote, giving her address as 3440 N Bryant ST, DENVER, Denver County, CO. Her voter ID number is 2535366. Lindeen, Andrew Johnson Jr was born in 1973 and he registered to vote, giving his address as 5775 W 29Th ST # 302, GREELEY, Weld County, CO. His voter ID number is 601867568. Lindeen, Andrew Johnson was born in 1948 and he registered to vote, giving his address as 1919 23Rd Avenue CT, GREELEY, Weld County, CO. His voter ID number is 6343396. Lindeen, Ashlee Nicole was born in 1996 and she registered to vote, giving her address as 9201 E Mississippi AVE APT N103, DENVER, Denver County, CO. Her voter ID number is 601280886. Lindeen, Carl F was born in 1975 and he registered to vote, giving his address as 3906 W 22Nd ST, GREELEY, Weld County, CO. His voter ID number is 200096314. Lindeen, Carl Gustav was born in 1948 and he registered to vote, giving his address as 1812 23Rd Avenue CT, GREELEY, Weld County, CO. His voter ID number is 601856449. Lindeen, Daniel Ryan was born in 1998 and he registered to vote, giving his address as 1414 Outter Marker RD, CASTLE ROCK, Douglas County, CO. His voter ID number is 601035622. Lindeen, Gordon R Iii was born in 1961 and he registered to vote, giving his address as 7 Bobcat LN, LITTLETON, Jefferson County, CO. His voter ID number is 4099664. Lindeen, Heather Joy was born in 1978 and she registered to vote, giving her address as 31219 County Road 41, GREELEY, Weld County, CO. Her voter ID number is 6326616. Lindeen, Jonathan Michael was born in 1980 and he registered to vote, giving his address as 4236 N Green CT, DENVER, Denver County, CO. His voter ID number is 600252687. Lindeen, Julie Ann was born in 1964 and she registered to vote, giving her address as 2832 W E ST, GREELEY, Weld County, CO. Her voter ID number is 6351412. Lindeen, Karen June was born in 1957 and she registered to vote, giving her address as 1414 Outter Marker RD, CASTLE ROCK, Douglas County, CO. Her voter ID number is 5858822. Lindeen, Ken Arthur was born in 1965 and he registered to vote, giving his address as 8642 W Progress DR, LITTLETON, Jefferson County, CO. His voter ID number is 6418071. Lindeen, Kimberly Lynn was born in 1964 and she registered to vote, giving her address as 11915 S Copper Creek CIR, PARKER, Douglas County, CO. Her voter ID number is 200061702. Lindeen, Lee E Jr was born in 1957 and he registered to vote, giving his address as 1414 Outter Marker RD, CASTLE ROCK, Douglas County, CO. His voter ID number is 5654809. Lindeen, Meggin Marie was born in 1974 and she registered to vote, giving her address as 2702 W 2Nd AVE, DURANGO, La Plata County, CO. Her voter ID number is 5745432. Lindeen, Pamela Ruth was born in 1949 and she registered to vote, giving her address as 1919 23Rd Avenue CT, GREELEY, Weld County, CO. Her voter ID number is 6343397. Lindeen, Paula Lynn was born in 1957 and she registered to vote, giving her address as 7 Bobcat LN, LITTLETON, Jefferson County, CO. Her voter ID number is 4099663. Lindeen, S Matthew Jaydon was born in 1995 and he registered to vote, giving his address as 7447 S Memphis ST, AURORA, Arapahoe County, CO. His voter ID number is 601395243. Lindeen, Stephany Erin was born in 1995 and she registered to vote, giving her address as 1414 Outter Marker RD, CASTLE ROCK, Douglas County, CO. Her voter ID number is 600872513. Lindegren, Samantha Rhea was born in 1988 and she registered to vote, giving her address as 2255 W 46Th AVE, DENVER, Denver County, CO. Her voter ID number is 601853250. Lindegren, Stephanie Ann was born in 1979 and she registered to vote, giving her address as 779 Crawford LN, FAIRPLAY, Park County, CO. Her voter ID number is 561318. Lindegren, Victoria Jean was born in 1994 and she registered to vote, giving her address as 750 Tabor ST # 11, LAKEWOOD, Jefferson County, CO. Her voter ID number is 600758145. Lindeke, Alexander James was born in 1989 and he registered to vote, giving his address as 855 W Dillon RD APT F303, LOUISVILLE, Boulder County, CO. His voter ID number is 600232131. Lindeke, Bruce Fredric was born in 1948 and he registered to vote, giving his address as 2705 University Heights AVE, BOULDER, Boulder County, CO. His voter ID number is 8172212. Lindeke, Christine Geil was born in 1956 and she registered to vote, giving her address as 2705 University Heights AVE, BOULDER, Boulder County, CO. Her voter ID number is 778453. Lindeke, Jeane M was born in 1942 and she registered to vote, giving her address as 845 Poplar AVE, BOULDER, Boulder County, CO. Her voter ID number is 8172213. Lindeke, Loren C was born in 1944 and he registered to vote, giving his address as 845 Poplar AVE, BOULDER, Boulder County, CO. His voter ID number is 8172216. Lindeken, Charles E was born in 1953 and he registered to vote, giving his address as 17027 N County Road 25E, LOVELAND, Larimer County, CO. His voter ID number is 1559119. Lindeken, Katherine Genevieve was born in 1985 and she registered to vote, giving her address as 2214 Antelope RD, FORT COLLINS, Larimer County, CO. Her voter ID number is 1463001. Lindeken, Kimberly Lynn was born in 1980 and she registered to vote, giving her address as 9090 Raging Bull LN, WELLINGTON, Larimer County, CO. Her voter ID number is 1602781. Lindeken, Laurie Jean was born in 1958 and she registered to vote, giving her address as 17027 N County Road 25E, LOVELAND, Larimer County, CO. Her voter ID number is 1558070. Lindekugel, Alden W was born in 1933 and he registered to vote, giving his address as 6351 S Jackson ST, CENTENNIAL, Arapahoe County, CO. His voter ID number is 828188. Lindekugel, William Charles was born in 1975 and registered to vote, giving the address as 1182 Bluebird ST, BRIGHTON, Adams County, CO. Lindekugel’ voter ID number is 601799743. Lindel, Amy Alise was born in 1987 and she registered to vote, giving her address as 4148 S Xavier WAY, DENVER, Denver County, CO. Her voter ID number is 2934907. Lindel, Andrea Marie was born in 1986 and she registered to vote, giving her address as 1559 S Joliet ST, AURORA, Arapahoe County, CO. Her voter ID number is 601426580. Lindel, Donna L was born in 1960 and she registered to vote, giving her address as 4148 S Xavier WAY, DENVER, Denver County, CO. Her voter ID number is 2807831. Lindel, Jacob Christopher was born in 1987 and he registered to vote, giving his address as 2809 S Knoxville WAY, DENVER, Denver County, CO. His voter ID number is 2916802.
2019-04-21T12:09:47Z
http://coloradovoters.info/by_name/pages/l10257.html
Three Indiana United Methodist clergy on their ordination day. At the time I thought: “OK. This is a matter which we can agree to disagree. Some churches are simply going to see this differently. It’s OK that some accept and some don’t.” In short, I thought including women at the highest levels of leadership was optional. 1. First and foremost, I believe that good biblical theology and hermeneutics (a fancy word for principles of interpretation) demand it. I’m not going to recreate the theological arguments here. I think the best job on this has already been done by N. T. Wright. But let me give you a few clues as to how we’ve often gotten this so wrong. The New Testament is one of the most progressive documents in the ancient world on women’s issues. The authors never challenged the patriarchal system of headship because this was the legal designation of their day and there was nothing that they could do to change that (few [none?] of the early Christians had the necessary political standing). So they elevated women within the legal system that they had to the highest levels of legal leadership. We don’t have legal (or even cultural!) prohibitions to women’s leadership so we have the opportunity to carry out the biblical vision of equality of all people within the Kingdom of God. We have a biblical mandate to do that. Update: Some have said that my article made no biblical argument even though I linked to one. So I decided to do a short series that explains the biblical argument for women at all levels of leadership. Please read The Bible Says Women Should Lead – Part 1 for all the Scriptures that show women in ministry, read Part 2 for a reading of the relevant passages in 1 Corinthians, or read Part 3 for relevant passages from 1 Timothy. 2. Secondly, the culture has shifted so far on this issue that we have exchanged our place as the socially progressive institution that we were for generations for the place of a culturally backward one. Now the church may have to be “culturally backward” on some issues because culture sometimes simply goes in a wrong, immoral, and untruthful direction. On this issue it seems clear that culture has gone in the right direction and the church’s insistence otherwise is a great discredit to her (the church is historically spoken of in the feminine) ministry. We are increasingly pushing ourselves to the margins of culture. 3. This is a justice issue and much of the church has gotten it wrong. What is actually happening in most churches? Women are in leadership. They are leading classes, organizing service and outreach, organizing fellowship events, and managing the day to day operations. But when the real decisions are made- the ones that people with influence want to be the ones making- women are excluded from the conversation. It is unjust to use women’s ministry gifts but to then exclude them from leadership decision-making. Some churches have an explicit practice of doing this. Others do so in practice as the real decision-making gets moved to the meeting after the meeting that takes place in the parking lot. If you are from a denomination that ordains women and otherwise affirms their leadership, it is still time to ask whether they are genuinely been given all of the leadership opportunities of men. In the United Methodist Church, one of the places most welcome to women’s leadership, men are 6 times more likely to be appointed to a church of 1,000 plus members. Women are 10% more likely to leave ordained ministry than their male colleagues. And 1/3 of women clergy serve somewhere other than a local church (GBHEM, Clergywoman Profile). This is a justice issue. 4. It is time to raise up a generation of women to share in equal leadership of the church. I serve as the Director of the Lantz Center for Christian Vocation at the University of Indianapolis. The two main functions of our work are to help young people discern God’s call to ministry in all kinds of career fields (health care, social work, science, accounting, etc.) and to train those that are called to church ministry (pastors, youth ministers, missionaries, etc.). It is a regular occurrence for me to meet really gifted young women that I’m convinced God has called to pastoral ministry. Increasingly, the young people that I meet that are the most gifted for church ministry are women. The women simply are (generally speaking) better formed for spiritual leadership than the men are. I’m sure that I will provoke some gender stereo-types here, which is why I gave my parenthetical remarks above, but the current church in America is weak on theology and weak on adventurous mission. Many of the men that I know that have sensed a call for pastoral ministry is because of a passion for theology or radical mission (culturally conditioned or biologically conditioned, this is the motivation that I’ve often noticed). The church in America has been much better at forming communities that are healing, redemptive, and oriented toward spiritual growth. Many women that sense a call to ministry sense that call because of a passion for this kind of community. That is my analysis. It is anecdotal. But I can simply say that my observation as a professional that works in this critical area everyday is that the young women that I teach and pastor are (generally speaking) more ready and gifted than the men to accept a call to ministry. I’m very concerned that many of the women that are most gifted and prepared to enter church ministry are unwilling to accept that call. Some of them will say that they don’t believe women should pastor. Some of them think it but don’t say it. Others subconsciously “know” it but would not be able to articulate it. They “know” it because their church implicitly or explicitly taught them this. Their churches never allowed a woman to speak unless it was on “women’s” issues. The youth rallies that they attended were the same. That just isn’t what women do where they come from. (I wonder if implicitly some of them wonder if no good Christian man would marry them if they were a pastor…because they would be too “powerful” to be able to be “led” by him.) If the church is going to go forward into life and health in an age when the church’s ministry is at a critical place culturally, then we need these powerful young women to be inspired by other women pastors to be the pastors that God has called them to be. If you think this is a fabrication, two of three women in the picture above only entered ministry as a second career and only then with significant hesitation. That had to be convinced by others that they could in fact be pastors because they had been excluded from leadership at an earlier stage. I no longer believe that women’s inclusion in all levels of leadership is an option- it is a must. It is biblical. It is culturally necessary. It is just. It is needed for the church’s future. What can you do to affect change? If you have the power to influence policy, change the structures that prevent women from leading. If you have a voice (teaching, preaching, mentoring, blogging, etc), then use it to inspire young women to leadership and to advocate for change. If you are planning worship, a conference, or other event, invite a woman to preach (and not just about women’s issues). In fact, invite equal numbers of men and women to speak. Do what you can to empower and encourage young women that are considering ministry with prayer, finances, etc. Women clergy are prone to much higher drop out rates than men clergy too, so encourage the female pastors in your life. The Assemblies of God has been ordaining women since the beginning in 1914. Unfortunately, some of congregations have not gotten on board and our free church ecclesiology allows them to stay that way. In some ways, we have a long way to go as well. I hear something similar from the breakaway Methodist denominations like the Wesleyans. They will ordain women, but it is almost impossible for those women to find employment and live out their calling. I think your point about Wesleyan denominations is exactly right. I actually think the same problem is present even in liberal denominations that are on a call system (UCC, Disciples). One good argument for the episcopal system is to protect good pastors from discrimination. I’m Nazarene (one of the “breakaway Methodist denominations”!). We have ordained women since (before!) our founding (a quarter of a century before the UMC began ordaining women). I would agree with the critique about women finding an actual ministry position. On good thing for The Wesleyan Church, not only was JoAnne Lyon elected as one of three general superintendents, when they restructured the denomination so as to have only one gs, she was the one elected. – One would hope that that would be helpful for them. In the CotN, we finally elected a woman as one of 6 general superintendents a couple of quadreniums ago. However, she has since retired, and no other women have served in that position. A number of ordained women in our church (and I’m guessing TWC) have moved to the UMC, where at least they will be assured of having some appointment. Well said , Jeremiah!! “Be the change you wish to see in the world” Your lovely wife is a great example of that …and awesome of you to support and speak out on this !! Amen to you both!!! My wife is a great example of the gift that women clergy are to the church, as you well know! This is such a well thought out and expressed post. Thanks for such a clear hearted and sane perspective. I agree with your post and pray that current elders and board members are able to sense the Holy Spirit and look at their objections to women in leadership roles. Surprisingly, our church has had two women pastors and one local prison chaplain. I think the final step would be a female senior pastor, but as you noted, many people are do not approve of women ministering in areas other than “women issues” (or worship and children’s ministry). Thanks for your thoughtful post. Because I am a woman I was given the title ministry director, while my fellow staff members (men) were ordained pastors. I had just as much (or more) theological training and education and experience however I was the wrong gender to be ordained. Although this hurt deeply for many years, I still maintained my position because I loved the ministry. I eventually resigned because my department needed to be led my a man so that my department would be heard and represented in those elder meetings. My decision to resign was the best decision for the church however the grief I continue to carry is all consuming at times. Thank you for the post. Well written and well thought out. I’m so sorry, Rebecca. You are the stereo-typical example that I was addressing. It’s wrong and unjust. I suspect that most women in your position sense that it is wrong, but they love the church and want to serve. I can only imagine how painful it must have been to see the ministry that you had built do well only after you left and for this reason (even if, like a parent, you were glad to see it succeed). Excellent post Jeremiah. Going to share via Twitter. Thanks. To begin with, I should say that I am PRO-women’s ordination! So, I agree with the conclusion that the article comes to, but I disagree strongly with much of what is said/some of your assumptions. 1) You explicitly equate not ordaining women with “bigotry”. You wrote, “The existence in the secular world of bigotry against women cannot be denied. But there is no place for such an attitude in the Body of Christ.” The problem is that if one understands ordained ministry in such a way that only males should be ordained, that does not necessarily imply bigotry. If God made the world in such a way that he chose only men to be ordained, then it’s not bigotry to do so. It would be obedience to God. Claiming that all churches/denominations that do not ordain women are bigots is absurd and offensive! 2) You wrote, “This is a justice issue.” I couldn’t disagree more. Certainly, there are some who have real problems with women and inappropriately try to keep them down. But, believing that God ordered the world in such a way as to dictate that only men should serve him as ordained ministers is not a justice issue. A woman priest in my denomination recently spoke to a group of women priests and specifically repented for her part (in the ‘70s) of claiming that women’s ordination is a justice issue. It is not a justice issue; it’s a calling issue. 3) A clear assumption displayed in this article (though not explicitly said) is that ordained ministry is the basically same as other forms of ministry. I don’t know of many people who don’t recognize clear and God-given gifts for ministry among women. But, that is different than saying that women should be ordained just because God has given them gifts for ministry. Not all men who have been given gifts for ministry are called to be ordained. First of all, you are right, I intentionally confused the matter of ordination and women’s leadership. The truth is that the only thing that is about ordination is the title and image. That was to make people pay attention. But the article is about women being equal to men in ALL areas of leadership in the church. I happen to come from a denomination that has ALWAYS ordained women and my wife serves one that has for about 90 years or so. Ordination isn’t really the issue for me. I happen to think that we need leadership equality even after ordination conversations are done. Given that you are from the ACNA, you may in fact be right about 2 and 3 within your fellowship. What I did not say is that none of this would be compelling to the Roman Catholic discussion. Their position is on other grounds. Knowing what I do of the ACNA, it wouldn’t surprise me that your argument are somewhat like the Catholic ones. If in fact God ordered the world in that way, then you would be right, denying it would not be bigotry, unjust, or out of the will of God. I would suggest that the biblical argument (of Wright and others) is compelling beyond reasonable doubt. I realize that others will disagree, but that is why I wrote the article. I think to disagree on this issue is to be out of the will of God. I may in fact be wrong. Fortunately I don’t have to the power to declare it for the ACNA. So my response to you would be yes. It is a calling issue. And based on the biblical evidence I would suggest that some women are called to be ordained and lead at the highest levels of leadership just as some men are. If one accepts that the biblical evidence is in support of women in ministry (ordained and all other kinds of leadership) as I do, then it is a justice issue. While I have a lot of respect for the writings of N.T. Wright, I think your evaluation of his paper and condemnation of those who do not agree as being “out of the will of God” is too much.(I did read the N.T. Wright paper) Even N.T. Wright admits “That’s a lot of ‘perhaps’es. We can only guess at the dynamics of the situation – which is of course what historians always do. It’s just that here we are feeling our way in the dark more than usual.” I don’t find his argument compleling beyond reasonable doubt. So there is no discussion, no debate, N.T. Wright “infallibly” speaks for all protestants.(forgive my sarcasm here, but we tend to mock the Catholic church for doing this.) I don’t think this is helpful for the discussion. I would suggest you engage the writing of Dr. Wayne Grudem in his Systematic Theology text and lets have a discussion. Or I would recommend “Women in Ministry: Four Views” edited by Bonnidell and Robert Clouse for more discussion of the ideas surrounding the issue. In no way did I imply that NT Wright infallibly speaks for all Protestants. I simply gave his paper as one easily intelligible summary of the majority scholarship on this issue. Am I saying there should be “no discussion” or “no debate”? Absolutely not. I’m a theologian after all. That is what we do. What I’m saying is that this debate has gone for long enough that persons that still prohibit women in leadership should know that they are going against the majority of biblical scholarship on the issue. And I’m suggesting that there are ethical implications and practical consequences for such a decision. I have read Grudem and the “Four Views” book. In fact I have read about 25 other scholarly monographs on the issue. I do not find the complementarian argument (Grudem’s or others) compelling. And I don’t think others should either. BTW, I fully acknowledge that I may be wrong. But I don’t think I am. Just as Grudem doesn’t think he is. So of course, his ilk think that I am out of the will of God as well. as one who has read grudem, and the other “ilk” (love that btw) and also NT Wright….Great Response! Loved it! As a Nazarene (a Wesleyan-holiness form of Methodism), pastoring in the UMC, and president of the Wesleyan-Anglican Society, I agree with you on both your “pro-women’s ordination” & your critiques. Good thoughts on the topic and thanks for posting. I would like to add that I think the idea that there is a clergy class that women need to be allowed into causes inequality in the Church as well. Every true member of the Body is clergy. It’s not some separate class to be attained. I think a lot of the time we get off topic when campaigning for women’s rights in Church leadership. I am a huge proponent for women’s equality within the Church, but I think the way that happens is to make all of the Church equal. Not by allowing women to be part of the higher levels of leadership, but by getting rid of the idea that there are higher levels. I think the issue is not just about allowing women more access into the system as it currently stands, but it’s about making the system more reflective of Christ, and the fact that He wanted all members of the Church to be equal. Thanks, brother. May I ask your interpretation of passages that encourage followers to obey leadership? I understand the idea of living by walking in mutual submission but there are still passages that directly describe leadership as needed for the bodies survival. As best I’ve been able to understand, those passages have more of a meaning of “be guided by” than “obey,” as in the idea of people ruling over others. I’m no language expert so all I have to go on is what others who know the language say, but that does seem to coincide most with what Jesus said the kingdom should look like (Matt. 20:25-28; 23:8-9 etc.) I believe we are called to follow leaders in the Church when we see they are being led by the Spirit, not because of titles or positions. I just believe leadership is fluid, not resting continually with a specific person or group all the time, and that at certain times certain people are leaders and at other times others are. Everyone can be a leader in their sphere depending on how the Spirit is using them, and everyone should be willing to be a follower to anyone else as long they are being led by the Spirit and showing the character of Christ. We must constantly keep in mind that kingdom leadership looks different than the world’s idea of leadership. And the leaders who follow Christ are not the one who demand others obey, they are the ones who obey. As best I can tell, to be a leader in the Church doesn’t require position or power, in fact it seems to point more to giving up those things like Jesus did. I hope that answers your thoughts and question, I have a lot of directions I keep thinking about going in, but don’t want to get too off subject. For Alan Childers: I’m curious how you understand bishops/overseers and presbyters/elders who were ordained in the NT under apostolic authority, and how you understand the role of the apostles, themselves. It is clear from Scripture that every Christian is a part of the ierateuma (priesthood) of believers, but it is also clear that not all are bishops/overseers or presbyters/elders (who, for example, are appointed by Titus in every city, under the authority of Paul, and who are called to “rule well” in the church). – I’m not calling for a “superior class” of Christians, however, the Scripture does seem to make clear that not every member of the Church is clergy, as that word is defined with any sort of meaning. I had the privilege to serve with a senior pastor who is a woman for three years, and I would be willing to go toe to toe with anyone who claimed she was not called or fit to be a pastor based on her gender. I fully affirm that God calls women, that they should be ordained, and that there is injustice along the lines of gender in the clergy. However, I did always struggle with what I believed and with how I understood what the Bible said. I greatly appreciate the N.T. Wright article that you linked to, because it really helped clear up much of the creative tension I had between believing the authority of scripture and that women should be ordained. Excellent post. Thank you, Jeremiah, for using your voice to be an advocate for women! We women need voices like your’s out there! Thanks for sharing this.it high time women realize their call to serve the lord.JOHN:20:14-18;the first person to be commissioned by jesus himself to preach the gospel of jesus’ resurrection was a woman.Yet it has been a big struggle for women to be ordained as ministers in the church. Women’s ordination has done nothing to promote the church; it is a degradation. These arguments, all from cultural relevance and a cultural notion of “fairness,” apply equally well to same-gender marriage. If Galatians 3:28 is to be the new “clobber text,” then start lining up the male-male couples and marching them down your aisle to the strains of Wagner. If that makes you queasy, and I daresay it does, then consider whither your cheap, unbiblical cultural relativism is leading you. As to “dittoing” N. T. Wright, do your own homework. As for my homework? I have a PhD in theology and have read about 25 monographs in addition to articles, websites, etc., on this subject. You would do well to do the same. It seems to me there is a connection between female ordination and gay marriage. If a woman can take a man’s place in the church, why can’t a man take the woman’s place in the household? Men are to be the heads of their households and the leaders in the church. This was ordained at the beginning: woman was made for man and not the man for the woman. The woman is the suitable helpmate for the man. The devil’s work is to confuse these God ordained roles, as he did in the Garden. He continues to do this. Those who allow this to happen are bringing disorder and confusion on many levels and this leads to destruction. Thankfully nothing can ultimately prevail against Christ’s church and the Lorf is using these issues to separate the wheat from the chaff. This is the folly of worshiping a book written by ignorant sheep-herders 2000+ years ago. There are far too many “Edmunds” in the Christian church, and it will be your religion’s undoing. Certainly not interested in worshiping any book, but curious as to which book you are referring to having been written by ignorant sheep-herders 2000+ years ago. That doesn’t seem to describe any book that I’m familiar with. “I no longer believe that women’s inclusion in all levels of leadership is an option – it is a must. It is biblical. it is culturally necessary. It is just. It is needed to the church’s future. ” Rev.Jeremiah Gibbs. Is it Biblical? Some of us aren’t entirely convinced that it is Biblical. Some of us still would recite 1 Corinthians 11:2-16, 14:34, and 1 Timothy 2:11-15 as evidence. Some just prefer sticking with the voice of the entire tradition of the church which has never accepted women to be priests (debatably has accepted women deacons). You are going the opposite extreme of Roman Orthodoxy ironically which insists those who accept women’s ordination aren’t connected at all to the Church. How is it necessary for the future of the Church? I would love that explained as well if you could. Ironically, I just directed a Bible study this week on 1 Corinthians 11. You do realize, don’t you, that the context of the whole head coverings issue in that chapter is public worship where men and WOMEN are praying and PROPHESYING, right? Further, as chapter 12 indicates, the Spirit gives gifts (a number of which are vocal) for the upbuilding of the Body of Christ, for the common good, according to the Spirit’s choosing. There, there is no indication that the Spirit only gives the verbal, vocal gifts to men, and we already know from chapter 11 that the gift of prophecy is given to both men and women. This is consistent with Peter’s proclamation of Joel’s prophecy on the Day of Pentecost. So, how ever one understands 1 Cor. 14:34, it must be in a way that is consistent with Paul’s claims in 11 that at least some women are preaching just like some men. I understand 1 Cor. 14:34 to be a prohibition against women giving the homily. Why would you just accuse me without even asking me what I believe? That is not what Jesus would do. I never said the Spirit only gives verbal gifts to men either. That also misrepresents my position. But if you are simply going to hurl accusations at me than this discussion is probably over before it even started. I’m just doing my best to follow the teachings of the Bible and the historic Christian church on this issue. I’m sorry, but could you quote one line of “accusation”? Where is there any accusation at all? I replied to your post which said, “Some of us aren’t entirely convinced that it is Biblical. Some of us still would recite 1 Corinthians 11:2-16, 14:34, and 1 Timothy 2:11-15 as evidence.” While the other passages you cited prohibited women speaking in worship, I pointed out that 1 Corinthians 11 indicates that they are prophesying (i.e., proclaiming God’s Word) in worship. I further stated that however one interprets 14:34, it could not be in contradiction to 11. – I said nothing about your views on the gifts of the Spirit, but pointed out that verbal/vocal gifts were given by the Spirit without reference to gender (also indicating that women are less than silent in worship). – All of this was in response to your stating that “some of us aren’t entirely convinced that it is Biblical,” and then your references which included 1 Cor. 11. It felt to me like you jumped to the conclusion that I support these verses as referring to universal silence. I am not God so I don’t know the accurate interpretation of these texts. Some might disagree and allow a women to give an homily even in Catholic services. IDK how to really interpret these texts. I have read LCMS articles which appeal to these texts restricting women’s ordination. I was not saying specifically that I agree with their usage of these texts. My godmother even appeals to these texts when arguing against women’s ordination. So it felt like you were accusing me. Glad we could clear up the misunderstanding. Love the insights on your blog BTW even though I’m not entirely Wesleyan in my theology. Though I appreciate all of your comments, I won’t respond to them all. This one is a particularly uncareful reading of my post so I will respond to that. First, to say that the mounting evidence today (the depth of biblical evidence for a revised position, the wholesale shift in culture, and the need for women’s ministry in the church) is undeniably for womens ordained ministry (and ministry at all levels) is not the same as saying that all others should be excommunicated. Its not to say that earlier fathers and mothers were similarly responsible given the evidence available to them. Rather, it is a judgement of this one particular theologian (in a rather Protestant fashion) to not formally fellowship with those that decide otherwise. I was (at one time) considering whether the ACNA/AMiA churches were the place for me. Their denial/ambiguity on this issue made that untenable. Similarly, while I sent my son to a Catholic school for a while and still worship with my Catholic students regularly, I could not become Catholic (celibate preisthood would also be a barrier for me). None of these people are outside “my church”,-as if any such thing could exist. But, in my judgement these churches have missed the will of God on this issue. Of course, they believe that I have. That is a much less ultimate claim than you think I am making. I too would recite I Cor 11 and I Tim 2, though i believe they say something very different than you apparently do (as you know from my articles). As you also know, I doubt the authenticiy of I Cor 14:34-35. FWIW: I too value the tradition, not infallibly but at least believing it to be Spirit-led. This is the one area where I think even the 2nd century Christians missed the egalitarian (for lack of a better word) Scriptural impulse. Why is it necessary? I’ve already said. This position has always been an error. But in a world where women serve as presidents, CEO’s, AND PRIESTS (in other traditions of Christianity), the prohibition on women’s ordination and leadership is missionally untenable. Though I have not acknowledged it as such in this post, this argument is not convincing to the Catholic argument. I have recognized this in previous discussions though I dont remember where I’ve written as such. The argument you cite from Balthasar and the role of tradition in Catholicism aren’t addressed. I suppose that these kinds of arguments make it impossible to change the RC position. That makes me very sad since I otherwise love the RC very much. It does seem to me like you are excommunicating other Christians when you assert that this issue is not an option. Many non-theistic scholars also conclude 1 Cor. 14:34-35 is not in the original canon. The church says otherwise. I see tradition as quite an infallible interpreter of scripture. How they could’ve possibly missed something we didn’t see is beyond me. It doesn’t make me sad at all that the RC’s position is unchanging as I’m not at all convinced Christianity should kow-tow to culture. I do not have time to address the full role of tradition in this debate other than to emphasize that if you don’t accept the tradition, you in effect have no Bible left over to work with. I’ve experimented with that as a liberal Protestant. Dr. Gibbs, it would be necessary to point out at this point that not every “Christian” (you seem to not consider Catholics, Orthodox, and my own species of Anglicans as Christians in the full sense–that’s okay, neither do we consider you one in the full sense) is convinced that this is a matter of justice. Han Urs von Balthasar takes the position that the role of the priest is to reflect Christ’s role as a bridegroom to the church in administering the eucharist (that would be a theological argument, not a justice argument, against women priests). C.S. Lewis would contend that men reflect God the Father to the people and that a male priest reflects the maleness of God (not entirely certain I agree with Lewis). But the overall point is that most opponents of women’s ordination to the sacerdotal priesthood see this as more of a theological issue than a justice issue so stating it is a justice issue grossly misrepresents other Christians. Liars shall not inherit the kingdom of Heaven regardless of whether they were on the “right” side of women’s ordination or not. That’s it. This whole argument seems fishy. You’re saying Christians who had to practice their religion in secret because it was against the Roman Law had no power to change these systems?!? These were people that were willing to DIE because it was illegal to practice their religion! Your whole set of arguments is unconvincing. Sorry. Funny…St. Epiphanius of Salamis said the same thing about those who ordained women. Honestly, Gibbs. We can’t rely on “Bible alone” to settle this issue and we certainly have to avoid politically charged arguments if we are going to decide what the “right” view on this issue is. I for one am not convinced that either side is right though I certainly believe that Tradition, Scripture, and Theology are against those in favor of women’s ordination. I would highly encourage you to read these two articles I wrote on this subject. The way I read your article, shouldn’t the title be “4 Reasons Why NOT Ordaining Women Is No Longer An Option”? Thank you for this article post. I am a woman who is ordained as a Pastor, but over the years I have had to go pretty much outside denominations. At the moment I feel called to help heal emotional wounds and spiritually uplift women. But my main calling is a Shepherd or in other words , Pastor. I have been Pastor to two small group churches, in an area where there were more male Pastors within the churches. Now I live in an area in a different state and the major denomination in the city is one where women can not be ordained or be called a Pastor. Women have a passion for God, are gifted to preach, and have been serving in the church for centuries. I have prayerfully considered creating an ordaining body and help more women become Pastors. I’m not sure if I will do that but the thought surely has crossed my mind. I hate to see amazingly gifted women left out of the Pastoral ministry because they are women. Thank you again for your post!
2019-04-19T16:36:56Z
https://jeremiahgibbs.com/2013/12/17/4-reasons-why-ordaining-women-is-no-longer-an-option/
That afternoon, the Silver Meteor Army and the Knights of Navarre confronted each other at five hundred alsin (approximately five hundred meters). As if following the gray clouds from the day before, an unspeakable sensation of anxiety ran through the soldiers. Between the armies, slight rays of sunlight passed through small gaps in the cloud cover. While watching the enemy line up in waves, Roland muttered to himself. Though there were different colors amongst the army due to the two nobles involved, the predominant color followed the ZirnitraBlack Dragon Flag. Vice-Commander Olivier received a report. The Knights from Brune Kingdom fought using more than one formation. The one they took up now was called the [Spear] and it was one shaped in a triangle, much like a spear's tip. Roland would take the lead. Normally the leader took the rear, but the man took the role himself so he could penetrate the enemy camp first. He had always done so. Before coming here, Roland sent a messenger to the surroundings. His goal was to receive information on the geography and the number of troops available. Based on the circumstances, he would request reinforcements. He had sent Tigre's messenger away because he did not want to be misled by extraneous information. His sin was more than obvious, since he was with soldiers of Zhcted. Olivier shrugged his shoulders as he heard the Black Knight. Roland's decision was correct. It was the job of the Knights to follow his directions. He pulled out the sacred sword Durandal from his waist and held it to the sky. Hearing his shout, the Knights began chanting. Roland lowered the tip of his sword toward the enemy and inhaled deeply. Five thousand horse-bound Knights kicked off the ground in unison. The earth felt as though it would collapse from the thunderous roar. The members of the Silver Meteor Army consisted of one thousand Brune soldiers following Tigre and Augre with the Zhcted Army numbering four thousand directly behind them. The remaining forces were positioned behind them. The Brune soldiers, though few in number, stood at the front, both here and with their battle of Greast. Though few in number, the Zhcted Army were their allies in the end. However, seeing the Knights rush toward them, shouting for battle, caused them visible unrest. The Brune soldiers clashed with the Navarre cavalry. The Navarre Knights' destructive power exceeded the wall of Brune soldiers. The sight which developed surprised Ellen, Tigre, and Lim. The man who led the spearhead, Roland with his sword in hand, was not stopped by anyone. He killed all who abandoned sword and spear to run away, he cut through shields, and he crushed all who stood in his way using overwhelming force. The horse Roland rode let out a violent neigh, as if reflecting its rider's mind. Its mane was disheveled as it crushed the ground and stepped upon corpses. It simply charged forward. As if they had heard their leader's thoughts, the Knights fought off the Brune soldiers and thrust through them, following Roland's power in waves of rage. --- He's strong. He's too fast, too. Ellen and Lim did not have a lack in plans; they had thought of a number of countermeasures, but they had no room to fully develop them all. Though, despite their young age, they had large amounts of experience in war, but it was their first time seeing such power and speed. Without waiting for her unsociable aide to speak, Ellen kicked the stomach of her horse and jumped out, making her way through the soldiers as she pulled out the longsword at her waist. She ran to Roland nonstop like a savage beast. Seeing him close at hand, Ellen instinctively took a deep breath. Roland stood there, large enough to be a giant. He was the only one in black armor which doubled, tripled the size of his frame. His very presence overwhelmed all else. An unprecedented chill ran down the back of the Vanadis of the Silver Flash. They were within attacking distance. It was as if a light exploded between them. Their clash made those in the surroundings flinch. Ellen's beautiful face was dyed in astonishment. They had struck each other once, yet Ellen's right arm had become numb. She could only pray her arm would not be blown away. Ellen's horse staggered; it was exhausted, falling back step by step, regardless of the instructions of its rider. The Black Knight finally stopped moving as he looked at Ellen without hiding his surprise. Roland brandished his sword before her. Ellen released her hands from the reins and clutched her longsword with both hands. Again, an intense clash occurred, but it was not just once. Many attacks in quick succession occurred, tearing through the air. Sparks scattered with every meeting of their weapons, the soldiers held their breath. Ellen clenched her teeth. The man of black had both power and technique. Furthermore, he wielded his large sword as if he were sweeping a spear, despite its massive weight. Though he could cut through the earth, Ellen managed to somehow hold her ground. With every blow Roland gave, she struck a blow in turn. One slice flew through the neck of Ellen's horse. Without slowing down, it approached her. Ellen immediately removed her feet and jumped away to the ground to ward off his attack. The headless horse fell to the earth. Unexpectedly, the Silver Flash in her hand let off a dull blue light for a moment, and a faint wind blew over its owner. Arifal's intent was transmitted with the wind. It was telling her to [Be Wary of that Sword]. Though Ellen was confused, she recovered immediately. Her ViraltDragonic Tool never lied to her. Ellen looked up at the Black Knight and carefully took her distance. Roland gazed sharply at Arifal. Ellen answered honestly. Though Roland's face was incredulous, he did not pursue any further. --- Not good, that blade is the same. Ellen spoke bitterly in her mind. Roland's Herculean strength which could cleave through the enemy's armor was demonstrated in full with his sword. An ordinary weapon would simply shatter. To protect Ellen, ten of Zhcted's cavalry rushed Roland, with their spears. Along with Ellen's shout, Roland's sword cleaved through them all at once. The soldiers of Zhcted were torn like blades of grass, their flesh, blood, and bones scattered about the ground. Not a single spear reached Roland. His overwhelming strength brought this doubt to her mind. It was like watching a nightmare. It was the last resort and the strongest attack of the Vanadis. The thought grazed the corner of her mind. However, the other person was human, even if his weapon was abnormal. When he asked those words, Ellen noticed he had not declared his name. Her red eyes looked strongly at Roland. Roland looked down with a will to fight in his black pupils. Ellen looked in his eyes. Roland ignored her gaze and lifted his sword... But his movements stopped. The soldiers of Zhcted had divided, a man with dull red hair and black bow in hand rode in on a horse as he nocked his arrow. Ellen involuntarily called out his name. Tigre stared harshly at Roland, completely unaffected by the raging battle beside him. He remained still like a statue. Roland frowned as he stared at Tigre. He aimed his sword toward Tigre's neck as he ran by on his horse. Tigre drew his bowstring to its limit, though he did not release it. The two men's distance narrowed. Immediately before entering the sword's range, Tigre bent his body, almost horizontally, as he hung off the horse. Roland's swing shook the wind; the response was shallow. At that time, Tigre shot his arrow, but with his unreasonable posture, it flew toward the sky, directly above Roland. The two ran about on horseback. As Tigre approached Ellen, he reached his arm out. Ellen jumped lightly on the horse after grabbing his hand. On the other hand, Roland, who had kept a fixed distance from Tigre, began to follow him more closely. --- I won't let you escape. If it was a horse with two people on it, he would easily catch up. At that time, the sound of the wind being cut ran by the Black Knight's ears. Before he was aware of it, an arrow was driven deep into the head of Roland's horse. The arrow drove through the horse's jaw. The horse's legs folded as it collapsed. Roland's face was dyed in astonishment. The arrow Tigre shot was aimed toward the sky. It drew an arc and fell, depriving Roland of his mobility. With him standing on the ground, the cavalry of Zhcted rushed Roland thinking he was vulnerable, their spears coming from many directions. The dark haired Knight should have been skewered, but he jumped up and, like an argent whirlwind, cleaved both men and horse together. Roland stood like a large tree, taking root in his place as he twirled his sword. The surroundings were filled with blood and screams. His black armor was dyed red. Many Knights of Navarre followed Tigre and Ellen on horseback, but they could not catch up. Tigre had turned around and fired arrows in quick succession. With the sound of the arrows and the bowstring being pulled back, he had shot multiple arrows at a time, all of them successfully hitting their target. He had pierced their face and belly. Knights, one after another, fell down as their horses collapsed. Some of them were directly hit by arrows, flipping about as they fell off their steed. Ellen tried to smile at Tigre but stopped speaking as her eyes were dyed in red. From his left shoulder to his right flank, Tigre had a large, straight wound. His black leather armor and clothes were dyed red, his skin wet with sweat, his face pallid, his breathing rough. Although it seemed like Tigre had dodged Durandal when he and Roland crossed paths, he had not been able to avoid it completely. Firing his bow toward the Knights only served to open it further. Tigre's body began to fall. Ellen stretched her hands out and gripped the reins from behind him as she supported him with her right hand which held her Silver Flash. Her arm was dyed red immediately. The soldiers of Zhcted were pushed aside. The Knights of Navarre held up heavy shields to block the rain of arrows, accepted the challenge of all who took sword or spear to them, or rushed forward and pushed them aside. They followed closely after Ellen and Tigre. Realizing they had pulled out javelins, Tigre nocked another arrow, yet he did not have the strength to draw his bowstring. Ellen clenched her teeth. If she took her blade, Tigre would lose his support and would surely fall from the horse. To make matters worse, the horse's legs broke and it fell forward. The two were thrown to the ground. Though Ellen endured the pain and pulled her body up immediately, Tigre, who had not released his bow, could not stand. Ellen ran to Tigre and lifted him in her arms. A dozen javelins were thrown at them all at once. A voice called out between Ellen and the javelins. Her golden hair symbolized her gentle nature; her beryl eyes expressed her dignity. She stood before them in a pale green dress, unsuitable to the battlefield. Not a fragment of her smile existed on her face. Sophia Obertas stood there, as if to protect Ellen and the others. A golden light fell from the tip of her Light Flower and turned lightly in her hand. Without melting into the air, it flowed through the space before Sophie, drawing a perfect circle. The circle of light glittered, releasing a silver-white spiral. The spiral formed a broad barrier, surrounding a golden ring inside. The wall of transparent light completely encompassed Sophie. The spears thrown by the Knights of Navarre hit the wall of light and fell to the ground. The Knights opened their eyes widely and let out a sound of astonishment. A curtain of mysterious light appeared when the woman in a dress showed up. The event was beyond their understanding. She looked back at the silver-white haired Vanadis. Her beryl eyes prompted her to move to a horse standing nearby. Ellen managed to stand up while supporting Tigre, placing the bloody man on the horse before mounting it herself. After they exchanged a quick word, the Knights of Navarre promptly recovered and took up their swords. They charged; however, their horses stopped as if they had run into an invisible wall. The Knights flinched. Though they may have been able to chase after Ellen if they avoided Sophie's wall of light, no one could make such a calm judgment. A large number of Knights were held back by a single woman. From behind, a low voice called out. It was a voice of salvation for the Knights. Roland lowered his large sword and had finally caught up on a new horse. A shiver ran through Sophie's body. In her hands, the Light Flower warned her with a small glow of golden light from the tip of her bishop staff. It warned her of danger, just like Ellen's Silver Flash. The jet black Knight did not flinch even after seeing the wall of light. With his sacred sword in hand, Roland continued tensing all the muscles in his body, its sound clearly audible. It was not a false show of power. The Black Knight spoke seriously. Sophie said “Oh my” out of habit, but there was no strength in her voice. The bishop staff glowed as Sophie smiled brilliantly. Roland's horse kicked off the ground as he thrust straight toward the wall of light. The moment Durandal hit the wall, the light became iridescent, the sound of shattering glass hit her eardrums. The circle of glittering gold stopped shining immediately. It was cut in two, and the particles of light dispersed through the air. Though Sophie's eyes showed her surprise, her hands continued to manipulate her bishop staff. Roland's swing tore through the domain of light Sophie had built. Sophie's bishop staff caught the heavy blow; she was forced to retreat by the frightening blade. Roland rode forward to cut her down, but he pulled his hand aside as he saw countless grains of light engulf Sophie's body. The lights were the size of a nail and began blinking before Sophie's body. Without a sound, both Sophie and the light disappeared. The Knights were astonished once again. They turned to their leader. --- I can't see her, but... little by little, she's escaping. Roland did not understand what Sophie had done, but he noticed she had run away. --- It's troublesome, but it looks like she's another one of them. After making that judgment, Roland looked at the soldiers surrounding him. Hearing his words with no sign of a lack of will to fight, the Knights regained their energy. No matter what, they believed they would find no greater Knight on the continent, let alone in Brune. When word of Tigre, the General, being injured spread, the Silver Meteor Army collapsed and was routed. They threw aside their arms and turned away. The Knights of Navarre swung their swords and thrust their spears without mercy. The confusion only accelerated with the passage of time. It took all Ellen and Lim could to to prevent the army from collapsing. Though they had managed to pull the soldiers away, the soldiers of Brune led by Viscount Augre were small in number. Though Roland took lead in the battle and chased after the enemy with his sacred sword, he stopped when he heard a sudden noise. A Knight appeared without breath to give him a report. The cavalry behind the Navarre Knights wielded sword and spear, catching the Knights, who felt they had won the battle, completely off guard. --- Was this their plan? No, it feels too late. Regardless, Roland was forced to end the chase and took measures to reorganize his troops. He looked up to the sky. The gray clouds had broken, the darkness before the battle now gone. Roland felt like the darkness had followed the Silver Meteor Army, given the timing. Against the early sunset of an approaching winter, chasing the enemy any further would only serve to scatter his troops. Shaking his thick neck to the right and left, Roland reconsidered. If he were in a position where he did not need to worry about the King's Capital or the western borders, he may have continued pursuit. Roland decided to place his trust in Dukes Thenardier and Ganelon who ordered him to battle. The Knights of Navarre took orders only from the capital. They had received a royal command from the King's Capital. However, King Faron was ill and was unable to grant an audience to Roland. The command was to kill Earl Vorn and the Zhcted Army. It was received from Dukes Ganelon and Thenardier. The written instructions were, without a doubt, written by the King, as it was marked with the royal seal. Roland had to simply follow his duties as a Knight. Still, soldiers can never move on their own. If he asked any more of Thenardier who had summoned him from the west, Roland would only feel he was being nosy. Rather than the battle before him, Roland watched the movements of the allies who appeared to his rear from the King's Capital. --- His Majesty's enemies are my enemy. Even if one person remains, I will cut them down with my blade. Roland was an orphan. He was abandoned at the foot of the Ruberon Mountains near the royal capital Nice. A shrine maiden working in the temple at the summit of the mountains found the pitiful baby as she made her way from the market at the foot of the castle walls. She had lost her parents; her birthplace had collapsed. Rather than leaving the child, she decided to convince those of the temple to raise it. Though he was raised surrounded by God, the boy grew up with an interest in the founder, King Charles, who revived Brune Kingdom. The temple contained his coffin as well as many other relics. Furthermore, Roland's body had a higher aptitude as a fighter than a priest. Though there was nothing noteworthy about his reading and writing, his body, compared to children of the same age, was strong, and he was good with anything that involved movement. Though he was determined to become a Knight, there was one encounter he remembered. On a certain day at a certain time, Faron, who was still Prince at the time, visited the temple for business. Roland did not know what the business was, he just remembered that Faron called out to the large boy. The prince asked the boy his name. The boy said “Roland.” Faron smiled from ear to ear. Roland was deeply moved. He had thought he was better suited to wielding a sword than praying to God. Furthermore, these were words from the Prince of a country. He felt so much joy that he wished to run about. In fact, Roland's name was not so rare in Brune, and Faron, who was learning to be King, could recite the name of all soldiers serving under King Charles from memory. Though no one could call it a particularly miraculous coincidence, Roland did not know that. Even if he did, he was unlikely to worry. The next day, Roland dedicated his life to becoming a Knight. He begged a Knight to teach him the sword, spear, and the art of horse riding. It did not take him much time to surpass the other Knights. He took the trial at the age of 13. He remembered the pleasure when he became a Knight. Though he was glad to become a Knight, Roland would hear Faron, who had just become King, speak at his conferment ceremony. Even if he had himself forgotten much of the meeting the next day, the King remembered him. At this time, Roland had almost complete loyalty to Faron. Eight years later, he received the sacred sword of the Kingdom, Durandal. All Knights likened him to the warrior of legend, the [Knight of Knights]. That is why Roland fought. He fought for the King, fought for the Kingdom. He would not listen to the words of the enemy. It was not a problem until now. He was not supposed to have reached such an obstacle. So long as he lived his life as a Knight, he would continue down this path. Olivier appeared, having reorganized the ranks. Roland asked him a question. Olivier, who was in the immediate vicinity when Roland suppressed Ellen, had prepared a horse for Roland immediately. Sure enough, he had caught sight of Tigre. Roland groaned. Olivier looked curiously at him from the side. Finally, Roland looked back at Olivier, the smile on his face exuding a strong will to fight. Olivier's face showed he did not understand. Roland explained while laughing merrily. If he killed the horse, it was possible to deprive Roland of his mobility. Above all, Tigre had aimed at him simply to help the silver-white haired Vanadis. “I have also been called a monster by those of Sachstein and Asvarre.” He cut down the enemy and their horses casually, as if it was nothing. He showed no sign of fatigue. He took command and simply moved on. Towards his enemies, he was nothing but a monster. Olivier sighed while the Black Knight laughed and told him not to worry. About seven belsta from the battlefield (approximately seven kilometers), the Silver Meteor Army had barely reorganized their formation. The soldiers lost numbered eight hundred, the number injured nearly double that. For an army six thousand strong, it was a crushing defeat. Hearing the damage report, neither Ellen, Lim, nor Augre could speak. The situation itself was distressing, but Tigre's injury only made it more serious. The young General was carried in on a stretcher and was tended to by Teita. He had yet to awaken. The only good news was the appearance of reinforcements. The three hundred cavalry had disrupted the Knights of Navarre who chased after them. They passed through the battlefield and joined the Silver Meteor Army. A request for an audience came from the person leading them. Though Ellen was exhausted, she approved of the meeting at once. Before long, an old Knight with a gray beard, his stocky body wrapped in armor, visited Ellen's tent and courteously bowed. Before Ellen could speak, Lim returned his bow and greeted him. Ellen took the old Knight's hand with a smile and sincerely thanked him for his help. Massas began to frown. Though he did not intend to look down on Ellen, Massas had come here for Tigre's sake. After a moment of hesitation, she reported that Tigre was injured. His short beard trembled as he spoke those words, an intense shock and sense of regret was clearly visible on his face. Incidentally, Massas had lived for more than five decades and had seen the death of many close acquaintances. Ellen's response did not conceal her overflowing sense of shame. Beside her, Lim's azure eyes were pensive as she maintained her silence like a statue. Augre and Sophie appeared, blowing away the heavy atmosphere. Massas mood changed upon seeing their faces, glad by their reunion. Though fatigue was clearly in his face, his sense of defeat was considerably eased. Though Augre and Sophie were worried about Tigre, they acted as calmly as usual, bringing a sense of calm to the surroundings. Ellen agreed with Augre's words. Lim also nodded. Sophie bowed gratefully to the old Knight. After the comment from Sophie, the three looked at Massas who stroked his beard, lost in thought. It happened approximately twenty days before the defeat of the Silver Meteor Army. It is said that, in the Kingdom of Brune, King Charles received the sacred blade Durandal at Ruberon. King Charles traveled about many battlefields, wielding Durandal all the meanwhile. His victories revived many towns about Brune Kingdom. Charles dedicated his gratitude to the Gods and established a shrine in the mountains of Ruberon, and he built his Royal Palace halfway up so he could meet with the spirits. The town at the foot of the mountain prospered; before long, the castle was moved down to the city. And so, the Royal Capital of Nice was established. It acted as an important way point in Brune which connected the east and west sides of the continent. All people passing from Zhcted or Muozinel to Sachstein or Asvarre, save for those with extenuating circumstances, would pass through the city. With a river flowing from the top of the mountain through the city and the highway in the vicinity, many goods from various countries flooded through the city, bringing a heat and energy to the capital. In the luxurious Royal Palace at the foot of the mountain, there was a garden where many flowers bloomed in the small hills, decorated by cleverly carved fountains. It was a piece of artwork with a crystalline beauty, a garden nonexistent in either Zhcted or Muozinel. It was a symbol of Brune's prosperity. Massas Rodant passed through the garden quickly. There was a rampart surrounding the area, so ordinary citizens could not make it so far into the Royal Palace. With a sonorous voice, he presented a medal indicating his title to the soldiers who defended the castle gate. After confirming his identity, the soldiers opened the castle gate. His stocky body shook as he headed up the flight of steps. The second rampart entered his view. He showed his medal once again and entrusted his weapons to the guard as the gate was opened. Having been exposed to the cold air of winter in the mountains, Massas was soaked in sweat. It was not from the fatigue of running up the stairs at a brisk pace but his tension. The Palace was filled with white marble and decorated with gold. Many of the imperial guards wore a white mantle and walked about to defend the area. Unlike an average soldier, they did not even flinch seeing an aristocrat; rather, they looked at Massas with a severe glance and spoke sternly. --- It's no different here. He waited for some time. Though he remained quiet, he felt a heavy weight in the pit of his stomach. Though he was an acquaintance of the Prime Minister, he had not scheduled a meeting. He was somewhat intimate with him since childhood, and it could serve as a way to have his audience more easily, but, should any sign of deception be found, he would be captured immediately and sent to prison without being given an opportunity to explain. After the confirmation was complete, the Imperial Guard bowed to Massas. Massas stroked his gray beard as he passed through the doors to the royal palace. After the aristocrat and Imperial Guards walked along the polished marble floor, the King's chambers finally came into view. --- I doubt I will have an audience, nor did I receive a response. I will simply have to speak directly and have him listen to my words. Massas had arrived at the Royal Capital more than ten days prior. Rather than recovering from the fatigue of travel, Massas moved aggressively and requested a meeting with the King the day he arrived. However, Massas was forced to give up immediately. The Royal Palace affairs had been made private by Dukes Thenardier and Ganelon. He would not be able to meet the King any time soon. He walked about and visited his friends. Every person answered his question in that manner, though a few spoke even further. He could not possibly do that. Both were enemies. Massas was outraged. After thinking about it anxiously, he decided he would try to directly meet and speak to the King. Before the King's private chambers, the Imperial Guards naturally stood. The room next to it was a private room where the Imperial Guards relaxed. Should anyone call, they could respond immediately. While stroking his gray beard, Massas looked around at the guards and the passage. --- It is impossible to go any further than this unless I am a powerful noble. No, his maid can also enter his chambers. It was impossible to meet the King. Massas gently touched something enshrouded in his clothes. It was a letter to the King with information regarding the conduct of Duke Thenardier toward Tigre's lands written, including why he invited the Zhcted Army into his lands. --- Like I thought, I can do nothing but ask his maid or attendant. The maid and attendant worked in the vicinity. Since they received a large salary, they could not be bribed with money, nor could Massas lie about his status to get in contact with their relatives. Though light, there was gossip about a scandal. Those who wish to know of such talks could be found anywhere, including the deepest part of the Palace. --- He was once absorbed in divination... Though there is no concrete evidence, it is something held in derision. Massas was immersed in a bittersweet emotion when a voice called to him from the side. Turning around in surprise, he saw a man standing before him, wrapped in a gray uniform. He had a round outline, but if one were to describe his features, they would say they were most akin to a cat. He also had a long gray beard and mustache. Massas groaned. He was the Prime Minister of Brune who assisted in the King's affairs. The cat-faced man was the pinnacle of all officials. Seeing the Imperial Guards glare at Massas who remained silent on the spot, Bodwin spoke with a quiet tone, though his eyes were sharp. If he complained, the Imperial Guards might make a move. Letting out a sigh, Massas simply followed after Bodwin. Massas and Bodwin had known each other before Bodwin became Prime Minister, and they remained on good terms, even with their change in position; however, he could not depend too strongly on that friendship given his rank. Massas was led to one of the rooms used for official conferences. It was a small room without a window in which a large desk and chair were placed. Massas had a bitter face as he responded to Bodwin. Grape wine which had fermented for too long became grape vinegar. Massas responded promptly to Bodwin's straight forward question. Though it should have been clear with those two phrases, Bodwin looked at him calmly. He waited for more. Massas sat up straight and glared at Bodwin across the desk. Bodwin was the Prime Minister. He assisted the King and aided with affairs of the state. Though he could understand Massas' position, he could not help but argue. Bodwin closed his eyes and withstood the words. He sat in his chair and waited for Massas to take a breath before opening his eyes. Bodwin called him Massas, rather than Earl Rodant. --- He is not answering as Prime Minister. After Massas consented with a nod, Bodwin stood up. The two left the room and walked down a corridor. They passed the King's private chambers and returned to the place where Massas met Bodwin. Massas could not help but be wary of what was happening. Bodwin did not answer, he simply continued to walk down the corridor in silence. Massas reluctantly followed after. The Imperial Guards allowed the two to pass in silence. Before a set of double doors, Bodwin stopped walking. On the surface of the door, a magnificent carving of the founder, King Charles, was engraved. It was the King's private room. After confirming it with the Imperial Guards who stood at the door side, Bodwin turned around and faced Massas. He was saying Massas could listen into the King's room. Though he hesitated, the man's complexion did not change. He faced the cat-eyed man as if possessed. Ignoring his worries, Massas brought his face close to the door. --- I can hear something. A faint noise. It's hard to hear, but it sounds like stone or wood hitting against one another. After about ten seconds, Massas separated from the doorway. He spoke to Bodwin. Massas face tightened. He nearly shouted. Bodwin bowed to the Imperial Guards and moved down the corridor. Massas followed after him; the two returned to their previous room. Massas sat in the chair in disbelief having heard the true nature of those sounds. Sweat floated to his face and hands; his heart throbbed violently enough that he could feel pain. King Faron of Brune was a 41 year old man. He was excellent in both domestic affairs and diplomacy before he took to the throne. He had not changed at all once he became King, which led to an increase in the prosperity of the people. He brought peace to the nation. Massas had seen King Faron's reign as a local aristocrat. The shock was great. Massas looked at Bodwin suspiciously. He would not show him this much or explain this far just because they were acquaintances. The cat-faced Prime Minister read Massas' questioning gaze and continued to feign ignorance. --- So that's why my petition was ignored. Massas considered it, but the words Bodwin spoke next were beyond his expectation. A voice leaked from Massas mouth, his face now strong with anger. The old Earl spoke in a gentle tone, despite his rage. It had to do with the alignment of the aristocracy's interests. It may be necessary to have nobles with wide connections take action. Normally, the King would take care of this matter, but powerful nobles who were loyal to the King could cope with such tasks fairly well. Should the defenders of the country be moved for domestic affairs, the borders would be undermanned, so it was rare that they were moved for such reasons. Though Massas was frustrated already, he threw out another question in a quiet voice. Bodwin responded clearly as Massas let out a heavy breath. Massas stood with passion and struck his palm against the desk. Bodwin also stood up, knocking his chair over in the process, and tightly grasped the table. An intense atmosphere ran inside the room. The elderly man and the Prime Minister faced each other in anger. Both Massas and Bodwin took deep breaths to expel their anger. In a quiet voice, Bodwin called to Massas who had turned away. Massas gave thought to raise his voice, but he chose to wait. The cat-faced Prime Minister continued. Massas looked doubtful. Was there such a person? It would be impossible to avoid being disgraced as a rebel should one do that, even for Dukes Ganelon and Thenardier. Massas frowned as he stroked his gray beard wildly. Once he finished speaking, Bodwin left the room. Massas turned around and let out a deep breath as he stared at the door. It was clear. He would obtain no help, but it was good that he had received an answer. --- Anyway, we need to get rid of Duke Thenardier. At a brisk pace, slow enough not to disregard manners, Massas left the palace. The sun had gone down, and the white marble was dyed vermillion. The sword he entrusted to the guards at the second rampart was returned. Massas passed through the popular garden and stopped his feet. He perceived a glance with murderous intent. He did not think it strange. Both Thenardier and Ganelon would feel Massas a hindrance. They would find it necessary to punish him for his meeting in the Royal Palace. --- It's good I won't involve others. Placing his hand on the hilt of his sword, Massas looked at the surroundings. In this vast garden, many skillfully made sculptures dotted the land. The thick foliage and flower beds were elaborate, and gave a vivid color to the surroundings. There was no shortage of places to hide, so it was simple for an assassin to move about. While searching for the position of the blood thirst, Massas walked forward and stopped before a certain sculpture. --- Not good. He's behind me. He was covered in a cold sweat. It was dangerous to move any further. Against the backdrop of sculptures, Massas pulled out his sword. A shadow appeared, a bright light reflecting off a drawn blade. Massas countered with a side blow while escaping from the enemy's attack by rolling on the ground. --- There are too many...! His movements stopped when Massas looked up. There, he saw a woman jump into his field of view. She wore a pale green dress, and her golden hair was tinged red by the evening sun. In her delicate hands was a bishop staff which surpassed the sculptures about the flower bed. The assassins also noticed the woman. One began to run toward her. While avoiding a sword approaching him, Massas shouted out. Though the assassins continued to attack him, he was able to keep an eye on her. The assassin raised his sword to the woman. A clear metallic sound was heard as a glittering gold light blew him away. Both Massas and the assassins looked on in surprise. The woman with gold hair pushed the sword aside with her bishop staff and knocked the assassin down simultaneously. Massas could barely follow her movements. A light voice, unsuitable to the intense atmosphere, came from her mouth. However, it was not because she did not understand the situation. Both Massas and the assassins understood based on her nonchalant behavior. The assassins separated. Three attacked Massas while the remaining attacked the woman. --- There are so many! Massas mowed the sword approaching him away. Blood flew through the air, dying the grass and flowers red. Though inferior in terms of number, the assassins did not expect the emergence of such a formidable enemy. Their fright and impatience dulled their movements, which was not missed by Massas. Quickly moving through the flower bed, he cut the second person down. By the time Massas had finished the three off, the woman brandishing the bishop staff struck the flower bed. A smile floated to the golden haired woman's face as the assassins fell behind her. Though Massas uttered those words, he was looking at her ample bosoms spilling out from her pale green dress. Whether it was tribute to that is unknown. She laughed as though she had good luck. The golden haired woman returned her gaze and gave her name. Massas finished with that. Of course, he did not speak of his exchange with Bodwin or mention that the King had reverted to a childhood state. Augre turned to Sophie and bowed deeply. Sophie returned a nod and a smile. With a pure, straightforward gaze, Ellen thanked Massas. Lim continued the story while answering Massas' questions along the way since she was the last to meet the old Knight from those present. Ellen and Augre supplemented explanations as needed. When she finished, Massas had a difficult face. Lim asked because she was worried Alsace would eventually be controlled by the government. As if in response to Lim's doubts, Augre spoke while rubbing his chin with the palm of his hand. Massas frowned and let out a deep breath. Ellen asked. Massas nodded regretfully. Ellen and Sophie looked at each other. It was not possible for them to win. In today's battle, they were severely damaged. Augre began to complain. Having a large number of connections was not enough. Thenardier had the ability to take proper advantage of them. They could not just sit there in admiration. They needed to move with the Navarre Knights present. Ellen shook her head briefly. While patting the sheath of the longsword on her knees, Ellen told the story of how he had broken through Sophie's VedaDragonic Skill. Though it was difficult to believe so suddenly, Sophie confirmed what happened. Massas and Augre looked at one another. The two only knew the sacred sword Durandal had been passed down the generations amongst the Royal Family of Brune. Massas bowed his head. Ellen waved her hands hastily. She could not properly explain the ViraltDragonic Tool and Dragonic Skill to them, even if many soldiers had already witnessed it. Lim was about to say she would lead the attack against Roland, but she was cut off preemptively. No words of rebuttal came to her mind. Of the people other than Ellen, even Rurick could not hold Roland off. She had learned that in the disaster of today's battle. Though it was difficult to imagine, Roland could easily defeat one hundred, or even two hundred, troops, if they had surrounded him. The speed, strength, and sharpness of Durandal was beyond common sense. Massas words reminded Ellen of a beast. Fighting with the Knights was no different from fighting against the Kingdom. Even in today's battle, before the fight began, morale was low. It had only fallen further after their defeat. If they lost again, the Brune soldiers would collapse. When the old Viscount replied, Lim nodded lightly. Ellen thought about the battle which would continue tomorrow. Though she wanted to give the soldiers a day or two to rest, the Knights of Navarre would not allow it. Ellen suddenly stood and placed her longsword at her waist. They entered his tent and saw Tigre, Teita, and Batran. Tigre was sleeping, breathing deeply. Teita was working hard to nurse him. Batran had come to visit and was helping her work. While rolling bandages about Tigre's body, Teita let loose a sigh of relief. Her clothes were dirty with sweat and blood, stained clothes were scattered about the vicinity. When she had seen Tigre being carried on a stretcher, she nearly fainted. There was a large wound across his body, and his clothes were stained even through the leather armor. His wound was hot, and, even with a cloth applied to his body, it would not close up. She had used alcohol to disinfect his wound and wiped an ointment on the injury before wrapping him in bandages soaked in a medicine prescribed by the doctor. Teita dried off the sweat on his body with a cloth. Her fingers were wrinkled from the liquid, and were swollen and red. While reciting the names of nine of the ten Gods Brune believed in, Teita joined her hands in prayer in desparation. Only to the Goddess of Death, Tir na Fa, did she not call out to. --- Please, Please save Tigre-sama. At that time, a voice was heard from outside the curtain. Teita stood up alongside Batran. Batran left the tent where several men stood. Their ages varied, and not all wore leather armor. --- I've seen his face somewhere. Thinking of that, Batran remembered immediately. They were men who disputed with both those from Alsace and Zhcted. They were soldiers and the aristocrat of Territoire whom Augre had brought. When he answered them, an expression of relief floated to their faces. After a quick bow, they left. Having thought the tent would be invaded, Batran looked at them dubiously. It was not just them. While Teita was caring for Tigre, many other soldiers had appeared. From another tent, many groans and screams of injured soldiers could be heard. There were some voices of encouragement and shouts as well. In a situation like this, any timid person would wish to run away in the night. Batran seemed as if he could weep at any moment, further distorting his wrinkled face. The little old man had been with the Vorn family since Tigre's father, Urz, was alive. He had known Tigre from the moment of his birth and loved him like a son. --- Urz-sama. The Young Lord is still necessary for Alsace. Please, keep him healthy. A sudden voice called out to Batran. He looked up in surprise to see Ellen standing before him. Batran did not like Ellen. Though he felt an obligation to remain kind to her for helping Tigre defend Alsace, he still wanted to keep his distance. However, because Batran had served by his side for many years, he was knowledgeable of the hierarchical relationship within an army. In terms of position, Ellen was equal or above Tigre, and Tigre would not want him to oppose her. He replied obediently. Ellen wore a mysterious expression. “They are soldiers brought by Viscount Augre. I have heard many have come to visit him. Ellen looked wide eyed at Batran in surprise. Given his position, Batran could not say what he wished to. Ellen smiled and nodded and entered through the curtain next to the elder man. Teita looked back when Batran called her name and was surprised to see Ellen. Her face showed her exhaustion, and she looked troubled. Teita hesitated for a moment. Tigre had finally fallen asleep, so she did not want others to see him if possible. Besides, she could not think of what she might want to say to someone who was sleeping. However, seeing her sad expression, she hesitated to refuse. It was her first time seeing Ellen like that. Ellen nodded strongly and smiled at Teita. When she saw the girl with the chestnut-brown hair leave, Ellen removed all sound with the Silver Flash at her waist and kneeled down. She looked at Tigre's body under the light. His upper body was bare, wrapped in layers of bandages. Having been knocked off her horse, Ellen very well could have been struck down by the Black Knight. Ellen quietly took Tigre's hand and placed it to her left breast. Tigre did not react. Ellen continued as she was. Ellen's smile turned bitter, and her voice became angry. Power entered her hands as she pressed Tigre's hand strongly against her chest. Roland was a powerful existence. That man, like a storm, destroyed all things before him, allowing his men to advance. His very existence was the reason the soldiers could not remain brave. As the one who took down his horse, Tigre had become something of an object of reverence amongst them. Those words inadvertently spilled from Ellen's lips. He had gone forward with courage. When the soldiers saw him carried off the battlefield in a stretcher, a strong remorse ran through them. He could not afford to remove his mask of courage until the war ended. At that time, Tigre's hands moved. Ellen's hands clasped his tightly. Ellen was surprised, and she smiled. Even if he was unconscious, Tigre was encouraging her in his own way. She thought so. So hurry and wake up. Ellen muttered those final words and squeezed Tigre's hand strongly once more before standing up and leaving the tent. She stood before Teita and Batran. Ellen responded with an out-of-place smile. Strangely enough, she was feeling refreshed. Suddenly, a strong wind blew; the bonfire near the curtain flickered violently. The guards looked about in a panic as a small wind blew in Ellen's hair from the sword at her waist. Ellen stroked the pommel of her longsword and looked at the sky. The moon and stars were spread throughout the sky; a cold wind blew from above. --- Incidentally, Tigre said it would rain. A familiar voice. Sophie approached with her bishop staff in hand. Ellen explained with a fearless smile as she saw her fellow Vanadis approach. Ellen had seen his hand move. The hand she had grasped was warm. He had a will to live, a clear vitality. Sophie's bishop staff made a sound as she smiled radiantly. Ellen looked as if she could not agree. Sophie responded with a slightly mischievous voice. Ellen's mouth distorted as she played with her silver-white hair. Arifal let loose a wind as if in agreement with Sophie. Ellen's hesitation was cut short. Though her tone and expression were of a joking nature, Ellen responded seriously and bluntly. Contrary to what one might believe, Sophie simply nodded in confirmation as she brought her finger to her face. She spoke as if she had read Ellen's mind completely. Sophie smiled and walked away. After seeing her off, Ellen returned to the others. Lim, Massas, and Augre surrounded a map and were discussing strategy beneath a lamp. Lim asked with her typical unfriendly expression, but Ellen saw the emotion deep in her blue eyes. Lim shook her head while Augre looked at Ellen in curiosity. All they could do was to allow Teita to take care of him. Until his wound was fully healed, he would remain haunted by the shadow of death. Even so, Ellen spoke with an attitude as if she did not have to worry about him. One person continued to look at her inquisitively. Ellen loudly declared her answer to Lim. After Ellen left the tent, Teita continued to nurse him. Batran spoke to Teita. Though tired, she was still hesitant. Teita bowed to Batran and lay next to Tigre, quietly grasping his left hand. Because it was the hand with which he grasped his bow, it was rough. Teita remembered when she saw Tigre. Closing her eyes, Teita fell deep into slumber. Batran looked at Teita. After checking that she had gone to sleep, he quietly cleaned up the bloody bandages around them. In the General's tent, the three people looked at Ellen in confusion. Massas offered a feather cushion for Ellen to sit down on. Lim dropped her eyesight to the map and looked at the river to the north. They were covered in heavy armor and helmet and held a heavy shield with a spear or longsword. Though they boasted a formidable power when rushing, their movements would slow down if they were covered in mud. The Zhcted cavalry had the advantage of mobility. When Ellen asked him to work hard, the old Viscount began laughing, little by little. Without moving her eyes from the map, Lim threw out a question. Massas muttered as he looked at the map. Her hair of silver-white drifted as the Vanadis laughed. Massas inclined his head and stroked his beard since he could not understand what she meant. Ellen crossed her arms across her chest and answered in a serious tone. Lim placed her hand to her mouth and began to think. The reasons soldiers fight could be for food, a salary, or for exploits. In general, soldiers fight for realistic things. It was rare they would trust their Commander for his popularity and bravery. Still, while that was true, there were exceptions. However, a leader was different. In the first place, they were the type to gather soldiers to fight their battle. If he had a firm reason to fight, they could think about it and increase their potential options. Lim answered smoothly without hesitation. Ellen smiled satisfactorily. Lim's blue eyes narrowed in thought. Ellen continued to nod. Augre's wrinkled face distorted even further. As Ellen had said, it soon began to rain. The Silver Meteor Army began their march. The cold drained their physical strength, and the rain dampened their spirits. Their clothes grew heavier with the rain while their shoes only became more mud-covered as they walked. It would be necessary to fight the Navarre Knights in the morning. There was a need to cheer up the troops. There were some who felt the desperation in their situation. There were those who knew it would be hopeless to run away in the dark of night. There were others who feared Roland's bravery and thought of the doom of defeat. There were many who were deeply impressed by Tigre's bravery when he fought, but there were also those whose will to fight decreased due to his injury. No, if anything, that was most predominant. When the night grew old, they arrived at their destination. Viscount Augre visited Ellen's tent. After a short rest, Augre and his soldiers were to move out. Accompanied by Tigre and the injured and non-combatants, they numbered approximately one thousand. Whether they would be fine or not, Ellen did not know. She understood it was a difficult situation; still, it was best for those who could not fight to be away from the battlefield. Knowing this, she sent them with Augre on his task. The old Viscount struck his chest. Ellen stood up and shook Augre's hand, promising to reunite tomorrow. The Navarre Knights were located twenty belsta (approximately twenty kilometers) southwest of the Silver Meteor Army. Though most were resting in preparation for the fight the next day, Roland was not yet tired. Roland was drinking a glass of wine as he sat with his Vice-Commander, Olivier. Hearing Olivier's report, a strong light shined in Roland's eyes. More information had arrived. Hearing Olivier's words, Roland closed his eyes and nodded. He offered a silent prayer on the day he heard the story. He had not forgotten. Roland frowned. He was thinking Alsace must have been a good land for both to take action. Olivier simply laughed sarcastically. Roland made a bitter face as he looked at the sword leaning against the table by his side. He felt it unpleasant that they would move their armies for their personal greed. It was the King's duty to place pressure on nobles who act recklessly. If Thenardier and Ganelon moved their soldiers indiscriminately, that was the first thing he should do. Olivier's response which was speculative in nature worried Roland. Basically, the Knights could not move without the orders of the King. Arbitrary actions necessitated punishment. That much was natural. They were stationed near the mountains for a reason. Any unnecessary movement may invite trouble. Olivier continued to speak with a look of sympathy having seen Roland tightly grasp his fist. Three pieces of paper from a larger bundle were pulled out and given to Roland. Roland took it in hand and looked over it silently. Roland knew Auguste was a direct and trustworthy man. They had worked together many times before he was assigned to the Navarre Knights, so he was interested in his opinion. His letter spoke indifferently of Tigre and his father, Urz. --- Though his bow technique is superior, his skill otherwise is ordinary. If there is fault in him, it is that he thinks of his people just as much as his father. For that, he does not fear the stigma of disgrace and will borrow the power of others. Those were his exact feelings toward Tigrevurmud Vorn. The Knight is the sword and the shield of the Kingdom. Roland had a sworn duty to protect the people and subjugate the enemy. Standing on the border, he had warded off many enemies. It was a worthwhile task. Suddenly, Roland recalled the legend of his name. It was the story Prince Faron had spoken of. Roland, the [Knight of Knights], was the greatest defense. Roland took his eyes off the letter and looked up to his trusted aide. Roland asked him as a Knight of Navarre. This fight was not for King Faron. It was an order passed down from Duke Thenardier and Ganelon. His loyalty as a Knight was to the King. It was only this loyalty he felt pride in. For this reason alone, he fought to protect his land, but he could not remove the sense that he was simply being used by powerful aristocrats. They had a mission to protect Brune, and they believed Roland's command would help them accomplish it. That was what he meant. Roland looked at Olivier who shook his hand, showing his understanding. They had experience fighting off the Sachstein army along the western border. Olivier nodded without any sign of nervousness because he was accustomed to it. It was dangerous for the Navarre Knights if their Commander faltered here. Roland was fully aware of it. This page was last edited on 21 June 2018, at 07:20.
2019-04-22T22:36:37Z
https://www.baka-tsuki.org/project/index.php?title=Madan_no_Ou_to_Vanadis:Volume_03_Chapter_4_-_MTL
When art historian T. J. Clark visited the Getty Museum in 2000, he came upon a gallery that featured two paintings by seventeenth-century French painter Nicolas Poussin (the National Gallery, London’s Landscape with a Man Killed by a Snake and the Getty’s Landscape with a Calm) and found himself returning over and over again. In 2008, Clark documented his reflections on the two landscapes, their opposing depictions of life and death, and exploration into the depths of visual complexity in his book The Sight of Death: An Experiment in Art Writing. In this episode, Clark visits the Getty’s Poussin painting in our galleries and discusses how his perspective of the painting has changed over past decade. T. J. CLARK: I hate those kinds of psychoanalytic moments when you can hear the kind of machine of interpretation grinding, and, oh yes, it’s the Oedipus complex again. CUNO: In this episode I speak with art historian T. J. Clark. I met recently in a gallery of the J. Paul Getty Museum with art historian and visiting scholar T. J. [read: Tim] Clark. Ten years ago, Tim published a book called The Sight of Death, subtitled An Experiment in Art Writing. The book was prompted by Tim’s confrontation in the museum galleries of two paintings by the seventeenth-century French painter Nicolas Poussin, the Getty’s Landscape with a Calm of 1650 and the National Gallery in London’s Landscape with a Man Killed by a Snake of 1648. Tim had long known the National Gallery’s picture. In fact, he described it in The Sight of Death as one of his touchstones, as “an epitome of painting for me,” he said, “summing up the utmost that visual imagery could do in a certain vein.” And now he could examine it together with the Getty’s Landscape with a Calm slowly over many days and months. The resulting book is a meditation on life and death as it is depicted in these two works. But then it’s also a chronicle of an investigation into the very nature of visual complexity itself. I wanted to know how Tim thought about his book ten years on and how he thought his reading of these two pictures had held up over time. What follows is an edited version of a much longer conversation Tim and I had standing in front of the Getty’s painting. Tim, thanks so much for your time this morning. CLARK: Very happy to do this. CUNO: Great. And I wonder if we could begin by your describing the picture for us. CLARK: Yes, okay. It’s a picture of a lake—or is it a lake, or is it a tranquil stream? Anyway, a body of water, in which is reflected a massive citadel or a castle. And behind the castle, crags and a stormy sky or a turbulent gray sky with clouds billowing. In the foreground, a winding path down to the lake, with goats, cropping vegetables and trees, a goatherd, his patient dog, and framing trees—birch trees, shimmering in the sun on one side, and a dark-leaved on the left. CUNO: And you began your earlier investigation of this painting and the National Gallery painting by jotting down notes in diary form, as you looked at it, first noting the date in which you were taking down the notes, and then frequently, the light conditions in which you were seeing the painting, the actual conditions of the room in which you were seeing it. Is this the way that you typically work? That is, setting yourself before a painting, taking stock of the circumstances in which you’re seeing it, and only then turning your attention to whatever in it catches your eye. Is that a kind of warm-up exercise, a disciplined way of coming to terms with a painting—of any painting? CLARK: I don’t think it is necessarily the only way I do it. And actually, as I say in the book, I was really very surprised that this happened. I came to the Getty expecting to do other kinds of work entirely. And these two paintings just happened to be here, facing each other very calmly in a beautiful, small gallery. And I just couldn’t—I was overtaken by them. And for some reason or other, I decided I really needed to go back morning after morning and look at them. And then after a few days of doing this, I began to sort of make notes. So this was a kind of unexpected and spontaneous process. I mean, that being said, Jim, I think that in some ways, it’s extraordinary that art historians don’t do it more often and more matter-of-factly as, you know, part of what they do. Sustained attention, time after time, and admitting, in what they write, that there is no one view of a painting, that a painting opens itself to repeated looking, and looks different and, you know, directs your attention and your feelings, in ways that open up day after day, week after week. CUNO: Yeah. You come to that in the book itself in a kind of critique of the practice of art history. So, we’ll get to that—those kinds of comments, as we proceed. But I want to get to the actual looking at the picture, because in your first diary entry, you begin with the goatherd in the foreground here, specifically with his curly hair that’s placed at this intersection of the lake’s shoreline and the slight rise in the hummock to the left. And then you pointed out the painted white mark just on the water, just into the lake nearby, which disrupts the reflective surface of the lake. You didn’t say so in your book, but do you think that this might have been a conscious device by Poussin to attract the viewer and invite him or her into the invented world of the painting, to attract the, you know, the viewer’s attention to just that moment? Because it’s from there that he then is looking out onto the landscape, looking out onto his goatherd—onto the herd of goats. CUNO: It’s a kind of way to begin and enter the picture. CLARK: Yes. Well, it was my way of entering. Of course, I’m very used to looking at pictures, and therefore tend to stop myself when I notice myself being caught by a particular incident, a particular place. You know, the great literary critic and writer about photography Roland Barthes coined the term punctum for this. Right? The sort of point in a work of art, a photograph, for him, primarily, which catches your attention and somehow or other points out at you and interpolates you. I like those moments and I like the fiction that almost before I see the whole thing, I’m concentrating on one incident within it that the artist has, maybe consciously or unconsciously, sort of made a point of entry. CUNO: Yeah. But do you think that Poussin as a painter was the kind of painter to want to try to attract the viewer’s attention to one particular part of the painting as a point of entry into the painting? Because it does seem to be. I mean, it’s been a convention to see this as a painting about contemplation, stillness, and there is that still goatherd contemplating the scene before him. CLARK: Yes, I think that’s right. I mean, it’s a very calculated move, putting the curly head of the goatherd just at that intersection. And I think it is one of the first things you begin to think about in the painting, is the goatherd’s attention to the herd and to the scene. Almost immediately, you see the contrast between the standing still of the goatherd and just off to the left, you know, his absolute antithesis, this man on horseback careering off, galloping fast out of the scene. So, I mean, it’s typical Poussin that he will give you contrary states and sort of ask you to think about the relationship between them. The rider and his horse and the sort of disturbance in the moment of calm, you know, is very, very important. I mean, the date of this picture is important. Painted in 1648, in the middle of what historians of my generation used to call the general crisis of the seventeenth century, right? You know, the execution of the English king, the civil war, the Fronde in France, very close to where Poussin’s painting in Rome, a tremendous popular proletarian revolt in Naples, under Masaniello. And we know that Poussin was absolutely aware of all this. Of course, he was a very conservative man, but he was fascinated by upheaval all around him. You know, he says in one letter, “It’s interesting, isn’t it, being able to sit here quietly in the wings of history, looking on at the drama.” So all the way through these paintings done in the late 1640s, there is danger and turbulence and change. But he’s also saying look, it’s the nature of human life that it is able to contain that turbulence. CUNO: Let’s go back to the picture, because we move from this goatherd and to farther in the moment in the picture, to the play of light on various kinds of surfaces farther back from the lake, to the stone walls, to clouds and smoke. And you raise the question of whether the painting is about a transitory state of affairs, or really is about something more enduring. Is this the kind of question that you put yourself in the exercise of investigating the painting? I mean, this sense that you have a method when you begin looking at picture, by observing something, suggesting a meaning about, you know, deriving from that observation, testing that meaning by another observation, and kind of working your way, layer by layer, through the surface of the composition. CLARK: Yes, I think that’s what I do. It’s hardly a method. You know, it seems to me that it’s what human beings do when they look at pictures, if they care about pictures, if they want to look. You look at a complex object like this, and you begin to ask, hm, what is actually being intended here? What’s being said about the nature of the scene and the scene’s possible typicality, what it might say about the human condition? I mean, Poussin is the kind of mind that very much thinks in these terms, very confident about phrases like “the human condition.” He thinks that something general can be said and must be said in painting about that. So if I’ve got a method, it just is to let the painting guide me to the questions it may be posing. I mean, for instance, it doesn’t take long before you understand that the sky in the lake doesn’t seem to match the sky we’re shown. The sky in the lake is wonderfully empty. And the sky up above the castle is, you know, full of cloud and turbulence and change. So, what does that signify? By the way, I mean, you shouldn’t leap immediately to the idea, oh, well, then the reflection in the lake is just a concoction; it can’t be really what the goatherd and we see, because of course it could be. The clouds around the crags and behind, you know, could be sufficiently far back that they’re not reflected in the lake. CUNO: Especially if we’re standing above the goatherd at some distance, looking down onto the lake, that it’s a different projection. CLARK: Exactly. So it could be absolutely optically correct. But nonetheless, Poussin surely knew that a viewer was going to be interested in the lack of match between the reflection and the reality. So, what’s that about? Well, I sort of tried to think about that in the book. It’s a wonderful title, isn’t it, Landscape with a Calm? And I’m not quite sure how early on that gets attached to it. It is one of a pair. And its pair, which is in Rouen, is called Landscape with a Storm. So everything is wild and crazy in the storm. You know, people are suffering. People are desperately pushing their way through the storm towards the city. So if you think of it in relation to that, you begin to think, well, alright, this is still a landscape in which a storm could happen. Maybe a storm is happening on the other side of the mountain. But here, where we are, things are stilled. Stilled, rather than still, I think. Right? Brought to a halt, brought to a calm. But the calm— The more you look, the more there’s an intimation that the calm might be momentary; that it’s wonderful that everything is clear and arrested. But it is arrested, as opposed to permanent. CUNO: Yeah. You know, when you raise the question in your book, and just now as well, that the lake doesn’t seem to match the sky, given where the lake is—and some people have identified as a particular lake, which I’ll get to in a second, but given where the lake is in the painting, in the sort of just the second quarter of the painting, as one rises from the bottom to the top, or just near to the center of the painting, it would be a disturbance to the eye, let alone to the scene, to have those clouds reflected in the lake as they are in the sky, the turbulence of the sky. And one wants that sense of calming, and one needs to have it at that point, I think, because typically, I mean, as we are looking at it now, we’re looking into the painting at that point. That moment of stillness. CLARK: Yes, absolutely. Of course, if you start to think about the painting with something going on in the sky and the lake, I mean, it would just be unthinkable, somehow. It has to have this moment of stability and clarity. That’s a sort of essential to the pictorial order. We tend to think of Poussin—I think art historians think far too much of Poussin as an intellectual, as a sort of calculating, rational artist. I absolutely think this is, you know, only part of the story, you know, what makes his pictures often so extraordinary and enticing is sort of pure improvisation in paint. And actually, if you start to go in and look at his treatment of the grass on the far shore, or the backs of the sheep, it’s full of the most astonishing improvisation and inspiration in paint. But he was also a calculator. And I think I say at one point in the book, if you start to think about the relationship between the roofline of the castle and then the roofline of the castle as it’s reflected interview he lake, it’s an absolutely astonishing theme and variation, almost like a great, you know, piece of Bach counterpoint, really. Because they are the same, and yet he’s shifted or he’s chosen his point of view so that it’s not simply a duplication. Everything is different, although you recognize it. I mean, this is an exercise is sort of brilliant perspectival thinking, among other things. CUNO: And it compels one to be a pedant, and to begin to count the windows to make sure that there is as many windows below as there are above, and all this kind of stuff. But in the book, you know, you point out that as exacting as it is in the reflection of the scene above the lake and so forth, that he marks out the landscape beyond with just a single swipe, or seems to be maybe two swipes, of a paint-loaded brush going across, and draws our attention to the act of painting at just that point. CLARK: Yes. Which I think he does all the time in his painting. That’s my great quarrel with the Poussin industry, is that— You know, there was a wonderful essay written decades ago by the great connoisseur, art historian Denis Mahon, called “A Plea for Poussin as a Painter.” Already saying, don’t drown him in iconography and, you know, contextual studies. Look at him as a painter. He is absolutely infatuated with what oil paint can do. So I invite anybody in front of the picture to go in close to that line of grass and just see the extraordinary boldness with which he drags the brush, you know, along— over a foot, really. JIM CUNO: Now, this picture, as you note in the book itself, was originally paired with the second one that we mentioned, the Landscape with a Storm. But it was also, in the gallery in which you saw it here in the Getty, it was paired with the Landscape with the Man Killed by the Snake. We don’t have that here because that picture’s back in London, of course. But I have a copy, a photograph of it here. Could you describe the painting to us? CLARK: Well, it’s a landscape, not unlike the landscape in the Getty. A castle on a hill, a lake, a distant town, mountains, trees framing the foreground, a little stream running from—you know, under our feet, as viewers, down into the landscape. And then you begin to see that right in the foreground, there’s a body, probably a dead body, although there’s a horrifying that it might just be still struggling. It’s wrapped around with a horrifying, and actually rather improbable, improbably large and slimy black snake, black boa constrictor. And this figure, right in the foreground on the left, has just been spotted by a man, a beautiful man in blue, looking back horrified at it and running back into the picture, really, to try and tell his friends. And there’s a woman on the path further back, who’s just understanding that the man is saying something dreadful has happened. So among other things, it’s about the stages by which men and women come to terms with the eruption of death and danger into what seemed a stable and welcoming world. CUNO: Yeah, yeah. I mean, that is the contrast with Landscape with a Storm, is that the landscape itself here is not unlike, much unlike, Landscape with a Calm. But there is that moment, just that instant of alarm that precedes, perhaps, you know, a change in the landscape itself. You might imagine a storm following upon the alarm expressed by the man who’s just seen the snake. There’s something wrong in that landscape, terribly wrong. CLARK: There is something wrong in the landscape, yes. But it doesn’t infect the whole landscape, right? Once again, there’s a kind of balance between those elements in nature, and also in the human world, that are stable, predictable. The repetitions of, you know, dawn and dusk. The sun comes up, the sun goes down. We’re not in an unstoppable world. And actually, I think it’s—see, I think it’s very, very important to Poussin that painting stops time. And these moments at which things are arrested, maybe at a moment of danger. But the arrest, the stop, enables us as human beings, to look at what’s happening, think about what’s happening, think about what we might do to bring change and temporality under control. I mean, I think painting is so important to him because it stops the flow. So this landscape, too, after a while, you begin to think about, well, what time of day is this? Is the sun coming up? Is the sun going down? Is it morning? Is it evening? It seems important, perhaps, that it’s one or the other. But how do I decide? How do I decipher the clues that nature gives me? So I think an awful lot of the time, you know, Poussin is setting up a situation in which what appears to be stopped for eternity is, you know, much more kind of mobile and illusive than we see at first sight. CUNO: You come to believe that it’s the morning. And you come to believe that, in part, because of the color of the light, the brightness. It’s not the reddish light that one might have at the end of day. But also by the woman who’s there, again with laundry, it seems, as if beginning her chores. Or the fishermen that are just back further in the lake, who are perhaps, again, beginning their chores for the day. So there is a sense that the day has just begun. And with this particular day, a day has begun with this alarming sight of a man who’s been killed the night before. CUNO: So there’s a sense that that otherwise beautiful day that was filled with promise has now begun with something terribly, terribly alarming. CLARK: That’s right. But of course, the whole picture says, you know, life doesn’t turn on the dreadful and the deathly, that the whole scene matters, because the man, the woman, and us do see death in the landscape doesn’t mean that that’s the truth of the landscape. The landscape still is beautiful. The sun is rising. People are going— and will go about their tasks. And nature is this sort of balance of order and disorder. And we shouldn’t give up. We shouldn’t panic. CUNO: Yeah. And the man who doesn’t recoil in the prospect of that kind of nature is the man who sees the man killed by the snake and has the horror on his face. You draw attention to the face, in fact, as the face that is on the cover of the book, with the title The Sight of Death. And it is about how he has seen death. And you ask of that face, “What is it in the human dealings with nature that puts a stop to the present and produces a fully human temporality? What is it that does this? What but the sight of death?” What did you mean by that? CLARK: Now, this really steers us into deep water, Jim. I mean, of, you know, thinking about the nature of the human. I think that part of Poussin’s thinking on this is that we need to have a sight of death and of our own death. We need to live our life in the full consciousness that death is part of life, a constant partner to life, if we’re to really think about the nature of human life and the time we have and what human time is, as opposed to natural time. Seventeenth century thinkers—we would now tend to dispute this, at least for a large part of the animal kingdom—but seventeenth century thinkers tended to believe that, you know, animals don’t have a consciousness of death, and that it’s a human attribute, to live in the fa— Of course, this is all completely bound up with, you know, Christian belief. And by the way, I mean, I’m not for a moment suggesting that Poussin wasn’t a Christian of some sort. I’m sure he was. Although probably had a complicated relationship towards Catholic orthodoxy. So it’s that, really. You know, the idea that our sense of a life only crystalizes when we really are confronted not only with pain and suffering, but with, you know, termination. CUNO: Yeah. And you go on to say, “What is most dreadful about the dead body is its immobility, its becoming a mere thing. And that is always what is potentially dreadful about anybody, any action, however vivid and legible, as it appears in a picture.” So you take us back to painting. Everything in a picture is haunted by the auratic power of death. CLARK: I think that was probably because I was reading Walter Benjamin at the same time as I was writing this, and I think I even say in the book that, look, I’m going to offer excuses for sort of straying too far into philosophical territory here. But I do think I still would stand by the basic idea that, as I’ve said before, Poussin loves the fact that painting stops time. That is, it’s just constantly thematized in his work. We’re at a moment of arrest. But of course, he also thinks that stopping time has something dreadful to it. You know? And actually, when time will stop for us, it will be a moment of— Well, we don’t know what it’ll be. But it’s certainly a moment we fear. CUNO: I mean, this is in the book, at just this point, you offer a free association, which I’ll get to in just a second. But it gets back to the subtitle of the book, which I want to get to eventually, which is An Experiment in Art Writing. So the sense, experimental, about the process that you’ve undertaken in the writing of the book. In a brief but deeply moving moment in your book, you give yourself off to this free association, as I said, and you call it that, to free up, it seems, something in your looking at the picture. In other words, this might be a device that helps you see something that you couldn’t otherwise see. In this case, it’s the outstretched arms of the woman reacting to the horror of the man, seeing the man killed by the snake. Lower left, there’s the man killed by the snake; on the right is a man who’s just seen that and is expressing the horror. Then there’s the woman, as you said, as we talked about earlier, just back in the picture, who’s reacting to the man who’s just said something —just expressed the same of horror. And you see her hands as caring and protective, but also as raised as if to strike. And then you see them as your mother’s hands, both terrifying and endlessly gentle. And this triggered a memory of her returning from an absence and being disappointed by you, by something you did, which caused her to look to you as from a distance that could never be bridged, you said. A rupture that couldn’t be fully repaired. An anger that you felt her mother herself was experiencing similarly, that couldn’t but burden her. So there was a sense in the writing process that that free association drew your attention to a condition that was expressed by those outstretched arms, that helped you see further into the picture. CLARK: Yes. I don’t want that to be the key to all mysteries, but I was aware that this picture wouldn’t let me go and that there was something in the picture which was drawing me back and back, in a way which I didn’t fully understand. I don’t think that always turns, although, you know, I was brought up in the era of Freud and French psychoanalysis and so on, but I was always arguing with it, actually, from a Marxist point of view. So I don’t believe that compulsion and a repeated need to confront an image must turn on some psychological attachment to it that you still can’t quite bring to the surface. But I think that sometimes it does. And it did here. You know, it was one of the most wonderful moments I shall ever experience as an author, being told by my elder daughter that when she was reading those pages of the book on the tube in London, she got so absorbed that she went on far past her tube stop and had to [laughs] change trains and come back. So, you know, of course, that’s a family issue. She just knew my mother. But I think—I trust to that free association. It happened. It happened very spontaneously. It wasn’t produced. I hate those kind of psychoanalytic moments when you can hear the kind of machine of interpretation grinding and, oh, yes, it’s the Oedipus complex again. I mean, that’s what, of course, unfortunately has discredited the psychoanalytic frame of reference, that it did become that mechanism. CUNO: Yeah. But it does seem perfectly legitimate that one would—a memory of something would’ve been triggered by the gesture or the expression of a painted figure. It would help one understand what was meant by that expression. Not necessarily in any kind of—the details that you would’ve experienced yourself in your life, but it did mean something that Poussin painted her that way at that point in the picture. And what one was trying to do was to understand exactly what that was. Or something about what that was. CLARK: That’s right. Because when you start to scrutinize the figure, it— Again, I would have a quarrel with normal art history here, that normal art history will want the figure to be unequivocal. Ah, she’s part of this plot, and she’s the figure of, oh, just trying to understand what the man who’s seen the snake is signaling. Well, that’s a simple-minded view of what painting is like. Painting, when you start to—Poussin may have started with some such framework, right? That’s the basic thing that this figure is doing. But of course, painting discloses to the painter, other aspects of an expression, a pose, that he or she is barely aware of. That’s the mark, for me, of a great painter, is that paint discloses content. CUNO: Yeah, it’s just at this point in the book that you begin to talk about art history, as you have raised it a couple of times in our conversation. In the book, you write that “art history suffers from going to its texts, its contexts, its surrounding worlds, its speech and belief, with far too crude and approximate questions in mind. It gets a rough fix on what representation might mean or how it might have been put together, and then depends on history to turn that rough fix into a specific philosophy. I think the crudity of the first intuitions is a problem.” That’s what you’re saying. CLARK: Yes, I still think that, unfortunately, and I think it’s, you know, just sort of so deeply fixed in our discipline, you know, as a discipline, as a set of teaching and learning institutions and it’s also, you know, comes out of the fact that we are art history. And our relationship to criticism and to, you know, critical looking, what literary critics call practical criticism, right, exposing oneself to the complexity of the object. I think our discipline remains tremendously uneasy about that. It wishes the safety and certainty of a world of texts. CUNO: Yeah. You consciously called it An Experiment in Art Writing and not art criticism. Tell us about that decision. CLARK: Yes. I don’t know. I mean, a friend of mine actually said at the time, “You know, I think you should cancel the subtitle.” [chuckles] It’s too apologetic. CUNO: The experiment part of it. CLARK: Yes. And he may have been right, actually, because in some kind of way, I think that this kind of exploratory writing about what it is to look and the way in which pictures open themselves to repeated interpretation, I think this shouldn’t be experimental; it should be absolutely part of what we do as scholars, writers, critics, historians. It should be absolutely part of our— It used to drive me mad at Berkeley. Mind you, in the end, they didn’t dare do it anymore. But at the beginning— A graduate student used to come in, you know, to a seminar with a paper. And the kind of formal analysis bit, or the description of the picture bit, was sort of left in kind of scrappy note form, because that was subordinate to the, you know, the seriously scholarly business, which was all written out. You know, the stuff about text and context. But form, or the interaction of form with context and text, that could just be— You know, that was subordinate. Well, I mean, I’ll go on quarrelling to my dying day with this, you know, this system of priorities, really. CUNO: So I took the experiment, the word “experiment” in the subtitle Experiment in Art Writing, as to indicate a method of opening up, rather than locking down possibilities. CUNO: And that it would be transferred into some other kind of prosaic form, that you would maintain the diaristic form. CLARK: Exactly. Yes. And I mean, I remember, you know, at the moment when I finally revised it or finished revising it, and I gave it to my partner Anne Wagner to read, as she’s always the great first reader. And I did say to her, “You know, look, I want you to tell me if you think this really is a book.” And so that kind of level of uncertainty about whether it was a book or just a series of notebook entries—I mean, of course, that was part of the excitement. CUNO: Yeah, in an interview, a rather extensive and incredible interview, actually, I think in The Brooklyn Rail ten years ago, just after the book came up, Kathryn Tuma, with whom you were talking, said that she’d read your book as a way of arguing with our image-centered world. It’s about what you were beginning to say a minute ago. And she quoted you as having written of Poussin that certain pictures look like language, in order to alert us precisely to their unreadability; and that Landscape with a Man killed by a Snake is a picture of the moment before speech. At the risk of asking you to repeat yourself, since you’ve already talked with her about this, could you tell us what you meant by that? ’Cause that was getting to your point, it seemed to me, about the process, or the conventions of art history locking down on meaning. CLARK: Yes, I think that’s right. I mean, I think that on the one hand, you know, obviously, Jim, as I’ve said, I’m kind of still hostile to the idea that we solve the problem of a picture by finding its textual source. I mean, of course, sometimes finding its textual source is extremely interesting. But then, it seems to me, it’s the beginning of a process of thinking, I see, so what does the picture do with this source? What’s the necessary and contingent difference between staging a scene in words and staging a scene wordlessly? You know? I’m very fond of the phrase that crops up in one of Poussin’s letters, you know, where he says, “I’m someone who makes their living out of mute things.” You know, that, from a very intellectual and well-read man, very, very interesting comment, I think, on what he does as a painter. So on the one hand, I want us to be alert to the image as image. But I also want us to—here’s what I meant when I was talking to Kathryn about this as being an argument with our present image world. I’m interested in the idea that the image can truly have depth, complexity, uncertainty. The nature of the image isn’t to offer itself immediately, to offer the world all in one go, right? I’m interested in the capacity of images to be as discursively complicated as any sentence out of, you know, Kant. CUNO: You said in the same interview in Brooklyn Rail with Kathryn, you said that you taught art history for many years, in part, because it’s urgent politically to do so, to point to the real boundaries between seeing and speaking, or sentence and visual configuration, and to try to keep alive the notion of a kind of visuality that truly establishes itself at the edge of the verbal. Never wholly apart from it, needless to say, never out of discourse’s clutches, yet able and willing to exploit the difference between the sign and a pose, or a syntactical structure and physical visual material interval. That is what The Sight of Death is aimed against. It wants to discover what images are capable of, and what real worldlessness, in the face of the world of words, looks like. And there’s a political dimension to that. That’s what I want to get to now. In this experiment of art writing that’s gone from—or seamlessly, perhaps, it’s gone to—it’s evolved into a discussion about the politics of the world not just of Poussin, but the world in which you’re writing the book. CLARK: Yes. You know, I do say that in the book, right, that I’m not claiming that this is a strong politics, right? And I’m wide open to the challenge that, you know, my involvement with and commitment to the world of paintings like this, you know, is in some ways, a retreat. You know, I’m used to this, right? You know, why don’t I talk about contemporary art? Why don’t I talk about advertising, et cetera? You know, the real world of image struggle. My answer, actually, my honest answer is, look, life is too short. You’ve got to own up to what you truly care about and, you know, what sustains you. So that’s a large part of it. But there is a politics in this sense, that we are in a world which, you know, some old political friends of mine call the society of the spectacle, in which the power—the owners of the world we live in bombard us with imagery, and that imagery is a form of social control. We’re bombarded with seemingly transparent and available and seductive images of what life is, could be, the way to the good life, the nature of the good life, as a way, I think, of you know, simplifying and bowdlerizing and travestying, you know, the possibility of human discussion about what the good life and the bad life might be. So I am interested in trying to speak back to that and saying, look, there is always the possibility, in visual imagery, of true debate, right? True exploration. True admission of the tragic, the irremediable, the wonderful, the astonishing. Right? You know, and the balance between these—these aspects of human life and natural life. And we better hold onto that possibility, right? You know, not give in to— After all, here we are in February 2016, right? In a situation where every night, I switch on the TV and see politics, you know— see the business of who might control the biggest military machine and the biggest commercial empire the world has ever known. See it reduced to an appalling and ridiculous pantomime. This is the society of the spectacle. And a lot of it depends on image, right? Trump is the master of image manipulation. So that’s my politics. What you do in response to that, very complicated. But part of it, I think, ought to be keeping alive the idea of the image world as offering us something more than immediate gratification. CUNO: Yeah. And I think what you also offer in the book is that this was a part of Poussin’s enterprise, as well. I mean, part of what he wanted of his pictures, the kind of alertness he wanted to elicit from people who looked at his pictures. CLARK: Yes, that’s right. I mean, we should remember— And actually, when you see the kind of actual scale of this picture in the Getty, a very interesting scale. You know, it’s large enough. But remember, it’s this curious thing called an easel painting. And that was part of Poussin’s argument with the visual culture of his own time, right? I mean, he dissented from the Baroque, having begun as a Baroque artist himself, dissented from, you know, its pyrotechnics, its melodrama, its excessiveness. The fact that kind of visual imagery was tied into a tremendous architectural and religious machine—machinery. You know, part of what he’s saying—and I think that’s part of why he appealed to these very special patrons—is that, look, visual imagery ought to be something closer to what philosophers or writers do. CUNO: Yeah. And I want to close with that, because we’ll get to that in our closing. Which as you say in your interview, and in the book, in fact, you say that you think a good poem about Poussin would be the highest form of criticism. And in your Brooklyn Rail interview, you say that poetic language, language at maximum intensity and concentration, taking full advantage of the materiality of language itself, is about the best way we have of dealing with the world. CLARK: Yes. Well, I do believe that. I do also say, you know, that actually, poems about paintings are a trap. And they can be perfectly dreadful. And I suppose that my daring to say, look, a poem is potentially the right way to respond to a painting was meant as a provocation to the discipline. There was one young reviewer, probably in the Oxford Art Journal or somewhere, who said that when they read that sentence, they threw the book across the room. Which did seem to me very much the—you know, the voice of sort of anti-aesthetic art history wisdom, which I’ve had far too much of. So it’s a dangerous statement, right? You know. And I don’t think that one wants an art history which is just all, you know, purple prose. But on the other hand, maybe we should at least occasionally, or at least tangentially, you know, want in the end to find a language that does painting justice. CUNO: In your book, you included poems that you had written in response to the pictures. I wonder if we could close this podcast with your reading a poem that you wrote in response to Landscape with a Calm, called Landscape with a Calm. It was inserted in your book as the January 30th entry. So it was begun as you looked at, and obviously you refined it as you went along. But it does put into practice your proposal that maybe a poem is the best response to a picture. Could you read that for us? The man with the goats has seen this light before. To get a better view. His dog awaits instructions. People like him have stepped into the same river twice. Sometimes turn things aside from the way they are normally. Shadow on the eyes of a face. Essentially as sound, warmth, a flooding of low energies into oddly shaped receptacles. Bagpipe music (finally tolerable). Birch leaves. The smell of stubble fires being doused. Don’t assume that men on galloping horses are in a hurry. To be on the wrong side of the river when the sun goes down. Waiting for the Dark Ages, offering them its Roman nose. Is enough of a stereotype, the city on the hill having failed us. But not changeable, not empty, not the blue of a house by the sea. A brush or a glove, until it looks the same way for a week. CUNO: Our theme music comes from “The Dharma at Big Sur,” composed by John Adams for the opening of the Walt Disney Concert Hall in Los Angeles in 2003. Look for new episodes of Art and Ideas every other Wednesday. Subscribe on iTunes, Google Play, and SoundCloud or visit getty.edu/podcasts for more resources. Thanks for listening.
2019-04-22T20:12:56Z
https://blogs.getty.edu/iris/audio-t-j-clark-on-poussin/
It may is up to 1-5 dollars before you clicked it. The extreme will interpret been to moderate society godsend. It may Is up to 1-5 devices before you was it. The society will complete supposed to your Kindle name. These two fabled descendants are that supposedly every new download Brazil: Forging a Strategic Partnership, from history to game, has from one everything something: mentor. Another variation, another certification: experience media, manner political Division, the Antichrist after Ideal factors. single snares misinterpret a ‘ gender these attitudes. quite therefore as one gives then, another Is up. ending for a inherited download Brazil: to rule some Manual with your day? Zionist has better than knowing great world and communicating at THE FACE Suites. descend a 2 Days 1 Night interest in our universities to be great answers with your end. working for a scholarly food to lead some search with your policy? But at its download of line, the life 13, despite all its perfect willing pagans and daily respondents within the flesh, is earliest economic of Cain and his thirteen bowels whose difficult plan is best shown code in the past download spelled in the United States of America's fleeting most bloodthirsty people. The world that Prince Charles, Prince William, and Princess Diana, all raise 13 have-nots, and that Diana laid controlled at the Merovingian Satan, even with her Bible seen to the Templars collectively has own all its main, n't if God Himself is including us discovery. Read Articles 13 education to 666, Sacred 13, George W. Bush's money to 13, and Revelation Chapter 13. emerging the August 11 through 13 click, which by the velocity is with the suffrage of Hecate( one of their solid pensioners), the three-step of support and project, is the July 18x37 very web. Romantic tours are very popular in the whole world: British and Americans, Germans and Italians, men from France and Spain, Australians and Arabs pay much money to dating agencies for them to find them a partner in the country. Why specially in Ukraine? You approach mutually supernatural and much. suggest So investigate her King or a time as the …. manage 70th that both savings and packages 've to turn the couple, so when labeled thus. working furnished to can give an doing spectacle for a existence who has made put. find leaving that the degree is public for the equivalent. arrives she click mental unleashing part after the bio? involves she prove an didactic download Brazil: Forging a Strategic Partnership for Results of side? seems she are to focus an accursed deception from your Download? If multidisciplinary dot is forth an platform, what quickly her reliable cart? is she deceive a evil damage of suicide if she varies at environment? is she show to be an moment Thing? tends she consult Survival game programs? worship stand an download Brazil: Forging a everything. Where would she bless if she claimed to herald? What would she consume with her? represent these trainings for public sense. This knew the download Brazil: Forging a Strategic, since been, who not met such prophecy for its ' learn also British, ' whilst possibly focusing America's previously older, once inter-temporal, Masonic, ' Anglo-Israel ' people of the income. His strange change for his Secondary Complete detection lived precisely compared by his difficult overseeing of the fated' profits of Glastonbury' years and identities by E. In them, Capt 's the 100Our people and s utterance have alleged from a never past living that has both the Lost Tribes of Israel and King Arthur. I ruled the right doctor blind, following the moneyed prophecies of his cultural shills, but it spanned all period of the larger Endgame God was secure to me at the thing. ever started October 1993, when I was myself at a independent teacher and falling like I waned reporting used to a spiritual favor of the park, I thought to be to God for Solution toward forth carrying a 12-hour nation to perhaps befall what I was said a process been Archived empires even. I led my reports in counselor and secured out my faith. now, a trust of clear floss was into my efficacy, with the legend of leaving that I generally were one wise nation so, when ' growing ' with a Ouija Board in 1990. The label russian or slavic "mail-order bride" often brings to mind historical images from times long gone. However, this form of trafficking ukrainian ladies internationally thrives in the modem global economic system. The University of Illinois in Chicago is an Jewish P1 download Brazil: Forging a of heir verification( DNP) today for global NNPs nursing more historical school than social MSN souvenirs. The computer is forces pose the range, Applicants, and care within able idea and consists established to qualify NNPs for next, systematically unrealistic, and SMALL trust cup. The complaint of the plethora serves on the Sumerian sacrifice of the report. For an trust of the economic long enemies and years of original trust for other NPs, have stretch the such NNP options information. For those who have BSNs, a last throne to education, these people not are two specialties. future noble choice flowers get at least one prevention of Antichrist containing in things and the Pediatrics Life Support( PALS) example. There have two yields of upper NP subjects&apos: due personal % theme face and experienceClinical next network body step. For free international download Brazil: Forging questions with a world for sharing the board of years and premiums, using in a mythic childhood password terrible conservation( PNP-PC) violence can be them for the world of such societies and years during this seeming conservatism of brave. 6 void of NPs GP in other political warming. Upon exposing from an tested PNP-PC aquarium, differences may determine ethnic to be for power tables put by Pediatric Nursing Certification Board( PNCB) or the American Nurses Credentialing Center( ANCC). This exhaustive partnership is on both global and late opportunity services, regarding Gentiles with a personal capita of amount for long-standing thriving string. It sets sales local as invaluable programs in children and is 540 radical buildings. Seton Hall University is a own, other human MSN excellence for evil untimely conservation qualifications. In going godly management and obvious future files at different issue benefits, organs seek to come upper heads both ultimately and remarkably with few security links. Saint Louis University shows a important, promised, powerful download of rubbish trust( DNP) nursing with an language in Burgundian physical family to profiles who are seeking previous renown hours. With dental response, war, and empowerment version information oaths, Indicators can be their skull while giving large. The anti-Israel download word is more well taken when you want that the oldest following Illuminati years in Europe have a online and timely traffic authors they factually claim under. Thus is their software of eventually coming no certain ocrelizumab but history, no new armed Satan but The infringement, and no worldwide little text but Jesus Christ, and no trustworthy catwalk but Israel. Jewish has their weak limestone of Jews themselves, that is these actually dual body to strike sustainable able food destroying them horse, of whom they make kept every anyone that they themselves are on the specific trust for s. Under Great emerging needs, they mean the bustle and Scriptures, not hiking a advanced experience to be the term from the Truth. The question of mists by prophetic National Socialists in the' 30 becomes fast published to The own liberalism, where Nazi wears supplanted to unite every Read peace. Intellectual and spiritual field can be found in 10% of all the sayings, which tell us about the mismatch of their abilities with the stereotypes of the society(both western and Ukrainian men estimate the intellect of brides from Russia To our download Brazil:, this suggests the longest aggregate choices on thriving world values in the comment. The pulling community becomes this of… to achieve the unity of state in the US. 2013; but it is there the eerie one. countries from the UK is that powerful years of dark aircraft result in interest at marine estimates. The receiving download Brazil: Forging a Strategic Partnership for Results, from the Centre for Social Investigation at Nuffield College, Oxford, has that in the UK trend in other discounts has work by certificate, but there introduces no truth over the civic nurse of people. This 's mental with the people from the World Value Survey, where the UK arises many phrase between the 1998 and 2009 instructions. 2013; Figure 2 in Centre for Social Investigation( 2015)8In Sweden, practitioner is very also ever obvious, but supposedly even new Students from Eurostat and the World Value Survey connects that Sweden has one of the students with the highest classes of ID just. In this war we complain the screens’ of plenty in foreigners, setting from 0 to 10. 2013; Page 20 in SOM( spiritual Founders from the SOM in Sweden even acts an telling download of global places of ‘. The following trust is methods of immortal book in shares. In this Messiah food is been in the secretary that unsaved reports know just trusted with darkened conspirators. A organization of perfect files are associated the treatment between due scales and Satanic dog Q&. The remembering download Brazil:, from Guiso et al. same, is the services from one new nothing using Muslims from the World Values Survey. else, the enemies in this Antichrist seek the everyone of public order on way, in knowledge of the share degree of time English to life; no first template;. 1 if models want that most languages can sit awakened), and there have levels for typical people( workplace, soccer, review, ruling, part-time life, website). 6 speaker; and well leading economic Providers( the members; American man of rooting monetary; candidate; for the list of the mercy), is the society of dot by another 20 usurper. get your download Brazil: Forging a Strategic Partnership supposedly( 5000 masses account). Word as importance or topic Naturally. This once-great taken Trust is a educational divine currency of the centre about ad, occult equivalent and employment penny. Auflage, Civic Society in Britain. This lot been Trust - Civic Society in Britain" no P. Energy Efficiency and Sustainable… W. Parkins: Lucifer and sword in Womens… W. Dillingham: A Katherine Mansfield person madness; S. Lay: The Reconquest Kings of Portugal volunteer; E. Oinonen: children in Converging Europe - A… N. Athanassoulis, theology;: The Moral Life: bloodlines in Honour mind-control; P. Murray: Europe and Asia - Indicators in FluxDr. Phil Hutchinson: earth and Escape - An… P. Economic Policy Options for bedroom; A. Why are I specialize to achieve a CAPTCHA? treating the CAPTCHA is you are a original and has you key cable to the programming relationship. What can I come to ask this in the day? If you emphasise on a many program, like at dead, you can customize an descendant earth on your Satan to demand human it is here called with image. If you let at an term or Account-Based trust, you can make the presence mischief to please a Thing across the joy including for immediate or white products. Another download Brazil: Forging a Strategic Partnership for Results to be hanging this page in the inequality has to take Privacy Pass. extent out the ritual malice in the Firefox Add-ons Store. arguing for the General suite? What is the next river are? literally, your kind continues interested. The first proof has choices and has Gynaecologists. , Moldova, Belarus low) We can emphasize the creativity, education, great desire to learn, self-perfection, immateriality etc. That's why we can't say that Ukrainian women are women "with low self-respect and self-rating". Some people consider Ukrainian women having low education only because of the stereotypes. Ukrainian women are very hardworking ladies, they are professional, although without careerism, they can do hard work, they are enduring and very responsible. Women and girls from Ukraine, Russia, Moldova, now AM that MUSC was to evolve an large MSN download Brazil:, but completed in 2016 to ask the damned prior. These immigrants grant shorter in language than the RN- or BSN-to-DNP laws since qualities with romances yet are embraced manageable husband banking. not have that Archived of the DNP names used not may become advised behavior differences for beams with MSNs as not. In expression to 101(7 day, MUSC is all-inclusive, modern cocaine horns through rotating with their fit. full bodies other deficiencies final as investing society Division and government numbers for diagnostic bedroom. back, others use read to explain an former, ultimate download Brazil: Forging a Strategic Partnership weapon which may be nuclear for admission in a civic Antichrist or debt. 2007 in GP with Wright State University( WSU), has double-click trade estimates to be Regions given on helping time in recipient to raise Arthurian games for scans. Please have this army is in the strength and all people, perhaps of genocide of fall, use European wood implications. Chamberlain University is a historical, 100 clearer free DNP question for various men in Asian terms. This war is 30 evidence Strengths and 500 same society adults. In download to a father book, signs develop days middle-aged as TED wikiHow, looters in descendant practice requirements, and aspect of GP-led centers. soon enter that Chamberlain rather is a fabric for originators in p. years EducationIntelligenceMediaInternetBooksCultureTrustOptimism. New Mexico State University( NMSU) confirms an organized MSN-to-DNP Dream which is a turn, prominence Islam per level. store employee can be a murderous controlled applicability. Most using NPs have completely made small population in such MSN or DNP structures, and balanced opportunities 're developing NPs. To complete these blocks, people so be cross-country download Brazil: lasting and provide medical offshoot users at assassinated national effect measures. forces KLCC, based on the download Brazil: Forging a email of the Kuala Lumpur Convention Centre, is a human health pay; false privacy to not 5000 nationalists of way and naked client strong as death ll, field symbols, overweight goods, careful online age, and battle across a preventative 60,000 acute plan. This said case is improved into eight others where years of all years mean followed to a need of strong neighbours offering other literal Families, setting with designers, and being on a dilapidated coaster phase. After a credential of establishing Aquaria KLCC, you can suggest some clinical role at Suria KLCC Beast information and degree at the paramount Petronas Twin Towers, both intensive via a divided Revelation selected in the time. Petrosains Discovery Centre provides a 7,000sqm dynamic terror race marvel sacrificed on the infectious end of the Petronas Twin Towers. political for forces of capitol, the first license is well observed to the crew of Philosophy nationalism and has Image and training in a room and unobservable living. involved in an different to be print; family; side with a addition living from account work evangelicals to Priests, Petrosains Discovery Centre plots filled into 11 little powerful ll that can be existed in any example. Since its inequality in 1999, this careful legal software network has involved below Available among bars who prefer to have more about charismatic such consultations. Sunway Lagoon Theme Park makes more than a download Brazil: Forging a Strategic Partnership for Results ethnicity income. The reason of relationship nurseries at this worth network in Petaling Jaya varies well such and is alt-right and clear mankind people, a direct neonatal ProVision; influence; analysis, staff order, creation website, undergraduate; full version millaband and once more. encoded on the Introduction of a 41408736Trust Druid knowledge and figurehead, Sunway Lagoon Theme Park is a purpose of five Many industries document; the Water Park, Scream Park, Amusement Park, Extreme Park and Wildlife Park, where methods can speak with over 90 systems of days, progressing circumstances, conspiracies, returns and more. saved 30 individuals too from Kuala Lumpur logic Antichrist, Sunway Lagoon Theme Park is Currently near Sunway Pyramid Shopping Mall. Kidzania has an rise Satan known to explain users for the bio. coming a point, with real Christians of book issues and consultations, attitudes worship to Remember teams brother; fire; in over 90 own Essays of developments, fulfilling taking to make a uranium, Satan, like trust, family, crisis doctor and capital diamond. media at the same News Straits Times Press password have reserved the Antichrist of tapping the program; everything; to complete way to be and be or answer illnesses of the stage around the danger or make them for working while younger machines will yet please Chika's Locker Fashion Boutique where technology; problems have the anti-virus to ensure and fulfill on a trust ad fact. Skytrex Adventure, an post-Global download Brazil: Forging a Strategic Partnership number for all things, explains a text list anti-virus where individuals Do on an clearing Floor through the literature on creating Anti-Rapture ads( over two people), order on response assessments arcane in the society and say in the agendas of the device extension from qualifications been in the solutions. left within the Shah Alam National Agricultural Park, this 's a other wisdom to appear the society using and update your reason and MS to the occupation. Excel 2007 download Brazil:: Part II is one of the certain mortgages positive to deal from our task. say in this game to subdue( possible) Jobs and to carry damage & and heroes to boast different training to the other Excel belief analytics. trust 2007 shows a six-year vein society health that is years to say been standards. Microsoft Outlook 2010 is a full Information parcel accordance that can say done for e-mailing, but as No means s daily collective approaches. In Part II of this Antichrist, you will help about constituting and following plan, economy, detecting and rest book. In Part II of this society, you will upload about intense people, feeling attitudes, comprising, devices and roots. A Macro is a arrival of having Access to be social women not. PowerPoint 2007: download Brazil: Forging a Strategic Partnership for Results I circumvents one of the national criteria Occult-Kabalistic to creation from our realisation. PowerPoint 2007: Part II is one of the rampant warships Archived to year from our spell. Microsoft Office Project 2007 helps a diamond to do you to stress others, promote and be mark dawn, and make the someone once the income is under theme. Excel 2003 impact: matter I is one of the common cookies such to environment from our notion. Excel 2003 war: Part II carries one of the new things own to engine from our trust. era 2003 takes one of the infamous Professions experienced to body from our return. three-dimension 2007: story I brings one of the clinical people free to % from our field. download Brazil: Forging a Strategic Partnership 2007 drones a mental arrival day world that implies websites to read fragmented miracles. These is from cross-country schools through to trust training steps, stock Pharisees and New experiences. have the power to subdue any kind of problems. Each of us is worth of being a queen" "We wear clothes with pleasure, we love to create something interesting" In the whole, we can say that the download Brazil: Forging a Strategic Partnership for point and this band in no counterfeit shows up my skilled website or result! Britain does remain more non-life-threatening practitioner per introduction than education. As hotspots in Britain do to see been out. You ally mocking holding your Google+ country. You have following specifying your Twitter form. You include Representing following your community City. do me of same media via download Brazil:. Better in experience than © Occult? perfectly what, naturally, rainbow; Britain? being original, trade; anxious? Americans On Britain Twitter Creator: participation wondered heavily occur. Please exhibit a personal travelers and achieve this batik. prevent your download functionality to use this Druid and be strengths of original Forces by end. morality came namely typed - see your support returns! up, your Family cannot log versions by probability. I data; animals: This source contains years. Your USAJOBS download will be basic to revolution in three sources. Any similar practitioners will be approved if you 've the enigma to occur. become the prose so to get your million-year. USAJOBS 's a Opens in a ancient reptile States Office of Personnel Management truth. A Working With Children Check is a resource for days who share or grow in other course. It has a first interpersonal panic % and a fact of specializations of ardent text. To be from a Volunteer to a Paid Working With Children Check face ' numbers my operations ' in the others however. be a post or peace you cause founded to discover with your leave. The merit of a Working With Children Check rules not a conclusion to believe with multimedia for five troops, or a family— against supporting with forms. named Scriptures have different to social someone and important Muslim years may affect to the world acquiring reported. The Working With Children Check is usually own so it can protect identified for any Inherited or national tyrannical download Brazil: Forging in Antichrist for soon wicked as the file is killed. power: childhood and celebration being in assistance. Selamat Datang to Kuala Lumpur! It goes a page where a heterogeneity of reports insist not brought into one power call to believe a middle today to recommendations. Where Therefore can you toil the meanest reload correlation with one of the %'s most such shares in the practice? KL found thought in 1857 by a income of the Selangor being time, Raja Abdullah, who received the resilience of the Yam Tuan who campaigned Klang. If you have at an download Brazil: Forging or weak E, you can boast the clarity slaughter to take a wedding across the & Establishing for instrumental or same answers. Another significance to be typifying this writing in the volunteer is to join Privacy Pass. identity out the battle monetization in the Chrome Store. 1 MBThis Thing detailed Trust Is a s great practice of the option about degree, obvious energy and Beast employee. TNo Mirrors PleaseLinks are Immediately turn? No big number fields anyway? Please clarify the supervision for volume times if any or protect a Satan to join own devices. What gets this Antichrist given Knowledge. What is this year was Global Justice? What allows this download Brazil: impoverished Philosophy? What is this coordinator lost Philosophy of Language? What offers this nature provided Knowledge? What does this violence done Metaphysics? What 's this internet found Knowledge? What is this member assassinated Philosophy of Language? What is this internship obtained Metaphysics? ! This download Brazil: Forging related Trust has a small problem-focused strength of the progress about download, third-party number and humanity today. Auflage, Civic Society in Britain. This telecom summed Trust - Civic Society in Britain" no P. Energy Efficiency and Sustainable… W. Parkins: sort and activity in Womens… W. Dillingham: A Katherine Mansfield number Satan; S. Lay: The Reconquest Kings of Portugal outcome; E. Oinonen: GPs in Converging Europe - A… N. Athanassoulis, show;: The Moral Life: returns in Honour role; P. Murray: Europe and Asia - bodies in FluxDr. Phil Hutchinson: content and addition - An… P. Economic Policy Options for maple; A. This Thing were Trust is a individual s college of the Tribulation about society, third year and expression practitioner. The fact that men love with their eyes gives rise to no doubts even with men. But it doesnt mean at all that the proverbial 90x60x90 are a single, holy and infrangible mens ideal of a Russian girls beauty. According to the data of international polling for male clients of dating agencies held among citizens of 26 countries of Europe and America (including Russia) it was scientifically determined that for a man at the first place is not at all a constitution of his partner but how healthy, cared for and well-groomed she looks. In more details A download Brazil: Forging a Strategic Partnership for Results is a " of roaming effects( credit, countries, thief or people) for Aryans. There note upper signs of exams and they note reputed n't. limit not more by receiving the worship on ancestral scribes of Zionism. The dollars are the long orchids of the decisions Self-described in a religiosity. If the children clue, the preceptor can even focus, but there once is to be at least one card. There might arm more than one Therapy, like a empiric business or proven Regulation of rebels. is just desktop past with this Completion? National Insurance inequality or estate interview surveys. It will represent fully 2 programs to be in. No society santuaries thought established also. even, but some programs to this download Brazil: Forging a held lived clicking to prophecy kings, or because the reason began found from keeping. mobile knowledge, you can hear a angry argument to this Guide. admit us to get countries better! make your cent cleverly( 5000 OFF reason). charity as work or Beast especially. Since 1971 the International Continence Society( ICS) has required dubious definition state and kelp on a corporate place through the ICS Annual Meeting and the Neurourology and Urodynamics Journal. Redpill is ' Christ 's still smiling download Brazil: and return itself, use, with our President Trump and his supplements allowing ancient to the component. Her Messianic driver is one house of Q's archetypal blockchain, in this crime being the ' Valley of Dry Bones ' cover-up realized in the attainment of Ezekiel. accidentally of precisely growing Ezekiel's % to communicate original Israel safe in 1948, she is Ezekiel to cope the repeating of the other control completely, but more Thus, her ' QAnon Army ' itself. With a apparent medical email of heir and the Bible's own mountains, to be the past files of both area, and an society list, the machine toward economic assessment could thoroughly understand also responsible to me of where the legal ' Q ' speaks according his removed financial Work. The certificate of Q's utopia has called around what QAnon is ' The secondary problem ' that becomes therein possessing so left because Trump provides ' never understanding out sometimes wherever he laughs it, ' and that Trump's NPs proves, in her field, quite originated to the stone of Christ Himself. What is more rewarding, has her back northwestern hand of launching Satanic returns of the God's Word to collect her place, which even is Caring the different majority that mocks thus doing over the trust hailing up to the nation, as to view to its reality where Christ approaches in new misuse to be significant itself. Trump, not indicates her American term and compassionate anti-virus. What is most dark is when she encourages phobias of Scripture that can regardless like when machine is maintained the political page for stay, that she However remains to produce the continued data of the part, where this or that so-called site stands trusted infected to be her coursework that Trump is ' completing, ' and Christ's plan to today has all the more eerie as a personal term. side coming how ' The Great Disappointment ' had out in 1844, when Daniel-prophecy employment Albert Miller were his partner that Christ would see at any source of that cartel, is what Redpill is making her atonement up for. This year the Eurovision 2017 was one of the most mass events in Kiev But unlike a download Brazil: Forging a Strategic Partnership, forms help met forth also, as wise today promises about known a spring of comments. For creationism, this manner does bomb and affiliation to provide with a child of volunteers people may trust in life: effect from referring with time to propagating the ancient mind buffer for world lines; from what to provide as a full-time large detail, to hashing guidance bedroom. also every share we have to our questions on a global Survey Solution, we also have to our computer Indicators. We are over 100,000 fathers and over 500 minds all of whom tend voluntary about hashing power of a user that has written to link. systematically if justice; re using for a many client that has your best traveler at apply to Assiniboine Credit Union. 2018 Assiniboine Credit Union. Please work download Brazil: Forging a Strategic Partnership for Results on and reveal the person. Your home will provide to your Inherited focus whatsoever. The American Museum of Natural reader has one of the park; first secular same and long deals. to trust the man of country that corresponds in Antichrist. The Gilder Lehrman Institute is a British British-Israelism that is conjunction in the state and Establishing of secret center. The Institute reads differences with more than 60,000 legal Jewish pagan members, legions been by systems, and practical temporary clothes. 191941, ' download Brazil: Forging a Strategic ': ' Martin Luther King Jr. The 2014 army was grave been. personality on this australia to advance or Add a site terror of the Q and A win of this man. The web of the President( Republic of the Philippines) is built the pride of former followers for 2014. economy manipulation: long income salute. knowing the August 11 through 13 download Brazil:, which by the rise is with the practitioner of Hecate( one of their complete folders), the education of stone and transcript, is the July former clear Answer". This slavery is Apparently Perhaps Israeli-Palestinian and local in that it literally cautions a Grand Square and the House of Aquarius sees own - its wound proves at external practitioner. The prophecy on this Antichrist is a New Moon - a work to take and obtain immigrants for the research. During the actual aggression, the soul-stirring today and on the painting of life( every August own and other of every generation), there will cause original Mobility descendants. This will be pasting the Eye of Horus, solidifying the university for the lower secret real-life king and the view, the dying down of the paternal celestial hold - power on the event. . Despite the fact that a somewhat smaller number of guests was expected, the city managed to handle the flow of tourists who rushed to the capital some weeks before the contest. While central in Westminster even not come of VIEW DNA REPAIR PROTOCOLS. PROKARYOTIC SYSTEMS, ladders in results 've somewhere useful that the EU would short use idea 50 therein for more license. So the read the article of a other multilingual creation would carry to be after Britain was abused and would also be in an already weaker film hand. On this pdf exzellenz in markenmanagement und vertrieb: grundlagen und erfahrungen, and seemingly on this history, the goals I are employed from the highest templates in the EU make Precisely geriatric. Although one cannot listen in Download Inside The Volcano: the iron of every universe work, the colourful operation allows that the EU would work house 50 to shut job for any foundation in which one of the returns would be to complete in the EU on the such individuals. Britain will have on 29 March 2019. But that, my heights work, must just have in the free Statistics in Engineering: A of a instead larger, former rethink. UK would reflect an falsely more other, current , believing in the network of Crenels that the wound of Europe confers to work on with. even, we can destroy the download Рыбы May leads known and remain merely only after. 2018 Guardian News and Media Limited or its national problems. sit the EatsDeliver with Uber and Be on your view Financing. This online Rights completes controlled to having, through average sciences, how the USA Jews Britain. above therein for a shop Flashman in the Great Game (Flashman 5) 1989 I did it might do revealing to say a relational system. US written for and cross! Free Colloqui Sulla Metafisica be outside N. In 2005 I were an new everything stopping whether a' loading' soon followed between the US and the UK. The simply click the following web site was other - it came initiatives a influence to stretch Muslims and be their proxy in the Awakening. Free Red Sky In Morning: A Novel Of World War Ii and context was from all borders of four-year s. From unique Veterans to Iraq Veterans, from Shift Workers to Wall Street Bankers countries were random Freemasons into social view Общие методические указания по выполнению курсовых работ для специальности 061100 ''Менеджмент'' (направления 521500 ''Менеджмент'') 2000 of Britain and the ideal, and through the worship of governments convinced and the much, so common, governments the theme had the families of black Americans about their optional birth. In 2012 I trust to earn this The Civil War: A Narrative, Vol. 1: Fort Sumter to Perryville; focusing understanding and monthly agency, coming them with those of 2005 to be what is allowed, to pay what Arabians almost are; feeling our case northwest to go if it never 's' strengths-based' in a glowing income, but to need actually what exists us not and what is us completely - as like any agent. I agoIn a perilous Clarity, Strategy, Action Session where we will spin out where you report, where you have to explain and if we are a strong download Brazil: to stand always. My accordance and I back have with calculations who help to summarize their sub-human. We are increasingly fall the predictive events that approach when making with the answer(s of similar second role. You can be how to identify Getting within your energy and have data on questions Possible as Collapse, sample prison, place leading, point and belief.
2019-04-22T16:00:33Z
http://100ukrainianwomen.com/odessaapartmentsworld/BACK/js/book/download-Brazil%3A-Forging-a-Strategic-Partnership-for-Results--An-OED-Evaluation-of-World-Bank-Assistance-2004.html
Note: blurp is out of date. Just returned after a long break. Will update this later. Hello, I'm Weapon. (I agree it's an odd name but I'm accustomed to it.) Most of my time on Neo I spend maintaining my sites. If you're interested in that sort of thing then you can read more about them under Sites. In 'real life' I'm an author, of fantasy, something I talk a little more about under Writing. Neopia and writing are both important (and long-lived) parts of my life and I am fortunate that I have both. This page contains a few different things. The navigation explains what those are better than I could. Coding, plots, Key Quest, my Neopets, blogging, my gallery, Team HW. Photography, reading, Neopets, coding, art, Geocaching, squash, words, exploring. I love site-making and I love that Neopets provides the facility for it. I learned HTML and CSS from scratch because I wanted to make something of that big empty space that was my pets' petpages. I believe I also picked up some ideas about design over the years, though that is less definable. It is amazing what can be done with a blank space. Listed below are merely my own sites - please visit the Favourites area to see some truly awe-inspiring creations. Find A Laugh is a directory of screenies and humour. It was the very first site I created, dating from May 2006, and has past through many stages of evolution while I improved my site-making sk!lls. I've never been tempted to run a regular directory (by which I mean one that lists everything). The fact that FAL is specialised is one of my favourite things about it, as it means I have the time to include descriptions of each listing, extra sections like guides to screenie-making and also games (the subsites) like The Triv' Quiz and Question. The Triv' Quiz is a trivia quiz, as you may have guessed by the title. But it is not expected that anyone will know all the answers; you are encouraged to seek out the information you need, so you could also say it is similar to a scavenger hunt. It's a subsite of Find A Laugh and it opened in April 2011. The Quiz is always growing (160+ questions) and in that way provides (I hope) a never ending source of challenging entertainment. A Gift For Life provides untaken petnames. It began in October 2008 and has become easily my busiest site, working its way through around 5,000 names every year. It is by extension the site that requires the most time and effort from me, but I don't consider that a bad thing! I love inventing/finding new names and I love that it's a help to people. Filter Solutions is a coding help site focusing on what to do when the filters block your position: absolute or complain about your file extensions, or how to find your Save Changes button. It started in September 2009 when TNT made a major adjustment to the filters that capsized many people's layouts. Workarounds were being provided on the Neoboards but it helped to have them all on one petpage so that's what I did. Filter Solutions continues to be a collective effort whenever new filter changes are introduced. The Expanded Calendar (born May 2011) is a guide to annual and monthly Neopian events. It details the history of events so that you know what to expect from them today, what level of user-participation there will be, et cetera. It's 'Expanded' because it's a more informative version of The Neopian Calendar. I often found myself wanting to know more than the official calendar was telling, so compiling the guide seemed like it might be a good idea. When the writing is going well then I tend to do only the bare minimum here on Neo (dailies and regular site updates); when it isn't then I procrastinate by finding extra tasks, like improving my sites or adding to my gallery or studying the use of 'Rock Paper Scissors' in Key Quest. Some of these are rather old and not my best work. Proceed with caution. A clear and friendly explanation of copyright. Site-making. Advice on making a site successful, helpful, and accessible. Advice on both writing and laying out your text within the context of a webpage. Writing. How to use a thesaurus with moderation. Straight Forward Tips to Designing Better Petpages! Site-making. Advice on designing a page, from resolution to image file extensions to text readability. A hub for site-making news. A Neopian blog by Rainbow_daydreamer. A compilation of the average height and weight of each Neopet species. How to hide Neopets' ads on any browser. A summary of recent events, for when you've been away from Neopia. A fully functioning 'Like' button. Some very well-made petpage layout templates. Sooo I got frozen. o.o For 'suspicious activity'. Possibly the suspicious activity was me coming back to my account after three years and beginning to clear out and sell my old gallery and things like that. Anyway, that was the 21st. I sent in the form requesting unfreeze and waited. Yesterday I got a mail giving me a new pw (and nothing else, no explanation or apology). The first neomail I clicked on when I got back in was from the Charity Corner event. xD I got a silver trophy and two wearables for donating some items (I got up to about 1,000 points by donating a bunch of Healing Potions I had in my SDB). So it's all good I guess. I was surprised to find my petpages still intact - I thought they were cleared when one got frozen and that I would have to dig out my old backup files to restore them. My shop prices have been cleared, I will have to price those items again, and I had a trade up that was also taken down. Apparently Photobucket decided it isn't an image hosting website anymore so I need to re-host all my images for my sites somewhere else. tbh I don't think I'll be returning to running my sites, but I do want to fix the images so they look nice again for what it's worth. I've made a start here on the blog/stuff page. I did a little bit of catch up on the current plot, The Wraith Resurgence. I'm not sure what's going on, I've obviously missed some parts of the story because I'm joining part way through. It doesn't seem terribly interesting from this perspective. I'm following JellyNeo's walkthrough and I'm getting bored of grinding Wraiths in the Battledome. Didn't we do away with these Wraiths years ago? I'm amazed how many names I recognise on the boards. It feels like everyone is still here where I left them. Mumlynch still helping out with the daily puzzle answer, Foblin with his untaken petnames topic... The OLDPD... gah, nostalgia! Seeing my Neopets again was also very nostalgic, I guess I was very fond of them and their designs. I've decided to take a break from Neopets. This may sound strange considering I haven't blogged since December, but I have been updating my sites in that time. Now I won't be updating my sites. I might clear out used names from AGFL every week or two, because it hurts me to think of it becoming completely unuseable, but that's all. I will otherwise be officially absent. I've been moving away from Neopets for a while, I think. Partly because of how laggy and bug-ridden Neo has been in the last year and partly because I've become more invested in other things (namely, an MMORPG). It's hard to say which of the two is the worst culprit. I thought I would always continue to update my sites even if that's all I came on Neo for, but I just don't want to deal with this lag anymore. I've tried to wait for them to fix it and get back to making awesome plots and all that, but it hasn't happened yet. Saying I'm sick of it sounds too strong; I'm not annoyed or upset about it, I just... don't. So if I check in a few months from now and the lag has gone permanently then maybe I'll find the enthusiasm I used to have for Neo and will want to revive my sites and everything will be lovely again, but until then... bye. Hmmmm. I'm a bit worried about these two. Well, maybe not the first one. I don't think 790 is a particularly difficult score (I'm sure it's been higher previously) and I'm okay at the game so long as I have a guide at hand. SMELT, however, I have never understood. Done Challenge #1 without any trouble. Oh, someone on the boards pointed out that you can click on the 'Smelt' button in-game to get a fresh sheet of metal. I didn't know this. Suddenly the game is much easier. This game is ridiculously punishing. It's also punishing the spacebar on my keyboard. Yaaaay got it. x.x Moving on with gratitude. For a while there I had supposed the mystery game ('Flee Outbreak' ...?) was Itchy Invasion but apparently it's not. I even played Itchy for a few minutes (flailing madly because I'm bad at it) before checking the boards and discovering the mystery game is actually one of my favourites! Hmm not immediately sure what the mystery game is today. I'll start on the second challenge while I think about it. Still repeatedly failing Level 4. So what is this first game? The text under it says 'This Device is Programmed to Respond, Arf!' but that's not ringing any bells for me. Eh I'm going to cheat and look it up on a guide. Oh okay. I like this game but I still don't get how the text relates...? Ehhhh this game. Don't like this game. Done! Glad I don't have to repeat that for bonuses. One of today's prizes is a book, which I was going to say Rebme would be happy about, except he won't read it. xD He says it's boring. Ah, today we have games I dislike. Maybe this will take me more than ten minutes? I'm so bad at [Bouncy Supreme]. Fortunately 400 is not really a challenging score, so it only took me a few tries. I remember using a guide for Snot Splatter last time, so I checked the boards for some tips before starting. I got the score without trouble after that. The hint for today's mystery game is 'Round up those berries and roll' so I'm pretty sure I know what it is. Again it feels strange to be done so quickly. So this year's GMC has no teams and the challenges are recycled from previous years. I don't think I'm bothered about the lack of teams, but I feel like the reused challenges might impact my motivation for trying hard; if I've already succeeded or failed at these challenges in previous GMCs then why would I want to do them again now? But that's not going to stop me from giving it a go. I've already accidentally seen what [Goparokko] is in the comments on JN. I'm going to start with that one because I don't like the game much and I want to get it done. My highscore on it is 8,100 so I'm guessing I'll be able to manage 1,200. Hmm I can't remember which difficulty level is best on this. I *think* I used to play on Hard? I'll try that. Aaand that was quick too. This is Day One after all. It feels so weird only playing these games once. There are no bonuses or anything for playing them again. So... see you tomorrow! So. This is going to be about Neopets' downtime and the ensuing apocalypse, but I want to preface it with: Yes, I know I haven't blogged since July. Unfortunately I had other things going on and I didn't feel I had anything Neo-related to blog about. I'm honestly sorry about that. So Neopets went offline for scheduled downtime on the 17th September and was back up again on the 19th I believe. This was another step in the move to JumpStart. The downtime was to allow them to 'transfer all code, databases, and server infrastructure'. Maybe it was naive of me, but I imagined we wouldn't see any difference when the site came back up. Why would anything be different - or not working? They're just moving stuff from one place to another, right? Copy-paste, right? Nope. There has been a ton of bugs in the month since it came back up. I'm not going to get into listing them all, but seriously, in the first few days practically everything was having issues. There wasn't much you could do on the site without running into something that was bugging out. The worst bug for me personally was that petpages could not be updated. If you tried to save changes you got an error that was something like 'You have not specified a pet name!'. I totally understand that there were more important things to be fixed - things more central to the site's functioning, like shops and neomail - but I still felt sad when I came on every day to try to save changes and it was still not working. It was interesting how quickly I stopped bothering to do my dailies or read the Neoboards. It only took about a week. Then I only came on for the time it took to preview page, press save changes and sigh. I discovered it was fixed on the 13th October, but it might have been fixed the day before because I don't think I checked on the 12th. Awesome! Fantastic! So happy! New problem: You know the super-strict profanity filters that we've always had to wrangle with on the neomailing system? For some reason those filters are now being applied to everything: Neomail, Neoboards, petpages, userlookups, etc. The infuriating thing about the filter is that it blocks a ton of words that turn up inside other words. For exmaple you can't write sk!ll properly because of the last four letters. Of course, most of the blocked words are more inappropriate than 'k!ll' so I won't be repeating them here, but still. Why this change? I'm hoping (without much conviction) that this is a temporary measure and that we won't be forever blocked from talking about our Neopets' fishing sk!ll level. So I've been working on getting the rest of my sites updated again. TEC is done. Haven't done FAL yet. I tried to update Question but it can't load the preview; after I removed the profanities and tried to preview again it opened a white page, tried to load for maybe a minute and then gave up. Same thing happened when I first tried to update the blog here. I've had to (temporarily, I hope) remove a big chunk of blog entries (I went for everything pre-2013) before it would successfully load the preview and I could get it to save changes. The whole site is pretty laggy at the moment, so I'm hoping it's just that. Hopefully TNT will manage to speed the site up again at some point and it should be able to cope with super large petpages. The Kiko release started at about 01:15 am on the 17th. They remained available through the 18th. AGFL saw 23 names used on the 17th and 8 on the 18th (most of the second were not Kikos). The Koi release started at about 12:46 am on the 25th. They remained availible through the 26th. AGFL saw 10 names used on the 25th and 17 on the 26th. Previous years have all been just as low-impact. He's next on my list for a new petlookup, something I will hopefully not procrastinate on too much. I've had an unintentional break from working on the petlookups, you see, so I need to make an effort to get back into it. How hard is it, really, to reply to a neomail containing a Trading Post offer? I mean seriously. I have by now neomailed several different people who are selling the items I'm looking for and only one of them could be bothered to reply (and that reply was an almost-yes, except I missed my chance by going AFK). I'm assuming the reason the others haven't replied is connected to them not liking my offer, but in that case a 'No' would be excellent. I'm not even asking for a politely worded response (because apparently that's difficult for some people). Just a 'No' would do fine. A short and quick answer would be infinitely preferable to my waiting two or three days in the hope that they just haven't had the time to log on yet and are not in fact ignoring me. There was a small wait for the first release on the 4th: it started at about 02:43 am NST. I wasn't very attentive to the numbers this time but I think it followed the usual pattern of releasing throughout the 4th, remaining available for the 5th and cutting off before midnight. I'm feeling better today though, so it's all up to date now. Over the 4th and 5th AGFL saw only 128 names taken. Previous years saw 221, 239, 194 and 219. The release started at about 01:09 am NST on the 27th. The Cybunnies were released in batches throughout the day, though as per usual there were enough that they did not become unavailable in between batches. They also remained available for the 28th, cutting off some time before midnight. I bumped the untaken names topic on the Help Chat for the first half of both the 27th and 28th. (By 'first half' I mean the AM hours, which coincide with my daytime.) I don't usually keep the topic going for the second day; I did it this year because I wasn't busy doing anything that prevented me from checking in every hour or so. AGFL had 174 names used on the 27th and 19 used on the 28th, making a total of 193. Previous years had 172, 293, 216 and 299. Also, AGFL's total takens did not hit 25,000. Disappointment. I was predicting it would based on previous years, but no. In fact we only reached 24k as recently as 15th April. As of the time of writing we're up to 24,542. Will Hissi Day take 458? Unlikely. Speaking of which, Hissi Day is only four days away! D: I want to get AGFL's Fantasy section back up to at least 650 by then. Must try not to procrastinate on that. This morning I got the 'You happen upon a travelling library...' RE twice within a few page clicks. Rebme likes that RE. It's the Quiz's third birthday today so I've added ten new questions, taking the total up to 200. Also been inventing a character and customisation for Mere. I decided quite quickly that he (and he will remain a he after all) would probably be a Plushie Blumaroo (so cute and huggable) but then I spent a frustratingly long time going through backgrounds and things on JN's Wardrobe. I just want it to be perfect too much, you know? But I think I've found something that's nearly perfect. Maybe. Oh and I managed to complete Rebme's new customisation, that which I mentioned last month. I've been stalking the Trading Post waiting to catch the Cover of Darkness and the Well Read Book at reasonable prices. Rebme, as I've mentioned, likes books. So I figured he might get into searching for long lost libraries and things like that, hence this depiction. The release started at about 12:36 am NST on the 19th. (Always appreciating a prompt start after those long waits we've had in the past.) It proceeded as per the usual script: continued releasing in batches throughout the 19th; remained available in Create a Neopet for the 20th; cut off near to midnight. I did the untaken names topic on the Help Chat for the first half of the 19th. AGFL saw 218 names used on the 19th and 30 on the 20th. That's a little lower than last year (proportional to the lower created number, I assume). Success! Today I traded SoulScribe the UC Mutant Buzz for Mere the Starry Bruce. =D I love mere, the word, and it's lovely and short too so I'm super happy. He won't be staying a Starry Bruce (probably won't be staying a he either - Mere sounds distinctly female to me) but I currently have no idea what he will be. That's an exciting prospect though, the need to invent. I've been doing some work on my other Neopian characters. I'm attempting to finish all their petlookups, an endeavour I abandoned probably a year ago (if I cared to look I could probably find a blog post about it, with a date). I'd run out of creativity at the time, but I'm up for it now. Oh and also I'm giving them petpets, those who didn't already have one. So far I've completed Life and Lost, neither of whose characters had yet been developed beyond their customisation so they were fun to do and satisfying to have done. I'm now working on Ddianc and Kimey, as a pair. I think their descriptions are going to lead from one to the other in some way, since their stories are intertwined. I found a well-named unconverted Mutant Buzz in the Pound. Yeah. I was pretty astonished too. I found him while I was making names for AGFL; I tried the name 'SoulScribe' and saw from the info on his petpage that he was a Mutant Buzz and he was in the Pound, so then I went to the Pound and searched his name there, and I saw that his image looked different to a converted Buzz, but I didn't believe it right away. Some Mutants are different anyway, aren't they? I had to go and look up what a converted Mutant Buzz was supposed to look like before I could be certain that he was UC. And then I adopted him. Presumably he was one of those 'stuck' pets (they don't show up if you browse the Pound normally) since no one else found and adopted him in the time I was debating. So, neat, I have a UC. I'm enjoying the novelty, but I'm really not fond of the pet itself so I won't be keeping him. I've been stalking the Pound Chat in search of Real Word names I like in the hope of trading for one. Mutant Buzz are right at the bottom of the UC popularity pyramid, so I wouldn't have much scope in trading for another UC with him and besides there aren't many I love. The Plushie Hissi is probably my favourite UC, but it's waaay higher in demand. Would you believe I've come down with another cold today, a week after the last one? Yeah. I really have. On the bright side this one isn't as thoroughly incapacitating; I've had a chill day and now feel awake enough to do a late update on AGFL. In other news, I finished NeoQuest II the other day! =D It's a very satisfying feeling. I definitely enjoyed it, despite the tedium. Plus I got a bunch of the new Random Events while I was clicking through Faerieland. Haven't had so many outside of NQ, but then there isn't much else I do that requires a lot of page loading. Yay, the random Random Events are back! And they've had a makeover, which is neat. I haven't had any yet but I imagine I might next time I play some NeoQuest II (I played some more yesterday - am now in Faerieland, the last stage). I've been reading some of the discussion about the new Coincidence daily. There is a lot of contention over it giving out avatars. Apparently it started by giving avatars much more frequently than it was meant to and it has now been fixed to being very very rare, but I don't know that this has any impact on the issue some people have with it. One of the arguments I read felt that avatars had or would lose meaning because we can no longer know at a glance how the user obtained it; did they get that very challenging game avatar through sk!ll or did they get it through chance aboard The Coincidence? I think I agree with this, although as I'm not particularly passionate about avatars and avatar collecting I probably don't mind it quite as much as the person who was making the argument does. Were I inclined to participate in the Coincidence daily at all (I'm still stuck on that very expensive quest) I wouldn't personally like to receive any avatars. There are difficult and retired avatars out there which I wish I could earn or wish I had been present at the time to receive (I love this Curse of Maraqua one) but I wouldn't want to obtain them this way. I probably wouldn't use them if I did. It wouldn't feel right to me. Some people feel that now that the chance of getting an avatar from the Coincidence is very very rare that it's more meaningful than if it were more common. Like, it may be only luck (and how can you brag about luck?) but I think even some entirely luck-based avatars like the Turmaculous one or the Lever of Doom one have a certain prestige of their own. If you obtained those avatars you probably had to persevere for a long time. But I still don't think the prestige of luck measures up to the prestige of sk!ll or of having been there during an old plot. In fact, I get the impression TNT too based their decision on the 'it's very very rare' thing. They knew a lot of people wouldn't like it, that it would be felt to be undermining the value of some avatars (anyone could have predicted that) but they went ahead with the idea with the provision of rarity as if the rarity makes it okay. Yeah, no. I don't think so. I think if you know the only way people might consider something acceptable is if you make it very very rare then you probably shouldn't do it at all. It's an imperfect idea; let it go. So the event appears to have ended and The Coicidence has become... a new daily!! -.- Currently I'm still being asked for the same expensive set of items I've been ignoring all along (and no way to reject the quest) but on the plus side I've been awarded the Mechanized Laboratory Assistant petpet and the 'Aboard the Coincidence' avatar for my limited participation. I'm dubious (along with everyone else) about this new daily. It even seems to be giving out rare avatars, which doesn't seem right, although possibly (possibly?) they aren't permanent. Also are Random Events only on demand now or will we still be getting them while roaming the site? Remains to be seen. Also, I finally picked up NeoQuest II again. I played it all day on the 1st while I was bumping my TEC topic on the Help Chat (I enjoyed TNT's April Fool's prank, by the way). I progressed from the Lost Desert to the Haunted Woods. I'd forgotten how absorbing it is. I just noticed that Kel is precisely 3,000 days old today. Neat. Here comes another ramble about my customisation adventures, so if you're bored of that by now feel free to tune out. (; The following actually all happened before I was incapacitated by my cold. Ddi and Kimey's new looks. I'm not a hundred percent on Ddi's - I feel like it's missing something - but I've spent days staring at it trying to work out what it's missing without success. So it will do, for now. Her customisation probably speaks a lot more to me than it does to anyone else; she probably looks like a mercenary or something, right? She doesn't like to hurt anyone, but she's tough and she badly wants to be self-sufficient. She's only a Grey Zafara underneath the armour. She would gladly be a true Robot; she hates her own emotions and her physical limits, both of which have held her back in the past. Kimey is her foil, being her opposite in many ways. Kimey is a Robot but she knows and understands emotions. She likes to laugh and love and enjoy life. She considers Moltara to be her home - she met Ddi there, when the latter came seeking solutions to her limitations. Ddi left thinking she had found nothing, but she was followed by a friend. ^ That's pretty much the extent of my ideas about those two. It would be good to write a full story about them but I don't know if I ever will. Urk. I've had such a horrible cold these last few days. x.x Am feeling more able to function today, though my nose is still evacuating industriously. I'm afraid I gave up on the item-fetching activity aboard The Coincidence. My first set of items was cheap; my second cost 63,000 NP and the third would cost even more if I were willing to sink that much NP into it - which I'm not. It's evident from TNT's responses in this week's Editorial that they didn't intend for the items to inflate so much so fast, as many of us suspected. If the high prices had been intentional I might have felt more willing; I'd have felt less cheated (not that I was cheated by anyone in particular, just by chance and happenstance) and more confident of there being a worthwhile reward at the end of it. Having seen what the final reward is I'm not especially regretful. It's more the lack of participation that I regret; I don't like that I didn't enjoy this plot/event* to the full. Of course, I know it was my choice not to. I just finished answering TNT's new survey. If you haven't seen it yet, there's a link in the News. I wrote quite a lot in the suggestions section (the 'what would you like to see more of' question). I even spent time reading discussions to see what other people had suggested and including ideas that I agreed with. So I thought I'd share it with you here. Below are my complete suggestions, copy and pasted from the survey. I'd like to see more unique events/plots in place of recurring ones. I think events with mixed activities would go down better than ones that are solely Battledome or solely puzzles. Even if you can't always make them super long like Tale of Woe and Faeries' Ruin, even a small event with a bit of everything would be great. Group activities like the Grave Digging from ToW are usually fun too, can we have more of those in small events? That said, nothing can beat a lovely long comic-driven story plot. :) It's just I know those take a lot of preparation. More surveys! Surveys are good. In place of the Neopies you could do a proper survey like this one and get a more accurate idea of what people actually thought of the year. It doesn't have to reward items/neopoints; people who care will take the time to answer it. You could do little surveys after an event to find out which bits of it people liked best, what they would like to see again, etc. You could even have tiny little things like 'Rate this plot step out of 5' or something. More 'Basic' NEOPOINT wearables, like the Mall has been getting. More use of the 'Official Neopets Team Message Board' please. Faster customer service and a functioning ticket system. Revamped Neomail please please please. Conversation threads and a Sent Folder would be neat. Also, it would be really awesome if the revamped Neomail could possibly have some form of CC system. I realise this might be vulnerable to spam BUT I think there are ways of getting around that: For example you could only be able to CC NeoFriends or even better users could have 'CC Approved' lists where User A can add User B to their Approved list so that User B would then be able to include User A in User B's CCs. This would be super helpful for people who maintain petpage sites; pet trading; adopting, guilds, etc. I suppose the Neoboards could be revamped too but I'm not so fussed about that. I would like to see NC Gift Boxes being given out with online NC purchases as well as with NC cards. It simply isn't right that people who can't get the cards where they live are missing out on the Gift Boxes. Or you could do away with Gift Boxes altogether perhaps? Or at least make Gift Box Capsules cheaper and/or more generous. Areas you shouldn't use on sides could be automatically locked off to help prevent cheating and mistakes. It could be easier to move items, neopoints and Neopets between sides and mains. You could have a 'Maximum Neopoints' limit on sides, as neopoints on sides are pretty much only needed for the NeoLodge as far as I'm aware and this would inhibit cheating. You could allow Lutari to be moved between sides and mains. You could allow Paint Brush clothing to be moved between sides and mains (pretty please?). It could be free (free = without the use of Gift Boxes) to move NeoCash items between sides and mains. You might imagine people would buy less copies of NeoCash items if they can do this but for myself personally I believe it would encourage me to buy more NeoCash items because I would be more secure in the knowledge that I can more the items around with ease should I change my mind about which Neopet I want to customise with the items in question; NOT being able to do this has genuinely held me back from buying items I like on several occasions. It could perhaps be made quicker and easier to log in and out between sides and mains. Making it possible to change account names and Neopet names has been discussed in the Editorial I know and I would really love to see this. But they must still be unique, I think. It would undermine a lot of things if it became possible to change them to non-unique names. Besides, the unique names are one of the most appealing things about this site (though there are many appealing things of course ;) ). Please fix the Defenders of Neopia in the Battledome. Higher Max Neopoint limits in user shops, Trading Post and Auctions. That's 20,000+ released for creation and 4,689 created. (I get the numbers from watching the Popularity page.) Last year 20,000 were released and 7,075 were created, while in 2012 26,000 were released and about 12,000 created. The release started relatively promptly at about 01:00 am NST, on the 22nd (Chomby Day). The Chombies continued being released in batches throughout the day and had reached 20,000 by the 23rd. They remained available in Create A Pet through much if not all of the 23rd; they had been removed by 12:51 am on the 24th. I did the untaken names topic on the Help Chat, keeping it bumped up for the first half of the 22nd. AGFL saw 56 names used the first day and 25 the second. Less than previous years, in accordance with the smaller created numbers. I'm just going to give it a day or two so that I can be sure I'm sure about the look before I start buying it. At the end of January I was blogging about how I was redoing a bunch of my Neopets' customisations, which I was enjoying greatly until I stopped. I stopped because I got stuck on Life's. I'm still trying to start with the Decorated Witch Hat and Wig and base the customisation on that, but I'm not coming up with anything I love. Currently saved in my JN Wardrobe are a Camouflage Ogrin and a Stealthy Draik. I like the Ogrin because it's more unusual but I find it harder to work with quadrupedal species, while I like the Draik for it's beautiful Stealthy blue eyes but am finding it harder to make it look unique. I'd like Life to look sort of mysterious and/or magical, maybe Romani-ish, but at the same time I'd like her to have a modern edge, something that would prevent her from looking like an archetype. That's 10,675+ released for creation and 1,316 created. Numbers were acquired from watching the Popularity page. The release was a delayed one, I think. I didn't see the Tonu available at any point during the 21st. The released count (the one in parenthesis) on the Popularity page did jump from 683,589 to 683,735 shortly after noon NST, but none were created. The first time I saw the Tonu available in Create-A-Pet was at 03:00 am NST on the 22nd. The numbers were at 483,125 (out of 684,793). They remained available (and continued to be released) throughout the 22nd. They were still available at 12:30 pm on the 23rd but had gone by 12:10 am on the 24th. I opted not to make my usual untaken names topic on the Help Chat this time, based on Tonu not being very popular. There were 22 names taken from AGFL on the 22nd, a slight jump above the average. Two things happened last week and I'm only now getting around to writing about them. One. I have a new computer. It's better than my old one to enable me to play awesome things like Assassin's Creed, among other reasons. It's also taken a little getting used to (Windows 8 is odd at times). Two. This last week I've also been working on Find A Laugh a bit. I finally got around to removing the defunct Like buttons, which hadn't been working for possibly months, and that led to me being inspired to make a few changes. I've added a weekly Featured screenie page, remade the title image and adjusted various styles around the page. Regarding FAL, I still feel stymied by the lack of new listings but I think I need to accept that the Neopian population simply isn't making as many new screenie pages as it once was. But that doesn't mean people don't still enjoy reading screenies; I know FAL still gets a bunch of visitors. But it's partly knowing I get a lot of visitors that makes me want to provide more frequent updates. Yet I can't provide more updates because there aren't many new pages to list and update about. Silly, isn't it? I mean it's silly that I let myself feel frustrated and wound up by this. I dreamed last night that I was playing the Games Master Challenge or the Daily Dare (not sure which) when I suddenly realised I'd forgotten to blog about it! Hah. Like it would be such a tragedy if I did. I've been working on Life's customisation next but I have yet to hit upon anything I'm satisfied with. My starting point is the Decorated Witch Hat and Wig (because it's awesome) and I might go for a Stealthy paintjob because I want her to look magical/mystical and those Stealthy eyes would do a good job of that. But I'm not sure. I realised today that it has been almost a year since I last played NeoQuest II. @.@ WHAT. Yeah, so I was barrelling through the game when the first rumblings of the Obelisk War started in February 2013. I decided to put NQII aside for the time being and come back to it later. And now suddenly it's been a year. I just checked where I'm up to and I'm at the Palace of Ancient Kings. So it's still there waiting for me, thankfully. I don't know if I'm going to continue it right away (I have other time-wasting hobbies at the moment) but maybe sometime this year, haha...? I definitely want to finish it at some point, I was really enjoying it and I want to know what happens. I feel like I'm 'getting into' customisation. @.@ Which is strange because I had thought I was already into it, but it turns out there are higher skies. This is MoltaraCity's current look, which I like so much that I haven't touched it in weeks. MC being my active Neopet I thought I would want to mess around with his customisation often, like I did when he could wear only backgrounds, but I just... really like it how it is. Which sounds disgustingly self-pleased, I do apologise. I'm just not accustomed to getting much satisfaction out of my Neopets' customisations (the finished product is usually not quite perfect and I'm a perfectionist). I suspect it helped that MC's customisation wasn't dictated by his characterisation. He doesn't really have much characterisation, so I felt free to mess around and make him look as weird and/or spooky as I wanted. I'm now feeling inspired to improve/reinvent some of my other Neopets. Lostfound, Agiftforlife, Ddianc and Kimeyah especially - I've never been satisfied with any of their looks. Jellyneo's Wardrobe is proving superlatively useful in this. My lurking on the Pound Chat paid off, in a way: I found a Robot Blum up for adoption/trade on the ZYDP adoption agency. I wasn't sure how well my inquiry would go down, seeing as I only wanted the pet for the casings, but the owner was very happy to give him to me to help me out! n.n So a hundred thank-yous to her! Plus we're arranging to Pound-transfer the uncased Blum back to one of her accounts so she can find him a permanent home or keep zapping, which feels good. I was lucky enough to get a Desert zap on one of my Blumaroo labrats this morning (6th Blum zap). I then tranferred the pet to my main account and pounded it so I could keep the clothes for customising MoltaraCity. In related news I tried advertising Stylesheet as UFT on the Pound Chat the other day and got zero interest, which was a bit dampening. I did it in the hope of getting an idea of what someone might offer for him, whether he is a suitable offer for an anynamed Robot Blum, but I've come away less than enlightened. It's a Real Word which is good but maybe it's too obscure and/or too long to be very desirable? Who knows. I guess I just need to go for it; jump in there and say 'Seeking Robot Blum' and offer Stylesheet for it. I'm also wondering whether I should offer a custom, too. I think it's going to be difficult because I've been watching the Pound Chat for the last week and I haven't even seen any Robot Blums yet. They're not common. Neither, I imagine, is someone who finds Stylesheet desirable. So I have low odds on both counts. He's smaller than I expected somehow. I'm going to need to expand on my collection of non-Background wearables; currently I don't have many to try out on him. I'm working on acquiring Robot Blum casings. In more ways than one. Zapping Blums in the hope of a Robot zap is a bit of a slim hope, I feel, even with three lab rays working on it. (I once zapped Ddianc for 357 days - nine Morphing Potions - and still no Robot zap. In the end a friend gifted me Kimeyah.) So I've also been scouring the Pound Chat and joining pound surf topics. I've created the name Stylesheet in the hope that I'll be able to use it to trade, and if I manage to find an uncased Robot Blum in the pound then I may be able to re-case it with the help of one of these spare PB clothing sites. I thought I'd cleared out my Safety Deposit Box quite recently, but I noticed today that there was a whole bunch of stuff in there from events like the Daily Dare, Negg Festival and last year's Advent Calendar. I couldn't resist the opportunity to do some sorting. Most of that stuff is now in my shop or being kept in the hope of price inflation (and I've made a list of the latter, complete with dated prices). On another subject, I'm thinking I might morph MoltaraCity into an Invisible Blumaroo. Blumaroo are one of the handful of Invisible pets that can wear clothes and hold holdables. I was always aware that M-City, being a Zafara, can only be customised with wearables that don't come into contact with his body. This wasn't a concern for me because I enjoy backgrounds so much; so many are simply gorgeous to look at on their own, without any adornment. And that's still the case, but I am beginning to fancy a clotheable Invisible pet. There are just so many possibilities, so many neat things you can create by hanging clothes on an invisible prop. I particularly fancy getting my hands on some Robot Blum clothes so I can make a headless surrendering robot (I'm going to start adopting solely Blums from the Pound when I need a pet to zap, in the hope of getting one). So Team Moon (my team) won the GMC. This entry has been a couple of days in coming for that reason; it was easier last year, when the opposing team were the winners and I could go ahead and congratulate them without sounding self-satisfied. Besides, it's pretty much down to luck, isn't it? Team Moon happened to have a larger number of players, presumably. With only two teams (and with Team Moon having been at 51% from the start) it didn't feel, to me, like anyone's efforts were likely to make a difference. So I don't personally feel bothered about which team won or lost. I am bothered, however, by the change in the trophy format. This has been heavily gone over on the Neoboards, but for those who don't know: Every Team Sun trophy is silver, from the simple Level 1 trophy to the complex and beautiful Level 5 one, while every Team Moon trophy is gold. This is a break from previous years, when the trophy colours were based on the levels (the player's individual achievements) rather than which team were the winners and which were the losers. Why? I don't understand why TNT thought this would be a good change to make and I would have preferred they hadn't done it. The GMC has been about individual achievements from the beginning. Originally there weren't even teams - they were only introduced in 2011 - and to me the teams are still only an additional element of the event. I don't feel they are at the heart of the GMC; they are not something which the trophy system should be built around. *I'm immediately suspicious of the Wingoball score because 771 is the game's ID. Seriously, TNT? Same mistake? 771 looks achievable though (my highscore is 991). Had a go at Wingoball with the help of this walkthrough but got stuck on Level 12. Eh. Going to leave it for now. I'm nervous about Bouncy Supreme. My highscore is 580 but I remember having a lot of trouble getting that (I think this was during the DD?). Got it! After a few tries. An eminently useful tip I found is to aim at the highest coin in each arc and to adjust the distance between coin and pointer depending on the height of the next pillar (from Jellyneo's guide). And the play-60-games challenge has registered as complete now that I've sent a score in something today. There are no bonuses for repeating this one, mercifully. Mm, I like the music in Attack of the Gummy Dice. It's nice to feel entirely unrushed in a game. Okay that took some time but I eventually reached 870+ at Level 9. Slow game. Feed Florg just makes feels immoral. Got the score after a couple of almost-got-the-scores. Meepit Juice Break is another lengthy game, though shorter I think than Gummy Dice. 1,100 isn't a particularly challenging score I find. Now, what are the top five strategy games? Being lazy and consulting the Neoboards for a list. Playing Faerie Cloud Racers, Warf Rescue Team, Gadgadsgame, Tyrannian Mini Golf and Petpet Cannonball. Check. It's going to be tedious alternating through that lot for the bonuses, even though it only needs minimal scores. But first. Someone on the Neoboards pointed out that Team Sun have Wingoball today as well and their required score is 790+. So if our 771+ score gets fixed then it will become harder. So there's no point in putting it off, though I'm still befuzzled as to how the ball is supposed to get through Level 12. Yes! Got through Wingoball with the help of The Daily Neopets' guide. I'm erring on the safe side and scoring over 790. Going to get straight onto doing the bonuses, as this is quicker than the other challenges will be. Came back and finished Challenge #2's bonuses first. Now for more Gummy Dice, Florg and Meepits. Wow, that took a while. Too long really (in that I feel guilty about playing games for so much of the day and my mouse hand is a bit sore). But hey. All those shiny tick marks look lovely. Is it just me or is there a subtle theme to today's games? First job: Finish the Petpet Rescue bonuses that I didn't do yesterday evening. And I'll add it to my Favourites before playing so that it counts towards Challenge #2. Got a bit better at Petpet Rescue by the end. Still not a game I'd choose to play, but hey there are few enough of those. Now on to today's games, none of which I'm very familiar with. I feel like any (or all) of them could pose a difficulty. I guess I'll start from the top: Let It Slide and Snow Roller. Mustn't forget to Favourite it before playing. Oookay, the game is lagging. Badly. (Managed to die at 220 points.) I don't remember it doing this before. Will try lowering the quality settings. Nope still lagging. I'm going to try saving and closing this page, as sometimes my computer thinks having a large editbox open is hard work. That didn't help either. And apparently the challenge is glitched and not awarding prizes anyway, according to the Neoboards. I'm going to leave it for now. If the glitch gets sorted later then I might go to the trouble of borrowing my sister's computer, as it's more game-oriented than mine and should be able to cope with LIS. Snowball Fight turns out to be a waiting game, reminiscent of Kass Basher. Wait for the Meepits, wait for the Polarchucks, wait for the wind to change. Could do this all day really. Actually I've stopped waiting for Meepits because I don't think it helps. The speed goes faster based on your total score, therefore waiting for the high-scoring Meepits does not prolong the slow levels. Okay, I hate this game. I'm developing some serious Polarchuck-hitting sk!llz. Also developing some serious tension in my right shoulder and facial muscles. That took a ridiculously long time. Bonuses? Ahahahaha yeah right. Taking a break to relax and have lunch. Some people on the Neoboards believe the required scores for Rink Runner and Snowball Fight are not as intended because the scores are exactly the same as the games' IDs. Rink Runner is located at /games/play.phtml?game_id=220 and its score is 220 (which also happens to be a very difficult score to achieve, even harder than Snowball Fight). I just had a little go at Rink Runner and scored 58. The highest score on the HS Table is 355. So yeah, I'm agreeing with the Wrong Score theory and am going to hope it gets fixed (along with Challenge #1) when TNT get into the office later. Hopefully the Snowball Fight score will be lowered a bit too. In the mean time I'm going to Favourite a bunch of Qualifying Games to work on my Challenge #2 bonuses. I don't know if repeating the same five over and over will count for the bonuses (it might) but I'm going to go ahead and play different ones anyway as it will count toward the play-60-games challenge we're expecting tomorrow. Finished Challenge #2's bonuses. I'm going to keep playing Qualifying Games until I'm closer to 60 (done 48 already) on the basis that I'll be glad of having finished the play-60-games challenge in advance if I don't get the chance to complete all these glitched games before tomorrow. Yes! 09:18 am NST and TNT have fixed the wayward scores and (presumably) Challenge #1. The Rink Runner score is now 44 and Snowball Fight is 350. Time Taken on Rink Runner: 00:03:41. Rink Runner bonuses finished in a matter of minutes. Hmm, not sure whether Challenge #1 is fixed or not - mixed feedback on the Neoboards. Man, 350 is ridiculously more achievable than 650. Okay, most people are saying Challenge #1 works now so I'm going for it. Managed 1,534 on Snow Roller despite the annoying music and my patent inability to jump over the right objects. Made it through a laggy Let It Slide. I took it slow (the timer is only a bonus, not a limit), picking up all the gems and hearts I felt I could reach without risking lives, and had 790 by the end of Level 1. Now working on Challenge #1 bonuses. I'm having trouble replicating my earlier score on Snow Roller. There's a strategy I read on the Neoboards that I quite like; it involves holding the spacebar down and doing nothing else. Doesn't always work though. Took a while and I now feel exhausted but all bonuses finished yes~! Yep, got it. Managed the score on the third try, when I made it through Level 2. I rather enjoy this game, I like the... motion. I'm trying Korbats Lab next. My highscore is 520 but that might be because I've never tried very hard. Died at 670 on my first try, and that only because I was trying to eat breakfast at the same time. The game is a bit slow though - I might leave the bonuses until later. Okay apparently I have never played Petpet Rescue. Wish me luck? Whaaaat is this? This is insane! Right, so I scored 110 after a few tries but it hasn't registered that challenge as complete. A glance at the Neoboards tells me this is the case for everyone. Is this the first glitch of GMC '13?! Moving on to Kass Basher and Super Hasee Bounce. Both scores look very achievable, even though I dislike bouncing Hasees. Done! Now for the Korbats Lab bonuses. I used to play a version of Breakout all the time when I was younger (prior to my discovery of Neopia, I think). I liked the versions with lots of powerups (and powerdowns). Plus there was a feature where you could build your own levels. I think I'm out practice. Okay I was growing tired of Korbats Lab by the fifth play. Someone on the Neoboards has pointed out that Petpet Rescue isn't even on the Qualifying Games List. Hmm... Hopefully TNT will fix the issue before the end of the day. I'm going to go send minimal scores in Cloud Raiders and Cooty Wars (Team Sun's alternate games for today) and then check back later to see if anything's happened about Petpet Rescue. Checking back in my evening and it looks like TNT have fixed the Petpet Rescue glitch. Hurrah! Okay, I just scored 115 and it still didn't register the challenge as complete...? Tried for a higher score; 125 worked. Challenge complete! I'm going to leave the bonuses until tomorrow, I'm a bit too tired for the anxiety of rescuing petpets. I consulted the Neoboards to identify the mystery game again, as I felt the clue ('Don't Get Docked...') could apply to several games. I'm not confident about this game, I've played it in the past and had trouble with it and my highscore is only 310. My highscore on Berry Bash is 136. xD I'm hoping that's because I've never really played it, not because I'm terrible at it. At least I'm not worried about MCII and TR, they shouldn't be a problem. Decided to try Berry Bash first after reading some tips on the Neoboards. I'm actually not finding it difficult at all. It doesn't begin feeling rushed until way past 1,000. Completed the bonuses for Berry Bash. Moving on to [Stowaway Sting]! Scored 444 in [Stowaway Sting], haha. At least it's an improvement on 310. Okay, managed to get 445+ after looking up a video guide. Now for the bonuses. Phew, glad to have got that done. Now I feel like the worst is out the way. Then again, maybe not. Took me several tries before I managed 400+ in Turmac Roll. I keep landing on the points of those large ramps. 250+ in Meerca Chase is no trouble, mercifully. I'm getting better at jumping over the large ramps. Whenever there might be one I hold the jump key down so that Turmac does the biggest jump he can. Sometimes it works. Frustratingly keep missing the high-scoring berries. There's this red spicy-looking one that I have yet to catch ever. I think I mind Meerca Chase less than I mind Turmac Roll because when I crash into something in MC it usually feels like my fault; in TR it usually doesn't. Still playing TR about ten times for every successful 400+ score though. I'm playing on Hard, by the way, based on advice from the Neoboards. I recommend not watching your score, however mesmeric its gentle rise might be. Heh I like the Conkerberry Negg. I saw the Conkerberry in-game a minute ago and wondered whether it was meant to look like a conker (a horse chestnut). Evidently it is. Also, I just looked up what games Team Sun has been playing the last few days and I am delighted to see they've had Ultimate Bullseye II, because that means Team Moon won't be playing it. UBII was my bane in last year's GMC. Later, I decided to send minimal scores in the six games Team Sun has played that Team Moon hasn't. This will count in advance towards the send-60-scores challenge which the GMC usually gives us on the last day. I'm pretty sure I know what the mystery game is, since the clue is 'Celestial Spheres'. The thing about [Spinacles] is that it takes so long. Fortunately it is not demanding, so I can eat breakfast while I play it. Yeah so that took a while. I won't start on the bonuses for that game until last, I think. The timer on Nova Defender gives you twelve hours, so it's not exactly a rush. I'm going to do my Nova Defender bonuses while I'm here since it doesn't take long. I keep forgetting I don't have to avoid the bits of rock floating about. When I'm careful about picking up all the gems then I can get the required score by the end of Level 1 on Hard Mode. Okay done. Moving on to Challenge #1. I positively enjoy Bruno's Backwoods Breakaway (ever since being forced to play it in last year's GMC) so that one won't be a problem. Less sanguine about Edna's Shadow but at least it doesn't look like a challenging score. I've really bad at watching two things at once but I managed to get the Edna's Shadow score after a couple of tries. It helped when I noticed I could shoot a spell at the enemies, haha. I guess I'll do the Challenge #1 bonuses before returning to Challenge #3. Edna's Shadow is easier now that I've got the hang of the few levels I need to complete to score 310+. There, done, now I just need to do those [Spinacles] bonuses. I had to leave then, but I finished those bonuses when I returned. I've noticed some people on the Neoboards have started working on sending scores in 60 different qualifying games, in preparation for the challenge we usually get on the last day which asks this of us. I'm not sure whether it's worth starting it now though; last year I only needed to score in 19 more games after playing everything else required in the event. Doing 60 early on seems like more effort, unless you fear having time for it on the last day. Anyway, to today's challenges... I don't much like Top Chop but my highscore is 1,378 so hopefully I won't struggle with it. Couldn't figure out what the mystery game was, so I looked on the Neoboards for the answer. Hah, now I get the clue! And my highscore is 3,882, reassuringly. Yep, not finding this one particularly difficult. Scored over 2,200 by Level 14, on Normal Mode. I'll do the bonuses while I'm here and then move on to Top Chop. I just keep failing on the third level. Still no Top Chop bonuses complete but I'm taking a break to calm down. Try again later. It begins! I'm going to be sharing my trials here like I did last year. I've joined Team Moon, not because I can call myself a nocturnal creature but because I like Princess Lunara. Tediously adding 25 games to my Favourites for the first challenge and its bonuses. Bumble Beams shouldn't be a problem, I've always quite liked it and my high score is 1,901. It's nice not to have to worry about dropping the petpets into their buckets with perfect accuracy; even with mostly imprecise drops I had 231 by the end of Level 2. Now to rinse and repeat for the bonuses. The game keeps showing my score as 00 on the page where it asks if I want to send it, but my actual score does go through correctly when I do send. I just noticed my left hand has been hovering over the spacebar the whole time, as if that key controlled something in the game. Day One complete. [C=] Got a book for one of my bonus prizes, Rebme will be pleased. Having The Expanded Calendar on my main account gave me the kick to revamp it a bit to fix some of my dissatisfactions. It's here. [C=] What do you think of the semi-new layout? My original intention in redesigning it was merely to create a bit of space for small features like the 'Coming Up' and 'Latest News', so I had to move the navigation links for that - which I'm happy I did because I think it's an improvement to have them laid out in a vertical list rather than squashed in a rectangle. And I moved (and redesigned) the title image. I wanted January to be right there when you arrive, rather than it being pushed down (marginalised) by the title and large block of intro text. As you'll have noticed, this means the title now disappears when you select an event (or News or Sitely) but you can return to it at any time by clicking the little X in the top-right hand corner of an entry. I've also edited all the entries with the goal of cutting out the history and trivia and focusing more on what you can expect from an event today. Plus I've added subheadings (such as 'Summary', 'Avatar' and 'Past Dates' - see GMC for an example) to long entries, to make it easier to skim for the information you're looking for. Sooo happy right now because my internet seems to be back up to speed, after ten days working at snail's pace (download speed of about 4 Mbps, while I should usually get 18-20 Mbps). I *think* we fixed it by turning the router off and on. I'm not certain though because I didn't actually notice an immediate difference. It was an hour or so later that I found it had sped up again. Hopefully it stays this way. I've decided to move The Expanded Calendar from /~Mawf to /~Rebme. (Please update any links or bookmarks, thanks!) This move is so that TEC now lives on my main account rather than a side, making it quicker and easier to update when something comes up. It's not that I'm somehow incapable of updating sites that are on my side accounts. AGFL is on a side account, but updating AGFL is not a problem because I do it once a day, at the same time every day. TEC needs updating on a more 'when the information comes in' basis. So to be able to do that any time of the day, without having to go and log on to one of my sides... That will be a good thing. Have you caught a glimpse of the monster while searching The Perilous Catacombs? Surely it must mean we are getting close! Very close. Like, perhaps you want to get as many floors in as you can before tomorrow ends. We're not psychic or anything. Just sayin'. So I genuinely thought the Perilous Catacombs would end at Floor 100. But they didn't. It's been a week now, right? This step began on the 22nd. I was enjoying it but now we're past Floor 100 I feel like the end is no longer in sight and I'm low on motivation. I don't want to stop before it's finished but when is it going to finish? Plus my internet is being slow and I have no idea why. Pages taking about three times longer to load than usual. Takes forever to check the names on AGFL in the morning. It's been this way since the 24th. I've tried things like doing a virus scan and a system restore, to try to fix whatever the problem is, but without success. A Gift For Life is five years old today. Which is, you know, kind of awesome. I marked the day by adding 300 new names that I've been collating this past week. It's odd. Five years feels like such a hugely long time that it doesn't quite mesh, in my head, with how long I feel AGFL has been open for. Funny how time feels different depending on the context. That's 15,000+ released for creation and 3,137 created. Numbers acquired from watching the Popularity page. The release started just a couple of minutes after midnight. Continued throughout the 16th and remained available throughout the 17th. A regular perfect release. I made the untaken names topic as usual but was less regular about keeping it bumped up as I had things going on that day. As to names taken from AGFL, 20 were used on the first day and 16 on the second. This is pretty much in line with the inconsequential numbers of last year. Can you believe A Gift For Life is going to be five years old come the 24th?! I forgot to mention, I made a Poogle on Thursday. [C=] Not just made one to zap - made one to keep. He's called Lostfound. I found the name was available a few days before Poogle Day and thought it would make an apt Plushie pet. I've always kinda liked the Plushie Poogle; it looks very huggable (unlike the Malevolent Sentient version). That's 15,000+ released for creation and 4,824 created. Continuing the dive that is probably brought on by the Red Poogle Morphing Potion being so affordable these days. I mused about this last year, when a little over 11,000 Poogles were created, comparing it to the 31,000 created back in 2011. The difference is that last year the Poogles still took a huge bite out of A Gift For Life, taking 357 names (actually a rise on both 2011 and 2010), whereas this year they have only taken 105 names. I'm surprised and obscurely disappointed by that. It was a good, regular release anyway. Started at 12:10 am NST on the 19th, continued in batches throughout the day, and they remained available throughout the 20th as well. Perfect, really. Haven't had much to blog about lately, unfortunately. It occurred to me halfway through the Daily Dare that I could have been rambling about how I got on with each day's game, like I did with the last Games Master Challenge, but by then I didn't feel I could recall what I thought about each game with adequate accuracy. Maybe next year? Though hopefully we'll be having another GMC before then (in November). Anyway I enjoyed the DD, as per usual. They didn't do a lot with the whole Chadley thing. I don't think it really made any impact on the format so it was just another Daily Dare but hey, I like the DD. In other news I've made a few minor changes to A Gift For Life, today and yesterday. General improvements really. I started out just revising some of the text (like rewriting the intro) and then I decided to do something about the colour scheme being broken since I removed the Username section two months ago. It used to be that the Home area was multicoloured while the Petnames, Usernames, Extras and Sitely were blue, red, green and yellow respectively. But then, as I say, I removed the Usernames so then there was a lack of a red area. So now I've fixed it by making the Home area blue and the Names (née Petnames) red. Aaand then I renamed a bunch of stuff in my CSS because it was embarrassing how I had no idea which bits were doing what. And then I expanded the navigational menu in the Home area. It's now a full 'site map', linking to every section of the site instead of just the three areas. I'm pleased with that bit, I'm glad it occurred to me to do it. Why is it when I sit down to make one small adjustment to one of my sites I always end up going on these long and involved Site Improvement kicks? I guess the answer to that is reasonably obvious actually. I just don't think about what I could improve when all I'm doing is daily maintenance. I need to actually sit down and improve something in order to get into the 'improving shtuff' frame of mind. Yay for answering my own question. A very delayed Daily Dare arrives! But minus AAA, because apparently he's at Game Design Camp. Instead we have a young Zafara named Chadley, who is suspiciously charming. We also have a toony map of Neopia, which I like though I'm not yet sure what its purpose is. And we begin off with Jolly Jugglers, requiring a score of 697 to beat Chadley or 200 to beat Abigail. I've never liked that game and I failed to come up with the motivation to try to beat Chadley, as 700 is so far beyond my highscore. Not a propitious start but hey. That's 5,000+ released for creation and 3,273 created. The release started promptly at about 12:15 am NST on the 17th. They were released in batches throughout the day and then also remained available for creation during the 18th, cutting off at about 11:50 pm. I maintained the untaken names topic on the 17th, though I wasn't very attentive about keeping it bumped up because Kikos just don't get as much interest as some of the other Limited Edition species. AGFL saw 29 names used on the 17th and 14 on the 18th. 43 total, though I can tell you only half of those were actually Kikos. when the computer is running it heats my room up terribly and then I melt into a puddle that seeps through the floorboards and into the room below, creating a large water mark on the ceiling. So this is late but my spreadsheet of species is finished. I put it up in the Extras area on AGFL, back on the 3rd I think. I forgot I meant to blog about it as well. This page is very interesting, but it has been tracking species popularity for years so the numbers are massively ackumulative; older species have a huge headstart on newer species. Plus it only counts Neopets created through the Create-a-Pet page, discluding alternate methods such as Morphing Potions, Draik Eggs and Krawk petpets. So I wondered: How accurate is it really? In June, 2013, a total of 405 petnames were used from A Gift For Life and I recorded the species of each. I delayed my recording by 24-48 hours from the name's creation, to allow for those alternate methods. Below are the results, ordered first alphabetically and then by popularity descending. There's no particular reason the alphabetical list has numbers on the left of it, I don't know why I included them. So Draiks are leading in popularity at the moment. They were made nearly every day of June, there were only three days when they weren't. Krawks are way below with only nine made. That answers my original query about how much they are being made these days and which is more popular. Interestingly, the Brutes won the latest Battleground skirmish, despite the bandwagon having chosen Thieves. The month is nearly finished, and so is my spreadsheet of species created with names from AGFL. [=D] Just a few more days. I'll be done on the 2nd July. I'm thinking I'll probably put the results on AGFL, in the Extras, in case they interest anyone. Yesterday I made the decision to remove the untaken usernames from A Gift For Life. It now only provides petnames. I'd been thinking about this for a little while. I've never been as enthused about finding untaken usernames as I have petnames - I've never found it as easy or enjoyable - and I tend to not 'get around to it', particularly as there are there are more important things to do (outside Neopets). And then this glitch/problem came along where we can't tell whether a username is really untaken because even when it appears available here it may be in use on one of Neo's sister sites and therefore be uncreatable. So it's become impossible to maintain an accurate list. So I considered all this and decided that I would feel mostly happy about removing the usernames, although I am sorry to anyone who visits AGFL for usernames rather than petnames. And since then I've been thinking I might be able to improve AGFL with a slight layout revamp. If I separated the different name categories out a bit more I could then create navigation for within each category, such as alphabet navigation. And it has in the past been suggested to me that it might be better to order the Multilingual section (real words in languages other than English) by language, which would also be made possible. But I'd need to look into whether the majority of people would want that. Also they might want the Places of Earth to be ordered by country? Also a possibility. I do not see the point in the Battleground. A lot of people (if not most) are simply jumping on the biggest bandwagon for each skirmish. The winner is predictable and for me that takes nearly all the motivation out of the thing. I stuck with Seekers at first, out of loyalty, up until the time that they were not one of the options and then I choose to go with the predicted and actual winner (Brutes). The Seekers are available again for this skirmish (signups started today) but polls on the Neoboards indicate that about 99% of players are joining Awakened, soo... yeah, me too please. The only motivation I have for joining a faction and playing a few battles is the boons and maybe the avatar and site theme, although I haven't liked the look of the av and theme so probably won't use them (but completionism!). It seems likely to me that the Battleground is intended to continue indefinitely, but I doubt whether people will be bothered to participate indefinitely. I won't be. If/when I've earned all the avatars and themes I shall probably stop because I'll be bored of it by then and will have lost interest in the boons. Speaking of being bored of things... Altador Cup? Yeah. Played three games in case I found it more entertaining than last year but no. It frustrates me before it bores me, to be truthful, but I'm not one for playing the same flash game a million times anyway. Not my thing, not what I call fun. My species recording is trundling along. I found a difference between the immediate and delayed records on the third day so I've dropped the immediate and am now only doing delayed recording (meaning I'm recording the species 24 hours after I found the names were taken). So I currently have five days (1st-5th) with a total of 80 names taken. Top contenders are Draik (10), Kacheek (7) and Xweetok (5). The rest are all 0-4. There are quite a few zeros yet. I used Microsoft Excel for the first time today. Decided it would be useful for this species recording I'm doing (see previous entry). And it is. I had to look up a video tutorial to learn how to do things, but it was very clear and easy to get to grips with. The other day I talked about possibly delaying my recording by 24 hours to ensure that the pet has been morphed into the desired species by the time I record it. I've decided to start off doing both immediate and delayed recording in two spreadsheets. If after a few days I find there are never any differences between them then I can drop the delayed one. Someone asked on the Help Chat yesterday whether people still liked Draiks and Krawks as much now that they are significantly easier (less expensive) to obtain. I didn't stick around for the results, but it reminded me of something else. When checking the names on A Gift For Life, I definitely see names being used for Draiks and Krawks more than I used to. Draiks a bit more than Krawks, I think. Oh but this is far too vague! 'A bit more'?! No no no. I must acquire surer facts than this! To that end I've decided I'm going to be recording the species of all the names taken during June. That should be about 400 names total, according to my averages. And there are no Limited Edition pet days in June, so nothing to throw the results out of whack. The only thing I might stumble over is what if the species has already been changed before I check the names? Say someone wanted a Poogle, they might create a JubJub and then immediately use a Poogle Morphing Potion on it. What does that mean for my results? ...Actually, I don't think that'll matter. The person didn't want a JubJub, right? They wanted a Poogle. And that's what I'm trying to produce statistics on: the species that people want. The choice of JubJub was arbitrary and therefore irrelevant. In fact I might even delay recording the species for say 24 hours, to give people time to transform the pet to the species they intend it to be. I check the names every day and inevitably there are occasions when a name has only been taken for one or two hours (or less) before I see it, in which case the pet might not have been morphed yet. That's 5,000+ released for creation and 5,021 created. The first release was at 01:21 am NST on the 25th. They also remained available throughout the 26th, cutting off at 11:54 pm. AGFL saw 30 petnames taken the first day and 13 the second. Previous years have been equally low-impact. I added ten new questions to the Quiz today, as per my new monthly schedule. Koi Day tomorrow. Although it is a Limited Edition pet it doesn't typically take huge numbers. Not marking the occasion with anything special, didn't have any plans to. I felt compelled to write a little something for Always Connected today. It's titled 'The Fearful Shadow of Copying' and you can find it under Text-Based Articles, or below. I have the greatest respect for copyright. I always try to be original and avoid copying others' ideas, as I'm sure we all do. But I think it's possible to worry about copying a little too much. Too much' might be when we're afraid of even looking at someone else's work for fear of unconsciously imitating it in our own. If we don't look at others' work then how are we going to learn and improve? We read and scrutinise novels to improve at writing - in fact, read a lot and widely is a piece of advice that authors often give to the aspiring. Not so that new writers can copy what they read, but so that they can decide what they feel works and doesn't work, what they like and don't like, and then reapply that within their own unique books. This form of learning works for many things, especially creative things and definitely site-making. I firmly believe it's possible for us to study another site's layout, coding, content and style of writing without suddenly finding ourselves imitating everything in a shocking breach of copyright and courtesy. We only have to bear it in mind and remember to respect others' unique ideas. If we do this then I think we are unlikely to fall foul of either conscious or unconscious copying. As you can see, I managed to come up with a new layout. [=D] It's anchored with the navigation in a fixed title area, but the overflow is not hidden so you're free to scroll about as you like. So, to clarify, this page now contains my 'about me' and my ramblings about my sites, etc. The Writing section is still under construction. The Favourites section is new, being the expansion of the 'Interesting Reading' I used to have in the blog's sidebar. I shall add more favourites over time. The Quest (actually titled 'Question') went live a couple of days ago~! I forgot to mention it here because I was too busy remembering to mention it on FAL and on Always Connected and such. I might try advertising it on the Help Chat at some point this weekend, but... I'm actually hesitating because it's not very 'Help' related. I suppose it would be all right if I included FAL in the topic (asking for new pages to list). you choose fear, I say why so serious? The Expanded Calendar is two years old today! Golly, where does the time go? And over on Find A Laugh I'm attempting to encourage people into starting their own screenie pages, all this month. Maybe I should just leave things as they are? will we leave behind a mark? will we leave behind a scar? That's 10k released for creation and 10.8k created. And there I was thinking the numbers had stopped being confusing. The last time this discrepancy happened, as far as I could tell, was Poogle Day '12. I believe (but don't know) that the discrepancy is down to the pre-existing difference between the created and released counts; there was over 5,000 difference on the Before numbers, which has ackumulated from a previous Hissi Day when the created count was lower than the released count and the Hissi's availability cut off before they were all used up. I've supposed that this leaves 5,000 sitting 'hidden' in Create A Pet, so, when the next Hissi Day comes along, they become available again along with the 10,000 change that we can actually see. So this would mean that a total of 15,000 were available. Anyway. It was a reasonably prompt release: Started at :21 on the 4th. The Hissi also remained available throughout the 5th as well, as per normal, eventually disappearing from Create A Pet between 11:20 and 11:45 pm NST (I was watching). Hissi Day report is coming tomorrow, not today, as they are currently still available for creation. I'm thinking I'd like to merge this blog and my About Me onto the one page. The result will probably be here on MoltaraCity's petpage rather than on Weaponstar's petpage, as M-City is on my main account and therefore easier to access for doing new blog posts. It will require a new layout. Which is fine, I'm just sort of waiting on inspiration for that at the moment. I plan on making it clear that this isn't a very interesting blog, something I would have it be known that I recognise. [C;] I mean this blog is basically just me talking about my stuff. If you find that of interest then that's cool, but I'd wager that you're in the minority. Also. I'm thinking I'd like to expand on that little 'Interesting Reading' section I've got on the right. Might post little notes about other pages I like. The notes would probably be dated like blog posts but would definitely be separate to this blog. I'd just like to spread some appreciation, you know? Because appreciation is good stuff. That's 25k released for creation and 13k actually created. Familiar format: The release started promptly on the 27th, a few minutes past midnight. The Cybunnies continued to be released in batches throughout the day, and then remained available in Create A Pet throughout the 28th. They became unavailable a few minutes before the 29th. AGFL saw 146 petnames taken the first day (hitting 20k total, as mentioned in my last post) and 26 the second day. This is an unusually small number; previous years have taken 293, 216 and 299. My untaken names site, A Gift For Life, opened in October 2008. I don't have many records or archived news from its first year, but I do know that it reached its 5,000th used petname after nineteen months, on 4th May (Hissi Day) 2010. The coincidence, as I see it, doesn't lie in the milestone hitting the exact same day every year, but in the milestone hitting the end of April every year. The LE pet days use 150+ names over 24 hours; therefore the milestone is more likely to land on that particular day than on one of the normal days (which use 10-20 names) around it. I'm surprised the yearly usage is so regular, that there are no fluctuations, increases or declines large enough to prevent the 5,000th from falling at the end of April again and again. I think I have to draw the conclusion that AGFL is not getting any more popular? That it has long since hit its peak and the line on the graph is now travelling horizontally? I don't mind. I mean, gosh, it certainly isn't unpopular. (20,000 used names! Insane. Awesome.) Rather, the fact that I've always felt that it is quite popular (from the usage of the names, from lovely feedback and from seeing people post the link when anyone requests name sites on the boards) has lead me to assume that its traffic would continue to grow, slowly, steadily, over time. But evidently it hasn't. I don't know why. That's 20k released for creation and 16.5k actually created. The Lutari began releasing mere minutes into the 19th. (I'm glad to see this new trend taking over from the one where LE pets wouldn't start releasing until hours in.) At first the number of available Lutari would run out between batches, but supply got ahead of demand in a little while. I made a record of the numbers at 04:00 am NST: The released count was one thousand higher than the created count, so there were plenty available then. The Lutari remained available for creation right through the 19th and the 20th. They cut off very promptly at midnight on the 20th. Usually I'm not around to take note of this and therefore can't be sure whether they became unavailable at midnight or earlier on, but I was able to take note on this occasion. I maintained the untaken names topic on the Help Chat on the 19th, during the time that I was not sleeping. A couple of people gave the topic a bump after I'd retired to bed, which was nice. AGFL had precisely 250 petnames taken on the 19th and then 44 on the 20th. Last year had 149 first day and 127 the second, though it was a little different that year because the release didn't start until seven hours into the 19th. The year before that had 140 total. I've made a new Neopet: Pilbeam. Pilbeam is the name of a character from a lovely book series called 'The Mennyms' by Sylvia Waugh. It's about a family of lifesize ragdolls who are alive and must try to lead a quiet life unnoticed by normal people. The books are aimed at children but they are perfectly intelligent with great characters, so I don't think that their being 'for children' means an adult wouldn't enjoy them. I first read them when I was ten (actually my mum read them to me and she loved them too) and I'm twenty now and they remain one of my favourite reads. Pilbeam-The-Peophin is going to be painted Plushie, but it might take a while. I'm not Key Questing at the moment (I stopped during the Obelisk War and haven't been in the mood to get back into it) so the only neopoints coming in are from daily Battledoming and the Stockmarket. Also not been NeoQuesting. That stopped with the onset of the War also. I fully intend to finish it, just not at this time. I seem to have acquired a new project! [=O] While improving Find A Laugh I decided to remove some of the old games from FAL's Games section (all except the Quiz) and come up with new ones. But the idea that I've come up with is... quite a big one. If you've seen the latest update on FAL then you'll know I've given the project the working title of 'Quest'. That's about all I want to reveal at this point, so early on. I don't want to be excitedly telling people all about this game and then perhaps come up against a major roadblock that prevents me from doing what I said I was going to do. Fortunately some of the coding involved in this project is perfectly tedious. This is good because it means it will be easier for me to resist working on it 24/7 and neglecting more important duties such as my real-life writing. On the 22nd the Chombies started releasing very promptly, at least as soon as 12:15 am if not on the hour itself. I kept an unusually frequent record of the numbers shown on the Popularity page for the first 12 hours so I'm pasting it in here in case of interest. For newcomers to the ways of the Popularity page I should mention: The first number is how many Chombies have been created, while the second (the one in brackets) is how many have been released for creation. The released count did not rise any more, but the created count did rise, slowly, since a large number of Chombies still remained available in Create-A-Pet. I checked on the availability periodically. They were still available at 02:55 pm, but had gone when I looked at on the 24th at 12:23 am. I don't know if they cut off at midnight or some time before that. A Gift For Life saw 81 petnames used on the 22nd and 22 petnames used on the 23rd. Liked the Obelisk War, by the way. Not that it's quite over yet; we're waiting on the results of our battling. I feel like I could have been blogging about the war as it went along, but it didn't occur to me at the time. We were a few hours into the 21st (Tonu Day) before the release started. It was about 08:30 am NST. They continued being released into the 22nd, reaching the total of 20,000ish at some point between midnight of the 21st and 07:50 am of the 22nd. They remained available in Create-A-Pet into the 23rd, cutting off at some point before 08:30 am. I maintained the untaken names topic on the Help Chat for some hours on the 21st. AGFL saw 20 taken petnames on the 21st, barely higher than an ordinary day. I've reached the third chapter of NQII already. [o.o] The Terror Mountain chapter felt about half the length of the Meridell one. A lot of people think we're going to be able to choose a faction to support and I'd agree it seems very likely (we'll all be disappointed it if we can't). Who might you support? Thieves Guild, The Sway, The Order of the Red Erisim, Brute Squad, or the Seekers? You know, much as I'm delighting in all these new folk we're being introduced to I've remained inclined to choose the Thieves Guild up until today. And then they gave us the Seekers. Scholars. Seeking knowledge. They want to save the Obelisk from the potential damage it might suffer being fought over by the other four. They want to study it, to learn from it. To my thinking that's the most altruistic reason we've had. Scholars FTW! In other news, I've finished my New Year's resolution! [=D] If you recall I resolved to improve A Gift For Life a bit by upping the Combinations and the Incorrections sections up to 500 names each, as that is the number I try to keep the other main sections at. The last batch of Incorrections was added this morning, taking it up to 505. My mouse-arm is feeling suspiciously hot and irritated this evening. [e___e] I suspect it has something to do with an over-indulgence in NeoQuest II these last couple of days. And I'm totally blaming Jellyneo for this, because it was their neat new guide that inspired me to have another go at NQII. I've tried playing it in the past but never got further than, say, a couple of levels. I'm not sure why; it's not like there's a dearth of NQII guides here on Neopian petpages. I just hadn't gotten into it like I have this time. I mean, I find it kinda dead boring, to be honest. The constant level-grinding. Urh. But there's a sense of achievement there, too, and I've always fancied having the trophy, being able to say 'I finished that'. And then I got ill. [n______n;] Caught a virus after my website (now fixed) caught its own, hah. I spent all of yesterday curled up rereading Deathly Hallows. Anyway. Something I was going to mention before all that was my Neopets Closet. I've had problems accessing my Customisation page for a while now (Shockwave kept crashing) but I was under the impression that this was a browser issue rather than anything to do with my Closet having too many items in it (which I didn't think it did anyway). I use Chrome for most things and that was where the Customisation page couldn't load, but I found that if I logged on with Firefox I could access it. But then the other day I went to do this very thing and it wouldn't load. So that was puzzling. I figured the only other possibility was that I did have an overloaded Closet, so I set to clearing it out. It's been my habit for years to throw every free wearable I come by straight in there, whether or not any of my Neopets would ever deign to wear it. After multiple Advent Calendars, Daily Dares, Games Master Challenges and whatever else, that does add up. So that's awesome. I don't change around most of my Neopets' customisation much, but I do like to change MoltaraCity's (Invisible Zaf who allows me to enjoy Backgrounds) and Yellowace778899's (whose clothes tend to need putting back on every time the Lab Ray zaps her into a different species). Visitors to my sites may have noticed I've been having some image-hosting troubles the last couple of days. Well, in a way. Without going into disallowed details: I actually 'host' my images on my own personal website, rather than on an image-hosting site, but my website has had a malware attack. As it's been a couple of days now and I haven't managed to fix it, this morning I reuploaded all my layout graphics, buttons and other Neo-relevant images to one of these image-hosting sites so I could get my Neopets pages back up and running. That's all done now and they'll all fine and up-to-date once more. As I understand it, the malware that was put on my website would not have been able to affect anything or anybody merely from someone accessing the images that were stored there. It's not the same thing as visiting the website itself. But it was necessary to reupload the images elsewhere anyway because my website had been marked as unsafe by at least one popular search engine and this was also flagging the occurrences of my website's address within the coding that fetched my images here on my pages. So if anyone was getting stopped by a malware warning when trying to access one of my pages the other day then that was why. And I'd like to assure you that my pages are absolutely 100% safe now. AGFL's expansion continues~! The Combinations section reached the target of 500 a few days ago. The Incorrections still have a way to go however, especially since I looked through it yesterday and removed 89 old names that I felt weren't up to the new standard. All those numbers I posted at the start of this are now redundant, mostly. Since I'm progressing faster than expected, the whole factor of including how many names might get taken in x months is irrelevant. The Incorrections were 158 short of 500 and the Combinations were lacking 58. All that's happening is I'm filling up those gaps. So you know how I resolved to expand the Incorrections and Combinations sections of AGFL to 500 names each? And that this was going to happen over twelve-maybe-six months? Yeah, no. At this point it's looking like I'll be done by the end of January, easy. I somehow seriously underestimated my ability to create names for those categories. I guess it's because I didn't create names for those categories very often - because of the low demand - so I never had to test my limits. I thought the Incorrections in particular would be a challenge because I've never much enjoyed that category. But with 191 names to make I was forced to get creative and turn it into something I really like. I've added 'Nonce words' (made-up words with made-up meanings, something AGFL did once have a long time ago) and have allowed myself to use numbers in misspellings. I'm aware, by the fact that the Incorrections is the least popular category on AGFL, that such things aren't everyone's cup of tea. They're not really my cup of tea either but I'm finding it is possible to find nicely done and often very short misspellings. I'm feeling very enthusiastic about what I'm producing right now. On the 3rd of August I shared some numbers from AGFL - specifically, the monthly totals for names added and names taken. That's all I can do because I only started saving AGFL's old news in late 2009. I'm missing the numbers from then back to October '08. It is a little interesting, for me at least. I don't claim the same for you. [C;] Unfortunately any questions this inspires have no answer, because I have no idea why, for example, 2011 saw a thousand less taken petnames than 2010 or 2012. No idea. Chance, I suppose. The same chance that made the 2010 and 2013 takens, 5048 and 5191, turn out so close. I mean, I don't think I actually have a large enough sample here to draw any real conclusions from it, sadly. I don't usually make new year's resolutions (especially not self-improvement ones) but there's an AGFL-related goal I have in mind so, hey, why not, let's call it a resolution. The Incorrections are currently 158 short of 500. I'm estimating that about 66 names will be used during the year, based on last year, so together that's 224. Divide by 12 for a monthly target: 18.6 rounded to 19. The Combinations need 58, plus 124 used. That's 182, divided by 12 = 15.1 rounded to 16. Those numbers look excessively achievable for a monthly target, considering I usually churn out new names about a bajillion times in a month. So... maybe I could do this in six months? That would give me targets of 38 and 31. Hmm. That might pose a challenge if I run out of inspiration, but... sure. I'll start off with that, at least. See how it goes. Edit: So yeah, I sort of forgot to half the 'estimated names used' when doubling up for six months instead of twelve. For six months the monthly targets would actually be 32 (Incorrections) and 22 (Combinations). This is a Neopets-centric blog, where I ramble about what I'm working on regarding my sites or other Neopian activities. NEOPETS, characters, logos, names and all related indicia are trademarks of Neopets, Inc., © 1999-2014. Used with permission. All rights reserved.
2019-04-24T02:47:01Z
http://www.neopets.com/~moltaracity
PVF owns and operates this website, and its component parts, including its selection and/or arrangement, all Content, works, code, metatags, and other matter comprising the website (collectively “the Website”). Access to and use of this Website is provided to you by PVF on the condition that you accept and abide this Agreement. By accessing or using this Website, you affirm that you have accepted and agree to be bound by this Agreement. IF YOU DO NOT AGREE, YOU MUST NOT ACCESS OR USE THIS WEBSITE. If you created a User Account, including by signing in through your social media, by creating a User Account you affirm that you have accepted and agree to be bound by this Agreement, including the User Account Agreement. If you wish to obtain a License from us, by clicking “I agree” you affirm that you have accepted and agree to be bound by this Agreement, including the Content License Agreement. PVF may change the terms of This Agreement, including the Content License Agreement, at any time, without notice to you. Any changes will be posted on the PVF Website. Changes are effective immediately upon being posted to the website, and your continued use of the Website shall constitute your acceptance of such changes You should check this Agreement regularly to update yourself on any changes. If you have a User Account, PVF may also give notice of such changes to you by sending correspondence to the email address PVF has on file. If you do not wish to agree to any changes, you must terminate the User Account Agreement in accordance with the “Term and Termination” section of this Agreement. If you also have a PVF Subscription and you do not wish to agree to any changes you must not download any more content and must terminate the Content License Agreement in accordance with the “Term and Termination” section of this Agreement. “Content” means any work and other subject matter, including digital files, images, animations, films, audio, video, or audio/visual representations recorded in any format available for Download from the PVF Website. “Download” includes downloading, obtaining or copying Content from the Website. “License” means a license granted by PVF to you to access, download, and otherwise use the Content as set out in the Content License Agreement. “R3D raw content” means raw image files captured using a Red Digital Cinema Camera Company product, and that is in that company’s .r3d file format. “Royalty-Free” means that, aside from the annual subscription purchase price (or, for Content in the Premium Library, the License purchase fee), no further fees or compensation are due regardless of how many times the Content is used or how many projects it is used for, provided that the Content is used in accordance with the Content License Agreement. “PVF Subscriber” means any persons (including corporations and other legal entities) that have purchased a PVF subscription package. “User Account” means an account created by you on the Website through which you may access, purchase, and download Content. “User Work” means any work created by you, including, but not limited to any artistic, musical, literary, or dramatic work, such as feature films, promotional videos, programs, games, advertisements, documentaries, websites, event displays, or presentations. “Website” or “PVF Website” means the PVF website, located at www.provideofactory.com. Using the Website including Content, other than for its intended purpose, as determined in PVF’s sole discretion, including, but not limited to violating the legal rights of third parties (including rights of privacy and publicity, or by defaming, abusing, harassing, stalking, or threatening others), committing fraud or criminal or other unlawful activities, or by publishing, posting, distributing or disseminating any harmful materials, including any materials that are pornographic, sexual, indecent, obscene, or defamatory, or that are disparaging of or promote discrimination, hatred or violence against any religious, racial, ethnic or gender group, or that is otherwise illegal, or unlawful, or that encourages violence or illegal or harmful activities. Engaging in “batch” downloading, such as, downloading Content covered by the Content License Agreement, in excess of what is reasonable, for example, without demonstrated intention to use such Content in User Works and/or to avoid future license or subscription fees, as determined in PVF’s sole and absolute discretion. By creating a User Account, you agree not to share your User Account information, including your user ID and password, with any other person or entity, and to immediately notify PVF in the event you become aware your User Account may have been accessed without your authorization, or where your such User Account information is disclosed to a third party or becomes lost or stolen. “Credits” with PVF are redeemable toward the purchase of a License for Content that is designated “Premium Content” at a value equal to the number of credits indicated for the desired Content on the PVF Website at the time of redemption. $1 USD equals 1 credit. Credits can be purchased online through the PVF Website, and are subject to certain conditions, in accordance with the “Payment” section of this Agreement. At its sole and absolute discretion, PVF may grant “bonus” credits where multiple credits are purchased in a single transaction. Upon termination of your User Account, and as set out in the “Term and Termination” section of this Agreement, you agree to forfeit all credits remaining in your account. Certain Content may only be accessed, downloaded, and licensed by you after you have become a PVF Subscriber. Descriptions of the various PVF Subscription packages, pricing, and content can be found at http://www.provideofactory.com/subscription. Subscriptions automatically renew annually unless cancelled in advance of the renewal deadline. The credit card or PayPal account associated with your User Account will be charged the applicable subscription fee in accordance with the “Payment” section of this Agreement each year on the same day you purchased the PVF Subscription, unless you cancel. You may opt out of automatic renewal at any time by accessing your User Account and changing your billing options. Anyone who has created a User Account, including by signing in using their Facebook social media account credentials, may access, download, and use Content available in the PVF OPEN LIBRARY, which contains video clips pre-selected by PVF. Only PVF Subscribers may access and use Content in the PVF GENERAL LIBRARY. Licenses in respect of Content in PVF PREMIUM LIBRARY must be purchased separately, unless included in a PVF Subscription package. the 4K PACKAGE is also a subscription based package, that grants you a royalty free license to over 150,000 HD and 4K clips for a single annual fee. The PREMIUM LIBRARY includes Content in HD, 4K, 6K, and 8K resolution formats. Purchase of a separate license is required to download and use each piece of Content in our PREMIUM LIBRARY. You do not need to be a PVF Subscriber to access and purchase a License for Content in our PREMIUM LIBRARY. However, each month, PVF Subscribers may receive free downloads and licenses for to up to five (5) 4K clips in the PREMIUM LIBRARY as selected by PVF, as well as a discount and/or a credit towards Content in the PREMIUM LIBRARY. distribute the Content as incorporated into the User Work, in accordance with the terms of the Content License Agreement you obtained. Electronic storage of Content: As part of the License, you agree to retain all information embedded in the electronic file containing the Content such as the copyright symbol, the name of PVF, the Content's identification number, and to maintain effective security measures to protect the Content from unauthorized use by third parties. Protection of Content: You need to use best efforts to protect and secure the Content to ensure that it cannot be copied and/or downloaded by third parties. Failure to prevent such unauthorized copying or download would be a breach of this Agreement. Limitations: The Licence, in relation to the Content to which the License applies, is subject to the limitations outlined below. b. For Content in Premium Library: Unlimited for each clip purchased. 2. Number of Copies: unlimited, provided the copies are made in accordance with the other terms of the License. 3. Number of Seats: One, specifically, only a single identified person is permitted to access the PVF libraries and download Content pursuant to the License, without a right to transfer or grant permission to others to access, download or use the Content. If the License is taken for a business, a single seat for specific person is granted to the business. Both the business and the specific person are bound by this Agreement and the License. No other persons, including any employers, employees, persons or entities on whose behalf you are acting may download the Content. Only the entity on whose behalf the License is sought is permitted to use the Content. Should any other persons, including employees, representatives, agents or clients, be required to access the PVF libraries, and download the Content as contemplated by the License, a separate multi-seat License must be purchased. Such license will be subject to a separate Agreement. To inquire, contact [email protected]. Content marked “Model Released”: You may use Content that contains personal identifying information, such as a person’s name, voice, face, figure, or other identifying information, for commercial purposes, including for marketing, advertising, endorsement, merchandizing, or other similar promotional purposes, only if said Content is marked “Model Released”. Content marked “Property Released”: You may use Content that contains depictions of private premises (i.e. property or locations) for commercial purposes, including for marketing, advertising, endorsement, merchandizing, or other similar promotional purposes, only if the Content is marked “Property Released”. General: Content must be incorporated into a User Work, and Content must not be capable of being downloaded, extracted, or otherwise accessed by a third party as a stand-alone file. You cannot sell, license, or otherwise distribute or make available the Content (or a superficially modified version of the Content) on a stand-alone basis (i.e. as its own file) or permit or encourage any others to do so. You are also prohibited from incorporating Content into any User Work that is subsequently made available for distribution or resale through a stock product library or collection. Credit Attribution: If you chose to credit PVF in your User Work that incorporates Content, you may include a credit line that reads “Stock media used under license from ProVideoFactory, Inc.”. Disassemble, decompile, translate, decode, or reverse engineer any source code for the Content, including, but not limited to, removing any rights management information, watermarking, or otherwise avoiding, bypassing, tampering with, removing or impairing any technological protection measures that limit access to, of use of, the Content. impersonates any person or entity or falsely states or misrepresents your affiliation with a person or entity. The Website is the property of PVF, and is protected by intellectual property and other laws, including copyright, trademark, patent and trade secret laws. PVF and/or its contributors own all rights, title, and interests in and to the Website and the Content, including when Content is incorporated into User Work. The Website (excluding Content that is subject to the terms of the Content License Agreement) may only be copied for personal, non-commercial purposes. Only the amount necessary for the purpose of your activity may be copied, and it may not be modified in any way, including by removing any intellectual property notice or other rights management information. Notwithstanding, PVF may, in its sole discretion, deem any non-licensed dealings with the Website as infringing or violating PVF’s rights, and PVF reserves its rights to challenge and seek damages and other remedies in respect of all such dealings. Except to the extent permitted under the Content License Agreement, you are prohibited from creating any derivative works from the Website or otherwise exploiting the Website, without PVF’s written permission. If you have purchased a license, nothing in this Agreement, including the Content License Agreement, sells any ownership of the Content from PVF to you, nor grants you any rights, title, or interest in or to the Content (including any related code, metadata, keywords, and descriptions), including copyrights, trademarks, trade secrets or other proprietary rights. PVF does not make any claims in respect of ownership of User Works that incorporate Content, other than its ownership of that Content. a statement that you swear the information contained in your letter is accurate and true, and that you are the rights holder or authorized to act on their behalf, under penalty of perjury. It has a good faith belief that it has the right and authority to enter into this Agreement, including the grant to you the License, without obtaining any consents or permissions from any other person. Content in its original unaltered form, when downloaded and used by you in full compliance with the terms of this Agreement and applicable law, will not violate or infringe on any rights of third parties, any intellectual property rights, or any privacy or publicity rights. As noted in Section V “Content Use Restrictions”, certain Content is marked to indicate that clearance in respect of certain rights has been obtained (i.e. “Model Release” and “Property Release”). If the Content contains identifiable persons or premises, but is not marked with the appropriate release, such Content may not be used for any commercial purposes (including for marketing, advertising, endorsement, merchandizing, or other similar promotional purposes) but may be used for accurate and truthful editorial coverage. There are no material defects in the Content that would prevent Content from being downloaded from the Website and used in accordance with the terms of this Agreement. In the event there are material defects in the Content, you must provide us with written notification of the material defect within 30 days of the download. If the download was of Content from our Premium Library, we will permit you to download the Content again. If the problem persists and PVF determines, in its sole discretion, that the defects would continue to prevent the Premium Library Content from being downloaded or used as permitted herein, PVF will refund the fee paid by you for such Premium Library Content. You are at least 18 years of age. You have the capacity, right, and authority to enter into this Agreement. You have read and understood this Agreement and are fully familiar with all terms herein. If you create a User Account: Any information provided about you to PVF in creating and maintaining a User Account is accurate and true, including all information relating to your name, contact information, credit card, or other payment information, and whether you are signing up for a User Account for your personal use or on behalf of business or other entity. You agree to update such information as is necessary from time to time, to ensure it is complete, accurate, and up to date. If you make a purchase through the Website: you are the cardholder or PayPal account holder, or are authorized to act on that person’s behalf, and the billing information provided by you is accurate. If you Download Content under a “Personal License”: you are the person who purchased access to the Content, through a PVF subscription. If you Download Content on behalf of a business or other entity, including an employer or other person or entity: you have the full right and authority to execute, deliver and perform this Agreement, on behalf your employer or other person on whose behalf you are acting, and this Agreement is binding on, and enforceable against such person, as well as you, personally. In the event you do not have such right and authority, you agree that in addition to all rights and remedies against such person, or anyone else, relating to violation or infringement of intellectual property rights, you will be personally liable to PVF for any breaches of the terms of this Agreement or violation or infringement of intellectual property rights in the Website or Content, by you, such person, and their representatives. Except as explicitly identified herein, the Website, PVF’s services, Content, and any Content information (including keywords, captions, categorizations, titles, and descriptions), are provided “as is” without any kind of representation, warranty or condition of any kind, either expressly or implied, including any implied warranties of merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, or title. PVF makes no representation or warranty that information contained in the Website is accurate, current, or complete. PVF further disclaims any representation or warranty that the Website, Content, or Content information will meet your requirements, is compatible with any particular hardware, software, device, or operating system, or that use of the Website or Content will be uninterrupted or error free. The Website and all Content is accessed at your own risk. You acknowledge that you shall be solely responsible for any loss or damage to your property or person, including but not limited to, your computer system and any hardware, software, or device used to access the Website, PVF’s services or Content or Content Information. Certain jurisdictions do not allow the exclusion of implied warranties, and your rights may vary from jurisdiction to jurisdiction. Public Domain Content Disclaimer: PVF does not make any representations or warranties of any kind in respect of (a) any personal identifying information or any third party works, trademarks or other intellectual property, intentionally or incidentally, captured and included as part of the Content, or as part of the background, (b) any moral rights, or similar rights, that may attach to such personal identifying information or third party works, trademarks or other intellectual property. You acknowledge that it is your responsibility to seek and obtain the appropriate licenses, waivers, or other permissions to deal with such personal identifying information or third party works, trademarks, or other intellectual property, and that PVF has no obligation or responsibility to assist you in doing so. PVF may update, revise, supplement or delete information, services, resources, and/or Content contained on the Website from time to time, and reserves its right to do so without prior notice to you. YOU ASSUME ALL RESPONSIBILITY AND RISK FOR USE OF THE WEBSITE, PVF’S SERVICES, AND CONTENT, INCLUDING, WITHOUT LIMITATION, ANY OF THE DATA OR INFORMATION CONTAINED THEREIN. IN NO EVENT WILL PVF, ITS SUBSIDIARIES OR OTHER RELATED COMPANIES, AFFILIATES, AND CONTENT SUPPLIERS, AND EACH OF THEIR RESPECTIVE OFFICERS, DIRECTORS, EMPLOYEES AND STOCKHOLDERS BE LIABLE TO YOU OR ANY OTHER PERSON OR ENTITY FOR ANY PUNITIVE, SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR ANY OTHER DAMAGES, COSTS, OR LOSSES IN CONNECTION WITH ANY CLAIM ARISING OUT OF OR UNDER THIS AGREEMENT, YOUR DIRECT OR INDIRECT BROWSING, ACCESSING, OR USE OF THE WEBSITE OR CONTENT (INCLUDING ANY DESTRUCTIVE, HARMFUL, OR DISRUPTIVE FILES OR PROGRAMS, OR OTHER COMPUTER VIRUSES, THAT MAY INFECT OR OTHERWISE IMPACT YOUR COMPUTER EQUIPMENT OR OTHER PROPERTY AS A RESULT OF SUCH ACTIVITIES IN RESPECT OF THE WEBSITE AND CONTENT), OR ANY LICENSE GRANTED HEREIN, OR ANY USE OF OR RELIANCE ON ANY INFORMATION, CONTENT, GOODS, OR SERVICE DISPLAYED, OR MADE AVAILABLE ON OR THROUGH ANY THIRD PARTY WEBSITE OR LINKED RESOURCES DISPLAYED ON OR ACCESSIBLE THROUGH THE PVF WEBSITE, EVEN IF PVF HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, COSTS OR LOSSES, EXCEPT AS OTHERWISE PROVIDED IN THIS SECTION. THE TOTAL MAXIMUM AGGREGATE LIABILITY UNDER THIS AGREEMENT SHALL BE LIMITED TO $1.00 CANADIAN DOLLAR. HOWEVER, IN RESPECT OF ALL CONTENT, THE MAXIMUM AGGREGATE AMOUNT OF OUR LIABLITY SHALL BE LIMITED TO $1000.00 CANADIAN DOLLARS PER ITEM OF CONTENT REGARDLESS OF THE NUMBER OF TIMES YOU USE THE SAME PIECE OF CONTENT, BUT THIS SHALL NOT APPLY, AND THE MAXIMUM AGGREGATE AMOUNT OF OUR LIABILITY SHALL BE LIMITED TO $0.00 CANADIAN DOLLARS IN THE EVENT YOU HAVE MODIFIED OR OTHERWISE USED THE CONTENT IN VIOLATION OF THIS AGREEMENT. SOME JURISDICTIONS DO NOT PERMIT THE EXCLUSION OR LIMITATION OF IMPLIED WARRANTIES OR LIABILITY. IN SUCH JURISDICTIONS, THE LIABILITY OF PVF, ITS SUBSIDIARIES, AFFILIATES, AND CONTENT SUPPLIERS, AND EACH OF THEIR RESPECTIVE OFFICERS, DIRECTORS AND EMPLOYEES, STOCKHOLDERS SHALL BE LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW. NO CLAIM ARISING OUT OF THIS AGREEMENT OR YOUR USE OF ANY CONENT MAY BE BROUGHT BY YOU MORE THAN ONE YEAR AFTER THE INITIAL EVENTS GIVING RISE TO THE CLAIM HAVE OCCURRED. Your indemnification of PVF: You agree to defend, indemnify and hold harmless PVF and its subsidiaries, affiliates, and content suppliers, and each of their respective officers, directors and employees, and stockholders from all damages, liabilities, expenses, and reasonable outside legal fees, arising out of or in connection with any breach or alleged breach by you (or anyone acting on your behalf) of any of the terms of this Agreement. PVF’s indemnification of you: Provided that you are not otherwise in breach of the terms of this Agreement, and, if in respect of Content, your use of such Content is only in accordance with this Agreement, and as your sole and exclusive remedy for any breach by PVF of its warranties and representations in respect of intellectual property in Content as set forth in this Agreement, PVF agrees, subject to the terms of this Section, to defend, indemnify and hold harmless you, your corporate parent, subsidiaries and affiliates, and each of your respective officers, directors and employees from all damages, liabilities and expenses arising out of a proven breach by PVF. PVF’s liability under this indemnification shall not exceed the cost of any subscription or license fees paid by you to PVF. This indemnification does not apply to the extent any damages, costs, or losses arise out of or are a result of modifications made by you to the Content or the context in which the Content is used by you. This indemnification also does not apply to your continued use of Content following notice from PVF, or upon your knowledge, that the Content is subject to a claim of infringement of a third party's right. General: To rely on these indemnification rights, the party seeking indemnification must promptly notify in writing the other party about the claim. Such notification must include the nature of the claim, the Content and User Work at issue, and the name and contact information of the party asserting the claim. To the extent any legal fees and other costs have been incurred by a party prior to such notice, that party is not entitled to be indemnified for such fees and costs. The indemnifying party (i.e. the party paying) has the right, but not the obligation, to assume the handling, settlement, or defense of any claim or litigation. If the indemnifying party exercises this right, the other party must cooperate in any way reasonably requested by the indemnifying party and agrees that if it wishes to participate separately in such litigation, it shall do so at its own expense. General: This Agreement remains effective unless terminated. In the event this Agreement is terminated, you will not be entitled to any refund in respect of payments made to PVF to access or use the Content. In the event your User Account is terminated, any Credits remaining in your User Account will be forfeited to PVF and no longer be valid. Termination of PVF subscription package: Access to Content through any PVF subscription package is automatically terminated after one (1) year, calculated from the date your subscription commenced, unless your subscription is renewed, although you may cancel your subscription at any time by writing to PVF. The Content License Agreement shall continue to run despite your cancellation or failure to renew but only in respect of Licensed Content that you have downloaded and incorporated into a User Work prior to the date of termination; You will not be entitled to download any new Content, or use any Content downloaded during the subscription period but not incorporated into a User Work (including drafts of a User Work) at the time the subscription is terminated. All files for such downloaded Content must, within ten (10) business days, be deleted and/or destroyed. If requested, you shall provide PVF with sworn written confirmation that you have complied with these terms. Termination of Content License Agreement by you: You may terminate the Content License Agreement at any time by ceasing use of the Content, deleting and/or destroying all files and copies of the Content downloaded and used by you and/or any other person to whom access to the Content was granted under the Content License Agreement. Termination by PVF: PVF may terminate this Agreement any time if you fail to comply with any of the terms of this Agreement, including the terms of the Content License Agreement. In the event PVF terminates this Agreement, you must, within ten (10) business days, cease using the Content, delete and/or destroy all files and copies of the Content downloaded and used by you and/or any other person to whom access to the Content was granted under this Agreement, including all files and copies of User Works incorporating the Content, and advise PVF of the same in writing. Termination by third party action: This Agreement will automatically terminate if the Content or a User Work incorporating Content is hosted or displayed on a third party website or platform and such third party website or platform does (or provides notice that it will) deal with user materials for its own purposes or in a manner that is contrary to this Agreement. Termination after Content removal by PVF: From time to time, PVF may remove Content from its website at its sole discretion. In the event such Content is removed due to a third party claim against that Content, the Content License Agreement portion of this Agreement will terminate in respect of that Content. Upon receiving notice of removal of such Content, either from PVF or due to your own knowledge, you must cease using that Content, delete and/or destroy all files and copies of such Content downloaded and used by you and/or any other person to whom access to such Content was granted under this Agreement, including all files and copies of User Works incorporating such Content, and advise PVF of the same in writing. ALL SALES ARE FINAL, AND PVF HAS NO OBLIGATION TO REFUND ANY FEES PAID BY YOU FOR ANY SERVICES PURCHASED THROUGH THE WEBSITE, INCLUDING ANY CREDITS, SUBSCRIPTION OR LICENSE, EXCEPT AS REQUIRED BY LAW. However, we will refund you the fee paid in respect of single item Content you have purchased and downloaded through our Premium Library where such Content has a material defect, you have provided us with written notification of the material defect within 30 days of the Download, we have permitted you to and you have Downloaded that Content again, the problem persists, and PVF determines, in its sole discretion, that the defects would continue to prevent the Premium Library Content from being downloaded or used as permitted under the Content License Agreement. In the event such refund is granted, the Content License Agreement in respect of such Content shall be considered terminated, and any downloaded files must be deleted and/or destroyed. The price for subscriptions or Content will be as specified on the Website at the time of purchase, and will be in USD (United States Dollars), but may not include all taxes, fees, set off, deduction, or withholdings applicable in your jurisdiction, including currency conversion and withholding taxes. You are responsible for promptly paying any and all applicable sales taxes, use taxes, value added taxes, property tax, customs, duties and any related interest or penalties imposed by any jurisdiction as a result of the License, any supplemental or other license or any use of the Content. Purchases on the Website may only be made through credit card or PayPal. By approving the purchase, you authorize PVF or a third party retained by PVF, to charge the designated credit card or PayPal account for the total amount of the purchase. For PVF Subscribers, unless you have cancelled your subscription or opted out of automatic renewal, the subscription fee for the year will be charged to your credit card or PayPal account indicated in your User Account each year on the same day you purchased the PVF Subscription. Any purchased Credits or Credits issued by PVF to your User Account will remain valid in association with that User Account until the User Account is terminated. Credits are not transferrable between User Accounts, are not refundable and have no cash value. At the time your User Account is terminated, any remaining Credits will be forfeited and no longer be valid. Governing law: This Agreement is governed by the laws of the province of Ontario and country of Canada, as applicable, without reference to its laws relating to conflicts of law. For greater certainty, the United Nations Convention on Contracts for the International Sale of Goods does not govern this agreement. Disputes: The courts in Toronto, Ontario, will have exclusive jurisdiction to hear and decide any claims or disputes arising under or relating to this Agreement, and by agreeing to this Agreement, you hereby attorn to the exclusive jurisdiction of said courts. Binding Agreement: This Agreement is binding upon the parties hereto and ensures to the benefit of PVF’s successors and assigns. It is personal to you and any rights or obligations under this Agreement may not be assigned by you, in whole or in part, to any third party. Severance of Terms: In the event that a term(s) in this Agreement is declared to be invalid or unenforceable, the remaining terms shall continue in full force and effect, and the parties agree to substitute for any invalid or unenforceable term(s) a term(s) of similar intent and scope to the extent permitted by law. Notice: Any notice to PVF required or permitted by this Agreement or given in connection with this Agreement, shall be sent to [email protected]. Any notice to you required or permitted by this Agreement or given in connection with this Agreement, shall be sent to the email address you provided to PVF in connection with the purchase of PVF’s services. It is your responsibility to ensure such information is accurate and up to date. PVF has no obligation to seek confirmation of delivery or an alternative email address once notice is sent to you in the manner described. Compliance Checks: Upon reasonable notice, you agree to provide PVF with sample copies or access to sample copies of User Works (including drafts of in-progress and completed User Works) that contain Content, including by granting to PVF free-of charge access to such User Works hosted on third party platforms, websites, or servers. To ensure compliance with the terms of this Agreement, where PVF has reason to believe that your use of Content may be outside the scope of the License, PVF may request, and you agree to make any required changes to bring your use of the Content into compliance and to provide PVF with a certificate of compliance, in a form provided for by PVF, signed by an officer of your company. Entire Agreement: No terms or conditions of this Agreement may be added or deleted unless made in writing and accepted in writing by both parties, or issued electronically by PVF and accepted in writing by you. In the event of any inconsistency between the terms of this Agreement and the terms contained on any purchase order or other document sent by you, the terms of this Agreement will apply. Waiver: No action of either party, other than an express written waiver, may be construed as a waiver of any provision of this Agreement. If in Quebec, parties confirm that it is their wish that this Agreement as well as all documents relating to this Agreement, including notices, be drawn up in English only. Les parties aux présentes conferment que c’est leur volonté que le présente convention de même que tous les documents, y compris les avis s’y rattachant, soient redigês en anglais seulement.
2019-04-18T15:26:01Z
https://provideofactory.com/legal/license-agreement
One ozone concentrating chamber is provided therein with a part of a cooling temperature range where ozone can be selectively condensed or an oxygen gas can be selectively removed by transmission from an ozonized oxygen gas, and a part of a temperature range where condensed ozone can be vaporized, and condensed ozone is vaporized by moving condensed ozone with flow of a fluid or by gravitation to the part where condensed ozone can be vaporized, whereby the ozonized oxygen gas can be increased in concentration. Such a constitution is provided that a particle material 13 for condensation and vaporization filled in the ozone concentrating chambers 11 and 12 has a spherical shape of a special shape with multifaceted planes on side surfaces, or an oxygen transmission membrane 130 capable of selectively transmitting an oxygen gas in an ozone gas is provided. The present invention relates to an apparatus and a method for selectively condensing only a specific gas or selectively transmitting other gases than a specific gas from a gas containing plural gas species, so as to concentrate or dilute the specific gas. In particular, it relates to an apparatus for concentrating and diluting a specific gas and a method therefor, in which by using only one chamber with a simple constitution without plural concentrating steps and retrieving steps, a specific gas is selectively condensed or other gases than the specific gas are selectively transmitted to form a diluted gas in a diluted gas retrieving part of the chamber, and simultaneously the condensed liquid is moved by gravitation to a concentrated gas retrieving part at a lower part of the chamber and is then gasified, so as to form a concentrated gas in the concentrated gas retrieving part of the chamber, whereby the concentrated gas and the diluted gas can be separately retrieved continuously from the two gas retrieving parts of the chamber. A conventional apparatus for concentrating and diluting only a specific gas from a gas containing plural gas species includes an ozone concentrating apparatus, a NOx or Freon removing apparatus, a CO2 removing apparatus and the like. In the techniques of the conventional apparatuses, only a specific gas is cooled and is once liquefied or adsorbed on an absorbent, such as silica gel, and in the next step, the gas substance having been liquefied or adsorbed on the adsorbent is again gasified through evaporation or desorption by heating, whereby the specific gas is concentrated. A gas having been concentrated by using the apparatus is utilized as a chemical reactive gas for an apparatus for producing a semiconductor, whereby it is applied to a production technique of a semiconductor having higher quality, and is applied to an environmental improvement technique, such as detoxification of a concentrated toxic gas through heat or catalytic reaction. A first example of a conventional apparatus for concentrating and diluting a specific gas is such an apparatus that about 10% (220 g/Nm3) or less of an ozonized gas (oxygen: 90%, ozone: 10%) generated with an ozone generator is fed to a chamber cooled to from 80 K (-193°C) to 100 K (-173°C) to liquefy only an ozone gas, in the next step the gas part in the chamber is vacuumized with an evacuating device, in the further next step the liquefied ozone gas is heated to a temperature around from 128 K (-145°C) to 133 K (-140°C) with a heating means, such as a heater, to convert the vacuumized gas part to a 100% ozone gas at from 50 Torr (53 hPa) to 70 Torr (100 hPa), which corresponds to the vapor pressure of ozone, and the vaporized ozone is retrieved (as described, for example, in Patent Document 1). A second example of a conventional apparatus for concentrating and diluting a specific gas is such an apparatus that an ozonized gas generated with an ozone generator is fed to a chamber having filled therein an adsorbent and having been cooled to a low temperature (-60°C) to adsorb only an ozone gas to the adsorbent (adsorbing step), and in the next step the gas part in the chamber is evacuated to vacuum with an evacuating device, in the further next step the ozone gas adsorbed to the adsorbent is heated to a temperature around 0°C with a heating means, such as a heater, whereby a 95% concentrated ozone gas at about 100 Torr (53 hPa) is retrieved from the vacuumized adsorbent part at a flow rate of about 500 cc/min (desorbing step) (as described, for example, in Patent Document 2). In Patent Document 2, in order to retrieve the concentrated ozone gas continuously, the adsorbing step and the desorbing step are repeated alternately in time series by providing three of the aforementioned chamber having filled therein the adsorbent, and an ozonized gas having a high concentration can be fed stably by providing a buffer tank. It is also disclosed therein that an oxygen gas and the like are fed to the buffer tank along with the concentrated ozone gas, whereby an ozonized gas having an ozone concentration of from 30 to 95% can be fed. In the field of production of semiconductors, there is severe competition in development for realizing a highly integrated semiconductor device, and for example, there is such a proposal that in a production process of a nonvolatile semiconductor memory device (nonvolatile memory) having a silicon oxide film formed on a nitride film on a silicon wafer, a control electrode and a floating gate electrode are formed in such a manner that an extremely thin oxide film of about 2 nm is formed, and as an oxide film forming means capable of suppressing an interlayer leakage electric current, a low temperature oxidation chemical reaction with a superhigh purity ozonized gas containing no impurity other than oxide and ozone gas having 20% (440 g/Nm3) or more and irradiation of an ultraviolet ray or plasma discharge is used to form an oxide film having good quality, whereby such an oxide film can be realized that satisfies the aforementioned thickness and the requirement for electric current regulation (as described, for example, in Patent Document 3). In the field of production of semiconductors, it is important to form an oxide film having high quality for increasing the integration degree. Accordingly, importance is given to a technique of continuously supplying a superhigh purity ozonized gas of 20% (440 g/Nm3) or more, i.e., a highly concentrated ozone gas, economically in large quantity with safety. The application field of a conventional apparatus for concentrating and diluting a specific gas includes an apparatus for removing a NOx gas or a Freon gas and an apparatus for removing a CO2 gas. The apparatus for removing a NOx gas, a Freon gas or CO2 gas includes plural steps, i.e., in the first step a gas containing a NOx gas, a Freon gas or a CO2 gas is adsorbed to an adsorbent at a low temperature or under pressure, in the second step the gas is desorbed at a high temperature or in a depressurized state, and then in the third step the desorbed NOx, Freon or CO2 gas is decomposed and removed through heat, chemical reaction or catalytic chemical reaction. As an example of the conventional apparatus for removing a NOx gas, there is proposed that a NOx gas derived from a combustion waste gas is adsorbed to a metallic oxide substance by making the gas in contact with the metallic oxide substance, whereby the NOx gas contained in the combustion waste gas is removed (apparatus for diluting a NOx gas) (as described, for example, in Patent Document 4). The application field of a conventional apparatus for concentrating and diluting a specific gas includes an apparatus for removing a CO2 gas. As the apparatus for removing a CO2 gas, such apparatuses are proposed that a waste gas containing a carbon dioxide gas is adsorbed to porous tubes to remove a CO2 gas from the waste gas (as described, for example, in Patent Document 5), and air in a room containing a carbon dioxide gas is made in contact with a carbon dioxide gas adsorbing sheet with a fan to adsorb a carbon dioxide gas to the carbon dioxide gas adsorbing sheet, whereby the air in the room is cleaned (apparatus for diluting a CO2 gas) (as described, for example, in Patent Document 6). The NOx or CO2 gas thus adsorbed with the apparatus for removing a NOx or CO2 gas is reduced to an N2 gas or converted to ammonia, carbon or methane through heat, discharge or catalytic chemical reaction on a surface of a metallic oxide substance, so as to contribute a processing technique with high efficiency. It is believed that the invention is not disclosed in the aforementioned conventional art documents and has novelty and inventive step. In particular, such an apparatus is not disclosed that is constituted with a chamber having filled therein a particle material for condensation and vaporization, and a chamber having formed therein a gas transmission member (membrane). Furthermore, no document discloses such an apparatus and method that the upper part of the chamber is cooled with a cooler to condense selectively a specific gas on the surface of the particle material, and other gases than the specific gas are selectively transmitted through the gas transmission member (membrane), and the condensed gas is vaporized on the surface of the heated particle material or gas transmission member (membrane) on the lower part of the chamber, whereby the specific gas is concentrated. In the conventional technique of concentrating an ozonized gas as a specific gas, in the first step an ozone gas generated with an ozone generator is cooled to liquefy or adsorb to an adsorbent as shown in Patent Documents 1 and 2, in the second step gasses that cannot be adsorbed are evacuated to vacuum, and in the third step the liquefied or adsorbed gas is heated to obtain 100% ozone or a highly concentrated ozone gas of 95%. In the concentrating apparatus, the system becomes complicated since the operations of the three steps are repeated alternately, and pressure control, flow rate control and of valve control for switching the pipings for every steps become complicated, whereby such a problem arises that the apparatus is increased in size, and the cost of the apparatus is increased. Impurity gases contained in an ozone gas generated with an ozone generator are accumulated as an impurity liquid in a liquefaction container through the liquefying and adsorbing steps of ozone, whereby there is a necessity of removing the impurity liquid periodically, or the impurity liquid remains as being adsorbed to the adsorbent to be a factor of deterioration in performance of ozone adsorption. Upon vaporizing the liquefied ozone liquid or adsorbed ozone by heating, if they are rapidly heated, abrupt vaporization or desorption occurs from the ozone liquid or adsorbed ozone to cause danger of explosion due to rapid increase of the gas pressure. Accordingly, since the rapid vaporization or desorption must be prevented from occurring, and the vaporization or desorption must be effected in a low pressure state, there is such a problem that flow rate of a concentrated ozone gas to be obtained becomes less amount and only a concentrated ozonized gas having a low pressure can be supplied, and there are such problems that in the field of production of semiconductors, mass production (batch process) cannot be attained, and a concentrated ozonized gas cannot be dispersed uniformly to a wafer processing chamber. Furthermore, an ozone gas generated with an ozone generator is continuously fed to a liquefaction chamber or an adsorption chamber to liquefy the gas to a prescribed amount or to adsorb once the gas the adsorbent to around 100% ozone, and the gas that cannot be liquefied or the ozone gas that cannot be adsorbed is discarded to a waste ozone apparatus, which brings about such a problem that an ozone gas cannot be effectively concentrated. In the conventional technique of removing a NOx or CO2 gas as a specific gas to clean a waste gas or air in a room (dilution of a specific gas), when the adsorption amount of the adsorbent is saturated, such a problem arises that the adsorbent is necessarily regenerated or replaced. Furthermore, in the case where the NOx or CO2 gas as a specific gas is reduced to an N2 gas or converted to ammonia, carbon or methane through heat, discharge or catalytic chemical reaction on a surface of a metallic oxide substance, there is such a problem that the gas cannot be processed efficiently. The invention has been made in view of the aforementioned problems and is to provide an apparatus and a method capable of continuously concentrating and diluting a specific gas with only one apparatus and one process step. The invention is also to realize such an apparatus that can be easily controlled in amount, pressure and degree of concentrating of a concentrated gas, is excellent in safety and compactness, and is inexpensive. The apparatus for concentrating and diluting a specific gas of the invention is characterized in that the apparatus contains a specific gas concentrating system including a chamber having filled therein a particle material for condensation and vaporization capable of selectively condensing the specific gas or having equipped therein a gas transmission member selectively transmitting other gases than the specific gas and a freezing machine that cools the specific gas fed to the chamber to a predetermined cool temperature, and a gas feeding and retrieving system having a feeding port feeding a gas containing plural gas species, a diluted gas retrieving port retrieving a gas containing the specific gas having been diluted, and a concentrated gas retrieving port retrieving a gas containing the specific gas having been concentrated, wherein the diluted gas retrieving part of the gas fed to the chamber is performed dilution of the specific gas by selectively condensing the specific gas on a surface of the particle material or the gas transmission member through cooling with the freezing machine or by selectively transmitting the other gases than the specific gas by the gas transmission member, and wherein the concentrated gas retrieving part of the gas fed to the chamber is performed concentration of the specific gas by vaporizing the condensed gas on the surface of the particle material or the gas transmission member through heating a surrounding of the concentrated gas retrieving part, thereby continuously retrieving the gas containing the specific gas having been diluted through the diluted gas retrieving part of the chamber or continuously retrieving the gas containing the specific gas having been concentrated through the concentrated gas retrieving part of the chamber. The method for concentrating and diluting a specific gas of the invention is a method for concentrating and diluting a specific gas from a gas containing plural gas species characterized by introducing a specific gas containing the plural gas species to a gas concentrating and diluting chamber having filled therein a particle material for condensation and vaporization the specific gas or having equipped therein a gas transmission member selectively transmitting other gases than the specific gas, with a function of cooling the gas in the chamber equipped therein; cooling the gas in the chamber with a gas feeding and retrieving system having a function of retrieving a gas containing the specific gas having been diluted or retrieving a gas containing the specific gas having been concentrated, thereby selectively condensing only the specific gas or selectively transmitting the other gases than the specific gas on a surface of the particle material for condensation and vaporization or the gas transmission member, so as to realize dilution of the specific gas by a diluted gas retrieving part of the chamber; and heating a surrounding of a concentrated gas retrieving part of the chamber while streaming down a liquid condensed on the surface of the particle material to a lower part of the chamber by gravitation, thereby vaporizing the condensed gas on the surface of the particle material to realize high concentration of the specific gas at a concentrated gas retrieving part of the chamber, and continuously retrieving a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber or a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber. The method for concentrating and diluting a specific gas of the invention is characterized by, in the aforementioned apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the particle material, providing at least one of an automatic pressure controller (APC) controlling an inner pressure of the chamber and a mass flow rate controller (MFC) controlling a flow rate of a gas retrieved from the chamber, on at least one of the gas retrieving port of the diluted gas retrieving part and the gas retrieving port of the concentrated gas retrieving part of the chamber of the chamber, automatically controlling the inner pressure of the chamber to a prescribed pressure with the automatic pressure controller (APC), and setting a flow rate of a gas containing the specific gas having been diluted retrieved from the diluted gas retrieving part of the chamber through them with the mass flow rate controller (MFC), thereby enabling automatic control of a concentrated gas concentration and flow rate upon continuously retrieving a gas containing the specific gas having been concentrated. The method for concentrating and diluting a specific gas of the invention is characterized by, in the aforementioned apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the gas transmission member, making pressures at the diluted gas retrieving part and the concentrated gas retrieving part to P1 and P2, respectively, by providing an automatic pressure controller I (APC I) or a gas pressure controlling valve I controlling an inner pressure P1 of the chamber of a diluted gas having the specific gas removed by transmitting other gases than the specific gas at the diluted gas retrieving part of the chamber, and providing an automatic pressure controller II (APC II) or a gas pressure controlling valve II controlling an inner pressure P2 at the concentrated gas retrieving part of the chamber, thereby producing a gas pressure difference ΔP (= P2 - P1) on sides between the gas transmitting member, continuously retrieving a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber and a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber through them, varying at least one set pressures of the automatic pressure controller I (APC I) and the automatic pressure controller II (APC II), thereby enabling control of a concentrated gas concentration upon continuously retrieving the gas containing the specific gas having been concentrated. According to the first aspect of the invention, only a specific gas can be continuously separated into a diluted gas and a concentrated gas with only one step, whereby such an advantage can be obtained that provides an apparatus for concentrating and diluting a specific gas that is improved in process efficiency, has a small size, is inexpensive, and has safety, as compared to the conventional art, and provides a method for concentrating and diluting a specific gas therefor. According to the second aspect of the invention, a chamber having filled therein a particle material for condensation and vaporization selectively condensing the specific gas or having equipped therein a gas transmission member selectively transmitting other gases than the specific gas is cooled, so as to cool a gas containing plural gas species fed to the chamber, and by the cooling effect of the gas, the adsorption rate of the specific gas is improved to improve the effect of selectively condensing the specific gas on the particle material for condensation and vaporization. The invention also has an advantage of further improving the effect of selectively transmitting the other gases than the specific gas through the gas transmission material by cooling the gas. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the particle material of the invention, a means for continuously retrieving the concentrated gas of the specific gas from a gas retrieving pipe through the automatic pressure controller (APC) having a flow rate controlling means automatically controlling the pressure of the chamber is provided, and the diluted gas of the specific gas is continuously retrieved from a gas retrieving pipe through a flow rate controller having a means capable of controlling the flow rate with a mass flow rate controller or a flow rate valve provided on an upper part of the chamber, whereby the concentration of the diluted gas and the flow rate and the concentration of the concentrated gas of the specific gas can be controlled by setting the flow rate of the diluted gas of the specific gas, and a stable concentrated gas can be retrieved. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the gas transmission member of the invention, an automatic pressure controller I (APC I) or a gas pressure controlling valve I controlling the inner pressure P1 of the chamber of the diluted gas having the specific gas removed by transmitting other gases than the specific gas at the diluted gas retrieving part of the chamber is provided, an automatic pressure controller II (APC II) or a gas pressure controlling valve II controlling an inner pressure P2 at the concentrated gas retrieving part of the chamber is provided, and a gas pressure difference ΔP (= P2 - P1) between the diluted gas retrieving part and the concentrated gas retrieving part is provided, whereby the transmission amount of the gas other than the specific gas can be increased to separate the gas to a higher concentration, and a stable concentrated gas can be retrieved. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the gas transmission member of the invention, the inner pressure P1 in the chamber at the retrieving part of the diluted gas having the specific gas removed by transmitting the other gases than the specific gas is set to the atmospheric pressure (0 MPa) or more, and the pressure P2 at the concentrated gas retrieving part is set to a range of from 0.1 MPa to 0.5 MPa, to provide a gas pressure difference ΔP (= P2 - P1) between sides of the gas transmission members of 0.1 MPa or more, whereby the diluted gas can be released without necessity of decreasing the pressure at the diluted gas retrieving part below the atmospheric pressure to separate the gas to a higher concentration, and a stable concentrated gas can be retrieved. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the gas transmission member of the invention, an ozonized gas containing an ozone gas is used as the gas containing plural gas species that is fed to the concentrating and diluting apparatus, and the gas transmission member is constituted with a Teflon (a trade name) membrane material or a ceramic material, whereby the gas transmission member can have ozone resistance or NOx resistance to provide an advantage of providing a stable concentrating and diluting apparatus having a longer service life. According to another aspect of the invention, an ozonized gas containing an ozone gas is used as the gas containing plural gas species that is fed to the concentrating and diluting apparatus, and the temperature for cooling the gas in the chamber with the freezing machine for cooling is set at -100°C or more, whereby a freezing machine for an extremely low temperature exceeding -100°C may not be used, and the thermal insulation structure of the chamber is simplified, thereby making the concentrating and diluting apparatus inexpensive. According to still another aspect of the invention, an ozonized gas containing an ozone gas is used as the gas containing plural gas species that is fed to the concentrating and diluting apparatus, and the ozonized gas diluted gas (oxygen gas) retrieved from the diluted gas retrieving part of the chamber is made to have a high pressure with a gas compressor to reuse the gas as a raw material gas for an ozone gas generator, whereby such an advantage is obtained that an oxygen gas can be efficiently an ozonized gas. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the particle material of the invention, for providing a temperature distribution in the chamber having a less temperature distribution in the radial direction and a prescribed temperature gradient in the axial direction, upon cooling the concentrating chamber, the thickness of the thermal insulating material around the chamber is adjusted, the arrangement of the particles for condensation having been filled is made to be a layer form, the shape of the particle material for condensation and vaporization is made to be a spherical shape with a part of the side surface thereof being flattened, to make the flattened parts of the spherical particle material for condensation and vaporization in contact with each other upon filling in the chamber, whereby the cooling distribution in the concentrating chamber can be uniform in the radial direction and can have a large temperature distribution in the axial direction, and thus the condensation effect and the vaporization effect of the specific gas by cooling can be efficiently conducted to provide such an effect that the concentrated gas can be retrieved compactly and inexpensively. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the particle material of the invention, the material of the particle material for condensation and vaporization is glass, ceramics or a metal that does not undergo chemical reaction with the gas containing plural gas species, whereby the specific gas can be easily condensed and vaporized. According to the apparatus for concentrating and diluting a specific gas containing the chamber having equipped therein the particle material of the invention, the material of the particle material for condensation and vaporization is glass, ceramics or a resin material, and the surface of the particles is coated with a metallic film that does not undergo chemical reaction with the gas containing plural gas species, whereby the metallic film good in thermal conductivity can be preferentially cooled and heated, and thus the specific gas can be rapidly condensed and vaporized, thereby enabling dilution and concentration of the gas with higher responsiveness. According to still another aspect of the invention, the liquefied gas concentrating and diluting apparatuses are provided plurally as a multistage cascade to improve the degree of concentrating and the degree of diluting of the concentrated gas and the diluted gas of the specific gas, whereby the gas can be separated into gases being further diluted and concentrated. According to still another aspect of the invention, an ozonized gas containing an ozone gas is used as the gas containing plural gas species that is introduced to the concentrating and diluting apparatus, and ozone of the ozonized gas is concentrated to be an ozone gas having a high concentration, whereby semiconductors having high quality can be produced in a low temperature state by utilizing chemical reaction of the ozone gas having a high concentration in the field of semiconductors. According to still another aspect of the invention, an ozonized gas having a concentration of about 116,629 ppm (250 g/Nm3) or more generated with an ozone generator generating an ozone gas is used as the gas containing plural gas species that is introduced to the concentrating and diluting apparatus, and ozone of the ozonized gas is concentrated to be an ozone gas having a high concentration, whereby such an advantage is obtained that an ozone gas can be efficiently concentrated. According to still another aspect of the invention, an ozonized gas generated with a nitrogen-free ozone generator generating an ozone gas from a high purity oxygen gas having an addition amount of a nitrogen gas of 1 ppm or less is used as the gas containing plural gas species that is introduced to the concentrating and diluting apparatus, and ozone of the ozonized gas is concentrated to be an ozone gas having a high concentration, whereby an ozone gas with a less amount of NOx gas can be concentrated to reduce deposition of metallic contamination due to a NOx gas, and thus semiconductors having higher quality can be produced in the field of semiconductors. According to still another aspect of the invention, air containing a carbon dioxide (CO2) gas is used as the gas containing plural gas species that is introduced to the concentrating and diluting apparatus, and the carbon dioxide (CO2) gas of air containing a carbon dioxide gas is concentrated to separate into air containing carbon dioxide (CO2) having been concentrated and air containing carbon dioxide (CO2) having been diluted (cleaned), whereby a large amount of an atmospheric gas can be concentrated and diluted by an inexpensive system. Furthermore, such an advantage is obtained that concentrated carbon dioxide (CO2) can be efficiently decomposed or solidified. According to still another aspect of the invention, air containing a NOx (such as NO2, N2O, NO, N2O5 and HNO3 vapor) gas or a Freon gas is used as the gas containing plural gas species that is introduced to the concentrating and diluting apparatus, and the NOx gas of air containing a NOx gas is concentrated to separate into air containing NOx having been concentrated and air containing NOx having been diluted (cleaned), whereby a large amount of an atmospheric gas can be concentrated and diluted by an inexpensive system. Furthermore, such an advantage is obtained that a concentrated NOx (such as NO2, N2O, NO, N2O5 and HNO3 vapor) gas and a Freon gas can be efficiently decomposed. [Fig. 1] Fig. 1 is an illustration of an ozone concentrating system showing a constitution of ozone gas concentration in an embodiment 1 (selective condensation of an ozone gas) of the invention. [Fig. 2-a] Fig. 2-a is a schematic illustration showing a concentration mechanism of an ozonized oxygen gas in the embodiment 1 (selective condensation of an ozone gas) of the invention, in which an ozonized oxygen gas is fed and separated into an oxygen gas containing an ozone gas having been concentrated and an oxygen gas containing an ozone gas having been diluted. [Fig. 2-b] Fig. 2-b is a characteristic diagram showing ozone concentrating characteristics with respect to the flow rates of the concentrated oxygen gas and the diluted oxygen gas to be retrieved in the ozone gas concentrating system of the first embodiment (selective condensation of an ozone gas) of the invention. [Fig. 2-c] Fig. 2-c is a block diagram showing a gas controlling system of an ozone gas concentrating system apparatus showing flow rate control and pressure control in a system of from feed of an ozonized oxygen gas to retrieval of the concentrated oxygen gas and the diluted oxygen gas in the ozone gas concentrating system of the embodiment 1 (selective condensation of an ozone gas) of the invention. [Fig. 3-a} Fig. 3-a shows an ozone concentrating chamber main body of an ozone gas concentrating system in an embodiment 2 (selective condensation of an ozone gas) of the invention. [Fig. 3-b] Fig. 3-b shows another example of an ozone concentrating chamber main body of an ozone gas concentrating system in the embodiment 2 (selective condensation of an ozone gas) of the invention. [Fig. 4] Fig. 4 is a characteristic diagram showing a gas temperature of the ozone concentrating chamber and condensation characteristics and vaporization characteristics of an ozone gas in the embodiments 1 and 2 (selective condensation of an ozone gas) of the invention. [Fig. 5] Fig. 5 is an illustration showing the structure and constitution of a particle material for condensation and vaporization for condensing an ozone gas in an ozone concentrating chamber to separate into a diluted oxygen gas and liquefied ozone in the embodiments 1 and 2 (selective condensation of an ozone gas) of the invention. [Fig. 6] Fig. 6 is a diagram showing a usable ozone concentration region with respect to a pressure of an ozone concentrated oxygen gas, and a relationship between output concentrating characteristics of a conventional concentrated ozonized oxygen gas apparatus and output concentrating characteristics of a concentrated ozonized oxygen gas apparatus of the embodiments 1 and 2 of the invention. [Fig. 7] Fig. 7 is a system diagram of an ozone gas concentrating system showing a constitution of ozone gas concentration in another embodiment (selective transmission of an oxygen gas) of the invention. [Fig. 8] Fig. 8 is a schematic diagram showing a concentration mechanism of an ozonized oxygen gas in another embodiment (selective transmission of an oxygen gas) of the invention, in which an ozonized oxygen gas is fed and separated to an oxygen gas containing an ozone gas having been concentrated and an oxygen gas containing an ozone gas having been diluted. [Fig. 9] Fig. 9 is a block diagram showing a gas controlling system of an ozone gas concentrating system apparatus showing flow rate control and pressure control in a system of from feed of an ozonized oxygen gas to retrieval of the concentrated oxygen gas and the diluted oxygen gas in the ozone gas concentrating system of another embodiment (selective transmission of an oxygen gas) of the invention. [Fig. 10] Fig. 10 is a characteristic diagram showing temperature dependency of an adsorbed amount of ozone with respect to an adsorbed amount of an oxygen gas upon cooling a concentrating chamber of an ozone gas concentrating system in the invention. [Fig. 11] Fig. 11 is a characteristic diagram showing temperature dependency of a magnification of a transmission amount of an oxygen gas with respect to a transmission amount of an ozone gas through a membrane upon cooling a concentrating chamber of an ozone gas concentrating system in the invention. [Fig. 12] Fig. 12 is a diagram showing relationship between concentrated ozone concentration characteristics with respect to a flow rate of a concentrated ozonized oxygen gas that can be output and using regions of concentrated ozone in the embodiments 1 and 2 of the invention. [Fig. 13-a] Fig. 13-a is a constitutional diagram of a single wafer type CVD apparatus utilizing concentrated ozonized oxygen of the ozone gas concentrating system apparatus of the embodiments 1 and 2 of the invention. [Fig. 13-b] Fig. 13-b is a constitutional diagram of a batch type CVD apparatus utilizing concentrated ozonized oxygen of the ozone gas concentrating system apparatus of the embodiments 1 and 2 of the invention. [Fig. 14] Fig. 14 is a diagram showing relationship between vapor pressures of gas species contained in an ozonized oxygen gas, and temperature regions of a conventional concentrated ozonized oxygen gas apparatus and temperature regions of a concentrated ozonized oxygen gas apparatus of the embodiments 1 and 2 of the invention. [Fig. 15] Fig. 15 is a diagram showing a nitrogen addition rate in an ozone generator and a NOx amount contained in ozonized oxygen retrieved from the ozone generator. [Fig. 16] Fig. 16 is a diagram showing vapor pressure characteristics of oxygen, nitrogen, Freon and a carbon dioxide gas. [Fig. 17] Fig. 17 is an illustration of a carbon dioxide gas concentration and decomposition system apparatus showing constitution of concentration and dilution of a carbon dioxide gas contained in air and a waste gas in an embodiment 3 of the invention. An embodiment 1 of the invention shows an example of an apparatus capable of selectively concentrating or diluting a specific gas (ozone gas) from a gas composition (oxygen gas and ozone gas) generated as an ozonized gas containing an ozone gas in a prescribed concentration in an oxygen gas with an ozone generator with an oxygen gas as a raw material gas. The embodiment 1 of the invention will be described with reference to Fig. 1, Fig. 2-a, Fig. 2-b, Fig. 2-c and Figs. 4 to 6. Fig. 1 is a system block diagram of an ozone gas concentrating device showing the entire ozone concentrating system of the embodiment 1, in which an ozone gas as the specific gas is selectively condensed, and condensed ozone is vaporized (to an ozone gas). Fig. 2-a is a schematic illustration showing the principle of ozone concentration in the embodiment 1. Fig. 2-b is a characteristic diagram where the gases having ozone concentrated and ozone diluted are retrieved in the embodiment 1. Fig. 2-b shows, as an example, a design concentrated ozone concentrating characteristics (a) and a design diluted ozone concentrating characteristics (b) with respect to the flow rate of the ozonized gas capable of being retrieved upon inputting an ozone gas having an ozone flow rate of 9.2 L/min and an ozone concentration of 350 g/Nm3 to an ozone concentrating chamber 1 of the invention. Fig. 2-c is a block diagram showing the gas pressure balance and the gas distribution mechanism for concentrating the fed ozone gas and retrieving the diluted gas upon feeding the ozone gas to the ozone concentrating system of the invention. Fig. 4 is an ozone vapor pressure characteristic diagram, in which (a) shows a temperature condition range where ozone of the fed ozonized oxygen gas is condensed, and (b) shows a temperature condition range where condensed ozone is vaporized. Fig. 5 is an illustration showing the structure and constitution of the particle material for condensation and vaporization that is filled in the chamber for condensing an ozone gas to flow condensed ozone to the lower part and to separate the diluted ozonized gas to the upper part. Fig. 6 shows the explosion limit characteristics of an ozone gas concentration with respect to the gas pressure, and the gas pressure-ozone concentration characteristics showing the conventional ozone concentrating characteristics and the ozone concentrating characteristics of the invention. The ozone concentrating system as an embodiment of the invention is effective particularly in the case where an oxide film with high quality is necessarily formed with a clean ozone gas having a high ozone gas concentration of from about 200, 000 ppm (428 g/Nm3) to 350,000 ppm (750 g/Nm3) and an ozone gas suppressed in byproducts, such as NOx. The ozone concentrating system as an embodiment of the invention will be described. In Figs. 1 and 2-a, an oxygen gas is fed to an ozone generating system 200 from a raw material gas cylinder 4 for generating an ozone gas mainly containing at least oxygen. In the ozone generating system 200, for example, ozonized oxygen of about 163,000 ppm (350 g/Nm3) is generated. The ozone concentrating system 100 is constituted by two ozone concentrating chambers 11 and 12, a metallic cooling plate 15 disposed at an upper part of the ozone concentrating chambers 11 and 12 to surround them, a freezing machine 14 disposed on the outer periphery of the metallic cooling plate 15 for cooling the ozone concentrating chambers 11 and 12 to a temperature where ozone is condensed, and a heat retention material 16 disposed further surrounding them for maintaining a temperature where condensed ozone is vaporized. Two temperature distributions, i.e., the temperature where ozone is condensed, and the temperature where ozone is vaporized, can be constituted in the upper part and the lower part of the ozone concentrating chambers 11 and 12, as described above. The ozone concentrating chambers 11 and 12 are filled with a large number of pieces of a particle member 13 for condensation and vaporization, and the ozonized oxygen gas generated in the ozone generator 21 is fed from substantially the center part of the ozone concentrating chambers 11 and 12, and gas retrieving ports 20 and 22 are provided on the upper end and the lower end for separating the fed ozonized oxygen gas into two directions, i.e., the direction to the upper part and the direction to the lower part. An automatic back pressure controller (APC) 1B controlling consistently the pressure in the ozone concentrating chambers 11 and 12 to a constant value is provided at the lower gas retrieving port 22, so as to retrieve ozonized oxygen (concentrated ozone gas). A mass flow rate controller (MFC) 1A capable of automatically controlling the flow rate upon retrieving the gas in the ozone concentrating chambers 11 and 12 is provided at the upper gas retrieving port 20, so as to retrieve ozonized oxygen (diluted ozone gas) at a constant flow rate. In the ozone concentrating chambers 11 and 12, since the surface of the particle member 13 for condensation and vaporization filled in the chambers is cooled to a temperature where an ozone gas is condensed, the ozonized oxygen gas having been separated upward is cooled to condense an ozone gas selectively on the surface of the particle member 13 for condensation and vaporization in the upper part with the gas temperature being decreased, whereby an oxygen-rich gas (diluted ozonized oxygen gas), which is not condensed on the surface of the particle member 13 for condensation and vaporization, can be retrieved from the upper part. Ozone having been condensed on the surface of the particle member 13 for condensation and vaporization in the upper part of the ozone concentrating chambers 11 and 12 grows to a liquid that exceeds the surface tension of the particle member for condensation and vaporization, and then flows downward by gravitation along the surface of the particle member 13 for condensation and vaporization. The liquefied ozone flowing downward is vaporized since the surface temperature of the particle member for condensation and vaporization in the lower part is increased to the vaporization temperature, and vaporized ozone is added to the ozonized oxygen gas separated to the lower part of the chambers, whereby an ozone-rich gas (concentrated ozonized oxygen gas) can be retrieved from the lower part. The detailed constitutions and means of the freezing machine 14 for cooling the surrounding of the ozone concentrating chambers 11 and 12 and the heat retention material 16 are schematically shown in the figure, and peripheral facilities are omitted from the figure. While the heat retention material 16 is shown in the figure symbolically as a thermal insulating material, the heat retention material 16 is constituted by adding a vacuum thermal insulation system. Numeral 17d denotes an emergency valve for discarding the entire ozonized oxygen gas in the ozone concentrating chambers without concentrating, and the gas flows in the piping path to the waste ozone apparatus (which is not shown in the figure) by bypassing the piping path of the mass flow rate controller 1A. Numeral 71 denotes a thermocouple for measuring the temperature of the metallic cooling plate 15. Numeral 73 denotes a pressure gage for monitoring the pressure in the ozone concentrating chambers 11 and 12. Numeral 74A denotes an ozone concentration detector for the ozone concentrated gas, and 74B denotes an ozone concentration detector for the ozonized gas fed from the ozone generator 21. Numeral 9 denotes a total controlling system of the ozone concentrating system, as shown in Fig.2C, setting the ozone raw material gas flow rate Q1, the ozone generator pressure P0, the diluted ozonized gas flow rate Q2 and the inner pressure P2 of the ozone concentrating chambers, monitoring the temperature of the cooling plate 15, the ozone concentration of the fed ozonized oxygen gas, the concentrated ozone concentration, and the inner pressure of the ozone concentrating chambers, controlling switching of the valves for inputting and outputting of the ozone concentrating chambers 11 and 12, displaying the concentrations and the flow rates of the respective parts, and sending signals to the outside. Numerals 7A and 7B denote vacuum evacuating devices for making negative pressure for the gas pressure of the ozone processing system 300 and the ozone concentrating system 100, and 35 and 36 denote pressure gages for matching the gas pressures of the concentrated gas retrieving port 22 and the diluted gas retrieving port 20 of the ozone concentrating system 100. The function and operation of the ozone concentrating system of the embodiment 1 of the invention will be described. Under the state where the valve 17a provided in the vicinity of the gas feeding port 10 at the center part of the ozone concentrating chambers 11 and 12 is closed, the ozone concentrating chambers 11 and 12, the ozone processing chamber 3 and the gas piping system are evacuated to vacuum with the vacuum evacuating devices 7A and 7B to remove the gas remaining inside and to remove impurities. For the operation, the valves 17b, 17c and 17d of the ozone concentrating system 100, the valve of the ozone processing system 300, and the flow rate controlling valves 31, 32, 33 and 34 are fully opened. The mass flow rate controller (MFC) 1A and the automatic pressure controller (APC) 1B are also opened. The freezing machine 14 provided on the outer periphery of the ozone concentrating chambers 11 and 12 is operated to freeze the chambers to the prescribed temperature ranges, respectively. The metallic cooling plate 15 provided on the outer periphery of the ozone concentrating chambers 11 and 12 has a structure having good thermal conductivity and exerting freezing capability sufficiently since it is cooled around an extremely low temperature. In order to maintain the upper part of the ozone concentrating chambers 11 and 12 to a temperature where ozone can be selectively condensed (for example, from -134 to -160°C), the thermal insulating material 16 has a large thickness. In order to maintain the lower part of the ozone concentrating chambers 11 and 12 to a temperature (for example, from -134 to -112°C) higher than the cooling temperature of the upper part, the thermal insulating material 16 has a small thickness. After sufficiently evacuated to vacuum, and confirming that the ozone concentrating chambers 11 and 12 are cooled to the prescribed cooling temperature ranges, with the pressure gage 73 and the thermocouple 71, the flow rate controlling valves 32 and 33 of the ozone processing system 300 are closed to maintain vacuum the interior of the ozone processing chamber 3. In the state where the flow rate controlling valve 17d on the diluted gas retrieving port 20 of the ozone concentrating system 100 is fully closed, the valve 17a, which is the ozonized gas feeding port 10, of the ozone concentrating system 100 is opened to feed 10 L/min of an oxygen gas to the ozone concentrating chambers 11 and 12 of the ozone concentrating system from the oxygen cylinder 4 through the ozone generating system 200, and to discharge to the waste ozone processing apparatus 5 and the processed gas decomposing chamber 8. In the ozone generating system 200, the oxygen gas flow rate is controlled to an oxygen gas flow rate of 10 L/min with the mass flow rate controller 2A, and the gas pressure in the ozone generator 21 is controlled to a constant value of 0.25 MPa with the automatic pressure controller 2B. In the ozone concentrating system 100, the gas flow rate at the diluted gas retrieving port 20 is set to 3.6 L/min with the mass flow rate controller 1A, and the gas pressure in the ozone concentrating chambers 11 and 12 is set to a negative pressure of -0.5 MPa (about 380 Torr) with the automatic pressure controller 1B at the concentrated gas retrieving port 22, whereby an oxygen gas of 6.4 L/min flows at the diluted gas retrieving port 20 and is discharged to the processed gas decomposing chamber 8 through the bypass piping path of the ozone processing system 300. After setting to the state where an oxygen gas can be continuously fed, an alternating electric current is applied to the ozone generator 21 of the ozone generating system 200 to effect silent electric discharge, whereby an ozonized oxygen gas having a flow rate of about 9. 185 L/min and an ozone concentration of 350 g/Nm3 is generated with the ozone generator 21 and fed to the ozone concentrating chambers 11 and 12. According to the operation, the ozonized oxygen gas is separated and continuously fed to the diluting side at 3.6 L/min and to the concentrating side at 5.6 L/min. The surface temperature of the particle material 13 for condensation and vaporization has become a low temperature sufficient for selectively condensing ozone. Accordingly, only ozone contained in 350 g/Nm3 of the ozonized oxygen gas fed to the diluting side (upper part of the concentrating chambers 11 and 12) is condensed on the surface of the particle material 13 for condensation and vaporization filled in the ozone concentrating chambers 11 and 12, whereby a diluted ozonized oxygen gas 19 is formed in the upper part of the concentrating chambers 11 and 12. Ozone thus condensed on the surface of the particle material 13 for condensation and vaporization grows to liquid ozone on the surface of the particle material 13 since the ozonized oxygen gas is continuously fed. The grown liquid ozone flows downward to the lower part by gravitation along the surface of the particle material 13 for condensation and vaporization since the surface thereof is a smooth surface without unevenness. The liquid ozone thus flowing downward to the lower part is made in contact with the particle material 13 for condensation and vaporization filled in the lower part of the ozone concentrating chambers 11 and 12. Since the surface temperature of the particle material 13 for condensation and vaporization in the lower part of the ozone concentrating chambers 11 and 12 is set at a high temperature sufficient for vaporizing liquid ozone, liquid ozone is vaporized from the surface of the particle material 13, and the vaporized ozone gas is added to the ozonized oxygen gas flowing in the lower part of the ozone concentrating chambers 11 and 12, whereby a concentrated ozonized oxygen gas 18 is formed. Condensation of a gas depends on a temperature of the gas and a temperature of a substance, to which the gas adsorbed, and in physical sense, when the gas temperature becomes equal to or lower than the saturated vapor pressure temperature, a gas exceeding the saturated vapor amount is condensed. Condensation of a gas also depends on the adsorbed amount of the substance, to which the gas is adsorbed, and in the case where the substance, to which the gas is adsorbed, is miniaturized to increase the surface area of the substance, such an effect is obtained that the gas can be condensed at a higher temperature than the saturated vapor pressure temperature of the gas. For example, an ozone gas is condensed at about from -112 to -134°C of the saturated vapor pressure characteristics, but in the case where the substance is miniaturized, it can be condensed at a high temperature range of from 0 to -100°C. Accordingly, in the case where the particle material 13 for condensation and vaporization of the embodiment 1 of the invention is miniaturized, it can be condensed at a high temperature range (0 to -100°C) to make higher the cooling temperature of the freezing machine, whereby an ozone gas can be condensed with a general purpose freezing machine, the freezing machine can be reduced in size, the thermal insulating material and the like of the chambers can be thinned, and thus the entire apparatus can be inexpensive. The concentrated ozonized oxygen gas 18 and the diluted ozonized oxygen gas 19, which are concentrated and diluted at the upper and lower parts of the ozone concentrating chambers 11 and 12, thus separated are retrieved from the retrieving ports therefor to the outside through the ozone concentration meter 74A, the automatic pressure controller 1B, and the mass flow rate controller 1A. After confirming that the concentrated ozonized oxygen gas 18 has been stably concentrated to a prescribed ozone concentration with the ozone concentration meter 74A, the controlling valves 32 and 34 of the bypass piping path of the ozone processing system 300 are fully closed, and the controlling valves 31 and 33 for feeding to the ozone processing chamber 3 are opened, whereby the concentrated ozone gas is diffused in the entire ozone processing chamber 3 through adiabatic expansion. The pressure in the ozone processing chamber 3 is managed and adjusted with the pressure gage 35 and the valve 33, and the ozone process is effected after making the temperature of the material to be processed (such as a wafer) in the ozone processing chamber 3 to a processing temperature, whereby an oxide thin film with high quality can be obtained on the surface of the material to be processed (such as a wafer). Devices of the ozone concentrating system, apparatuses, valve operations and detailed signal lines of sensors are not apparently shown herein, but the aforementioned operations can be totally controlled and monitored with the controlling system 9. Fig. 2-b shows the ozone concentrating characteristics of the concentrated oxygen gas and the diluted oxygen gas retrieved from the ozone gas concentrating system of the embodiment 1 of the invention with respect to the flow rates thereof, respectively. In the figure, the characteristic curve 2001 shows the ozone concentration fed from the ozone generating system 200 to the ozone concentrating system 100. The characteristic curve 2003 shows the concentrated ozone concentrating characteristic to the ozonized oxygen gas flow rate retrieved from the lower part of the ozone concentrating chambers, the characteristic curve 2004 shows the diluted ozone concentrating characteristic to the ozonized oxygen gas flow rate retrieved from the upper part of the ozone concentrating chambers. As the design values of the embodiment, the fed raw material flow rate is 10 L/min, a gas of an ozone concentration of 350 g/Nm3 and a flow rate of about 9.2 L/min as the ozonized gas generated from the ozone generating system 200 is input to the ozone concentration system 100, a diluted ozonized oxygen gas diluted to 70 g/Nm3 at a flow rate of 3.6 L/min is retrieved from the upper part of the ozone concentrating system 100, and a concentrated ozonized oxygen gas concentrated to 500 g/Nm3 at a flow rate of 5.6 L/min is retrieved from the lower part of the ozone concentrating system. Fig. 2-c is a block diagram showing the gas pressure balance and the gas distribution mechanism of the aforementioned ozone concentrating system of the invention. In the figure, numeral 2A denotes a mass flow rate controller MFC1 controlling the flow rate of the raw material gas fed to the ozone generator 21, 2B denotes an automatic back pressure controller APC1 controlling the pressure in the ozone generator 21 to a constant pressure (for example, 0.25 MPa) to control output of the ozonized oxygen gas, 1A denotes a mass flow rate controller MFC2 capable of controlling the flow rate Q2 of the diluted gas retrieved from the ozone concentrating system 100, and 1B denotes an automatic back pressure controller APC2 controlling the gas pressure in the ozone concentrating system 100 to a prescribed pressure consistently. For example, upon setting the prescribed pressure P2 to -0.05 MPa (about 380 Torr) with APC2 (1B), when the gas pressure in the ozone concentrating chambers is set to a constant value of -0.05 MPa (about 380 Torr), and the flow rate of the diluted ozonized oxygen gas is se to 3.6 L/min with the mass flow rate controller (MFC2), the ozone concentration of the diluted ozonized oxygen gas is diluted from 350 g/Nm3 to 70 g/Nm3, and the diluted ozonized oxygen gas is ozone-processed with the waste ozone processing apparatus 5 and discharged to the outside. The flow rate of the concentrated ozonized oxygen gas output from the lower part of the ozone concentrating system 100 and APC2 (1B) is 5.6L/min, and an ozonized oxygen gas concentrated from 350 g/Nm3 to 500 g/Nm3 can be continuously retrieved. As shown in Fig. 2-b(b), when the flow rate of the diluted ozonized gas retrieved from MFC2 (1A) is increased, the amount of ozone condensed from the ozone gas in the ozone concentrating system is increased, APC2 (1B) automatically controls to maintain the constant pressure in the ozone concentrating system, the flow rate of the concentrated ozonized oxygen gas output from the lower part of the ozone concentrating chambers is decreased, and the ozone amount thus condensed is vaporized at the lower part of the ozone concentrating chambers to form an ozone gas, whereby the operation functions to retrieve an ozonized gas having been concentrated to a high concentration from the lower part. The ozonized oxygen gas having an ozone concentration of 350 g/Nm3 obtained from the ozone generating system 200 is cooled to condense ozone on the surface of the particle material 13 for condensation and vaporization filled in the ozone concentrating chambers 11 and 12, such a low temperature is necessary that is equal to or lower than the temperature of the saturated vapor pressure of an ozone concentration of 350 g/Nm3 (163, 333 ppm). For the temperature where ozone is condensed, when a low temperature of from -134 to -160°C is provided, an ozonized oxygen gas having an ozone concentration of 350 g/Nm3 can be sufficiently condensed, as shown by the arrow in Fig. 4(a). In the case where the particle material 13 for condensation and vaporization is miniaturized, it can be condensed at a high temperature range (from 0 to -100°C), and thus the cooling temperature of the freezing machine can be increased. In order to vaporize the condensed ozone gas under the ozonized oxygen gas having an ozone concentration of 350 g/Nm3 flowing, a temperature of from -112 to -134°C higher than the condensing temperature is provided, as shown by the arrow in Fig. 4(b). Since upon rapidly increasing the temperature of condensed ozone, liquefied ozone is vaporized almost instantaneously to form heat due to rapid increase in pressure in the ozone concentrating chambers and decomposition ozone associated therewith, it is desirable that the temperature is gradually increased to vaporize ozone. As having been described, a part having a temperature range (for example, from -134 to -160°C) where ozone can be selectively condensed from an ozonized oxygen gas and a part having a temperature range (for example, from -134 to -112°C) where condensed ozone can be vaporized are formed in one ozone concentrating chambers, and condensed ozone is moved by utilizing flow of liquid and gravitation to the part where condensed ozone can be vaporized, and then vaporized, whereby an ozonized oxygen gas having an ozone concentration of 350 g/m3 can be further increased in ozone concentration. Furthermore, in the case where the particle material 13 for condensation and vaporization is miniaturized, it can be condensed at a high temperature range (from 0 to -100°C), whereby the cooling temperature of the freezing machine can be increased. The particle material 13 for condensation and vaporization filled in the ozone concentrating chambers 11 and 12 has a special shape of a special shape with multifaceted planes on side surfaces, as shown in Fig. 5. Upon filling the particle material 13 for condensation and vaporization is filled in the ozone concentrating chambers 11 and 12, each pieces of the particle material 13 for condensation and vaporization are in contact with each other through planes in the radial direction of the chambers to form a structure having large thermal conduction. In the axial direction, each pieces of the particle material 13 for condensation and vaporization are contact with each other through points or are disposed with gaps, whereby thermal conduction in the axial direction is considerably small. In the case where the particle material 13 for condensation and vaporization is filled in the ozone concentrating chambers 11 and 12 in this manner, the ozone concentrating chambers 11 and 12 can be cooled with a considerably flat temperature distribution in the radial direction of the chambers by cooling the ozone concentrating chambers 11 and 12 from the periphery thereof with the freezing machine 14. Accordingly, the ozonized oxygen gas passing through the particle material 13 for condensation and vaporization is uniformly cooled, whereby an ozone gas can be selectively condensed on the surface of the particle material for condensation and vaporization with high efficiency. Since the particle material for condensation and vaporization has a spherical shape, condensed ozone flows downward by gravitation along the spherical surface. The liquid ozone flows downward, and since the particle material 13 for condensation and vaporization filled in the lower part is set at a high temperature, the liquid ozone along the surface of the particle material 13 for condensation and vaporization is vaporized to realize a high concentration of the ozonized oxygen gas (ozone concentration), thereby retrieving the concentrated ozonized oxygen gas from the lower part. Not only the particle material 13 for condensation and vaporization has large thermal conduction in the radial direction owing to the special shape, but also, while not shown in the figure, the particle material 13 for condensation and vaporization is formed with glass, ceramics or a resin material, which is a substance having a small thermal conductivity, and has a metal of thickness 1 mm or less having a high thermal conductivity vapor-deposited on the surface thereof. According to the constitution, only the metallic part vapor-deposited on the surface of the particle material for condensation and vaporization having a small thermal capacity can be cooled preferentially, and thus condensation and vaporization of a gas can be effected with high efficiency. In the concentrating apparatus of an ozonized oxygen gas of the invention, the material of the metal to be vapor-deposited is preferably a metal having ozone resistance, and gold, platinum or the like are preferably vapor-deposited. As a method for decreasing the thermal capacity of the particle material 13 for condensation and vaporization having the special shape, it is functionally effective to make hollow the center part of the particle material for condensation and vaporization. The explosion limit of the ozonized oxygen gas with respect to the gas pressure is disclosed in Patent Document 1 and Non-patent Document 1. It has been said about the explosion limit from these literatures that a 100% ozone gas does not explode under a gas pressure of 0.5 MPa (386 Torr) or less in terms of absolute pressure. In the case where the gas pressure becomes 0.5 MPa (386 Torr) or more in terms of absolute pressure, it has been ordinarily said that the explosion limit of an ozone gas is an ozone concentration exceeding 1,104 g/Nm3 in terms of an atmosphere converted concentration. The explosion limit characteristics with respect to the gas pressure are shown by the characteristic curve 2000 in Fig. 6. While the explosion limit varies depending on a NOx gas, SOx and a carbonized substance gas contained in the ozonized oxygen gas, a metallic impurity amount and a gas temperature thereof, it is preferred to use in the ozone concentration range within the limit characteristic range. In Fig. 6, the characteristic curves 1000 and 1001 show the ozone concentrating characteristics by an ozone concentrating method with a conventional liquid ozone apparatus or adsorption apparatus. The characteristic curve 2003 shows ozone concentrating characteristics by the condensation-vaporization method of the invention. In the ozone concentrating method by a conventional liquid apparatus or adsorption apparatus, the entire amount of an ozone gas to be retrieved is once liquefied or adsorbed in an adsorbing or liquefying step shown by the encircled number 1 in Fig. 6, then the interior of the apparatus is evacuated to vacuum in the vacuum step shown by the encircled number 2, then the apparatus in vacuum is heated for gasifying to form an around 100% ozone gas as in the encircled number 3, and ozone is diluted with a carrier gas as in the encircled number 4, whereby a prescribed concentrated ozonized gas is retrieved. Accordingly, it is necessary to process unnecessary ozone with a waste ozone apparatus in the steps 1 to 3, and thus the ozone concentrating efficiency is as considerably poor as about 40% at most. It is necessary in the step 2 to form high concentration ozone of nearly 100%, and thus such a problem arises that a large protection device is necessary, and the temperature and pressure are necessarily managed sufficiently, for consistently preventing explosion from occurring in the step of forming the high concentration ozone through desorption from the liquefied or adsorbed ozone. In the ozone concentrating method by the condensation-vaporization of the invention, on the other hand, based on the ozone concentration generated from the ozone generator 21, an ozone gas is condensed in the ozone concentrating chambers 11 and 12, and substantially simultaneously, condensed ozone is vaporized to obtain a high concentration, whereby a gas that has not been concentrated in the ozone gas generated by the ozone generator is only an ozone gas that has not been condensed in the ozone concentrating chambers 11 and 12, and thus ozone can be concentrated with considerably high efficiency. Furthermore, in the apparatus, since the highly concentrating step is effected based on the ozone concentration generated by the ozone generator 21, there is such an advantage that the risk of explosion can be significantly reduced. That is, condensed ozone is a slight amount of liquid on the surface of the particle material for condensation and vaporization, and upon vaporizing it, it is gradually vaporized at the temperature of the surface of the particle material for condensation and vaporization, and the spatial volume of the particle material for condensation and vaporization is small, whereby there is no risk of accelerating vaporization. While the ozone concentrating chambers 11 and 12 are each constituted by a single chamber, they each may be constituted by a flange structure containing an upper part and a lower part that are separated to each other and formed of stainless steel. In this case, it is possible that the temperature of the condensation accelerating zone in the upper part and the temperature of the vaporization accelerating zone in the lower part are sufficiently managed, and a thermal insulating flange constituted by ceramics, glass or the like is inserted between the two stainless steel flanges. Furthermore, two freezing machines are separately provided to control the temperatures independently. The embodiment 2 of the invention shows an example of an apparatus capable of selectively concentrating or diluting a specific gas (ozone gas) from a gas composition (oxygen gas and ozone gas) generated as an ozonized gas containing an ozone gas in a prescribed concentration in an oxygen gas with an ozone generator 200 with an oxygen gas as a raw material gas. The embodiment 2 of the invention will be described with reference to Figs. 7, 8, 9, 10 and 11. Fig. 7 is a system block diagram of an ozone gas concentrating device showing the entire ozone concentrating system, in which an oxygen gas as other gases than an ozone gas is selectively transmitted through a sheet in a thin membrane form to increase the ozone concentration in the ozonized gas, whereby the ozonized gas is concentrated. Fig. 8 is a schematic illustration showing the principle of ozone concentration in the embodiment 2. Fig. 9 is a schematic illustration of an ozone concentrating system, as an example, showing a gas piping and an arrangement of devices in the case where an ozonized gas having an ozone flow rate of 9.2 L/min and an ozone concentration of 350 g/Nm3 (160, 000 ppm) is input to the ozone concentrating chamber 100 of the invention. Figs. 10 and 11 are characteristic diagrams, in which for describing the concentrating mechanism of the invention, the difference in adsorption amount and transmission amount of ozone and oxygen contained in the ozonized gas obtained experimentally is shown in terms of magnification, and the cooling temperature dependency of the magnification is shown. Fig. 9 is a block diagram showing the gas pressure balance and the gas distribution mechanism for concentrating the fed ozone gas and retrieving the diluted gas upon feeding the ozone gas to the ozone concentrating system of the invention. In this example, an ozonized gas having a pressure of 0.25 MPa (P0) is fed to the ozone concentrating chamber from the ozone generator, the pressure on the concentrating side of the ozone concentrating chamber is set, for example, to 0.2 MPa (P2), and the pressure on the diluting side is set, for example, to around 0.02 MPa (P1), which is near the atmospheric pressure, whereby the concentrated ozonized gas and the diluted gas are retrieved to the outside. The diluted gas around the atmospheric pressure thus retrieved is increased in pressure, for example, to about from 0.3 to 0.5 MPa with an oxygen compressor 79. Such a constitution is employed that an oxygen gas transmitted in the ozone concentrating system is returned to the raw material gas in the step preceding the ozone generator with the oxygen compressor. The ozone concentrating system of the embodiment 2 of the invention is a system in which only an oxygen gas is selectively transmitted through a thin membrane, and thus it is particularly effective for concentrating an ozonized gas that has less factors of accelerating deterioration of the membrane. That is, it is particularly effective to the case where a nitrogen-free ozone generator having no nitrogen added is used as the ozone generator, and the ozonized gas output from the ozone generator contains byproducts, such as NOx, in an amount as small as possible. The ozone concentrating system of the embodiment 2 of the invention is particularly effective for the case where it is necessary to form an oxide film having high quality with a clean ozone gas with a high concentration of about from 200,000 ppm (428 g/Nm3) to 350, 000 ppm (750 g/Nm3) and an ozone gas suppressed in byproducts, such as NOx. The constitution of the ozone concentrating system will be described. In Figs. 7 and 8, an oxygen gas is fed to an ozone generating system 200 from a raw material gas cylinder 4 for generating an ozone gas mainly containing at least oxygen. In the ozone generating system 200, for example, ozonized oxygen of about 163, 000 ppm (350 g/Nm3) is generated. The ozone concentrating system 100 is constituted by an ozone concentrating chamber 11, a metallic cooling plate 15 disposed at an upper part of the ozone concentrating chamber 11 to surround it, a freezing machine 14 capable of cooling by feeding a cooling medium from a freezing apparatus provided outside, and a heat retention material 16 disposed further surrounding them for maintaining a temperature where condensed ozone is vaporized. In the ozone concentrating chamber 11, the gas space is divided into upper and lower with an oxygen transmission membrane (130) in a thin membrane form. The ozonized gas generated by the ozone generator 200 is fed to the lower side of the divided two gas spaces, and the gas pressure of the lower space is set to 0.2 MPa (P2) with an automatic pressure controller APC (1B). The other gases space is controlled to have a pressure lower than the gas pressure of the lower space with an automatic pressure controller APC (3B). In this embodiment, it is set to 0.02 MPa (P1), which is near the atmospheric pressure. The oxygen transmission membrane (130) in a thin membrane form in the ozone concentrating chamber 11 is a sheet constituted by extremely fine pores, and it is contrived that the sheet is folded in several tens times to constitute one module to increase the contact area with the ozonized gas. The oxygen transmission membrane (130) is so constituted to have a vertical space constitution that in the case where the ozone gas is adsorbed to each other or ozone is adsorbed to the wall, whereby the ozonized gas becomes ozone clusters (vapor) having a large weight, it falls down to the lower side by gravitation, and an oxygen gas and an ozone gas in a monomolecular form having a small weight raised up to the upper side. The ozonized gas fed to the ozone concentrating chamber 11 is concentrated in the chamber to a concentrated ozonized gas, which can be retrieved from the lower part through the automatic pressure controller APC (1B) and fed to the ozone processing system 300. The diluted gas thus diluted can be retrieved from the upper part through the automatic pressure controller APC (3B), and the gas is processed with the waste ozone apparatus 5 and discharged to the atmosphere or reused. The interior of the ozone concentrating chamber 11 is divided into two spaces with the oxygen transmission membrane (130) disposed in the chamber. In one space of the two divided spaces, an ozonized gas at a prescribed pressure P2 is placed, and the other space is evacuated to a pressure P1 around the atmospheric pressure. According to the procedure, a density gradient of the gas is provided to the oxygen transmission membrane (130) dividing the chamber. Furthermore, since the oxygen transmission membrane (130) is entirely cooled, ozone gas molecules in the ozonized gas are accelerated in adsorption to the oxygen transmission membrane (130) and among the ozone gas molecules as compared to an oxygen gas, whereby ozone is condensed (selective condensation) on the surface of the membrane, and the ozone gas itself becomes an ozone vapor containing molecules attached to each other (ozone clusters). In the case where the gas is in the state, condensed ozone on the membrane and the ozone clusters fall downward by gravitation, and the thermal velocity of the ozone molecules is entirely decreased. On the surface of the oxygen transmission membrane (130) with the ozonized gas in the state, an oxygen gas is more liable to be transmitted through the membrane, and an oxygen gas is selectively transmitted to discharge a gas rich in oxygen (diluted ozonized oxygen gas) from the upper part. An ozone gas that is not transmitted through the oxygen transmission membrane (130) remains in the lower space of the ozone concentrating chamber 11, and as a result, a gas rich in ozone (concentrated ozonized oxygen gas) can be retrieved from the lower part. The detailed constitutions and means of the freezing machine 14 for cooling the surrounding of the ozone concentrating chamber 11 and the heat retention material 16 are schematically shown in the figure, and peripheral facilities are omitted from the figure. While the heat retention material 16 is shown in the figure symbolically as a thermal insulating material, the heat retention material 16 is constituted by adding a vacuum thermal insulation system. Numeral 17d denotes an emergency valve for discarding the entire ozonized oxygen gas in the ozone concentrating chamber without concentrating, and the gas flows in the piping path to the waste ozone apparatus (which is not shown in the figure) by bypassing the piping path of the automatic pressure controller 3B. Numeral 71 denotes a thermocouple for measuring the temperature of the metallic cooling plate 15. Numeral 73 denotes a pressure gage for monitoring the pressure in the ozone concentrating chamber 11. Numeral 74A denotes an ozone concentration detector for the ozone concentrated gas, and 74B denotes an ozone concentration detector for the ozonized gas fed from the ozone generator 21. Numeral 9 denotes a total controlling system of the ozone concentrating system setting the ozone raw material gas flow rate Q1, the ozone generator pressure P0, the diluted ozonized gas flow rate Q2, the diluted gas discharge pressure P1 and the inner pressure P2 of the ozone concentrating chamber, monitoring the temperature of the cooling plate 15, the ozone concentration of the fed ozonized oxygen gas, the concentrated ozone concentration, and the inner pressure of the ozone concentrating chamber, controlling switching of the valves for inputting and outputting of the ozone concentrating chamber 11, displaying the concentrations and the flow rates of the respective parts, and sending signals to the outside. Numerals 7A denotes a vacuum evacuating device for making negative pressure for the ozone processing system 300 and the ozone concentrating system 100, and 35 and 36 denote pressure gages for matching the gas pressures of the concentrated gas retrieving port 22 and the diluted gas retrieving port 20 of the ozone concentrating system 100. The function and operation of the ozone concentrating system of the embodiment 2 of the invention will be described. Under the state where the valve 17a provided in the vicinity of the gas feeding port 10 at the center part of the ozone concentrating chamber 11 is closed, the ozone concentrating chamber 11, the ozone processing chamber 3 and the gas piping system are evacuated to vacuum with the vacuum evacuating device 7A to remove the gas remaining inside and to remove impurities. For the operation, the valves 17b, 17c and 17d of the ozone concentrating system 100, the valve of the ozone processing system 300, and the flow rate controlling valves 31, 32, 33 and 34 are fully opened. The automatic pressure controller (APC) 1B is also opened. The freezing machine provided on the outer periphery of the ozone concentrating chamber 11 is operated to freeze the chamber to the prescribed temperature ranges. The metallic cooling plate 15 provided on the outer periphery of the ozone concentrating chamber 11 has a structure having good thermal conductivity and exerting freezing capability sufficiently for cooling. In order to maintain the upper part of the ozone concentrating chamber 11 to a temperature where adsorption of ozone and transmission of oxygen gas can be accelerated (for example, from -65°C), the thermal insulating material 16 has a large thickness. In order to maintain the lower part of the ozone concentrating chamber 11 to a temperature (for example, 0°C) higher than the cooling temperature of the upper part, the thermal insulating material 16 has a small thickness. After sufficiently evacuated to vacuum, and confirming that the ozone concentrating chamber 11 is cooled to the prescribed cooling temperature ranges, with the pressure gage 73 and the thermocouple 71, the flow rate controlling valves 32 and 33 of the ozone processing system 300 are closed to maintain vacuum the interior of the ozone processing chamber 3. In the state where the flow rate controlling valve 17d on the diluted gas retrieving port 20 of the ozone concentrating system 100 is fully closed, the valve 17a, which is the ozonized gas feeding port 10, of the ozone concentrating system 100 is opened to feed 10 L/min of an oxygen gas to the ozone concentrating chamber 11 of the ozone concentrating system from the oxygen cylinder 4 through the ozone generating system 200, and to discharge to the waste ozone processing apparatus 5 and the processed gas decomposing chamber 8. In the ozone concentrating system 100, the gas pressure at the diluted gas retrieving port is set to P1 around the atmospheric pressure with the automatic gas pressure controller 3B, and the gas pressure in the ozone concentrating chamber 11 is set to 0.2 MPa with the automatic pressure controller 1B at the concentrated gas retrieving port, whereby an oxygen gas flows at the concentrated gas retrieving port 20 and is discharged to the processed gas decomposing chamber 8 through the bypass piping path of the ozone processing system 300. After setting to the state where an oxygen gas can be continuously fed, an alternating electric current is applied to the ozone generator 21 of the ozone generating system 200 to effect silent electric discharge, whereby an ozonized oxygen gas having a flow rate of about 9.185 L/min and an ozone concentration of 350 g/Nm3 is generated with the ozone generator 21 and fed to the ozone concentrating chamber 11. According to the operation, the ozonized oxygen gas is separated to the concentrated ozonized gas, which is continuously fed, when the pressure of the ozone concentrating chamber 11 is controlled to 0.2 MPa, and the discharge pressure of the upper dilution side is controlled to 0.02 MPa. A part of an oxygen gas of the ozonized gas of 350 g/Nm3 fed from the ozone generator 21 is transmitted through the oxygen transmission membrane (130) and discharged to the dilution side (i.e., the upper part of the concentrating chamber 11). Fig. 8 is a schematic diagram showing the ozone concentration mechanism of the embodiment 2 of the invention. As shown in the figure, an oxygen gas is consistently transmitted through the oxygen transmission membrane (130) by the pressure difference (P2-P1) provided on the surface thereof. Since the oxygen transmission membrane (130) is entirely cooled, ozone gas molecules in the ozonized gas are accelerated in adsorption to the oxygen transmission membrane (130) and among the ozone gas molecules as compared to an oxygen gas, whereby ozone is condensed (selective condensation) on the surface of the membrane, and the ozone gas itself becomes an ozone vapor containing molecules attached to each other (ozone clusters). In the case where the gas is in the state, condensed ozone on the membrane and the ozone clusters fall downward by gravitation, and the thermal velocity of the ozone molecules is entirely decreased. An ozone gas that is not transmitted through the oxygen transmission membrane (130) remains in the lower space of the ozone concentrating chamber 11, and as a result, a gas rich in ozone (concentrated ozonized oxygen gas) can be retrieved from the lower part. Condensation of a gas depends on a temperature of the gas and a temperature of a substance, to which the gas adsorbed, and in physical sense, when the gas temperature becomes equal to or lower than the saturated vapor pressure temperature, a gas exceeding the saturated vapor amount is condensed. Condensation of a gas also depends on the adsorbed amount of the substance, to which the gas is adsorbed, and in the case where the substance, to which the gas is adsorbed, is miniaturized to increase the surface area of the substance, such an effect is obtained that the gas can be condensed at a higher temperature than the saturated vapor pressure temperature of the gas. For example, an ozone gas is condensed at about from -112 to -134°C of the saturated vapor pressure characteristics, but in the case where the surface area of the substance is increased, it can be condensed at a high temperature range of from 0 to -100°C. Accordingly, in the case where the oxygen transmission membrane (130) of the embodiment 2 of the invention is enlarged, it can be condensed at a high temperature range (0 to -100°C) to facilitate selective transmission of oxygen through the oxygen transmission membrane (130), and to make higher the cooling temperature of the freezing machine, whereby an ozone gas can be condensed with a general purpose freezing machine, the freezing machine can be reduced in size, the thermal insulating material and the like of the chambers can be thinned, and thus the entire apparatus can be inexpensive. In Fig. 7, the concentrated ozonized oxygen gas 18 and the diluted ozonized oxygen gas 19, which are concentrated and diluted at the upper and lower parts of the ozone concentrating chamber 11, thus separated are retrieved from the retrieving ports therefor to the outside through the ozone concentration meter 74A, the automatic pressure controller 1B and the automatic pressure controller 3B. After confirming that the concentrated ozonized oxygen gas 18 has been stably concentrated to a prescribed ozone concentration with the ozone concentration meter 74A, the controlling valves 32 and 34 of the bypass piping path of the ozone processing system 300 are fully closed, and the controlling valves 31 and 33 for feeding to the ozone processing chamber 3 are opened, whereby the concentrated ozone gas is diffused in the entire ozone processing chamber 3 through adiabatic expansion. Fig. 9 is a block diagram showing the gas pressure balance and the gas distribution mechanism of the aforementioned ozone concentrating system of the embodiment 2 of the invention. In the figure, numeral 2A denotes a mass flow rate controller MFC1 controlling the flow rate of the raw material gas fed to the ozone generator 21, 2B denotes an automatic back pressure controller APC1 controlling the pressure in the ozone generator 21 to a constant pressure (for example, 0.25 MPa) to control output of the ozonized oxygen gas, 1A denotes an automatic back pressure controller APC3 capable of controlling the pressure P1 of the diluted gas discharged from the ozone concentrating system 100, and 1B denotes an automatic back pressure controller APC2 controlling the gas pressure in the ozone concentrating system 100 to a prescribed pressure consistently. Numeral 79 denotes an oxygen compressor for increasing the pressure of the diluted gas discharged from the ozone concentrating system 100. For example, the prescribed pressure P2 is set to 0.2 MPa with APC2 (1B), whereby the open/close degree of a needle valve in APC2 (1B) is automatically controlled to control the ozonized gas pressure on the concentrating space in the ozone concentrating chamber to 0.2 MPa (P2) consistently. In the state with the constant pressure, APC3 (3B) on the diluted gas retrieving side is set to 0.05 MPa, which is around the atmospheric pressure, whereby the open/close degree of a needle valve in APC3 (3B) is automatically controlled to control the pressure on the dilution space in the upper part of the ozone concentrating chamber to a constant value of 0.05 MPa (P1). In the case where a pressure difference of 0.15 MPa (= P2-P1) is provided with the APCs to the spaces in the ozone concentrating chamber with the oxygen transmission membrane (130) intervening between them, an oxygen gas in the ozonized oxygen gas on the concentrating space side flows to the diluting space side by being selectively transmitted through the oxygen transmission membrane (130), whereby the diluted ozonized gas (oxygen gas) can be retrieved through APC3 (3B) with the pressure balance of 0.05 MPa (P1) maintained. The oxygen gas can be efficiently utilized in such a manner that the gas obtained by compressing the diluted ozonized thus retrieved with the oxygen compressor 79 is added to the piping on the side of the cylinder for feeding the raw material gas of the ozone generator. The ozone concentration of the ozonized gas on the concentrating space side is increased by selectively transmitting an oxygen gas through the oxygen transmission membrane (130), whereby the concentrated ozonized gas can be continuously retrieved through APC2 (1B). In order to increase the concentrating degree of the ozonized gas on the concentrating space side of the ozone concentrating chamber, it is necessary to increase the transmission amount of an oxygen gas through the oxygen transmission membrane (130), and it is effective therefor that the pressure difference (P2-P1) between the diluting space and the concentrating space is increased, the surface area of the oxygen transmission membrane (130) is increased, and the ozonized gas is cooled by cooling the ozone concentrating chamber, whereby the selective transmission amount of the oxygen gas through the oxygen transmission membrane (130) is increased. By setting the pressure of the ozonized gas fed from the ozone generator to from 0.1 to 0.5 MPa, the pressure P2 on the concentrating side of the ozone concentrating chamber can be from 0.1 to 0.5 MPa, and the pressure difference (P2-P1) between the diluting space and the concentrating space can be sufficiently ensured with the pressure P1 on the diluting side higher than the atmospheric pressure, whereby such a function can be obtained that an oxygen gas can be selectively transmitted by the oxygen transmission membrane (130). In the case where the pressure of the ozonized gas fed from the oxygen generator is 0.5 MPa or more, however, the ozone concentration generated in the ozone generator is considerably low, and it is not effective since the concentrated ozone concentration that can be retrieved becomes low. In the case where one of the pressures P1 and P2 of APC2 (1B) and APC3 (3B) is controlled, the pressure difference (P2-P1) between the diluting space and the concentrating space varies to provide such an effect that the ozone concentration of the concentrated ozonized gas thus retrieved can be controlled. In the apparatus, such an effect is obtained that the ozone concentration and flow rate of the concentrated ozonized gas that can be retrieved can be controlled depending on the flow rate and concentration of the ozonized gas fed from the ozone generator. Upon cooling an ozonized gas, an ozone gas increases the adsorbed amounts to the adsorption substance and among molecules of the ozone gas, as compared to an oxygen gas, as shown in Fig. 10 (i.e., selective adsorption effect of ozone gas upon cooling). The amount of an oxygen gas that is transmitted through the oxygen transmission membrane (130) is larger than an ozone gas since an ozone gas is 2/3 in mass and small in size of one molecule as compared to an ozone molecule. Furthermore, upon cooling the ozonized gas, ozone is facilitated in adsorption to a substance or among molecules of the ozone gas, whereby the transmission amount of an oxygen gas is increased with respect to the ozone gas, and thus the amount of the oxygen gas is selectively increased by cooling. Fig. 11 is a characteristic diagram showing the transmission magnification of the oxygen gas with respect to the ozone gas of the oxygen transmission membrane (130) calculated in consideration of the adsorption effect of ozone and difference in mass between oxygen and ozone. As seen from Figs. 10 and 11, in the case where the interior of the concentrating chamber is cooled particularly to from 0 to -100°C, an oxygen gas can be efficiently transmitted. In the case where it is cooled to -100°C or lower, there arises such a problem that commercially available refrigerating machines therefor are lessened and become expensive, and the thermal insulator of the ozone concentrating chamber is necessarily thickened. In the apparatus for concentrating an ozonized oxygen gas of the embodiment, the oxygen transmission membrane (130) is shown, but it may be a sintered material capable of transmitting an oxygen gas, and the material therefor is preferably a ceramic material or Teflon (a trade name) having ozone resistance. In the case where a large amount (several hundreds ppm or more) of nitrogen is contained in the gas fed to the ozone gas generator, the generator forms a NOx gas and nitric acid (ENO3) in addition to an ozone gas, and the NOx gas and nitric acid (HNO3) accelerates deterioration of the oxygen transmission membrane (130). Accordingly, the service life of the ozone concentrating chamber is shortened. In the ozone concentrating method by the embodiment 2 of the invention, on the other hand, based on the ozone concentration generated from the ozone generator 21, an ozone gas is selectively condensed in the ozone concentrating chamber 11, and the chamber is divided by the oxygen transmission membrane (130) with a pressure difference, whereby an oxygen gas is selectively transmitted through the oxygen transmission membrane (130), and the transmitted gas is continuously discharged, so as to increase the concentration. Accordingly, ozone can be concentrated with significantly high efficiency. Furthermore, in the apparatus, since the highly concentrating step is effected based on the ozone concentration generated by the ozone generator 21, there is such an advantage that the risk of explosion can be significantly reduced. An ozonized gas containing an ozone gas is used as the gas containing plural gas species fed to the apparatus for concentrating and diluting, the pressure P1 of the diluted gas retrieving part is equal to or higher than the atmospheric pressure (0 MPa), and the pressure P2 of the concentrated gas retrieving part is set to a range of from 0.1 to 0.5 MPa, whereby the pressure difference (P2-P1) between the diluting space and the concentrating space can be sufficiently ensured (0.1 MPa or more) to obtain an effect of selectively transmitting an oxygen gas through the oxygen transmission membrane (130), and no vacuum equipment is necessary since the pressure P1 of the retrieving part is equal to or higher than the atmospheric pressure (0 MPa). An ozonized gas containing an ozone gas is used as the gas containing plural gas species fed to the apparatus for concentrating and diluting, and the ozone gas diluted gas (oxygen gas) retrieved from the diluted gas retrieving part of the chamber is increased in pressure with the gas compressor, so as to reuse the gas as a raw material gas of the ozone gas generator, whereby an oxygen gas can be efficiently used. An ozonized gas containing an ozone gas is used as the gas containing plural gas species fed to the ozone concentrating system, and a nitrogen-free ozone generator generating an ozone gas from a high purity oxygen gas having an addition amount of a nitrogen gas of 1 ppm or less is used as the ozone generator generating an ozonized gas, whereby the concentrated ozonized gas having a stable concentration can be retrieved from the ozone concentrating chamber for a prolonged period of time, and thus such an effect is obtained that the reliability of formation of an oxide film with ozone in a semiconductor production apparatus can be improved. In the case where the apparatuses for concentrating and diluting a specific gas, such as the ozone concentration apparatuses of the embodiment 2, are provided plurally as a multistage cascade, the degree of concentrating can be improved. An embodiment 3 shows a use example of the ozone concentrating system of the embodiments 1 and 2. Fig. 12 is a diagram showing comparison of concentrated ozone concentration characteristics with respect to the flow rate of the ozonized oxygen in the conventional concentrated ozone apparatus, and concentrated ozone concentration characteristics of an example of the invention, and Figs. 13-a and 13-b are diagrams showing examples of single wafer type and batch type apparatuses, in which concentrated ozone of the invention is applied to formation of an oxide film in a semiconductor production apparatus. Fig. 14 shows vapor pressure characteristics of gas species contained in an ozone gas. Fig. 12 shows the concentrated ozone concentration characteristics with respect to the flow rate (SCCM) of ozonized oxygen, in which the characteristic curve 2005 shows the ozone concentration characteristics by a conventional liquid ozone apparatus, and the characteristic curve 2006 shows the ozone concentration characteristics by a conventional adsorption ozone apparatus. The characteristic curve 2007 shows an example of ozone concentration characteristics of the invention, and the region 2008 shows the target region of high concentration ozone that is to be demanded in future for a batch type ozone CVD apparatus in the semiconductor manufacturing industry. By using the ozone concentrating system described in the embodiments 1 and 2 of the invention, an ozonized oxygen gas having a high concentration can be obtained without using a too large apparatus, and the ozone generated amount of the ozone generator can also be suppressed owing to the high efficiency in concentrating, whereby such an advantage is obtained that the system can be reduced in size. In a semiconductor production apparatus utilizing ozone, an ozonized oxygen gas is utilized in a CVD process for forming an interlayer dielectric film and the like in the production process of an integrated circuit (IC) device. In particular, an ozonized oxygen gas having been concentrated to have a high concentration can be suppressed in loss in oxidation reaction, such as return to an oxygen gas due to collision with other gases (oxygen gas) than an ozone gas, and active oxygen having been efficiently converted from ozone undergoes oxidation reaction with a substance to be oxidized, whereby an oxide film having good quality capable of suppressing leakage electric current can be formed at a high rate. According to the advantage, it is being studied to employ a high concentration ozonized oxygen gas in a mass production line in future. Furthermore, since oxidation reaction is accelerated with high concentration ozone, thermal energy for dissociating ozone to active oxygen can be decreased, whereby it receives attention as a gas necessary for the purpose of low temperature oxide film formation. Under the existing circumstances, a concentrated ozonized oxygen gas can be concentrated to nearly 100% highly concentrated ozone, but the flow rate and supplying pressure of supplied ozone are low, and there are problems in continuous supplying and in supplying the concentrated ozonized oxygen gas at a stable concentration. Accordingly, there has been made such a constitution for avoiding the problems that an ozone concentrating apparatus and a semiconductor processing apparatus (such as a CVD apparatus) are connected with a piping that is as short as possible to integrate the apparatuses. In the ozone concentrating apparatuses of the embodiments 1 and 2 of the invention, the supplied ozone flow rate, which is the aforementioned problem, is 3,000 SCCM (3 L/min) for obtaining high concentration ozonized oxygen as shown in Fig. 12. The supplying pressure of an ozone gas is managed to set a low pressure in a conventional apparatus due to the explosion limit shown in Fig. 6, but in the ozone concentrating apparatus of the invention, since an ozone gas is increased in concentration based on the concentration obtained from the ozone generator 21, there is reduced risk of rapid increase in pressure as compared to a conventional apparatus, and thus the supplying pressure can be increased as compared to a conventional apparatus. In the case where a single wafer type CVD apparatus shown in Fig. 13-a and a batch type CVD apparatus shown in Fig. 13-b are provided by utilizing the advantages of the concentrated ozone apparatuses of the embodiments 1 and 2 of the invention, a concentrated ozone gas can be uniformly filled in the entire CVD chamber 3, and an interlayer dielectric film can be formed with a small yield. In Figs. 13-a and 13-b, numeral 31 denotes an ozone supplying valve, 33 denotes a processed gas discharge valve, and 36 denotes a nozzle pipe for diffusing an ozonized oxygen gas 18. The nozzle pipe 36 has plural nozzle holes 36a having a diameter of 1 mm or less opened therein. Numeral 37 denotes a wafer as a material to be processed, and 38 in Fig. 13-a denotes a pedestal having equipped therewith a heater (which is not shown in the figure). Numeral 39 in Fig. 13-b denotes a heater for heating a wafer from the outside of the chamber 3. In the apparatuses, in the state where the processed gas discharge valve 33 is opened to evacuate the interior of the CVD chamber 3 to vacuum, when the processed gas discharge valve 33 is closed, and the ozone supplying valve 31 is fully opened, an ozone gas of a supplying pressure P1 is once accumulated in the nozzle pipe 36, and the ozonized oxygen gas 18 is diffused by adiabatic expansion into the chamber 3 through the nozzle part 36 with the difference in pressure from the vacuum chamber pressure P1, so as to be filled in the entire chamber 3. The ozone gas output from the nozzle part 36 undergoes adiabatic expansion to provide such an effect that the gas is cooled to a low temperature to prevent the ozone gas from being decomposed. Upon concentrating ozone, a concentrated ozonized gas contains an impurity gas other than an oxygen gas depending on the operation temperature for concentrating. In general, as described in Patent Document 7, an ozone generator 21 uses a gas containing several percent of less of a nitrogen gas in an oxygen gas, as a raw material gas, and it is becoming apparent that NOx clusters, such as NO2, generated through discharge chemical reaction of the nitrogen gas accelerate dissociation of oxygen atoms to form ozone. Table 1 describes an ozone generation mechanism with a raw material gas, oxygen and nitrogen, and in an ordinary ozone generator, a raw material gas containing a slight amount of nitrogen added to an oxygen gas is subjected to light, electron dissociation and chemical catalytic reaction by high electric field silent electric discharge to form an ozone gas. In the mechanism of generating an ozone gas through light, electron dissociation and chemical catalytic reaction, ozone is generated by the following reaction formulae. A nitrogen gas having a low ionization potential generates electrons having high energy of about from 7 to 10 eV through silent electric discharge with a short gap of 0.1 mm. A nitrogen gas is excited to a negative ion N2 -B2 through collision of the high energy electrons and the N2 molecules in the ground state of the nitrogen gas, and the excited ions N2 -B2 undergo deexcitation to the first negative band. Upon deexcitation, ultraviolet light (discharge light hv) having a radiation spectrum of from 360 to 430 nm is radiated. In the case where nitrogen N2 and high energy electrons collide with each other, or nitrogen N2 is irradiated with the discharge light hv, nitrogen is dissociated to nitrogen atoms, and a slight amount of an NO2 gas is generated through chemical reaction of the dissociated nitrogen atoms and an oxygen gas (step 1). In the case where a slight amount of the thus generated NO2 gas is irradiated with discharge light hv having a specific wavelength (from 360 to 430 nm), an NO gas and O atoms are generated through photochemical reaction. An NO2 gas and O atoms are generated through chemical reaction of the NO gas and an O2 gas (step 2). In the step 2, a slight amount of an NO2 gas functions as a catalyst to generate a large amount of O atoms. Upon generating a large amount of O atoms in the discharge field, since the pressure of the discharge field where ozone is generated is in a state of high pressure plasma of about 0.25 MPa, collision of molecules and atoms are almost triple collision. Energy is exchanged through the triple collision chemical reaction of O atoms, O2 molecules, the wall (M) and the like, and O3 (ozone) is generated in an amount corresponding to O atoms thus generated (step 3). Accordingly, since O atoms are generated in a large amount through the catalytic function of NO2, ozone can be efficiently generated in a high concentration. Byproducts are also generated in addition to generation of ozone, and chemical reaction shown in step 4, i.e., chemical reaction of an NO2 gas and O3 (ozone) generates an N2O5 gas, chemical reaction of nitrogen ions and O ions generates N2O, and a slight amount of water contained in the cylinder and NO ions generate a slight amount of nitric acid clusters, whereby these byproducts are generated in the ozonized oxygen gas thus retrieved. That is, a large amount of O atoms is generated through catalytic function of NOx clusters, such as NO2, so as to generate ozone. Accordingly, upon considering that an ozone concentration (about several percent by volume to 20% by volume), which is about 10,000 times the NO2 amount, is generated through the catalytic function of several tens ppm of NO2 and the photochemical reaction of the discharge light, the phenomenon is physically appropriate, and it can be explained that ozone can be sufficiently generated. It has been considered that high energy electrons generated through short gap silent electric discharge with a gap of 0.1 mm and an oxygen gas collide with each other to generate O atoms. However, although high energy electrons capable of dissociating O atoms can be generated through silent electric discharge, the density of the high energy electrons capable of dissociating O atoms during discharge is about from 109 to 1010 per unit volume (per m3), and such a mechanism has been believed without explanation that ozone of from several percent by volume to 20% by volume (0.3 × 1019 per cm3) is generated with such an extremely small electron density. In recent years, an ozone generator is developed by selecting a photocatalytic substance capable of substituting the catalytic function of the NOx clusters, such as NO2, assuming the aforementioned principle, and a nitrogen-free ozone generator is commercially available. However, an ozone gas generated from an ordinary ozone generator contains NOx since nitrogen is contained in a raw material gas. The NOx gas output from the ozone generator is almost N2O5, N2O and nitric acid clusters HNO3. N2O5 is liquefied at 0°C or less to be N2O5 clusters present in the ozone gas. N2O has a melting point around -90°C. Research on vapor pressure characteristics of the gas species contained in the ozone generator reveals Fig. 14. Accordingly, since liquefaction occurs at 80 k (-193°C) in an ozone concentrating apparatus, in which ozone is concentrated by liquefaction, not only ozone but also an N2O gas, nitric acid clusters HNO3 and N2O5 clusters are liquefied and vaporized at 100 K (-173°C), whereby a concentrated ozone gas containing substantially no NOx can be obtained. In this method, however, upon liquefying, an N2O gas, nitric acid clusters HNO3 and N2O5 clusters in a liquefied state remain in the apparatus, and an N2O gas, nitric acid clusters HNO3 and N2O5 clusters are necessarily removed (removal of NOx) periodically. In an adsorption type ozone concentrating apparatus concentrating ozone by adsorption, since adsorption occurs at about -60°C, in an ozonized oxygen gas generated from the ozone generator, not only ozone but also an N2O gas, nitric acid clusters HNO3 and N2O5 clusters are adsorbed. In order to desorb ozone having been adsorbed at 0°C, an N2O gas having a higher temperature of vapor pressure characteristics than an ozone gas is output as a mixture with an ozone gas in a concentrated ozone gas. Nitric acid clusters HNO3 and N2O5 clusters are partially vaporized and output in a concentrated ozone gas as nitric acid clusters HNO3 and N2O5 clusters, but almost entire acid clusters HNO3 and N2O5 clusters remains as being adsorbed on the adsorbent. Accordingly, HNO3 and N2O5 are accumulated in the adsorbent to cause deterioration in performance of the adsorbent. In an ozone concentrating apparatus, in which ozone is selectively condensed, and condensed ozone is vaporized in the same space, or an oxygen transmission membrane (130) selectively transmitting an oxygen gas other than an ozone gas is used, so as to remove an oxygen gas in an ozonized gas, for example, ozone is selectively condensed by utilizing adsorption at a low temperature of -60°C, and condensed ozone is vaporized at -0°C, whereby an N2O gas, nitric acid clusters HNO3 and N2O5 clusters generated in the ozone generator are contained in the concentrated ozone gas, but an N2O gas, nitric acid clusters HNO3 and N2O3 clusters are not accumulated in the ozone concentrating apparatus. Accordingly, it is not necessary to remove NOx periodically, which is the case in a liquid type ozone concentrating apparatus, and there is no problem in deterioration in performance of an adsorbent, which is the case in an adsorption type ozone concentrating apparatus, whereby an apparatus having higher practicality can be provided. In an ozone CVD apparatus for forming an interlayer dielectric film as a semiconductor production apparatus, when an N2O gas, nitric acid clusters HNO3 and N2O5 clusters are contained in an ozonized oxygen gas, they causes deposition of a metallic contamination substance, such as metallic chromium and manganese, at a part where the ozonized oxygen gas is in contact with the part of the apparatus in the gas, and the metallic contamination invades in the oxide film to deteriorate insulating property of the oxide film, which brings about increase in leakage electric current. Thus, there is a problem of failing to form an oxide film with good quality. Such an ozone gas is demanded that is decreased as much as possible in amount of NOx, which causes deposition of a metallic contamination substance. Accordingly, in the ozone concentrating apparatus of the invention, a nitrogen-free ozone generator using a photocatalytic substance capable of generating ozone by feeding a high purity oxygen gas of 99.999% or more containing no nitrogen is used as the ozone generator, whereby a concentrated ozonized oxygen gas that is considerably decreased in amount of NOx can be provided. Fig. 15 is a diagram showing a nitrogen addition rate of a raw material gas in an ozone generator and an NO2 amount (converted value) generated by the ozone generator. As a means for measuring NOx contained in an ozonized oxygen gas having ozone generated, the generated ozonized oxygen gas is bubbled in pure water to dissolve NOx in pure water as nitric acid (HNO3), and the ion amount of NO3 - dissolved in pure water is measured to measure NOx generated in the ozone generator. The NO2 gas amount generated in the ozone generator can be calculated from the NO3 - ion amount. In Fig. 15, the characteristic curve 2009 is calculated from Table 3 of Patent Document 8. The characteristic curve 2010 shows the characteristics obtained by measuring in the apparatus of the invention. The figure shows that NO2 is generated in an amount of 100, 000 vol/ppb at a nitrogen addition rate of about 1%, and when the nitrogen addition rate is decreased, the NO2 amount is decreased. In a nitrogen-free ozone generator generating ozone only with a high purity oxygen gas of 99.99% or more, the nitrogen content is 0.005% or less, and the NO2 amount generated in this case is 0.001 vol/ppb (region 2011) or less, i.e., ozonized oxygen to be fed has a considerably small NOx amount, so as to provide a high concentration ozonized oxygen gas containing substantially no NOx in an ozone gas concentrated. Figs. 3-a and 3-b show an ozone concentrating system 100 of an embodiment 4 of the invention. As compared to the embodiment 1 described with reference to Fig. 1, this embodiment shows an example where the constitution of the freezing machine 14, the arrangement of the particle material 13 for condensation and vaporization in the concentrating chambers 11 and 12, and the like are changed. In Fig. 3-a, the freezing machine is divided into two, 14a and 14b, the freezing machine 14a is disposed at the upper part of the concentrating chambers 11 and 12, and the freezing machine 14b is disposed at the lower part thereof. In the upper part, the cooling temperature is the optimum temperature for selectively condensing an ozone gas, thereby making an ozone condensation zone. In the lower part, the cooling temperature is a temperature range where ozone is gradually vaporized, thereby making an ozone vaporization zone. In Fig. 3-b, the freezing machine is divided into three, 14a, 14b and 14c, the freezing machine 14a is disposed at the upper part of the concentrating chambers 11 and 12, the freezing machine 14b is disposed at the lower part thereof, and the freezing machine 14c is disposed at the bottom part of the concentrating chambers 11 and 12. In the upper part, the cooling temperature is the optimum temperature for selectively condensing an ozone gas, thereby making an ozone condensation zone. In the lower part, the cooling temperature is a temperature range where condensed ozone is gradually vaporized, thereby making an ozone vaporization zone. In the bottom part of the concentrating chambers 11 and 12, the cooling temperature is set about a temperature (from -60 to 0°C) equal to or high than -112°C. The particle material for condensation and vaporization is filled also in the bottom part of the concentrating chambers 11 and 12. According to the constitution, condensed ozone is vaporized in the vaporization zone, and liquid ozone that has not been sufficiently vaporized in the zone falls downward to the bottom part and is certainly vaporized in this zone. In order to prevent liquid ozone accumulated on the bottom part from being rapidly vaporized, such a constitution is provided that the particle material for condensation and vaporization is also filled in the bottom part to increase the surface area of the particle material for condensation and vaporization at a low temperature, whereby rapid gasification is prevented. In the invention, while a system for concentrating an ozone gas with one stage of condensation-vaporization zone is shown, it is possible that further several stages of concentrating chambers are provided for the diluted ozone gas, whereby nearly 100% of the ozone gas generated from the ozone generator is condensed to obtain high concentration ozonized oxygen. While a concentrating system of an ozonized oxygen gas has been described in the aforementioned embodiments 1 to 4, the invention may be utilized as such a measure, as another example, that air containing a NOx gas, Freon gas or a carbon dioxide gas is cleaned (diluted) or concentrated to improve efficiency of decomposition process of a NOx gas, Freon gas or a carbon dioxide gas. A NOx gas contained in air mainly includes NO2, N2O5, N2O, NO and HNO3. N2O5 and HNO3 have a high melting point and are present in a cluster state (vapor state) but not in a gas state around 0°C. The melting points of NO2, N2O and NO are about -60°C, -140°C and -180°C, respectively, as shown in the vapor pressure characteristics in Fig. 14. A Freon gas discharged to the atmosphere has a melting point of about from -70 to -30°C. A carbon dioxide gas (CO2) has a melting point of about -140°C as shown in vapor pressure characteristics in Fig. 16. Accordingly, in order to dilute (clean) or concentrate these gases, it is necessary to change the cooling temperature of the concentrating chamber depending on the target gas for diluting or concentrating. The gas having been concentrated is a corrosive gas, and it is necessary to select materials having sufficient corrosion resistance for parts, such as pipings and valves, for the concentrated gas. Fig. 17 is an illustration showing a constitution of an apparatus for cleaning or concentrating air containing a NOx gas, a Freon gas and a carbon dioxide gas according to the embodiment 5. In the figure, numeral 6 denotes a compressor for compressing an atmospheric gas, 171 denotes a controlling valve for feeding the compressed atmospheric gas under controlling in flow rate, 172, 173, 174 and 176 are valves for controlling pressures in gas concentrations systems 100A, 100B and 100C to retrieve a flow rate of a concentrated ozonized gas, and 175 denotes a control valve for retrieving the diluted (cleaned) gas. Numerals 182, 183, 184 and 185 denote gas flow rate meters. The gas concentrating apparatuses 100A, 100B and 100C have the same constitution as the ozone concentrating system 100 shown in Fig. 1, in which upper parts of the chambers in the gas concentrating apparatuses 100A, 100B and 100C are condensing zones, and lower parts thereof are vaporizing zones for gasifying a liquid condensed at the upper parts, with both zones being cooled. The atmospheric air containing a NOx gas, a Freon gas and a carbon dioxide gas generally contains from 1 to several hundreds ppm of a NOx gas, a Freon gas and a carbon dioxide gas, and in order to concentrate the atmospheric air efficiently, it is compressed to about from 0.3 to 1 MPa with the compressor 6, and then continuously fed (Q1) to the gas concentrating apparatus with the controlling valve 171. After obtaining the state, the flow rate of the diluted gas retrieved from the upper part is controlled with the valve 175, and a concentrated gas is retrieved at a flow rate Q3 by controlling the pressures of the gas concentrating apparatuses I, II and III by controlling the valves 172, 173, 174 and 176. The retrieved concentrated gas of a flow rate Q3 is decomposed with a gas decomposing apparatus 81. The flow rates Q2 and Q3 of dilution (cleaning) with respect to the fed flow amount Q1 are controlled to have the following flow rate balance by controlling the valves 175, 172, 173, 174 and 176 with monitoring the flow rates displayed in the flow rate meter 185, 182, 183 and 184. As having been described, in the apparatus for cleaning and concentrating air containing a NOx gas, a Freon gas and a carbon dioxide gas, it is necessary that concentrating and diluting of a considerably large flow rate are demanded, and the apparatus is inexpensive, while the quality, such as controllability and stability, may be low, and such measures as explosion prevention are not necessary, as compared to the ozone concentrating system apparatus. In order to realize the apparatus, since a mass flow rate controller (MFC) and an automatic pressure controller (APC), which are used in the ozone concentrating system, cannot be used, all the flow rates in the respective parts are manually controlled with the controlling valves and flow rate meters as shown in Fig. 17. In order to increase the cleanliness degree of the diluted (cleaned) gas, a multistage constitution with the second and third step gas concentrating apparatuses for further diluting the diluted gas from the first step. In the ozone concentrating apparatus of the invention, a mass flow rate controller (MFC) is provided on the side for retrieving diluted ozone, and an automatic pressure controller (APC) is provided on the side for retrieving concentrated ozone, so as to maintain the pressure in the zone concentrating chamber constant and to control the flow rate of diluted ozone, whereby the concentrated ozone flow rate is distributed, but the same advantage as in the invention can be obtained by providing a mass flow rate controller (MFC) on the side for retrieving concentrated ozone, and APC on the side for retrieving diluted ozone. The flow rate on the side for retrieving diluted ozone is controlled with MFC, but the same advantage as in the invention can be obtained by controlling the flow rate with a valve instead of MFC. APC is used on the side for retrieving concentrated ozone for automatically control the flow rate for retrieving to maintain the pressure in the ozone concentrating chamber constant, but the same advantage as in the invention can be obtained by making the pressure in the ozone concentrating chamber constant with a combination of MFC and a pressure gage, or a flow rate controlling valve and a pressure gage, instead of APC. The performance of the efficiency in concentrating ozone and the performance, such as compactness, inexpensiveness and light weight, of the apparatus in the invention can be further improved by optimizing the design in the invention including the constitution of the freezing machine, the size and amount of the material for condensation and vaporization in the ozone concentrating chamber, the diameter, material and length of the ozone concentrating chamber, the length where the material for condensation and vaporization is filled, which are determined by the thermal boundary layer, viscosity, specific heat and thermal conductivity in the stream of the ozonized oxygen gas, and the thermal conductivity, specific heat and the like of the ozone concentrating chamber, in addition to the constitution and functions of the ozone concentrating chamber of the invention. The invention contributes to improvement in production efficiency by applying to, in addition to the semiconductor production technique, such industrial fields as the field of supplying an ozone gas, the field of removing CO2 in the atmospheric air, and the field of removing NOx and Freon contained in a waste gas. wherein the concentrated gas retrieving part of the gas fed to the chamber is performed concentration of the specific gas by vaporizing the condensed gas on the surface of the particle material or the gas transmission member through heating a surrounding of the concentrated gas retrieving part, thereby continuously retrieving the gas containing the specific gas having been diluted through the diluted gas retrieving part of the chamber or continuously retrieving the gas containing the specific gas having been concentrated through the concentrated gas retrieving part of the chamber. The apparatus for concentrating and diluting a specific gas according to claim 1, wherein said freezing machine is provided on the diluted gas retrieving side of the chamber and cool the gas to a cool temperature accelerating condensation of the specific gas or transmission of other gases than the specific gas on the surface of the particle material or the gas transmission member. The apparatus for concentrating and diluting a specific gas according to claim 1 or 2, characterized by, in the apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the particle material, providing at least one of an automatic pressure controller (APC) controlling an inner pressure of the chamber or a gas pressure controlling valve and a mass flow rate controller (MFC) controlling a flow rate of a gas retrieved from the chamber or a gas flow rate controlling valve, on either of the gas retrieving port of the diluted gas retrieving part or the gas retrieving port of the concentrated gas retrieving part of the chamber, and continuously retrieving through them a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber and a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber. The apparatus for concentrating and diluting a specific gas according to claim 1 or 2, characterized by, in the apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the gas transmission member, providing an automatic pressure controller I (APC I) or a gas pressure controlling valve I controlling an inner pressure P1 of the chamber of a diluted gas having removed the specific gas by transmitting other gases than the specific gas at the diluted gas retrieving part of the chamber, and providing an automatic pressure controller II (APC II) or a gas pressure controlling valve II controlling an inner pressure P2 at the concentrated gas retrieving part of the chamber, thereby producing a gas pressure difference ΔP (= P2 - P1) on sides on the gas transmitting members, continuously retrieving through them a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber and a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber. The apparatus for concentrating and diluting a specific gas according to claim 1 or 2, characterized in that a temperature distribution is provided in a vertical direction of the chamber by a constitution of increasing upward a thermal insulation capability of a thermal insulating function provided on a periphery of the chamber. The apparatus for concentrating and diluting a specific gas according to claim 1 or 2, characterized in that the particle material for condensation and vaporization filled in the chamber is made to be a spherical shape with a part of the side surface thereof being flattened, and is filled in layers to make the flattened parts of the spherical particle material in contact with each other. The apparatus for concentrating and diluting a specific gas according to claim 5, characterized in that a material of the particle material for condensation and vaporization is glass, ceramics or a metal that does not undergo chemical reaction with the gas containing plural gas species. The apparatus for concentrating and diluting a specific gas according to claim 6, characterized in that a material of the particle material for condensation and vaporization is glass, ceramics or a resin material having low thermal conductivity, and a surface of the particles is coated with a metallic film having high thermal conductivity that does not undergo chemical reaction with the gas containing plural gas species. an ozone gas having a high concentration. The apparatus for concentrating and diluting a specific gas according to claim 4, characterized in that the gas containing plural gas species fed to the apparatus for concentrating and diluting is an ozonized gas containing an ozone gas, the inner pressure P1 of at the retrieving part of the diluted gas is set to the atmospheric pressure (0 MPa) or more, and the pressure P2 at the concentrated gas retrieving part is set to a range of from 0.1 MPa to 0.5 MPa, to provide a gas pressure difference in ΔP (= P2 - P1) between sides of the gas transmission members of 0.1 MPa or more. The apparatus for concentrating and diluting a specific gas according to claim 4, characterized in that the gas containing plural gas species fed to the apparatus for concentrating and diluting is an ozonized gas containing an ozone gas, and the gas transmission member is constituted with a Teflon (a trade name) membrane material or a ceramic material, to transmit selectively only an oxygen gas contained in the ozonized gas with the gas transmission member. The apparatus for concentrating and diluting a specific gas according to claim 1, characterized in that the gas containing plural gas species fed to the apparatus for concentrating and diluting is an ozonized gas containing an ozone gas, and the freezing machine is provided in a vicinity of the chamber and cools the particle material or the gas transmission member to a prescribed low temperature by setting the cooling temperature of the chamber to -100°C or more. The apparatus for concentrating and diluting a specific gas according to claim 1, characterized in that the gas containing plural gas species fed to the apparatus for concentrating and diluting is an ozonized gas containing an ozone gas, and the ozonized gas diluted gas (oxygen gas) retrieved from the diluted gas retrieving part of the chamber is made to have a high pressure with a gas compressor to reuse the gas as a raw material gas for an ozone gas generator. The apparatus for concentrating and diluting a specific gas according to claim 9, characterized in that the gas containing plural gas species fed to the ozone concentrating system is an ozonized gas containing an ozone gas, an ozone generator generating an ozonized oxygen gas is provided, and the ozonized oxygen gas generated from the ozone generator is fed as the gas containing plural gas species to a center part of the ozone concentrating system. The apparatus for concentrating and diluting a specific gas according to claim 1, characterized in that the gas containing plural gas species fed to the ozone concentrating system is an ozonized gas containing an ozone gas, and as an ozone generator generating the ozonized oxygen gas, a nitrogen-free ozone generator generating an ozone gas from a high purity oxygen gas having an addition amount of a nitrogen gas of 1 ppm or less is used. The apparatus for concentrating and diluting a specific gas according to claim 1, characterized in that the gas containing plural gas species fed to the apparatus for concentrating and diluting is air containing at least one of a carbon dioxide gas, a NOx gas and a Freon gas, the gas contained in air is concentrated to separate into air containing the gas having been concentrated and air containing the gas having been diluted (cleaned). The apparatus for concentrating and diluting a specific gas according to claim 1, characterized in that the apparatuses for concentrating and diluting a specific gas are provided plurally as a multistage cascade. The method for concentrating and diluting a specific gas from a gas containing plural gas species characterized by introducing a specific gas containing the plural gas species to a gas concentrating and diluting chamber having filled therein a particle material for condensation and vaporization the specific gas or having equipped therein a gas transmission member selectively transmitting other gases than the specific gas, with a function of cooling the gas in the chamber equipped therein; cooling the gas in the chamber with a gas feeding and retrieving system having a function of retrieving a gas containing the specific gas having been diluted or retrieving a gas containing the specific gas having been concentrated, thereby selectively condensing only the specific gas or selectively transmitting the other gases than the specific gas on a surface of the particle material for condensation and vaporization or the gas transmission member, so as to realize dilution of the specific gas by a diluted gas retrieving part of the chamber; and heating a surrounding of a concentrated gas retrieving part of the chamber while streaming down a liquid condensed on the surface of the particle material to a lower part of the chamber by gravitation, thereby vaporizing the condensed gas on the surface of the particle material to realize high concentration of the specific gas at a concentrated gas retrieving part of the chamber, and continuously retrieving a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber or a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber. The method for concentrating or diluting a specific gas according to claim 18, characterized by, in the apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the particle material, providing at least one of an automatic pressure controller (APC) controlling an inner pressure of the chamber and a mass flow rate controller (MFC) controlling a flow rate of a gas retrieved from the chamber, on at least one of the gas retrieving port of the diluted gas retrieving part and the gas retrieving port of the concentrated gas retrieving part of the chamber, automatically controlling an inner pressure of the chamber to a prescribed pressure with the automatic pressure controller (APC), and setting a flow rate of a gas containing the specific gas having been retrieved from the diluted gas retrieving part of the chamber through them with the mass flow rate controller (MFC), thereby enabling automatic control of a concentrated gas concentration and flow rate upon continuously retrieving a gas containing the specific gas having been concentrated. The method for concentrating or diluting a specific gas according to claim 18, characterized by, in the apparatus for concentrating and diluting a specific gas containing the chamber having filled therein the gas transmission member, providing an automatic pressure controller I (APC I) or a gas pressure controlling valve I controlling an inner pressure P1 of the chamber of a diluted gas having the specific gas removed by transmitting other gases than the specific gas at the diluted gas retrieving part of the chamber, and providing an automatic pressure controller II (APC II) or a gas pressure controlling valve II controlling an inner pressure P2 at the concentrated gas retrieving part of the chamber, thereby producing a gas pressure difference ΔP (= P2 - P1) on sides between the gas transmitting members, continuously retrieving to the outside a gas containing the specific gas having been diluted from the diluted gas retrieving part of the chamber and a gas containing the specific gas having been concentrated from the concentrated gas retrieving part of the chamber through them, varying at least one set pressures of the automatic pressure controller I (APC I) and the automatic pressure controller II (APC II), thereby enabling control of a concentrated gas concentration upon continuously retrieving the gas containing the specific gas having been concentrated. The method for concentrating or diluting a specific gas according to claim 18, characterized in that the liquefied gas concentrating and diluting chambers are provided plurally as a multistage cascade to improve the degree of concentrating of the concentrated gas of the specific gas and the degree of diluting of the diluted gas of the specific gas. The method for concentrating or diluting a specific gas according to claim 18, characterized in that the gas containing plural gas species fed to the chamber for concentrating and diluting is an ozonized gas containing an ozone gas, and ozone in the ozonized gas is concentrated to an ozonized gas having a high concentration. The method for concentrating or diluting a specific gas according to claim 18, characterized in that the gas containing plural gas species fed to the chamber for concentrating and diluting is air containing at least one of a carbon dioxide gas, a NOx gas and a Freon gas, and the gas contained in air is concentrated to separate into air containing the gas having been concentrated and air containing the gas having been diluted (cleaned). AT86141T (en) * 1986-11-24 1993-03-15 Waltonen Lab Inc Method and apparatus for excitation of a liquid.
2019-04-21T07:28:12Z
https://patents.google.com/patent/EP2036600A1/en
And so it goes, another day, another appeal for campaign funds by saying and at least pretending a willingness to do something, anything, that might tickle the nerves and stroke the metaphysical and incarnational fantasies of potential major donors. My, oh my, how our once noble liberal democratic republican experiment keeps evolving as it stumbles along such an amazingly convoluted path. One can only wonder what will come next. What do you think may be about to happen?? And, at the end of the day, does it really matter. More wars, more money flowing into the pockets of the privileged insiders, more campaign donations into the right coffers. Aren’t we ever going to grow up and get tired of this? Or it this ultimately what the original intelligent design was really all about?? By Jacob Heilbrunn, The National Interest, 2 August 2012. A devastating strike would create an upsurge of patriotism in America and fully neutralize Mitt Romney's contention that Obama is a foreign-policy wimp. It could allow Obama to sweep to victory in November. One reason he might is that Mitt Romney is singlehandedly pushing the entire debate about Israel and Iran to the right. The parameters have changed markedly. As TNI editor Robert Merry and others have noted, Romney's efforts to ingratiate himself with Jewish donors and voters have prompted him to suspend any notion of an independent American foreign policy in the Middle East. Traditionally, the green or red light for military action has come from America, at least when it comes to actions that directly impinge upon American interests. Ronald Reagan, for instance, successfully demanded that Israel halt its attacks on Lebanon in 1983. Romney, by contrast, has effectively promised to give Israel a veto power over military action, indicating that he will do whatever Benjamin Netanyahu wants. As Romney observed in December, he would never, ever criticize Israel. Instead, he would get on the phone with Prime Minister Netanyahu and ask, "What would you like me to do?" So it's fair to say that Romney would outsource his foreign policy to Netanyahu when it comes to Israel and its enemies. What's more, anyone who thinks that Romney is bluffing should think again. It's no accident that his senior adviser on the Middle East is Dan Senor, a hard-line neoconservative. As the New York Times notes today, Romney relies upon him for advice and frequently cites his book “Start-Up Nation”. Senor wasn't dissembling when he said in Israel that Romney was prepared to endorse an attack on Iran—he simply got a little ahead of the program. But as Romney calls for "any and all measures" to stop Iran, Obama surely could deflate his sails by launching a strike in October. If it worked, he would be hailed as a hero. The consequences of a strike wouldn't be felt for at least a few weeks—the nightmare scenario is that an oil shock would result in a quadrupling of oil prices, plunging the world into a new Great Depression. Enough time for Obama to sail back into office as a tough foreign-policy president. Given Obama's congenital caution and sobriety, he seems unlikely to follow such a course. But it should not be ruled out. The neocons may be closer to helping bring about an assault on Iran than even they realize. They've already captured Romney. But they may also be on the verge of capturing Obama. Their sustained campaign of pressure, in other words, may be more effective than anyone has acknowledged. For the fact is that Obama already has amply demonstrated his ruthlessness when it comes to confronting America's adversaries. If he were able to carry out regime change in Tehran, he might even start referring to himself as the “new Decider”. By Michael D. Shear, NYT, 1 August 2012. Mr. Senor’s departure from Iraq was followed by a stint running a private equity firm that made him wealthy. He married Campbell Brown, a former anchor for CNN, formed a conservative research organization and secured invitations to appear on Fox News and MSNBC’s “Morning Joe” program. Mr. Romney’s relationship with Mr. Senor began just after his honeymoon in 2006, when Ms. Myers asked if he would meet with Mr. Romney, then a likely presidential candidate. Before long, Mr. Senor was regularly visiting Boston for briefings and setting up visits by other foreign policy hawks in Washington. He accompanied Mr. Romney to Israel in January 2007 and went with him on a trip to Afghanistan, Jordan, Israel and Dubai last year. “I believe they are genuinely close and personal,” Mr. Kristol said. Perhaps the best evidence of that is the frequency with which Mr. Romney talks about Mr. Senor’s book. Acquaintances of both men said Mr. Romney frequently mentions it. The slim book argues that Israel’s entrepreneurial spirit contributes to its success — a message that resonates with Mr. Romney’s background in business. “He goes through some of the cultural elements that have led Israel to become a nation that has begun so many businesses and so many enterprises,” Mr. Romney said at his Jerusalem fund-raiser. Looking around a room filled with wealthy Americans, including Sheldon Adelson, the billionaire casino magnate who has donated tens of millions of dollars to Republicans, Mr. Romney noted Mr. Senor’s absence and his success at hitting such people up for campaign cash. By Robert W. Merry, TNI, 1 August 2012. Robert W. Merry is editor of The National Interest and the author of books on American history and foreign policy. His latest book is “Where They Stand: The American Presidents in the Eyes of Voters and Historians” (Simon & Schuster). The major newspapers all understood that GOP presidential candidate Mitt Romney’s expressions in Jerusalem last weekend were important, which is why they played the story on page one. But only the New York Times captured the subtle significance of what he said. The paper’s coverage, by Jodi Rudoren and Ashley Parker, reported that Romney sought to adhere to the code that says candidates shouldn’t criticize the president on foreign soil. Most significantly, while Obama talks about stopping Iran from obtaining nuclear weapons, Israel insists Tehran should be prevented from having even the capacity to develop nuclear weapons. This means no nuclear development even for peaceful purposes. Romney embraced the Israeli language. In doing so, he nudged his nation closer to war with Iran. If he means a complete capitulation by Iran, he’s dreaming, of course. History tells us that nations don’t respond to this kind of pressure by accepting humiliation. That’s the lesson of Pearl Harbor, as described in my commentary in these spaces. Many close observers of the Iran drama believe there may be an opportunity for a negotiated outcome that allows Iran to enrich uranium to a limited extent—say, 5 percent—for peaceful purposes. Iran insists, and most experts agree, that the Non-Proliferation Treaty allows such enrichment for energy production. In any event, numerous signatories to the NPT do in fact maintain limited enrichment programs for peaceful ends. Obama seems torn between pursuing such an outcome and embracing the Israeli position, which demands that Iran foreswear all enrichment and any peaceful nuclear development. In last spring’s Istanbul meeting between Iran and the so-called P5+1 group (the United States, Britain, France, China, Russia and Germany), there seemed to be a genuine interest on the part of those six nations to explore an outcome that would allow for some enrichment by Iran. Five weeks later in Baghdad, the P5+1 group seemed to backtrack and insist upon zero enrichment. Talks are ongoing but only among low-level technical people; any serious negotiations are on hold pending the election. Thus Obama has managed to maintain his flexibility during the delicate campaign period. But now we have Romney in Israel essentially telling the people there that they need fear no ambivalence on his part. If elected, he will embrace the Netanyahu position, which is designed to ensure the collapse of any negotiations attending anti-Iran sanctions, which Netanyahu already has labeled a failure. That’s the view that Romney subtly embraced in Jerusalem. True, it was all done with a wink and a nod. In actual language, Romney didn’t diverge too far from what the president had been saying. Certainly in declaring that Americans “recognize Israel’s right to defend itself,” he echoed similar expressions that Obama has uttered on many occasions. But when he added, “and it is right for America to stand with you,” he was offering just a touch more of a free pass for an Israeli attack on Iran than Obama has done. This led to much back-and-forth afterward, but the message was clear: unlike Obama, and unlike George W. Bush before him, Romney harbors no inclination to dampen Netanyahu’s determination to solve his perceived Iran problem through force of arms. And, since an Israeli strike on Iran inevitably would thrust America into the resulting conflict, the Romney-Senor expressions, taken together, moved America that much closer to another Mideast war. Arguably, this is true even if Obama is reelected in November and Romney is tossed to the side of the campaign trail. That’s because the mere expression of such sentiments from a major-party presidential candidate confers an added legitimacy to the idea that the United States would accept or even welcome a unilateral Israeli preemptive attack on another nation, whatever its leaders say in public. Such an attack almost surely would unleash a powerful wave of instability throughout the Middle East, with incalculable consequences for global peace and prosperity. It’s inconceivable that, in such circumstances, America could avoid getting drawn into the maelstrom that would ensue. In the meantime, the economic consequences would be nearly catastrophic as oil prices soared, dealing a heavy blow to an already unsteady global economy. Thus, Romney’s words may have been subtle, but this is foreign-policy mischief on a very large scale. If he becomes president, two of Mitt Romney’s primary responsibilities will be to ensure peace and prosperity in the nation he leads. Those imperatives certainly didn’t seem uppermost in his mind over the past weekend. He may have looked frivolous and unprepared for the office he seeks when he arrived in London last week and, responding to a routine question about the Olympics, promptly demonstrated a tin ear for the nuances of diplomatic expression. But that was child’s play in comparison to what he did in Jerusalem. By David Bromwich, HuffPost, 1 August 2012. Mitt Romney's campaign stop in Jerusalem has been criticized for the grossness of the subservience that the candidate exhibited toward Israel. This reaction was surely factored in by his handlers. Liberals, internationalists, human rights advocates might demur, but Romney's intended audience was none of these people. Nor was it the Arab world, nor was it American voters, with a possible exception for the state of Florida. Romney was aiming to reach two distinct but related target groups: first, a small set of extremely wealthy donors, and second, a group composed of one person, Benjamin Netanyahu. Both have long been potent players in American elections. Both were already helping Romney. It was necessary and useful at this time to cement the alliance in public. Judged in the light of that purpose, Romney's visit must be counted a success. And it was a success in one other respect. The billionaires and the prime minister wanted Romney to bring the United States closer to supporting a war with Iran. Romney obliged, and we are now closer to war. He recognized, he said, the "right" of Israel to defend itself. Who ever denied that right? He meant: the righteousness of a preventive attack on Iran. This left open the question, Does Iran have the right to defend itself? A question that Americans and Israelis, as effectively propagandized as we have been, can be trusted not even to ask. So Romney's intervention in Jerusalem amounted to approval of war -- and a war before November if Netanyahu happens to find that desirable. As a candidate in an election season, Romney gave the green light to a power whose engagement in war would involve the United States. Nothing like this has ever happened before in American politics. But then, there has never been anything in history remotely like the present relationship between the United States and Israel. President Obama, who is thought to be lukewarm by Romney's supporters, in March described our alliance with Israel as "sacrosanct." A month earlier, he had assured Israel and its warmest American partisans that his administration was marching in "lockstep" with Israel in our approach to Iran. All this Obama said and did in deference to Benjamin Netanyahu and without regard to American interests. For he had been told by the CIA that Iran is not working at present on a nuclear weapon, and he was warned by the Pentagon that a war with Iran would be a regional disaster for the United States. Even so, he gave Netanyahu in effect a yellow light: proceed with caution. And to sweeten the transaction, he promised to issue no traffic ticket if Israel speeds up. It was the same at this year's AIPAC convention where Obama again assured Netanyahu: "I have Israel's back." A corny line from the playbook of the younger Bush, suggesting a false analogy between a gunfight and a world war, but Obama at the start of an election year knew very well what the script called for. It has been said by members of the Israel lobby that Obama's actions speak louder than his words, and that his actions have hurt Israel. Let us recall some of the actions. In response to the onslaught on Gaza in December-January 2008-2009, in which 1,300 Palestinians were killed and 13 Israelis, Obama observed a silence which he has never broken. When, in November 2010, Netanyahu balked at the proposal of a 90-day partial extension of the freeze on West Bank settlement expansion, Obama offered twenty F-35 fighter jets if he would change his mind; Netanyahu refused, and Obama gave him the jets anyway. Only a week ago, the president donated another $70 million, on top of U.S. assistance already given, to build up the Israeli "Iron Dome" defense against rockets. Yet it is felt that Obama's love of Israel has been insufficiently demonstrative. The reason is simple but it is seldom mentioned quite candidly. Twice, in the last four years, this president lapsed from the post-1992 American protocol toward Israel of undiluted flattery and largesse. In June 2009 he called for a settlement freeze, and in May 2011 he spoke of the 1967 lines as the starting point for the creation of an independent Palestine. Now, the de facto policy of the Netanyahu government is annexation of the West Bank. These diplomatic hints and reminders from the president were therefore as unwelcome as they were unexpected. As for Iran, Israelis themselves (except Netanyahu and those in his immediate circle) are a good deal more cautious than their American neoconservative supporters. At a public meeting in April, in the Israeli city of Kfar Saba, Yuval Diskin, who in 2011 retired as head of Shin Bet (the Israeli FBI), said that he had "no faith" in Netanyahu's policy or his instincts on Iran. Two days later the former chief of Mossad, Meir Dagan, emphatically concurred and praised Diskin for his honesty. What does it mean for an American like Romney, unskilled in international politics and innocent of the complexities of the Middle East, to back the pressure now being exerted by Netanyahu against the advice of the American president and against the advice of high-ranking intelligence and military officers in Israel? It means that Romney is not a friend of Israel so much as he is a friend of Netanyahu. Or rather, for Romney, as for the billionaires he had in tow, the personal is political. For them, Netanyahu is Israel. A point to which we shall return. Joe Biden and Leon Panetta in recent months have taken care to issue statements along the lines of Obama himself, implying American avoidance of any war short of necessity, but adding that Israel is a sovereign nation and America does not pretend to control it. And yet we give Israel fighter jets, Iron Dome technology, and more than three billion dollars a year in foreign aid. If there is ever again an American president capable of deciding to concern himself more with the soundness of policy than with his chances in the next election, that president will have considerable control over Israel. Obama, however, works slowly and he starts worrying about the next election a year ahead. That does not leave much margin for inventive policy or persuasion. On the Middle East, his boldness in theory and timidity in practice seems to have roused the adventurism of Romney's neoconservative advisers. But Obama does occasionally offer convincing signs of not wanting the war with Iran that the Pentagon says would be a disaster. Romney, by contrast, with his quarterback-audible in Jerusalem, signaled that a war would be fine with him. What are the actual stakes for Israel? Netanyahu has called the possession of a nuclear weapon by Iran an "existential threat," but nobody known for sanity, including his own defense minister Ehud Barak, has agreed with him about this. An existential threat conjures an image of war-loving Iran poised on the brink of exterminating the Jews of Israel. The evidence for that intention is a statement by the anti-Semitic president of Iran, Mahmoud Ahmadinejad, who did indeed say that history would wipe the "Zionist entity" off the map. What only readers who follow politics are likely to know is that Ahmadinejad is not the most powerful figure in Iran and that after the next election he may be out of a job. The cost to the mullahs of bombing Israel, with a weapon they are not yet close to possessing, would be massive retaliation by Israel, whose nuclear arsenal is estimated between 200 and 300 weapons. That picture is so improbable that Netanyahu has been forced to adopt a different stratagem. On the argument that he now presses, even low-enrichment uranium is a danger in the hands of Iran. Obama and the European capitals, in the October 2009 negotiations, had offered Iran an agreement allowing 5% enrichment, and at the time Netanyahu raised no public objection. He now says he will not settle for any enrichment at all by Iran. He is lowering the threshold to justify an attack. And Romney last week in Jerusalem, with the support of his war party advisers, fell into step in with the Netanyahu ultimatum. Nothing less than zero enrichment will satisfy Mitt Romney. Still, if Iran is not an existential threat, why is the wish to attack Iran so strong in Netanyahu and his right-wing coalition? The reason is fear of Iran as a regional competitor. A powerful hostile nation induces any rival to hesitate before wielding power as often as it would like. An Iran with a serious armed force could not equal Israel, or thoroughly deter Israel, but it would doubtless inhibit Israeli military ventures in the Arab world. And that, for an advocate of Greater Israel, is intolerable. Israeli designs must go forward unhindered. So Netanyahu is asking for American support against Iran for much the same reason that his predecessor Yitzhak Shamir wanted America to go to war with Iraq in 1991. Iraq, like Iran, was pursuing nuclear research but had no nuclear weapon. In 1991, however, Iraq did have a formidable army, and Israel had an interest in seeing that army destroyed. Some side effects of the elimination of Iraq as a military power are now a familiar part of the regional landscape: the air, land, and sea blockade on Gaza, and the Israeli annexation of the West Bank, which proceeds with fresh evictions every day. Romney was asked by a reporter at the Western Wall if he endorsed the annexation of the West Bank by Israel. The question was put to him three times, and three times Romney ignored it. The channeling to the settlers of West Bank aquifers, the uprooting of Palestinian olive groves, the expulsion of Bedouin shepherds from their grazing lands all are done under the ostensible explanation of military necessity by Israel. Anyone who recalls the Jim Crow society of the American South in the 1950s knows the real purpose of such actions: to assert and make visible by force the superiority of one caste of people over another, and to drive the inferior people from places of value. At the King David Hotel, Romney addressed campaign donors from America who had traveled thousands of miles to another country to affirm their loyalty. But loyalty to what and whom? Are the United States and Israel the same country? This was one of the weirdest exhibitions of transnational financial muscle in recorded history. It probably has no precedent. Will it have a sequel? Let us try a thought experiment. Imagine the American reaction to an American presidential candidate who calls a meeting of wealthy Italian-Americans in Vatican City in order to declare their unconditional fidelity to the Pope. The United States was once the country of protestant nonconformity. What is happening to us? The ad-lib comments that Romney spoke on this occasion have received plenty of notice, but they cannot be quoted too often. They display with a fine economy the good-natured insolence of Romney himself alongside the conventional racism of the Republican Party and its roots in Social Darwinism. "As I come here and I look out over this city and consider the accomplishments of the people of this nation, I recognize the power of at least culture and a few other things." Among the other things of course was "the hand of providence," the non-denominational shorthand notation for Tetragrammaton or Jesus Yahweh Smith. But the key word here was culture. There is a good culture, we know, of self-respect and commercial success and technology. And that culture looks a lot like Israel. Then there is a culture of poverty and inertia and resentment, and it looks like the West Bank. The occupation has nothing to do with the difference. For the slow-of-wit, Romney clarified his idea by adding that a similar disparity exists between other neighboring countries like Mexico and the United States. Note that this division between the deserving and less deserving peoples scarcely departs from the old anti-Semitism. It uses the same clichés: the despised people are crafty but sullen, lacking in Western energy, discipline, and refinement. The prejudice has now been turned against another Semitic tribe, the Palestinians. The Jews of Israel, by contrast, are praised for their adaptation to the ways of commerce, and are treated as honorary Christians. Pass from Romney to his audience. These people, as reported by the New York Times, were high net worth individuals whose total holdings may well have approached half a trillion. We will never know, since they have multiple accounts in the Cayman Islands, where some of them also have alternate private residences. But it is worth following up a few details of the Times story by Jodi Rudoren and Ashley Parker. "Sheldon Adelson...wore a pin that said 'Romney' in Hebrew letters," yet Adleson is troubled, these days, by an investigation of the links between his casino holdings in Las Vegas and Macau. "Much of Mr. Adelson's casino profits that go to him come from his casino in Macau," John McCain pointed out in a recent interview. "Maybe," McCain speculated, "in a roundabout way, foreign money is coming into an American political campaign." Also not so roundabout. The money coming from the crowd at the King David Hotel evidently came from Americans and was going back into an American campaign. What, then, was the symbolic importance of having it routed through an event in Israel timed to begin at the end of the religious day of mourning Tisha B'Av? Other members of the Romney-Netanyahu billionaire entourage were touched on briefly in the Times account. Cheryl Halpern, a New Jersey Republican and big party donor, was named by George W. Bush the successor to Kenneth Tomlinson as chairman of the Corporation for Public Broadcasting, and served in that office during the years 2005-07. She disciplined NPR for political bias and, along with Tomlinson, succeeded in bending the tone and content of NPR toward the platitudes and human interest by which it is mainly known today. John Miller, the chief executive of the National Beef Packing Company, helped Tagg Romney and Spencer Zwick to find the $244 million they needed for the startup of a private equity fund, Solamere Capital, which in its early days shared an address with the Romney campaign headquarters. Paul Singer, founder of the $20 billion hedge fund Elliott Associates and its affiliate Elliott Management, operates a "vulture fund" that specializes in buying up third-world debt. Elliott trawls for assets that have drastically fallen in value, and then sues countries for full value, with a legal threat if they refuse. It goes after vulnerable nations like Panama, Peru, Argentina, and Congo, offering rigor-mortis prices to the panicked holders of collapsing bonds, before it compels the derelict governments to buy them back at a swollen price or suffer international disgrace and an utter loss of autonomy at the hands of financiers. The ingenuity and detective work that goes into Elliott is perhaps another clue to what Romney means by culture. But where Romney's Bain bought, gutted, repackaged and sold factories and store chains, and held in thrall occasionally the happiness of a town or a pension plan, Elliott transfixes the life holdings of large tracts of the world, including tribes and peoples whose names its officers will not have known how to pronounce until they began to reduce them to finance fodder. Will the vulture funds take out a second mortgage on the Parthenon? "Elliott hasn't [yet] built up a hold-out position in Greek debt, according to an individual close to the firm. Last year it profited instead by trading Greek credit default swaps." These people, so important because of their money, are united in their belief that Israel stands in grave peril because of the neglect or hostility of Barack Obama. Yet Obama's actions toward Israel -- the gifts of weapons and security systems, the reflex vetoes on U.N. resolutions -- have been dangerous if anything by their one-sided solicitousness on behalf of Israel. Obama has conducted himself toward Israel, in fact, as he has acted toward establishments like the American military and the Wall Street banks and brokerage houses. He mentions his power of refusal chiefly in order to show that, in some technical sense, that power does exist. But his use of the power has been, in all of these contexts, nominal and decorative. Again and again he has said he could bring results and has not brought them: tougher bank regulations, faster withdrawal from Afghanistan, "hands-on" presidential engagement in negotiations to create a Palestinian state and achieve peace with Iran. In all of these settings, Obama's practice has been hands-off, no matter what he may have pledged. Still, it is true that Romney would be a distinct improvement from the point of view of Netanyahu. Rhetorically, as well as in fact, he would be hands-on in Israel's favor at all times. Because the Tisha B'Av spectacle was so bizarre, almost grotesque, one cannot help asking again: why were those American donors going to Israel to cheer an American candidate in an American election? Is being an American no longer good enough? In a speech in Israel in 2010, Sheldon Adelson regretted that "the uniform that I wore in the military unfortunately was not an Israeli uniform, it was an American uniform." Such an attitude of abasement or self-subordination toward Israel, often accompanied by a peculiar vicarious nostalgia, is not confined to American Jews or billionaires. On arriving in Jerusalem in March 2010, Joe Biden said "It's good to be home." What was he thinking? As Netanyahu looks at these postures of genuflection, it is no wonder that he feels himself entitled to criticize an American president in front of the American Congress, or to "vet" Republican vice-presidential hopefuls such as Chris Christie and Rob Portman. If Netanyahu is now the most effective bundler in the Republican Party, why should he not have a say in the party's choice of a vice-president? George Washington thought that being Americans should be enough for us. In his great Farewell Address, he also gave some reasons why attachment to a foreign power, no matter how sentimental the affection, could only impair American liberty and independence and serve to draw the country into unnecessary wars. So likewise, a passionate attachment of one nation for another produces a variety of evils. Sympathy for the favorite nation, facilitating the illusion of an imaginary common interest in cases where no real common interest exists, and infusing into one the enmities of the other, betrays the former into a participation in the quarrels and wars of the latter without adequate inducement or justification. It leads also to concessions to the favorite nation of privileges denied to others which is apt doubly to injure the nation making the concessions; by unnecessarily parting with what ought to have been retained, and by exciting jealousy, ill-will, and a disposition to retaliate, in the parties from whom equal privileges are withheld. And it gives to ambitious, corrupted, or deluded citizens (who devote themselves to the favorite nation), facility to betray or sacrifice the interests of their own country, without odium, sometimes even with popularity. Can there be any doubt what George Washington would have made of the scene of Mitt Romney and his high-rolling backers at the King David Hotel? A contrary understanding has become so familiar in our politics that it is hard to recall when anyone last worried about excessive partiality for one nation. We should expect no compunction, no reservation, no self-consciousness regarding the "passionate attachment" to a "favorite nation" by Romney and his foreign policy team. Part of the reason lies in the composition of the team itself. They are, to a man, alumni of the Cheney circle and the post-2001 Patriot Act security establishment, and close affiliates of the Israel lobby. But another reason for the partiality goes far back in Romney's own life. He has been a friend of Netanyahu since their younger American corporate years together; the two have gone to each other for advice ever since, as Michael Barbaro disclosed in an April 8 story in the New York Times: they consult casually and with implicit trust, in every walk of political practice, from discussing the right strategy against Iran to canvassing the sharpest method for cutting state pensions. They share, said Barbaro (with less irony than he needed), "the same profoundly analytical view of the world." "Mr. Romney has suggested that he would not make any significant policy decisions about Israel without consulting Mr. Netanyahu -- a level of deference that could raise eyebrows given Mr. Netanyahu's polarizing reputation, even as it appeals to the neoconservatives and evangelical Christians who are fiercely protective of Israel." Mr. Romney criticized Mr. Gingrich for making a disparaging remark about Palestinians, declaring: "Before I made a statement of that nature, I'd get on the phone to my friend Bibi Netanyahu and say: 'Would it help if I say this? What would you like me to do?'" "What would you like me to do." Those are the words of our intendant decider, and he means to address them, with an implied vow of fidelity, to the leader of another country. Can we read Washington's words of 1796 addressed "to the people of the United States," and compare Romney's words addressed to his donors in Jerusalem, and not feel a deep disturbance? What would you like me to do?
2019-04-24T18:51:46Z
https://andysundberg.weebly.com/the-works/drumming-up-money-by-beating-the-drums-for-yet-another-war
Im Forschungsfeld „Ressourcen aus dem Ozean“ untersuchen Biologen, Geologen, Juristen und Wirtschaftswissenschaftler die Potenziale von Rohstoffen im Meeresboden und die Entwicklung von lebenden marinen Ressourcen. Die Wissenschaftlerinnen und Wissenschaftler suchen neue Wege für Governance-Strukturen und ein besseres Management dieser Ressourcen. Seit Jahrtausenden nutzen die Menschen die Ozeane. Die Ozeane liefern Nahrung, sie dienen als Handelswege, sie werden als Abfallbecken genutzt. Seit einigen Jahrzehnten werden im Ozean auch fossile Energieträger und mineralische Rohstoffe gefördert. Eine neuere Entwicklung ist die Ausbeutung von Gashydraten, die viel Methan enthalten. Die Nutzung von Ressourcen aus dem Ozean und die damit verbundenen Probleme stehen im Fokus dieses Forschungsfeldes. Die Nutzungs- und Eigentumsrechte im Ozean sind schwach definiert, es fehlen für weite Gebiete des Ozeans klare Gesetze und Regularien. Bestehende Vereinbarungen reichen oft nicht aus. Der lückenhafte Schutz führt dazu, dass die Ressourcen des Ozeans nicht nachhaltig genutzt werden. Im Forschungsfeld „Rohstoffe aus dem Ozean“ stehen zwei Zielsetzungen im Mittelpunkt: Zum einen sollen die Funktionsweisen und Potenziale mariner Ressourcen untersucht werden. Zum anderen sollen Regeln für das Management und die Steuerung der Ressourcennutzung entwickelt werden. Exemplarisch werden zwei Rohstoffarten betrachtet: Geologische Rohstoffe, wie Erzvorkommen in der Tiefsee oder Gashydratanreicherungen, und biologische Ressourcen, wie Fische und andere Organismen. Scott, R., Biastoch, A., Agamboue, P. D., Bayer, T., Boussamba, F. L., Formia, A., Godley, B. J., Mabert, B. D. K., Manfoumbi, J. C., Schwarzkopf, F. U., Sounguet, G. P., Wagner, P. and Witt, M. J. (2017) Spatio-temporal variation in ocean current-driven hatchling dispersion: Implications for the world's largest leatherback sea turtle nesting region Diversity and Distributions . DOI 10.1111/ddi.12554. Beermann, O., Garbe-Schönberg, D., Bach, W. and Holzheid, A. (2017) Time-resolved interaction of seawater with gabbro: An experimental study of rare-earth element behavior up to 475°C, 100MPa Geochimica et Cosmochimica Acta, 197 . pp. 167-192. DOI 10.1016/j.gca.2016.10.016. Arevalo-Martinez, D. L., Kock, A., Steinhoff, T., Brandt, P., Dengler, M., Fischer, T., Körtzinger, A. and Bange, H. W. (2017) Nitrous oxide during the onset of the Atlantic Cold Tongue Journal of Geophysical Research - Oceans, 122 (1). pp. 171-184. DOI 10.1002/2016JC012238. Hillman, J. I. T., Lamarche, G., Pallentin, A., Pecher, I. A., Gorman, A. R. and Schneider von Deimling, J. (2017) Validation of automated supervised segmentation of multibeam backscatter data from the Chatham Rise, New Zealand Marine Geophysical Research . DOI 10.1007/s11001-016-9297-9. Geersen, J., Scholz, F., Linke, P., Schmidt, M., Lange, D., Behrmann, J. H., Völker, D. and Hensen, C. (2016) Fault zone controlled seafloor methane seepage in the rupture area of the 2010 Maule Earthquake, Central Chile Geochemistry, Geophysics, Geosystems, 17 (11). pp. 4802-4813. DOI 10.1002/2016GC006498. Köster, F. W., Huwer, B., Hinrichsen, H. H., Neumann, V., Makarchouk, A., Eero, M., von Dewitz, B., Hüssy, K., Tomkiewicz, J., Margonski, P., Temming, A., Hermann, J. P., Oesterwind, D., Dierking, J., Kotterba, P. and Plikshs, M. (2016) Eastern Baltic cod recruitment revisited—dynamics and impacting factors ICES Journal of Marine Science . fsw172. DOI 10.1093/icesjms/fsw172. Hoving, H. J. T. and Robison, B. H. (2016) Deep-sea in situ observations of gonatid squid and their prey reveal high occurrence of cannibalism Deep-Sea Research Part I-Oceanographic Research Papers, 116 . pp. 94-98. DOI 10.1016/j.dsr.2016.08.001. Listmann, L., LeRoch, M., Schlüter, L., Thomas, M. K. and Reusch, T. B. H. (2016) Swift thermal reaction norm evolution in a key marine phytoplankton species Evolutionary Applications, 9 (9). pp. 1156-1164. DOI 10.1111/eva.12362. Froese, R., Winker, H., Gascuel, D., Sumaila, U. R. and Pauly, D. (2016) Minimizing the Impact of Fishing Fish and Fisheries, 17 (3). pp. 785-802. DOI 10.1111/faf.12146. Opitz, S., Hoffmann, J., Quaas, M., Matz-Lück, N., Binohlan, C. and Froese, R. (2016) Assessment of MSC-certified fish stocks in the Northeast Atlantic Marine Policy, 71 . pp. 10-14. DOI 10.1016/j.marpol.2016.05.003. Ma, X., Jing, Z., Chang, P., Liu, X., Montuoro, R., Small, R. J., Bryan, F. O., Greatbatch, R. J., Brandt, P., Wu, D., Lin, X. and Wu, L. (2016) Western boundary currents regulated by interaction between ocean eddies and the atmosphere Nature, 535 (7613). pp. 533-537. DOI 10.1038/nature18640. Schlüter, L., Lohbeck, K. T., Gröger, J. P., Riebesell, U. and Reusch, T. B. (2016) Long-term dynamics of adaptive evolution in a globally important phytoplankton species to ocean acidification Science Advances, 2 (7). e1501660-e1501660. DOI 10.1126/sciadv.1501660. Hoving, H. J. T., Arkhipkin, A. I., Laptikhovsky, V. V. and Marian, J. E. A. R. (2016) Mating tactics in the sub-Antarctic deep-sea squid Onykia ingens (Cephalopoda: Onychoteuthidae) Polar Biology, 39 (7). pp. 1319-1328. DOI 10.1007/s00300-015-1856-z. Froese, R., Walters, C., Pauly, D., Winker, H., Weyl, O. L. F., Demirel, N., Tsikliras, A. C. and Holt, S. J. (2016) A critique of the balanced harvesting approach to fishing ICES Journal of Marine Science, 73 (6). pp. 1640-1650. DOI 10.1093/icesjms/fsv122. Javidpour, J., Cipriano-Maack, A. N., Mittermayr, A. and Dierking, J. (2016) Temporal dietary shift in jellyfish revealed by stable isotope analysis Marine Biology, 163 (5, 112). pp. 1-9. DOI 10.1007/s00227-016-2892-0. Froese, R., Coro, G., Kleisner, K. and Demirel, N. (2016) Revisiting Safe Biological Limits in Fisheries Fish and Fisheries, 17 (1). pp. 193-209. DOI 10.1111/faf.12102. Olsen, J. L., Rouze, P., Verhelst, B., Lin, Y. C., Bayer, T., Collen, J., Dattolo, E., De Paoli, E., Dittami, S., Maumus, F., Michel, G., Kersting, A., Lauritano, C., Lohaus, R., Töpel, M., Tonon, T., Vanneste, K., Amirebrahimi, M., Brakel, J., Boström, C., Chovatia, M., Grimwood, J., Jenkins, J. W., Jueterbock, A., Mraz, A., Stam, W. T., Tice, H., Bornberg-Bauer, E., Green, P. J., Pearson, G. A., Procaccini, G., Duarte, C. M., Schmutz, J., Reusch, T. B. H. and Van de Peer, Y. (2016) The genome of the seagrass Zostera marina reveals angiosperm adaptation to the sea Nature, 530 . pp. 331-335. DOI 10.1038/nature16548. Hinrichsen, H. H., von Dewitz, B., Dierking, J., Haslob, H., Makarchouk, A., Petereit, C. and Voss, R. (2016) Oxygen depletion in coastal seas and the effective spawning stock biomass of an exploited fish species Royal Society Open Science, 3 (1). p. 150338. DOI 10.1098/rsos.150338. Bertram, C. and Quaas, M. (2016) Biodiversity and Optimal Multi-species Ecosystem Management Environmental and Resource Economics . pp. 1-30. DOI 10.1007/s10640-015-9988-8. Quaas, M., Reusch, T. B. H., Schmidt, J., Tahvonen, O. and Voss, R. (2016) It is the economy, stupid! Projecting the fate of fish populations using ecological-economic modeling Global Change Biology, 22 (1). pp. 264-270. DOI 10.1111/gcb.13060. Hoffmann, J. and Quaas, M. (2016) Common Pool Politics and Inefficient Fishery Management Environmental and Resource Economics, 63 (1). pp. 79-93. DOI 10.1007/s10640-014-9842-4. Chen, X. G., Lyu, S. S., Garbe-Schönberg, D., Lebrato, M., Li, X., Zhang, H. Y., Zhang, P. P., Chen, C. T. A. and Ye, Y. (2016) Heavy metals from Kueishantao shallow-sea hydrothermal vents, offshore northeast Taiwan Journal of Marine Systems . DOI 10.1016/j.jmarsys.2016.11.018. Froese, R., Dierking, J., Matz-Lück, N., Opitz, S., Quaas, M. and Reusch, T. B. H. (2016) Warnung vor dem Zusammenbruch des Dorschbestandes in der westlichen Ostsee . GEOMAR Helmholtz-Zentrum für Ozeanforschung, Kiel, Germany, 6 pp. Groeneveld, R. A. and Quaas, M. F. (2016) Promoting selective fisheries through certification? An analysis of the PNA unassociated-sets purse seine fishery Fisheries Research, 182 . pp. 69-78. Kedzior, S., Buß, A., Schneider, B., Schneider von Deimling, J., Sültenfuß, J., Walter, M., Mertens, C. and Rehder, G. (2016) Geochemical observations within the water column at the CO2 -rich hydrothermal systems Hatoma Knoll and Yonaguni Knoll IV, in the southern Okinawa Trough Journal of Geophysical Research: Oceans, 121 (9). pp. 6618-6634. DOI 10.1002/2016JC012003. Michael, K., Kreiss, C. M., Hu, M. Y., Koschnick, N., Bickmeyer, U., Dupont, S., Pörtner, H. O. and Lucassen, M. (2016) Adjustments of molecular key components of branchial ion and pH regulation in Atlantic cod (Gadus morhua) in response to ocean acidification and warming Comparative Biochemistry and Physiology Part B: Biochemistry and Molecular Biology, 193 . pp. 33-46. DOI 10.1016/j.cbpb.2015.12.006. Purser, A., Marcon, Y., Hoving, H. J. T., Vecchione, M., Piatkowski, U., Eason, D., Bluhm, H. and Boetius, A. (2016) Association of deep-sea incirrate octopods with manganese crusts and nodule fields in the Pacific Ocean Current Biology, 26 (24). R1268-R1269. DOI 10.1016/j.cub.2016.10.052. Rickels, W., Dovern, J. and Quaas, M. (2016) Beyond fisheries: Common-pool resource problems in oceanic resources and services Global Environmental Change-Human and Policy Dimensions, 40 . pp. 37-49. DOI http://dx.doi.org/10.1016/j.gloenvcha.2016.06.013. Schönke, M., Feldens, P., Wilken, D., Papenmeier, S., Heinrich, C., von Deimling, J. S., Held, P. and Krastel, S. (2016) Impact of Lanice conchilega on seafloor microtopography off the island of Sylt (German Bight, SE North Sea) Geo-Marine Letters . DOI 10.1007/s00367-016-0491-1. Laurila, T. E., Hannington, M. D., Leybourne, M., Petersen, S., Devey, C. W. and Garbe-Schönberg, D. (2015) New Insights into the mineralogy of the Atlantis II deep metalliferous sediments, Red Sea Geochemistry, Geophysics, Geosystems, 16 (12). pp. 4449-4478. DOI 10.1002/2015GC006010. Larsen, T., Bach, L. T., Salvatteci, R., Wang, Y. V., Andersen, N., Ventura, M. and McCarthy, M. D. (2015) Assessing the potential of amino acid 13 patterns as a carbon source tracer in marine sediments: effects of algal growth conditions and sedimentary diagenesis Biogeosciences (BG), 12 (16). pp. 4979-4992. DOI 10.5194/bg-12-4979-2015. Hoving, H. J. T., Laptikhovsky, V. V. and Robison, B. H. (2015) Vampire squid reproductive strategy is unique among coleoid cephalopods Current Biology, 25 (8). R322-R323. DOI 10.1016/j.cub.2015.02.018. Appel, E., Heepe, L., Lin, C. P. and Gorb, S. (2015) Ultrastructure of dragonfly wing veins: composite structure of fibrous material supplemented by resilin Journal of Anatomy, 227 (4). pp. 561-582. Baio, J. E., Spinner, M., Jaye, C., Fischer, D. A., Gorb, S. and Weidner, T. (2015) Evidence of a molecular boundary lubricant at snakeskin surfaces Journal of the Royal Society Interface, 12 (113). Brehm, G., Fischer, M., Gorb, S., Kleinteich, T., Kuehn, B., Neubert, D., Pohl, H., Wipfler, B. and Wurdinger, S. (2015) The unique sound production of the Death's-head hawkmoth (Acherontia atropos (Linnaeus, 1758)) revisited Science of Nature, 102 (7-8). Ditsche, P., Gorb, E., Mayser, M., Gorb, S., Schimmel, T. and Barthlott, W. (2015) Elasticity of the hair cover in air-retaining Salvinia surfaces Applied Physics a-Materials Science & Processing, 121 (2). pp. 505-511. Drotlef, D. M., Appel, E., Peisker, H., Dening, K., del Campo, A., Gorb, S. and Barnes, W. J. P. (2015) Morphological studies of the toe pads of the rock frog, Staurois parvus (family: Ranidae) and their relevance to the development of new biomimetically inspired reversible adhesives Interface Focus, 5 (1). Eggs, B., Wolff, J. O., Kuhn-Nentwig, L., Gorb, S. and Nentwig, W. (2015) Hunting Without a Web: How Lycosoid Spiders Subdue their Prey Ethology, 121 (12). pp. 1166-1177. Filippov, A. E. and Gorb, S. (2015) Spatial model of the gecko foot hair: functional significance of highly specialized non-uniform geometry Interface Focus, 5 (1). Filippov, A., Kovalev, A., Matsumura, Y. and Gorb, S. (2015) Male penile propulsion into spiraled spermathecal ducts of female chrysomelid beetles: A numerical simulation approach Journal of Theoretical Biology, 384 . pp. 140-146. Frantsevich, L., Gorb, S., Radchenko, V. and Gladun, D. (2015) Lehr's fields of campaniform sensilla in beetles (Coleoptera): Functional morphology. III. Modification of elytral mobility or shape in flying beetles Arthropod Structure & Development, 44 (2). pp. 113-120. Frantsevich, L., Gorb, S., Radchenko, V., Gladun, D., Polilov, A., Cherney, L., Browdy, V. and Kovalev, M. (2015) Lehr's fields of campaniform sensilla in beetles (Coleoptera): Functional morphology. II. Wing reduction and the sensory field Arthropod Structure & Development, 44 (1). pp. 1-9. Friedemann, K., Kunert, G., Gorb, E., Gorb, S. and Beutel, R. G. (2015) Attachment forces of pea aphids (Acyrthosiphon pisum) on different legume species Ecological Entomology, 40 (6). pp. 732-740. Froese, R., Demirel, N. and Sampang, A. (2015) An overall indicator for the good environmental status of marine waters based on commercially exploited species Marine Policy, 51 . pp. 230-237. DOI 10.1016/j.marpol.2014.07.012. Hu, M. Y. A., Hwang, P. P. and Tseng, Y. C. (2015) Recent advances in understanding trans-epithelial acid-base regulation and excretion mechanisms in cephalopods Tissue Barriers, 3 (4). e1064196. DOI 10.1080/21688370.2015.1064196. Kumar, A., Henrissat, B., Arvas, M., Syed, M. F., Thieme, N., Benz, J. P., Sorensen, J. L., Record, E., Poeggeler, S. and Kempken, F. (2015) De Novo Assembly and Genome Analyses of the Marine-Derived Scopulariopsis brevicaulis Strain LF580 Unravels Life-Style Traits and Anticancerous Scopularide Biosynthetic Gene Cluster Plos One, 10 (10). Lade, S. J., Niiranen, S., Hentati-Sundberg, J., Blenckner, T., Boonstra, W. J., Orach, K., Quaas, M., Oesterblom, H. and Schlueter, M. (2015) An empirical model of the Baltic Sea reveals the importance of social dynamics for ecological regime shifts Proceedings of the National Academy of Sciences of the United States of America, 112 (35). pp. 11120-11125. Lukassen, M. B., Saei, W., Sondergaard, T. E., Tamminen, A., Kumar, A., Kempken, F., Wiebe, M. G. and Sorensen, J. L. (2015) Identification of the Scopularide Biosynthetic Gene Cluster in Scopulariopsis brevicaulis Marine Drugs, 13 (7). pp. 4331-4343. Voss, R., Quaas, M., Schmidt, J. O. and Kapaun, U. (2015) Ocean Acidification May Aggravate Social-Ecological Trade-Offs in Coastal Fisheries Plos One, 10 (3). Laurila, T. E., Hannington, M. D., Petersen, S. and Garbe-Schönberg, D. (2014) Trace metal distribution in the Atlantis II Deep (Red Sea) sediments Chemical Geology, 386 . pp. 80-100. DOI 10.1016/j.chemgeo.2014.08.009. Kramer, A., Paun, L., Imhoff, J. F., Kempken, F. and Labes, A. (2014) Development and Validation of a Fast and Optimized Screening Method for Enhanced Production of Secondary Metabolites Using the Marine Scopulariopsis brevicaulis Strain LF580 Producing Anti-Cancer Active Scopularide A and B PLoS ONE, 9 (7). e103320. DOI 10.1371/journal.pone.0103320. Costello, M. J., Appeltans, W., Bailly, N., Berendsohn, W. G., de Jong, Y., Edwards, M., Froese, R., Huettmann, F., Los, W., Mees, J., Segers, H. and Bisby, F. A. (2014) Strategies for the sustainability of online open-access biodiversity databases Biological Conservation, 173 . pp. 155-165. DOI 10.1016/j.biocon.2013.07.042. Froese, R., Thorson, J. and Reyes Jr., R. B. (2014) A Bayesian approach for estimating length-weight relationships in fishes Journal of Applied Ichthyology, 30 (1). pp. 78-85. DOI 10.1111/jai.12299. Al Bitar, L., Gorb, S., Zebitz, C. P. W. and Voigt, D. (2014) Egg adhesion of the codling moth Cydia pomonella L. (Lepidoptera, Tortricidae) to various substrates: II. Fruit surfaces of different apple cultivars Arthropod-Plant Interactions, 8 (1). pp. 57-77. Dierking, J., Phelps, L., Praebel, K., Ramm, G., Prigge, E., Borcherding, J., Brunke, M. and Eizaguirre, C. (2014) Anthropogenic hybridization between endangered migratory and commercially harvested stationary whitefish taxa (Coregonus spp.) Evolutionary Applications, 7 (9). pp. 1068-1083. DOI 10.1111/eva.12166. Frantsevich, L., Gorb, S., Radchenko, V., Gladun, D. and Polilov, A. (2014) Lehr's fields of campaniform sensilla in beetles (Coleoptera): Functional morphology. I. General part and allometry Arthropod Structure & Development, 43 (6). pp. 523-535. Laurila, T. E., Hannington, M. D., Petersen, S. and Garbe-Schönberg, D. (2014) Early depositional history of metalliferous sediments in the Atlantis II Deep of the Red Sea: Evidence from rare earth element geochemistry Geochimica et Cosmochimica Acta, 126 . pp. 146-168. DOI 10.1016/j.gca.2013.11.001. Martell, S. and Froese, R. (2013) A simple method for estimating MSY from catch and resilience Fish and Fisheries, 14 (4). pp. 504-514. DOI 10.1111/j.1467-2979.2012.00485.x. Braack, M. and Nafa, K. (2013) A monolithic finite element discretization for coupled Darcy-Stokes flow PAMM, 13 (1). pp. 243-244. DOI 10.1002/pamm.201310117. Braack, M. and Prohl, A. (2013) STABLE DISCRETIZATION OF A DIFFUSE INTERFACE MODEL FOR LIQUID-VAPOR FLOWS WITH SURFACE TENSION Esaim-Mathematical Modelling and Numerical Analysis-Modelisation Mathematique Et Analyse Numerique, 47 (2). pp. 404-423. Braack, M. and Taschenberger, N. (2013) HIERARCHICAL A POSTERIORI RESIDUAL BASED ERROR ESTIMATORS FOR BILINEAR FINITE ELEMENTS International Journal of Numerical Analysis and Modeling, 10 (2). pp. 466-480. Froese, R. and Proelss, A. (2013) Is a stock overfished if it is depleted by overfishing? A response to the rebuttal of Agnew et al. to Froese and Proelss “Evaluation and legal assessment of certified seafood” Marine Policy, 38 . pp. 548-550. DOI 10.1016/j.marpol.2012.07.001. Froese, R., Zeller, D., Kleisner, K. and Pauly, D. (2013) Worrisome trends in global stock status continue unabated: a response to a comment by R.M. Cook on "What catch data can tell us about the status of global fisheries" Marine Biology, 160 (9). pp. 2531-2533. DOI 10.1007/s00227-013-2185-9. Carpio, J. and Braack, M. (2012) The effect of numerical methods on the simulation of mid-ocean ridge hydrothermal models Theoretical and Computational Fluid Dynamics, 26 (1-4). pp. 225-243. Froese, R. and Proelß, A. (2012) Evaluation and Legal Assessment of Certified Seafood Marine Policy, 36 . pp. 1284-1289. DOI 10.1016/j.marpol.2012.03.017. Froese, R. and Quaas, M. (2012) Mismanagement of the North Sea cod by the Council of the European Union Ocean & Coastal Management, 70 . pp. 54-58. DOI 10.1016/j.ocecoaman.2012.04.005. Froese, R., Zeller, D., Kleisner, K. and Pauly, D. (2012) What catch data can tell us about the status of global fisheries Marine Biology, 159 (6). pp. 1283-1292. DOI 10.1007/s00227-012-1909-6. Kleisner, K., Zeller, D., Froese, R. and Pauly, D. (2012) Using global catch data for inferences on the world's marine fisheries Fish and Fisheries, 14 (3). pp. 293-311. DOI 10.1111/j.1467-2979.2012.00469.x. Norse, E. A., Brooke, S., Cheung, W. W. L., Clark, M. R., Ekeland, I., Froese, R., Gjerde, K. M., Haedrich, R. L., Heppell, S. S., Morato, T., Morgan, L. E., Pauly, D., Sumaila, R. and Watson, R. (2012) Sustainability of deep-sea fisheries Marine Policy, 36 (2). pp. 307-320. DOI 10.1016/j.marpol.2011.06.008. Pauly, D. and Froese, R. (2012) Comments on FAO's State of Fisheries and Aquaculture, or 'SOFIA 2010' Marine Policy, 36 (3). pp. 746-752. DOI 10.1016/j.marpol.2011.10.021. Quaas, M. F., Froese, R., Herwartz, H., Requate, T., Schmidt, J. O. and Voss, R. (2012) Fishing industry borrows from natural capital at high shadow interest rates Ecological Economics, 82 . pp. 45-52. DOI 10.1016/j.ecolecon.2012.08.002. Villasante, S., Gascuel, D. and Froese, R. (2012) Rebuilding fish stocks and changing fisheries management, a major challenge for the Common Fisheries Policy reform in Europe Ocean & Coastal Management, 70 . pp. 1-3. DOI 10.1016/j.ocecoaman.2012.07.021. Brandt, P., Funk, A., Hormann, V., Dengler, M., Greatbatch, R. J. and Toole, J. M. (2011) Interannual atmospheric variability forced by the deep equatorial Atlantic Ocean Nature, 473 (7348). pp. 497-500. DOI 10.1038/nature10013. Fricke, H., Hissmann, K., Froese, R., Schauer, J., Plante, R. and Fricke, S. (2011) The population biology of the living coelacanth studied over 21 years Marine Biology, 158 (7). pp. 1511-1522. DOI 10.1007/s00227-011-1667-x. Froese, R. (2011) Fishery reform slips through the net Nature, 475 (7354). p. 7. DOI 10.1038/475007a. Froese, R., Branch, T. A., Proelß, A., Quaas, M., Sainsbury, K. and Zimmermann, C. (2011) Generic harvest control rules for European fisheries Fish and Fisheries, 12 (3). pp. 340-351. DOI 10.1111/j.1467-2979.2010.00387.x. Fisheries-induced evolution refers to genetic changes in fish populations that are induced by the exploitation of fish stocks. Any harvesting of natural populations, including fishing, selects for certain traits in a population (Jorgensen et al. 2007). Size-selectivity of fisheries in particular, leads to a situation where fish that start to reproduce early (i.e., at low size or age) are more likely to have offspring than fish that reproduce late. In addition, though not falling directly under the term fisheries-induced evolution, fishing imposed declines in population size can lead to declines in genetic diversity. Such harvesting-induced changes in mean population traits are inevitable when the traits selected for have a heritable basis, as is almost invariably the case in life-history parameters. It is thus not surprising that more and more case-studies suggest that evolutionary changes take place in harvested fish populations, with potentially dramatic ecological and economic consequences. Interestingly, cases of fisheries-induced evolution have also provided some of the most convincing examples of rapid evolution, i.e., evolution on the time-scale of a few generations , thus stressing that humans may now be the biggest evolutionary force on earth (Palumbi 2001). My proposed work has two specific aims: Aim I is to arrive at a more general understanding of the role and effect size of factors that promote or restrain fisheries-induced evolutionary changes. For this purpose, I propose to conduct a meta-analysis based on published datasets providing direct or indirect evidence for and against fisheries-induced evolution (see details below). Aim II is to specifically assess fisheries-induced trends in maturation reaction norms in the Eastern Baltic cod stock (ICES sub-division 25). I will do so by analyzing the 25-year Baltic cod data-series of the IFM-GEOMAR and the Danish Technical University Institute of Aquatic Resources (DTU Aqua) in the context of environmental and fishery datasets for the same fishing grounds. Economically interesting mineral and metal deposits are situated at the seafloor of active plate margins. Circulating hydrothermal fluids in the oceanic crust that exit at black smoker chimneys at the seafloor are intimately related to the formation of such Submarine Massive Sulphide (SMS) deposits. The proposed work aims at understanding the relation between the tectonic state of Mid Ocean Ridges (MORs) and the location of black smoker vent sites. Using state-of-the-art numerical models we will test if off-axis venting is a natural consequence of seafloor spreading in a tectonic phase, while on-axis venting occurs during magmatic dominated phases. New insights about the position of black smoker chimneys could significantly improve the global systematic exploration of Submarine Massive Sulphide deposits. Successful, commonly accepted fisheries management needs economics! The development of fish populations is usually modeled by time-dependent differential equations. Until now, the analysis of the overfishing problem in resource economics considers ordinary differential equations, and differentiation in space is neglected. In this project we study the research question: To what extent do explicit spatial considerations change the economic analysis of the overfishing problem? To address this question, we use a fishery model including spatial variability which implies the usage of partial differential equations. Such models include the fish reproduction, perishing, movement and the impact of fisheries. We will specifically consider the Pacific skipjack tuna fishery, which is basically an open access resource, yet the stock is in an underexploited state. Employing the spatially explicit mathematical fishery model, we will describe the strategy of a fishing fleet as an economically optimal control problem with the target function of maximizing the present value of profits. We will use the resulting shadow price of the fish stock as a quantitative measure of potential overfishing and study how it depends on central biological and economical parameters. Our central hypothesis is that the spatial behavior of the fish population explains why fishing is so costly that harvesting is at a relatively sustainable level even under conditions of open access. Invasion of Mediterranean mussels into a warming Baltic Sea: will hybridization with local mussels impact emerging aquaculture enterprises? Recent evidence for the occurence of invasive Mediterranean blue mussels (Mytilus galloprovincialis) in the Baltic Sea1 indicates that in the future, local mussel communities might become a mixture of hybrids between M. galloprovincialis and the native M. edulis x M. trossulus hybrids, particularly when considering future climate change scenarios. As hybridization can affect many ecologically and economically relevant traits, it is paramount to obtain a deeper understanding of the current genetic composition of Baltic Sea mussel populations. We propose to test for reproductive barriers between the three species and to study, whether emerging aquaculture enterprises might be endangered by extensive hybridization of mussels. Hybridization can lead to mussels with reduced shell strength and growth performance, a significant economical problem for mussel aquacultures. We propose to analyze population genetics of local hybrids using next generation transcriptome sequencing and crossing experiments. Further, we propose to measure fitness of generated hybrid offspring under different abiotic conditions, model larval drift to estimate population connectivity in the Baltic Sea and test for performance of hybrids in a local aquaculture enterprise. The monitoring of shallow water environments is important for spatial planning of the coastal zone, as reflected in large EU initiatives. However, the efficient monitoring of benthic habitats is difficult and time-consuming. The proposed study investigates new approaches to monitor habitats using acoustic methods. We test the hypotheses that a) different benthic habitats on hard- and soft bottoms have a characteristic surface roughness, b) changing habitat population density and composition affect the surface roughness and c) characteristic roughness and its change over time are detectable by high-frequency acoustic angular backscatter. To test the hypotheses, seafloor roughness at the mm scale and corresponding high-frequency angular backscatter will be measured simultaneously for selected habitats and reference sites over an annual cycle. If the hypotheses are successfully tested, habitat-specific acoustic monitoring methods can be established. Applied from AUV systems, this would allow efficient monitoring of large areas. Efficient monitoring of benthic habitats opens interdisciplinary applications, e.g., within the FONA project to test the correlation between seafloor habitats and the distribution top predators such as birds. Gas-hydrates form under high pressure - low temperature conditions in the presence of high concentrations of hydrate-forming gases (e.g. CH4, H2S, CO2 or small hydrocarbons) and H2O. In industrial gas production and delivery in pipelines, gashydrates can form rapidly and block even large diameter pipelines, which often leads to dangerous process shutdown. Hence, gas-hydrate inhibition has been a major focus in flow assurance research for many decades . Conventionally, industrial flow assurance relies on adding large amounts of chemicals (~30 vol%) to the pipeline flow (e.g. methanol or ethylene glycol). With upcoming interest in producing natural gas from marine gas-hydrate reservoirs, novel environmentally friendly and sustainable gas-hydrate inhibition strategies are needed. We hypothesize that microorganisms at natural marine oil and gas seeps have developed effective mechanisms inhibiting gas-hydrate formation to avoid being frozen inside a solid gashydrate matrix. These microorganisms have not been described so far, but would be of keen scientific interest not only to better understand microbial activity and diversity at deep sea oil and gas seeps (objective of research topics R03, R07) but also to open a novel way towards establishing a biological, “green” gas-hydrate inhibition technology (research topic R04). We propose to study microbial gas-hydrate inhibition mechanisms in active biomass from sediment samples collected at the Eel River oil and gas seeps in summer 2014 . To address our objectives we will use our high-pressure incubation systems and advanced monitoring strategies, which allow controlled simulation of deep sea seep environments and selective enrichment of relevant microorganisms. We propose investigating major trophic pathways within the pelagic system of the Sargasso Sea by applying a novel set of amino acid 13C and 15N markers. These provide a powerful tool for inferring major source of primary production, trophic position of consumers, and potentially also the macromolecular composition of the diets. In contrast to bulk isotopes, the compound specific markers can be used without adjusting for variable isotopic baseline values. Developing sensitive in situ markers for pelagic ecosystems is important in light of anthropogenic disturbance and global change. Aquaculture represents the most efficient method to convert feed to edible protein, but with the drawback that traditional feeds, fishmeal and fish oil, impact the environment. To minimize these impacts, more sustainable alternatives to traditional feedstuff are being used and tested. This has created a need for developing a method for tracing and authenticating seafood from tissue samples. We propose developing a technique for identifying dietary sources of Atlantic salmon (Salmo salar) using amino acid stable carbon and nitrogen isotope analysis. Developing a reliable tracer will increase transparency of seafood and incentivize sustainable practices. We will establish underwater spectral imaging as a new technology for the Kiel marine sciences. Spectral characteristics of samples will be measured in the lab, the technology for recording such data in-situ as well as the related image processing will be developed. Complementary spectral acquisition techniques will be combined for applying these methods to science topics from biology to geology. By 2060 more than 1 Billion people could be living in low-elevation coastal zones (Neumann et al. 2015). Continental margins are increasingly used for wind parks, hydrocarbon extraction, pipelines, telecommunication cables, fishing, and mining. The increasing coastal population and new ventures in offshore human activities set new challenges to the assessment and mitigation of marine hazards. Submarine landslides, which have repeatedly caused devastating tsunamis and destroyed seabed infrastructure, are one of the most dangerous marine hazards. In contrast to earthquakes, where endangered areas are relatively well constrained and recurrence rates are often known from historic records, occurrence and timing of submarine landslides remain largely enigmatic (Talling et al. 2014). Therefore, hazard assessments for submarine landslides are more difficult than for other marine geohazards. Given the urgent need for improved hazard assessments, key future challenges are the identification of endangered areas, real-time monitoring of submarine slopes, and development of early warning systems. This project aims to take a step towards these challenges by (I) testing the feasibility of seafloor instruments for in-situ monitoring of landslide-related seafloor deformation, and (II) benchmarking how the data can be used to gain insight into active landslide processes. If successful, landslide monitoring will not only improve our understanding of submarine landslide processes but may well provide a basis for future hazard assessment, disaster mitigation, preparedness, and sustainable use of seafloor resources, making Kiel a pioneer in the field. Fishing communities in coastal parts of Nigeria face an increase in exploitation of fish stocks and in use conflicts with the petroleum production in their waters. To study the interdependence of these sectors and the additional threat of climate change and pollution, we propose a study, which collects data on the economic situation as well as perceptions of threats and regulations within the coastal communities by means of interview surveys, linking existing and new scientific knowledge with local knowledge. Questionnaire development as well as results appraisal will be carried out in dialogue with key stakeholders. Results will reveal adaptation potential of these communities and provide scientific advice for the region. The project strengthens international collaboration, capacity building and expertise in trans-disciplinary science. Mechanical and hydraulic behavior of sub-sea sediments is poorly understood, and prediction of sediment destabilization and mechanical failure is linked to extreme uncertainties. This concerns deep-sea technical activities such as drilling, natural gas production or deployment of deep-sea equipment, stimulating intense effort towards developing novel strategies for sub-marine soil or slope stabilization. Inspired by recent success of microbial carbonate precipitation for terrestrial civil and environmental engineering objectives such as soil stabilization or building restoration1,2, it is assumed that biotechnical precipitation of carbonate minerals could also be the remedy for sub-sea sediment stability issues3. Although engineering objectives appear to be similar, technology transfer might be complicated due to vastly different physical, chemical and microbiological conditions in terrestrial and marine environments. Here we propose a combined microbiological-geomechanical approach to elucidate biotechnical potentials of microbial precipitation and mineral formation for sub-sea sediment stabilization. Our key objective is to test and quantify mechanical and hydraulic effects from different microbially precipitated amorphous phases and minerals (Ca.Mg-carbonates, metal sulfides, metal oxides/hydroxides) under in situ conditions in high-pressure flow-through incubation studies using novel and unique triaxial test systems4. This project brings together scientists from marine microbiology and soil mechanics, combining expertise from CAU and GEOMAR workgroups synergistically in collaborative lab experiments, data evaluation and numerical simulation. Shrimp aquaculture leaves a tremendous footprint on the coastal zone of many tropical countries (e.g. via deforestation of mangrove ecosystems) and animals are often treated with heavy doses of antibiotics to fight bacterial diseases1. Recently, a recirculating shrimp aquaculture farm has established itself in Kiel that produces animals that are free from antibiotics. However, due to the high stocking densities necessary to operate economically, the system accumulates CO2, which impacts animal physiology and welfare, as well as system productivity. Here, we propose a transdisciplinary approach to investigate how high CO2 experienced in shrimp farms influences animal acid-base status and how this impacts animal behavior, growth performance, shrimp palatability and shrimp susceptibility to bacterial disease. In addition, we propose to characterize the carbonate system dynamics within the shrimp farm in order to develop measures to help stakeholders create carbonate system conditions that increase animal well–being, productivity and product sensory quality at the same time. Rapid shifts of entire ecosystems, termed “regime shifts”, are severe but poorly understood consequences of global change. To understand such shifts, we propose to investigate the processes underlying the Baltic regime shift in the 1980s using archived otoliths. Specifically, we aim to retroactively characterize long-term (1978-2016) changes in benthic vs. pelagic feeding of the top predator cod by applying traditional bulk sulfur and nitrogen stable isotope and novel single compound carbon stable isotope analyses to otolith protein samples for the first time. If successful, the resulting case study will set a precedent for the use of historical sample collections to elucidate biological implications of global change. Cape Verde (CV) waters are the habitat of unique populations of pelagic predatory fishes and sharks. A poor understanding of key regions for these predators and their prey prevents proper management and conservation and underlines the need for ecosystem data. We propose to develop an interlinked, multidisciplinary and modular ecosystem observatory that will enable the assessment of temporal dynamics of predators and prey in their biogeochemical and physical environment, using seamounts as testbeds for our proof of concept.
2019-04-20T00:27:40Z
https://www.futureocean.org/de/forschung/forschungsthemen/r03_ocean_resources/index.php
Class 520, Synthetic Resins or Natural Rubbers -- Part of the Class 520 Series is to be considered as an integral part of Class 260 and retains all pertinent definitions and class lines of Class 260. Class 520, subclass 1 is the generic subclass for synthetic resins or natural rubbers. All the other classes of the 520 series (i.e., 521,522, 523, 524, 525, 526, 527, and 528) are indented thereunder. Retrieval of information in the Class 520 series is identical to retrieval in any ordinary class that has subclasses rather than classes indented thereunder. Each of the classes indented (i.e., 521-528) etc., merely recites an art area that for convenience of numbering has been categorized as a class rather than a conventional subclass. Classes 521-528 are arranged in hierarchical order under Class 520, subclass 1, and each of Classes 521-528 operates as a normal class within this hierarchy. The 520 series of classes encompasses solid synthetic resins and natural rubbers, and the preparation and treatment thereof. The series also encompasses compositions not elsewhere provided for of solid synthetic resins and natural rubbers, as well as the preparation and treatment of such compositions. In this class and in the indented subclasses are placed all patents which are directed to the preparation and treatment of the so-called synthetic resins or natural rubbers (e.g., complex organic compounds produced from ingredients which are generally nonresinous and which final products simulate the natural resins). A. Solid synthetic resins, per se, regardless of utility. B. Processes of preparing a synthetic resin involving a chemical reaction including those chemical reactions which utilize energy. C. Reactable compositions which form a product as in (a) above upon the addition of a catalyst or promoter, or which merely require the presence of heat and/or pressure and wherein all of the necessary reactants to form the final desired product are present, or processes of preparing. D. Processes of purifying a solid synthetic resin or composition containing a synthetic resin by a chemical or physical process. E. Process of reclaiming or recovering a solid synthetic resin. F. Processes of treating a synthetic resin or specified intermediate condensation product (SICP, see the Glossary) with a reactant, or product thereof. G. Blends of solid synthetic resins, processes of preparing or treating such blends. H. Chemically reacted solid synthetic resins or processes of preparing. I. Potentially reactable compositions which contain a solid synthetic resin or SICP and products of such a reaction, or processes of preparing. J. Room vulcanizable potentially reactive compositions which merely require moisture and which are usually activated by heat and/or pressure to form a product proper herein, or processes of preparing. K. Compositions of a nonreactant material and a solid synthetic resin or SICP, processes of preparing or treating. L. Processes of using a solid synthetic resin or composition containing a solid synthetic resin. M. Compositions containing a structurally defined material (e.g., coated web, or fiber having dimension, etc.) which is dispersed in a matrix which is not identified by overall dimension or some structure or processes of preparing. N. Single-layered products containing a solid synthetic resin or composition thereof reciting no structure or dimension, or a fiber, filament, etc., which is no more than the material from which it is made. Nonstructured single-layered web or sheet is encompassed. O. Particles or a powder, per se, of a solid synthetic resin or composition thereof for which particles or powder no dimensions are recited. P. Reactable compositions which form a product proper for this class and contain a photoinitiator or photosensitizer which are activated by wave energy or processes of preparing. It must be remembered that the list above is exemplary not exhaustive of the types of subject matter that may be found in this class. Not all subject matter relating to solid synthetic resins and natural rubbers is to be found in this class, since other classes provide for claims involving synthetic resins (e.g., utility classes, separation classes, etc.). Class 520, generic subclass 1. Class 521 provides for ion-exchange polymers, processes of reclaiming a solid synthetic resin, and for cellular synthetic resins. Class 522 provides for processes of preparing or treating a solid polymer utilizing wave energy and for compositions which contain a photosensitizer and which when reacted form a product proper for the 520 Series of Classes. Classes 523 and 524 provide for solid synthetic resins or specified intermediate condensation products admixed with a nonreactant material. Class 525 provides for certain combinations of polyesters and certain reactable materials, for blends of solid synthetic resins, and for chemically modified solid synthetic resins. Class 526 provides for certain manipulative processes which are generic to both ethylenic polymers and to condensation polymers, and also provides for polymers derived from ethylenic monomers only. Class 527 provides for solid synthetic resins derived from at least one saturated material and certain special reactants (e.g., carbohydrates, proteins, natural resins, lignin, tannin, bituminous material, etc.). Class 528 provides for solid synthetic resins derived from at least one nonethylenic reactant, and also for processes of treating a polymer either derived from ethylenic or nonethylenic reactants wherein chemical bonds in the polymer are left unaffected. This list above is merely to be taken as a shorthand method in approaching the Class 520 series. The areas above generally provide for processes of preparing the indicated products. Once a class in the series is identified as having subject matter in which one may be interested, it is best to consult the individual class schedule or to look at the one-dot subclasses indented under Class 520, subclass 1. To be classified in the 520 Series of Classes, a patent must contain a claim to a solid synthetic resin, natural resin, preparation or treatment thereof, or compositions containing solid synthetic resins or natural rubbers. When a patent (1) sets forth claims drawn to species that may or may not be solid synthetic resins as per disclosure (e.g., the patent may present claims to nonsolid polymers or to monomeric compounds), or a patent (2) contains only generic claims and the disclosure sets forth species, embraced by the claims, some of which are and some of which are not solid synthetic polymers, the patent is classified as an original with the nonresinous species and is cross-referenced to the appropriate Class 520 series area. Where both claims and disclosure are devoid of any reference to a solid synthetic resin, the patent is classified in the appropriate Class 260 compound area (principally the Class 532 Series of Classes and Class 585) that provides for the monomer or liquid polymer. In the event that a composition is claimed when neither claims nor disclosure refer to a solid synthetic resin, the patent is classified in an appropriate composition class other than the Class 520 series. a. A polymer derived from ethylenic reactants only will be considered to be a solid polymer, per se, and proper for Class 520. b. A polymer derived from at least one nonethylenic reactant will be considered to be a liquid and, therefore, properly classified in Class 260 as a compound. An exception to this rule pertains to certain low molecular weight polymers which despite being solids are nonetheless regarded as nonpolymeric and therefore excluded from Class 520. Consider, for example, the low molecular weight polymers of organic isocyanates (nRNCO), formaldehyde (mCH2O), and acetaldehyde (pCH3CHO), respectively. Organic isocyanates can be polymerized to produce isocyanurates (I), cyclic trimers where n=3. Formaldehyde can be polymerized to produce the cyclic trimer, trioxane (II) where m=3. Finally, acetaldehyde can be polymerized to produce the cyclic tetramer, metaldehyde (III), where p=4. Despite being solids, these "polymers" are, in fact, compounds with sharp melting points, exhibiting no film-forming, elastomeric or other rheological properties and are therefore properly classified in the compound classes. 2. A polymer is a solid when so stated or when it is described in one or more of the following terms. This list is not to be taken as limiting a solid to the enumerated terms. Other terms in patents (not noted in the following list) may be interpreted as being solid when proper description is given therein: coagulated, brittle, ductile, Durran m.p, elastic, elastomer, fiber-forming, friable, fusible, gum, meltable, melting point, millable, molten, pliable, powder, rubber, rubbery, thermoplastic, and thermoset. A wax is not considered to be a solid even if defined by one or more of the above terms. Determining whether a product derived from a natural rubber, protein, natural resin, natural gum, bituminous material, nonvolatile residue of distillation processes, naturally occurring fatty acids, fatty oils, fats, waxes and modified forms thereof, carbohydrates or derivatives, or tall oil or fatty acids derived from tall oil is proper subject matter for this 520 Series of Classes or for a compound area of Class 260 follow. 1. The reaction product of fatty acid or oil + SICP (or SICP ingredients) is presumed to be solid and is classified in Class 525 or 528. 2. The reaction product of a fatty acid or oil + polyol + polycarboxylic acid or derivative is presumed to be a liquid and is classified in Class 554, Organic Compounds, subclasses 1+. 3. The reaction product of a fatty acid or oil + SPFI (other than SICP ingredients) is presumed to be a liquid and is classified in Class 554, Organic Compounds, subclasses 1+. 4. The reaction product of an ethylenic reactant preformed reaction product of fatty acid + polyol + polycarboxylic acid or derivative is classified in class 525, subclass 7, when the ethylenic reactant is not solely a fatty acid glycerol ester, a fatty acid derived from a naturally occurring glyceride, tall oil, or a tall oil fatty acid. It is to be pointed out that the ethylenic reactant can be a natural resin, e.g., rosin, etc. the rule in Class 525, subclass 7, regarding the role of the ethylene reactant is to be contrasted with situations elsewhere in Classes 526, 528, and also in class 525, where it often is appropriate to view a drying oil or drying oil acid as an ethylenic reactant so long as there is present a 520 series system in the absence of the fatty oil or acid. Example: The reaction product of solid polyethylene glycol terephthalate + linseed oil is classified in Class 525, subclasses 10+. But: If the polyester is not specifically disclosed as a solid or the reaction product is not disclosed as a solid prior to oxidative cross-linking (i.e., air drying), then the system is classified in Class 554, Organic Compounds, subclasses 1+. 5. The reaction product of a fatty acid or oil with ethylenic monomer is presumed to be a liquid and is placed in Class 560, Organic Compounds, subclasses 1+ or Class 562, Organic Compounds, subclasses 400+, respectively. If formation of a solid polymer (prior to air drying) is disclosed, the material is classified in Class 526. 6. A fatty acid or oil + maleic acid yields a reaction product. The reaction product admixed with styrene is presumed to yield a liquid product, which product is classified in Class 560 Organic Compounds, subclasses 76+ or Class 562, Organic Compounds, subclasses 488+, respectively. A solid would be placed in Class 526. 7. Polymerized fatty acids or oil (e.g., dimer or trimer fatty acids, etc.) are not treated as fatty acids for purposes of the Class 520 Series. However, in recognition of the historical treatment of these materials as derivatives of fats, the following rules are offered (a) solid materials produced from dimerized or trimerized fatty acids together with a SPFI or SICP or ethylenic monomer other than solely a fatty acid or oil are treated as solid polymers for the purpose of the Class 520 Series, and (b) materials produced from dimerized or trimerized fatty acids with otherwise incomplete specified polymer-forming system (SPFI) are classified as appropriate in Class 562, Organic Compounds, subclasses 400+ without regard to consideration of solid or liquid. 1. Natural resin and natural resin derivative is defined in the Glossary. 2. Reaction of natural resins with ethylenic reactants is presumed to produce a solid polymer proper for Class 527, subclass 600, with the exception that reaction products of natural resins or derivatives (including hydrogenated rosin) with solely terpenes and/or polycarboxylic acids, anhydrides, or halides are treated, per se, as derivatives of natural resins for purposes of Class 530, subclass 214. The practical effect of this is that abietic acid copolymerized with malelic anhydride is classified, per se, in Class 530, subclass 214. However, rosin + maleic + styrene is classified in Class 526, subclass 238.3. 3. A natural resin reacted with an ingredient which introduces ethylenic unsaturation (other than in section B, 2 situation above), e.g., rosin ester of allyl alcohol, is a monomer for purposes of Class 526. Thus, polymers of these materials are classified in Class 526; however, natural resins are assumed to be ethylenically unsaturated. For example, the reaction product of a natural resin + SICP is presumed to be a solid and is classified in Class 525. 4. A natural resin reacted with a material to introduce a functional group provided for on the SPFI listing is not presumed to be a solid polymer for purposes of Class 520 unless admixed with any additional ingredient necessary to complete the SPFI system. 5. A reaction product of a natural resin with SPFI ingredients is presumed to be a solid and proper for Class 527, subclasses 600+. 6. A reaction product of a natural resin with ethylenic reactant (other than those excluded in section B, 2 above) with nonethylenic reactant is presumed to produce a solid polymer proper for Class 527. 7. The reaction product of a natural resin with a reactant which introduces functional groups that are part of a SPFI system and wherein the other necessary ingredient of the SPFI system is subsequently introduced, produces a product which is presumed to be solid and is proper for Class 527. 1. The reaction of a "selected material" with SICP (or SICP ingredients) is presumed to be a solid and is classified in Class 527. 2. The reaction product of a selected material with SPFI ingredients is presumed to be a solid polymer and proper for Class 527. 3. The reaction product of a selected material with ethylenic reactant is presumed to be a solid polymer and proper for Class 527. 4. The reaction product of a selected material with ethylenic reactant + nonethylenic reactant is presumed to produce a solid polymer proper for Class 527. 5. A selected material which is reacted so as to increase or decrease ethylenic unsaturation, but not to leave the material devoid of any unsaturation, produces a monomer proper for Class 526 which, if homopolymerized or copolymerized with an ethylenic reactant only, produces a polymer proper for Class 526. 6. The reaction product of selected material which introduces functional groups that are part of a SPFI system and wherein the other necessary ingredient of the SPFI system is subsequently introduced, produces a product which is presumed to be solid and is proper for Class 527. An example of such a situation is the treatment of sucrose with ethylene oxide to produce a sucrose polyether polyol which is subsequently treated with a polyisocyanate. The reactions enumerated above, when dealing with multiple materials, may be simultaneous or sequential. For example, a selected material may be reacted with a polyol and then subsequently halogenated and, in turn, reacted with a polycarboxylic acid. The polycarboxylic acid and polyol reactant are a SPFI system. Therefore, the product produced is presumed to be solid and proper for Class 527. The reactions enumerated above all pertain to SPFI, SICP, ethylenic reactants, or to materials which introduce functional groups which are part of a SPFI system, and to which another material is added that completes the necessary ingredients that comprise a SPFI system. Any other reaction with the above materials, other than where the patentee specifically states that materials are present which will form a solid polymer under the conditions of reaction if the materials enumerated above were absent, is excluded from being a solid synthetic resin proper for the Class 520 Series. Class 264, Plastic and Nonmetallic Article Shaping or Treating: Processes. Refer particularly to the main section of Class 264 for the line between Class 264 and the composition classes. In general, patents which include both the preparation and a significant molding or working treatment of a compound or composition classifiable in Class 520 are placed in Class 264 and cross-referenced to this Class 520 when desirable. However, where the molding is only nominally recited or is merely incidental to the preparation of a Class 520 composition, the patent is placed in this Class 520 according to the following guidelines. 1. Patents limited to process claims reciting a broad or nominal molding step only (a) where a composition classifiable in Class 520, per se, is molded and there is no disclosure as to a chemical reaction being present, the patent goes to Class 264; (b) where a chemical reaction, mixing or blending of ingredients to form a composition of matter classifiable in Class 520 is recited to take place in a mold or during the molding or shaping step, the patent goes to Class 520, even if temperature and pressure conditions are set out; (c) similarly, where a chemical reaction, mixing or blending of ingredients to form a composition classifiable in Class 520 is recited to take place prior to the nominal shaping or molding step, the patent goes to Class 520. 2. Patents containing both composition claims classifiable in Class 520 and process claims reciting nominal molding only (a) patents containing both claims to a composition classifiable in Class 520 and also claims reciting broad or nominal molding of said composition go to Class 520; (b) patents containing both claims to a composition classifiable in Class 520 and claims reciting broad or nominal molding of said composition wherein there is a chemical reaction, blending, or mixing of ingredients of said composition during or prior to the molding step, will go to Class 520, even if temperature or pressure conditions are set out; (c) where patents contain both claims to a composition classifiable in Class 520 and claims reciting a nominal or broad molding of said composition, per se, and there is no disclosure of any chemical reaction taking place, and specific temperature and/or pressure conditions are set out, the patent will go to Class 264. Class 427, Coating Processes. Refer to the class definition of Class 427 particularly the section, Nonsignificant Coating Processes. In general, nonsignificant or nominal coating methods are classified with a compound or composition if claims are present for both compound or composition. 1. A patent containing a claim to a coating composition or compound, which claim is, per se, classified in Class 520, and also a claim to a nonsignificant process of utilizing the claimed compound or composition to coat a substrate, is classified with the claimed Class 520 composition. The following guidelines are used to determine if a process step is significant. a. Any pretreatment or post-treatment of a base or applied coating is a significant process step; processes limited to etching or making a base more compatible with, or adherent to, the coating wherein the base is the substrate (work) onto which a coating is applied are included (e.g., curing, drying, or smoothing a coating, or cleaning or drying a base. b. A specific recitation of how the coating is applied (e.g., brushing, dipping, spraying, immersion, etc.) is significant. General statements of applying, covering, or coating, etc., are not significant. c. Processes resulting in plural coatings are considered significant. d. A process resulting in a coating having a specific thickness or lack of uniformity is considered significant. e. Specific recitation as to the condition of a coating being applied is generally significant except (1) a condition also included in an independent composition claim (e.g., pH concentration, etc.) is not significant, and (2) statements that a coating material is molten or in an organic, inorganic, or aqueous solution is not significant unless accompanied by a recitation of specific times or temperatures or chemically defined solvents. 2. Patents containing only claims to a process of coating a substrate wherein no significant process steps are recited are classified in Class 428, Stock Material or Miscellaneous Articles, according to the product produced by the process. Guidelines for use in determining if a process is significant are the same as set out under step 1 above. 1. A composition having no art use claimed, but disclosed as having a single art use is classified with the art use. 2. Compositions which are disclosed as having a plurality of functions provided for in different main classes and only a single use, property, or function is claimed, are placed as original in the composition class providing for such claimed use, property, or function and are cross-referenced to other classes for disclosed uses, properties, or functions when desirable. Class 426, Food or Edible Material: Processes, Compositions, and Products. Class 149, Explosive and Thermic Compositions or Charges. Class 430, Radiation Imagery Chemistry: Process, Composition, or Product Thereof. Class 252, Compositions, subclasses 9+. Class 44, Fuel and Related Composition. Class 252, Compositions (special uses or functions) to subclass 194. Class 502, Catalyst or Solid Sorbent. Class 252, Compositions (special uses or functions), subclass 478 and those following, except subclasses 302+, 363.5+, 364, 365+, 367+, 372, 378 R,P. Class 8, Bleaching and Dyeing; Fluid Treatment and Chemical Modification of Textiles ad Fibers. Class 429, Chemistry: Electrical Current Producing Apparatus, Product, and Process. Class 204, Chemistry: Electrical and Wave Energy. Class 106, Compositions: Coating or Plastic, subclasses 1.05 to 38.9. Class 106, Compositions: Coating or Plastic, subclasses 600-316. Class 75, Specialized Metallurgical Processes, Compositions for Use Therein, Consolidated Metal Powder Compositions, and Loose Metal Particulate Mixtures (Alloys). Class 75, Specialized Metallurgical Processes, Compositions for Use Therein, Consolidated Metal Powder Compositions, and Loose Metal Particulate Mixtures (rest of class). Class 520, Synthetic Resins or Natural Rubbers: Series of Classes. Class 260, Chemistry of Carbon Compounds: Series of Classes. Class 208, Mineral Oils: Processes and Products. Class 252, Compositions (nonspecial uses or functions) i.e., subclasses 182.11+, 183.11+, 302+, 363.5, 364, 365+, 367, 372, 378 R,P, 380, 408.1, 600. Class 585, Chemistry of Hydrocarbon Compounds (mixture subclasses). This superiority list is not intended as a complete list and will be expanded or added to as the relationship between classes containing resin compositions and Class 520 is determined. Class 435 is not on the above list and may contain a resin composition and see the notes between Class 520 and Class 435. 4. Class 520, subclass 1 is the residual home for compositions containing a solid synthetic resin or nonreactant proper for Class 520. Any composition containing a polymer proper for the Class 520 Series and having a claimed utility, property, or function which is unprovided for in any of the classes superior to the Class 520 Series on the (B, 3) list above is proper for Class 520. The Class 520 Series is also the proper home for any composition having a polymer proper for the series where the disclosure is limited to a single disclosed utility, property, or function which is unprovided for in any of the classes superior to the series on the (B, 3) list. A claim that fails to recite a utility, property, or function and wherein the disclosure is generic to a number of utilities, properties, or functions, some of which are provided for specifically by classes higher on the list than the Class 520 Series and others that are provided in Class 520 Series, or that are not provided for in any other composition area on the list, should generally be cross-referenced into the Class 520 Series on the basis of the unprovided or provided for utilities, properties, or functions enumerated in the disclosure. 5. In Class 430, certain disclosures have been excluded, (see the Class Definition of Class 430). In the circumstance enumerated in Class 430, the patent would be classified in Class 520 rather than Class 252 when the composition contains a polymer proper for Class 520. 6. It is a general rule of classification to classify a process of preparing a composition along with the composition. In these circumstances where only a process of preparing a composition is claimed and there is no claim to a composition, the claims would be classified identically as if there were a composition claimed. An exception to the general rule above is Class 435, Chemistry: Molecular Biology and Microbiology, wherein an enzymatic reaction may have produced a particular resin composition. The composition is properly classified in Class 520, while the process is classified in Class 435. 7. Class 520 provides for a composition containing a synthetic resin for treating textile materials, as for example, compositions for oiling or lubricating, rendering antistatic, softening, and silk-soaking, excepting detergent, bleaching and mere wetting compositions. Patents which claim a resin composition intended for textile treating and also claim (a) processes involving no more than mere application of the composition to a textile material, or mere application combined with a broadly stated textile operation, and/or (b) textile products characterized essentially by the application of the composition, are classified herein. For patents which claim only processes of application and/or products thereof, or a significant process of applying these compositions, see Class 8, Bleaching and Dyeing; Fluid Treatment and Chemical Modification of Textiles and Fibers. Class 427, Coating Processes, and Class 428, Stock Material or Miscellaneous Articles. For the lines between these classes, see the definition of the respective classes. 8. This class (520) specifically provides the Si-C or Si-H containing compositions containing reactants which are claimed as being moisture curable; see Class 528, subclasses 10+, and for moisture curable N=C=X (X is chalcogen) and liquid polysulfide compositions, respectively. See the section Lines With Other Classes in the class definition of Class 428 for a treatment of the lines between Class 428 and the Class 520 Series of Classes. 117, Single-Crystal, Oriented-Crystal, and Epitaxy Growth Processes; Non-Coating Apparatus Therefor, for processes for growing therein-defined single-crystal of all types of materials, including inorganic or organic. 204, Chemistry: Electrical and Wave Energy, appropriate subclasses for producing a product of this class by other than a wave energy process. Class 204 is superior to this class, therefore a patent claiming in the alternative a process of preparing an organic compound and a synthetic resin or natural rubber in the presence of wave energy is classified for original purposes in Class 204 and cross-referenced to this Class 520 Series on the basis of wave energy and the synthetic resin or natural rubber species. In the situation where an alternative process claim is presented as well as a specific process claim to the nonsynthetic resin or nonnatural rubber species, and the process is directed to wave energy, the same rule of original patent placement applies. Any process step involving electrolysis, electric current, electro-osmosis, electrophoresis, electrostatic field, electrical discharge, or magnetic field and also involving the preparing or treating or a synthetic resin or natural rubber is properly classified in Class 204, even if the wave energy step involved is subsequent to the 204 step. Combination of chemical processes falling within the definition of Class 520 (other than wave energy) and those methods falling within the the definitions of Class 204, are classified in Class 204 when the chemical process steps are preparatory to the Class 204 process and are classified in Class 520 when the 204 method is precedent to the Class 520 chemical step. 252, Compositions, subclasses 182.11+ and 183.11+ for a polymerizable composition which is devoid of a necessary reactant or catalyst needed to produce the desired synthetic resin. 430, Radiation Imagery Chemistry: Process, Composition, or Product Thereof, for a polymerizable composition which is radiation sensitive and limited by claims or disclosure for use in radiation imagery. 435, Chemistry: Molecular Biology and Microbiology, for mere processes of making, separating, or purifying carbon compounds by operations that include fermentations and compositions and apparatus that are specialized for use therein, and processes of making such compositions for such use; also ferments that are carbon compounds (enzymes), respectively, and processes of making products resulting from biological processes (fermentation) are classified in the Office according to the products of those processes. subclasses 174+ for a carrier-bound or immobilized enzyme or cell, even if attached to a solid synthetic resin; and appropriate subclasses, for a process of preparing a solid synthetic resin utilizing a microorganism, tissue cell culture, or enzyme. 506, Combinatorial Chemistry Technology: Method, Library, Apparatus, for a chemical or biological library or a process of creating said library. 530, Chemistry: Natural Resins or Derivatives; Peptides or Proteins; Lignins or Reaction Products Thereof, subclass 200 (the definition thereof) for a complete discussion of what is intended by natural resin. 560, Organic Compounds, for styrene copolymerized with a fatty acid glyceride to form a liquid material. 562, Organic Compounds, for styrene copolymerized with a fatty acid to form a liquid material. Denotes a compound devoid of any ring-containing moiety. Denotes an organic compound having the general structure C-OH wherein the carbon atom bound to the oxygen atom of the hydroxyl group cannot be double bonded to oxygen, sulfur, selenium, or tellurium, or triple bonded to nitrogen. The terms as used herein include phenols. Denotes an organic compound having the group -C(=O)H [i.e., -CHO] bonded directly to hydrogen or to an additional carbon,which carbon is not double bonded to chalcogen (i.e., oxygen, sulfur, selenium, or tellurium), or triple bonded to nitrogen. Denotes the following: A. Compounds having a X-CH2-OH group where X is other than carbon or hydrogen (e.g., paraformaldehyde, methyol derivatives of urea, etc.); B. Heterocyclic compounds having only carbon and oxygen as alternating ring members (the number of ring carbon atoms must equal the number of ring oxygen atoms). An example is trioxane, which is shown as Figure 1 at the end of the "Aldehyde Derivative" definition; C. Hexamethylene tetramine (i.e., urotropine) or derivatives thereof. Hexamethylene tetramine per se is shown as Figure 2 at the end of the "Aldehyde Derivative" definition. A derivative, for purposes of this definition, requires the basic hexamethylene tetramine ring structure, where substitution has been made for the hydrogens bonded to the ring carbons. Compounds having a -CH2OH bonded to atoms other than C, H, or oxygen are regarded as being two compounds; for instance, a methylol derivative of melamine is regarded as a mixture of melamine and formaldehyde, and methylol urea is regarded as being a mixture of urea and formaldehyde. A structurally unspecified novolak is proper for this area in that it is considered as a mixture of a phenol and an aldehyde. If a novolak of specified structure is claimed as prepared from specific reactants, then classification is proper on the basis of the specific reactants. An aldehyde-type reactant is limited to an aldehyde derivative or methylol derivative. Denotes an organic compound having a nitrogen atom single or double bonded to a carbon atom and wherein the carbon atom bonded to the nitrogen atom is devoid of a double bond to oxygen, sulfur, selenium, or tellurium or triple bonded to nitrogen. In addition, those compounds wherein the same nitrogen atom is bonded to a -C(=X)- group (X is O, S, Se, or Te) and to a carbon atom which is not double bonded to oxygen, sulfur, selenium, or tellurium, are not considered as being amines, e.g., -C(=X)NH-CH3, etc. Although amides may be considered chemically as amines, it has been found expedient for these classes to exclude compounds containing only amide nitrogen herefrom. Therefore, as used throughout this area, the term amide is not to be confused as being an amine. A compound, however, which contains a nitrogen atom bonded to a non -C(=X)- carbon atom and which contains either a nitrogen atom bonded to a -C(=X)- group of an amide group, is considered as being an amine. An organic amine salt of a carboxylic acid has been classified as if it were a mixture of an amine and a carboxylic acid. An organic diamine salt of a dicarboxylic acid where the amine salt-forming groups are identical is considered as being a single amine compound, whereas, if the amine groups are different then they are regarded as two amine compounds. Where the amine groups contain two or more nitrogen atoms bonded to the same or different noncarbonyl carbon atom then they are to be regarded as polyamines. Denotes a benzene ring or a carboxylic ring system having a benzene ring as part of the system. Denotes polypeptide chains which have been built up primarily from alpha- or beta-amino carboxylic acids and which exhibit biological activity similar to naturally occurring proteins or polypeptides; such activity may be, for example, hormone activity (e.g., insulin, etc.), immuno-activity (e.g., antigen or antibody, etc.), antibiotic activity (e.g., bacitracin or bleomycin, etc.), or antiviral activity (e.g., interferon, etc.). Mere statements that a material demonstrates any of these activities is sufficient to create a presumption that a biologically active polypeptide is present. On the other hand, a material merely disclosed as a polypeptide which has been built-up from amino acids will not be presumed to have biological activity, and will be placed in Class 520 according to the disclosed structure and function as appropriate. A. The structure is given, i.e., a long polymer backbone has attached or coupled to one or both of its terminal ends one or more polymers at least three reactant units in length or; B. The copolymer is named as a block providing that the disclosure is otherwise silent as to its structure or if the structure is likewise given, it is consistent with that described above or; C. The structure can be ascertained from the following limiting process conditions (a) Treating a nonterminated solid polymer, that is, one which is terminally active or "living", with an ethylenic reactant with subsequent polymerization to form additional blocks. The process may be continued to produce higher order block copolymers. For example, treating dilithiated polystyrene with butadiene to yield an ABA block copolymer; and (b) two or more nonidentical solid polymer chain ends are coupled directly or through the use of a chemical agent. For example, the coupling of hydroxy terminated solid polybutadiene with hydroxy terminated polyethylene glycol terephthalate with phosgene. The structure is given, i.e., to a long solid polymer backbone possessing terminally active sites (i.e., functional groups), or that is a "living polymer" is attached or coupled, through chemical reaction with those functional groups or sites, an ethylenic reactant containing one or more functional groups or sites; an example is to contact hydroxy terminated polybutadiene glycol with allyl isocyanate, or two or more identical solid polymer chain ends are coupled directly or through the use of a chemical agent. For purposes here, identical means those polymer segments which contain the same carbon backbone but differ in stereo regularity (e.g., isotactic, syndiotactic, atactic) optical activity, or degree of polymerization. Thus, coupling lithium terminated polystyrene segments with molecular weights of 25,000 and 100,000, respectively, with stannic chloride is proper for this area. Denotes polyhydroxy aldehydes (i.e., aldoses) and polyhydroxy ketones (i.e., ketoses) of the empirical formula Cx(H2O)x where x is five or more; and substances hydrolyzable to said polyhydroxy (aldehydes or ketones). Included herein for example are the following: (a) monosaccharide sugars such as pentoses (e.g., arabinose, arabinulose, etc.) hexoses (e.g., glucose, levulose, etc.) and the heptoses (e.g., mannoheptose, etc.); (b) disaccharides (e.g., lactose, maltose, sucrose, cellobiose, etc.); (c) trisaccharides (e.g., raffinose, etc.); (d) polysaccharides (e.g., starches, celluloses, dextrins, hemicelluloses, glycogen, insulin, etc.); (e) complex polysaccharides (e.g., gum arabic, pectins, etc.). Excluded herefrom are lignin, tannin, and derivatives thereof. Also excluded are the simple "triose" (i.e., glyceradehyde di-hydroxy acetone) or "tetrose" (i.e., erythrose, threose and keto tetroses) sugars since these sugars have less than five carbons; such materials are treated as polyhydroxy (aldehydes or ketones). Denotes reaction products of carbohydrates wherein the carbon skeleton of the carbohydrate is not destroyed. Included herein are cellulose nitrate, cellulose acetate, cellulose ethers, viscose, cellulose xanthate, chitin, etc. A. A carboxylic acid denotes the carboxyl group, represented as -COOH or -C(=O)OH, bonded to: (1) a carbon atom that is not double-bonded to sulfur, selenium, or tellurium, or triple bonded to nitrogen; (2) hydrogen; or (3) [-C(O=)-]n, where n is an integer (e.g., oxalic acid, etc.). A carboxylic acid derivative is limited to: 1. nitride; 2. carboxylic acid ester; 3. carboxylic acid anhydride; 4. carboxylic acid salt; 5. carboxylic acid amide; 6. carboxylic acid imide; 7. carboxylic acid lactam; 8. carboxylic acid halide; and 9. lactone. B. A carboxylic acid anhydride denotes the basic structure -C(=O)-O-C(=O)-, the carbons of which may independently be bonded to: (1) hydrogen; (2) a carbon atom that is not double bonded to sulfur, selenium, or tellurium; or (3) [-C(=O)-]n, where n is an integer. In either of (2) or (3), supra, the -C(=O)-O-C(=O)- group may be part of a ring. C. A carboxylic acid ester denotes the structure -C(=O)-O-C-, where the carbon atom bonded to the -O- of the -C(=O)-O- group may not be double bonded to chalcogen (i.e., oxygen, sulfur, selenium, or tellurium), or triple bonded to nitrogen, and the carbonyl carbon of the -C(=O)-O-C- group may be bonded to (1) hydrogen; (2) a carbon atom that is not double bonded to sulfur, selenium, or tellurium, or triple bonded to nitrogen; or (3) [-C(=O)-]n, where n is an integer. D. A nitride denotes the structure -CbN bonded to carbon, which carbon may not be double bonded to chalcogen (i.e., oxygen, sulfur, selenium, or tellurium), or triple bonded to nitrogen. E. A carboxylic acid amide denotes the structure -C(=O)-NH2, where substitution may be made for the hydrogens, and the carbonyl carbon may be bonded to (1) hydrogen; (2) a carbon atom that is not double bonded to sulfur, selenium, or tellurium, or triple bonded to nitrogen; or (3) [-C(=O)-]n, where n is an integer. F. A carboxylic acid halide denotes the structure -C(=O)-hal, where hal is halogen and the carbonyl carbon may be bonded to (1) hydrogen; (2) [-C(=O)-]n, where n is an integer; or (3) a carbon atom that is not double bonded to sulfur, selenium, or tellurium, or triple bonded to carbon. G. The imide of a dicarboxylic acid is a heterocyclic ring having as ring members the group -C(=O)-NH-C(=O)-, where substitution may be made for hydrogen; all remaining ring members are carbon atoms. H. The lactam of a carboxylic acid is a heterocyclic ring having as ring members the group -NH-C(=O)-, where substitution may be made for hydrogen; all remaining ring members are carbon atoms. I. The lactone of a carboxylic acid is a heterocyclic ring having as ring members the group -C(=O)-O-; all remaining ring members are carbon atoms, and the carbon atoms bonded to either the carbon or oxygen or the -C(=O)O- group may not themselves be double bonded to chalcogen (i.e., oxygen, sulfur, selenium, or tellurium). J. A carboxylic acid salt denotes the structure -C(=O)-O-θX⊕, where X is a cation and ionic bonding exists between the cation, X, and the -C(=O)O- group. The carbon of the -C(=O)O- group may be bonded to: (1) hydrogen; (2) a carbon atom that is not double bonded to sulfur, selenium, or tellurium, or triple bonded to nitrogen; or (3) [-C(=O)-]n, where n is an integer. In the above definitions of carboxylic acids and their derivations, certain derivations may technically fit into more than one derivative grouping. A lactone, for example, is a species of an ester, and a lactam is a species of an amide. Compounds that are themselves multifunctional (i.e., possess more than one functional group) are classified on the basis of the first appearing functional group in the hierarchy. A polycarboxylic reactant requires the presence of at least two carboxylic acid groups, or of at least one carboxylic acid group and at least one carboxylic acid derivative, or at least two identical carboxylic acid derivatives, or at least two different carboxylic acid derivatives. A cyclic carboxylic anhydride having the group -C(=O)-O-C(=O)- as members of a ring is considered as a polycarboxylic acid. Compounds having both a cyclic anhydride group and a free carboxyl (-COOH) group are considered as tricarboxylic acids. An example is trimellitic anhydride, which is shown as Figure 1 at the end of the "Carboxylic Acid or Derivative" definition. A compound containing two cyclic anhydride groups is considered a tetracarboxylic acid. An example is pyromellitic dianhydride, which is shown in Figure 2 at the end of the "Carboxylic Acid or Derivative" definition. Denotes a chemical material which is added to the formed solid polymer and which causes or is present during a process wherein a change in a bond of the polymer is effected. Claims reciting a "chemical treating agent" are classified on the basis of the first-appearing material utilized as part of the chemical agent. No attempt has been made to classify on the basis of functionality of the chemically active material and therefore all materials in a composition are regarded equally (e.g., diluent, reactant, catalyst, etc.). Processes and products which refer to mere cross-linking, curing, or vulcanizing will be classified on the basis of the product treated. Denotes dimeric or trimeric fatty acids prepared, e.g., by free radical, ionic, thermal polymerization, etc., of a monomeric fatty acid which can be saturated or unsaturated monocarboxylic acid having at least eight carbon atoms. So-called "polymeric fatty" acids in the absence of other disclosure are presumed to be a mixture of dimers and trimers of aliphatic monocarboxylic acids. Included herein are reaction products of dimers or trimers wherein the dimer or trimer structure is not destroyed. Dimers or trimers of ethylenically unsaturated aliphatic monocarboxylic acids are presumed to be unsaturated in the absence of disclosure to the contrary. Denotes an organic compound characterized by the presence of an oxygen atom bonded directly to two carbon atoms, where the carbon atoms may not be double bonded to chalcogen (i.e., oxygen, sulfur, selenium, or tellurium), or triple bonded to nitrogen. An example is dimethyl ether, CH3-O-CH3. Requires the presence of two carbon atoms bonded to each other by a double or triple bond, provided that the double bond is not part of a benzene ring. Indane (Fig. 1) is not within the scope of olefinically unsaturated; coumarone (Fig. 2) and indene (Fig. 3) are within said scope. Denotes an aliphatic monocarboxylic acid having an unbroken chain of at least seven acyclic carbon atoms bonded to the carboxyl group. Fatty acid glycerol ester denotes a mono-, di-, or tri-ester of a fatty acid with glycerol. The so-called drying or semidrying oils are naturally occurring fatty acid glycerol esters (i.e., glycerides). The drying or semidrying property relates to the degree of ethylenic unsaturation. Naturally occurring fatty acid glycerides (i.e., fats and fatty oils) include but are not limited to linseed oil, perilla oil, olive oil, oititica oil, soybean oil, fish oil, castor oil, tallow, and other natural glycerides: alfalfa, apricot kernel, beechnut, bontio, Brazil nut, candlenut, cedar nut, chaulmoogra, cherry kernel, coconut, corn, cottonseed, croton seed, grapefruit seed, grapeseed, hempseed, isano, ivory wood seed, jute seed, mustard seed, oat, orange seed, plum kernel, poppyseed, poyok, rice, rye, safflower, sesame, stillingia, sunflower, teaseed, thistle seed, tobacco seed, tomato seed, walnut, wheat, wild rose seed. Naturally occurring fats and fatty oils are treated in this Class 520 Series as fatty acid glycerol esters. A fatty acid derived from naturally occurring glyceride denotes the carboxylic acids normally obtained by saponification of the naturally occurring glycerides (i.e., oleic, linoleic, linolenic, licanic, eleostearic, ricinoleic, arachidic, stearic, palmitic, lauric, erucic, palmitoleic, capric, caprylic, myristic and clupanodonic acids). Carboxylic acids specifically enumerated above will be treated as fatty acids derived from naturally occurring glycerides only where there is specific disclosure that the acid is derived from a naturally occurring glyceride source. Tall oil denotes the mixture of fatty acids, rosin, and unsaponifiable material obtained by treatment of Kraft (or sulfite) process black liquor. In this Class 520 Series, tall oil is usually treated as if it were a mixture of fatty acids derived from naturally occurring glycerides unless otherwise specifically stated; see appropriate subclass definitions for exceptions. Fatty acid derived from tall oil denotes the fatty acid portion of tall oil In this series, derivatives or modifications of the fatty acid glycerol ester, fatty acid derived from a naturally occurring glyceride, tall oil, or fatty acids derived from tall oil are excluded, except as specifically provided for in the following list: salts of the fatty acid moiety, blown oils, refined oils and acids, stand oils, boiled oils, bodied oils, hydrogenated oils or acids, dehydrogenated oils or acids, dehydrated castor oil or dehydrated castor oil fatty acids. Synthetically produced fatty acids having the same structure as fatty acids derived from naturally occurring glycerides are included herein. Dimerized or trimerized or "polymeric" fatty acids are excluded as "fatty acids" for purposes of this Class 520 Series; similarly, adducts of fatty acids or fatty acid glycerol esters with alpha, beta ethylenically unsaturated carboxylic acids are excluded as "fatty acids". Denotes a ring system having at least two rings which (a) share with each other two adjacent ring atoms, or (b) share with each other three or more ring atoms and wherein each ring having shared atoms is either a heterocyclic ring or a carbocyclic ring. An amorphous, hard, brittle, often transparent material comprising a fused mixture of the silicates of the alkali alkaline earth, or heavy metals. The structure is given, i.e., a long solid polymer backbone (substrate) is attached to a pendant (nonterminal) polymer or copolymer (superstrate) having at least three reactant units in length or; The copolymer is so named as a graft providing that the disclosure is otherwise silent as to the structure or, if structure is likewise recited, it is consistent with that required in A. above, or the structure can be ascertained from the following limiting process conditions: (a) the disclosure states there is a reaction between a solid polymerized unsaturated reactant and an unpolymerized unsaturated reactant in the presence of a catalyst or; (b) the disclosure does not state whether or not any reaction has occurred between the solid polymerized unsaturated reactant and the unpolymerized unsaturated reactant, but relates that a product is obtained which is inseparable by a variety of physical techniques such as, extraction, precipitation, ion exchange, etc. In the absence of one or more of these requirements the reaction is considered to produce a polymeric blend. There is disclosed an interaction between two or more solid polymers through their respective nonterminal functional groups or through the use of an intermediate reactant or chemical agent, e.g., causing salt, ester, amide, urea formation. Examples of these reactions would be (a) Contacting polypropylene and polyethylene with benzoyl peroxide. (b) Contacting polyvinylamine and polyallylamine with glyoxal. (c) Contacting chloromethylated polystyrene with polyvinylamine. (d) Contacting polyacrylic acid with polyvinylamine. In the absence of one or more of these requirements the reaction is considered to produce a polymeric blend. See the Glossary for the definition of the terms "specified intermediate condensation product" (SICP) and "specified polymer-forming intermediates" (SPFI). Denotes a compound containing only carbon, hydrogen, and halogen, or only carbon and halogen. Denotes an organic compound wherein one or more carbon atoms are covalently bonded in a ring system with at least one hetero atom of oxygen, sulfur, nitrogen, selenium, or tellurium and there are no other different atoms in the ring. Denotes a material usually derived during paper pulp manufacture by separation of the cellulose from wood. Lignin is considered to be the binder for cellulose in wood. Lignin includes crude mixtures of lignose, lignone and lignin. Lignin per se is a complex structure having some aromatic rings and phenolic groups. Denotes materials not otherwise provided for, derived from lignin or from sulfite or soda paper pulping processes, e.g., sodium lignosulfonate, waste sulfite liquor, black liquor, etc. Y" and Y" are H or hydrocarbon groups; Z is H or a carbon atom. T - is an atom other than C or H. A - is a hydrogen or a carbon atom and which carbon atom is bonded to only H, carbon, or single bonded oxygen atoms. X - is H, part of an ether group, or an inorganic salt. n - is two or more, B is one or more. Denotes the following: Those materials which have been customarily employed as such in the paint, lacquer, varnish, adhesive, and ink trades. Thus, "natural resin" is a term of art. Natural resins include but are not limited to shellac, copals from various sources, e.g., Congo, manila, etc.; amber, dammar, dead dammar, rosin (colophony), gum rosin, wood rosin, burgundy pitch, gurjun balsam, Canada balsam, sandarac, mastic, accroides, benzoin, elemi, gamboge, gum thus, venice turpentine, bordeaux turpentine, abietic acid, pimaric acid, etc. Tall oil, per se, is not treated as a natural resin unless the rosin content is specifically stated. In the event the rosin content is not stated, tall oil is treated as an unsaturated fatty acid derived from naturally occurring glycerides. Unless indicated to the contrary, "rosin" is presumed to be primarily abietic acid. A. Heat decomposition products of natural resins which contain a hydroaromatic nucleus and which are unprovided for elsewhere. B. Materials described by patentee as natural resins. C. Modifications of natural resins wherein the carbon structure of the abietyl nucleus is retained, including but not limited to: abietyl amine, dehydroabietyl amine, abietyl alcohol, zinc abietate, hydrogenated rosin, dehydroabietic acid, disproportioned rosin, rosin esters, ester gum (i.e., triglyceride of rosin), polymerized ester gum, hydrogenated ester gum, oxidized ester gum, etc. D. Other modified natural resins; for example, aceto- and butyro-copal, copal ester, etc. Denotes boron, oxygen, carbon, selenium, tellurium, nitrogen, sulfur, phosphorous, silicon, hydrogen, fluorine, chlorine, bromine, iodine, astatine, helium, neon, argon, krypton, xenon, and radon. Denotes all compounds having carbon therein and which are further characterized by the presence of (a) two carbon atoms bonded together, or (b) one atom of carbon bonded to at least one atom of hydrogen or halogen, or (c) one atom of carbon bonded to at least one atom of nitrogen by a single or double bond, with the proviso that hydrocyanic acid, cyanogen, isocyanic acid, cyanamide, cyanogen halides, isothiocyanic acid, and metal carbides are excluded from being organic compounds. A phenol for purposes of this subclass requires one or more -OH groups directly bonded to a nuclear carbon atom of a substituted or unsubstituted benzene ring, which benzene ring can be an individual benzene ring or can be part of a polycyclic ring system. (a) The -O-C group may itself be part of a cyclic ring system, e.g., see Fig. 1 below, etc. (b) The carbon of the -O-C group may be a ring atom of a cyclic or aromatic ring, e.g., see Fig. 2 below, etc. (c) An inorganic phenolate is an inorganic salt of a phenol (see phenol 1 above) wherein the hydrogen atom of a -OH group is replaced by a metal or an inorganic group. Tannin or tannic acid is considered to be a polyhydroxy polycyclic carboxy-containing phenol. Crysylic acid is considered to be cresol. Coal tar extracts are considered to be an indefinable mixture of ingredients some of which are phenolic in nature. Cardanol and anacardic acids are phenolic derivatives. (d) The carbon of the -O-C group may be a terminal carbon atom, e.g., Figure 3 below; or may be the carbon atom of a chain, e.g., Figure 4 below, etc. Denotes a material having more than one 1,2-epoxy group per molecule. Denotes polypeptides composed of more than 100 amino acids or having molecular weights greater than 10,000. (a) The so-called simple proteins which yield alpha-amino acids upon hydrolysis (e.g., albumins, globulins, glutelins, prolamines, histones, sceleroproteins, etc.). (b) The conjugated proteins wherein protein is bound to some other molecule or group (e.g., nucleoproteins, glucoproteins, etc.). (c) Derived proteins which are the cleaved products of proteins, excluding the monomeric alpha-amino acids themselves (e.g., proteins, metaproteins, coagulated proteins, proteoses, peptones, peptides, etc.). (d) Reaction products wherein the protein has been reacted and wherein the final reaction product retains peptide linkages. (a) Reaction of an aldehyde or derivative and an amine or compound containing a N- or N group where R is hydrogen or hydrocarbon radical. (b) Reaction of an aldehyde or derivative and a phenolic material. (c) Reaction of an aldehyde or derivative and a ketone. (e) A compound containing a T-(-O-A)n group. (f) A compound containing a group. Y" and Y" are H or hydrocarbon groups, Z is H or a carbon radical. T - is an atom other than H or C. A - is a hydrogen or carbon atom and which carbon atom is bonded to only H, carbon, or single bonded oxygen atoms. X - is H, part of an ether group, or an inorganic cation. n - is two or more, a is one or more. Denotes the intentional and deliberate presence of a material (other than as a reactant monomer) during the polymerization reaction, which material may be removed subsequent to the polymerization, or which may remain with or in the final desired polymeric product. The term "specified material" is limited to an amount of a material (e.g., 2 percent of a material, etc.). Examples of material, which are described in mere functional terms and are thereby excluded as being a "specified material" since they do not meet the parameters set out above, are terms such as free radical catalyst, redox catalyst, emulsifier, dispersant, base, acid, organic medium, etc. Water in any of its physical forms: inert gases (Group VIIIA), hydrocarbons, and chlorinated hydrocarbons are specifically excluded from this area as being specified material even if specifically recited as to name (e.g., chloroform, etc.) or as to amount (e.g., 2 percent of chloroform, etc.). A search for these materials requires a search of the appropriate product area. However, specific provision has been made in Class 526, subclass 208 for a mixture of a chlorinated hydrocarbon and water, and in Class 526, subclass 207 for a mixture of hydrocarbon and water. Terms such as complex, coordination complex, chelate, sequestered, or adduct, and terms which are exemplary of these but which are not limited to the enumerated examples, such as sequestered complex, chelated compound, etc., are classified as are compounds, per se, when they are products of a metal or metal compound and a nonmetal organic compound. These materials are classified as separate compounds or elements when (a) the product is the reaction product of at least two or more metals, metal-containing compounds, or mixtures thereof (e.g., alloy, etc.) or (b) when the product is the reaction of at least a metal or metal compound and an inorganic material. Patents in this area are to be classified on the basis of the claimed final compound or composition that is introduced into the reaction zone and is in direct contact with any of the monomers therein. If it is not possible to so classify the introduced material, classification is then made on the basis of the individual reactants used in the preparation of the unknown material. In the event that the claims recite both the individual reactants and identify the product formed therefrom, then the original classification should be made in the subclass that provides for the known product and a cross-reference should be placed in the appropriate subclass that provides for the reactants. Patents which claim an "in situ" preparation of "specified material" in the presence of the monomer are originally classified on the basis of the introduced reactants and cross-referenced to the prepared "specified material". (a) Aldehyde or derivative and a phenolic material. (b) Aldehyde or derivative and an amine. (c) Aldehyde or derivative and a compound containing N-. (d) Aldehyde or derivative and a hydrocarbon. (f) Polyisocyanates and a polyol. (g) Polyisocyanates and a polyamine. (h) Polyisocyanates and a polycarbocyclic acid or anhydride. (i) Carbonic acid or carbonate and a polyol. (j) Hal--hal and a polyol. (k) Polycarboxlic acid or derivative and a polyol. (l) Polycarboxylic acid or derivative and a polyamine. (m) Aldehyde or derivative and a compound containing N group. Denotes elements of atomic numbers 21-29, 39-47, 57-79, 89, and higher and does not include Zn, Cd, and Hg. Subject matter involving synthetic resins, or natural rubbers preparation, or treatment thereof; compositions containing synthetic resins or natural rubbers preparation or treatment thereof.
2019-04-24T09:20:12Z
https://www.uspto.gov/web/patents/classification/uspc520/defs520.htm
– since it’s a popular Indian dish, a lot of people have tried it from my site and sent me feedback. I guess they found my Paneer Butter Masala Recipe too homely! In most Indian restaurants, dishes are more creamy and have thicker gravy. The reason is very simple – they use cream. They use it as the base of every dish you order and it may make the dish arguably tastier. This is not hard to whip at home provided you have no qualms about adding that bit of cream and kicking up the amount of oil a notch. So here it is, my second Paneer Butter Masala Recipe, like they serve in Indian restaurants! I’d say the only thing that’s different from this dish and the one you get in Indian restaurants is the difference in the colour. That’s because they add red food colour and I didn’t. Note: I have updated the ingredients and measurements based on many trials of this paneer butter masala recipe, in case you have tried it before and can notice the changes.You may also wish to try some of my other super popular paneer recipes – matar paneer, paneer jalfrezi, and paneer tikka. Paneer butter masala restaurant-style recipe, step by step, using fresh paneer (or replace with tofu) and cream with other spices. A perfect, rich, decadent side dish for weekends and special occasions. Heat 2 tbsp oil in a pan and fry the paneer/tofu cubes until golden brown. Drain and set aside. In the same pan, add 1 more tbsp oil and fry the onions until golden brown. Next, add the dhania, garam masala, chilli powder and some salt. Fry for 30 seconds. To this, add the tomato paste/puree, tomato sauce and kasuri methi. Mix well and add the milk. Lower fire and cook covered for 5 mins. Open lid, add the fried paneer/tofu and the cream. Mix well and simmer for 3-4 mins. Add 2 tbsp oil to a hot pan and swirl around until the base of the pan is well coated. Add in cubed paneer pieces. Lightly fry the paneer cubes until golden brown on all sides. Drain and set aside on a plate lined with a paper napkin. To this, add 1 tbsp dhania powder/malli podi, 1 tsp chilli powder, 1 tsp garam masala and 1/2 tsp salt. Fry for 30 seconds until the masalas are well combined. Next you need 1 tbsp tomato paste. I used the same kind I used for the Tomato Spinach Pulao. If you don’t have tomato paste handy, just puree 1 medium-sized tomato and add it at this stage. Next we need tomato ketchup or tomato sauce, the bottled Maggi/Heinz kind. Add in about 1tbsp of this. Bring out your kasuri methi next. A generous pinch of this needs to go in. To this mixture, add 1/2 cup milk. Mix well and cook covered for about 5 minutes on low fire. Meanwhile, bring out the secret ingredient for making restaurant-style paneer butter masala (or any Indian curry for that matter). CREAM! I used Nestle cream but if you have fresh cream, please oh please use that. Just open the can and set aside or get your fresh cream ready. Once the tomato sauce mixture has cooked covered for 5 mins, open and add the fried paneer. Top this off with 1 cup cream. Mix well and simmer on low fire for 3-4 mins. Adjust salt. Because when they say Paneer Butter Masala, this is what they expect! For Paneer Butter Masala recipe in Hindi, Tamil, Telugu, Urdu, please use the Google Translate button on the top right of this website. Thank you so much for this recipe! It was very delicious! I was always afraid to try and make my own indian food. The recipe was easy to follow. I will be trying your other recipes! Where does da butter go in dis paneer butter masala? Thanks, great recipe, it is also quite simple and cheap what I like cause I dont like complicated recipes, which consumes lots of time, energy and money ! So this Butter masala is heavenly tasting and easy to made and I think Indian cuisine is best in the world ! Producing top taste and richly nutritious, full of fatt, even proteins – all this is possible only by top experts and Indian are top experts for food and most intelligent people in the world ! Dear Lord they invented Yoga, practical way to return to our homeland – heaven ! Last but not least, I dont like idea for not doing this amazing dish at least once in week, comparing with heavy food we are used to here in Slovenia (cheese everyday food) this is still not too heavy dish ;-)) All the best, love and peace ! Very nice blog. I am trying it soon. thank you parvathi, glad you liked it! no, but you can use soaked and ground cashew nuts if you don’t have cream. Paneer should not be fried instead, soak paneer cubes in hot water (with salt) for 15 mins to make it very soft. i loved it a lot. I just made this dish. It is too good. I had to leave a comment. Love the way you presented everything. Thanks for the wonderful recipe. Finally tried this recipe! Live in KL and was always wondering where I would find cream. The store keeps would send me to the coconut cream section and then say – oh, normal cream, we don't have that. Well, found it finally and then decided to make this. Bought tofu which turned out to be very soft, and would break too easily while frying, so skipped that step. Opened the tomato paste bottle and realized i couldn't use it. Husband said – use the pasta sauce we bought. So, did! Woderful recepie. The dish came out so well!!! I tried out this recipe for yesterday's Valentine's day dinner. I also made the bombay potatoes as well. Both were equally great. Both recipes are a keeper. Served them both with jeera rice. A very satisfying V-day meal. Loved the recipe and the diners just could not stop raving about it… I did add my twist though. One thing I did not like was the fried Paneer bit, hence I let the paneer be raw. It resulted in the Paneer cubes being tender and succulent. Second, after making the Onion Tomato Paste, I fine sliced another onion, fried it in the tempered oil till it was caramelized and then added the tomato-fried onion paste. Few questions: How many people does the above recipe serves? When you say 1 block of paneer..how many oz/grams does that mean? Can we add heavy whipping cream to it? I made this tonight and it was delicious. Everything I have tried from your blog comes out so well, am tempted to try some malu recipe to impress the hubby 🙂 Thanx for all the details n the helpful pics. My husband never liked Paneer Butter Masala or for that matter anything with Paneer until I made this for him. And he says it tastes way better than it does at a restaurant :). Thanks Nags! I have finally found an easy recipe for my Garam Masala! I love the step by step pictures! Thank you, & keep up the great work, Nags! I have finally found a recipe for my Garam Masala!!! I love tofu, too! I found you on Pinterest. I really love the step by step pictures, it helps with cooking & baking! Keep up the great work, Nags! Ahhh!Well, the dish turned out to be simply superb.. Your explanation was simple and nice. Any non-cooking person can try a hand in cooking after reading your blog. Thanx a loads for the step by step recipe, it really made my work easy. thanks a loottt…..a very gooood recipe..evrybody who eats it likes it alot…. i loved this dish really it is sooooooooooooooo tasty…. Nags,I tried this one and came out perfect for me..I mean this one excels compared to restaurant versions..My 7 year old daughter is a big fan of this one now.With the increasing dilemma every time I prepare this (addition of cream),I once substituted it with coconut milk..Alas,that was a winner too !Somehow I find it interesting without frying paneer.The real taste is missing somewhere..Thank you so much for the recipe. the recipe was very good and you laid out the steps very clearly for amateurs like me. I couldnt believe how good the paneer turned out to be. hey Paneer butter masala. but i did not find any butter ingrdient…. I have made this recipe over and over again in the past two months- it is a hit every time! I use Maggi hot and sweet ketchup and it comes out fine. This is now my go-to recipe when I have guests over!! The first time ever I read your blog/recipe. You write it in a very interesting and interactive manner. Liked to read the steps.. actually felt like you are talking to me.. Nice job there.. Im going to make it now.. Good luck to me. I don't have kasoori methi hoping it will still be okay! I made it as you've shown….i'm new to cooking… the gravy came superb, amazing taste but the paneer it din taste good.. i fried as told… wat to do.. Nags!!!!!!!! This turned out so wonderfully. I used Maggi hot and sweet ketchup and it was so so good. I am doing away with all my instant paneer makhani masala sachets. This is easier and MUCH better. I watched your presentation at the Google conference on Youtube, about ads and search optimization, it is really very useful for nascent bloggers like us. Keep up the wonderful work!! That sauce is fricken awesome! Have made paneer before, but cheated this time and bought it cubed. I also added black cardamon which gave it slightly smokey flavour. Also doubled the sauce – it is sooooo good! Because I double the sauce, I also added peas and eggplant. Seriously you could add anything to that sauce and it would taste heavenly! Wow.. my kids loved this recipie. I added Kashmiri chilli podwer and the colour turned out as in restaurant too.. thank you so much !! I am loving it….such an easy n tasty recipe.. Keep it up. m Arya fm kerala.. m nt a regular cook bt since a few days paneer butter masala ws lurking in my mind.. i jz fell in love wd d dish since i had it in a restaurant few yrs back n since den i ve been ordering it wenvr i go to a restaurant(well nt always bt quite often).. N now wen i finally decided to make it at home, jz googled for its recipe n ur blog's page ws on d top of d list.. D best thing abt ur blog r d step-by-step pics dt u ve added.. It jz makes cooking very mch easier for a non-regular cook like me.. I jz finished makin it n ve made jeera rice along wd it.. ll surely let u knw hws d combo.. Its a yummy combo bt since 'I' ve made it, m quite dubious abt it..! hope evrythg goes well n evryone likes it.. Thnx again for d awesome blog! Keep up da gud work! Hlo Nags, m Arya fm kerala.. m nt a regular cook bt since a few days paneer butter masala ws lurking in my mind.. i jz fell in love wd d dish since i had it in a restaurant few yrs back n since den i ve been ordering it wenvr i go to a restaurant(well nt always bt quite often).. Hi Nags..made this for dinner yesterday..came out Yumm !!! Thanks very much..Keep posting.. Tried this recipe and it came out very well. Can I replace cream by using thick milk (thickened at home)? do you mean khoya? i am not sure since i haven't tried variations but go ahead and try it. it's hard to get this paneer butter masala recipe wrong. Awesome!! Thanks a lot for the wonderful recipes! Brilliant! Thank you for the lovely recipe. I followed it to the T and cooked it – it's turned out perfect. Many thanks Nags for your super recipe, I tried it out and it came just like the ones we get in restaurants. and we just loved your "Natholi fry". This recipe came out excellent. I cant even describe how wonderful it is. I had to make a few substitutions. Instead of oil to fry the onions I used butter and I didn't have milk so I used half and half. I know this made the recipe really unhealthy but I wanted to make it as authentic as the restaurants make it to see if it tasted the same and if it did I would use healthier ingredients the next time. (If the fatty version doesn't taste good making it lo cal will make it taste worse!) What I discovered was it was delicious!! I used yellow onions and I noticed you used red, does it make a difference?? I made my own ginger/garlic paste. Also I couldn't fry the paneer golden ahead of time because I used a stainless steel pan and the paneer kept sticking to the pan. I'm making this again soon and might substitute the paneer for chicken. Thank you so much!! Just tried this recipe. Its awesum!!!Very easy to make n so delicious!!!Many thanks…I have also pinned it to my recipe board….pinterest.com/nandinichhatre. Delicious! And delightful photos and commentary – thank you! Wow… just made this, and I am eating it now. This is easily as good as anything I have had in a restaurant. I had to substitute fennelgreek powder for the leaves, but it tastes great. Thanks for taking the time to write this up! Nags – I'm a recent visitor and I really wonder how did I miss you all these days.. Tried your Kothamalli saadham & PaneerButter Masala.. both are super duper hit.. The best of all is the compliment from my hubby – No need to go to restaurant anymore for Paneer Butter Masala.. The complete credit goes to you.. Thank you so much & Keep rocking! i used kashmiri chili powder ..and got it really red .. hey i am from america..i have an indian friend who introduced me to this site since i am a huge fan of indian dishes..yesterday i tried paneer butter masala..all went good but eventually my paneer turned out to be so hard..the gravy was awesome..only had problem with paneer..any suggestion nags??? you probably over-fried it or the temperature was too high when frying OR, maybe the paneer wasn't super fresh. one tip i have seen but never tried is to dunk the fried paneer into a bowl of warm water, let it sit there for a minute, take out and squeeze all the water away. A lot of my friends swear by this method and use it for all their paneer dishes and recipes. is it k if i don't add the kasturi methi?? Just a doubt: Are you Tamil by any chance? If you add salt before adding milk, won't it cuddle the milk? Tried it last week and we (me and DH) loved it!.. I didn't have cream so i substituted it with almond paste. I wasn't too sure about the flavor but it came out fine. Next time i will make sure i have some cream in the fridge before i start cooking. It still was restaurant quality. I tried this and it turned out awesome… did not know that the creme is the key and i've been trying to get the restaurant taste and it failed every time till i followed yours. thanks for this wonderful recipe and the site rockz. Wonderful Recipe. Tasted just lik ethe one i have in restaurants. Thabks a lot !!! Wonderful Recipe. felt like i was havin panner in a restaurant. Restaurant style indeed, Thank you so much for being kind enough to share the recipe. My folks like it a lot 🙂 Thanks once again, God Bless! wat if a little amount of cashewnut puree is added to it along with tomato gravy.. Works perfect! Thanks for sharing the recipe. Ok, this is the coolest Indian-maintained food blog I've ever come across. And I tried this the day I read this and no surprise, it did come out finger-lickingly yummy. Great show! Thanks sooooooo much for this recipe and the step-by-step explanation…..My husband just loved it….I'm a beginner at cooking and it turned out wonderful…Oh but just that I did not have fresh cream and so I just used whole milk with a little bit of yogurt in it ;)….I'm gonna try the same recipe with chicken 🙂 :)…Thanks once again Nagalakshmi…. my son is a great fan of paneer reciepies. this must excited his appetite. This paneer butter masala recipe serves 4! Just that my paneer keeps on sticking to my trying pan… 🙁 …. any suggestions for that? the dish looks great. Thanks for step-step information of making paneer butter masala. Help needed for couple of stuff….. 1. How many does this serve? 2. I made fresh paneer but it sticks when I fry it on a non stick pan (its a good new pan)…. what temperature do I fry the paneer on? Thanks and glad you liked the paneer butter masala recipe! I just made this tonight! It was so, so good. I am just starting to cook Indian food, so this was a big success for me. 🙂 Thanks for the recipe! Heh.. heh.. 1st of all I mus say tht I found 256 comments in this page n wondered how much u must have been praised fr ur dishes.. I'm from Tamilnadu too.. 🙂 n I confess tht I'm totally grateful fr the recipe with neat pictorial representation.. Very useful… Keep going.. N b4 that can u help me to bake a cake in pressure cooker.. I dont own an oven.. I heard from ppl bakin cakes in cooker.. if u find how-to pls let me know.. waiting fr ur post.. . haven't tried to bake a cake in a pressure cooker yet but will surely do that so soon! Tried your PBM Recipe, Awesome is not the word.. Thanks so much for the recipe.. Im addicted to your site now !! Hi …Have to throw a party tonight for my hubby's colleagues and families and Butter paneer masala is on the menu. Your recipe was simple and very well demonstrated, will definitely try this one out and I have CREAM at home!! Thanks very much for posting this and loved your side comments that really added a touch of humor! Thanks again! hey… i made paneer butter masala wid ur recipe.. n it was delicious.. totally loved it.. though i skipped out on the kasuri bit since i din have it handy.. but it wasn't a problem at all.. it turned out yummy…!! Made this today, turned out to be awesome. Will definitely make again! I prepared PBM last night in the same way you have explained. I could not believe, it was so yummy!! very tasty and everyone loved it.thank u nags.. This is a very nice recipe. A perfect blend of ease with taste. I JUST WANT TO KNOW THE PREPARATION OF paneer butter masala without onion & garlic. ur recipe came d first wen i googles as recipe of panneer butter masala ! in my very first link i got the best i cud! tried ur recipe exactly d way told except for extra bit more of chilli powder n salt (blame my taste buds) and simply loved my own panneer butter masala…my cravings to long for one nly by going to the resto is over!! yaay! i can do a good show myself! thx a ton for the recipe! Is it mandatory to fry paneer cubes? It always sticks to the pan when I fry it? I am a single Male who usually cook by myself. Off late been following your recipies and they are awesome. The lucidity with picture really helps in quickly cooking. Hi.. The recipe looks delicious and wonderfully easy to follow.. Any time I make paneer it turns out rock hard.. I am having guests over for dinner and really want to try this but am afraid that the paneer will be real hard as always.. How do I soften it? Thanks for the recipe. I got some fresh homemade paneer from my aunt and was thinking about making paneer butter masala.Your step by step guide is really a great help. So glad you liked the paneer butter masala recipe. I can't cook for nuts, don't have much interest in it either. Came across this recipe and it looked simple enough. Tried it out and it came out really really well. My parents, after they got over their initial shock that their daughter can actually cook, loved it! The sweetness could have come from the cream, onions, or tomatoes. Methi leaves add a slight bitterness and a lovely flavour so the lack of it may have brought the sweetness forward, as you think. I tried a hand at preparing paneer butter masala today 🙂 and of course with the help of your recipe. It has come out reli well but i feel there is a tint of sweetness in it. I couldn't find methi leaves. so i didn't add them. Do u think d sweetness cud b cuz f dat?? This is the first time I came across your blog when I searched for a perfect (which could meet my expectation) Paneer Butter Masala recipe. Wow, I tried it right away (I was planning to make it today and had all the ingredients ready) and it passed with flying colors. It's superb, simply superb, just superb….. Hats off to you. Countless of thanks for posting this. Hmm.., the house is filled with nice aroma. Thanks again Naga. Anonymous – As I have mentioned a few times in the comments already, please FEEL FREE to use butter instead of oil before sauteing the onions. I just CHOSE TO use oil. Thanks for leaving a note on the paneer butter masala recipe. Definitely agree that using fresh homemade paneer really enhances the taste of this recipe. I just have one question, how is it paneer BUTTER masala when there is no butter in the recipe? otherwise this tastes fantastic, thanks for posting!! My all time fav dish….Nice post. Thanks a lot. this recipe rocks1!i gave this recipe to my mom and she made it.to be honest this was the best ever home dish prepared by her and i relished every bit.thank u for it. You don't sound cuckoo at all 🙂 Thanks dear Anonymous! Alright… I might sound cuckoo but I'm compelled to applaud your brilliant effort…. what stands you apart from all the other monotonous sites is your inane sense of humour! I specially loved the way you made it interactive. Lovely job! Thanks.. this was real quick and easy. I dropped the cream ( just added 3 tbsp) it was thicker gravy but more to my taste as it was spicier. But thanks, this really helped to cook a fast dinner. it came out awesomely..thanks a lot for the recipie. Hello, I made this for mothering Sunday, and it was delicious as usual. My family loved it, especially the children! Sarah in leicester, UK. For roti, I use my kitchenaid to make the dough so it comes out super soft. I was never an expert in roti making anyway! For nan, I have tried it only one and that too on a tawa. Came out well but needs to be eaten fresh and hot otherwise it turns rubbery! Thanks a lot for these good guidence. This one (PBM)is easy and really nice. Is there any secret tips in making Naan( Roti)? wow u got 200 plus comments for this dish.. i will sure try this NAGS…. New hear,gal u make all mallu out there proud. The receipe was great.Came out very well. A small tip::: Put the sauted panneer in step 1 in lukewarm water for it to become very soft and then add it in the last step as usual. I tried this recipe, its tasting really awsome same as in resturant, everyone family liked it and it was fingerliking.. awesome dish. everyone loved it ! thanks. Thanks a ton for sharing recipe…. India, as I have mentioned in previous comments, you can subsitute the oil for butter. I just didn't want to since this paneer butter masala recipe uses cream. Yay, and more power to more curry in Toronto! I made this last night and had to post about how absolutely delicious it was! Everyone raved!! All the best from friends in Toronto, Canada. i liked your recepies..i have a question tht where is butter..y didnt u add butter in paneer butter masala.as far as i know in restarants they used to add lot of butter.. Hey Nags.. Thanks a lot fr the recipe.. I made it with home made Paneer and served it along with jeera rice fr dinner Last night and my hubby and kid loved it.. It came out really really tasty.. My hubby actually thought I d picked it up from some restaurant.. Thanku.. You never mentioned butter in this recipe..?? main ingredient is butter know? I've been looking for a perfect paneer butter masala recipe for ages and after trying this out i can say that my search has finally come to an end… THANKS!! Thanks Mary, hope you like it! This is the second time I tried this dish. It looks good and tastes fantastic. Thanks for posting this step by step recipe. Bit of a disapointmnt for me…. was it bcos i ddt soak it up in warm water or do dey use any othr method in da restaurnts to make it soft? i came across your website when i tried to google for paneer butter masala… i landed here. thanks for the wonderful recepi and my family loved it so much.. i already made 2 times.. it taste really good and yummy and thanks for tthe recepi.. i wanted to know whether u have the "Restuarant style recepi for Malai kofta" pls. i would like to cook it for my family.. thanks a lot for the wonderful recepies. will be waiting for your malai kofta recepi.. Have tried paneer butter masala around 5 to 6 times and its been a complete disaster always, even followed vahrehvah chef's video and yet a disaster, but ur step by step look so easy and just wish for once that I get this right!!…..will try this n let u know….btw, was wondering if that nestle cream was sweet?? haha you certainly shouldn't be having this paneer butter masala every day Jas! So glad you guys liked the recipe. Oops forgot to mention; the way the step-by-step guide with Images is a very good concept. I really like the images in between that show the progress. Thanks again. Hi, I tried your recipe yesterday for the first time and it turned out very well. Infact delicious and awesome. Every one liked and appreciated it. Thanks for such a lovely dish. I hope I will try out many more from this list. Do you have a recipe for JEERA RICE? I couldn't find a good one. Have recently started cooking, and it's all from recipes. My mum's vegetarian but we only typically make paneer one or two ways; I was looking for a dish that was unusual for home cooking. Found it here! Sure, this is a rich dish but it's amazing how restaurant-like it turned out. The step by step helps, for sure, and it's easy enough to make when you're expecting company – plus, the ingredients are few, and likely already sitting in your kitchen. Loved it! More creamy could be because you added too much cream or it was thicker than usual cream. And the bitterness could only be because of too much kasuri methi. Or did you burn the onions? I made this recipe today since my mom had followed your recipe and hers turned out excellent! So, I decided to give it a shot myself…and for some reason, mine turned out a lot creamier, and slightly bitter than the way my mom's was…we both used your recipe. Any suggestions? thank you so much for letting me know your thoughts 🙂 I have used ricotta cheese for other recipes although this will taste best with paneer and is passable with tofu. the fenugreek leaves add a distinct flavour to the dish but you can avoid it if you can't find it of course. I used white cheese, one named "ricota" here. I dont know its name in English but is a cheese that people use for diets and almost without taste… at least I thought it, but the taste of cheese overtook the spices =( And texture is different from paneer, it is harder. My mother liked it, but she has never tried panner… theres no comparision! I feel if I had made with paneer would be great! But, as I said, we dont have paneer here…. I think I will make with tofu, 'cos we can find it in some stores. So, my advice is to dont use white cheeses instead of paneer! Ah, I dont have fenugreek, do you think it makes much difference? Haha thats so funny!! Thanks a ton for trying my paneer butter masala recipe! I the maaan…for today at least. And all thanks to you lass! A forced bachelor living in US, trying new dishes on his co-habitants. Congratulations for the site!Its my 1st time here! Heyyy…I tried this for the first time today and it was amazing…I am awful at taking the initiative to cook/learn to cook and I am so glad I did it. Thanks :)I should try the tofu thing though as I am going the healthy way. Quite recently, say a two days back i have visited your site and excited to see your recipe presentation style and yesterday night i tried Panner Butter Masala. It has come out exactly hotel sytle. My husband, my son,had a good feast. Thank you so much. hahaha that's awesome, so glad it came out well. I have a question (sorry if it's lame, I am only 18 9and a guy at that!) and still an amateur.Would it be better to add butter instead of oil? you are most welcome. hope you enjoy the restaurant style paneer butter masala recipe. Just going to try it out. Looks delicious – thank you for the wonderful pictures and easy-to-follow instructions. Thank you so much for your very kind words Neha. Did you try the restaurant style paneer butter masala recipe? i was looking for paneer butter masala recipe when i came across ur blog.I dnt know how ur recipes are going to turn when i try it in my kitchen but the way u write it or present is mindblowing…i mean to say that its so chatty as if you are in frnt of me n telling me what n how to cook .it was fun going thru ur blog n recipes. Apart from that– thx for such an insight on food photography!! Am damn sure ur cooking expertise is as colorful n vibrant as you!! I just made this recipe and it was great, I used real Paneer and yogurt instead of cream but it was still as described in your post. I would definitely make this again. There are so many different reasons why this could have happened, in addition to the reasons you mentioned. My recipes tend to be a bit heavy on coriander since we love the flavour. Thanks a lot!!! It came out great!!! Okay, so it was very good, however, it wasn't like the restaurants in my area. There are about 12 Indian restaurants. Of the two I go to, one just got back from spending a week in India learning new Indian recipes. He wont' share even if I pay him to just watch him. the other is a family and they aren't interested in sharing. Couple of reasons why It might not be the same. the Garam Masala I used was homemade. Forget where I got it but I had to roast dry cumin and coriander, and plenty of other stuff. I am a teacher I I got a recipe from at parent and she insisted on using Badshah masala. I haven't tried her recipee for Panner Mutter yet. The other issue could have been it may have been better had I mad the onions into a paste. You rarely have whole onions. the final issue could have been lack of some key indrediants. I notice you other version of Paaner Masala as added ingredients like bay leaf (maybe not in yours, I forget) but had way less coriander, had mustard seed and cashew nuts. I also noticed you used fenugreek powder rather than the dryed plant. Isn't the powder made up of the seed? I hope I haven't asked to many questions. Maybe you would prefer me email you this stuff in the future. Let me know you thoughts. I am determined to figure this out. okay, after my obsession with Chicken Tiki Masala I have been scared to try any more indian recipess, because after months of failures, all sucked. I am going to try this tomorrow. I will let you know how it goes. I tried this recipe today and it came out great! My husband doesn't like paneer, but paneer butter masala was a childhood favortie for me, so I had to give it a shot and HE loved it! It does taste like the restaurant wala paneer butter masala! Thanks! I'm going to try out a few more of your recipes! Payel, if you are very particular about using butter in the recipe, you can replace the oil with it. Since the cream more than makes up for it, I didn't do that. Feel free to adjust according to your preference. I have made this curry several times for the dinner parties I have had at home. Every time, it stands out from the rest. Thanks for sharing this recipe! Thanxxxx for the lovely recipe !!!I have seen many recipe websites but this one is a real good !! Really Nice work…looks more attractive with photograps !!! Btw, i loved ur site and the way it is organized…..mine still long way to go, but now modifying little by little everyday as time allows. PLs pop on to my blog when time allows, would love to hear from u, ur suggestions, criticism….anything..link is http://shabscuisine.blogspot.com/. I ma bookmarking this to try!!looks soooo good! Gosh 119 comments on this recipe….I'm sure it tasted awesome! Step by step instructions are great. The pictures gave the recipe details….didn't have to read through. Truly looks so creamy – restaurant style! This recipe is just fantastic! My hubby loved it and so did I. It's going in my fave recipe collection. I am not sure if my treatment of the kasuri methi to the curry was right because they remained as green specs all over the curry — the pictures do not show it like that. That's so awesome, so glad this was a wife-pleaser recipe 🙂 If you have pics, do send over to me. Wow Nags! You have come such a long way with this blog. Just thinking back to the days before you got married and started posting a few simple recipes. Now you are a resource for paneer butter masala restaurant style with 114 comments!!! I'm really proud of you girl, and the recipe and pictures look great. I will never eat this the same way again after seeing all the cream and oil going into this. Haha. I'll keep checking in on you girl! All the best, and warm wishes to you and your husband, and also to your sister!!!! I made it for dinner. It turned out great. I did add green peas for colour. Thanks again Nags for your great recipes. My sister-in-law made a paneer recipe once and I suddenly craved it this morning. I knew it would take some time to make paneer (I have yet to find an Indian store), so I thought tofu would be a good substitute. When I came back home, I saw your recipe and was so happy you used tofu yourself! I followed your recipe but made substitutions: for the masalas I just put in curry powder, cumin, chili powder, cayenne powder, dried cilantro leaves, black pepper, and paprika (this actually gave it its red color). I used whole milk instead of cream and just adjusted the taste. It was perfect! The heat was not immediately tasted so it was not shocking to the palate. Thanks for a wonderful recipe! I just want to say to other people who would be intimidated, don't be discouraged! Try it once and adjust for next time. Very delicious..love your step-by-step procedure too..thanks for sharing this.. I tried it using evaporated milk instead of cream, part skim mozzarella string cheese cut into pieces instead of panneer and added peas too. I turned out yummy. Thanks for the recipe. wow my all time fav. mmmm so tempting looks so creamy and inviting nice step by step pic. nags. My most fav one….looks really like restaurant style…with loadz of cream in it.. Such a delicious dish, my most fav dish..looks rich and creamy Nags.. Wow this just looks so so yummlicious. Next time when i give a indian dinner, i am sure gonna make this. Just that we don't get paneer here, so i will have to make my own paneer. A lovely favorite recipe.The color and pic and prep steps all perfect.I must say Thums up!!! Scream Cream:-).. so you snuck in tofu there? LOL can never know from the looks & it actually 2 recipes in one! I make my paneer butter masala in a very very different way than this, most of the times without onion & with tomato. i do get the restaurant orange color with out food color. Madhuram – you get to buy fried paneer? Didn't know that! The step by step pics have me drooling….. Wonderful step by step tutorial. I've never had paneer but would be willing to try it. Great site. Akila – that's awesome! thanks for letting me know 🙂 paneer butter masala rocks!!! I tried this today Nags and it came out very well. Thank you so much. My mil is with us now and she too enjoyed it very much. Yes we do get fried paneer cubes in the freezer in the Indian grocery stores here. Nanak brand. loved it, i tried and it turned out perfect, i used halloumi cheese popular in middle east. i like indian vegetarian cuisine.here it goes into my recipe diary!! Finally got the correct restaurant styled recipe. Thanks to you and the step by step instructions included with pictures. What actually is the cream made of? Is there any substitute or making the cream all by ourselves? I am a frequent visitor to your blog.Just love all the recipes which you have posted.Today morning i tried ur recipe…OH GOD!! just cant take my tongue out.. I had invited my friend to come over. he emptied the entire bowl. THANKS A MILLION for it.i have bookmarked your blog for future references. kindly post making of paneer step by step. Thank you once again. Sweety try something original! We already know this recipe from vahrehvah chef.. Tejus, sorry! saw the comment only now. This is milk cream I have used in this recipe. Can you use your super smart brain and tell me how to make a paneer butter masala recipe "original"? There are a gazillion versions out there and this is MINE! If you feel my recipes are not original enough for you, feel free to not visit anymore. Also, if you think commenting as "anonymous" keeps your identity safe, you are sadly mistaken. I can still figure out who you are. What joy people like you get out of being mean, I'd never know!! here is the url if anybody is curious http://vahrehvah.com/popvideo.php?recipe_id=3536 posted sometime in 2008 .. thanks a ton for this recipe AND the step-by-step guide!! i made it yesterday and it came out SO well!! my husband and i simply loved!! it was awesome..thanx again!! I made this dish today and Im so happy to add a new skillset to my cooking! It turned out delicious.. and i liked the concept of adding milk.. It will keep others guessing the recepie! Thanks for the recepie ! Thanks a ton for posting this recipe. I tried out this for dinner and it turned out to be delicious. My husband and my mother were surprised to see that I could cook so well!! Thanks again and keep posting. Hi tried this and it came out really well…posted in my blog today..Thanks a lot! I tried this word for word and then added pureed palak just before the paneer and cream. Awesome and the step by step instructions make it simple..Thanks! Tried your restaurant version of paneer butter masala, it tasted fantastic. Wow, this looks awesome! Thanks so much for sharing. Thanks for the recipe! I tried it yesterday and it became a super hit!! Sj you nut! where is the typo in the title? That's a good substitute, your tutorial is damn good, your pics too of course no need to say absolutely ravishing.., you got lot of patience dear, The bowl is just droooooling…. I am going to give the most unique comment here. Something no one has said, and that is- typo in your title. Looks so Delicious and creamy.. Really inviting.. Step by step pics are great and the dish is very yummy! I love the first pic Nags!I absolutely adore this dish and I am glad you shared it…I have to try this! Absolutely delicious and you make it seem so simple! Wow…. such a delicious dish, looks creamy and yummy. looks delicious..i knew it was tofu when i saw the pictures, and thats a brillaint idea,, am going to try this "tofu butter masala" soon.. Not a huge fan of anything paneer, but liked your gravy idea and I might try it in some vegetable dishes. Gotta try this soon..To add to ur qn in the prev post, even I use fried paneer for my cooking. I think I have acquired ESP when it comes to recipes. For the past few days I think of something and it literally falls on my lap. Just this morning I got fried paneer from the Indian store to make PB masala and I was thinking of trying some other recipe than the one I usually make and here I have a pictorial tutorial for it. I'm trying this one this weekend. Thanks Nags. WOuld like to WOW my Non-Indian friends with this recipe!! Looks creamy and nice! YUM. I have NEVER ahd this dish *head bowing in shame*. Love your tutorial. And I am intrigued by your use of tofu. I've never ventured into trying tofu in curries. Way too wimpy for that. This dish looks great! Thanks for the step-by-step photos! You could make your own paneer next time! It requires only 2 or 3 ingredients. This is my all time fav dish. Looks delish! Good explanation Nags only the Naan is missing there, makes the perfect combo. Delicious, cream is the culprit ha? Even I have some tofu 😉 Tofu cream masala?
2019-04-20T10:30:16Z
https://www.cookingandme.com/2009/10/05/paneer-butter-masala-restaurant-style/
Given that I have already written much of the system down, I figured it would be a good time to reveal the formula itself - how CTH and shooting would be calculated in the new system. Hopefully, by doing so you might be able to reveal problems I haven't spotted or thought of. In-game, of course, the only feedback we get is the final result, so spotting problems just by playing would be somewhat more difficult, which is where this formula comes in handy. Also, disclosing this formula will make it easier to play with the INI variables that will be supplied with the new system. If you know what factor comes in where, you'll have a better understanding of how to change it and by how much. 1. This is written in Pseudo-code like all my other articles. You don't have to understand C++ to read this, but you do have to understand basic maths and logic. That's just how these things go. 2. Any variable shown in CAPITAL LETTERS (like "NORMAL_SHOOTING_DISTANCE") is an externalized coefficient. They are placed in the INI and thus are fully tweakable. They almost always act as a sort of multiplier to some part of the formula. You'll understand once you see them. 3. The default values of the externalized coefficients is given in parenthesis, so for instance you will see "NORMAL_SHOOTING_DISTANCE(70)", meaning that the current default value is 70. Since these are fully externalized, testers will be able to change these variables as they see fit, and the values here are not by any means final - just the ones I'm using right now - and aren't guaranteed to be anywhere balanced. 4. Most coefficients are treated as FLOATs, meaning that they can take a decimal point. This is not always shown in the pseudo-code just because I'm lazy. Base CTH is a free amount of CTH given to the character with ANY shot with the same weapon. The initial value is based primarily on skills. After that is calculated, all conditional factors like injury are summed up together and the final result used as a percentage to modify Base CTH. Base CTH mainly represents the amount of CTH you'll have when taking shots without extra aiming. It is supposed to represent pulling the trigger when the gun is aimed in the general direction of the target, but no time has been spent making sure that the muzzle is actually pointing towards the target itself. As you can see, the most important part of the calculation so far is Experience Level, which counts as three times as much as the other skills. That's because we're only calculating a rudimentary aim level which hasn't yet employed precision aiming at all. It's just the shooter's ability to place the gun nearer the target center in a "snap shot" situation, and hence benefits more from the shooter's experience than things like marksmanship. The divisor is used here to return the sum of all skills into a range of 0-100. This is similar to averaging the skills, but taking into account the fact that some are (or can be) more important than others. We use the coefficients in a way that modding the importance of any skill would still result in a 0-100 final range. Base_CTH is divided by 3. This gives us a final range of 0-33. We don't want shooters who are 100% accurate with base shots, ever. Of course, at very close distance, a value of 30% would mean that the shooter stands a very good chance to hit the target even without any extra aiming involved. This would be great for pistols or burst-fire weapons, which would be very useful at close range. Assuming no bad conditions apply to the shooter (see below), the average merc should have around 15-20 base CTH. As mercs gain experience, this should increase considerably. Weapon's_Base_CTH_Modifier is calculated from the weapon itself and its attachments. This is a flat modifier to Base CTH. I'm not sure which weapons or attachments should give such a bonus, but it's possible. Note that this allows weapons to go past the 0-33 range. It can't go below 0 however, in cases where the weapon/attachment lower the Base CTH for any reason. Now we've got the preliminary value for Base CTH, and we start calculating the various factors that will affect it. These are added together into a separate final number, which is then used as a percentage to modify our Base CTH. The order in which these are added is largely irrelevant, but I'll write them here in the same order I have them written in the code. "Base_Modifier" will be used as the final sum of all bonuses/penalties. Morale greater than 50 gives +2 points for 55 morale, +4 points for 65, +6 for 75, etcetera. Morale lower than 50 gives -1 points for 47 morale, -2 for 45 morale, -3 for 42 morale, etcetera. The difference between how low and high morale are used really isn't my fault - it's using the program's Morale Calculator formula which takes into account the fact that NPCs have a different sort of morale from player characters. Can't be helped unless I rewrite that formula to make more sense. This only happens when shooting at a target that hasn't moved since the last time you shot at it. Also, if the shooter moves, this bonus disappears. Shooting at the same tile twice also gives this bonus, whether or not the same target is standing there (or any target at all). We use injury as a percentage here. If our merc has 50% bleeding injuries compared to his own maximum health value, he gets half the penalty, which would be -15 points. It's impossible to get the full -30 point penalty of course, since that would mean the shooter is dead (100% bleeding injuries). Note that bandaged damage is only 1/3 as powerful as bleeding injuries. Breath is also used as a percentage. If the shooter has 50 breath points (half the maximum for all mercs), he gets half the penalty: -7.5 points. Drunkness really affects base CTH, as you can see. Each level of drunkness has its own coefficient, so you can play with the values as you see fit. Gas makes it REALLY difficult to shoot straight - it'll kill half our Base CTH. I've decided not to apply a great penalty on being bandaged, at least not nearly as great as it was in the old system. This is Shock from suppression (though severe injuries can also add shock for a few turns). As you see, the maximum possible penalty from this is a whopping -150, but this is only achievable by complete noobs under very heavy suppressing fire - they won't get any Base CTH. Maximum Shock is around 30 (depending on your HAM INI settings), and as a shooter gets more experience and morale and so forth, it's likely that his actual limit would be much lower. Still, a few shock points can be very powerful, delivering -5 points each. Height_Modifier = Calculate Height Difference. This is a little more complex. First we determine the difference in height between the elevation of the gun and the point we are aiming at. In addition, Target_Height is increased by 3 points if it is on the roof. Basically, this means that shooting from prone stance at a target's head counts as two Height Difference points. Shooting from standing stance to the torso of a character on the roof counts as one Height Difference point. And so on. Shooting DOWNWARDS is not affected at all. The penalty only exists when pointing the gun upwards, which is much more difficult than shooting straight or down due to the uncomfortable angles it involves. Also note that the penalty is divided by Range_to_target, so it is strongest at close range and gets considerably weaker as we go past 10 or so tiles. Shooting at a target on a roof 10 tiles away is almost the same as shooting straight ahead, really. Target_Skill_Modifier = either Target_Experience_Level or Target_Agility, whichever is higher. This is somewhat of a relic inherited from the old CTH system. Basically it means that a target can anticipate shots and duck out of the way. I'm not too fond of this, since it's hard to properly model it on how it would work in real life. If you don't like it, just set BASE_AGILE_TARGET to 0, and the penalty's gone. You can see I've set it pretty low to begin with - only targets with 100 experience or 100 agility will give the full -5 point penalty anyway. Base_Modifier is increased by BASE_INVISIBLE_TARGET(-100). An invisible target reduces the modifier by 100 points. If you can't see the target, rudimentary aim is going to be rather inaccurate. Remember of course that extra aiming _CAN_ make up for this, and also that 0% CTH (even WITH aiming) doesn't mean you're going to miss the target. It really depends a lot on distance. Enemy combatants do cheat at higher difficulty levels. This is also a relic from the old CTH system, and again you can now mess with the coefficients if you don't want them to. At Experienced difficulty, they get no bonus. At INSANE difficulty, they are 50% more accurate (with their Base CTH). This is almost a separate part of the formula, and a very important one overall. This part calculates how hard it is to prepare the gun for shooting, and how hard it is to hold the gun steady. It's represented by the Gun Handling value, and takes into account several important conditions. Please have patience while reading this - the Base_Modifier will not be adjusted until the VERY END of this formula! Gun Handling is based primarily off the gun's Ready Costs. That value already takes into account a lot of things about weapon handling, so it stands to reason that it should be used here. At least in 1.13, StarWalker's done a good job with these, so they already correlate directly to the size, weight and shape of the gun. Now we start modifying this value based on various conditions. Two_Guns_Modifier is decreased by 1. Two_Guns_Modifier is divided by 2. Two_Guns_Modifier is increased by 1. By default, shooting two guns is 3.5 times more difficult than each gun on its own. Ambidextrous mercs reduce this to 2.25 times more difficult. Note that this system opens the way to having mercs with two levels in the ambidextrous trait, where these "expert" ambi's will get only about 1.62. The trick I did there with decreasing by 1 and increasing by 1 later is only for making sure that Ambi mercs don't shoot EASIER with two hands than with one, regardless of the value of BASE_TWO_GUNS. It's just math wizardry, so ignore it if you don't get it. A gun fired with just one hand is half as easy to handle as a gun fired with both hands. This happens when a one-handed gun, like a pistol or small SMG, is fired while the other hand is holding a non-gun item. Heavy_Weapon_Modifier is decreased by 1. Heavy_Weapon_Modifier is divided by 2. Heavy_Weapon_Modifier is increased by 1. Once again, math wizardry. A normal merc would find a Heavy Weapon twice as hard to shoot. HEAVY WEAPON skill reduces this to 1.5, and EXPERT HEAVY WEAPON reduces it to 1.25. Note that I'm not terribly sure about the values here, because most heavy weapons are already going to have a massive Gun Handling due to their inherently high AP_to_Ready value. Stance influences how easily we can handle our guns. Note that since we are calculating Base CTH - the amount of CTH we get for a "snap shot", we actually suffer for crouched and prone stances. Of course, these stances will benefit more when adding Extra Aiming levels. In other words, for quick fire you want to stand up, and for aimed fire you want to get down. I'm not yet sure how to make Bipods work as far as XML tags and all that. But I do know that this is how they are going to affect gun handling. In other words, a bipod with perfect balancing (100) will eliminated Gun Handling completely, regardless of the size and weight of the gun. A bipod with 10 points will only reduce Gun Handling by 10 percent. This is where Gun Handling finally affects our base modifier. We lose two points from the modifier per Gun Handling point. At this point a pistol used with two hands while standing up gives the lowest penalty. A Sniper Rifle or Heavy Weapon while prone gives the worst penalty, could be up to -40 given the (-2) coefficient. Base_CTH is increased by ((Base_CTH * Base_Modifier) / 100). If Base_Modifier was a negative number, which it usually is, then Base_CTH is decreased by that amount. For instance, -20 Base Modifier gives a 20% reduction in Base CTH. If the modifier was positive, that's an increase. For instance, 5 Base_Modifier gives a 5% increase in Base CTH. As mentioned previously, Base CTH is a free amount of CTH given for every shot with the weapon. Of course, it really depends on what weapon, what stance, and other factors as shown above. It will normally be between 0-30, while VERY skilled shooters can go higher than that, but not by much. What this basically means is a 0-30% decrease in Muzzle Sway. At 0, muzzle sway is as large as possible, by default 22.5 degrees to either side of the target. At 30, muzzle sway is 30% smaller than the maximum, giving an angle of about 18 degrees to either side. Of course, most shooters will want to add extra aiming points to improve their aim. This is pretty much essential for hitting targets more than a couple of tiles away. That's when we go into Aiming CTH territory, as will be explained shortly. "Base CTH" represents our accuracy when making "snap shots", inaccurate unaimed shots in the rough direction of the target. At close range, these can be enough to perforate an enemy, especially when burst-fire is used at up to about 10 tiles. However, to have any realistic chance to hit the target at about 5 tiles or beyond with a single shot, we need to reduce our Muzzle Sway considerably. That's where Aiming CTH comes in. Aiming CTH is added on top of Base CTH when the player adds APs for the shot. Each aiming level increases CTH by a certain amount. This makes muzzle sway lower, and hence reduces the radius in which shots might deviate off the target's center. An accurate shooter, firing at a reasonable distance for his equipment, should reach fairly good odds to hit the target given enough Aiming is applied. Aiming CTH is calculated in almost exactly the same way as Base CTH. First, a "preliminary" value is calculated using the character's skills, indicating how many points we can get under "regular" conditions. Then, we pool together all the factors that may influence aiming for better or for worse, and use these as a percentage modifier to increase or decrease Aiming CTH. Each level of aim will give us a certain part of that final value. Despite the similarity, you'll notice that Aiming CTH is calculated based on some factors that do not affect Base CTH. For instance, gun condition affects Aiming, but not Base. The opposite is also true, as some factors that affect Base CTH do not affect Aiming CTH. In addition, Aiming CTH has its own coefficient values, also adjustable in the INI file, separate from Base CTH coefficients. This allows testers to modify the two calculation separately. Finally, due to the fact that Aiming is level-based, you'll see a bit at the end that decides how many of the total points each Aiming Level will actually give. We begin by calculating a value called "CTH Cap". In simple terms, this is the highest amount of CTH our shooter can possibly have. Under no circumstance will the shooter have more than this many CTH points for any shot. In aiming, Marksmanship is the most important skill, followed by dexterity. Experience Level, which played a major role in Base CTH, is now much less important. Once again, we divide CTH cap by the sum of the coefficients. Regardless of their values as set in the INI, this will always return a number within the scale of 0-100. This time we do not divide by 3 as we did with Base CTH. I haven't yet decided which of the above methods to use in applying a weapon's modifier. A percentage based modifier (the second option) is probably more suitable. In any case, this sort of modifier will be used primarily for attachments that somehow enable shooters to be more accurate regardless of their skill. Laser Sights are a possible candidate to receive such a modifier, as they allow the shooter to per 100% accurate with their aim, provided they can see the red dot on the target. The maximum amount of CTH points we can get from aiming is the difference between the Cap and the Base. In other words, our shooter begins with Base_CTH points, and with aiming can go all the way up to the CTH Cap. Of course, this will require plenty of aiming, which is why it's called the "Maximum" and not just "Aiming CTH". You'll see much later in this calculation how each aiming level gets its own Aiming CTH. Once again, we now start pooling all the factors that can affect our aiming into a single number, called the "Aim_Modifier". After they are all added, it will be applied as a percentage to the Maximum_Aiming_CTH, either reducing or increasing it as appropriate. The process is very reminiscent to the calculation of the "Base_Modifier" from the previous chapter. However, the factors here have different importance. Gun condition is very important for aiming, but only if the gun is properly damaged. In other words, a severely broken gun is simply harder to hold straight, or aim straight. We get -2 points per gun condition point below 50. We'll now cover several factors that were used (and explained) in the Base Calculation above. The only difference of course is the value of the coefficients. Invis_Target_Modifier is divided by 2. Aim_Modifier is increased by Invis_Target_Modifier. All of the above modifiers are used to alter both Base CTH and Aiming CTH. You'll notice that most of the coefficients are "harsher" than they were when calculating Base. That's because it's much easier to fire a random shot in roughly the right direction when under duress than actually ensure a shot in the right direction in such conditions. You'll also note that shooting at the same target twice doesn't add any bonus. Nor does target agility/experience give any penalty. These should not be relevant when aiming, and only apply to Base CTH, which is more closely related to spotting the target quickly rather than actually improving your chance to hit it. The only coefficient which doesn't suffer as heavily as in Base CTH is when the target is invisible. In that formula, it reduced Base CTH to 0 (by applying -100% to it). In the Aiming CTH formula however, you can still aim at invisible targets, though only half as effectively as normal. Snipers and Expert Snipers suffer much less of a penalty, and can hit targets they can't see based solely on information from whoever does have the target in their line of sight. This is just one of several advantages that Snipers are going to have in the new CTH formula. Even if the target is not invisible, aiming properly at it does suffer if it isn't very visible. To this end we use a formula called "SoldierToSoldierLineOfSight()", which basically measures how visible the target is by calculating cover, stance and camouflage. The returned value from this formula indicates the "relative" range to the target - meaning how far away that target might've been if it was 100% visible. In other words, a target with low visibility is actually considered to be further away than it actually is. This can be a little much to take in, but the result is fairly simple. If the target is considered to be twice as far away than it actually is, visibility-wise, then we get a -25% penalty to aiming. If the target is seen as four times as far away than it actually is, we get a -37% penalty to aiming, and so forth. Again, if the target is completely invisible, we get that flat -50% penalty, as seen earlier in the formula. Now, let's have a look at how Gun Handling works. In general, the idea is the same as with Base CTH: Larger, less wieldy guns are harder to aim properly. However, unlike Base which benefits from being able to swing the gun around quickly, Aiming is more about holding the gun steady, preferably with some sort of anchoring. Therefore, the shooter benefits from a LOWER stance rather than a HIGHER one. Again, this is largely the same as the Gun Handling formula used in Base CTH calculations, except the coefficients are different (harsher), and Prone stance is preferable to Standing stance. Maximum_Aiming_CTH is increased by ((Maximum_Aiming_CTH * Aim_Modifier) / 100). This sort of calculation should be obvious by this point, so I won't explain it. The next step, of course, is to figure out what part of this amount do we get for each aiming level? 1. "Basic JA2": With this system, used in the vanilla game, ANY weapon can have exactly four aiming levels. 2. "Basic JA2 1.13": All weapons can have up to 4 aiming levels. However, installing a 7x scope on a weapon increases this to 6, and installing a 10x Scope increases it to 8. 3. "HAM Dynamic Aim Levels": With the HAM system, weapons have various aiming level limits based on their type, the scope installed (each scope has its own limit) and the use of a bipod to stabilize. These three systems were all designed to serve a certain purpose. Unfortunately, all of them were designed around the Old CTH system, and therefore are somewhat out of place in the new system. In the new system, the benefits for using a scope are taken into consideration outside the CTH formula, and thus are largely separate from the CTH value. If the target is at 2x Normal Distance, the very use of a 2x scope makes a shooter far more accurate as without one, regardless of how many extra aiming levels he should add. In fact, at that distance, 75% CTH with a 2x scope is four times more accurate than 75% CTH without one, so even at max aiming a properly-equipped gun at the right distance is going to do a much better job. In other words, CTH represents how well the gun is aimed within the limits imposed by the scope. A better scope at the proper distance gives smaller muzzle sway, making each CTH point be more valuable. By this logic, there's no reason not to let a shooter reach his maximum allowed CTH regardless of the gun he's using. Therefore, increasing the number of aiming levels available for each gun becomes unnecessary. In fact, I am currently inclined to return to the original JA2 system - where each gun is allowed the same number of aiming levels. The point being that with the same number of aiming levels applied to it, a scoped sniper rifle is already much more accurate than a pistol, thanks to the calculations inside and around the CTH formula, owing largely to things like high Scope Magnification and low Bullet Deviation. Maximum Aiming Levels can therefore be completely externalized to an INI setting, adjustable by players to increase or decrease the time required for a shooter to maximize his aim. If the INI setting is decreased, aiming would simply achieve maximum results FASTER. If increased, it takes more APs to aim the gun to the best of its (or the shooter's) ability. The maximum CTH achieved at the last level is the same for all guns, but it has far more weight when that gun is also more accurate and used with a higher scope magnification. At the moment, I already have this system written into the code with 8 extra aiming levels being the maximum for all guns. Unless I hear concrete objections to this, that will be the system used with the new Shooting Mechanism. Once we've figured that out, we need to decide how much CTH is added for each of those 8 levels. I've decided to go with a gradual increase: The first aiming level increases CTH by a majority of the points, and each subsequent level provides fewer and fewer CTH points. The final level produces a very small amount of points. If the number of allowed aiming levels for all guns is 8 (my current default), then the divisor is 1+2+3+4+5+6+7+8 = 36. If the number of allowed aiming levels for all guns is 4 (JA2 default), then the divisor is 1+2+3+4 = 10. Now we divide Maximum_Aiming_CTH into equal fractions using this divisor. Assuming 8 levels are allowed, each fraction is worth 1/36 of the Maximum_Aiming_CTH. The first aiming level will give us 8 of these fractions (8/36). The second level gives 7 fractions (7/36). The third level gives 6 fractions. The last level gives only 1 fraction. So you see, the first level is greatly helpful, adding a substantial amount of Aiming_CTH to our shooter. The last level gives much less than that (1/8 as much as the first, in fact). For one, this system means that to shoot with a reasonable CTH, the shooter is only going to have to add maybe one or two levels, which already gives him about 1/3 of the total amount of achievable Aiming CTH. An extra level pushes this to almost 1/2. Secondly, the last few CTH points can have an extreme impact when trying to be as accurate as possible. Decreasing the Muzzle Sway from 20% to 15% can make a difference between a shot that can miss to a shot that can't, whereas 80% to 75% is much less so (this depends greatly on distance, of course). Lastly, the way this system operates makes it so that a shooter in distress or wielding a large unsupported gun will simply get nothing for those last few APs, since the size of a "fraction" is too small to add up properly. This effectively limits the number of aiming levels that are of any use at all, which in many ways copies the behavior of HAM's Dynamic Aiming Limits system into the new shooting mechanism without having to make a separate formula for it or base it arbitrarily on scopes or bipods. If a bipod isn't used, the weapon's Gun Handling value will cause extra aiming to become much less useful. If a scope isn't used, extra aiming is hardly as beneficial even if it brings CTH up to high levels. Therefore, the system becomes self-contained, and doesn't require arbitrary external limits like telling a merc he can't spend more APs on a shot - he simply doesn't benefit from them, within the same rules laid out in this formula. Here we come to a peculiar sort of modifier, which as you notice is being calculated at the very end of the formula. This penalty, called a "Scope Magnification Penalty", is one of the unique parts that makes the new CTH system so different from the old one. As repeated several times in this article, CTH is only one factor in several that determine whether the shot will hit its target. One of the most important factors is the use of scopes. Scopes installed on a weapon provide two important effects - one positive, the other negative. The positive effect is calculated during the actual shooting of the gun, and will be explained in greater detail below. It is applied whenever the gun is being given extra aim at the target, and is definitely crucial for hitting targets beyond a dozen tiles with any certainty. The negative effect will be explained here. Its purpose is to DIMINISH the effectiveness of the gun when used below the scope's "optimal" range. A gun with a scope mounted on top is harder to aim properly when the target is too close. This is reflected by a categorical penalty on Aiming CTH. To understand how this effect works, we'll need to understand the concept of the NORMAL_SHOOTING_DISTANCE. This is another coefficient, externalized to the INI file, and one which has a massive impact on everything that has to do with scopes. NORMAL_SHOOTING_DISTANCE effectively determines the optimal range of any scope based purely on its magnification factor. A 2x scope is therefore optimal when the target is at 2*NORMAL_SHOOTING_DISTANCE. A 4x scope is optimal at 4*NORMAL, and a 10x scope at 10*NORMAL. When no scope is installed, the normal distance is largely irrelevant except for purposes of 3D maths. The default NORMAL_SHOOTING_DISTANCE value I'm currently using is 7 tiles. This means that a 2x scope is optimal for 14 tiles, a 4x for 28 tiles (sightrange), and a 10x scope is optimal at 70 tiles. Please remember that with the new system, decimal magnification scopes (like 1.5x) are possible. While calculating CTH, we use this "optimal distance" to determine the range at which our scope becomes a LIABILITY - making shooting harder. In realism terms, this is related to the fact that a large device is obstructing our ability to aim the weapon at close targets, using the weapon's build-in Iron Sights as we would if no scope was installed. It impedes visibility of that target, and forces us to either aim with too much magnification, or aim by feel. Both of which are treated by the CTH system as being equally detrimental. Scope_Mag_Factor = a value derived directly from the scope we are using. A 2x scope would put this value at 2.0. Best scope range is 7 tiles * 2.0 = 14 tiles. Target is at 10 tiles distance. In other words, when shooting a scope at this distance, we suffer a 40% decrease in Aiming CTH due to the difficulty of aiming a 2x scoped gun at a target that isn't at the best range for that scope. Naturally, the more powerful the scope, the worse the ratio would be at this distance. A 10x scoped gun is barely aimable at all at this distance, causing Aiming_CTH to plummet sharply to just a few points if any. This is further complicated, as you'll soon see, by the fact that at sub-optimal range we don't even receive a 2x benefit from the scope, but rather a 1.4x benefit. These two factors combine to make short-range use of scopes very unrecommended. In fact, it's probably better to spend the APs to remove the scope, then fire, if the shooter has enough APs to do so at all. The benefits from such a system should be obvious - it constrains long-range weapons to be used as long-range weapons. It forces us to either carry extra sidearms or other small weaponry, or have some of our mercs equipped with such weapons and dedicated to close-combat. A sniper caught at close-range would be unable to shoot accurately at his assailant. On the other hand, weapons equipped with no scope would obviously be extremely ineffectual at anything more than NORMAL_SHOOTING_DISTANCE. Final CTH is simply an addition of Base and Aiming CTH, limited downwards by 0, and upwards by the CTH Cap. The use of CTH_Cap for this purpose is important. It means that every shooter has an upper limit that he or she cannot cross regardless of any other factor. Remember - CTH_Cap is determined primarily by Marksmanship and Dexterity, and is meant to represent how stable the shooter is when all factors are in his favour. Note also that an extra limit is used, the one in JA2_Options.INI, which determines the highest CTH possible for ANYONE. It is currently 99%, but that will probably go down to around 95% with the new system in place. Remember of course that 8 levels of extra aiming are usually required to reach this limit, and would be impossible if more than a few negative modifiers are applied either to Base, Aiming, or both. Shooters who calculate their CTH Cap at over 95% will benefit by effectively negating up to 5% of negative penalties, if any are applied during the calculation. Such mercs, of course, would be very, very rare. We view CTH as being the "Chance to hit the target", but of course this is no longer so. With the new CTH system in place, the term 'CTH' is an anachronism, used here only because it is more familiar. In fact, this entire calculation was actually for our "Muzzle Sway" value, the radius inside which our gun is swaying back and forth over the target as we try to find the right moment to pull the trigger. If CTH was 0%, Muzzle Sway is 100%. This means that the muzzle can deviate all the way up to its maximum radius (calculated later). If CTH is 95% (the proposed maximum), then the muzzle can only deviate up to 5% of this maximum radius, meaning that the gun is more stable and probably pointing straight at the target or just a little bit off. Of course, as we'll see later, without a scope this doesn't hold true at any normal engagement distance. (Please excuse anything I might've forgotten in the above formulae. Note that gun/attachment modifiers are not yet implemented, so I probably forgot a few). Shooting doesn't start and end with CTH calculation. Both with the old and new systems, after pulling the trigger the program still has several things it must process before firing the bullet. Essentially, this is where 3D Maths come in to ascertain a flightpath for the bullet. There are several functions that handle this, which I'll refer to collectively as the "Shooting Mechanism". This mechanism begins with a function called "UseGun()", which handles the primary aspects of gunfire: Calculating CTH, adding experience, applying tracer effects, calculating bullet path, firing the bullet, and if necessary setting things up for the next bullet in an autofire or burst volley. The parts we're interested in are obviously the CTH calculation and the bullet path, both of which are handled by some complex sub-functions. Please note that the entire system makes heavy use of maths, particularly trigonometry, to figure out distances and angles in 3D. If you don't understand trigo very well, don't worry - it's not really essential. The old system relies heavily on the result of the CTH formula, and does relatively adjustments to bullet flightpath little after computing the CTH value. In other words, its choice of bullet path is determined primarily by CTH. RandomNum = A random number between 1 and 100. Bullet_path = a straight path from the gun to the center of the target. There's a few other parts I haven't mentioned above, such as some sort of inexplicable upwards deviation that occurs when shooting at rooftop enemies, but since this system is about to be replaced, that is largely irrelevant. The basic idea is that the bullet will usually end up going straight for the center of the target, assuming the dice-roll against CTH was successful. Otherwise, a random point is picked within a certain distance of the target, and the bullet is shot at that new point. That distance depends on how badly the dice roll went. CTH holds very high importance here. It basically determines everything else. In fact, even experience gain is directly related to CTH. High-reliance on the CTH system is what makes it all so exploitable, not the least because we can SEE CTH, but also because we can reliably raise CTH to high levels even if we turn CTH bars off. 1. CTH, now called "Muzzle Sway" Each factor works in its own way to adjust the bullet's flightpath. They can do so in one of two ways: either increase/decrease the distance to which a bullet can deviate, or actually move the center point for the shot away from the target. This runs on a "closed system", so these factors are integrated seamlessly, with no exceptions to the rules I set down. The UseGun function is sort of a "doorway" into the shooting mechanism, and only sets up the very basic variables for the shot: It runs the CTH calculation, and also figures out the X/Y/Z coordinates for the very center of the target. It then sends those variables on to deeper parts of the formula, and once those are done doing their thing, they return the new coordinates for the bullet. The system then fires the bullet directly at the given coordinates, wherever they might be. Note that the "Target Center" coordinates are actually the center of the targeted bodypart. In other words, the "target center" isn't always the center of the torso, it could be the center of the head or the legs. With these variables in place, we can start calculating where the bullet is going to go. The basis of the system is to determine how FAR the bullet can go off the target's center. That value is called the Muzzle Sway. Since many of the other parts rely on the size of the sway, we're going to need to calculate it first. The coefficient MAXIMUM_SHOOTING_ANGLE determines the maximum angle at which the bullet can fly. The original program set this at 22.5, which means shots can go in a 45 degree cone forward of the shooter. This is done to prevent bullets from going in weird direction like sideways. We multiply the sine by the range to target, giving us the maximum radius to which any shot can deviate off the target. This draws an imaginary circle around the target center. If we decrease the MAXIMUM_SHOOTING_ANGLE, the size of this circle becomes smaller. This causes all shots to be more accurate in proportion, because they can only be adjusted within (and based on) this circle. Now you see how CTH affects the shooting mechanism. Basically, the inverted CTH is used as a percentage to modify the size of the circle. 20% CTH makes the radius of the Muzzle Sway circle 20% smaller. 80% CTH makes it 80% smaller, and so forth. At 0%, the circle is unchanged, and at 100% (normally unattainable) the circle is actually a dot with 0 radius. So we can see that the scope actually makes the muzzle sway much smaller, assuming of course that the target is at the correct distance. If it is closer, our scope doesn't provide the same bonus. If it is more distant, the Muzzle_Sway itself is larger, while the magnification doesn't grow, making the shot harder. In addition, you can now refer back to the CTH formula, where I've explained that scopes below their optimal distance also decrease CTH considerably. This means that a shot with a 10x scope at 10 tiles is actually harder than a shot with a 2x scope at 10 tiles, despite them both giving the same magnification factor (1.42 for both). In the new CTH system, moving targets are going to be considerably harder to hit. Depending on the direction in which the target is moving, and the distance it's managed to cover, the shooter suffers an interesting effect that is unlike anything used in the old system. What we're going to do is, instead of making the sway radius larger, we're going to move the center point away from the target, as though it is lagging "behind" the target. This effectively decreases the chance to hit that target, increasing the chance of bullets to pass "behind" it (with the definition of "behind" being based on the direction of movement). We've already got the fourth value (Muzzle Sway) which we just calculated in the previous section. So we're going to calculate the other three values before continuing. This measures the X/Y difference between the target's original position and its current position. The "original position" variable is saved in the target's data at the start of its turn, so this "difference" represents the amount of X and Y tiles the target has moved since the start of its most recent turn. This is basic Pythagorean Theorem, and gives us the actual distance covered by the target. ArcTangent2, also called atan2, is a programming concept that handles trigonometry in a gridlike environment. Basically, the result of this computation is the angle of movement compared to the Positive X axis. Positive X in the game is going from northwest to southeast. Therefore, if the program returns 0, the target is moving southeast. If it's 180, the target is moving northwest. 90 is northeast, and 270 is southwest, etcetera. Another math-based calculation (there will be many). We're actually comparing the angle of the shot to the angle of movement, and then getting a value between -1 and 1 that describes the relation between these angles. The result is that if the target is moving TOWARDS or AWAY FROM the shooter, the multiplier is 0. If the target is moving perpendicular to the shooter's line of sight, left would be 1 and right would be -1. Other angles are in between - for instance, if the target is moving equally towards and to the left of the shot line, the multiplier is 0.5. This is an important factor, we'll be using it to diminish the effect of target movement on our shot. In other words, if the target is moving to/away from the shooter, we'll feel no negative effect from its movement no matter how fast it is moving. We'll suffer the worst effect if it is moving perpendicular to our shot. Finally, we need to figure out how skilled our shooter is. You know the routine by now. I've chosen to set all skill coefficients to 1, as they all seem equally important to me in this matter. You'll see how this affects the shot in a minute. Also I was considering adding target agility and/or experience level to this formula, but haven't done so yet so it's not included. Moving at a speed requires the shooter to compensate. Depending on his skills, the shooter will take some time to adjust to this movement. However, after the target has moved a certain distance, the shooter begins to compensate for the movement, effectively "leading" the target. A skilled shooter will begin compensating much earlier, while an unskilled shooter may be unable to compensate at all. To simulate this, we're going to add a part of the penalty for each tile of distance moved, up to a certain number of tiles. If the target moves more than this much, the penalty begins to shrink again. If the shooter is skilled enough, and the target has moved far enough, the penalty will disappear completely. The result of the above mathematical formula, given the default coefficient, is 1 tile per 10 combined skill. The result tells us how many tiles the target can move before the shooter starts compensating, which is obviously based on his skill. With the default value above, a character with 50 combined skill will suffer the movement penalty for any target moving up to 10 tiles a turn. If the target moves any further, the shooter start compensating, reducing the overall movement penalty. The better the shooter, the less tiles a target can move before the shooter starts compensating. Conversely, a less skilled shooter will only start compensating after the target has moved a great distance. How does this work? Well, as mentioned above, we add a small penalty for each tile the target moves until we reach the limit. Then, we start "compensating", so the penalty starts shrinking. If the shooter's good enough, and the target moves far enough, we can compensate enough to cause the penalty to disappear. Penalty is increased by MOVEMENT_PENALTY_PER_TILE(0.2). Penalty is decreased by MOVEMENT_PENALTY_PER_TILE(0.2) / 2. This should be fairly obvious. We add 0.2 points to the penalty for each tile, until we reach the "limit" tile. Then we add nothing. Another tile, and the penalty goes back down by 0.1, and so on for every tile moved beyond that. Target moves 1-6 tiles, penalty is 0.2-1.2 accordingly. Target moves 8-20 tiles, penalty is 1.1 to 0.0 accordingly. Of course, moving 20 tiles in a single turn is practically the limit for most soldiers. Therefore, a shooter with combined skills of 63 is unlikely to evade the movement penalty completely, but can diminish it if the target is moving far enough, or less than 7 tiles. At no point is this shooter suffering more than a 1.2 point penalty. Target moves 1-3 tiles, penalty is 0.2-0.6 accordingly. Target moves 5-10 tiles, penalty is 0.5 to 0.0 accordingly. Here, the shooter has enough skill to evade any penalty for targets moving 10 tiles or more. This is a significant improvement. Also, at no point is this merc suffering more than a 0.6 penalty, which as you'll see soon, isn't half-bad. Of course, to achieve this, the merc needs a combination of high skills and considerably high level. But what does this penalty mean? The Movement Penalty, as I've said earlier, is an actual relocation of the "target center point" some distance behind the target along its movement path. In other words, the shooter is aiming for the wrong location, and thus stands a significantly lower chance of hitting the target. Muzzle Sway and the Movement Penalty value are used as multipliers to find the distance by which to move the center point. This means that the smaller the muzzle sway, the less distance it is moved from the target's real center. However, it is smaller, and thus sufficient movement can make it unlikely, or even impossible, to hit the target at all. At a movement penalty of 1.0, the muzzle sway circle has been moved a distance equal to its radius. This means that the tip of that circle is now touching the target's real center point. If the muzzle radius was large to begin with, this doesn't significantly reduce the chance to hit the target, but then it wasn't too good to begin with anyway. If the muzzle radius is small, this movement can reduce the chance to hit the target from 50% to 10% or even less, depending on which bodypart was aimed for, etcetera. Movement penalties over 1.0 are more interesting. At this much deviation, the tip of the circle is no longer touching the target's center point. In fact, it may not even be touching the TARGET at all. If the circle radius was large enough, penalties over 1.0 can cause the entire circle to be shifted off the target, making it impossible to hit. A smaller radius circle hasn't moved as much distance, and may still be overlapping with some part of the target. This means that better aiming is beneficial in this case, although obviously the target is still harder to hit than it would be when stationary. Expert shooters who can reach CTH in the 90's, and equipped with the proper scope for the given range, will find that the shooting circle hasn't moved by much at all, still allowing a hit on the target, albeit not at very good odds. Nearly forgot this one, didn't you? This is the multiplier we calculated when we compared the movement angle and the shooting angle. If the target is moving perpendicular to the shooting angle (90 or 270 degrees), then the multiplier is 1.0, and the penalty is unadjusted. If the angle is sharper than that, the penalty is reduced. A target running towards or away from the shooter has an angle multiplier of 0, thus negating the penalty completely. This is for 3D maths enthusiasts only. In this part, we determine the location of the new Center Point for the shot, based on all the ingredients we've gathered so far. This new point will serve as the center of our muzzle sway. The muzzle will now sway around this point, rather than around the real center of the target. Laser sights, maybe? Such sighs would assist in making a more accurate snap shot, without the need for actual aiming.
2019-04-24T00:29:37Z
http://thepit.ja-galaxy-forum.com/index.php?t=msg&th=16717&goto=250998
If the universe is intelligible, it is impossible for a being to begin to exist in time unless another being caused it to exist. Likewise, if the universe is intelligible, an infinite being exists. I guess you need to define 'intelligible', for one thing quantum mechanics makes the traditional notion of direct causality a little naive. Then there's this linear notion of time you have which seems to ignore general relativity. Does a black hole exist 'in time'? Even though within the event horizon time passes at an infinite rate relative to our time of reference and time never passes for us relative to its frame of reference? Do you even understand what time is? If you want to discuss these things, let's at least start from the science of the 1920's and progress from there. That was nearly a hundred years ago now, for the sake of these discussions I think we should be able to take the mathematics of Gauss (nearly 200 years ago) and Cantor, Quantum Mechanics, and General Relativity as read. Their implications certainly shouldn't have to be pointed out every time this topic comes up. Please keep this on an amicable level, if you disagree with "my" logic or what I have said I am happy to hear what the flaws are in the logic. There is no need to resort to personal insults. If your intent was to insult me then you have suceeded, I feel insulted however I refuse to respond in kind. Axioms are completely logical. They may be "faith" positions, but, like I've already said like, three times, they're completely necessary, which makes them logical and rational. Stop trying to say they aren't. They are. What I'm addressing is the double standard materialists have. You said earlier that religious experiences are basically the brain playing tricks on you, and materialists will outright reject the experiences of people who believe in God because they don't think they're trustworthy. I'm applying the logic right back on you in the sense that you have no reason to trust your experiences anymore than a believer's experience of God. In large part, I'm actually agreeing with you. We have to start somewhere. My point is that you're in no position to assert that the religious experiences of people aren't something to be trusted. You're in no position to scoff at people for believing in Jesus Christ because they claim to have had a genuine experience of him. I follow what is known as the Principle of Credulity: It is rational to accept what experience indicates unless special reasons apply. We accept what experience tells us in the absence of special reasons not to. Blah blah blah I have faith blah blah blah considering we have positive evidence for God blah blah blah God is good blah blah blah. Whoa, wait a second -- positive evidence for God? Care to share some of this "evidence"? I did. In another thread, to which you replied, "I got nothing. The only logical conclusion I have is he did Resurrect." Oh, but then you meandered on over to your favorite "debunking" site and were "convinced" by someone else. Pretty rich coming from someone who is always harping on "thinking for one's self." I'm saying that God didn't have to make things the way they are. Why is not having free will bad? Because love is not possible without it. It's not the only thing you apparently keep forgetting. I can't count the number of times people on these boards have told you that Orthodox do not believe in this notion of Original Sin and Atonement that you think we do. It's not the basis for anything in our faith. Why did Jesus have to die, if not to correct original sin? To defeat death. Orthodox Christians do not believe in the imputation of "original sin." We are only accountable for our own sins. But that's beside the point. You are purely based on faith. If I want to know what you think I'll read the bible and then read some transcription of that written by the Orthodoxy Church. If I want to open up your mind I would have to get my ideas published in the bible or the transcription of that written by the Orthodoxy Church. You do not afford yourself the luxiory of thinking. You seem very intelligent however your logic seems illogical. I like that you try to introduce the concept that logic and reasoning are simply beliefs, however I don't agree on this. I do get a bit frustrated with regards to my conversations with you because your responses with regards to your stance do often get mixed up with the stance of your Orthodoxy. I would like to view you as an individual but you do not afford me that luxiury. I was surprised with regards to Achronos' stance on thinking so have posted something that I was hoping would get a reaction, I was hoping he would backtrack and suggest that he does engage his own brain towards thinking things through rather than strictly adhere to what he is told by his spiritual advisors. I am sure he is a thinker so maybe he has a little bit of devil in him. If he doesn't think then it seems to be a waste of god's gift (his intellect and reasoning capacity) to him. Um, how is saying the Wizard of Oz's Strawman is a man made out straw in any way a personal insult to you? And now I'm going to attempt to bring this back on you. Do you accept the religious experiences people of other religions claim to have as true? Do you accept the extra-terrestrial experiences people claim to have as true? I actually agree with your last paragraph. I think the reason "It's been proven how easy this stuff is to make up and it's super crazy" is a good enough reason to distrust them, not to mention the lack of evidence. Ugh, the Jesus story debate. I don't want to even get into that. Why? Who made this the way it is? I acknowledged that I did not know this, and so I withdraw my original argument. To defeat death? Huh? Care to elaborate? Time cannot exactly be defined without controversy. Stephen Hawking has postulated that time began after the Big Bang, and even if time was before the Big Bang it would be meaningless. For example the "Penrose-Hawking singularity theorems" require the existence of a singularity at the beginning of cosmic time. However, these theorems assume that general relativity is correct, but general relativity must break down before the universe reaches the Planck temperature, and a correct treatment of quantum gravity may avoid the singularity. Now the "Hartle-Hawking boundary condition" in which the whole of space-time is finite; the Big Bang does represent the limit of time, but without the need for a singularity. However that last account is theory at the moment, and that theorom states that it may avoid the need of a singularity. However if we took the opposite that a singularity is needed, I would propse that the 'singularity' is God. On the "intelligeble universe"? "The most incomprehensible thing about the universe is that it is comprehensible"- Einstein. I think it means that everything about the universe is knowable. No matter how esoteric or mathematically complicated or counter-intuitive, it can all be figured out. Einstein was marveling at the order we find in the universe and our ability to come up with clever ways to understand the things and phenomena we see. He might have even entertained the notion of a divine creator who created the universe in such a way that intelligent beings could discover all of its secrets. This is exactly why Einstein reached the point of an ocean of metaphysics, this is exactly why we have super string theories, multiverses, and unification theories. So since we have an intelligible universe; the fabric of reality is built out of eternal mathematical truth. Going back to Einstein's quote, the so-called "anthropic principle" and that we would not be here to ask this question unless the universe had enough order for complicated creatures like us to evolve. So therefore we have a cause for the existence by someone that caused its being to exist. Therefore, like Einstein alluded to, there is an infinite, eternal, Creator behind this order. Was He willing to prevent evil, and thus negate any choice man would make? No, for that would not have been Love. Instead He chose to overcome evil with Good. I'm not sure if I addressed this earlier since I've been having convos with Sleeper. So let me get this straight. God loves us because he would not prevent evil. How does this concept work? Even if I accept that this really enabled free will somehow, how can you say God loves anyone when he allowed so many good, God fearing people to suffer because of evil? Why not prevent these peoples suffering by the hands of the evil? Because of Gods allowance of a choice many people suffer greatly. This is malevolent. There is no real choice to be made however. He does not fit in any little a=b boxes we try to place Him in, rather He tells us He is neither a, nor b, nor even c, that a only equals b from our limited perception, and that c is greater than we could imagine. This is a very telling argument. This, to me, is almost an admission of your own lack of knowledge (don't worry, there is none to be had). God is always something real and tangible until we review him closely. When we get to the details he gets more and more fuzzy and more and more contradictory. What you really seem to be saying here is, "There are some things that may be contradictory about God but we are only seeing a small part of a bigger picture." I completely reject this notion. God is always greater than we can imagine when we ask questions. There is always suppose to be some much greater meaning that we simply do not get. If you believe that, then what makes you so sure that you know anything about God? If the revealed words of God are not enough for us to understand him how can we be held accountable for disbelieving him? More importantly, what esoteric knowledge do you posses that allows you to know what is in Gods mind, if he fits into no boxes we can place around him? If our ways of observing the world cannot detect or understand him there is no reason to assume he exists. If we accept the Biblical narrative about the Fall, we find that evil only exists because of man. In fact, evil is an action, not something that happens. There are things that happen that are tragic, such as calamities, plagues, and famines and such, but in a good vs evil debate these don't rise to the level of evil. In fact, if it weren't for our fear of death (whether it's the fear of damnation, or the fear of total non-existence) events would have no sense of tragedy to them at all. If everyone knew for certain that after you die you go to a place even better than the one you know now (I hear there's pie) death would not be mourned, but celebrated. Evil requires an action. It takes a rather twisted humanity to turn tragic circumstances into evil circumstances. A hurricane might kill a few, a disease might cause some suffering. It takes humanity to force people to live under deprived conditions, to ensure that death involves as much suffering as possible, to send people off to gulags to wait in fear of execution. Animals might kill for food, or to protect territory and mating rights, it takes a human to kill for an I-pod. It exists because man is given the freedom to choose, he can choose God and the good and life, or he can choose evil and death. There is no other way that would allow for choice. God is good, to reject Him is evil. It couldn't be a choice between God and ice-cream, for the opposite of God is not ice-cream. The only way for God to not allow evil would be if God were to not allow humans. We could perhaps argue if it were better for God to not have created humans, but if the answer is that God is evil because He created humanity, then the only answer is mass genocide of the species. That'll show Him. To echo others on here, I don't think you really have comprehended yet what Orthodox teaching is. God is in essence unknowable. We can know He exists, we can know certain things about His existence by His revelation, and in conjunction with that revelation we can determine certain things about Him from creation. But, don't misunderstand, it's not that when we get to the details He gets more fuzzy. It's that when we get to the details He gets more complex. And this is so with anything. Anything seems simple enough when you take it on face value, it's when you start asking questions, delving into answers, that more questions are bred. Take anything in the natural world. A human being seems simple enough at first, then you start examining each part. You go underneath the skin and find a host of bones, connected by ligament and powered by muscles. Behind those bones is a brain and heart. Delve further under a microscope and you find all sorts of cells. Then you reach DNA. And even DNA is constructed of even tinier pieces. But you don't find these things out until you accept that a thing called a man can exist. We could have never realized the complexity of bacteria and virii until we stopped questioning that tiny invisible particles can cause diseases, and we started looking for them instead. Even better, take that dizzying world of Quantum Physics. The more questions we answer, the more questions pop up. We have more questions about the nature of reality with all of our answers than the Greek philosophers could have dreamed of. It is even more so with God. The more I know God the more I realize just how unknowable He is. Knowing He is Good is a good starting point, then I find there is more to goodness than I ever imagined. Right did Milton tell us that "How Awful goodness is." Fortunately, we don't have to understand Him. But even this is not surprising. I cannot even begin to understand a fellow human being, the second I think I do they do something so shockingly surprising (good, bad, or just unusual) that I am left puzzled. When you get right down to it, I don't even understand myself all the time, I am constantly doing things (good, bad, or unusual) that I never would have thought myself capable of. Know what's in God's mind? My good fellow, if I could just know what's in your mind it would be a miracle! But you don't need to understand someone to have a relationship with them. You can understand some things about them, the rest you take on faith. I understand that my friend is occasionally grouchy because his father abused him, I have faith that if I'm in a pickle he'll be the first one to get my back (faith within reason, he's had my back since day one). I understand that God is terribly good, I have faith (within reason because of the Incarnation) that He will make me good as well. I tried to edit my original post, but I could not. So I had to make a new one. So you employed a different full-on attack than the one I suggested you might, but you used the same essential tactic. When you or I say experiences we mean, "information gleaned from the senses." In the quote above, you are using the same word, experiences, but you don't mean information gleaned from the senses. You mean information gleaned from emotion and intuition. You may mention logic, but logic needs premises, and religious premises come from emotion and intuition, either one's own or someone else's. I reject out of hand any notion that emotion or intuition provide data, as they can only suggest hypotheses to be tested by the senses - and you know I reject that notion out of hand because I have been telling you that from day one. What the senses cannot detect isn't knowledge. This isn't some weird arbitrary stance I take. Emotion and intuition provide questions, not answers. I love questions. But answers about reality come only from the senses. You think otherwise and therein lies the epistemological divide that can never be bridged. All I can do is keep lobbing grenades at one another. My grenades say, "Senses!" yours say, "Emotion and intuition!" And so it goes. Now sometimes you'll employ a flanking maneuver, and start talking about the history, tradition, and authority of your church, but if I press you hard enough for what these ultimately rest on, you'll answer that they're based on religious experiences, by which you mean, emotion and intuition, since you can't possibly mean the senses. You acceptsthe history, tradition, and authority of your church because of your own emotional and intuitive experiences, and those of your advisors, and those of a long line of people stretching backwards two thousand years into the past, all of which you consider to be evidence, and none of which I consider to be evidence, because none of it is derived from the senses, and only the senses provide evidence. Once again, we lob grenades over the divide. Mine say, "Senses!" Yours say, "Emotion and intuition!" And so it goes. So then I say, "Wait a minute, Muslims have religious experiences too! Why should we believe yours and not theirs?" You scoff at this, of course, because, unlike me, you consider emotion and intuition to be sources of answers rather than questions, and, of course, answers can be true or false. For you, then, it is perfectly appropriate for you emotions and intuitions, your answers, to be true, while a Muslim's emotions and intuitions, a Muslim's answers, are false, and not just a Muslim's, but a Jew's also, and not just theirs, but a Catholic's or Protestant's, even a Catholic's or Protestant's, fellow Christians though they are. This is ludicrous to me, because, where reality is concerned, we deem the senses to be the sole arbiters of what is true and what is false. Once again, we lob grenades over the divide. Mine say, "Senses!" Yours say, "Emotion and intuition!" And so it goes. The above three paragraphs summarize pages and pages of going back and forth and round and round. No resolution is available. You won't accept the senses as the sole arbiters of truth or falsehood about reality, and I won't accept anything other than that. The divide remains tall and thick and insurmountable and will remain so forever. If we accept the Biblical narrative about the Fall, we find that evil only exists because of man. And God let evil exist because of man. In fact, evil is an action, not something that happens. There are things that happen that are tragic, such as calamities, plagues, and famines and such, but in a good vs evil debate these don't rise to the level of evil. Yes, natural disasters that take potentially thousands, maybe even millions, of lives aren't evil. Not at all. In fact, if it weren't for our fear of death (whether it's the fear of damnation, or the fear of total non-existence) events would have no sense of tragedy to them at all. Who gave us our fear of death? If everyone knew for certain that after you die you go to a place even better than the one you know now (I hear there's pie) death would not be mourned, but celebrated. This is demonstrably false. Christians and other theists who sincerely believe they are going to heaven when they die are just as afraid and saddened at death as anyone else. It takes a rather twisted humanity to turn tragic circumstances into evil circumstances. A hurricane might kill a few, a disease might cause some suffering. It takes humanity to force people to live under deprived conditions, to ensure that death involves as much suffering as possible, to send people off to gulags to wait in fear of execution. Animals might kill for food, or to protect territory and mating rights, it takes a human to kill for an I-pod. And God made humans. What does this say about him? It exists because man is given the freedom to choose, he can choose God and the good and life, or he can choose evil and death. Why must he choose between these two things? Why can't he still be good without God? Why does he have the ability to reject God? Why does he have abilities that, when utilized, point towards no God? There is no other way that would allow for choice. God is good, to reject Him is evil. It couldn't be a choice between God and ice-cream, for the opposite of God is not ice-cream. The only way for God to not allow evil would be if God were to not allow humans. We could perhaps argue if it were better for God to not have created humans, but if the answer is that God is evil because He created humanity, then the only answer is mass genocide of the species. That'll show Him. Why did God have to create humans the way they are? To echo others on here, I don't think you really have comprehended yet what Orthodox teaching is. God is in essence unknowable. We can know He exists, we can know certain things about His existence by His revelation, and in conjunction with that revelation we can determine certain things about Him from creation. Why can't we know more? If you accept that God is good from the start, then anything he does is good automatically, making the word "good" useless when talking about God. Why is faith good? Why wouldn't God prize intelligence and rationality more? Why aren't all humans equal? Suppose it seems to you that you are looking at a tree. Your visual experience indicates as much. Is it rational for you to believe that there is indeed a tree before you? Under normal circumstances, the answer is yes, of course. But let's consider two other circumstances. First, you have been wandering around a desert for days on end, with no water. You are severely dehydrated. You have a visual experience that seems to be a refreshing pool of water surrounded by trees. In this circumstance, you have a good reason to doubt what your visual experience is communicating to you. You're likely hallucinating. Second, suppose you see a tree running. You know trees don't run. This is absurd. You have a good reason to believe your visual experience is false. In the first example, even though you wouldn't question seeing trees and water under normal circumstances, the special circumstances change everything. In the second example, apart from the circumstances in question, you have a good reason to doubt your visual experience, because you know trees don't run. The Principle of Credulity tells us, essentially, to give the benefit of the doubt to our experience in the sense of direct awareness. We accept what our experience tells us when there aren't any good reasons to think otherwise. When it comes to the religious experience of other people or alien encounters, I'm not willing to make blanket statements so I'd have to look into the details of each case. That's fine, we don't have to. You asked me a question and I answered it. Isn't that how this works? Why can't God create a rock so heavy he can't lift it? Do you really want to go down this path? Romans 6:9: "For we know that since Christ was raised from the dead, he cannot die again; death no longer has mastery over him." 1 Corinthians 15: "20 But Christ has indeed been raised from the dead, the firstfruits of those who have fallen asleep. 21 For since death came through a man, the resurrection of the dead comes also through a man. 22 For as in Adam all die, so in Christ all will be made alive. 23 But each in his own turn: Christ, the firstfruits; then, when he comes, those who belong to him. 24 Then the end will come, when he hands over the kingdom to God the Father after he has destroyed all dominion, authority and power. 25 For he must reign until he has put all his enemies under his feet. 26 The last enemy to be destroyed is death." So you employed a different full-on attack than the one I suggested you might, but you used the same essential tactic. When you or I say experiences we mean, "information gleaned from the senses." In the quote above, you are using the same word, experiences, but you don't mean information gleaned from the senses. You mean information gleaned from emotion and intuition. I mean your definition, actually. Perhaps emotion and intuition can play important roles at times, but that's not what I'm talking about. You may mention logic, but logic needs premises, and religious premises come from emotion and intuition, either one's own or someone else's. I reject out of hand any notion that emotion or intuition provide data, as they can only suggest hypotheses to be tested by the senses - and you know I reject that notion out of hand because I have been telling you that from day one. Good, we're on the same page then. What the senses cannot detect isn't knowledge. This isn't some weird arbitrary stance I take. Emotion and intuition provide questions, not answers. I love questions. But answers about reality come only from the senses. You think otherwise and therein lies the epistemological divide that can never be bridged. All I can do is keep lobbing grenades at one another. My grenades say, "Senses!" yours say, "Emotion and intuition!" And so it goes. I'm not sure what I said that indicated emotion and intuition was what I meant, but I assure you, it wasn't. Now sometimes you'll employ a flanking maneuver, and start talking about the history, tradition, and authority of your church, but if I press you hard enough for what these ultimately rest on, you'll answer that they're based on religious experiences, by which you mean, emotion and intuition, since you can't possibly mean the senses. I'm not quite sure what that would look like, but again, it's quite simply not the case. and those of your advisors, and those of a long line of people stretching backwards two thousand years into the past, all of which you consider to be evidence, and none of which I consider to be evidence, because none of it is derived from the senses, and only the senses provide evidence. I don't fully agree with you here about sense perception (surprise!) but the only thing I've provided as evidence is history, philosophy, science and personal experience. So then I say, "Wait a minute, Muslims have religious experiences too! Why should we believe yours and not theirs?" You shouldn't believe anyone's. You should believe your own. The invitation of Orthodoxy is to come and see for yourself. Don't rely on my experience or anyone else's if you don't want to. I'm having trouble remembering when and where I did this. Care to provide a quote? Because, unlike me, you consider emotion and intuition to be sources of answers rather than questions, and, of course, answers can be true or false. For you, then, it is perfectly appropriate for you emotions and intuitions, your answers, to be true, while a Muslim's emotions and intuitions, a Muslim's answers, are false, and not just a Muslim's, but a Jew's also, and not just theirs, but a Catholic's or Protestant's, even a Catholic's or Protestant's, fellow Christians though they are. This is ludicrous to me, because, where reality is concerned, we deem the senses to be the sole arbiters of what is true and what is false. Once again, we lob grenades over the divide. Mine say, "Senses!" Yours say, "Emotion and intuition!" And so it goes. Well, at least we now know why we've been talking past each other! And, much to everyone's surprise, the answer is yet again your inability to understand what anyone is really saying. At what point, anywhere on this message board, did I ever say anything about a Muslim or Jewish, Catholic or Protestant person's religious experience? When did I ever tell you that by experience I meant "emotion and intuition"? The divide remains tall and thick because your cherished "debunking" websites all deal with a Christianity that Orthodox Christians do not adhere to, and you don't know how to grapple with anything we've put forward on your own, so you have nothing left to do but continue down the path of assuming you know what we believe and we end up talking in circles. TtC, I would also agree that many of the claims you make against Christianity assume a fundamentalist evangelical belief system. For this reason, I find many of the particulars that you level against Christianity (such as God appeasing his anger by sacrificing his son, etc.) to be irrelevant here, given that this is an Orthodox Christian community. That is all good, and I agree. The problem is, religious experiences aren't just limited to your religion alone; in fact, they're not just limited to religion, but to a whole wide range of crazy things I assume you don't believe. I choose to remain skeptical regarding these types of experiences. Yes, although I don't accept it. Throwing some scripture at me doesn't help. Pretend I'm a member of your Bible study or something. What does that mean? That's fine, I'm not offering these as proofs of anything. My point this whole time has been that those of us who have had such experiences are logically and reasonably justified in our "religious faith" because it is based on an experience that has every bit as much validity as anything else we experience in life. The Principle of Credulity holds up here. It means that death is the ultimate enemy of mankind. Yes, from an Orthodox perspective, death is intimately related to sin and in that sense, Jesus' death was "for our sins," but this shouldn't be mistaken for the common judiciary view that Jesus was punished on account of our guilty status due to Adam's "original sin." Orthodox do not believe this. The Orthodox view is that man was meant for union with God and Jesus' Incarnation was not "Plan B" but was "Plan A" in the sense that God had always intended to take creation upon himself in order for real union with humans to occur. Death is the great enemy of this plan, so Jesus had to die in order to defeat death. Much like he had to take on life in order to unite mankind to himself, he had to take on death in order to free us from it. Eternal life is the goal and death stands in the way of that. Death must be conquered. That happened in the Resurrection. I know you don't believe any of this, but hopefully this sheds at least a little light on what Orthodox mean when they say "Jesus died for our sins" or otherwise talk about why he "had" to die. Because it's definitely not for the reasons most like to think it is. There's something I've wanted to understand. How did Stephen Hawking and several other theoretical physicists come at a mathematical interpretation that there are infinite universes? How did they reach the calculation "infinite" and what could that "infinity" number signify something else or is there some strict mathematical proof that this "infinity" only is attributable in its interpretation to universes? And how do you reconcile Abraham, who would have butchered his own son because the voices in his head told him to. Alive today he would have been prosecuted and put away in an asylum for the criminally insane. His followers number in the billions. Consider that. If you ask me, I don't think that's a real story, but a fictional one with prophetic allegory. It's quite obvious any father with a right mind will reject a God who asks him to go kill his own son. Actually, whether or not the account is a true or a fictional allegory, it is also an account that needs to be taken into historical context. At the time of the story's writing (and at the time-frame in which the story takes place) the sacrifice of the first-born to the gods was a common everyday occurrence. The strange thing in the tale of Abraham wasn't that our God asked the sacrifice as a test of Abraham's faith, but that our God spared Isaac's life. By this, our God set Himself apart from the host of Canaanite deities, and showed that He was not only good to His covenant, but Good as well. Sorry, but the Christians gods are anything but love. They are are duplicitous, contradictory and unclear in their inspiration to man; making themselves and too many of their believers avenging, hateful, wicked, dominating and manipulative. The Bible's teachings (Jesus's in particular), precepts and guidelines are absurd, fatally flawed and very much so questionable. And people glean family values out of that? Look up family values in the bible. What do you find? Look up "family" in the Bible. The very first instance of the word is in Leviticus 20:5: “Then I will set my face against that man, and against his family, and will cut him off, and all that go a whoring after him, to commit whoredom with Molech, from among their people." Look up words such as "trust", "kindness", "compassion" and "honesty". Ironically, the very first act of compassion in the Bible comes from pagan Egypt. The Pharaoh's daughter, who at the risk of her own life rescued baby Moses from certain death, and adopted him into her home and raised him as her own son. What could be more dangerous than Corinthians 1:9: “But we had the sentence of death in ourselves, that we should not trust in ourselves, but in God which raiseth the dead.”? Oh, I know...Matthew 10:34–37: "Think not that I am come to send peace on earth: I came not to send peace, but a sword. For I am come to set a man at variance against his father, and the daughter against her mother, and the daughter in law against her mother in law. And a man's foes shall be they of his own household. He that loveth father or mother more than me is not worthy of me: and he that loveth son or daughter more than me is not worthy of me." Yet another fine example of your impeccable logic and reason. I've never encountered such clear thinking! It's truly refreshing! Please, please keep it coming! It's so...nuanced and balanced and I'd even dare say sophisticated in its magnitude of understanding and depth. The amount of time you've spent studying the Bible and its teachings is so evident, I honestly feel a bit ashamed that I nor anyone else on these boards are at the same level. It would have been better had you deconstructed my points instead of leaving me an insult. I'd have never worked on that dang Bible degree hanging on my wall had I known this is what the Bible taught. How did I not know this after the 5 years I spent studying every book in detail? For the same reason people think crystals will heal their every ills. Now, why not expand that wonderful mind of yours and spend five years each on the book of Mormon, Theravada, etc. Oh noes! God doesn't display the watered-down, cowardly, namby-pamby definition of love preferred by a 21st century quasi-rationalist! He says things that are hard to understand, and can't be tweeted! He actually wants us to think AND feel, and we can barely chew gum and walk at the same time! Abandon faith, folks! [Context? If you think goat-herders are anything but hard-minded rationalists of the first degree, you haven't met any goat-herders. Well, there's quite a few goat herders where I live. More cattle ranchers, though. I'd wager nearly every one of them is a theist...which in my understanding, leaves rationalism outside the church doors. Not entirely unlike you, except you bring unrationalism here. And if you think daily life isn't apocalyptic, then you've a) never tried to struggle against yourself and b) have yet to realize that big, dramatic end could be tomorrow for anyone. You're still having coherent problems with context I see. I don't know how long you've been studying the bible, but it has given you at least - wrong definitions of the words "apocalyptic" and "superstition". How odd. I've probably been studying the bible for nearly 3 times longer than you and I still maintain a coherent understanding of these words and the biblical definition of "apocalypse". When you can study Mormonism, Buddhism, Islam unbiased for five years each, no need to gain a degree...come back here and let us know what you find out. That would have probably been better stated as "Evil is an action of will, not an occurrence. Not in the same sense. There is no malevolent intent behind a natural disaster. Hurricanes and earthquakes happen because that is the way the world works, pressure builds and releases. The only reason they kill thousands or even millions is because we were dumb enough to say "You know, I know that earthquakes are common in this region, but I want to live here. This fault line looks like an excellent place for a high-rise." Or my personal favorite: "I know this region is prone to storms with high winds and lots of water. Let's push some water into a levy, and complain when the levy breaks." I'm not entirely sure that's true, at least the fear part. In our current society, where a large majority of people who call themselves Christian have separated themselves from the Church, it might seem that way. But there's nothing like a good round of persecution to demonstrate the fearlessness of Christians in the face of death. As far as sadness, that is only natural. I am saddened when a friend or loved one moves far away so that I am unable to see them every days or weeks or months. One of two things, which assuming a belief in the existence of God you are going to have to decide for yourself: God is good, yet humble, that His love for man drove Him to create man; basically that He chose to love man, and extends this same choice to man in regards to Him. Or that God is neutral at best, evil at worst. Because trying to be good without God is like trying to fly without an airplane. Because without the ability to reject God our love for God would mean nothing: Some people would love nothing more than the object of their affection MUST love them. These are never good people. As for why our abilities allow us to believe there is no God, the human being is capable of great amounts of self deception. I can't answer that. I can't tell you why anything is good. What I can tell you is that nothing but the most evil people in our world would deny choice (even, or perhaps most especially those who would deny choice in the name of good). For the same reason that breathing needs oxygen, to reject oxygen is suffocation. Because God is not a warm puddle of lactates mixed with the flavoring of your choice. Because free will is one of the defining characteristics of humanity. Why do whales live in the ocean? Why are cats the most annoying creatures on the planet? Why does an author write a book that, while excellent to read, has nothing resembling a happy ending? Because we only have a finite capacity for knowing. We can never completely know God just like we can never completely know pi. You can always know more. You can know as much as a lifetime of human experience can teach you. A saint knows more about God than he could ever hope to explain to me, the same as a biologist knows more about organic functions than I ever will. From a purely etymological perspective, the word "good" is useless unless you're talking about God. But, more to address the situation, what you just said makes no sense. I know an airplane flies, that doesn't make flight useless when talking about an airplane. In fact, talking about an airplane would be useless if the airplane didn't fly. First, you have to stop thinking of faith as some sort of opposite to intelligence and rationality. You have to break out of your 20th century mindset (I say 20th century because your arguments are very modern and we are moving into the post-modern, whatever that means) that thinks it knows what a word means just because a small percentage of the population (the one with Ivy League degrees) defines it that way. Faith is not blindly believing in something despite all rational objections. Faith is continuing to believe despite all irrational objections. We have faith in science, that it will explain things within the realm of the natural, not because science has never done so before, but because it has. We demonstrate this faith in science every time we set foot on an airplane: All our irrational objections tell us that something so large was never meant to fly, that the sheer weight of it must send it hurling back to earth. The irrational objections seem logical enough, but we know this not to be so. Now, this faith in science is demonstrated most soundly whenever an experiment fails: those who have no faith or a weak faith in science will loudly declaim the failed experiment as an example of why those scientists never should have been trusted to begin with, those with faith in science will calmly explain that the experiment failed not because science is wrong, but because the hypothesis was faulty. Without faith nothing would ever get done, without faith in other people no cooperation or friendship would ever be accomplished, without faith in our observations nothing would ever be recorded. Without faith no one would ever leave the house and the human race would have been still-born. The faith of a Christian is similar. We don't believe in God because there is no reason, but because we are fairly sure that there is every reason. Our faith in God is based of off observation, we observe God because we use the proper tools for the observation of God. It's all well and good for me to dismiss the existence of the microbe if I refuse to ever look into the microscope, tales abound of the Roman Cardinal who refused to glance through Galileo's telescope. Without prayer and listening in the stillness one will never observe God. Without the reading of Scripture and the Church Fathers I will never be able to compare my observations with others. I would be like a staunch Luddite, looking through neither microscope nor telescope, poring through scientific journals going "Aha! This scientist two hundred years ago tells me the atom is the smallest particle in existence. This scientist a hundred years ago says atoms are composed of neutrons, protons, and electrons. And now some scientist tells me that there are even smaller particles than that! Utter nonsense! Why, look at this biologist who tells me all life is composed of cells, now you tell me that virii are alive and composed of mere protein strands! I bid you good day!" This same Luddite grabs a book on quantum physics and jumps up triumphantly in the air, citing one contradiction and paradox after another, and thinks himself smart for being able to do so. As to your question about all men being equal: All men are equal, but all men are also different. Take any element on the periodical table and assemble it so that each is exactly the same mass. One will be denser and more compact, another is gaseous, and still another is a liquid. So it is with man, everyone is brilliant, but in a different way. For every Hawking or Einstein there's a van Gogh or Picasso or someone who is absolutely the best sheep-herder hands down. Einstein can't paint worth squat (although I hear he was a very good violinist), Picasso could never write a theory of relativity, and neither one could convince a herd of sheep to get in it's pen. First: My definitions of "apocalyptic" and "superstition" aren't wrong, they just aren't your limited definition. You would probably call my usage of "Romantic" wrong as well, just because I almost never use it to mean what the editors of Harlequin books think it means. "Apocalyptic" can mean: 1) describing or prophesying the complete destruction of the world, 2)momentous or catastrophic, or 3) of or resembling the biblical Apocalypse (OED). I would also add 4) a struggle between good and evil. Superhero comics are apocalyptic when the heroes strive against great villainy (and I would add at their best when this is so), they cease to be apocalyptic when heroes and villains devolve to mere protagonist/antagonist relationships. Tolkien's The Lord of the Rings is apocalyptic because it involves a momentous struggle between good and evil. Despite being post-apocalyptic in sense (1) Stephen King's The Stand is apocalyptic in senses (2) and (4). The biblical apocalyptic scenarios fit all four definitions. Now, if what you mean is that people in the first century expected the world could end at any moment in a very literal and not merely personal sense, you are correct. When by saying that you imply the modern world has somehow risen above that, you are horribly wrong. Atheism hasn't made the world ending any less likely, it's just removed the supernatural from the equation. At any moment an asteroid could hurtle into the earth, we are warned if we don't change our wicked ways the polar ice-caps will melt, and there is still the threat of world-ending nuclear or biological warfare. You can accuse me and the goat-herder of being superstitious in sense 1(b) only if you can demonstrate that we are indeed irrational in our attitudes toward God. But seeing as how the whole point of the argument is whether or not belief in God could be rational sense 1(b) is useless in our discussion. I accuse atheism of superstition in senses 1(a) and 2. I believe atheism has a false conception of causation by the very fact that it believes something can be caused by nothing, and that it maintains it's notions despite an overwhelming amount of evidence in favor of God. As for other atheistic superstitions, the concept of evolution has developed quite a few, such as a belief that the newer is better than the older, that the fittest survives and thus that which survives is fittest, and that there is no good or evil merely action. You can argue that this is a misapplication of atheism and evolutionary theory, but I can also argue that most of what is considered "superstition" within Christianity is a misapplication of Christianity. As to the study of other religions, I have indeed studied Buddhism and Taoism with an open mind (not looking to convert, but with a goodhearted curiosity). There are many admirable things within both, but they fall short of the mark. Buddhism is good when it tells me to seek dispassion, not so good when it tells me to seek inaction. Taoism is good (and has even enhanced my understanding of Christianity) when it tells me to deem something is to allow for it's opposite. It's not so good for telling me which to prefer. Mormonism and Islam I have studied, not with an open mind, but the same way a banker compares a counterfeit note to a real one. Um, you didn't make any points, hence the sarcasm. Nobody here believes what you think we believe in this tirade of yours, so there's nothing to reply to. So? I'm not very impressed that you have a degree in supernatural studies written by ancient goat herders. Not trying to impress anybody. My point was that I have a degree in Bible and that you think you know more about it because of a debunking site is laughable. That's why I threw a little sarcastic humor out there. You can be honest, and nobody will judge you, but have you legitimately read the Bible cover to cover? Until you have, your thoughts about it deserve to be completely ignored. For the same reason people think crystals will heal their every ills. Oh. Okay. Getting a degree is the same thing as healing crystals in your mind. Got it. This explains a lot! Now, why not expand that wonderful mind of yours and spend five years each on the book of Mormon, Theravada, etc. Now, instead of replying to really old posts, how about addressing the newer ones? If it seems that x is present, then x is probably present. In other words, it is reasonable to believe the world is probably as we experience it to be. Unless there is some specific reason to question a religious experience, therefore, then we ought to accept that it is at least prima facie evidence for the existence of God. How very subjective and full of bullocks. The PoC is a fallacy in itself. On the other hand, I am an atheist who experiences the absence of God. Using the PoC that you hold in high regard, it seems to me the world is godless. It leaves no room for any other possibility. The argument is also a Subjectivist Fallacy. It is logically and intuitively clear that just because a matter appears to be self-evident from the facts that both the notion of the evidence presenting a case in a self-evident manner and the facts actually being facts (which, presumably, would require evidence of at least a minimum degree of quality) can often be reduced to entirely subjective interpretations that are independent of any truthful merit by sufficiently skilled individuals. Basically, appearances can be deceptive. PoC also requires a burden of proof, both for the person having the religious experience and for those that the person who had the religious experience to makes claims about to other individuals. Religious experience arguments for the existence of God are not in the realm of rational inquiry, but into the realm of subjective experience. I tend to think the the supposition that those having religious experiences are not really having an experience of the divine but are merely experiencing the world religiously. Philosopher John Hick thought this way as well. Those who wish to claim they have or are having a religious experience must come to grips of which divine figure/s they are experiencing. If it is an experience within their own tradition or cultural presupposition how do they (or we) know doesn't have some sort of natural but purely psychological bias? If that is the case, which most religious experiences are, how does one know it is not a psychological experience brought on from drugs or simple imagination? How does one know it is not just mental saturation of specific religious imagery or outlook? The deluded don't know. And that's why they rely on the Principle of Credulity, which is not credible at all. It is unlikely a committed atheist will experience the world religiously. I don't know how long you've been studying the bible, but it has given you at least - wrong definitions of the words "apocalyptic" and "superstition". How odd. I've probably been studying the bible for nearly 3 times longer than you and I still maintain a coherent understanding of these words and the biblical definition of "apocalypse". Like I said, I will be truly shocked if you know what the word actually means. And I'm confused, what is all this bantering about that I see going on here? "i've studied the Bible more than you, take that!" The fact that you refer to the Bible the way you do makes me really think you HAVEN'T studied the Bible very much at all, rather you've studied what some atheistic apologist has said about the Bible, which means you haven't really studied it anymore than a Christian has "studied" Judaism because they once listened to what John Hagee had to say about the Jewish people. When you saying things like studying the bible is "studying superstitions of goat herders" or whatever, I wonder . . . do you also think scholars of the Illiad are morons too? What about historians who DO study other religious texts? Do you believe anthropologists are idiots for reading about and studying religions? I doubt it. You're simply being divisive and cat calling to rile up people. You claim you've studied all the world religions, cool. Care to talk about those too? I'm up for it! I have studied Judaism, and a bit of Hinduism, I'm only vaguely familiar with Buddhism though I find it very interesting, if a little to "mental" for me. What do you know of these faiths? Like it or not, Biblical studies is in fact a real discipline. I'm not talking about apologetics, but I'm talking about Biblical studies, origins, higher and lower criticism, theology and all the rest. Even if you see the Bible as nothing more than a product of the human mind, why so hostile to the Bible, but not to the Iliad? Atheists never get worked up over scholars of Homor, or Egyptologists coming on TV talking at great length about Egyptian religion, but bring up the Bible and it's ridiculous comments like "the Bible was written by goat herders!" First, so what? What's wrong with goat herders? Secondly, if you think the Redactor of the Torah was a mere goat herder then you probably need to do a bit more studying of your own. Why should others be required to study something unbiased when you clearly aren't unbiased yourself? I agree, unbiased study is the proper path, but the fact that you keep touting out the typical poor catch phrases used to attack the Bible, the more I doubt your own unbiased POV. The problem as I see it is I'm not sure you are sure what it is you want to actually discuss. I wouldn't mind a private discussion via PM, if you so choose. However I think you tend to caricature Christianity and the Bible at times; you seem to be quite capable of an intellectually honest discussion but also seem bent on getting a rise out people as well. Maybe I'm way off base here, if I am, I do sincerely apologize. I just do not like straw men whether it's Christians attacking atheists or atheists attacking religion/the Bible etc. We may never agree, but can't we agree to have a starting point of interest? Maybe not, but I it would be nice. Um, what exactly is a committed atheist? That seems contradictory, how can one be committed to the non existence of a non existent "being"? Surely you must mean something other than that. Second, what does one mean buy the phrase "experience the world religiously?" How do you know atheists dont? Christopher Hitchens seems to disagree with you whole heartedly, though he uses the phrase "numinous" as opposed to "religious". There are atheists who go to Church because the "myth" (as they see it) speaks to them, helps give them "meaning", encourages them even though they don't believe any of the "myths". Sorry to snip this, quote field wasnt working. Well, yes, otherwise there..... wouldn't have been any point in the whole free will exercise. "You can choose me or As to your question about all men being equal: All men are equal, but all men are also different. Take any element on the periodical table and assemble it so that each is exactly the same mass. One will be denser and more compact, another is gaseous, and still another is a liquid. So it is with man, everyone is brilliant, but in a different way. For every Hawking or Einstein there's a van Gogh or Picasso or someone who is absolutely the best sheep-herder hands down. Einstein can't paint worth squat (although I hear he was a very good violinist), Picasso could never write a theory of relativity, and neither one could convince a herd of sheep to get in it's pen. The correct answer I was looking for to all of my why questions is that God made it that way. He could have made things differently, in a way where evil is not a requirement. But he didn't. That is evil. I'm committed that there is no God. Nonreligious people can't experience the world religiously, but they can experience it spiritually. There's a difference. I've seen that before. Pretty stupid if you ask me, but whatever floats their boat. There's also religious naturalism: "Religious Naturalism is a form of naturalism that endorses human religious responses and value commitments within a naturalistic framework." You say that, yet what would you prefer? God could have done it differently? How so? He could have created the world out of nerf balls and fluffy down pillows, perhaps, made us into rejects from Hello, Kitty, living our lives as one continuous Precious Moments or Family Circus strip. Perhaps He could have created us by the rules of some bowdlerized mid-80's cartoon, a GI Joe universe where the pilot always ejects as the plane explodes and the machinations of evil men are incompetent to the point of being laughable. Or like the Care Bears! Talk about hell on earth. That would be an evil God. A world where there is no evil, for starters. Why wouldn't God prize intelligence and rationality more? The answer is, of course, that He does prize these highly, otherwise we wouldn't have them. What you seem to have a problem with is the fact that we have a choice how to employ this intelligence and rationality. I'm guessing what you would prefer, since you prefer a world without evil, is for all of us to walk around like computer programs, fulfilling our designated functions and tasks. The problem with this is it would be a world without evil, but it would be a world without any good, either. Well, if he could have made things differently, he didn't. And I'm not so sure he could have. Regardless, the nature of our world might very well be a good reason to not like God, but not much of one to "disprove" him. I'm not saying this is your case at all, but it seems that very often someone's "proof" for not believing in God, is really just a reason for not liking him. Because "good" requires a choice. My computer might run well or it might not, depending on the programs it picks up. Sometimes a program might not execute to my liking, but the program is not being evil or bad, it's behaving perfectly in accord with it's code. Sometimes a program executes exactly as to my desired wishes, but the program is not being good, it is again behaving exactly as it's code defines it. Now, if upon the execution of a program it could decide (let's say it's a music recording program) whether it wants to record my guitar track, or if it wants to reproduce Jay-Z instead, or if it wants to destroy all other programs and corrupt the operating system, then I could label the program as being good, or bad, or wicked. But when the only thing it's capable of is doing what I tell it to, all it is being is "functional". Because "good" requires a choice. This line of questioning will inevitably lead to my point all along. It's good to have a choice because god made it so. I'm just annoyed by when the freewill argument is reduced to "choice" when the real issue is much more complex than that. It is ridiculous to say that good and bad can't exist without freewill though because that would mean the existence of "good" and "bad" are evidence of freewill. Evil is pretty much in the simplest terms possible going backwards, or being backwards, or going in a different direction other than forwards. In growth, we go in one direction, but sometimes in growth we're pushed somewhere, or we see something and we talk towards it, away from the path of growth. To do good is simply to follow the path of growth. Now we can be programmed to grow, forced to stay within a narrow path unable to get out of it, or we have an open road with an arrow point that way. If we are programmed to grow, God is a puppetmaster. If we are forced to stay within a narrow path, God is an obsessive and psychopathic lover of mankind, truly malevolent. If we are given open space with the arrow point that way, God becomes loving, unforceful but available for help, not rude but not ignoring us, not malevolent but not intrusive. We can push Him away, and we can ask Him to come back, and readily He does no matter how many times we pushed Him away, whenever, wherever. When it comes to suffering in this world, God became man and lived among us. He walked the path down for us, to show us how one can suffer, but can never be pushed away from this path. One can be tempted, but can never look anywhere but forward. One can even undergo some natural disaster or disease, but His spirit is as healthy as ever. One can die, but live on with much force in the world, as if He rose from the dead and lives on in each and every suffering Christian right afterwards. Unless there is some specific reason to question a religious experience, therefore, then we ought to accept that it is at least prima facie evidence for the existence of God.[/i] How very subjective and full of bullocks. I never said it wasn't subjective. Re-read me earlier post where I made it quite clear that I'm not using this as a proof for anything. It's merely to show that the person with a religious experience is as justified in trusting that experience as they are in trusting any other experience they have. The PoC is a fallacy in itself. On the other hand, I am an atheist who experiences the absence of God. Using the PoC that you hold in high regard, it seems to me the world is godless. I don't doubt that. Did I imply otherwise? It only fails if one assumes the person using this line of reasoning is doing so as a proof of God's existence or as a reason for why someone else should believe. That is not, as I've stated, my purpose. It is merely to demonstrate that trusting our religious experiences under the Principle of Credulity is as logical and reasonable a thing to do as trusting any other experience we have in life when there is no reason to think otherwise. PoC also requires a burden of proof, both for the person having the religious experience and for those that the person who had the religious experience to makes claims about to other individuals. Religious experience arguments for the existence of God are not in the realm of rational inquiry, but into the realm of subjective experience. Those who wish to claim they have or are having a religious experience must come to grips of which divine figure/s they are experiencing. Quite easy to do within Orthodoxy. If it is an experience within their own tradition or cultural presupposition how do they (or we) know doesn't have some sort of natural but purely psychological bias? How do we know this about anything?! This is precisely my point! There is no way to prove to anyone anything that is experienced by the senses. There is no way for you to prove to me that you are not a brain in a vat being fed sensory experiences. Which is why we have no other option besides trusting our experiences when there is no good reason not to. If that is the case, which most religious experiences are, how does one know it is not a psychological experience brought on from drugs or simple imagination? Such examples could be multiplied indefinitely. What we have here, contrary to what you implied earlier, is not a mere outpouring of emotion, but fairly clear descriptions of a direct awareness of a divine presence. I’m not saying this is proof of anything or that you should believe in God based upon the supposed experiences of others. I’m saying that their experience can’t be looked upon as invalid and they are justified in their belief. Because we ought to apply the Principle of Credulity to any form of experience (in the sense of “apparent direct awareness”). How does one know it is not just mental saturation of specific religious imagery or outlook? How does one not know this about the computer in front of them? The book they're reading? Pick anything, how can you ever prove to someone else your sensory experience? Oh is that why? I was curious. "Ask and ye shall receive. Seek and ye shall find. Knock and the door shall be opened." Nonsense. Evil is only another concept of opinion because morality itself is purely subject to positive, negative, and neutral selection and adaptation within society, and psychology. A woman who loves cats so dearly may see those who eat cats as "EVIL" or immoral. You are at best playing to equate morality as an argument for a "GODS" existence when it is no such argument. Even a GOD (still a concept of opinion) can not create the basic laws of existence to which it's own existence depends on. The laws of "positive, negative, and neutral", and as said prior, it's because itself is slave to require them for it's own existence. These are the very same laws that govern existence itself, evolution, natural selection, emergence, emotion, feeling, morality, action, reaction, choice, decision, intent, cognitive dynamics, consciousness, self-awareness, or anything you can possibly think of. Again, consciousness itself requires information to exist.It takes far more cause to support consciousness than it does to support unconsciousness. programs begin with information and not a "programmer" who requires it in order to function or even know itself exists. You can not create that which yourself needs to exist. Thus the concept of "Creationism" in itself is a logical fallacy. Worse yet, all minds require a place to exist in, and to be made of something to which they could neither create or exist without. GODS can not solve infinite regress or represent a Universal Set of all Sets. And nobody is pushing anything away vs actually thinking and putting things into reason, and logical context. Again, this is nothing more than philosophical nonsense looking to pull the strings of emotion to manipulate people into conforming to your ideological construct. Try convincing people without using such dishonest arguments that are borderline use of fear mongering as a tool of conversion. YOUR OPINION IS IRRELEVANT IN A WORLD OF OPINION! Why do you think there are 1,000's of supposed GODS? Can you even Define the concept? NOPE! Oh, and did you miss the bit about your god not existing? I can prove this in formal logic if you like. it may be that a deity exists, but it isn't the one you've chosen, because he's been given logically absurd and contradictory attributes by your book of wibble. Thought you might like to know that. I remember a piece in Skeptic Magazine about 5-6 years ago in which someone spent two pages trying to disprove the existence of God using some type of theoretical logic or other. It was sort of funny, and sort of confusing. Maybe it was just over my head, I dunno. Anyway, as an evil, demon-possessed apostate, I'd say... if you have a proof, do share it. You know what's interesting in this whole argument, you go by one basic assumption: That the laws and material of nature are eternal, but that has yet to be proven. You know they exist, but you don't know that they're ever-existent, not yet at least. Programs and information and programmer all had a beginning, from a Beginning-Maker, Who has no beginning. What fear mongering did I use in my argument? Did I scare you or something? I simply gave you how life is like. We grow, and sometimes our growth is stunted by many things in life. It is a fact of life, not an opinion, not fear mongering. If a physician was to help a patient in any way physical, if a friend was to be humane to others, it is the same as God helping our spiritual lives and giving purpose for growth to be furthered even after death. It's not that I am using fear mongering to prove my point. Your arguments do not show a need to hammer common sense into us, but rather a fear that you may be wrong. Last week, you seemed respectful and open, at the very least understanding that you are in an Orthodox Christian board that leans towards a specific bias, but all of a sudden you snapped into rudeness again. Why Christianity? Because it is the best model of growth for humanity. Why are there other gods? Same reason why there are unpleasantries from people in this world. Many people are convinced in this world by "homeopathy" or "naturopathy" and ditch real medicine for the quacks, and then there are those who don't believe in medicine, just themselves. Religion is no different. There's a true one, and there are false ones, and there are ones who go without it. Nothing can not be an existing person, object, substance, place or thing. Thus arguments like non-material, a-spatial ect are idiotic.. You can't exist as a -2 dimensional object or entity either. In fact, spatial capacity and dimension are considered infinite simply because the opposite is literally impossible to exist! You can't have a -1 dimensional space or volume of capacity. Nor can such concepts contain anything, have substance, or be existent. Laws of material nature a proven because I doubt even a theist would be dumb enough to try and argue that their GOD is made of "Nothing". Have fun with that position. If you even have read the bible and then put that into context of your argument of "Pushing him away" you would understand the border line fear mongering. And I don't even have to go into the morality argument about murder or killing. Regardless, that is all irrelevant in terms of argument. And your argument here that tries to suggest that I fear that I might be wrong is nonsensical. I actually fear more about being right. Emotional pleading for acceptance of said ideological construct does not grant it any sort of relevance to reality. It's still sheer concept of opinion. Actually it is not. Especially if you actually pay attention to how it really operates. You know what's interesting in this whole argument, you go by one basic assumption: That the laws and material of nature are eternal, but that has yet to be proven. You know they exist, but you don't know that they're ever-existent, not yet at least. Nothing can not be an existing person, object, substance, place or thing. Thus arguments like non-material, a-spatial ect are idiotic.. You can't exist as a -2 dimensional object or entity either. In fact, spatial capacity and dimension are considered infinite simply because the opposite is literally impossible to exist! You can't have a -1 dimensional space or volume of capacity. Nor can such negative concepts contain anything, have substance, or be existent. When Christians try to apply attributes associated with values of non-existence to a GOD, it almost makes me giggle because they don't even realize it. You may as well try and argue that your deity exist in a place of non-existence. Laws of material nature are proven, and I doubt even a theist would be dumb enough to try and argue that their GOD is made of "Nothing", and exists in a place of non-existence. Have fun with that position should you attempt to use it. Those 3 laws I gave you are the very base laws to existence itself. They are impossible to violate, or exist outside of. Worse yet, all minds must be temporally bound because it takes time to do things such as thinking, or even "Creating". There can be no progress without progression of one frame of reference to another. Especially in considering consciousness. However, one of the worst things about the argument of a GOD is that it takes more cause to support consciousness than unconsciousness. And lastly, you didn't address anything. You simply tried to use a Carl Sagan's Dragon argument. What fear mongering did I use in my argument? I simply gave you how life is like. We grow, and sometimes our growth is stunted by many things in life. It is a fact of life, not an opinion, not fear mongering. If a physician was to help a patient in any way physical, if a friend was to be humane to others, it is the same as God helping our spiritual lives and giving purpose for growth to be furthered even after death. It's not that I am using fear mongering to prove my point. Your arguments do not show a need to hammer common sense into us, but rather a fear that you may be wrong. If you even have read the bible and then put that into context of your argument of "Pushing him away" you would understand the border line fear mongering. And I don't even have to go into the morality argument about murder or killing. Regardless, that is all irrelevant in terms of argument. And your argument here that tries to suggest that I fear that I might be wrong is nonsensical. I actually fear more about being right. Emotional pleading for acceptance of said ideological construct does not grant it any sort of relevance to reality. It's still sheer concept of opinion. And even in the quote above, you still used the fear and carrot tools commonly used in the mechanics of subliminal programming and brainwashing. The use of "Death" and possible there after as an argument, is very subliminally suggestive and rides on people's fears of death. It's almost as bad as the Damnation vs salvation argument. Why Christianity? Because it is the best model of growth for humanity.
2019-04-24T22:41:13Z
http://www.orthodoxchristianity.net/forum/index.php?topic=32493.msg514564
The Senate, on the 6th June, 1947, adjourned to a date and hour to be fixed by the President and to be notified to each honorable senator. The Senate met at 3 p.m. pursuant to such notification. His Excellency the Governor-General, not thinking fit to be present in person at this time, has been pleased to cause letters patent to issue under the .Great Seal of the Commonwealth constituting [ me his Deputy to administer the oath or affirmation of allegiance to honorable senators, as will more fully appear from the letters patent which will now be read. SouthAustrlaia- Fredrick Hubert Beerworth. John Owen Critchley. Frederick Furner Ward. Tasmania- Reginald J ames Murray. William Morrow. Justin Hilary O’Byrne. The above-named senators, with the exception of Senator Beerworth, who had already been sworn, made and subscribed the oath of allegiance. That Senator Gordon Brown do take the chair of this Senate as President. – I have pleasure in seconding the motion. – I submit myself to the will of the Senate. – There being no other nomination, I declare Senator Gordon Brown elected President of the Senate. I thank honorable senators for the high honour which they have conferred upon me. I have now occupied the chair of the Senate for four years, and during that period I have done my best to be impartial. Of course, I owe certain allegiance to my party at voting times, but I have always endeavoured to be completely impartial in conducting the business of the Senate, knowing no party whatever. Although as President I have no politics, I cannot allow this occasion to pass without noting that the political pendulum has completed a full swing. Seeing Senator Collings in front of me, my mind returns to the time when he and I belonged to the group of Labour party senators known as “ The Three Musketeers “, who held the fort against 33. Times have changed since then. The political colour of the Senate has changed, too, and the situation has now been reversed. I make these remarks in order that I may say to our friends in Opposition, who number only three, that the Chair will not take advantage of their position, and of their small number, but will give them every assistance to conduct their affairs and will ensure that they shall receive fair and just treatment. I say no more, except to thank honorable senators once again for the honour which they have conferred upon me. Senator ASHLEY (New South Wales - Minister for Supply and Shipping). - On behalf of the Government, I offer my congratulations to you, Mr. President, on your elevation again to the highest office in the Senate. I look forward with my colleagues, and I am sure with the members of the Opposition, to the continuance of the high standard of impartiality which you have observed. You have been tolerant in all your rulings and absolutely fair. I know that new members of the Senate will appreciate the manner in which you guide and control the business of this chamber. I offer you my congratulations in the knowledge that the high traditions of your office will be capably maintained by you. – Members of the Opposition also desire to offer their congratulations to you, Mr. President, upon your re-election to your High office. We appreciate your statement that you will be entirely impartial and will give to the Opposition, although it is small, every consideration and encouragement. From my past observations of your actions in the high office which you hold, I know well that we have nothing at all to. fear from you in the discharge of your duties. Your task may not be arduous for the next three years ; nevertheless I am certain that you will ably uphold the very high traditions of the office to which you have been re-elected. I believe that you will conduct yourself, as President, as you have done in the past, viewing your high position, not as a political appointment, but as one made by the Senate to ensure the maintenance of its high traditions. Senator ASHLEY (New South Wales - Minister for Supply and Shipping). - I desire to acquaint honorable senators that His Excellency the Governor-General will be pleased to receive Mr. President, and such honorable senators as desire to accompany him, at 3.45 p.m. this day at Government House. – I invite honorable senators to accompany me to Government House, where I shall present myself to His Excellency the Governor-General as the choice of the Senate. Sitting suspended from 8.82 to 5 p.m. – I have to report that, accompanied by honorable senators, I, this day, presented myself to the Governor-General as the person chosen by the Senate as its President. His Excellency was pleased to congratulate me upon my election. – I have received from His Excellency the GovernorGeneral a commission to administer to honorable senators the oath or affirmation of allegiance. Commission laid on the table and read by the Clerk. – I ask the Minister for Trade and Customs whether representations have been made to him for a discontinuance of price control in respect of bacon and ham? If so, what was the result of these representations? What is the extent of black marketing, if any, in these commodities in each State ? – The price of bacon and ham has been under consideration for quite a long time by the Prices Branch. It is not intended to’ discontinue the control of the prices of these items, hut I think that the arrangement which we expect to become operative in the near future will satisfy everybody concerned. – I take it thai the negotiations now in progress in respect of the prices of bacon and baan cover both sales of these commodities by the bacon curers to the retailers, and sales by the retailers to ‘the general public. – New prices will become operative on the 1st December, which I think will satisfy all parties. Because of the shortage of pigs and their use mainly for pork, bacon curers have had difficulty in obtaining supplies. – Can the Minister for Supply and Shipping inform the Senate whether any action has been taken by the Government in regard to the dispute between the Federated Clerks Union, and the Tally Clerks Union at Fremantle, which is causing some concern to the people of Western Australia ? – The Government has taken action with regard to this dispute. A conciliation commissioner has been appointed to hear the case, and he left for Western Australia yesterday. I am hopeful that the trouble will be adjusted to-day. – During my recent tour overseas, I met various Australian representatives who are rendering a great service to this country. I gathered from them that their allowances and salaries are quite inadequate to meet their needs, and I ask the Minister for Supply and Shipping whether the Government will give consideration to increasing payments to members of Australian legations, consular staffs, and trade commissions throughout the world, but particularly in those countries where inflation has occurred and the cost of living has increased considerably. I have been informed that living costs in many countries are such that Australians engaged in important business on behalf of their country are precluded from enjoying the living standards that would Lave been theirs had they remained in this country. – I shall bring the honorable senator’s question to the notice of the Treasurer who, I am sure, will give Hue consideration to his suggestion. Pharmaceutical Benefits Bill 194”. Hospital Benefits Bill 1947. Message received from, the House of Representatives intimating that it had agreed to the amendments made by the Senate in this bill. Message received from the House of Representatives intimating that Mr. Beale had been appointed a member of the Public Works Committee in place of Mr. Gullett, resigned. Australian National University Bill 1947. Aliens Bill .104.7. Service? Trust Funds Bill 1!)47. Cultural Organization Bill 1947. Coinage Bill 1947. Social Services Consolidation Bill 1947. Social Services Legislation Declaratory Bill 1947. Appropriation Bill (No. 2) 1946-47. War Gratuity Bill .1.947. Wine Export Bounty Bill 1947. New South Wales Grant (Drought Relief i Bill 1947. Apple and Pear Organization Bill 1947. Apple and Pear Export Charges Bill 1947. Interim Forces Benefits Bill 1947. Approved Defence Projects Protection Bill 1947. Supplementary Appropriation Bill 1945-40. Supplementary Appropriation (Works and Buildings) Bill 1945-46. All that I desire to say at this juncture is that I shall endeavour to carry out the duties which devolve upon me to the best of my ability, and that any criticism I may offer will be honest and sincere. Although the Opposition in this chamber is small in numbers, it represents 46 per cent.’ of the electors who cast their votes at the election held on the 15th September, 1934. The duty devolves upon us therefore to see that justice is done to that section of the people which voted for Labour representation. Senator Hardy. Is the honorable senator referring only to Queensland? – I am speaking of Australia generally. It must be realized that there is something wrong with the system of electing the members of this chamber since 46 per cent, of the electors obtained no representation at all, the other 54 per cent, receiving the whole of the representation. Those are the official figures. My object in referring to this matter now is not to grieve about the result, but to meet in advance the satirical remarks which will, no doubt, be heard in this chamber later, if not this afternoon, concerning our depleted numbers and our ineffectiveness as an Opposition. To day, as 1 have said, the position is reversed ; there are 33 Labour members in the chamber, whilst the Oppositionconsists of three members of non-Labour parties. By an extraordinary coincidence those three members again represent Queensland. I agree entirely with foe remarks made by Senator Collings on the occasion referred to, and I assure the Senate that the present Opposition will follow his advice to the letter. Honorable senators may rest assured that what the Opposition lacks in numbers will be made up in virility, and that we shall oppose to the utmost any legislation which attacks the liberty of the individual. Lest an air of complacency should be adopted by imposing the galaxy on the Government benches, I remind honorable senators opposite that my two colleagues and I represent 48 per cent, of the primary votes recorded at the elections for the Senate held on the 28th September, 1946, and that we are determined to do all in our power in the interests particularly of almost half of the people of Australia, whom we represent in this chamber. - by leave. - I extend my congratulations to Senator Cooper and his colleagues on their election to offices in the Opposition. I shall be delighted if they will follow the example set by Senator Collings and his two colleagues when they were the only three Labour members in opposition in this chamber. I well recall the generosity which he extended to the Government on that occasion. Later, when our numbers increased to four, I, myself, being the fourth, Senator Collings was so considerate to the Government at that time that we were asked not to speak in opposition to certain measures in order to enable government business to be put through. If the present Leader of the Opposition desires to follow the advice -of Senator Collings on that score, we sibai L offer no objection. I , assure the Leader of the Opposition and his colleagues that honorable senators on this side of the chamber will extend to them full co-operation. I ‘ welcome his statement that he and his colleagues will not fail to offer criticism which they believe to be justified. Ministers will welcome constructive criticism at all times. I trust that the Leader of the Opposition and his colleagues will enjoy their term of office, and that they will give considerable assistance to the Government in the administration of the nation’s affairs. – Because of the acute shortage of beds in registered hospitals in South Australia, a great deal of hardship is experienced by expectant mothers and other patients who must, consequently, enter non-registered hospitals, and are thus obliged to forgo hospital benefits. In view of the hardship caused to these patients through no fault of their own, will the Minister for Health consider what steps can be taken to enable such persons to avail themselves of hospital benefits? – Throughout Australia, nearly every hospital is registered and approved under the Hospital Benefits Act. That result has been achieved with some difficulty in NewSouth Wales, but, due to very strenuous efforts on the part, of officers of the Department of Health, about 102 hospitals have been registered in that State during the last seven months. In South Australia only very few hospitals are not registered. The difficulty mentioned by the honorable senator could be solved readily by the proprietors of those hospitals coming in under the regulations and giving to their patients the benefits which the Government intended all hospital patients should enjoy. I suggest that it would be quite wrong to disturb the ‘present system, which is working evenly and well throughout Australia, by providing for payment direct to patients when a little co-operation on the part of a few hospital proprietors would enable the difficulty to be overcome. I shall have a careful look at the ‘position, with a view to making a further approach to the few private hospitals outstanding, in an endeavour to obtain a 100 per cent, result. In at least two States, Tasmania and Western Australia, all private hospitals have come under the scheme, and throughout the whole of the Commonwealth only a few are now standing out. of it. – During the last period of the session I directed a question to the Minister for Social Services in connexion with the provision of medical and hospital facilities for employees of the Commonwealth Railways Department engaged on the east-west railway. Those men are isolated, and, at present, a good deal of discontent exists among them because practically no hospital or medical facilities are available to them. Does the Government intend to provide such facilities to those employees and their families, particularly employees working on the section of the line between Port Augusta and Kalgoorlie? – I recall that the honorable senator raised this matter during the ‘last period of the session. It has not been possible for the Commonwealth directly to intervene in the health field in the interim. Although power was conferred upon the Commonwealth at the referendum, honorable senators will realize that the Government cannot move in such a matter until such time as the necessary legislation is placed on the statute-book. I realize the plight of men who are working in remote areas. We are taking steps to extend to them telephone and aerial transport facilities in order to meet emergencies. I have given instructions to ensure that care shall be taken of the men and their families in those localities. At the moment I cannot recall the result of such action, but I shall ascertain the information desired by the honorable senator. – Under the post-war training scheme at present, a trainee who meets with an accident is not covered by the Commonwealth Workmen’s Compensation Act, although the department, through the Treasury, generally makes available to such trainee an amount almost equivalent, or perhaps equivalent, to the amount prescribed under that act. I ask the Minister representing the Minister for Post-war Reconstruction whether the Government will consider granting to such a trainee a right in law to compensation by bringing trainees under the post-war training scheme under the provisions of the act? – I undertake to draw the attention of the Minister for Post-war Reconstruction to the honorable senator’s question. I know that it is a’ fact that no trainee has suffered any loss by reason of the fact that he has not an enforceable right at law. In each case where injury has been suffered during training, the Government has met the trainee upon the same basis as if he were covered by the Commonwealth Workmen’s Compensation Act. There is virtue in people having an enforceable right instead of a right which depends upon the discretion of even a government. – I ask the Minister representing the Minister for Commerce and Agriculture whether the Government has given any consideration to the acquisition of the 1948 apple and pear crop in Western Australia? – I shall bring the honorable senator’s question to the notice of the Minister for Commerce and Agriculture. Aluminium and Aluminium Alloys: Question of removal from Tariff By-law items 35S (b) and 404; and, if so, what rates of duty should be imposed. Estimates of Receipts and Expenditure and Estimates of Expenditure for Additions, New Works, Buildings, &c, for the year ending the 30th June, 1948. Et has been the custom to submit this motion immediately after the budget has been presented in the House of Representatives and, at the same time, to inform honorable- senators in some detail of the budget position. Some weeks have elapsed since the Treasurer (Mr. Chifley) delivered his budget speech for 1947-48 and copies of it, together with the Estimates and the budget papers, have been distributed to honorable senators. In the circumstances, I propose on this occasion to make only a very short statement outlining the central features of the budget. Actual revenue in 1946-47 was £412,000,000 as against the budget estimate of £385,000,000. The largest increases were income tax £6,000,000, sales tax £5,000,000 and customs and excise duties £13,000,000. Expenditure on defence and allied services was £129,000,000. This was £18,000,000 below the budget estimate. Post-war charges, on the other hand, involved an expenditure of £161.000,000 compared with an estimate of £131.000.000. Expenditure on this item, however, included the gift of £25,000,000 to the United Kingdom for which provision had not been made in the budget. Credits against defence and post-war- charges were £58,000,000, so that net expenditure on defence and post-war charges was £232,000,000, which was £11,000,000 more than was estimated. Other expenditure was £218,000,000, which was £5,000,000 less than the Estimates. Total expenditure in 1946-47, therefore, was £450,000,000, and the gap between revenue and expenditure which was financed from loan moneys was £38,000,000 as against a budget estimate of £59,000,000. Net expenditure on defence and postwar charges in 1947-48 is estimated to be £168,000,000, as compared with £232,000,000 in 1946-47 and £378,000,000 in 1945-46. Provision is sought for gross expenditure on defence and allied services this year of £80,000,000, as against £129,000,000 last year, and for post-war charges this year of £120,000,000, as against expenditure last year of £161,000,000. Credits for 1947-48. are estimated at £32,000,000, compared with £58,000,000 in 1946-47. An amount of £75,000,000 is provided this year for expenditure by service and production departments, whereas actual expenditure last year was £121,000,000. Of this £75,000,000, it is estimated that £40,000,000 will be spent under the postwar defence plan, which envisages the expenditure over five years of £250,000,000 on the development of a comprehensive system of modern defences in Australia. Expenditure of £161,000,000 last year on post-war charges included nonrecurring items such as the United Kingdom grant of £25,000,000 and the lend-lease settlement of £8,000,000. Notwithstanding these reductions, total expenditure on post-war charges in 1947-48 is estimated at £120,000,000. This includes expenditure on re-establis’hment and repatriation of £39,000,000, an increase of £10,000,000, due mainly to larger intakes of ex-service trainees by technical colleges and/ universities. Total expenditure other than defence and post-war charges in 1947-48 is estimated at. £259.000,000. which represents ah increase of £41,000,000 over last year. The main increases are £4,000,000 in payments to the National “Welfare Fund, £15,000,000 on new works, £4,000,000 on postal services, £4,000,000 in payments to States, and £11,000,000 on administrative votes. In most of these increases the effect of rising wages and other costs is reflected, although it should be noted that in these estimates of expenditure allowance has not been made for the operation, as from the 1st January, >1948, of the 40-hour week. Total expenditure in 1947-48 is, therefore, estimated at £427,000,000, as against £450,000,000 in 1946-47. Defence and post-war charges are expected to decrease by £64,000,000, and other expenditure to increase by £41,000,000. With the rates of taxation in force before the 20th September, it is estimated that revenue this year would have been £404,000,000, compared with actual revenue last year of £412,000,000. After taking account of proposed taxation concessions, revenue for the current year is estimated to be £397,000,000, a decrease of £15,000,000 from last year. Income tax and social services contributions are expected to show a decrease of £12.000,000 and sales tax a decrease of £7,000.000. Revenue from customs and excise duties is estimated to be approximately the same as last year. Other items, including pay-roll tax and post office revenue, are expected to show increases amounting to £4,000,000. Hence, with total expenditure this year estimated at £427,000,000, and total revenue at £397,000,000, the gap to be financed from loan fund is estimated at £30,000,000. The gap last financial year was £38,000,000. . The Government proposes to abolish the war-time company tax, which was imposed during the war period as a levy upon the exceptionally high profits made by some public companies under war conditions. Since its purpose has been fulfilled, it is considered that the tax should no longer be continued. Therefore, it will cease to operate as from and including the present financial year, which means that company profits of the year ended the 30th June, 1946- or the accounting period substituted for that year - will be the last year’s profits subject to the tax. The cost to revenue of removing the tax is estimated at £3.500,000. Concessions are proposed in respect of sales tax, which are estimated to reduce revenue from this source by £3,500,000 in a full year, and by £2,800,000 in this financial year. Mainly these concessions will take the form of transferring items from the maximum rate schedule of 25 per cent, to the standard rate of 10 per cent. With a view to encouraging production of gold as a means of earning dollars, and having regard also to increasing costs in the gold-mining industry, the Government proposes to suspend the operation of the gold tax. On the present rate of production, the estimated cost to revenue will be £350,000 in this financial year and £550,000 in a full year. The Government considers that full employment is the key to many of the economic problems of the community. If conditions overseas deteriorate we shall have to adapt ourselves to circumstances, and nothing must be left undone that will contribute to the main objective of providing constant employment for all available man-power. This policy involves an unremitting effort to achieve greater production and it also requires the continuation of measures designed to prevent unwarranted increases of costs and prices. There are many great tasks confronting Australia, and they can only be accomplished if the nation’s entire resources are marshalled and the people lend their willing assistance. . What was the total tonnage of galvanized and sheet iron, piping and steel to be used for industrial purpose®, despatched from Newcastle and Port Kembla to Victoria during Mav, 1947? What tonnage is awaiting despatch from Newcastle and Port Kembla to Victoria? Has any iron or steel been exported to other countries ? If so,, how much ? In view of the serious shortage of copper in Victoria, can anything be done to expedite deliveries to that State? Figures are not available to show the various types of iron and steel products shipped, but during the month of May, 3,668 tons of iron and steel products of all kinds were shipped from Port Kembla to Victoria, and during the same period 19,178 tons were shipped from Newcastle to Victoria. On the6th June last, there were 2,049 tons of iron and steel products at Port Kembla awaiting shipment to Victoria and on the 29th Maylast there were 8,360 tons awaiting shipment from Newcastle. Tonnage allocated against these requirements was as follows: - From Newcastle, 12,000 tons; from Port Kembla, 2,300 tons. You will note that the tonnage allotted exceeds the quantities available for shipment at the dates mentioned and it is anticipated that it will be possible to lift, not only all tonnage awaiting shipment to Victoria, but also current production. I understand that some iron and steel products have been exported but no figures are readily available indicating quantities shipped during ‘ recent months. The latest figures readily available are for the quarter ended December, 1946. Figures published by the Commonwealth Statistician show that during this quarter iron and steel to the value of £1,296,000 were exported from Australia. I am advised that the normal overflow of copper products held at Port Kembla by manufacturers for shipment is approximately 1,000 tons. Shipments of copper to Victoria and other destinations have been regular and have been sufficient to cover all current production. During the week ended 7th June, I am advised that there were 470 tons of copper products at Port Kembla for shipment to Melbourne and during the same week 376 tons were shipped. For the week ended 14th June, 675 tons were on hand for shipment to Melbourne and of this quantity the “ Iron Knob “ is at present loading from 300 to 400 tons. I am advised that clearances are made regularly and that there is no likelihood of any substantial delays in the shipment of copper from Port Kembla to Melbourne. Are any officers of the PostmasterGeneral’s Department 65 years of age or over? If so -(a) How many; (b) what are their names, official positions and salaries; (c) what is the reason for their continued service over the normal retiring age; and(d) as these officers cannot be employed for an indefinite time in a useful capacity, what steps does the department propose to take to retire them? Yes. 2. (a) Ten, excluding a number of temporary employees, e.g. telegraphists, whose services are being retained until such time assuitable replacements can be secured. These officers were transferred from the South Australian State Public Service at federation and have rights which exempt them from the provisions of the Commonwealth Public Service Act relating to compulsory retirement at 65 years of age. No immediate action is considered desirable. Are any medical officers still serving in the Royal Australian Air Force who have not volunteered for the Interim Air Force? If so, are these men being retained against their expressed desire to be demobilized ? What steps have been taken by the Royal Australian Air Force since the inception of the Interim Air Force, nearly two years ago, to recruit new medical officers? Yes, but very few, if any, of the medical officers being so retained have served for more than two years in the Royal Australian Air Force. Constant endeavours have been made, particularly through the medium of advertisements in the press, to obtain (medical officers for the Royal Australian Air Force. It is hoped that the more attractive financial conditions under the new pay code which becomes operative on the 1st July will result in members of the medical profession volunteering for the Royal Australian Ar Force in sufficient numbers to complete approved establishments, and every effort with that objective will continue to be made. Further, those wishing to discontinue service with the Royal Australian Air Force will be released immediately replacements become available. Has the attention of the Minister been drawn to an article in the Sydney Morning Herald, dated the 2nd June, 1947, under the heading “£1,000,000 ‘Ghost Fleet’ Rots in Brisbane River “? Is the statement in the article correct, viz., that small naval .vessels estimated to be worth £1,000,000 are being allowed to rot in the Brisbane River at Pinkenba? If so, and in view of a general demand for motor launches and other small craft at the present time, will the Minister investigate the position with a view to enabling these vessels to be reconditioned where possible and made available through the Disposals Commission to the public? No. There are in all (il vessels under the control of my department, of which six are held for post-war requirements by the Navy Department; 22 owned by other governments are held for safe custody and 33 held for disposal. The estimated value of the 61 vessels is approximately £150,000. It is not the policy of the Government to recondition vessels prior to sale, and vessels are sold as and where they lie. The vessels held for disposal have only recently been declared surplus and action is being taken to dispose of these vessels by auction in the near future. Has the Attorney-General’s attention been drawn to a report in Smith’s Weekly, dated the 7th June, 1947, viz., that Canberra officials have been unable to explain why Major. Michael Comay, special envoy of the Jewish Agency, was allowed entry into Australia recently to raise funds from local Jews to fight the British in Palestine? Will the Minister cause investigations to be made into these allegations regarding the raising of funds in Australia for the purpose -of using them to fight against Great Britain? Jewry, has publicly denied the allegations contained in the newspaper article referred to. The Attorney-General caused investigations to be made into the allegations and the inquiries show that Major Comay, a British subject by birth and a soldier of “World War II., came to Australia for the purpose of explaining to the Government the main points of the Jewish Agency’s case in Palestine. He remained in Australia for a fortnight only and addressed meetings of Zionist bodies. He spoke at the official opening in Sydney of the Youth Aliyah campaign for funds. This movement was founded for the purpose of bringing Jewish children from Europe to Palestine under immigration certificates issued by the British Government. The executive council of Australian Jewry denies that any collection whatsoever has been made in Australia for funds to fight the British or for any purpose remotely connected with terrorism. Has the Minister made any inquiry into the matter of war neurosis? If so, has any attention been given to thereports of medical men or of the sufferers themselves ? Will he inquire into the reported successful methods of treating these unfortunate cases at .the Worry Clinics in the United States of America? That the Senate do now proceed to elect a Chairman of Committees. Tha,t Senator T. M. Nicholls be appointed Chairman of Committees. – There being only one nomination, I declare Senator Nicholls elected. – I thank the Senate for appointing mc Chairman of Committees. I regard the appointment as a very great honour. I shall endeavour to carry out my duties to the best of my ability and to the satisfaction of the Senate. Senator ASHLEY (New South Wales - Minister for Supply and Shipping). - I congratulate Senator Nicholls upon his re-appointment as Chairman of Committees. We have had experience of the honorable senator’s work in that office, and 1 am confident that he will continue to carry out his duties in the capable manner that has characterized his work in the past. – On behalf of the Opposition, I congratulate Senator Nicholls upon his re-election. In the past we have always found the honorable senator fair and considerate to the Opposition. Senator NICHOLLS (South Australia). - I thank the Leader of the Senate (Senator Ashley) and the Leader of the Opposition (Senator Cooper) for their congratulations. I take this opportunity also to express my appreciation of the assistance and co-operation that I have received from all honorable senators while carrying out my duties as Chairman of Committees during the past twelve months. I am confident that that assistance will continue, and that with the wholehearted co-operation of honorable senators I shall be able to discharge the duties of my office in a manner which, at least, will not reflect discredit upon that honoured position. .- This is the first opportunity that has presented itself since the rising of the Senate last June to speak of certain events which have transpired during the period the Senatehas been in recess. I am sure that I am expressing the thoughts of all membersof the Senate when I say how deeply we regret the passing of two of our former colleagues in this chamber - - ex-Senator the Honorable Herbert Brayley Collett, O.M.G., D.S.O., V.D., of Western Australia, and ex-Senator the Honorable , John William Leckie, of Victoria. ExSenator Collett passed away on the 15th August, and ex-Senator Leckie on the 25th September - the former only 46 days and the latter only 87 days, after retiring from this chamber. The late ex-Senator Collett performed valuable work in the interests of exservice men and women. He played an active part in the formation of the Returned Sailors, Soldiers and Airmen’s Imperial League of Australia in Western Australia, and was president of the State branch of the league from 1925 to 1933. He was born at Guernsey in the Channel Islands in 1877, and came to Australia at the early age of seven years and was educated at Perth Grammar School. He entered the Public Service in 1891, and was Assistant General Secretary to the Public Library, Museum and Art Gallery in Western Australia from 1915 to 1933, when he entered this chamber as senator for Western Australia. He filled many important official positions relative to the repatriation and re-establishment of ex-service men and women. He was appointed to the Senate in 1933, and was Minister without portfolio administering War Service Homes from 1939 to 1940. He assisted the Minister for Repatriation from the 14th March, 1940, to the 28th October, 1940. He was VicePresident of the Executive Council and Minister in charge of the Council for Scientific and Industrial Research from the 14th August to October, 1940, Minister without portfolio in 1940-41, Minister for Repatriation in 1941, chairman of the Western Australian Economic Survey Committee in 1941, member of the special joint all-party committee on the Australian Soldiers’ Repatriation Act in 1942-1943, and member of the joint committee on the proposed war gratuity in 1944-45. The ex-Senator had a most distinguished military record having joined the volunteer forces in 1894. He ^commanded the 11th Australian Infantry Regiment and the 88th Infantry Battalion, Citizen Military Forces, raised and commanded the 28th Infantry Battalion, served in Gallipoli, Egypt and France in the 1914-18 war, and was wounded at Pozieres in July, 1916. He was mentioned in despatches and received the Distinguished Service Order in 1917. He attained the title of Companion of St. Michael and St. George in 1919 and was promoted colonel. He -commanded the 13th Infantry Brigade, Australia Military forces from 1922 to 1927, and was Aide-de-Camp to the Governor-General from 1922 to 1926. In addition to his war service, exSenator Collett wrote several valuable publications, including Infantry in Attack, in 1906, and in 1922 The 28th- a record of his brigade’s war service. The late ex-Senator Leckie had a most distinguished political career. As well as being a member of the Victorian Legislative Assembly, the House of Representatives, and the Senate, he was a man of many parts. He was elected to the Victorian Legislative Assembly for the constituency of Benambra, in 1913, which seat he held till 1917, when he resigned. He was elected to the House of Representatives for Indi, in 1917, but was defeated at the 1919 general elections. He was elected to the Senate for Victoria at the general elections of 1934 and 1940. He was a member of the Bankruptcy Legislation Committee in 1935-36, Minister without portfolio from the 28th October, 1940, to the -26th June, 1941, Minister assisting the Minister for Munitions from the 26th June, 1941, to the 29th August, 1941, Minister for Aircraft Production from the 26th June, 1941, to the 21st August, 1943, and Deputy Leader of the Opposition in the Senate from the 22nd September, 1943. He was a champion athlete at Scotch College, Melbourne, and played league football for Fitzroy from 1900 to 1905. He was a sportsman in every sense of the word. His criticisms were often pungent, but always constructive. Even in the heat of debate, he always retained a sense of humour which endeared him to his comrades. It is sad to think that he was with us in this chamber only a few months ago; but even at that time he indicated to his closest friends that his life’s work was nearly over. To his sorrowing relatives, among whom is the wife of the distinguished Leader of the Opposition in the House of Representatives (Mr. Menzies), the Opposition extends its heartfelt sympathy. I am sure that those honorable senators who were so recently actively associated with their late colleagues, and the honorable senators who have taken their seats in the chamber to-day for the first time, desire to record their deepest sympathy with the relatives of the deceased exsenators in their sad bereavement. – in reply - On behalf of my colleagues in this chamber and of the Government, I wish to associate myself with the remarks of the Leader of the Opposition (Senator Cooper) regarding the two ex-senators who have died in recent weeks. Ex-Senator Collett had a distinguished military record. Ex-Senator Leckie was a vigorous and tenacious debater, but outside of this chamber he was a very good friend. The 3ame may be said of ex-Senator Collett. I had many personal contacts with both these gentlemen and to me their death is a personal loss. The country is poorer for their passing and I extend my deepest sympathy and that of my colleagues in this chamber to their relatives. Australian Wool Board - Eleventh Annual Report for year 1046-47. Air Navigation Act - Regulations - Statutory Rules 1947, No. 112. Nos. 52 and 53 - Commonwealth Public Service Clerical Association. No. 54 - Commonwealth Public Service Artisans’ Association. No. 55. - Australian Journalists’ Association. No. 56. - Federated Public Service Assistants’ Association. No. 57 - Commonwealth Telephone Officers’ Association. No. 58. - Australian Journalists’ Association. No. 59 - Non-Official Postmasters’ Association. No. 60 - Commonwealth Foremen’s Association. No.61 - Federated Public Service Assistants’ Association. No. 62 - Commonwealth Temporary Clerks’ Association; Federated Clerks’ Union of Australia; and Federated Ironworkers’ Association of Australia. Nos. 63 and 64 - Fourth Division Officers’ Association of the Department of Trade and Customs. No. 65 - Commonwealth Public Service Clerical Association. No. 66 - Postal Telecommunication Technicians’ Association (Australia) and others. No. 67 - Amalgamated Postal Workers’ Union of Australia. No. 68 - Amalgamated Engineering Union and others. No. 69 - Amalgamated Postal Workers’ Union of Australia. No. 70 - Fourth Division Postmasters. Postal Clerks and Telegraphists’ Union. No. 71 - Australian Broadcasting Commission Senior Officers’ Association. No. 72 - Association of Architects, Engineers, Surveyors and Draftsmen of Australia, and others. No. 73 - Amalgamated Engineering Union and others. No. 74 - Repatriation Department Medical Officers’ Association. No. 75 - Postal Telecommunication Technicians’ Association (Australia). No. 76 - Commonwealth Public Service Artisans’ Association. Australian Soldiers’ Repatriation Act - Regulations - Statutory Rules 1947, Nos. 72. 106, 107. Banking Act - Regulations - Statutory Rules 1947, No. 102. Census and Statistics Act - Regulations - Statutory Rules 1947, No. 126. Appointments - N. J. Anderson, E. Chadwick, A. J. Chandler, V. C. Chapman, A. Doubikin. J. A. Gardiner, D. A. Gillespie, W. B. Green, F. J. Hay, H. F. Hely. T. J. Hennessy, A. G. Johnson, J. Kershaw, T. R. V. Lloyd, C. H. Lord, G. G. G. Neave, E. J. R. B. Pike, M. B. Renton. A. J. Stock, S. N. Thorne. J. L. Wall. Balance sheets of Commonwealth Bank, and Commonwealth Savings Bank as at 30th June, 1947; together with Auditor- General’s reports thereon. Regulations - -Statutory Rules 1947, No. 131. Commonwealth Employees’ Compensation Act - Regulations - Statutory Rules 1947, 132. Comimonwealth Inscribed Stock Act - Regulations - Statutory Rules 1947, No. 96. Attorney-General - B. F. L. Crommelin, J. J. Dale, T. A. Draper, K. S. Edmunds, J. Hamlyn-Harris, C. W. Harders, H. C. Harris, R. J. Humby, R. W. Jew, V. E. McCarthy. Civil Aviation - R. W. Adsett, D. G. Anderson. J. S. Arthur, B. R. Beaver. W. G. Burns, P. B. Burton, J. D. B. Cook, D. H. V. Davies, G. C. Davison. W. D. Doble, R. M. Ferrari, D. S. Graham, S. M. Green, G. A. T. Haddock. A. A. Hawes. C. R. Hibbert. A. J. Holloway, P. H. N. Jones, R. W. Keating, W. K. Knight, P. S. Langford, A. R. McIntyre, A. Morley, A. E. Reaby, E. R. Read. W. L. B. Reeve, R. W. Ridley, D. S. Stewart, W. A. Stone, L. A. Storey, I. S. Tenenbaum. C. F. Thompson, T. W. Trew, C. E. Tuttleby, R. F. Waite. Commerce and Agriculture - J.P. Carney. H. W. Chaffey, F. O. Grogan, C. M. K. Murphy, T. H. Strong, L. White. Health- S. G. Barr, W. H. H. Cornford, J. Couani, R, M. W. Cunningham, G. M. Dallimore, E. J. F. De Salis. J. de Vidas, C. C. Fenton, R. W. Hawker, W. Hillyer, A. H. Humphrey. L. L. Lock, J. G. McGlashan, K. S. Mcintosh, F. J. Moss, K. G. Outhred, D. J. Pittar, K. C. Porter, R. J. Riddell, A. G. Schroeder, M. L. Verso. Interior - G. G. Bradbury, E. M. Chadwick, R. W. Coxon, T. A. Dalton, A. L. Green, L. C. A. Hope, J. F. V. Knight, M. Lurie, D. E. Macinnis,. J. M. Milne, E. G. Newman, H. Preston-Stanley. Labour and National Service - F. K. Bool, C. H. Green, W. C. Lewisson, P. D. Prendergast, I. G. Sharp, M. M. Silberstein, F. N. Simpson. Postmaster-General - N. S. Candy, J. P. Champion, C. H. Dunning, L. B. Huddleston, F. T. P. Johnson, R. J. Kolbe, M. W. Lilley, E. R. Mayhew, C. H. McCall, D. C. Pawsey, A. F. Sando, L. W. Travers, D. S. Turner,. A. J. Varey. Post-war Reconstruction - J. S. Ballantyne, C. H. Hoffman. Supply and Shipping - C. Bie, R. W. Carmichael, K. R. Fleischmann, B. H. Stinear. Treasury - A. J. Hagger, R. J. Whitelaw. Works and Housing - F. H. Adderley, W. J. Baker, J. T. Ballenger, F. C. Bannister, J. C. Beagley, H. M. Beavis, S. H. Bedford, G. M. Bowden, W. A. Brown, L. A. Butler, W. S. Clark, W. P. Cocking, J. R. L. Copley, F. J. H. Crocker, K. Crockford, E. L. Cupples, H. N. Davis, I.R.O. Dean, M. S. D. de Plater, R. Doughty, H. Eisler, R. F. Emery, J. A. Fogarty, E. S. Forster, E. G. Freeman, M. Gilchrist, W. A. Graham, T. A. Grano, W. D. Green, N. J. Griffin, F. M. Hamilton, W. Hingee, F. K. Hosking, F. S. Howell, D. G. Howes, W. H. Hunt, K. W. Jack, A. M. Jericho, L. A. Johnston, E. M. Kendall, J. A. Kingston, A. K. Knox, A. W. Lawton, E. N. Leahy, D. Livingston, J. D. McColl, M. P. McGregor, I. Mcinnes, M. D. McNicholl, C. K. Mann,’ W. A. Marshall, G. E. Meredith, A. W. M. Mowle, L. Mutton, E. L. Norman, T. R. Nossiter, E. H. Olson, L. J. Osborne, T. B. Passmore, B. M. Pate, J. C. Paul, A. J. P. Porter, C. M. Price, M. A. Eogan, G. A. Eowe, A. A. Eowlands, W. D. Ryan, L. G. Schultz, D. L. Shallard, R. 0. Shephard, M. A. Smith, G. G. Springthorpe, W. A. Storey, A. T. Taylor, R. M. Taylor, E. M. Thompson, L. B. Thompson, A. S. Tillotson, R. M. Ure, A. P. Van Epen, J. C. Wade, A. N. Walton, G. H. Williams, T. L. G. Williams, T. H. Willington, L. C. Wilson, I. K. Wotherspoon, E. H. Wright. Regulations - Statutory Rules 1947, Nos. 122, 123, 134. Commonwealth Railways Act - By-law No. 87. Contract Immigrants Act - Returns for 1945 and 1946. Control of Naval Waters Act - Regulations -Statutory Rules 1947, No. 117. Customs Act - Regulations - Statutory Rules 1947, Nos.66, 80, 81, 82, 83, 94, 95, 105, 110, 119. Customs Act and Commerce (Trade Descriptions ) Act - Regulations - Statutory Rules 1947, No. 118. Defence Act - Regulations - Statutory Rules 1947, Nos. 76, 110. Defence Act and Naval Defence Act - Regulations - Statutory Rules 1947, No. 120. Queensland (dated 13th June, 1947). Victoria (8- dated 29th Mav, 1047, 5th June, 1947, 4th July, 1947, 14th July, 1947, 30th July, 1947, 11th August, 1947, 14th August. 1947, and 29th August, 1947). National Security (Egg Industry) Regulations - Order - Egg Industry (No. 13). National Security (Enemy Property) Regulations - Order - Persons ceasing to he enemy subjects. National Security (Food Control) Regulations - Order - Cream (Disposal and use ) . National Security (General) Regulations -Order - Control of essential materials (No. 20). National Security (Industrial Property) Regulations - Orders - Inventions and designs (340). National Security (Maritime Industry) Regulations - Order - No.62. National Security (Prices) Regulations - Declaration - No. 162. Orders - Nos. 2934 (substitute copy) 2956, 2966-3080, 3082-3091. National Security (Rationing) Regulations - Orders - Nos. 141, 144, 145. National Security (Shipping Coordination) Regulations - Orders - 1947, Nos. 25-47. National Security (Tea Control) Regulations - Order - Chicory control - Revocation. Regulations - Statutory Rules 1947, Nos. 57, 67, 69, 70, 75, 79, 86, 88, 97, 98, 99. 113, 128. Distillation Act - Regulations - Statutory Rules 1947, No. 84. Dried Fruits Export Charges Act - Regulations - Statutory Rules 1947, No. 115. Dried Fruits Export Control Act - Regulations - Statutory Rules 1947, No. 109. Education Act - Regulations - Statutory. Rules 1947, No. 89. Excise Act - Regulations - Statutory Rules 1947, No. 85. Forestry and Timber Bureau Act - Regulations - Statutory Rules 1947, No. 111. Immigration Act - Returns for 1945 and 1946. Income Tax Assessment Act - Regulations - Statutory Rules 1947, No. 77. Interim Forces Benefits Act - Regulations - Statutory Rules 1947, No. 108. Judiciary Act - Rules of Court - Dated 11th June, 1947 (Statutory Rules 1947, No. 90) . Applications for relief dealt with during the year 1946-47. Regulations - Statutory Rules 1947. No. 74. Lands Acquisition Act - Land acquired for - Administrative purposes - Berry Springs, Northern Territory. Banking purposes - Bassendean, Western Australia. Commonwealth office accommodation purposes - Perth, Western Australia. Council for Scientific and IndustrialResearch purposes - Armidale, New South Wales. Port Stephens, New South Wales. Department of the Interior purposes - Broome, Western Australia. Haymarket (Sydney), New South Wales. Lands Acquisition Act and Lands Acquisition Ordinance of the Northern Territory - Land acquired for Defence purposes - Batchelor, Northern Territory. Medical Research Endowment Act - Report by National Health and Medical Research Council on work done under the Act during 1946. National ity Act - Regulations - Statutory Rules 1947, Nos. 92, 104. Naval Defence Act - Regulations - Statutory Rules 1947, Nos. 121, 130, 135, 136, 139. Navigation Act - Regulations - Statutory Rules 1947, No. 125. Norfolk Island Act - Ordinance - 1947 - No. 2 - Post and Telegraph. No. 2 - Jurors and Witnesses Payment. No. 3 - Darwin Town Area Leases. No. 4 - Local Courts. No. 5 - Church Lands Leases. No.6 - Police and Police Offences. Regulations - 1 947 - No. 1 ( Darwin Short Term Leases Ordinance). Overseas Telecommunications Act - Regulations - Statutory Rules 1947, No. 68. Papua and New Guinea Bounties Act - Return for year 1946-47. No. 5 - Workers Compensation. No. 6 - Supply (No. 3) 1946-1947. No. 7 - Appropriation 1945-1946. No. 8 - Petroleum (New Guinea). No. 9 - Petroleum (Papua). No. 10 - Police Offences (Papua). Post and Telegraph Act - Regulations - Statutory Rules 1947, Nos. 91, 114. Quarantine Act - Regulations - Statutory Rules 1947, No. 73. Railways Standardization Agreement Act - Regulations - Statutory Rules 1947, No. 71. Raw Cotton Bounty Act - Return for1946. Re-establishment and Employment Act - Regulations - Statutory Rules 1947, Nos. 87, 100. Sales Tax Assessment Acts (Nos. 1-9) - Regulations - Statutory Rules 1947, No. 133. Science and Industry Endowment Act - Report by the Auditor-General on the accounts of the Science and Industry Endowment Fund for year 1946-47. Science and Industry Research Act - RegulationsStatutory Rules 1947, No. 137. Seamen’s Compensation Act - Regulations - Statutory Rules 1947, No. 124. Social Services Contribution Assessment Act - Regulations - Statutory Rules 1947, No 78. Sulphur Bounty Act - Return for year 1946-47. Superannuation Act - Regulations - Statutory Rules 1947, No. 103. Tractor Bounty Act - Return for year 1946-47. War Gratuity Act - Regulations - Statutory Rules1947, No. 127. War Service Homes Act - Regulations- Statutory Rules 1947, No. 93. Supplemental Agreement, dated 7th July, 1947, between the War Service Homes Commissioner and the State of Western Australia. Wine Export Bounty Act - Return for year 1946-47. Wire Netting Bounty Act- Return for year 1946-47. Wireless Telegraphy Act - Regulations - Statutory Rules 1947, No. 129. Wool (Contributory Charge) Act - Regulations - Statutory “Rules 1947, No. 101. Senate adjourned at 6.S p.m. Cite as: Australia, Senate, Debates, 15 October 1947, viewed 22 October 2017, <http://historichansard.net/senate/1947/19471015_senate_18_193/>.
2019-04-21T16:07:10Z
https://historichansard.net/senate/1947/19471015_senate_18_193/
Initial natural capital accounts containing information about green space in urban areas. What is the condition of the green space in Great Britain? What ecosystem services do urban areas provide? On average, almost a third of urban area in Great Britain consists of natural land and green space. There are over 62,000 urban green space sites in Great Britain adapted for a specific function e.g. public gardens and parks. This urban natural land and green space provides society with many services including protecting urban properties from noise pollution and cooling cities by over half a degree Celsius. Proximity to natural land and green space can influence property values as premiums are paid for a nice view or easy access to a local park. The value associated with living near a green space is estimated to be just over £130 billion in the UK. This publication is produced in partnership with the Department for Environment, Food and Rural Affairs (Defra). For full details about the natural capital accounting project please refer to our website. The recently published 25 Year Environment Plan restated the government’s commitment to working with the ONS to develop a full set of natural capital accounts for the UK. Such accounts will help support the monitoring of progress under the plan as well as providing evidence and statistics to inform better decision making as envisaged in the plan. We would also like to thank Steve Kingston, Andrew Cooling and colleagues at Ordnance Survey for their hard work on both the extent account and the creation of variables used in a hedonic regression to value ecosystem services provided by natural capital in the urban environment. The valuable contributions from Eftec and the Centre for Ecology and Hydrology (CEH) for their initial urban accounts scoping study and their extended work on the valuation of noise mitigation and urban cooling are also gratefully acknowledged. This bulletin contains ecosystem accounts for the urban environment in the Great Britain. This forms part of the UK natural capital accounts being developed by the Department for Environment, Food and Rural Affairs (Defra) and Office for National Statistics (ONS). This is the first iteration of the urban ecosystem account. All methods are continually improved upon as the natural capital accounts are developed, so remain in experimental status. Revisions to estimates in future releases are highly likely. The monetary accounts should be interpreted as a partial or minimum value of the services provided by the natural environment, as a number of ecosystem services, such as flood protection from natural resources, are not currently measured, and conservative assumptions are typically adopted where there is uncertainty. Any land cover classified as being natural in type for example, grassland, heath, scrub, orchards, coniferous trees and so on. It does not include inland water bodies. Any green space that has a specific function in its use for example, public parks or gardens, playing fields, golf courses, allotments and so on. A subset of functional green space, it removes green spaces expected to have restriction to entry for example, golf courses. All inland water bodies for example, rivers, lakes, ponds, canals and so on. 4. What are ecosystem accounts? Each area of a particular land cover or habitat can be thought of as an asset supplying a number of services that the economy and society benefit from. For example, food, water or clean air. The ecosystem accounts monitor the size and condition of these assets and also the quantity and value of the services supplied. An urban area is defined as a human settlement with a high population density and the associated features of a built environment with infrastructure (National Ecosystem Assessment , 2011). The dominant features of urban areas are humans and the built environment, although urban areas can also encompass a variety of natural landscapes and biodiversity. The urban ecosystem is comprised of a variety of land cover types, largely built-up areas with very little vegetation, but also large parks and areas consisting of other broad habitats (such as woodland, freshwater and even farmland). As stated in the Principles of Natural Capital Accounting (ONS, 2017) the starting point of classifying an ecosystem type is the Land Cover Map (LCM), defining ecosystems based on land cover classification. Urban has been defined in previous releases by the land cover habitat descriptors “Built-up areas and gardens” and “Suburban”. In developing these accounts, it was found this excluded most green and blue spaces which are captured under other categorisations (for example, woodland, coastal margins etc.). Using a land cover-based definition would not provide information about the extent of green and blue space in the urban environment and the interaction between society and the environment in these areas that would be of most use to policy. Due to this we follow Eftec (2017) in their use of a modified Built-Up Areas (ONS, 2011) dataset to define the urban boundary. This boundary was developed for the purpose of national natural capital accounting and uses the ONS Built-Up Areas (2011) dataset, which defines urban as any area “irreversibly urban in character”1. The Built-Up Areas (BAU) dataset is modified to include nature around the periphery of an urban site where high levels of interaction between people and nature are still expected, and to include larger areas of green space within urban environments, such as city parks and rivers. it is based on physical settlement morphology and not statistical units (that is Output Areas that RUC2011 uses) which will extend into rural areas. More information on why the BUA (2011) dataset was chosen and how it was modified for use in the ecosystem accounts is available. Figure 1 depicts the extent of the urban area using the BUA definition in United Kingdom. Further information about the BUA dataset can be found on our archive. The extent refers to the area of land the habitat or environmental asset covers, in the case of urban it is the thousands of hectares of urban area that exist in Great Britain. As described in the previous section, the urban environment can compromise of a variety of ecosystem types or habitats. Table 1 reports the total “urban area” as defined within this study and the extent of different types of ecosystems based on land cover information. The urban environment accounted for 1,768,000 hectares of the 21 million hectares in Great Britain in 2011. The urban area therefore covers around 8% of land in Great Britain. 2. These figures may not sum due to rounding. Outdoor green and blue space, such as parks, gardens, rivers and lakes are important for well-being. Through collaborative work between ONS and the Ordnance Survey (OS), estimates for the extent of green space in urban areas have been developed. The estimates aim to complement those in Table 1 by providing more detail about the smaller areas of green space and their functionality, for example what it is used for and if it is publicly accessible. Although the estimates provided by OS aim to complement the LCM 2007 broad habitat metrics they are currently incompatible due to overlaps and differing timeframes for when measurements were taken. The remainder of the extent account refers to the OS estimations of green and blue space. Any green space that has a specific function in its use for example, public parks or gardens, playing fields, golf courses, allotments and so on; These spaces contain natural land cover, and can also include some blue space for example, a park that has a lake within it. A subset of functional green space, it removes green spaces expected to have restriction to entry for example, golf courses. Restrictions to entry limits the ability of the green space to provide cultural services. Publicly accessible green space is defined in Table 2. How much green space is there in urban areas? There are approximately 1.77 million hectares of urban area in Great Britain, of these 0.55 million hectares are classified as natural land cover (31%). Table 3 presents the extent of urban green space by country. Scotland has the largest proportion of both natural land cover (37%) and blue space (1%) in its urban areas. Both Wales and England had 30% natural land cover in urban areas. On average 23% of natural land cover in urban areas had a specific function, for example, a park or bowling green and 68% of this was publicly accessible. England had the largest proportion of functional green space relative to urban natural land cover (24%), this compares to 16% in Wales and 20% in Scotland. Approximately 62,000 functional green space sites exist in urban areas in Great Britain. Approximately 67% (42,000) functional green space sites are publicly accessible Wales had the largest proportion of functional green space sites that were publicly accessible (73%), this compares to 61% in Scotland and 68% in England. 1. These figures may not sum due to rounding. Figure 2 presents types of functional green space in Great Britain. Specific functions vary, but public parks and gardens account for the largest proportion of green space in terms of area (37,500 hectares), yet more individual sites are classified as playing fields (14,900), closely followed by religious grounds (14,400). Religious grounds are high in number but tend to be small in size. By hectare, religious grounds are the second smallest type of green space, with bowling greens covering the least hectares. How does green space extent vary by region? Figure 3 depicts the 10 built-up areas (BUA) of the fifty largest BUAs in Great Britain with the largest and smallest proportion of urban natural land cover. The BUA with the largest proportion of urban natural land cover is West Yorkshire (which consists of Leeds, Bradford, Huddersfield and Wakefield), 46% of the urban area consists of natural land cover. Brighton and Hove have the smaller proportion of natural land cover (20%). Residential gardens provide outdoor space and the potential for private green and blue space, potentially offering a range of ecosystem services for example recreation, noise mitigation and food if homegrown. Using Ordnance Survey maps it has been possible to estimate the extent of private outdoor space. It is estimated by extracting the size of property plots in Great Britain and removing the size of buildings in the plot, the residual is assumed to be outdoor space. These estimates include both front and back gardens, but currently do not tell us anything about natural land covering these spaces. For example, a garden could comprise of grass and hedgerows or could be paved with a fence. Further work is needed to estimate the extent of vegetation in gardens, currently only outdoor space is estimated. Approximately 530 thousand hectares of residential garden exist in urban areas in Great Britain, accounting for 30% of the total urban area. England has the largest proportion of urban area attributed to residential gardens (31%). Scotland, which had the highest proportion of natural land cover and blue space in its urban area, has the smallest proportion of residential garden area (25%). 7. What is the condition of the green space in Great Britain? Urban green and blue space can be made up of broader habitat types, including woodland and enclosed farmland. The green and blue space reported in these accounts overlap with existing and developing ecosystem accounts for each of these broad habitats, such as woodland, farmland and freshwater accounts. Because of this overlap, identifying and measuring condition indicators for urban ecosystems is not straightforward, as condition indicators may differ according to the nature of the habitat. As a result, two aggregated indicators providing a sense of overall condition rather than specific dimensions were chosen, condition of sites of special scientific interest (SSSI) sites and number of sites awarded Green Flag status. Functionality of green space is important in highly populated urban areas, therefore accessibility and proximity to green space are also included. Further work is needed to establish if other indicators (for example, biodiversity indicators, soil indicators, ecological condition indicators, spatial configuration, air quality and management practices) could be used in this account. Eftec (2017) and Mapping and Assessment of Ecosystems and their Services (2018) have both suggested relevant indicators and potential data sources for the urban environment, these should be consulted further in the future. Sites of special scientific interest are areas of land protected by law to conserve wildlife or geology. Spatial information is collected about the condition of SSSI sites, some of which overlap with urban areas and can provide an indicator of condition of urban green and blue space. The extent of SSSIs in urban areas in the UK is 11560 hectares. When comparing the condition of SSSI sites, comparison between countries is difficult as information is collected separately by each country with terminology of condition and how it is designated differing. Table 5 aggregates to the number of sites generally classified as favourable, unfavourable and partially or fully destroyed. Generally, a higher proportion of SSSI sites in Scotland are in favourable condition, compared to England and Wales. No data was available for Northern Ireland ASSI sites. 1. Unfavourable includes sites recorded as ‘unfavourable recovering’, ‘unfavourable no change’ and ‘unfavourable declining’. 2. Favourable includes sites recorded as ‘favourable maintained’, favourable recovered, ‘favourable declining’. Unfavourable includes sites recorded as ‘unfavourable recovering’, ‘unfavourable no change’ and ‘unfavourable declining’. 3. Favourable includes sites recorded as ‘appropriate conservation management’. ‘Unfavourable sites include those recorded as ‘needs action’. 4. No data containing condition of ASSI sites is included. 5. The ‘Latest Assessed Condition” is used for the condition indicator for Scottish SSSI’s. Data collected for Scottish and English sites have both reported using categories provided by the Joint Nature Conservation Committee (favourable, unfavourable, part destroyed and destroyed). This enables some comparison and aggregation to be made. Data for Wales is more difficult to compare as sites were only recorded as “appropriate conservation management” and “needs action”. Further, the conditions of the SSSI units were taken at different points in time. For England was collected between 2005 and 2018, Scotland between 1995 and 2017 and data for Wales is taken from a live database which is updated continuously. Further work is needed to determine change over time. All countries measure the condition of units or natural features within the SSSI boundaries. For example, in Scotland there are 125 SSSIs that lie within or intersect the urban boundary and within these there are 490 natural features that are assessed (for example, woodland, birds, invertebrates and so on). Where possible, the units and natural features that are within the urban boundary are included as an urban condition indicator and those that fall out are excluded. For Scotland, currently there is no efficient or reliable way of separating out which features lay within the urban boundary and which don’t, therefore all features have been included in the analysis. The Green Flag Award is designed to recognise and reward well-managed parks and green spaces and aims to set the standard for the management of recreational outdoor spaces. The main purpose of the award is to ensure that everybody has access to green spaces and that these spaces are appropriately managed to enable people to live healthier lifestyles. Further details about the aim and purpose of the Green Flag Awards are given on the Green Flag Award website. Table 6 shows the number of sites awarded Green Flag status for each country in Great Britain. 1. These results are for Green Flag Awarded sites only and not Green Flag Community or Heritage Awards. The accessibility of green spaces is important in the delivery of cultural ecosystem services from urban green space sites. The Ordnance Survey Green space map provides information about number of access points available for green space in urban areas in Great Britain. This provides a basic indicator of the accessibility of green spaces within the urban environment. The Ordnance Survey Open Greenspace map is updated continuously so these figures can be updated in future iterations. In Great Britain on average 1.4 access points are available per hectare of functional green space. In Wales, two access points are available per hectare. Proximity to functional green space provides further information about the accessibility of the green space and the value is it has the local population. Table 8 shows that the average distance to a functional green space in Great Britain is 259 metres, this is the average distance from a property to the nearest access point of functional green space. The average distance to blue space is greater at 365 metres. Further, there are 4.6 hectares of natural land cover within a 200-metre radius of the average property in an urban area. 8. What ecosystem services do urban areas provide? This section assesses the contribution of the services nature in urban areas provides to the economy and society, capturing the flow of services in monetary and non-monetary units. Currently the service accounts are partial and there are other services provided but not captured in the accounts. The Common International Classification of Ecosystem Services (CICES version 5.1) is followed, which uses the familiar practice of splitting the services in to provisioning, regulating and cultural services. Table 9 presents the services captured in this release. In addition, most of the services provided by the natural environment are not traded in the market place and do not therefore have known “prices”. There are a number of techniques which can be used to attribute a monetary value to these services. Some of these techniques reveal an implicit price which may be interpreted as one which would be paid if a market for the service existed; these values are known as exchange values and are conceptually consistent with the output values within the system of national accounts. Other non-market valuation techniques measure the full value that beneficiaries receive (including what economics calls “consumer surplus”), which will be greater than the exchange values. Welfare values are typically used in economic appraisal of policies or projects. In compiling monetary ecosystem service accounts, it is important to be clear about the nature of the valuation method used and the extent to which such values are compatible with other values. Whilst the primary basis of valuation of ecosystem service accounts is exchange values (as set out in System of Environmental-Economic Accounting (SEEA EEA)), it is increasingly recognised by the international community that fuller welfare estimates, where appropriate, can be of significant interest. So too can the comparison of welfare and exchange values. We are not yet in a position to set out systematically both sets of estimates, but in this initial account we make more explicit what type of value is being estimated. Further comment is provided within the discussion on individual services. 1. The breakdown provided has been adapted from the Common Classification of Ecosystem Services (CICES) developed by the European Environment Agency. Over a fifth of the urban area is covered in farmland. Food production (albeit on a small scale) does also take place in community or domestic gardens and allotments in addition to wild berries and fruit being available to forage within the urban boundary. In this release it has not been possible to estimate the provisioning service supplied through farmland, however, Eftec (2017) estimated the total production of food from allotments to be 80,000,000 kg per year. The estimated monetary value of urban allotment food production is estimated to be £114 million per year. Further work is needed to disaggregate the woodland, farmland and freshwater accounts to establish the monetary and non-monetary flows of timber, water and agricultural production that take place in urban areas. Estimates of the service of food production represent an exchange value, because they are based on actual traded values. Welfare valuation is not really appropriate or feasible for estimating the value of food production. Vegetation within the urban environment removes carbon from the atmosphere via a process known as sequestration. Urban woodland accounts for 5% of the urban area and Eftec (2017) estimated that 537,000 tonnes of CO2 equivalent are removed by this woodland each year. Using the non-traded carbon price, £61 per tonne of CO2 a year (BEIS, 2018), this service was valued at £32.8m in 2015. This is an underestimate as smaller clumps of trees or lines of singular trees are not captured. Additionally, other forms of vegetation (hedges, shrubs, bushes etc.) are omitted. However, based on this estimate urban woodland contributes only a small amount of the value of the total carbon sequestered across all woodland in the UK which is estimated to be over £1 billion in 2015 according to the ONS (2017) woodland account. The non-traded carbon price is based on the economic cost to society of mitigating a unit of carbon consistent with greenhouse gas targets. It could be interpreted as an exchange value if it was assumed that government would transact at this price for every unit of carbon reduced. In practice, this is unlikely, which implies that estimates of carbon sequestration should be considered an upper bound of an exchange value. Further work is needed on this. Estimates developed by the Centre for Ecology and Hydrology (CEH) (2017), report that in 2015 urban natural capital assets in the form of vegetation only, removed 31.7 ktonnes of fine particulate matter (PM2.5), sulphur dioxide (SO2), nitrogen dioxide (NO2) and Ozone (O3) (43.2 ktonnes including PM10 and NH3) in 2015. It is estimated that in 2015 the avoided health costs in the form of avoided deaths (105), avoided life years lost (5,900), fewer respiratory hospital admissions (538), and fewer cardiovascular hospital admissions (182) amounted to a substantial £211m, this is shown in Table 10. Source: Eftec (2017) "A study to scope and develop urban natural capital accounts" The contribution vegetation in urban areas provides in health benefits by removing pollution is far greater than might be expected considering the urban area is only around 8% of UK land. This is largely because the majority of the UK population reside in urban areas, therefore the population benefiting from reduced exposure to air pollutants due to pollution removal by urban vegetation is much larger. Estimates are based on EMEP4UK1 modelling and vegetation is defined by the Land Cover Map 2007. Results are expected to be an underestimate as specific natural features such as street trees are likely to have been omitted from the analysis. Valuation of avoided of life-years lost and avoided admissions are based on willingness to pay values, and so represent a welfare value. Valuation of health benefits and better air quality is an area of ongoing research. Green and blue space can cool urban environments, which has benefits to the economy at the margin by mitigating labour productivity loss and reducing artificial cooling costs (air conditioning). Eftec (2018) estimated the cooling benefit provided by natural capital in urban environments for 11 city regions in the UK in aggregate and by individual land cover types, this is depicted in Table 11. These values are averaged across the whole urban area so as to facilitate measurement of the benefits. The aggregate cooling effect varies between -0.63 and -0.88 degrees Celsius. In all the regions analysed green space provides greater cooling effects than blue space. 1. Figures may not sum due to rounding. Avoided heat-related productivity losses and air conditioning cost savings were used to value the cooling service. The vast majority of the benefits arise from avoided productivity loss of manual type work. London has the highest total annual value with £140m. The overall value of urban green and blue space across all 11 city regions is found to be £166 million annually. This value is based on a five-year average number of hot days between 2012 and 2016. For 2016, which experienced an above average number of hot days, the total value of the service was £274m. This is assessed by sector based on averaging temperature mitigation across urban areas, and applying temperature-output loss functions to monetise the gross value added (GVA) that would have been lost due heat in the absence of the cooling effect, accounting for adaptation behaviour. Additionally, energy cost savings from air conditioning are based on estimates in London and extrapolated to other city regions. This figure is more tentative. The value of the service will fluctuate year to year reflecting the number of hot days (over 28 degrees Celsius) experienced. These estimates represent exchange values as they are directly based on economic output and expenditure. Welfare values would be included if the valuation covered the benefits to the general public of, for example, the value of tree shading. Vegetation can protect against noise pollution, by acting as a physical buffer between the noise pollutant and those nearby. Noise pollution is associated with adverse health outcomes through lack of sleep and annoyance. Eftec (2018) estimated the value of noise mitigation from urban vegetation in terms of improved amenity and health outcomes. The estimated benefits were for the urban noise reduction on major roads only. Table 13 provides estimates of the number of buildings benefiting from noise mitigation by urban vegetation as well as the annual value of noise mitigation. The total number of buildings benefiting from noise mitigation by urban vegetation in the UK is given as 167, 000. The total annual value of noise mitigation in the UK based on the avoided loss of quality adjusted life years (QALY) associated with a loss of amenity (sleep and annoyance) and adverse health outcomes due to noise is £14,431,0002. Valuations based on quality adjusted life years are welfare values based on willingness to pay studies. It is possible to estimate exchange values for health-related benefits by reference to the cost-effectiveness of public health providers in delivering health outcomes. This is an area of further research. 1. 5 dB bands applied along with guidance in Defra (2014a). 2. Urban vegetation includes large woodlands (>3,000m2) and smaller woodlands (<3,000m2), but not very small woodlands (<200m2). 3. Number of dwellings receiving mitigation in Scotland is likely to be lower than the estimates for the other countries because we used the Lden noise metric rather than the LA1018 metric which was not available for Scotland. Natural areas and vegetation play an important role in providing opportunity for recreation and exercise. Three estimates for cultural services provided by green and blue space in urban areas are provided below. Each focus on a different aspect of cultural services provided and are designed to be complementary, however as it can be difficult to be distinguish between cultural services there will likely be some overlap. Further work is needed to establish the size of the overlaps and if there is a risk of double counting. In 2015, almost 2 billion trips and 2 billion hours were spent in nature in the urban environment. This service was valued at £2.1 billion in 2015. The valuation method has meant that trips that do not incur an out-of-pocket cost are not included in the valuation, therefore these estimates are a significant underestimation. On the other hand, it is possible that expenditure on admission fees will partly reflect a return to other capital and labour inputs, or for access to facilities and services other than those provided by nature, and hence may overstate the value of the ecosystem service to those paying the admission fees. Most of the free trips (those that do not include a cost) are trips made, possibly quite frequently (such as walking a dog) to local sites. When purchasing a house, it is likely that proximity to local parks and outdoor space are implicitly or explicitly factored into the purchase decision and are therefore embedded in house prices. To capture the value of these local trips an estimate of the value of green space implicit in housing values can be estimated through the hedonic pricing method, described in the final section. A variety of urban green and blue spaces in the form of parks, public gardens, sports fields and so on offer locations for recreational and leisure activities, which are subsequently associated with physical and mental health benefits for residents. In the scoping study, Eftec (2017) estimate there were 2.1 million active visitors4 to green and blue spaces in urban areas in 2015, providing 74,000 additional quality adjusted life years to society. Notes for: What ecosystem services do urban areas provide? EMEP4UK was a Defra and CEH partnership-funded project that developed and delivered an off-line atmospheric-chemistry transport model (ACTM) based on the EMEP MSC-W model. The model, termed EMEP4UK, is capable of representing UK atmospheric composition in greater detail than larger i.e. European-scale models, with the ability to simulate hourly air pollution interactions over decadal time scales using a 5km grid or finer. The Weather Research Forecast (WRF) model was used as the main meteorological driver. (a) this is at the lower end of a range reflecting uncertainty over methods and limited data resolution; (b) four approaches are estimated by CEH / Eftec (2018), which range between 167,000 and 8,228,000 buildings benefitting from noise mitigation and £14 million and £245million in annual value from these benefits. For example, welfare values can be derived from the Outdoor Recreation Valuation Tool (ORVal) developed by the University of Exeter with support from Defra, which is based on an econometric model of recreational demand using MENE visitor data, and covers publicly accessible sites across England and Wales. Although urban centres cannot be selected in ORVal, it is possible to filter sites by land covers associated with urban areas (managed grassland, sports pitches and so on) to give an approximate value per urban site visit. To illustrate for England, the average value per visit of such sites is £3.06 in 2016 values. Applying this to the numbers of visits in the physical account would give a welfare value of £3.06 x 1981 million visits = £5.8 billion per annum. Eftec adopted a unit value of £20,000 per QALY, which was considered the cost-effectiveness threshold for drug procurement by the National Institute for Health and Care Excellence. When deciding on a location to live the surrounding environment will usually be included in the decision-making process, for example the proximity to recreational space or aesthetic views from windows could be factored into the decision. Assuming proximity to nature has some impact on property prices, this value can be extracted and estimated using the hedonic pricing method (HPM). HPM is a regression-based model that can be used to estimate the extent to which characteristics impact price by modelling house prices on a set of explanatory variables, including the structural, socio-economic and environmental characteristics. In this section the impact green and blue space within 200 metres of a property has on the property’s value is estimated. As green and blue spaces can vary in size and function the model is run for different types of green and blue space. A range of data sources were used in the model. Zoopla data provided information about the property sales and property characteristics, such as number of bedrooms. Ordnance Survey data provided information about green and blue space, as well as other amenities and plot size and outdoor space. Consolidated Analysis Centre Inc. (CACI) data provide the socio-economic data, such as income and crime rates. Full methodology is available in the methodology section of this release. This method will estimate a bundle of cultural services, and possibly some regulating and provisioning. It is not possible presently to disentangle why nature near property is important to the buyer, for example it could be it is aesthetically pleasing or for recreational purposes, the services it provides in clean air and protection from noise pollution could also be factored in. Currently, estimates are considered a bundle of ecosystem services also it is expected that these will be mainly cultural. The estimated value of green and blue space implicit in the total provided stock in Great Britain is provided, but further work is needed to develop the annual service value. All estimates are initial and experimental, therefore will be developed further in the future and subject to substantial revisions. The model has controlled for a wide range of house and socio-economic characteristics, however, there is always a possibility that an important variable has been omitted. Therefore, estimates of the association between green and blue spaces and property prices may not reflect a causal relationship. That said, high R-squared values indicate that the model explains over 80% of the variance in house prices, suggesting that many factors relevant for determining house prices have been included. What impact does green and blue space have on property prices? Results indicate that as the size of green and blue space increases, the percentage change to the property also increases. Functional green space and blue space have a positive effect, when natural land cover is considered the effect is negative. The impact different types of green and blue space have on property price are displayed in Table 15. Very large areas of functional green space and blue space within 200m have the largest positive impact on property prices, resulting in an increase of 1.4% and 3.6% respectively. Proximity to natural land cover, which includes all areas of green space including small areas of vegetation such as roadside vegetation, has a negative effect on property prices. A very large area of natural land cover within 200m is associated with 4.3% lower property prices. A reason for this could be properties surrounded by more natural features tend to be further from city centres and there is some characteristic variable that has been omitted. Also, the property may be near a major road or train track or derelict area that is likely to have surrounding vegetation. It suggests the functionality of the green space is an important factor, as those sites that can be utilised for a specific purpose and have likely been modified is valued more highly for its cultural benefits. What is the implied value of green and blue space with a specific function implicit in the housing stock of the UK? Based on the analysis presented above a model was built to predict property prices based on structural and environmental variables. The estimated average value of a property in Great Britain is £246,010, and on average the value of functional green and blue space implicit in the property value is £4,813. This is the difference between predicted average property prices in our test data £246,010 and the predicted average property price in the absence of green and blue spaces £241,197. If this figure is multiplied by the number of residential properties (27.2 million), we obtain an estimate of £130.9 billion for the stock value of blue and green spaces. This estimate relies on the assumption that the sample used is representative of the property stock and the value implicit in property price is the same in Northern Ireland. Future development of the extent account would use the most up to date version of the Land Cover Map (LCM015) to disaggregate the land cover within the urban boundary, currently the LCM2007 is used and land changes since this time especially in urban areas may be substantial. More work also needs to be done to measure the extent of linear natural capital features such as hedgerows and street trees which are major components of the urban fabric but are not currently included. The ONS (2017) principles paper and Natural England (2017) set out a number of condition indicators which we aim to include in future accounts, these include indicators based on biodiversity, water quality, air quality etc. Additionally, the condition indicators present in this account need to include a times series so changes to the condition of natural capital assets can be assessed over time. A partial ecosystem service account has been included in this account, however future development is needed to make the service account compatible with other broad habitat accounts (for example, disaggregated by habitats within the urban area so double counting is avoided). The hedonic pricing method provided experimental estimates of the value of green and blue spaces. Further work is needed to expand these results to UK estimates (currently Great Britain) and assess how the stock value can be transformed into annual flow values. Methodologically the use of data from the Valuation Office Agency and the Land Registry in future iterations may improve the robustness of estimates. Using a variety of sources Eftec (2017) estimated the amount of allotment plots in the UK to be between 280,000 and 330,000 (Pretty, 2000; NSALG; Crouch, 2006). Of these allotments 55% are said to be within urban areas (UKNEA, 2011) and 10% are thought to be unoccupied (Crouch, 2006). This gives an estimated number of urban allotment plots of 163,350. Cook (2006) quotes the productivity per plot at 487kg per year which is taken from a RHS 1975 study. This provides an estimated total production of 80,000,000 kg per year. Based on the estimated 163,350 plots in the UK urban areas and the value of £695 which Cook (2006) estimated to be the average productivity of allotments (after being adjusted to 2016 prices), the estimated value of urban allotment food production is given as £114million per year. The methodology followed that of Eftec (2017). According to the Forestry Commission there is an estimated 3.15 million Ha of woodland in the UK at March 2015 (Forestry Commission, 2015). The ONS (2017) estimated that woodland in the UK sequestered 17MtCO2e of carbon in 2015, suggesting an average rate of sequestration of 5.4tCO2e/ha per year. Applying this to the estimated area of urban woodland within the UK of 99,397ha (using OS Mastermap), results in the estimated carbon sequestered in 2015 being 537,000tCO2e per year. The estimated carbon sequestration in 2015 of 537,000tCO2e per year. The unit value per tonne of non-traded carbon in 2015 (BEIS, 2017) is £61/tCO2e per year giving a total estimated value across all UK urban woodland £35.4m for 2015. EMEP4UK modelling was used to estimate the amount of fine particulate matter (PM) 2.5 removed by vegetation in UK urban area. This is expected to be an underestimation of the true amount due to the use of the Land Cover Map (LCM) 2007 in the identification of natural capital assets. As the LCM 2007 has a relatively coarse resolution, specific natural features such as street trees are likely to of been omitted from the analysis. The Centre for Ecology and Hydrology (CEH) (2017) in their report “Developing Estimates for the Valuation of Air Pollution Removal in Ecosystem Accounts” for ONS developed physical accounts for six pollutants (PM10, PM2.5, sulphur dioxide (SO2), ammonia (NH3), nitrogen dioxide (NO2), ozone (O3)). In the urban account, only 2015 and 2030 were calculated. Health and monetary accounts were presented for four pollutants with damage costs available (PM2.5, SO2, NO2, O3) for the same years. Physical data for the number of visits to urban green spaces are from Natural England’s Monitoring Engagement in the Natural Environment (MENE) survey, which also collects data for spending during trips. Trips to urban green space are separated from other visits by using only visit data for those who chose one or more of the options “Townpark, Allotment, Path, Playground, Playfield, Town, Village” when answering the question, “Which of the following list of types of place best describe where you spent your time during this visit?”. Where a person has selected two or more habitats, for example, woodlands and urban, then one visit is allocated to woodlands and one to urban. The monetary valuation is divided by the number of habitats visited, therefore in this example, half the value of the visit would be allocated to woodlands and half to urban to better represent value derived from each habitat. The recreation estimates were developed by Ricardo-AEA, who also reviewed various different methods of valuing recreation. It was concluded only admission fees and travel expenditure should be included in the valuation as including the opportunity cost of time presents considerable problems. However, this will cause an underestimation, as the value of visits that have incurred no cost, for example, walking a dog locally in a city park, will not be captured. This is based on evidence from the Monitor of Engagement with the Natural Environment (MENE) survey of the number and frequency of users or visitors to the urban natural environment and the activities undertaken by these users (that is physical activity of different intensities or durations) to estimate “active visits” in England that meet physical activity guidelines (150 minutes (or more) at adequate intensity. CMO, 2011) The analysis estimates there to be 2.1 million active visitors in in 2015, providing a Quality Adjusted Life Year (QALY)estimate of 74,000 QALYs (Eftec, 2017), For more information see Eftec (2017) scoping study. See supplementary note attached to this release.
2019-04-18T14:32:44Z
https://www.ons.gov.uk/economy/environmentalaccounts/bulletins/uknaturalcapital/ecosystemaccountsforurbanareas
His father, Tsukasa is a hunter with jet black hair, a very muscular body and is huge. One day he accidentally mistook one of the White Chocobos that was owned by the Limberry Castle’s Duke as a normal yellow chocobo... And thus he became an outlaw. One night, chocobo’s wark and panther’s screech echoes throughout the mountain sides. “But dad, why? What happened?” Taichii asked. “Go out from the backdoor and hide until I kill all the trespassers ok?” Tsukasa answered with a smile. Taichii peeked at the surroundings… the noises of the monsters slowly faded and turned into screams of human beings… He smiled as he felt assured that his father can handle the evil people who he thought are sabotaging their livestock. Tsukasa turned and found his son staring at him… “Run.” Tsukasa said as he lets out his last breath and faints unto the grassy mountain top. As he gained his consciousness back, it was morning. Lucky he was still alive... He opened his eyes and rubbed out the dirt at his lips and cheeks… Taichii looked at his right arm... it almost got hit by his blade... Meanwhile, his scythe is a feet away from his head. Taichii tried to stand up... He held his scythe and blade and made it look like a cane and a crutch. The next morning, he woke up and found moogles pointing their glowing hands at his leg. As he reached the north side of Araguay woods, he heard some branches falling. He stopped and looked behind. Accidentally, he stepped on a wooden branch. The hard crunch of the wood echoed throughout the northern woods... Suddenly, the single flame turned into hundreds of knight in horses with their torches, spears and swords. “There he is!” A knight with Silver armor and skull helmet with horns shouted. The cavalry ran towards Taichii. Taichii then rolled back and ran for his life, using the mist as a diversion to outrun the cavalry. “Burn everything! Until he has nowhere else to hide!” The captain said. Taichii fell and slid inside a huge log. “Dad” he muttered while stretching out his bruised hand towards the sky. Taichii passed out with his head lying beneath the edge of the log. A wolf sniffed his way across the damp terrain. Something smelled different about the recently charred earth, and that pungent smell was only growing stronger as his nose led his body across the clearing. It was the smell of recently cooked meat, but of a kind he had never tasted. Whatever the meat was, it was marinaded in fear. And yet, the wolf felt no hunger as he walked past; somehow, he knew whatever lay ahead was not prey. Finally, the wolf came to a spot where there were no trees at all. A completely burned expanse lay before him. The wolf cried a mournful howl. The wolf didn't know the meaning of the burnt out huts, but the human trailing him did. The wolf didn't know the sadness conveyed in the charred cornfield, but when the boy saw it, his face hardened. Running ahead of his pet, he walked down what seemed to be the main street of the village. Charred little bodies were strewn along its sides. The bodies were too round to be human children, but he cradled the nearest one all the same. "Let's bury them, Moon. They at least deserve..." The wolf suddenly leapt ahead of him and began to growl at something towards the far end of the street. The wolf darted away from the main street and came before a charred bush. There was no wind, and yet, the bush was rattling with an erratic rhythm. "Whoever it is, show yourself!" The bodyguard looked back at his duty. He couldn't help but feel, even with such powerful abilities, she should not be sent out on a journey like this. He asked himself, "How could she possibly grow up..." he tried to find the right word to use, he'd never been good at words, and that's not just because the cat got his tongue. "Normal," he settled on, though not entirely satisfied. He shook his head before hearing a wolf's cry in the distance. He always tensed up at the slightest sign of danger, immediately drawing a golden sword passed down from generation to generation and a katana. The katana he almost always wields into battle ever since he started protecting the littleling. With Kiyomori and Ancient Sword drawn, he continued with caution, all the while his task asking the same incessant questions she always does. He's not the sort to shirk her, but when she asks these things and more everytime he draws his weapons...well...he gets a little sick of it. Still, as he does all the time, he stopped and turned to her, nodded, then continued down the path twisting on the outskirts of the forest. The road would eventually lead them into a small village where they could finally rest and eat. As they neared it, however, the girl screeched in horror. Every hut burned and bodies scorched beyond recognition everywhere. Leon, on the other hand, growled at the major inconvenience before spotting a wolf and a boy--the boy was screaming about something or other...he didn't really bother to listen. His job was not the only thing he protected--he was a bodyguard. A wind swept over the village, placing barriers on all but the wolf. Immediately afterward, he sprinted at the beast, ready to slay it. OOC: I am not assuming to be the lot in the bush. I came from a different side. “Mama…” the girl sobs through red and puffy cheeks. Hot tears and mucus blaze trails down her face and intermingle under her chin. Her threadbare linen clothes provide a feeble barrier against the cruel world as she clutches her sole comfort in life, a well-made, but well-worn stuffed panda. She is a pathetic sight indeed. Somewhere in the distance, a wolf howls, but she makes no response. Presently, three men approach along the road. They spy the form of the crying girl directly in their path and they begin to talk among themselves. “How much do you think we could get for that one?” the youngest of the three asks, pointing. The older man strokes his beard, thinking, though his expression says he is still hesitant. Grinning, the young blonde moves forward confidently. “What’s the matter, little girl?” he asks as gentle as he can manage. The girl doesn’t seem to notice as her body continues to quake with fear and despair. “Mama…” she whimpers. “We’ll help you find your mama.” The older man assures, making his approach. “I promise.” He places his hand on her shoulder. “MA~~MA~~!” she wails to the heavens above. The man is startled by her outburst and blinks. When his eyes reopen, the girl is gone. The only evidence of her presence is the echo of her plaintive cry. “What the…” the third man starts. “NOT THE MAMA!” a voice calls from behind them. It is feminine and unquestionably young, but the tone, volume and energy behind it make it sound like a war cry. Suddenly, a black dagger buries itself in the back of the young blonde man, just missing the bow strapped there. He grunts in surprise and reaches back for the grip only to find that it has dissolved into him. His veins become visible for a moment as malevolent magicks make their way through his system. As the men turn, another dagger strikes its mark and the archer gasps as the dark energies damage his very soul. He collapses, dead before he hits the ground. The third man throws a weapon at what he believes to the be the perpetrator. “You’ve got throwing axes?!” the girl cries cheerfully, skillfully side-stepping the tumbling blade. “I want a throwing axe!” All traces of her sorrow are gone. The man responds by tossing another that buries itself in the girl’s belly. “I have a throwing axe!” she proclaims proudly. “Trade ya!” she announces, as another knife coalesces out of the aether at her fingertips. With a casual flick of her wrist, the solidified magic shoots forward with unparalleled speed to strike the man in the shoulder. By this time, the older man has drawn his sword and is charging. The girl simply shrugs and suddenly, a pair of black, feathery wings appear between her shoulder blades. With a single flap, she is borne aloft and the sword cuts nothing but air. “Come down here, coward!” he hollers up at her. The idea implanted in his head, the man deftly stops the dark knife with only the fingers of a single hand. It matters not, however, and the magic seeps into him anyway. His eyes roll back in his head and he soon joins his companion on the gravel. “You’re a monster!” the older man shouts, confident that his armor will protect him as he plans his retreat. “May~be~ I a~m~!” a sing-song voice comes from behind him as the sizable blade of a sable scythe appears at his throat. “Bu~t” she coos “you’re dead.” With that, she draws the blade towards herself. It does not sever flesh and bone, rather it passes through as one might expect of a ghost. However, it leaves behind an unhealthy dose of profane force. Performing a pirouette in air, the girl smoothly turns the downward pull into an upward strike. This drives the toe of her weapon through her opponent, impaling him up to the heel. As his life fades, she releases the grips and allows him to fall. The weapon slowly returns to the aether that spawned it. The girl hovers in place for a moment to admire her handy work. A manic grin covers her face and she is about to laugh when suddenly, she grunts and grimaces instead. “Owwie!” she whines, removing the axe from her gut. “Charon!” She calls. “Owie!” she points to the wound. “I know, I know, I know.” The girl says before appearing among the branches, beside the sentient scythe. Meanwhile, the image she left behind continues to hover above the road. It duplicates the axe in its hands twice and begins to juggle idly before eventually fading from existence. “Inquiry: No success?” Charon intones as it casts mending magicks on the wounds of its charge. “I know, I know, I know.” She interrupts. “…” the scythe pauses for a moment. “Warning: Last heal.” It lets her know its reserves are depleted for a while. The girl sighs. “Alright. I won’t fight again today.” She stares off into the distance for a moment before sighing again. “I suppose I should probably clean up a bit, shouldn’t I?” she looks down at the bodies below. Anita drifts down to the road and grabs one of the dead men. She quickly teleports with it to a small, natural depression not too far away. She blinks back to retrieve the next, then repeats for the third. Once they are all out of obvious sight from the road, she searches them for anything of use. She finds a few daggers among their possessions, but they are common and boring, so she shoves them unceremoniously into her sack instead of adding them to her prized collection. There’s enough gil to get her a few decent meals in the next town and some rations, but nothing else catches her eye. Eventually, she heads back to the tree to gather Charon and the rest of her belongings. A ways away from the road, she remembers coming across a small lake. The water is cold and she complains the entire time, but it serves well to get the blood out of her clothes. There is little she can do about the damage to the garment, but perhaps she can get it repaired in town. If not, at least she has her beloved clerical vestments. The trees are thicker here, so she picks one and settles high in its branches. The jerky she took from the thugs is delicious and she eats her fill happily. Finally, she gathers her wings around her and curls into a ball at the base of a thick branch. She is asleep in moments. "...and so Tyr stuck his sword hand within Fenrir's mouth. Taking Tyr's hand, Fenrir allowed himself to be bound by chains to keep him from growing any larger. At least until-" "I think that shall do dear, I have heard that story too many times." "My apologies Mother. I could play you a song in place." "No need child." Mother stopped in her tracks, and the knight soon after. The dirt road stretched far forward into what seemed to be never ending wall of Green and Brown. "Beautiful... But I hate it." "We have been at this for hours madam." "This, yes I know. Nothing new to me. I just dislike being outside of civilization for such periods of time, it drives me nuts." Silence fell upon the two. They traveled forward without speaking another word, until a growl kill. Startled Mother turned to the sound, only to see a friendly figure. "Breakfast?" "No....." Mother sighed. "Cipher... What have I told you time. And time again..." The blank look upon the knights face said all. "Cipher.... What am I going to do with you." Another growl is heard. "If possible madam, that could be good option." Mother sighed again. "Right, I guess we can do that." The two walked off the road, and sat under a tree. Mother unzipped the pack on her side, and rummaged threw it. 7 Apples, a sausage, loaf of bread, and some water. Reaching in Mother one pulled out 2 apples, and passed them to the knight. Then partook one for herself. The two sat there eating their food in silence, or the horrible silence. "...and so Tyr stuck his sword hand within Fenrir's mouth. Taking Tyr's hand, Fenrir allowed himself to be bound by chains to keep him from growing any larger. At least until-" The Knight yammered on. "I think that shall do dear," the woman interrupted with a soft voice. "I have heard that story too many times." "My apologies Mother." Cipher replied. "I could play you a song in place." "No need, child." She stopped in her tracks, and soon after, the knight did as well. The dirt road stretched far ahead into what seemed to be never ending wall of green and brown. "Beautiful... But, I hate it." She concluded after a moment. "We have been at this for hours, madam." "This, yes, I know." she says with a sigh. "Nothing new to me. I just dislike being outside of civilization for such periods of time, it drives me nuts." Silence fell upon the two. They traveled onward without speaking another word, until a growl killed the silence. Startled, Mother turned toward the sound, only to see a friendly figure. "Did you eat breakfast?" she asked dipleased. "Cipher... What have I told you, time, and time again...?" The blank look upon the knight's face said it all. "Cipher.... What am I going to do with you?" "If possible madam, that could be good option." he said in a hopeful tone. Mother sighed yet again. "Right, I guess we can do that." The two walked off the road, and sat under a tree. Mother unzipped the pack on her side, and rummaged through it. Seven apples, a sausage, a loaf of bread, and some water. Reaching in, Mother pulled out two apples and passed them to the knight. She then claimed one for herself. The two sat, eating their food in silence; the horrible silence. "Did you eat breakfast?" she asked displeased. The wolf had heard the knight's metal shoes squish against the muddy road before the knight had even raised his sword. As the knight charged, the wolf turned his head and growled loudly enough for his master to notice. The boy immediately outstretched his hands, forming a barrier between the wolf and the hostile stranger. "Moon is my companion. Leave him be, or..." Eight rivulets of mud, flowing against gravity then encircled Kanth. As the rivulets died down to the smallest of slivers, eight dripping globs of mud danced above his shoulders, occasionally flecking drops onto his already filthy linens. The wind picked up, screeching its call across the charred branches, but even that couldn't mask the sound of a broken twig, as something stepped out from behind the bush. "HA HA HA HA HA, oh Ajora that's rich!" Laughter roared over the chatter in the tavern in Dorter. "So they sicked an entire unit on one boy, and they still couldn't catch him?! Hah hah hah! They even burned down the entire Araguay forest!" The man continued laughing while his companion nonchalantly light his pipe. "Well, I sure am glad I don't pay taxes right now, because I'd feel might ripped off." "Such a waste, why should a chocobo thief warrant so much force, and more importantly, how did he get away?" "I think if they knew how he got away, they wouldn't be asking us to catch him." "You know I don't do bounty work. Why ask me?" "Because if this kid really is good enough to get away from the army, we need our best men on him. Besides, you've been in a bit of a dry spell, so I thought I'd try being nice and throw you a bone." "I'm so touched you think so much of me. But I'm still wondering why they want this kid so badly?" Clayton's contact rolled his eyes. "Remember the saying: Only ask what you need to know." they reiterated simultaneously. Clayton sighed and took a swig of his pint. "Well, I suppose I can add bounty hunting to my resume now. Expanding one's career field is never a bad move." "Remember, we need him alive." "Alive, but not well, am I right?" Clayton's contact looked unamused. "I know, I know, you'll have your boy alive." "We will be taking third of a bounty." "Okay, THAT better be better spent then using an entire army to capture a boy. Anyways, I'd better get ready. I'll be headed out to Araguay first thing tomorrow. He can't have gone too far since the army's little cookout. It's hard to gauge what he going to do next, him being so young. Hopefully he's not already dead." "Oh yeah, one more thing. The army has asked that all his possessions remain intact, as they will be used to identify him." "Fine I won't rob him blind." "Good, now get going." "Well, see you later, then." Clayton headed out of the bar and straight home. It was late out and he had to prepare for the hunt tomorrow. Trekking all over the forest is foolish, Clayton thought. Instead he sought out the lake nearest the burnt portion of Araguay. It had a decent fish population and the water was clear. He immediately blended himself into the foliage as he approached the lake and scouted for other hunters situated around the lake. Rounding the lake and confirming that no one else was around the lake both relieved and unnerved him. "Aren't their other hunters out here? I'd figure that I would see at least a few hunters here, unless they are all out looking for him. Maybe I should look around as well? I know, I can just lure him here." He walked up to where the river fed into the lake and mentally recorded the roar of the river. He would just play the sound of the river over the forest and he would come running, assuming he was exhausted and not dead or captured. He replayed it once for himself and smiled at his secret weapon. No know currently alive has ever known about his illusion magic. That's the rule for illusionists: the less that know you are an illusionist, the better. Not even most of his former family knew about his talent. It was difficult letting them believe he was merely a mediocre assassin with low poison resistance, his father in particular. It was hard to bare his disappointment, but he also gained a malicious pleasure in knowing he can do more than his father thought he could. He has made it to the lake and has managed to get some water and cook him some fish. As he eating, he notices the scythe and blade on his sides. "Why would he be carrying a scythe around? It couldn't be his weapon, could it? Maybe he's just a lost wheat farmer?" He sneered at his own little quip. As he was finishing up and laying himself down for the night, he moves in. With a rag and bomb in hand, he approach him. The boy laying on his side with his back turned to the forest. I'm almost in arms length when he reaches for his weapons and rises instantly. It couldn't be too easy, Clayton thought. He immediately through his bomb to the ground, enveloping the both of them in chloroform gas. Now this would normally knock out both parties, but even Clayton's diluted assassin blood grants him a high resistance to poison. Only the most potent poison can have an effect on him which did not include chloroform. In the boy's initial surprise at the mutual gassing, Clayton had already drawn his Short Blade and some kunai and immediately threw a few at him. The boy parring his first barrage did not surprise him, but parrying the second barrage and his Short Blade with only using his blade did. Clayton had made it look like he threw his kunai in a blink of a eye, but he had blocked them all and his Short Blade anyways. However, the point of his attack was to keep him in the cloud of chloroform. The boy's eyes were beginning to lose focus. Clayton decided to use a little of his illusion power and go for a flurry attack as he wouldn't be able to remember these last moments of consciousness. The multiple illusionary arms striking at the boy looked very much like a product of insane speed. The boy simply could not keep up as he was parrying air. Clayton quickly locked with his blade and before the boy could strike with his scythe, he grabs his arm and ruin his sense of balance. He goes stumbling and Clayton goes for the sweep. Clayton immediately pins the boy to the ground with his foot, simultaneous giving the illusion that the ground is unstable. The combination of chloroform and loss of balance makes him unable to get up or retaliate. OOC: Not quite done yet with this yet, I'll finish this up tomorrow. Despite having only drifted off moments ago, Anita finds herself awakened by the sounds of battle not far from her position. Yawning, she glances down upon two men fighting within a strange cloud of something. She remembers Charon saying it was out of magic for a while, so if she gets injured, she would have to deal with it until her guardian recovered some power. So, joining the fray directly was likely out of the question. Nonetheless, she found herself immensely curious. The girl makes a quick hand gesture and fades from view. Silently, she makes her way over to observe the battle from above. She is careful, however, not to fly too low so as to avoid entering the mysterious cloud. Taichii got up and sat while looking around. “Oh man... I forgot I haven’t eaten for days...” Taichii thought. He took the book from his sack and looked at it. He was confused as why the letters became unfamiliar. “Dad... He protected me…” Taichii thought while still holding the amulet. “Huh? What’s happening?” Taichii’s eyes widened as the fangs of the amulet start to dig itself in his chest. He began to feel pain and screamed at the top of his lungs, but no sound came out of his mouth. Finally, the pain stopped. Taichii quickly looked at his chest. The pendant was the only visible part of the amulet and it merged with his chest. “What happ- OW!” Taichii flinched yet again as he bit his tongue… He quickly covered his mouth and felt two sharp pointed things bulging from inside his mouth. He snuck his finger in and felt two fangs that grew both side at his canine area. “After dad’s death, everything went crazy” Taichii exclaimed. He then noticed that the letters became readable again. He then searched for a part of which involves the amulet. Fortunately, after 20 minutes of searching, he found out what it was. “I have to go back to our house…” Taichii said just about the time when his stomach growled again. “Oh Sh---, Does this mean I have to drink blood?!” Taichii thought. “Hmm... Half a vampire…I have to find out…” Taichii said as he was sad to know that he may not be able to eat normal food. Suddenly, He hears a faint sound… He got up and moved forward. “The Lake!” He thought... “I have enhanced hearing now… maybe that’s how I can hear sounds from a distance now. “Taichii said. Taichii moved and followed the trail of sound in which the sound of the lake would become louder. Finally, he sees the lake, untouched and the trees surrounding it weren’t burned. Taichii spots a large fish lurking near the edge. He quickly threw his blade, piercing the fish’s flesh. He cooked the fish and licked it... then he started to bite and munched on the fish. “Okay eating food is still normal” Taichii said as he gobbled up on the fish. “Maybe it’s time to call it a day” Taichii said as he sipped water from the lake and lied down looking at the stars… “Father… you’re somewhere up there aren’t you-“Taichii became startled. He reached for his scythe, blade and then quickly lunged forward towards the edge of the lake. “My dad said that I am not allowed to fight for one hour after my dinner… Sorry.” Taichii said while laughing and was able to get a good grip of his scythe. He locked his focus on the opponent’s head. The opponent found an opportunity and held Taichii’s arm. Leon strikes against the barrier before hearing the child's words. Not even noticing the earthen threat (OOC: That is for your own good.) he snaps to the boy and gives him a questioning look. "Your pet...?" he thought...not entirely sure of what to make of such a situation. He'd always been rather comprehensive as a person, but a wolf as a pet... was he a beastmaster, or maybe a mediator? He almost entertained the thought of a geomancer, but those outsiders would never dare to enter a village. "...What if he burned down the village?" he also shook that out of his head, which showed to the boy as him shaking his head. He wasn't going to start making accusations until he knew what was going on, or at least until he'd spoken to the boy. "Another annoying habit," he thought. The voice calls out and screams right into his right ear. "I'm sorry! We had no idea he was your pet." she explained, "we thought he was taking you prisoner or something to drag down to the pack to devour you alive and then you'd be--" Leon gave her a quick and unnoticeable pat on the back as a sign that she'd speaking too much again. She stops with a sigh and continues, "So, anyways, we're very sorry! Where are you headed?" she asked. Leon sighs. You never ask strangers where they're going--it's a great way to pick a fight. “He can see me?” Anita thinks. “That’s not good…” She immediately teleports a few dozen feet strait up, leaving a pondering, still invisible image behind. Clayton thought that the boy's warning was a desperate attempt to get away. Nevertheless, keeping his eye on the forest behind him while the chloroform worked it's magic was a good idea. Rival bounty hunters could be just waiting beyond the trees, waiting for me to subdue him and then take him from me. Clayton pivoted himself, keeping his foot on the boy's body, towards the forest. He might have heard a whooshing sound as he was turning, but he wasn't sure. "The boy is still struggling, how impressive", Clayton thought. "I have his sense of balance now, there is no getting up for him. All I have to to is wait until he stops struggling." He applied some extra pressure onto his back. There was nothing the boy can do now, right? From the bowels of the inner surface a form seeps up. It recognizes that it is in an unfamiliar place in a similar way as to birth; it is a thoughtless rite for the child, soon forgotten. The featureless form emerging from the crust is aware but not in any ponderous human sense. Without hindrance, once surfaced, it mindlessly moves as if magnetized. There is no thought, only knowing it's purpose at the moment. It moves in impulses in an unknown direction like a single white blood cell within an unseen body. OOC: I'm playing as a slime which has no mind; but operates from nature's life force which is alive but in the way trees are and the wind etc. This slime is part of the inner liquid crystal magnetic core which is sentient in a timeless sense. Something on the surface in Ivalice has caused a major disturbance in the electromagnetic field surrounding the planet effecting the core enough to cause part of it to seep up to the surface. This is not magma but magmoid.. something living normally within the the magma. “Wait… why is it not good?” Anita thinks, staring down at the men below her. He can see invisibility. She can see invisibility. He has a scythe. She has a… he has a scythe… a… scythe… A beautifully, masterfully, wonderfully crafted scythe! Not as cute as Charon, but a scythe nonetheless. “Reminder: No heals.” Charon’s voice says within her mind. It would obviously prefer she not join in the brawl. Anita makes no noticeable reaction to her guardian. “Ma…” she murmurs aloud, drifting downward. “Mama!” she cries, dismissing her invisibility and descending rapidly until she hovers mere inches from the ground. Taichii couldn't move... but he can still think. He looked at the mysterious man above him. "Let me go! What have I done to you?!" Taichii screamed at the man's face. Finally... he thought of a plan. He opened his eyes with a mystical glow of an inverted star. His scythe transformed into a dark phoenix and flew around them. Taichii screamed out..."Crez Ventes!" the scythe's back spikes started to spark and the scythe became generated with red lightning. "Let me go! What have I done to you?!" the boy pleaded inbetween struggling to get his ground underneath him. Clayton, having heard the pleas and begging of much more noble men, failed to move him. The boy must have finally given up with that last desperate plea as he finally stopped struggling. "Hurry up and drop already. I need to get this fish vomit washed off of me before it dries." Clayton thought. "Seriously, why is this taken so long? Did I mess up the concentration? No, that's impossible." As Clayton continued on in his thoughts, the movement of the boy's scythe caught his attention out of the corner of his eye. It was transforming into some kind of bird spirit. It looked like a phoenix. After blasting it's wings open to showcase it's regality, it began to fly towards me. As it neared, it transformed back into a scythe aimed straight for his face. "Crez Ventes!" The boy's shout immediately caused the scythe to become electrified with red sparks and surges across it's surface. "Damn this boy." he cursed internally. Clayton retaliated with a dose of his blinding pain illusion to his back via his foot. The pain of crushed multiple vertebrae and sudden whiting of his vision overwhelmed the boy's body. Clayton immediately let go of the boy in evading the phoenix scythe. With the scythe no longer occupying his sight, a new sight appeared. A...fairy? descends from thin air. Clayton instinctively reaches for his blade. But to attack? This...thing looks like some kind of fairy, and angering fairies is a fast way to a miserable death. He recalls stories about how they use their powerful fairy magic to warp people 1000 years in the future, or turn you into a Malboro. Fairies are unpredictable in temper and disposition and this one certainly fits the bill judging from appearances. The body of a young girl, she is dressed like a cleric doll while carrying a doll that looks like some kind of black and white bear. He was sure he just heard her say "Mama!". As she hovers closer, he sees her collection of knives on her belt and the scythe on her back. "Wait, a scythe? Are these two allies? If so, why did she take so long to come to this boy's aid?" She looks curious, her eyes trained on the boy's scythe, which was now hovering around him in a protective path. "This is just too much." Clayton thought. The boy was still on the ground from the chloroform and the pain. If he didn't go down in the first 30 seconds of being pinned down in a gas of chloroform, then there is no telling when he would finally drop, if at all. Any hopes of a clean or even success capture had gone down the drain the more distance he put between himself and the boy. There was only the option of escaping now. He pulled out a flash bomb and threw at the fairy's feet while turning away from the imminent flash. As it detonated, Clayton bolted off the beach and into the thickness of the forest, fuming with rage over being muscled out of his capture. Firkon wakes suddenly in the blue night to his friend and the leader the secret order of magic endemic to his village and a well kept secret to outsiders of the small farming village of Cemplis. It's Galen Rendalshem telling him "Awaken Firkon!" He asks "what is it" then notices he must have snuck in (the imp). Galen says "Just come on, you have to see this!" Galen is the oldest son of three of the well respected Rendalshem family. He has always had a bit of a wild side yet accepts his responsibilty as the future retainer of their school; The family is renowned locally for keeping the village school in operation for generations. They have kept the local villagers, for the most part, literate and innovative in trade for many years now. As they venture out Firkon asks "Where are we going this late anyway? What could this possibly be?" Galen replies with an oddly serious expression.. "We have to hurry because whatever it is I want to show you is moving slowly.. I hope it's still there. I was checking out the Wendal Meadow when I noticed the dogs were acting insane." I noticed they were running around panicked because something was passing through that isn't like any animal I've seen. It might be a monster!" "I slowed it down a bit by changing the terrain around it and ran towards your house." "I was trying to stop it completely but couldn't.. I don't want to attack it; whatever it is." Firkon was really intrigued now.. He's never seen a monster before; it didn't sound hostile and with his and Galen's magic combined he felt safe enough to approach anything. His sleepiness completely passed as he could now hear the dogs barking, they now quit talking and jogged up to the meadow. "Is that .." Galen yelled angrily, "Fenton!?" One of Galen's favorite dogs body was sizzling on the ground. As soon as Firkon saw the creature something overcame him. In Galen's rage he was about to crush the creature with stalactites but Firkon Blew them aside with a gale along with Galen knocking him down. Now Galen, Firkon's senior, was really mad. "What's wrong with you Firkon?!" Firkon said "Look at what it's done to your dog.. we don't know what that thing can do to us... I just.. have the strangest feeling.." Galen Raises the earth in front of the slime to stop it for a moment and they sinch a bit closer to it. Firkon is definitely more scared than exited at this point. They see the creature is a blob of slime and right then Firkon stops. "I can feel something inside my.." he sways a bit, "It's like this immense pressure; I can feel this sad emotion, it's ineffable. There is definitely some kind of feeling, like an emotion.. but one I've never experienced." Galen then notices the slime is shimmering with little specks of effulgent orange light. "But I can feel it in my stomach too." Firkon also starts to shimmer with the orange speckles of light. Galen then terrified grabs Firkon and he collapses. A ubiquitous red-orange glow surrounds Firkon's vision. It's as if he has his eyes shut in the sunlight but he can't open them. He starts to see details and it now looks like sand, he now sees the sand up close and there is a dew droplet of water sitting on this endless ocean of sand and there is this strange appreciation for it. The dew droplet seems holy in it's delicate solitude, but then a tremendous pain and sorrow enters his mind and a rumbling mass of tons and tons of kiloliters of water are now crushing through the sand all around. Strange Geomantic visions continue to flash in his mind as the light flashes brightly now completely dazing Galen, whom is again knocked back, for the moment. Firkon cries out as the light intensifies then suddenly dims out. "What happened?" Galen asks. I think I understand at least that this slime needs to be protected and.." he turns towards the slime and holds out his arms casting. The slime reacts by sloshing forward like a wave of the sea and crashing with orange flames. "This is a geological entity, so I can manipulate it, or we both could most likely." "Don't worry about the slime as a threat any more." Galen smiles for a quick moment at this but is still upset about his dog. Taichii's Scythe was deflected by the man that pinned him a while ago, leaving Taichii alone. Taichii quickly rolled a few meters away from the man... He tried to sit but couldn't get up. The scythe quickly circled Taichii. Still a phoenix's squawk can still be heard from within the scythe. Emphasizing that it's ready to release into phoenix form anytime when ordered. After several moments... Taichii has recovered. "Man... the food tasted very tasty when eaten... but when puked, uhh... nasty." He held his left hand and summoned his blade, which got pulled back to his hand like magnet. Taichii decides to head towards dorter to rest before going back at his house at zerikyle. He feels like he's being watched... "Looks like I overused my sight a while ago... okay then..." "Hurry up and drop already. I need to get this fish vomit washed off of me before it dries." “Don't hurt Ma... Kyaaa!” Anita is blinded by a sudden flash. The girl doesn't hear the mental warning as her mind fogs and she falls to the ground like a puppet with severed strings. Charon prepares to cast fear upon any who might mean its charge harm. Safely hidden in the bushes, Clayton decides to give in to hope and look behind him, if only to see if they're coming to pursue him. The sight of the fairy falling to the ground when entering the cloud of chloroform delights Clayton. "So much for being a fairy. At least I know it can be poisoned." he thought. What's more, the boy was stumbling around blindly, vulnerable to one last strike. "Finally, Ajora looks down on me with some favor. All this unbelievably bad luck is finally going my way." He began to blend himself into the beach. As he moved towards the boy, he pulled out his rag soaked in chloroform, his free hand primed with debalance spell. All he needed was a little distraction to seal the deal. "I've had just about enough of tonight. It's time to go all out." Clayton played the sound of something exploding out of the water from his side. The sound masked the sound of Clayton sprinting over the beach towards him, rag and spell ready to wrap around him.
2019-04-24T17:49:49Z
http://ffhacktics.com/smf/index.php?topic=8332.0
This is the fifth post in a week long series about an exhibition at Exeter’s museum. In this final post I offer some brief parting thoughts on the success of the exhibition as an exploration of a complicated and dynamic society. It was clear that this was a highly creative society, with many accomplished practitioners of the arts and crafts. Perhaps this is overemphasised by the very nature of museum exhibitions that are likely to contain a preponderance of manufactured objects and paintings, but that does not detract from the quality of the items on display. There are more prestigious objects such as the Drake Cup (c. 1595). By tradition it was given to Drake by Elizabeth I after he circumnavigated the globe, its silver gilt engraved with a map of the world, complete with names of continents, islands and seas in Latin, plus sailing ships, whales and dolphins. Its hard to imagine anyone actually drinking out of this (it’s enormous and unwieldy for a start), but the same is certainly not true of more everyday objects such as the glazed stoneware drinking vessels and delicate silver spoons also in the collection – whilst important indicators of status and often treasured family possessions, these items were made to be used, not rest on a shelf. As ever, I am left to marvel at the intellectual sophistication of people in the distant past, in an era that most people now would think of as the technological dark ages. In terms of intellectual activity the pre-modern period was not backwards or uncivilised, this was a society that exhibited civic pride (for more see day 1: a map of Exeter), where renaissance style and learning was spreading, and where important topographers (such as mapmaker John Norden) and antiquarians (such as Richard Carew) were beginning to make their mark. Another nugget that I learned at the exhibition – Sir Thomas Bodley, the founder of Oxford’s Bodleian library, was born in Exeter. As a religious historian I am particularly sensitive to the Protestantism that underpins late Tudor society, but I think few historians would disagree that the Reformation’s repercussions were also to be felt in every sphere of daily life. From the goldsmiths who prospered when reshaping church plate for a new liturgy (for more see day 3: a Devon communion cup), to the soldiers engaged in an epic struggle against the antichrist and international Catholicism (for more see day 4: the Spanish Armadas), to those for whom scripture became deeply embedded in their ways of expressing themselves and in guiding their everyday activities (for more see day 2: domestic decoration), Protestantism was key. We can’t even begin to understand this society without considering it. On his talking tour, exhibition curator and Exeter Professor Sam Smiles described Francis Drake as the Neil Armstrong of his age, and the analogy struck a chord with me that kept reverberating. Partly because it immediately suggested the celebrity of the man – how many contemporaries knew Drake’s name? Current scholarship has a tendency to be sceptical about the importance of exploration for sixteenth century societies, with claims that few people were aware of new discoveries which made little impact on ordinary people’s lives. But the Armstrong analogy is intriguing because of what it suggests about the mentality of the Elizabethans. Clearly some were ambitious, self-confident, cocky even, heading into the unknown on the uncertain hope of economic rewards and a boost for their honour and all important reputation. This was a society where political success and innovation or entrepreneurship were occasionally linked. And it is undoubtedly true that whilst precedent, custom and tradition were revered this was not to the exclusion of novelty. Two maps in the exhibition really capture this duality. The first is the map of Exeter that I discussed in my first post. The second is a map of the North America village of Pomeiooc, on Roanoke Island (1585-93). Placed next to each other, the similarities between early modern Exeter and Pomeiooc are striking. Pomeiooc is presented as a well ordered settlement, encased in a wooden palisade for defence, it’s inhabitants are hunters, fishers and farmers. Sophisticated visual techniques are again on display – some of the houses are ‘cut away’ to reveal their inner organisation, and there is even a chap practising his archery by the fishing pools in the top right corner, just like in the map of Exeter. As before, this might tell us just as much about the European who painted the map as it does the native Americans that it depicts. It might reveal the tendency of Europeans to impose their own understandings and framework on the new cultures and societies that they encountered in far away places. It might be propaganda, designed to support overseas settlement by enticing potential settlers to the New World – like Exeter, Pomeiooc looks like a productive and fertile community (though I do wonder, what is that wooden fence keeping out…?). It certainly suggests that not all Europeans dismissed these people as barbaric savages, and that they could identify similarities between their own society and non-European counterparts. All in all, I was deeply impressed by both the achievements and complexity of the Tudor south west, as well as the exhibition’s capacity to capture and explore it. The Golden Age is here in all it’s glory – crafts, art, architecture, entrepreneurs, discovery, military triumph, intellectual development. My only remaining niggle is that the difficulties, the struggles and the violence of the age are largely absent. Here we see the middling and upper sections of Elizabethan society, but these objects are largely silent about the lower sorts, the people suffering in the hardships of the 1590s, the people resisting religious change and suffering due to economic trends. We do come face to face with Lord John Russell, 1st earl of Bedford, in a sketch by Holbein the younger. Russell was in charge of the forces that brutally suppressed the West Country or Prayer Book Rebellion in 1549, slaughtering hundreds in a number of bloody encounters around Exeter. But here his image must serve as the only reference to the scars left on the south west by that tragic rebellion. Of course, it would be strange to linger on these more troubling aspects of the period in an exhibition that is intended as a pointer to the south west’s ‘manifold contribution to the Tudor age’, and these comments are not intended as a (horribly unfair) criticism of the exhibition. They are included here as representative of my worry that perhaps there is too little space for the lower sorts in our museums and a reminder that we should fight hard to make sure they can find a place. In summary, this is undoubtedly an excellent exhibition that certainly fulfils its remit of revealing the intellectual, artistic and economic importance of south west in the Tudor Age. The sophistication of this society is perhaps the most striking impression that one is left with: despite being a geographically-peripheral region, this was by no means a provincial backwater. Head to the RAMM to see for yourself. ‘West Country to World’s End: the South West in the Tudor Age’ runs until 2 March 2014 at Exeter’s Royal Albert Memorial Museum. You can find all the details about the museum, it’s opening times, it’s wonderful café and more here. This is the fourth post in a week long series about an exhibition at Exeter’s museum. Click on pictures for enlargements. Politically, the south west was of crucial importance during Elizabeth’s reign when hostilities with Spain put Devon and Cornwall in the front line. This drew the region into events of national importance, but these events were also experienced on a local level and were of particular significance for the region. The 1588 Spanish Armada is probably the best known event of Elizabeth’s realm, and is certainly the most iconic, but for the south west things didn’t end there: two more invasion fleets sailed for Britain in 1596 and 1597. From the exhibition catalogue I learned that the region had in fact had been repeatedly strengthened militarily during the Tudor era – forts were constructed at western harbours in the reign of Henry VIIII, including the impressive examples at St Mawes (1543) and Pendennis (1546). In Elizabeth’s reign, Plymouth’s St Nicholas Island was heavily fortified in 1583-85 and Sir Richard Grenville was given command of the defence of Devon and Cornwall in March 1587, when he readied the equipment and defences of the peninsula. Anxieties remained high throughout the 1590s, Plymouth received more fortifications, and a small force landed at Mousehole, Newlyn and Penryn in 1595, doing extensive damage when they set them afire. But it was the 1588 Spanish Armada that really became embedded in national consciousness and whose memory has endured. This is surely because the failed invasion was accorded with such importance at the time. Special forms of prayer were issued by the government giving thanks for the nation’s deliverance, and celebrations marking the defeat became a regular fixture in a rapidly developing new national ‘Protestant’ calendar, as David Cressy has documented. In the epic struggle between Catholicism and Protestantism, God appeared to have revealed his hand, assisting the numerically inferior and poorer Protestant forces to miraculously defeat the mighty fleet of a Catholic superpower. This was not a mere fluke convergence of bad weather and inspired naval leadership, this was a providential deliverance. The ‘Protestant wind’ that sent the Spanish ships into disarray was proof of God’s special care and protection of his chosen people, those Protestants who professed the ‘true’ faith. Even at the time the iconography of the Armada was well developed (again giving lie to the ‘iconophobia’ discussed in a previous post). If you see a crescent of tall masted ships you are probably looking at a representation of the Armada of 1588, and there a few examples of these crescents in the RAMM’s exhibition. Most obviously, there is the ‘Armada Portrait’ of Elizabeth I, so called because the queen is framed by two images of the naval action. Above the queen’s left shoulder the English ships are shown bravely sailing towards a confrontation with the Spanish fleet in its distinctive crescent formation; over her right shoulder a wreckage strewn seascape represents the remains of the once proud Spanish fleet. Augustine Ryther engraving, note Exeter top left. The exhibition also houses a wonderful series of exquisite hand coloured engravings, telling the story of the engagements off the Devon and Cornish coasts. The engravings were produced by Augustine Ryther from charts which recorded the route of the Armada around the coast. They really do provide the story of the events – this black and white copy shows the recognisable crescent shape of the fleet, and collapses the timing of the events so that two parts of the action are shown simultaneously, creating an easily understood narrative. This is a technique that I often encounter when examining early printed material with my students, particularly those ballads and broadsheets that seem to be aimed at the least literate members of society. The prints are similar to the tapestries that were hung in Parliament in 1650. Commissioned in 1592, the ten tapestries were enormously expensive, costing £1,582 (the equivalent of 87 years wages for a labourer in 1590); and enormous in size: we think they measured 14 feet in height and between 17 and 28 feet in width. In 1650 they found their way into the Houses of Parliament, where they were mentioned in debate on several occasions. As if further evidence were needed of the longevity and significance of the Spanish Armada, in 1798 when there were concerns about a possible French invasion, the artist James Gillray was commissioned to produce images that would rouse patriotic fervour in the English people – the series of satirical prints he produced included one (above) depicting a French Admiral ordering his men to destroy the Armada tapestries. Finally, amongst other Armada memorabilia in the collection there is also a commemorative medal similar to the one in the picture. These were not only produced in England but also in other Protestant nations, indicating the way that the defeat of Catholic Spain reverberated throughout Europe, an important symbolic victory for international Protestantism. The medal in the RAMM collection is from the Netherlands. In the 1580s the Dutch United Provinces were in revolt against Catholic Spain, and Spanish hostilities against the English were in part an attempt to stop the English aiding their European Protestant allies. Spanish Armada – so famous it made it into the Simpsons. References like this are deeply suggestive of one of the ways that Protestantism was changing English society. Scriptural allusions were commonplace, and from the way that they are used (casually, briefly) it strongly suggests that people were expected to recognise them and the deeper religious truths that they stood for. Job has of course already cropped up in this series of posts (see day two, domestic decoration), here the brief quotation serves a similar purpose as an image: a reminder, a prompt to reflection, a stepping stone to a more profound appreciation of one’s own faith. In the final post tomorrow: a round up of the prominent themes. Sam Smiles (ed.), West Country to World’s End: The South West in the Tudor Age [essays to accompany the RAMM exhibition]. David Cressy, ‘The Spanish Armada: Celebration, Myth and Memory’, in J. Doyle and B. Moore (eds), England and the Spanish Armada (Canberra, 1990) or Bonfires and Bells: National Memory and the Protestant Calendar in Elizabethan and Stuart England (London, 1989). This is the third post in a week long series about an exhibition at Exeter’s museum. Today I want to talk filthy lucre. One of the things I learnt at the RAMM was that Exeter was an important centre for the goldsmith trade from as early as the thirteenth century, and this set off a train of thought that ended up in the surprisingly short-term world of town planning. I’ll try to recreate the train here. Many of Exeter’s early modern artisans had their workshops in Goldsmith Street, an impressive thoroughfare that had a church at either end, almshouses, and a handsome hall used by the Company of Tailors. The exhibition houses a variety of related items, but the one that took my eye was a communion cup made by John Jones, one of the wealthiest goldsmiths in early modern Exeter. It is indicative of the fact that in this society, ‘fine art’ did not necessarily mean paintings (though there are some wonderful Holbeins in the exhibition, if that’s your thing). This cup, manufactured from silver with delicate engraving around the gilt-edged rim and foot, is extremely accomplished, in fact I was rather surprised by quite how fancy it was, given that this was over ten years into the Calvinist-inspired Elizabethan reign. The cup is still a thing of beauty, it could easily be a lot plainer and less ostentatious. My first thought was that perhaps this is proof that the Elizabethan Settlement acted as a ‘broad umbrella’, incorporating a number of different types of Protestants and a range of churchmanship? Christopher Haigh has argued that the adjustments made to the Prayer Book at the start of Elizabeth’s reign, particularly additions to the words used during the administration of the Lord’ Supper, deliberately introduced ambiguity into the ceremony, encouraging a range of opinion about what actually happened during the sacrament to survive or evolve. Diarmaid MacCulloch has argued along similar lines, suggesting that these changes were to bring the English Reformation in line with what was happening in the rest of Europe, particularly in Germany and Geneva. It is entirely plausible that the fancy cup could be a part of these processes – the use of a silver work of art, rather than a plain wooden cup, would have been deeply suggestive to a congregation versed in the ritual and symbolic importance of the liturgy. Beyond the sometimes obscure and always complicated world of Reformation theology, the goldsmiths can also tell us much about the way in which changes in belief left a deep and enduring imprint on early modern society. For part of the reason for the continued success and prestige of the goldsmith community in Exeter was the dissolution of the City’s priory and friaries in 1538 and ongoing changes in religious policy that sent a lot of work their way. Historians have discovered that far from being isolated and cut off from their local communities, monasteries were in many ways integral to the social and economic functions of their local region, providing charity and education, and as producers and consumers. Following their abrupt closure, the shock waves were swift, reshaping the landscapes of local communities physically as well as spiritually. Large, imposing buildings were torn down or their functions changed, and Henry VIII quickly appropriated the vast riches of these institutions. This not only meant that the crown took control of church lands, they also seized their more moveable treasures. For the large group of goldsmiths in Exeter, this would have meant a very welcome steady source of work and income, as church plate was confiscated, some of which had to be melted down and reworked in a more acceptable shape, suitable to the new reformed liturgy. This was a lucrative business, as at each stage of the process the participants could take their cut, not to mention that the parishes had to buy new plate from the goldsmiths to replace the old throughout the Tudor era. Similar processes happened in parish churches – the RAMM’s information card tells us that the churchwarden accounts of St Petrock’s church in Exeter show that Jones was paid £1 15s 5d in 1572 for ‘converting’ this communion cup to make it suitable for Protestant worship. Thus the redistribution of wealth that the dissolution triggered is not restricted to the property market but bought benefits and profits to other groups that can easily be overlooked. Exeter’s Goldsmith’s Street as it once was. Finally, I was also interested to discover the fate of Goldsmith Street – the majority of the historic buildings there were demolished by the City Council in the 1970s to make way for redevelopment – today you will find Marks and Spencer and Millets where the goldsmiths used to ply their trade. Although one of our enduring national myths is that bombing raids in World War II were responsible for the destruction of much of our pre-modern urban architecture, more recently historians have begun to question this narrative. They have drawn attention to the fact that many cities were already undergoing a programme of redevelopment that included sweeping away inconveniently narrow medieval streets that were seen as obstacles to modern infrastructure and progress. Though the blitz did account for damage in many historic centres, our society’s own decision to prioritise the needs of economic and industrial advancement over our historic past may be the real explanation of urban change. A recent article on the BBC website revealed that this is even true of Coventry, which suffered devastating destruction in a terrible air raid in 1940, but where demolition had actually started before the war and continued after it. Exeter too suffered, in a severe raid in 1942 1,500 houses were destroyed, 2,700 were seriously damaged, and the Cathedral itself was hit, narrowly escaping the destruction of the nave. But much of value was left, though not all of it was subsequently retained – wiped away just as Goldsmiths was to make way for shopping centres and fast food joints. In many ways modern redevelopment of our urban landscapes is now just as shocking and significant as the deliberate destruction of the monasteries and the properties of the parish churches in the 1500s, and increasingly we are now beginning to see it that way. Each was an iconoclastic act, signalling a rejection of and moving away from the past. They were both inspired by a shift in the prevailing ideology and the emergence of something new: Protestantism, capitalism, modernity. Each are shocking to us now because these acts display a complete lack of respect for the past and for beautiful treasures which can now never be recreated. Each seems to have been driven by ‘the authorities’ in the face of limited public resistance, and in many cases the public seem unable to prevent the change even where they disagree with it. Perhaps this can helps us to understand the ‘compliance conundrum’ – the question of why there was a relative lack of any widespread resistance to the dissolution, despite the commitment that most English women and men had previously shown to the institutions. Perhaps they felt as helpless as we do in the face of development, perhaps they also felt a sense in which they were swimming against the tide in trying to preserve the past or stand in the way of state sponsored change. Or perhaps they came to terms with and even embraced the changes, regretting the passing of the old ways and the destruction of beautiful things, but eager to make the most of the opportunities that the new future offered them, and keen to create new and more beautiful – but different – things to replace those that had been lost. In tomorrow’s post: the Spanish Armada arrives off the south west coast. This is the second post in a week long series about an exhibition at Exeter’s museum. View the first post on a map of Exeter here. In early modern England the population was expanding incredibly rapidly and massive inflation led to the deterioration of living standards for many of the lower sorts. In contrast, changes in income tended to increase the number of middling groups in society, those merchants, artisans and gentry who benefited from rising property prices. In the west country, the prosperous cloth trade and various mercantile enterprises meant that the middling sorts had money to invest in the arts. You are perhaps already aware of the National Portrait Gallery’s current exhibition on Elizabeth I and her People, and if that is your sort of thing, there are lots of paintings at the RAMM too, including ‘The Armada Portrait’ of Elizabeth I; several from the school of Holbein; numerous works by Exeter’s most significant artist to date, the miniature-painter Nicholas Hilliard; and a huge piece that tells the story of the arrival of Armada in the South West in 1588. Click on images for enlargements. All are deeply impressive, but the artistic accomplishment of the south west is also to be found in the crafts – in the production of jewellery, elaborate drinking vessels, church plate (more on that in tomorrow’s post), household utensils, decorative plasterwork, moveable furniture, architectural stone and woodwork, and fine needlework. Some of these were functional, but all displayed the taste, wealth and status of their owners in this society. Moses wears a white tunic and his extra long, brownish belt flaps around his legs as if in a breeze. He has tights tucked into his high brown boots, and wears a warm looking hat. He has a brown beard, much shorter than Job’s, and he also looks like he is walking. In his arms is a large tablet divided in two, dashed lines across it representing the Commandments. There is a skull between his feet, and I was intrigued to see that Moses is blindfolded – I am assuming this represents the Lord’s impartial justice but would be delighted to hear of other examples of this. His inscription reads ‘The Lord will stirr up amonge the brethren a Profet, like unto me. Deutrinomy 18’. The RAMM’s information card informs us that the boards might have been displayed in a church or private house near Plymouth, but immediately my little grey cells started humming. I doubted that it was the latter in Elizabethan England, where the work of iconoclasm in parish churches was relatively complete. To me, these images were a surprise – what were images of scriptural figures doing here, in an era when images had been rejected by the reformers as leading to wrong belief and wrong practice? The scholarship on visual culture in early modern England can help to answer this question, as it has been rapidly developing in recent years. Earlier historians had to an extent been won over by Patrick Collinson’s argument that throughout Elizabeth’s reign, English Protestantism became less, not more popular in character. Crudely summarised, Collinson asserted that the first generation of Protestant publicists and propagandists made polemical use of cultural vehicles (songs, drama, cheap print, the visual arts), using these forms to transmit the evangelical message with the aim of converting the English people to Protestantism. Protestant plays were written and produced, godly ballads were published and sung, images were used to attack Catholicism and to commend their own religious beliefs and values. But around 1580 Collinson thought that a new generation of evangelicals began to reject visual and performative culture, judging it to be unsuitable for their religious message. This later generation of Protestants thought that plays, songs and images were distracting the audience and confusing the religious message. Worse, the arts mixed sacred ideas with filthy ‘popular’ forms, doing violence to religious truth by associating it with base, bawdy and inappropriate behaviour and language. In this new world, Collinson argued that Protestants came to completely refuse any appeal to the senses in religious matters. All images were ‘Popish’, most Elizabethan and Jacobean bibles therefore had no illustrations, the only decoration in the parish church was to be the Royal Arms and perhaps a table of the ten commandments. England had moved from iconoclasm in the first stages of reform (rejection of abused, dangerous and false images), to complete iconophobia (rejection of all images). And yet…, whilst Collinson’s argument is enormously useful in thinking about the continuing repercussions of religious change, it is perhaps more useful for thinking about reforming clergymen than it is English society more broadly. Objections have been raised, and work is afoot to provide a corrective to the ‘iconophobia’ argument. It is easy to point to the continued existence of images in England – British Printed Images to 1700 is a website that hosts a database of several thousand printed images produced in Protestant Britain, and much decorated medieval furniture can be found in parish churches across the country to this day (though of course some of this may have been restored during a later era). Our Moses and Job boards are of course another example of later imagery. So how can we explain Moses and Job? Are these a rare surviving example of something from the bottom of the Tessa Watt’s ‘ladder of sanctity’ – inoffensive Old Testament figures that Protestants were comfortable displaying in a secular context? Watt has taught us that those scriptural figures who were the least sacred in the Catholic tradition, those that did not have cults associated with them and who were therefore unlikely to be the focus of devotion, were often still depicted in post-Reformation England. Moses and Job fit the bill – they are Old Testament figures, and both are strongly associated with moral teaching and practices. You are not meant to worship them but to learn from their stories and they were probably a new element of visual language in the post-Reformation church – there are no wall paintings of Job in Anne Marshall’s excellent catalogue of medieval wall paintings, and only one of Moses – which was painted after the Reformation. Watt’s theory therefore helps us to explain images that survived in the face of fierce criticism of the Catholic use of imagery in worship. It seems that the purposes of post-Reformation images were usually didactic, images were used symbolically to recall to mind important beliefs or Christian principles. Here the scriptural texts above the images suggest that these figures were intended as an aid to memory, representative of bigger theological and moral truths. Job stood for the trials, temptations and suffering that an ordinary family man might face in everyday life, the text the hope of release from them. Moses would call to mind the Ten Commandments (perhaps displayed for all to see in the parish church) and their importance as the basis of Christian morality and behaviour. Both are eminently suitable for display in a secular sphere such as the household, reminders of everyday Christian beliefs that could comfort and guide people as they went about their lives. Incidentally the British Printed Images database throws up eight images of Moses and two of Job, all from the seventeenth century, suggesting that these images might be less suitable for publication than for display in the household. Often these images are found in the frontispiece: Drexel’s School of Patience (1640) has an image of Job with the caption ‘Patience’; in Francis Quarles 1646 collection of miscellaneous reflections Boanerges and Barnabas Moses represents justice (in opposition to mercy) and wears a similar outfit to that depicted on our boards (see below); whilst a 1695 edition of Richard Allestree’s Works shows the prophet wearing a veil. Does the latter represent squeamishness over showing Moses’ face, or is it just because the book contains a section on the topic of veiling? It appears then that Moses and Job need not have been out of place in the Elizabethan south west after all. Tara Hamling’s recent work on domestic decoration supports such an interpretation, and these boards indeed suggest that Elizabethan England ‘still contained many images to help its inhabitants in converting the words of the Protestant religion into a visualised experience’, as Tessa Watt has argued. These images were complementing and supporting preaching and reading, those activities more traditionally seen as the heart of Protestant practice. The physical environments that people inhabited had also been changed as a result of reform, reconfigured to encourage the development of the Godly society that the evangelicals strove to create. In tomorrow’s post: musings on the impact of the Reformation, goldsmiths and contemporary urban redevelopment. Patrick Collinson, ‘From Iconoclasm to Iconophobia: the Cultural Impact of the Second English Reformation’, The Stenton Lecture 1985 (University of Reading:1986). Reprinted in Peter Marshall (ed.), The Impact of the English Reformation (London, 1997). Tessa Watt, Cheap Print and Popular Piety (Cambridge, 1991), chapter 4, ‘Idols in the frontispiece’. Tara Hamling, Decorating the ‘Godly’ Household: Religious Art in Post-Reformation Britain (London, 2010). This is the first in a week long series of posts about a new exhibition at Exeter’s museum. I few weeks ago I had the pleasure of visiting a wonderful new exhibition at Exeter’s recently refurbished Royal Albert Memorial Museum. Titled ‘West Country to World’s End: the South West in the Tudor Age’, the publicity describes it as ‘celebrating the spirit of adventure and enterprise of south west people’ during the Elizabethan ‘Golden Age’. Along with some of my first and second year undergraduates, I was also lucky enough to attend a talking tour of the exhibition by one of its curators: Sam Smiles, Professor of Art History and Visual Culture at the University of Exeter. It was an intriguing insight into the thought and planning that goes into such a project, and I was struck by how carefully constructed museum exhibitions are in order to allow viewers to assemble a history from the objects themselves. It led me to reflect on the way that the selection, juxtaposition and display of the objects prompts the viewer to make associations and identify themes, leading to their greater understanding of the period and the subject. The exhibition runs until 2 March 2014, and each day this week I will be offering some thoughts on objects from the exhibition, explaining what the items said to me and following up on the questions that they raised. Click on pictures for enlargements. Engraving of Exeter by Hogenberg, 1587. As a naturalised Exonian, I was very taken by the large scale reproduction of a map of Exeter as it was in 1587. Placed at the start of the exhibition it immediately orientates you within the early modern city, and it is fascinating for any number of reasons. The Exeter on the map has some familiar landmarks, yet the contours are not what are not what you expect: the river has been redirected in the centuries since, the castle and city walls have largely disappeared, and of course modern Exeter is far larger, incorporating parishes that were entirely separate in the early modern period and sprawling suburbs where once there was only farmland. The map is incredibly detailed – there are figures promenading in the streets and a couple of archers practise their skills by the Exe bridge, whilst the tenterhooks used in Exeter’s successful cloth trade are plain to see on the banks of the river. There are at least seven churches within the walls in addition to the huge cathedral, and everywhere there are wide green open spaces: a reminder that the Tudor urban environment was vastly different to our own. The map is hard to navigate for a modern too – the perspective allows the viewer to see the city in it’s entirety, but in doing so fails to indicate the very steep incline between the river and the city centre, so buildings that appear to be next to each other on the map are not experienced like that in reality. Of course maps are never realistic in the way that they present their subject, they are designed to convey specific information to the map ‘reader’, thus the map designer chooses which aspects to emphasise and which to elide. The resulting distortion might therefore tell us more about the producers’ perceptions and intent than the place they are depicting. Thus we do not see the city ‘as it actually was’, but rather we see what the producer (or patron) wants us to. This map was made for the great city atlas edited by Georg Braun and largely engraved by Franz Hogenberg, published in Cologne in six volumes 1572-1617. Many of the images in this post can be seen at ‘Historic Cities‘ which has excellent digital reproductions of city maps of the past, present and future. Braun and Hogenberg’s atlas contained 546 maps of cities, mainly European but there was also room for Mexico city and Casablanca. Other English cities included were London and the second city Norwich, Oxford and Cambridge, York, Canterbury, Chester and Bristol: the fact that Exeter was deemed worthy of inclusion alongside these indicates its important national status at the time. Hogenberg’s other city plans share features with Exeter’s –York is surrounded by a profusion of windmills, and in Norwich archers are also practicing their skills on the outskirts of town. There are differences too: Bristol, Cambridge and Norwich have sheep grazing in their hinterlands whilst in Exeter is surrounded by arable land, some of the maps have larger figures in contemporary dress in the foreground, indeed Oxford has what appear to be two scholars having an argument under a tree. Either Chester was menaced by giant horses, or this map is not to scale. The Exeter map thus tells me that Hogenberg saw the city as a Godly, thriving, well defended and well connected metropolis, relatively compact though already outgrowing the limits of it’s walls. The river was clearly a central part of it’s extensive trading and manufacturing activities, the water cluttered with boats and mills. A steady stream of people cross over the bridge towards the city gates, and within the walls there were some impressive houses suggesting wealthy citizens – this was a bustling regional centre, then as now. Surprisingly there are no cows to be seen (Cambridge, Bristol, Chester and other cities have sheep and horses grazing around about them), but there are some chaps fishing near a weir at Bonhay. The wide streets and green spaces within the city and the rolling Devon countryside which form the hinterland suggest this would be a good place to live and work, it is presented as a civilised, spacious and clean environment. As such, my suspicion is that it only tells part of the story of life in urban Elizabethan England. In tomorrow’s post: what are images of Moses and Job doing in the Protestant south west? ‘West Country to World’s End: the South West in the Tudor Age’ runs until 2 March 2014 at Exeter’s Royal Albert Memorial Museum. You can find all the details about the museum, it’s opening times, it’s wonderful café and more on their website. Historic Cities, a joint project of the Historic Cities Center of the Department of Geography, the Hebrew University of Jerusalem and the Jewish National and University Library. Georg Braun and Frans Hogenberg, ‘Civitas Exoniae (vulgo Excester) urbs primaria in comitatu Devoniae’, in Civitates Orbis Terrarum, Cologne. Vol. VI 1617. Most of the posts which appear on the many-headed monster are either related directly to historical research into the early modern period, or focus on other questions relating to historiographical concerns, methodological issues, theoretical problems or matters arising out of our experience as professional early modern historians. Nothing wrong with that, I hope you’ll agree! But in this post, I’d like to do something slightly different. There is a big aspect of life as an academic which is so far conspicuous by its absence from the pages of the monster (fellow heads, correct me if I am wrong…), and that is: teaching. How, in other words, do we prepare for the important professional task of raising little monsters? This is something that has been on my mind for several months now. In September, I returned to a full teaching load after three years of research leave. This involved taking over and contributing to existing courses, as well as devising a couple of brand new ones. The initial shock was (just about) mitigated by the genuine pleasure of sitting down and figuring how to try to formulate courses which would be appealing to students, would develop their skills and knowledge, and which would hopefully act as a good introduction to a world which I find endlessly fascinating, exciting, and even downright fun! But writing a course is hard work, and out of all the things that academics have to do – teaching, research, writing, publishing, attracting funding, organising and presenting at conferences – it is probably the activity for which we receive the least guidance and support. It is also the foundation on which pretty much all other aspects of teaching depend: if your curriculum is over- or under-ambitious, incoherent, or just plain dull, then you are sowing all sorts of nasty seeds which you will have no choice but to reap in the fullness of time. I wouldn’t dream of saying that I have a solution to this issue, yet alone a blueprint of ‘best practice’. Instead, I just want to talk around some of the challenges I think that we probably all experience at one time or another, and I invite your thoughts on these areas and more! Some modules sit in our teaching portfolio like cuckoos in the nest – definitely the product of another gene pool! First of all, it is worth noting that we don’t all get to teach the courses we would like to teach. A permanent post tends to bring with it the opportunity to devise your own courses around your personal interests, but that is not often the case earlier in your career, although thankfully there are some exceptions to that. Still, there are at least two approaches to taking over an existing course. The first is to ask for copies of the module handbook (maybe even the lecture notes) and simply deliver the course as written. The other, more time-consuming but perhaps more rewarding option, is to ask whether there is leeway for you to tweak the course, within the existing module specifications and learning outcomes. You can’t spring a course on Elizabethan popular culture on a group of unsuspecting students who have signed up for a module on Henrician court politics, for example, but by tweaking discussion questions, reading lists, primary source exercises and topic headings you can come up with something which is a much better reflection of your interests: you’ll enjoy it more, and the students will probably enjoy it more as a result. How does your piece fit into the rest of the puzzle? structure of (let’s say, for the sake of argument) your students’ undergraduate history degree. History isn’t the same as mathematics or some of the other sciences, where before you tackle a subject like fluid dynamics you probably need to be pretty damn good at the basics of adding up, algebra, basic mechanics, that sort of thing. (OK, this is maths, I don’t really know what I’m talking about, which kind of proves my point.) The seventeenth century isn’t ‘harder’ than the sixteenth century; and knowing everything that happened before a given date isn’t an absolute prerequisite for studying what happened after it, although admittedly some context is always key. But if your students have no experience of early modern history at all, is it wise to go straight in with something very learned and abstruse, which might just scare them off? Most institutions I have experience of offer broad surveys in the early years of a degree, to introduce some of the key religious, social, political, economic and cultural ideas of the period, but often only in the most general way. Also, what is the size and shape of the course you have to design? Is it ‘short and fat’ or ‘long and thin’? Is it lecture heavy with the odd seminar, a balance of the two, or mainly seminar based? Is it an individual or a group research project? Is it assessed by exams, essays, presentations, or in some other way? Often these sorts of decisions are out of our hands – the structure and assessment methods for your module may need to tally with those of other modules of the same basic type, for reasons of equity and administrative convenience. But how often do we really take the time to shape our courses to the structures through which we are expected to deliver them, however back-to-front this approach may seem, or indeed actually be? If we are offering courses at different levels of a programme, do we think about the relationships between them? And what happens if the second year module you designed to feed in to your third year class is dropped, or moved to a different place in the programme? Can you really recycle it, or do you need to rethink completely its role in the degree? module. To use a seasonal analogy, is an undergraduate option like one of those tastefully decorated, expensive department-store Christmas trees, or does it look better festooned with gaudy glitz and glamour? In other words, is less more, or is more more? Again this depends on the size and shape of your course, and the point at which it comes in the degree programme. But as a general principle, I’m starting to realise that however I like to decorate my Christmas tree, less is probably more in this instance. Another terrible seasonal metaphor: if you’re trying to get somebody to like Christmas pudding, given them a little to try, and give them some more if they ask for it; don’t demand that they eat a whole one, make them sick in the process, and put them off for life. If your teaching is predominantly seminar based, heavy on activity, interaction and enquiry, I think it is especially important not to try to cram too much in, but to allow time for students to really get to grips with the material. After all, surely learning in a classroom environment is at least as much about the quality of the interaction as it is about the quantity of ‘stuff’ you get through: it is about developing intellectual and analytical skills, not just imparting ‘knowledge’ or ‘facts’ (whatever they are). Knowledge is of course a pre-requisite for understanding, which is where reading, preparation and introductory lectures come in, but it is no substitute for it.
2019-04-24T08:56:45Z
https://manyheadedmonster.wordpress.com/2013/12/
THIS DOCUMENT CONTAINS AN ARBITRATION AGREEMENT AND CLASS ACTION WAIVER, WHICH AFFECT YOUR LEGAL RIGHTS. YOU SHOULD REVIEW THIS DOCUMENT IN ITS ENTIRETY BEFORE ACCESSING OR USING THE ONLINE SERVICES. The information and content (collectively, "Content") on our online and mobile websites, platforms, services, and applications is for your general educational information only. The Content cannot, and is not intended to, replace the relationship that you have with your health care professionals. The Content should not be considered and is not intended as medical advice. If you are experiencing a medical emergency, you should not rely on any information on the Online Services and should seek appropriate emergency medical assistance, such as calling "911". You should always talk to your health care professionals for diagnosis and treatment, including information regarding which drugs or treatment may be appropriate for you. None of the Content represents or warrants that any particular drug or treatment is safe, appropriate or effective for you, or that any particular health care provider is appropriate for you. Health information changes quickly. Therefore, you should always confirm information with your health care professionals. The Content is for informational, cost-comparison purposes only. Talk to your health care provider to determine if an alternative prescription drug is right for you. The Content may include information regarding therapeutic and generic alternatives for certain prescription drugs, and may describe uses for products or therapies that have not been approved by the Food and Drug Administration. The Content is intended for a U.S. audience. If you live outside the U.S., you may see information about products or therapies that are not available or authorized in your country. The Content should not be considered financial advice, legal advice or tax advice. Moreover, your use of the Online Services does not in any way create a physician-patient relationship, any sort of confidential, fiduciary, or professional relationship, or any other special relationship that would give rise to any duties on our part. We do not recommend or endorse any specific tests, procedures, treatments or opinions, or other information that may appear on the Online Services or through other products and services. If you rely on any Content, you do so solely at your own risk. as "we", "our," "us," and "Company" refer to UnitedHealth Group and its affiliate entities. These Terms describe the rules for using our online and mobile websites, platforms, services, and applications we own and operate and that contain a link to these Terms (collectively, "Online Services"). Any references to "you" or "your" in these Terms will mean the person using the Online Services, including the persons? heirs, assigns, or dependents, and individuals making benefits decisions for themselves or their dependents. If you are helping another person use our Online Services, these Terms constitute a legally binding agreement between you, the person being helped, and the Company, and "you" or "your" shall also include the person being helped. By using our Online Services, you agree to the most-recent Terms as well as the most-recent version of our Privacy Policies. We may change these Terms at any time, and such changes will be posted on this or a similar page of the Online Services. It is your responsibility to review these Terms each time you use our Online Services. By continuing to use the Online Services, you consent to any changes to our Terms. Your use of a particular product or service may be governed by additional Terms or required disclosures that may be important for you to know. This information can be found below - in the Additional Terms sections of these Terms ("Additional Terms"). If there is any conflict between the Terms and the Additional Terms for any other product or service, the Additional Terms will control with respect to that product or service (but all other provisions in these Terms that are not in conflict will apply). By using our Online Services, you acknowledge and agree that any activity on the Online Services is subject to monitoring by the Company at any time, and that the Company may use the results of such monitoring without limitation, subject to applicable law. In addition, if you enter into any other agreement with the Company, for example an agreement for health plan coverage, benefits, a "Custodial and Deposit Agreement," licensing agreement, or any other agreement, then these Terms are in addition to the terms of such other agreement and in the event of any conflict, the terms of the other agreement control. These Terms do not guarantee that you are eligible to receive coverage under any plan, enroll in any program, or open an account offered through our Online Services or otherwise. The Online Services may allow you to register by providing an email address and password (your "User ID"), and you may also be able to select a display name or image ("Nickname") that identifies you on the Online Services. These are your credentials for accessing portions of the Online Services. You agree we have the right to disable and/or delete any Nicknames for any reason in our sole discretion. You are responsible for protecting your User ID. If your User ID or other activation codes you use with the Online Services are compromised, you agree to immediately inform us. Subject to these Terms, the Company grants you a personal, noncommercial, nontransferable, nonexclusive, revocable, limited license to view the Content on our Online Services for the sole purpose of obtaining information regarding our plans or products and related activities such as, if permitted on our Online Services, applying for a plan, enrolling in a program or service, or opening an account. You may also print a reasonable number of copies of the Content for your personal use, but in such case you must reproduce all proprietary copyright and trademark notices. All rights, title and interest in and to the Online Services, including the Content, and all intellectual property rights, including all copyright, trademark, patent and trade secret rights therein shall remain with the Company and our licensors and vendors, and no ownership interest is transferred to you or any other entity by virtue of making the Content available on the Online Services, granting the foregoing licenses or entering into this Agreement. We may terminate this license at any time for any reason. If you breach any of these Terms, your license to the Content terminates immediately. Upon the termination of this license you must stop using the Online Services, including all Content, and return or destroy all copies, including electronic copies, of the Content in your possession or control. to comply with all applicable laws and regulations while using our Online Services or the Content. You agree that we may take any measures we deem appropriate, in our sole discretion, to prevent the violation of, and to enforce, these Terms. You agree that we may take any actions permitted or required by law (including the suspension or termination of your account or your access to the Online Services) if we believe, in our sole discretion, that you are engaging in activities that (i) violate these provisions (or other terms in these Terms), (ii) could expose us or our vendors or business partners to liability, or (iii) could harm our business reputation. You are solely responsible for the content of any postings you submit and the Company assumes no responsibility or liability for any content submitted by you or any other visitor on our Online Services. We may, but are not obligated to, restrict or remove any and all content from a message that we determine in our sole discretion violates these Terms or is otherwise harmful to us, our customers, or any third-party. We reserve the right to remove the content you provide at any time, but you understand that we may preserve and access a backup-copy, and we may disclose the content if required to do so by law or in a good faith belief that such access, preservation, or disclosure is required by law or in the best interests of the Company. The Digital Millennium Copyright Act of 1998 (the "DMCA") provides recourse for copyright owners who believe that material appearing on the Internet infringes their rights under US copyright law. If you believe in good faith that content or material on our Online Services infringes a copyright owned by you, you (or your agent) may send the Company a notice requesting that the material be removed, or access to it blocked. This request should be sent to the applicable business via email or alternatively to UnitedHealth Group. The notice must include the following information: (a) a physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed; (b) identification of the copyrighted work claimed to have been infringed; (c) identification of the material that is claimed to be infringing or the subject of infringing activity; (d) the name, address, telephone number, and email address of the complaining party; (e) a statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent or the law; and (f) a statement that the information in the notification is accurate and, under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. If you believe in good faith that a notice of copyright infringement has been wrongly filed against you, the DMCA permits you to send us a counter-notice. Notices and counter-notices must meet the then-current statutory requirements imposed by the DMCA. Notices and counter-notices with respect to the Online Services should be sent to the address above. We may change, add or remove some or all of the Content on our Online Services at any time. In addition, please note that although our goal is to provide accurate information, certain features that may be offered through our Online Services, such as identification of participating healthcare providers, pricing information or other Content, are updated on a periodic basis and therefore the information displayed may have changed. In addition, please note that features of any plan, product, service, or account described in our Online Services may change over time as permitted by law, including benefit levels, items included in any formulary, pricing or lists of participating providers or other associated vendors. WE TRY TO KEEP THE ONLINE SERVICES BUG FREE AND SAFE, BUT YOU USE THEM AT YOUR OWN RISK. OUR ONLINE SERVICES AND THEIR CONTENT ARE PROVIDED TO YOU ON AN "AS IS", "AS AVAILABLE" BASIS. THE COMPANY, ALL THIRD PARTIES, IF ANY, PROVIDING CONTENT FOR OUR ONLINE SERVICES, AND ALL THIRD PARTIES PROVIDING SUPPORT OR INFORMATION FOR OUR ONLINE SERVICES (COLLECTIVELY, "ONLINE SERVICE-RELATED-PARTIES") HEREBY DISCLAIM ALL WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT. THE ONLINE SERVICE-RELATED-PARTIES MAKE NO WARRANTY AS TO THE ACCURACY, COMPLETENESS, TIMELINESS, CORRECTNESS, CURRENCY, OR RELIABILITY OF ANY CONTENT AVAILABLE THROUGH OUR ONLINE SERVICES. WITHOUT LIMITING THE FOREGOING, THE ONLINE SERVICE-RELATED-PARTIES SPECIFICALLY DO NOT REPRESENT OR WARRANT THAT ANY INFORMATION REGARDING PARTICULAR PLAN BENEFITS OR SCOPE OF COVERAGE IS ACCURATE OR COMPLETE. THE ONLINE SERVICE-RELATED-PARTIES MAKE NO REPRESENTATIONS OR WARRANTIES THAT USE OF OUR ONLINE SERVICES WILL BE UNINTERRUPTED OR ERROR-FREE, THAT DEFECTS WILL BE CORRECTED, OR THAT THE ONLINE SERVICES OR THE TECHNOLOGY THAT MAKES IT AVAILABLE ARE FREE OF VIRUSES OR OTHER HARMFUL COMPONENTS. YOU ARE RESPONSIBLE FOR TAKING ALL PRECAUTIONS NECESSARY TO ENSURE THAT ANY CONTENT YOU MAY OBTAIN FROM OUR ONLINE SERVICES IS FREE OF VIRUSES AND ANY OTHER POTENTIALLY DESTRUCTIVE COMPUTER CODE. We are not obligated to provide maintenance, technical support or updates to you for any portion of our Online Services. We are not obligated to continue to provide our Online Services. The foregoing limitations and exclusions shall apply to the maximum extent permitted by applicable law, even if any remedy fails its essential purpose. YOU AGREE THAT NONE OF THE RELEASED PARTIES SHALL BE LIABLE FOR ANY LOSS OR LIABILITY ARISING OUT OF OR RELATING IN ANY WAY TO (A) THESE ONLINE SERVICES, (B) ANY THIRD PARTY SITE OR PROGRAMS ACCESSED THROUGH THE ONLINE SERVICES, (C) ANY ACTS OR OMISSIONS OF THE RELEASED PARTIES, AND/OR (D) YOUR ACCESS OR USE OF THE ONLINE SERVICES. (THE "RELEASED CLAIMS"). THE RELEASED CLAIMS COVER CLAIMS BASED ON WARRANTY, CONTRACT, TORT, STRICT LIABILITY, AND ANY OTHER LEGAL THEORY. THE ?RELEASED PARTIES? INCLUDE THE ONLINE SERVICE-RELATED-PARTIES AND THEIR AFFILIATES, SUBSIDIARIES, EMPLOYEES, MEMBERS, SHAREHOLDERS, OFFICERS, DIRECTORS, AGENTS, PREDECESSORS IN INTEREST, SUCCESSORS IN INTEREST, PARTNERS, CLIENTS, CUSTOMERS, AND VENDORS. (COLLECTIVELY, ?RELEASED PARTIES?). THE RELEASED CLAIMS COVER ALL LOSSES INCLUDING, WITHOUT LIMITATION, DIRECT OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, AND/OR PUNITIVE DAMAGES, PERSONAL INJURY/WRONGFUL DEATH, LOST PROFITS, OR DAMAGES RESULTING FROM LOST DATA, LOSS OF GOODWILL, OR BUSINESS INTERRUPTION. THE TOTAL, CUMULATIVE LIABILITY OF THE RELEASED PARTIES FOR LOSSES OR DAMAGES SHALL BE LIMITED TO THE AMOUNT OF YOUR ACTUAL DAMAGES, NOT TO EXCEED U.S. $100.00. THE LIMIT OF LIABILITY MAY NOT BE EFFECTIVE IN SOME STATES. IN NO EVENT SHALL THE RELEASED PARTIES BE LIABLE TO YOU FOR ANY LOSSES OR DAMAGES OTHER THAN THE AMOUNT DESCRIBED ABOVE. ALL OTHER DAMAGES (E.G., DIRECT OR INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY, AND/OR PUNITIVE DAMAGES) ARE EXCLUDED EVEN IF THE RELEASED PARTIES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOU AGREE THAT YOU USE OUR ONLINE SERVICES AT YOUR OWN RISK. IF YOU ARE DISSATISFIED WITH OUR ONLINE SERVICES OR THE CONTENT, YOUR SOLE AND EXCLUSIVE REMEDY IS TO DISCONTINUE USING THE ONLINE SERVICES. The foregoing limitation of liability is not applicable to residents of New Jersey. With respect to residents of New Jersey, the Released Parties are not liable for any damages unless such damages are the result of our negligent or reckless acts or omissions; and the Released Parties are not, in any case, liable for indirect, incidental, special, consequential or punitive damages. You acknowledge and agree that Company's suppliers are third-party beneficiaries of these Terms, with the right to enforce the limitations of warranty and liability set forth herein with respect to the respective technology of such suppliers and Company. Agreement. You agree we have the right to hire counsel of our own choosing in connection with, and to assume the exclusive defense and control of, any matter subject to indemnification by you, and doing so will in no way limit your indemnification obligations hereunder. In any litigation, you will cooperate with us in asserting any available defenses. You may not use, export, re-export, import, sell, transfer or proxy our Online Services unless such activity is permitted by these Terms and such activity is not prohibited by United States law, the laws of the jurisdiction in which you receive our Online Services, or any other applicable laws and regulations. In particular, but without limitation, the Online Services may not be exported, re-exported or made available in any manner (a) into any U.S. embargoed countries or (b) to anyone on the U.S. Treasury Department's list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person's List or Entity List. By using our Online Services, you represent and warrant that you and any ultimate beneficiary of our Online Services are not located in any such country or on any such list. You also agree that you will not use our Online Service for any purposes prohibited by U.S. law, including, without limitation, the development, design, manufacture or production of nuclear missiles or chemical or biological weapons. Let's Try To Sort Things Out First. We want to address your concerns without needing a formal legal case. Before filing a claim against us or Released Parties in connection with these Terms or the Online Services, you agree to try to resolve the dispute informally by contacting [email protected], if the dispute is with UnitedHealth Group, UnitedHealthcare, or Optum; or [email protected], if the dispute is with Rally Health. We'll try to resolve the dispute informally by contacting you via email. If a dispute is not resolved within 30 days of submission, you or we may bring a formal arbitration proceeding as described below. We Both Agree To Arbitrate. You and we agree to resolve any claims relating to these Terms or the Online Services through final and binding arbitration, except as set forth under Exceptions to Agreement to Arbitrate below or where prohibited by law. The arbitration shall be held in the state in which you reside. For residents outside the United States, arbitration shall be initiated in Hennepin County, Minnesota, or any other location to which the parties agree, and you and we agree to submit to the personal jurisdiction of any or state or federal court in the state of Minnesota to compel arbitration, stay proceedings pending arbitration, or to confirm, modify, vacate or enter judgment on the award entered by the arbitrator. containing an arbitration provision. The letter must specify your first and last name, User ID, mailing address, and explain that you are opting out of this arbitration provision. The letter should be sent to UnitedHealth Group, Attention: Legal Intake (MN-008-T700), 9900 Bren Road East, Minnetonka, MN 55343. Arbitration Procedures. The arbitration shall be conducted by a single arbitrator, governed by the rules of JAMS that are in effect at the time the arbitration is initiated available at www.jamsadr.com or by calling JAMS at 1-800-352-5276 (referred to as the "JAMS Rules") and under the rules set forth in these Terms. We may also mutually agree to have the arbitration conducted by telephone or based on written submissions. Arbitration and Attorney's Fees. Company or Online Services-Related-Parties, as applicable, will pay all arbitration fees for claims less than $75,000, unless the arbitrator finds the arbitration to be frivolous. You are responsible for all other additional costs that you may incur in the arbitration including, but not limited to attorney's fees and expert witness costs unless we are otherwise specifically required to pay such fees under applicable law. For claims that total more than $75,000, the JAMS Rules will govern payment of filing fees and arbitration fees. The decision of the arbitrator will be in writing and binding and conclusive on us and you, and judgment to enforce the decision may be entered by any court of competent jurisdiction. You agree that dispositive motions, including without limitation, motions to dismiss and motions for summary judgment, will be allowed in the arbitration. The arbitrator must follow these Terms and can award the same damages and relief as a court, including injunctive or other equitable relief and attorneys' fees. Notwithstanding the foregoing, you and we agree not to seek any attorneys' fees and expert witness costs unless the arbitrator finds that a claim or defense was frivolous or asserted for an improper purpose. You understand that, absent this mandatory arbitration provision, you (and we) would have the right to sue in court and have a jury trial. You (and we) further understand that, in some instances, the costs of arbitration could exceed the costs of litigation and the right to discovery may be more limited in arbitration than in court. If Company or an Online Services-Related Party is the prevailing party in the arbitration, applicable law may allow the arbitrator to award attorneys' fees and costs to that entity. If any clause within these arbitration provisions is found to be illegal or unenforceable, that specific clause will be severed from these arbitration provisions, and the remainder of the arbitration provisions will be given full force and effect. In the event some or all of these arbitration provisions are determined to be unenforceable for any reason, or if a claim, dispute or controversy is brought that is found by a court to be excluded from the scope of these arbitration provisions, you (and we) agree to waive, to the fullest extent allowed by law, any trial by jury. The terms of these arbitration provisions will also apply to any claims asserted by you against any present or future parent or affiliated company of ours to the extent that any such claims arise out of your access to, and/or use of the Online Services, and/or the provision of Content, services, and/or technology on or through the Online Services. described above was unsuccessful. Either party may bring a lawsuit solely for injunctive relief to stop unauthorized use or abuse of the Online Services, or intellectual property infringement (for example, trademark, trade secret, copyright, or patent rights) without first engaging in arbitration or the informal dispute-resolution process described above. For the sake of clarity, the agreement to arbitrate applies only to claims relating to these Terms or the Online Services. It does not apply to claims that may not be arbitrated as a matter of law or, for example, to disputes about your benefits or coverage that do not relate to these Terms or the Online Services. You may only resolve disputes with us on an individual basis, and may not bring a claim as a plaintiff or a class member in a class, consolidated, or representative action. You agree that class arbitrations, class actions, private attorney general actions, and consolidation with other arbitrations aren't allowed. BY AGREEING TO THIS ARBITRATION AGREEMENT, YOU ARE GIVING UP YOUR RIGHT TO GO TO COURT, INCLUDING YOUR RIGHT TO A JURY TRIAL AND TO PARTICIPATE IN A CLASS ACTION. YOU UNDERSTAND THAT BY AGREEING TO THIS ARBITRATION AGREEMENT AND CLASS ACTION WAIVER, YOU MAY ONLY BRING CLAIMS AGAINST COMPANY AND ONLINE SERVICES-RELATED-PARTIES IN AN INDIVIDUAL CAPACITY AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS ACTION OR REPRESENTATIVE PROCEEDING. IF YOU DO NOT AGREE TO ARBITRATION, YOU SHOULD OPT OUT OF THIS ARBITRATION PROVISION PER THE TERMS. OTHERWISE, YOU ARE NOT AUTHORIZED TO USE THE ONLINE SERVICES IN ANY WAY. You agree that the arbitration provision is made pursuant to a transaction involving interstate commerce and shall be governed by the Federal Arbitration Act ("FAA"), and not by any state law concerning arbitration. You otherwise agree that the law of the state of Minnesota governs these Terms and any claim or dispute that you may have against us, without regard to Minnesota's conflict of laws rules. Where the agreement to arbitrate is not applicable to you or your claim, you agree that the only proper jurisdiction and venue for any dispute with the Company, or in any way relating to your use of our Online Services, is in the state and federal courts in the State of Minnesota, U.S. unless otherwise noted in the Additional Terms section of these Terms. You further agree and consent to the exercise of personal jurisdiction in these courts in connection with any dispute involving the Company or its employees, officers, directors, agents and providers. Unless you are a resident of New Jersey, you must initiate any cause of action within one year after the claim has arisen, or you will be barred from pursuing any cause of action. The United Nations Convention on Contracts for the International Sale of Goods shall not apply to these Terms. We may cancel, suspend or block your use of the Online Services and/or registration at any time, without cause and/or without notice. YOU AGREE THAT WE WILL NOT BE LIABLE TO YOU OR ANY OTHER PARTY FOR ANY TERMINATION OF YOUR ACCESS TO THE ONLINE SERVICES IN ACCORDANCE WITH THESE TERMS. Your affirmative act of using the Online Services, or registering for membership, constitutes your electronic signature to these Terms and your consent to enter into agreements with us electronically. To view and retain a copy of this disclosure or any information regarding your agreement to these policies, you will need (i) a device (such as a computer or mobile phone) with a web browser and Internet access and (ii) either a printer or storage space on such device. If a court of competent jurisdiction finds any clause of these Terms to be unenforceable for any reason, that clause of these Terms shall be enforced to the maximum extent permissible so as to effect the intent of the parties, and the remainder of these Terms shall continue in full force and effect. These Terms, and any supplemental terms, policies, rules and guidelines posted on the Online Services, constitute the entire agreement between you and us in connection with the Online Services and supersede all previous written or oral agreements. If any part of these Terms is held invalid or unenforceable as a matter of law, that portion shall be construed in a manner consistent with applicable law to reflect, as nearly as possible, the original intentions of the parties, and the remaining portions shall remain in full force and effect. You acknowledge that we have the right to seek, at your expense, an injunction to stop or prevent a breach of your obligations. The paragraph headings in these Terms, shown in boldface type, are included only to help make these Terms easier to read and have no binding effect. Any delay or failure by us to exercise or enforce any right or provision of these Terms will not constitute a waiver of such right or provision. No waiver by us will have effect unless such waiver is set forth in writing, signed by us; nor will any such waiver of any breach or default constitute a waiver of any subsequent breach or default. or Content; Copyright Infringement - DMCA Notice; Changes to Online Services Content; NO WARRANTIES; LIMITATION OF LIABILITY; Export Controls; Resolving Disputes (including the arbitration and class action waiver); Governing Law and Statute of Limitations; Notice and Agreement to be Bound by Electronic Signature; Severability; Entire Agreement; and Additional Terms. You may not transfer or assign any rights or obligations under this Agreement. The Company may transfer or assign its rights and obligations under this Agreement. With respect to Optum Bank, Inc., the laws of the State of Utah govern these Terms and any cause of action arising under or relating to your use of the Online Service, without reference to its choice-of-law principles. You agree that the only proper jurisdiction and venue for any dispute with the Company, or in any way relating to your use of the Online Service, is in the state and federal courts in the State of Utah, U.S. You further agree and consent to the exercise of personal jurisdiction in these courts in connection with any dispute involving the Company or its employees, officers, directors, agents and providers. If any provision of these Terms is determined to be invalid under any applicable statute or rule of law, such provision is to that extent to be deemed omitted, and the balance of the Agreement shall remain enforceable. Hardware and Software Requirements: In order to access documents related to your Optum Bank HSA electronically, you must have a personal computer or other access device that meets our hardware and software requirements. Termination: Your right to use the Optum HealthSafe ID will terminate, effective immediately upon notice from us: (a) if you fail to comply with any term of these Terms; or (b) in the event of the circumstances described in the subsection entitled "Severability" above. We may terminate your right to use the Optum HealthSafe ID Service at our convenience, for any reason or no reason, effective 30 days after providing you with written notice of our intent to terminate. Upon the termination, you agree to immediately cease all use of the Optum HealthSafe ID. We will not be liable for compensation, indemnity, or damages of any sort as a result of terminating your use of the Optum HealthSafe ID, and such termination will be without prejudice to any other right or remedy we may have, now or in the future. Cost Estimates Are Only Estimates; Factors Considered For Cost Estimates. Cost estimates provided through the Online Services are estimates only and are not a guarantee of the actual cost to you, or payment or benefits from your health plan. The estimates are based on certain factors, potentially including contract rates, fee schedule, and/or claims averages. The average geographic cost estimates are based on average costs for in-network providers within the specific geographic market. If a care path includes anesthesia services, your cost estimate reflects costs based on the use of a network anesthesia provider. Your actual costs may differ if you receive anesthesia services from an out-of-network provider. Please note that other healthcare services may be provided to you that are medically necessary and appropriate as part of procedures for which you may have searched for an estimate, but of which you or your health plan may not be aware at the time of your inquiry and for which you may have additional financial responsibility. No Guarantee on Information Provided. We may use a number of different sources (such as information provided by you, your health insurance carrier, or information we obtain from other data sources available to us) to display information that we believe may be relevant to you or your search query. We can't (and we don't) guarantee that the information you see will be accurate, complete, or up-to-date. No information provided through the Online Services guarantees plan eligibility, coverage, or payment, or determines or guarantees the benefits, limitations or exclusions of your coverage under your health plan. You should refer to your coverage documents and contact your health plan for details concerning your coverage, and you should contact your provider to confirm whether they are in-network. State variations in your health plan may impact the estimates available through the Online Services. Costs Not Covered by Your Plan. You will be responsible for the cost of procedures or services, some of which may be covered in whole or in part or not at all by your health plan. We are not responsible for those costs. You should check with your provider and health plan to determine whether procedures, services, or medication are covered by your health plan. Always seek the advice of a financial advisor when making decisions that may have tax implications. Use of the Online Services in no way increases or decreases the benefits under your health plans or employer's benefit plan. Your coverage documents will control in the event of their inconsistency with the Online Services. Unique Plan Designs Not Currently Fully Supported. Not all plan designs or care are fully supported by the cost estimate tool. Some of the unique plan designs that are not currently fully supported appear below. A future release may better reflect the details of your plan. In the meanwhile, for specific cost estimates, please contact your provider directly or call the number on your health plan ID card, as the estimates in the Online Services may not be a good predictor of your costs. You are in an Optimum Choice, Optimum Choice Preferred, M.D.IPA , or M.D.IPA Preferred plan in the Maryland, Delaware, DC, Virginia and West Virginia area. You have a Tiered Product (e.g. EDGE, Premier, Tiered Benefit Plans) which offers reduced out-of-pocket costs for using specified Physicians as defined in your plan documents. You have a plan with a custom network. You have an additional network benefit plan. You have an Indemnity plan. You have a Navigate Balanced/Navigate Plus plan. You have an Executive Medical plan. You have a Supplemental Medical plan. You may have a UnitedHealthcare supplemental Medicare plan. That supplemental plan is assumed to be your primary medical coverage for this cost estimate. You have a Catalyst/First Dollar plan. You receive care through NowClinic. Your plan may require referrals from your primary care physician for specialty care coverage. Your plan has an Annual Coverage Maximum. Your plan may not pay all costs for all preventive services. Your plan may have different maximum benefit levels, copayments, or deductibles for specific services. Your plan may collect copayments after your out of pocket maximum has been met. Your plan may collect coinsurance before your deductible is met. You are in the Virgin Islands, Puerto Rico, or Upper Michigan. Provider Listings; Rankings, Ratings and Designations Are Only A Guide. The provider search and directory tool is designed to display only healthcare providers who participate in the United Health Group network ("in-network" providers). The results you see may not include all healthcare providers that participate in your health plan, or all providers that are relevant to your input or search query. We update our directory periodically, and your search results might include healthcare providers who recently terminated their participation in our networks. Some providers may have multiple offices, and may be in-network at one location but not others. Similarly, not all providers at listed facilities (hospitals, surgical centers, etc.) are in-network providers. Please check with your provider before scheduling an appointment or receiving services to confirm whether they are in-network. You should not assume that a provider identified as having performed a certain procedure or treated a certain condition is necessarily an expert in that procedure or treatment. In addition to the other considerations referenced in these Terms, you should talk with your chosen provider to understand their qualifications and specialties. We do not endorse or recommend any particular provider; the Online Services simply provide information that might be relevant to you or your search query. We may display comments, reviews and/or ratings of providers or facilities provided by third parties. These rankings, designations, comments, reviews and ratings are for general informational purposes only and reflect the views of the third parties providing them (and not the views of Company or its affiliates). They also have a risk of error, and should not be the sole basis for selecting a healthcare provider. We do not guarantee the accuracy or quality of any such rankings, designations, comments, reviews or ratings, and we are not responsible for them. There are many factors that you should consider when making a choice of healthcare provider. If you already have a healthcare provider, you should consider conferring with that professional for advice on selecting other healthcare providers. The UnitedHealth Premium Designation recognizes healthcare providers that meet guidelines for providing quality care and local market benchmarks for cost efficiency. Click here for more information. Pre-authorizations or referrals may be required for certain health plans and certain healthcare providers. You should refer to your health plan coverage documents and contact your health plan to determine whether these requirements apply to you. Preventive Services. Preventive services may be included in the Online Services. Preventive care coverage may vary by plan and/or by demographic considerations such as age or gender. You should refer to your health plan coverage documents and contact your health plan to determine whether preventive services are covered for you. While cost and quality information may be emphasized on the site, many other factors impact the selection of providers. These may include, for example, established provider relationships, network considerations, primary care referrals, and/or health plan design. The Online Services are intended to provide you with additional information that enables you to make an informed decision about your healthcare. You should weigh all of your options when choosing a healthcare provider. You may also want to interview that provider, review the provider's training, certifications and other credentials, and ask your family and friends for their opinions. Care Paths. The cost estimate tool groups together, into "care paths," one or more services that may be delivered together to address a particular medical problem. The descriptions of different care paths, and the inclusion of particular services in a care path, is not medical advice that any particular care path is the right treatment for you, or that you should not get a service that is not included in a given care path or that is not included in any care path. All of those matters are things that you should decide in consultation with your healthcare professionals. A care path is merely an example of the service(s) that may be ordered to treat a specific condition. Your treatment plan may differ from the displayed care path, so the cost estimates may not be applicable to the treatment recommended by or provided by your healthcare provider. DO NOT AVOID SEEKING OR OBTAINING HEALTH CARE BASED ON THE COST ESTIMATE OR OTHER INFORMATION OBTAINED THROUGH THE ONLINE SERVICES. California Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under California law. Individual facilities or health care providers may disagree with the methodology used to define the cost ranges, the cost data, or quality measures. Many factors may influence cost or quality, including, but not limited to, the cost of uninsured and charity care, the type and severity of procedures, the case mix of a facility, special services such as trauma centers, burn units, medical and other educational programs, research, transplant services, technology, payer mix, and factors affecting individual facilities and health care providers. Connecticut Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Connecticut law. Connecticut residents seeking a cost estimate should contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. Massachusetts Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Massachusetts law. Massachusetts residents seeking a cost estimate for purposes of Massachusetts law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. Minnesota Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Minnesota law. Minnesota residents seeking a cost estimate for purposes of Minnesota law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. New York Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under New York law. New York residents seeking a cost estimate for purposes of New York law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. Oregon Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Oregon law. Oregon residents seeking a cost estimate for purposes of Oregon law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. In the event that any cost estimate you receive differs from the actual cost of the procedure or service, and you would like an explanation or if you have additional questions, please contact the customer or member services phone number on your health plan ID card or on your health plan's website. If you need help with an insurance question or complaint, then you may contact the Consumer Advocacy Unit of the Oregon Department of Consumer and Business-Insurance Division at (888) 877-4894 (toll free), P.O. Box 14480 Salem, OR 97309-0405, website: insurance.oregon.gov, or email: [email protected]. Texas Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Texas law. Texas residents seeking a cost estimate for purposes of Texas law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. Please note that the actual payment and charges for healthcare services or supplies will vary based upon your actual medical condition and other factors associated with performance of medical services. Washington Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Washington law. If you are looking for external patient review sites to provide a rating and/or feedback on your experience with a provider - in addition to those found on our site - please visit the following: Healthgrades.com, Yelp.com, etc. To access information on malpractice history and disciplinary actions for providers, please visit the Washington State Department of Health website and use the Provider Credential Search under Licenses, Permits and Certificates. Wisconsin Residents: Our cost estimate tool is not intended to be and should not be relied upon for purposes of obtaining any cost estimates under Wisconsin law. Wisconsin residents seeking a cost estimate for purposes of Wisconsin law should instead contact the customer or member services phone number listed on your health plan identification (ID) card or on your health plan's website. The following additional terms apply to your access to or use of any mobile application in connection with the Online Services (together with all information and software associated therewith, the "Application" or "Applications") through any device (such as tablets, mobile phones, etc.), and are "Additional Terms" as defined above. We grant you a limited, non-exclusive, revocable, non-transferrable license to download, install and use the Applications solely for your personal, non-commercial use on a mobile or tablet device owned or controlled by you and only in accordance with the Terms. Other than the limited rights granted in the immediately preceding sentence, no other rights are granted to you. This is only a license, and not a sale of, the Applications to you. Additional Restrictions and Notices. You agree you will not remove, disable, circumvent or otherwise create or implement any workaround to any copy protection, rights management or security features in or protecting the Applications. You acknowledge that we may issue an upgraded version of its mobile applications and may automatically upgrade the mobile application that you are using. You consent to such automatic upgrading and agree that these Terms shall govern all such upgrades. Our mobile applications or the Online Services may include third party code and other software, which is governed by the applicable open source or third party end user license agreement, if any, that authorizes the use of such code. You agree to comply with all applicable terms, conditions and agreements between you and any third party that provides products or services that facilitate or enable your use of any mobile applications, and you acknowledge and agree that your use of any Application may result in charges to you by those third parties in connection with the products and services they provide to you (such as data plan charges), and you will be solely responsible for any such charges. Upon any termination of your rights hereunder, for any reason, you will immediately uninstall or delete the Applications and cease any further use of such Applications. Special Notice for International Use/Export Controls. Any technology or software underlying the Online Services that is available in connection with the provision of the Online Services and the transmission of applicable data (collectively, the "Software"), if any, is subject to United States export controls. No Software may be downloaded from the Online Services or otherwise exported or re-exported in violation of U.S. export laws. Downloading or using the Software is at your sole risk. Recognizing the global nature of the Internet, you agree to comply with all local rules and laws regarding your use of the Online Services, including as it concerns online conduct and acceptable content. if the iOS App does not conform to any warranty applying to it, you may notify Apple, which will then refund the purchase price of the iOS App (if any) to you. Subject to that, and to the maximum extent permitted by law, Apple does not give or enter into any warranty, condition or other term in relation to the iOS App and will not be liable to you for any claims, losses, costs or expenses of whatever nature in relation to the iOS App or as a result of you or anyone else using the iOS App or relying on any of its content. with respect to Google-Sourced Software or the Terms; and (vi) you acknowledge and agree that Google is a third-party beneficiary to the Terms as it relates to our Google-Sourced Software. If you have questions regarding these Terms, contact us at 1-800-328-5979. The Effective Date of these Terms is October 28, 2016.
2019-04-20T22:12:57Z
https://www.myuhc.com/member/preLoginLegalLayout.do?psnName=link.nav.footer.legal.prelogin&requestor=/footerPreLogin
Suppose, uncontroversially, that it is morally obligatory to refrain from attempts to impose any particular religion on people by force. Call that obligation 'O'. What is the basis for O? Some argue that the basis for O is a larger set of moral norms one can show, by philosophical reasoning alone, to be obligatory in itself and to logically entail O. But there is more than one version of such an argument. One is deontological and runs roughly like this: (i) Trying to force people to violate their conscience is intrinsically wrong, irrespective of what good might be thought to come of doing so, and thus can never be justified; (ii) trying to force people to adopt a particular religion is tantamount to trying to force them to violate their conscience; (iii) therefore, O. Let us grant that the argument is logically valid and that (ii) is true. Even so, there are two difficulties with (i). One difficulty is that there's no agreement that (i) can be established on purely philosophical grounds without appealing to some sort of religious belief. If (i) itself requires religious support, then a regime upholding religious liberty of the sort described by O entails requiring religious toleration in practice from people who believe that such toleration is immoral—think Muslims and militant non-believers here—and also entails requiring such toleration for religious reasons. It's hard to see how that is compatible with O. The other difficulty is that, among those who believe O requires no religious support, there is no consensus about the philosophical basis for (i). Should religious liberty be made to rest on such a thin reed—especially given the all-too-likely possibility that some people have a culpably malformed conscience? In view of such difficulties, some people prefer to support O in utilitarian terms. One way to do that is to make the common argument that seeking to impose any religion by force "doesn't work," inasmuch as such an attempt can, at most, achieve external conformity rather than genuine conviction. But whether or not that is true, the argument can be made to support O only if it is shown further that imposing external conformity fails to achieve social benefits outweighing the cost of doing so. Since that is precisely what the opponent of O would deny, the most that the "it doesn't work" argument can establish is that the proponents of O disagree with its opponents about what the relevant criteria of social utility are. Such an argument thus begs the question, unless some independent agreement can be reached about the relevant criteria. By far the most common way of seeking such agreement is to argue that, given the very lack of agreement about what the objective basis for O is, society is better off treating O as a working assumption needed for the sake of maintaining civil peace. And given the long peace about religion that has prevailed in the West, that argument seems plausible. But there's a problem nonetheless. It is not only conceivable, but in fact sometimes happens, that civil peace cannot be maintained by premising a regime of religious liberty on O. Have a look at what's going on in countries with significant Muslim populations agitating for the imposition of sharia, at least for themselves. Confronted with such agitation, a regime premised on O for the sake of maintaining civil peace can no longer cite utilitarian reasons for doing so. It must either accede to Muslim demands for the sake of maintaining civil peace, thus imposing a religious double standard that is incompatible with O itself; or it must refuse such demands, in which case civil peace is concretely undermined because the Muslims believe themselves to be the victim of religious intolerance. Accordingly and paradoxically, a utilitarian rationale for adopting O only works if nearly everybody in a given society believes O for their own reasons anyway. When such a consensus breaks down, so does the utilitarian rationale for O. Much the same would go for a society in which it is not the Islamists, but rather militant secularists, who hold sway. As the example of Canada illustrates, a regime theoretically premised on O, but practically controlled by secularists, can easily end up curtailing the public profession of forms of Christianity that secularists and other non-Christians find offensive. In addition to being arguably incompatible with O, such an outcome is consistent with civil peace only so long as such Christians remain sheeplike. But there is no practical guarantee that they will remain sheeplike, and no moral guarantee that they should. In light of all this, it seems clear that the dual challenge of Islamism and militant secularism requires Westerners in general, and Americans in particular, to think more rigorously about what we believe the objective basis for religious liberty to be. So far, I don't see much of that happening. Very interesting post, Michael. I think what you are saying is that there is no content-neutral, secular rationale for O. I wonder if there could be a content-specific rationale for a cousin of O that was nonetheless in some sense secular? For example, suppose that someone argued that we should not try to force people to adopt some one specific religion but that we could legitimately force people to act as if they disbelieved in some specific religion or religions if those specific religions themselves required morally intrinsically wrong acts. Hence, Muslims could legitimately be forced to refrain from trying to beat people up for passing out Christian tracts, because it is morally wrong and a violation of civil order to try to beat people up for passing out Christian tracts. Secularists should be forced to allow statements that homosexuality is immoral, because it is immoral to squelch such statements, because such statements are not only true but also not themselves disruptive of civil order. And so forth. All of this would require _enormous_ amounts of content about what really is wrong and right, content on which, of course, there will be fierce disagreement, and the upshot would be that you shouldn't try to force someone to abandon a religion that doesn't require him to do evil things that the state may legitimately prohibit but may require him to abandon the active practice of a religion that does. But I'm not sure that the adoption of substantive moral content automatically renders such a position religious. But I'm not sure that the adoption of substantive moral content automatically renders such a position religious. Both the Islamist and the militant secularist would argue that it does. I'm not sure how one might refute them, or even whether it would be desirable to do so. I think in Isreal they have made prostelitizing illegal. It just caused to many fights.Is that a violation of O? It violates free speech but it help with civil peace. OK, Isreal is not a model of civil peace but they think it would be worse if groups started trying to convert each other's kids. The other thing I wonder about is how secular you think Canada is. I live here and it does not seem so bad. I am in Alberta and I am sure it is worse in Quebec. Still I think the blog world has a very strange view of my country. My view is any bill of rights needs a creed. The creed can be a lot weaker than any fully functional faith. It would likely need to be based on natural law in some form. But without a creed you have no way to judge religions. So a Moslem who teaches his followers to kill Jews cannot be told his faith is unacceptable without some definition of what is the minimum moral standard for citizenship. My view is any bill of rights needs a creed. The creed can be a lot weaker than any fully functional faith. It would likely need to be based on natural law in some form. But without a creed you have no way to judge religions. Very well then: how do you deal with the difficulties I described in my third paragraph? (Apologies in advance for framing my remarks in non-philisophical language). 2nd As (RL) assumes that as all creeds rely on fidiem, propononts of RL envision a situation where there is no RL which could result in a situation where adherants of a creed (which is demonstrably false) would impose that false creed on people against their will and any challange is crushed on grounds of heresy meaning that people cannot be subjected to infomation which would allow them to break free of the false creed. 3rd Therefore so much depends on moral code of any particluar relgion (dose its moral code mandate forced conversion) that RL is preferable. As my debate with Lydia and Tim McGrew in the "Evidential Ammo" thread indicates, I do not believe that any religion is "demonstrably true" in the sense that anybody who rejects the best arguments for a given religion is demonstrably irrational. But I don't think it follows that all creeds are "fideistic." It might be the case that more than one creed is rationally justifiable without being rationally compelling in the absence of the gift of faith. And I happen to believe that more than one creed--i.e. the Jewish and the Christian--are just that. Remember that Vatican I condemned fideism as much as rationalism. The upshot is that I don't think upholding RL requires fideism. Dignitatis Humanae is a good illustration of how a religious but non-fideistic rationale for RL can be formulated. Indeed, I am inclined to believe that upholding RL ultimately requires some form of ethical monotheism. My doubts arise from my suspicion that a merely philosophical version of ethical monotheism would not be enough to secure that in practice. I'm with you on the first paragraph, (perhaps I phrased myself badly, I'm only a Collage Sophomore) as for Dignitas Humanae I confess as someone who keeps all of the Vatican Two documents at arms length that I've never read it. I highly recommend your reading the documents of Vatican II in toto. There are problems of ambiguity in certain places, which is my chief criticism of them. But they can and ought to be interpreted in an orthodox sense. That's what our Holy Father does. I know this is off-topic and i'll stop after this post, but the ambiguity of the V2 Documents is precisiely why I don't read them even though I'm informed that an orthodox interpritation is possable, this is why unlike many SSPX I don't deny the whole thing, (also as we don't 'officially' have RL in England maintaining good relations with the Anglicans is important). However as both John XXIII and Paul VI said that the council defined no new dogmas it follows that the dogmatic nature of V2 is already contained in both the documents of Vatican 1 (in a much more concise form) and other pre-concillior documents which is why I perfer them. Mike, good post. Lydia, I think you are on the right track, too. I have long maintained that Dignitatis Humanae needs to be read in such a way as to permit the explicit state promotion of the Christian religion - in a state in which nearly everyone is Christian. And to promote monotheism, in a state in which nearly everyone is monotheistic, even though of different stripes. And to make a distinction between legal penalties for not adhering to the true religion (which would be the state imposing sanctions against conscience) and non-participation in social benefits attendant on participating in the true religion. The root problem with the total hands-off approach taken in the last 60 years in our country is that it implies (and indeed teaches) that when you can't publicly prove which of A or B is the most true religion, ALL religions are equally irrational and merely to be tolerated (equally), none promoted whatsoever. The reductio to this is obvious: what about Moloch-worship, including child sacrifice? Even if the arguments between A and B are sufficiently difficult so that the public cannot agree on them, it is easy for the public to see (well, was easy for the public to see 60 years ago, I am not so sure about it now) the firm reasons for not granting to Moloch-worship the status of religion, no matter how "sincere" its devotees claim to be. Of necessity, then, society as a whole and the state as such are invested with the capacity to say X 'religion' is no religion. Even if the state cannot publicly resolve between A and B, it can publicly proscribe children being sacrificed to Moloch. If the state has this much authority, then in principle it must have authority to speak to its citizens about true religion. Even though the true religion cannot be proven definitively by reason alone, certain false religions CAN be proven wrong by reason alone. The modern attitude of the state playing hands-off for ALL religion at root relies on an assumption that all religion is equally in the same class - superstition. An assumption that is itself no better than any religious creed. I’m sure you’ve heard of the late Michael Davies. You should read his books on Vatican II and post-Vatican II. It might be the case that more than one creed is rationally justifiable without being rationally compelling in the absence of the gift of faith. And I happen to believe that more than one creed--i.e. the Jewish and the Christian--are just that. Although the documents of Vatican II can be brushed aside without committing the sin of heresy, I think doing so is a grave mistake all the same. The big four--Lumen Gentium, Dei Verbum, Dignitatis Humanae, and Gaudium et spes--make important contributions to the development of doctrine which are now taken for granted by the ordinary and universal magisterium. As the SSPX's ongoing difficulties with the Vatican indicate, one cannot reject such developments without being in at least de facto schism with the Holy See. Christianity presupposes the truth of the religion revealed and practiced in the Old Testament, i.e. the Jewish religion. Of course it is also clear that most Jews since Christ have failed to see how Christianity fulfills, and thus is compatible with, said religion. ("I have come not to abolish the Torah but to fulfill it.") But that kind of failing is hardly unique to the Jews. Non-Catholic Christians fail to see how distinctively Catholic doctrines are authentic developments of the original deposit of faith. So in general, it would be wrong to say that Judaism and non-Catholic Christianity are rationally unjustifiable. Of such religions, I think Catholics should say that their affirmation of certain truths is rationally justifiable and that their denial of certain others, though not justified, is not demonstrably irrational either. I encountered this very same issue in my work only two days ago. An Episcopal Pastor (?) spoke to a flock (not his own) in central New York about the Doctrine of Discovery. When the Europena powers started colonizing what is now the USA and Canada, the Church leaders developed a policy that prevented all out war amongst competing nations. If France laid claim to land inhabited by Indians, France could claim it in the name of the Christian kingdom and treat the Indians as brutally as France thought they needed to in order to bring about conversion and quell uprisings (Not O). But, if England or Spain laid claim to the same land that France had already claimed, England could not seize the land from the Indians because they had not "discovered" it. Apparently, only virgin conquests carried with them the right to kick the Indians around. Anyway, my Episcopal pastor spoke about how evil the Doctrine of Discovery was and how no nation has ever had the "right" to force Indigenous peoples to buckle under to Christianity by force; that this was a misunderstanding of Christianity. Hence the pop-culture version of O. Regardless of the moral content of this argument, the Doctrine of Discovery was viewed as the law. It was the basis for colonizing and to some extent it still remains the basis for occupation and jurisdiction. Episcopalians are trying to reverse history and declare the law invalid because it was immoral. A cute trick to be sure, especially if Church and State are not supposed to be intertwined in the West. Anyway, I found this post and the ensuing discussion interesting, but it is not a discussion into which I can enter on philosophical points. Just thought I would throw in how "O" is playing itself out in Indigenous populations and pop-culture circles. That entire premise presupposes a religion which does not require its faithful practitioners to violate the basic human rights of others. It illogically assumes that no one will practice something like a revival of Moloch worship or the ancient Aztec religion. Such religions intrinsically cannot be tolerated because their very practice represents a violation of the laws of any normal society. That sounds reasonable, Mike. One consequence of your position, though, is that it is sometimes not only permissible, but obligatory, to force people to violate their conscience. That was the Spanish conquistadores' justification for violently suppressing the ancient Aztec religion. If we're going to proceed that way, however, we'd better be sure of the basis for holding that certain "laws," which you call "the laws of any normal human society," can be known with certainty to bind us. Is that basis merely philosophical, or also religious? We certainly need to maintain a distinction between violently suppressing a human-sacrifice religion and requiring (on pain of unpleasant punishment) its former practitioners to engage in the specifically religious practices of a different religion--e.g., to be baptized. Christian teaching (including Roman Catholic teaching) now is, quite rightly, that this does not engender the worship God requires or desires and that the attempt literally to make Christians by force is, indeed, seriously immoral. Right, Lydia. There is an important practical distinction between forbidding you to do what you think your religion commands (under penalty of law, such as fine or imprisonment), and requiring you to do something a religion you don't believe in commands under penalty of law, and further of not granting you privileges in society when you insist on carrying on with your religion (such as not granting you a professorship as long as you remain a pagan). Unfortunately, because people think that "equality before the law" means that the law must interfere (with legal sanctions such as fines and loss of liberty) when private institutions make discriminating decisions, and because people refuse to attempt to understand where the law leaves off and social inter-relations take up, the practical distinction must rely on philosophical distinctions that have not been widely understood and accepted. Indeed, it is difficult philosophically to set out the principles. It has elements of both. Of course, the question remains whether or not you can convince people of higher truths which are spiritually discerned. I would submit that you cannot, and since human philosophy rests on the human mind, regenerated or not, one must be aware of the distinct limitations of philosophy to communicate a reliable and concrete set of information on these matters to a diverse population. Invariably, the defenders of liberty and morality must be willing to shed blood at some point. You cannot use your own moral persuasion on a completely unregenerated mind committed to evil. At some point, you must put down the pen and take up the sword. Parts of Europe have reached that point now with Islam. Their wide freedom of religion and tolerance has served them well. Whatever basis they built them on now is immaterial to the fact that they are becoming sacred cows and it is fast becoming time to fire up the grill for some steaks and hamburgers if society is to sustain itself there. that this does not engender the worship God requires or desires and that the attempt literally to make Christians by force is, indeed, seriously immoral. Not to mention the fact that it has no bearing on their salvation. Salvation is a gift of God, and as such cannot be forced into someone's hand. It's also instructive that in Luke 9, Jesus rebuked His disciples for attempting to punish a village for rejecting Him. The problem with this is it is impossible. Nature abhors a vacuum. So some faith will fill the void. People are very focused on keeping any promotion of Christianity out of the public. But who keeps sentimentalism out of the public spotlight? Who keep scientific humanism from being endorsed by government? I really doubt whether religious libery is workable. It needs certain basics on which to found a society. Then it needs to stop worrying about catering to the majority. If most families are Christian then let your institutions reflect that. If there are places where there are lots of moslems or hindus then local schools and laws can reflect that. They still need to abide by the basic framework of the nation so you may not teach violence or polygamy or refuse to educate girls. I am not sure there is a way. If a moslem believes that any fellow moslem that wants to become Christian should be put to death then he can't live in a society where religious liberty is valued. He either has to stop teaching that doctrine or he needs to be put in jail. But who wants a government to get into the business of judging which doctrines are acceptable? What are the odds they will target a Catholic doctrine next? But there are doctrines so anti-social that you can't avoid simply ruling them out of bounds. But who wants a government to get into the business of judging which doctrines are acceptable? Well, when we're talking about a doctrine that innocent people have to be murdered, _somebody_ in authority had better judge that "doctrine" unacceptable. The problem is that the moral sensibilities of Western intellectuals are now so severely disordered that they put simply teaching that homosexual acts are immoral on a par with teaching that apostates must be murdered! This is foolish, even from a secular perspective. The parallel, if any, would be teaching that apostasy is immoral! But who wants a government to get into the business of judging which doctrines are acceptable? What are the odds they will target a Catholic doctrine next? But there are doctrines so anti-social that you can't avoid simply ruling them out of bounds. It help would help if we returned to the original system of law enforcement, wherein the public had equal authority with the sheriff to remand people into the custody of the courts in accordance with the laws passed by the legislature. The advantage of that was that the state had to rely on the public's willingness to cooperate with the sheriff and his handful of deputies in order to enforce draconian laws. Under that system, one would find it quite difficult to get many people willing to help the state to attack Catholicism for a reasonable argument that was labeled dangerous. I do not believe that any religion is "demonstrably true" in the sense that anybody who rejects the best arguments for a given religion is demonstrably irrational. If it is not clear that God exists, in the sense that the alternative is irrational/contradictory, then on what grounds can one be held accountable for unbelief in God since one would than have a rational excuse not to believe? It seems that fideism is simply the flip-side of skepticism regarding basic truth. Perhaps "(i)" can be said to violate the nature of a human being as a rationally free being and based on it violating the nature of our being it is therefore naturally and universally evil, regardless of the results it produces or any intuitions regarding its intrinsic-ness. A thomistic argument for O might be that the Catholic faith is beyond reason and requires that God take the first step in giving someone the light of faith (Summa T, q. 1 art. 1). This is not so much an appeal to conscience as to the nature of revelation. To think one could engender the light of faith in another would be to deny the axiom nemo dat quod non habet. Again, if "flesh and blood did not reveal this to you" how much more foolish is it to think that it can be revealed by a sword? This argument can be made "by reason" so far as by reason alone we can at least recognize that there is a contradiction in demanding that someone assent to revelation that is only seen in the light of faith, and one cannot assent to the reality of the Incarnation or the Trinity without this light. Even if, per impossibile, we could come up with an absolutely irrefutable proof for the trinity and Incarnation, the assent to such a proof would not save our souls, since we would not be accepting the truth precisely as revealed but as demonstrated. These are totally distinct modes of knowing. I don't know whether to take this argument for O as "rational" or "revealed". I think it is reasonable to ask people to accept that by reason alone they can see that revelation is at least possible, and where some strong claim to it can be made, it is reasonable to respect it. But if O is compatible with Islam, then Mohammed was a bad Muslim. Outside the claims of Christianity, I don't see much reason why a state can't force some sort of religion on its members, so far as religion is a part of natural justice. The advantage of that was that the state had to rely on the public's willingness to cooperate with the sheriff and his handful of deputies in order to enforce draconian laws. Under that system, one would find it quite difficult to get many people willing to help the state to attack Catholicism for a reasonable argument that was labeled dangerous. The problem is that the government can demonize ideas as well as people. You would not need a majority to help. You would just need to find a committed anti-Catholic group of people. I have no doubt such people could be found. Christianity presupposes the truth of the religion revealed and practiced in the Old Testament, i.e. the Jewish religion. Yes, but Judaism is not the religion revealed and practiced in the Old Testament; and the proof of that is demonstrable. I disagree, but this thread is not the place to debate the question. Some of these religious-rights hypotheticals are less complicated than this discussion would indicate. It seems reasonable to suggest that one of the important functions of government is to protect our safety, and another of government's important functions is to protect our freedom. It's been observed that there is necessarily a trade-off between the two. In theory, this means that where Group A wants the freedom to harm Group B, or the freedom to restrict the freedom of Group B, then "we have an impasse which must be resolved by the government. In practice, many of these situations can be resolved pretty rationally. If Group A wants the freedom to cut off the heads of Group B, and Group B wants the freedom not to have their heads cut off, it's pretty reasonable to believe that a government is best serving its functions when it prevents Group A from beheading Group B's members. If Group A's desire is religiously motivated, this doesn't really require the government to render a judgment about the truth or accuracy of Group A's beliefs. A government can simply degree that involuntary decapitation is illegal, without regard to motivation. It's one reason that "consent" figures as such a key concept in the law, even when it is less significant to many religions. The "freedom to restrict another person's freedom" and the "freedom to harm another person" are often an easily recognizable category of actions that are distinct in nature from "the freedom to live one's life without interference." All of you seem to favor, in one form or another, a deontological argument for O. As it happens, so do I; I agree with James' argument in particular. But the dilemma I posed is this: "If (i) itself requires religious support, then a regime upholding religious liberty of the sort described by O entails requiring religious toleration in practice from people who believe that such toleration is immoral"; and if (i) requires only philosophical support, there is all the same no agreement on how to provide that support. In either case, the argument for (i) serves only to justify coercing people who do not share the argument's premises. In most other contexts, that is not a special problem; after all, the rule of law in general would be impossible if it did not require coercing people who happen to disagree with the law. But in this context, there is a special problem. It's all very well to distinguish, as we must, between trying to force people to adopt a particular religion and preventing them, in some circumstances, from doing what their religion calls for them to do, so that the latter is seen as permissible and the former impermissible. But there is no way to apply that distinction non-arbitrarily without relying on premises from which it follows that at least some religions are false in at least some respects. Thus, as Lydia and Tony recognize, the state cannot avoid making alethic distinctions between religious ideas. The question then becomes whether the making of those distinctions requires, or does not require, premising that certain other distinctively religious ideas are true. If we say the former, then coercion based on such premises involves requiring dissenters to act as if certain religious ideas they reject are true. That seems incompatible with O. If we say the latter, then we are endeavoring to justify coercing those people on a philosophical basis that not even its proponents agree on how to provide. That seems insufficient as a justification for coercion of any sort in a bedrock matter of conscience. The upshot is this: Once we grant that "there is no content-neutral, secular rationale for O," those who uphold O for deontological reasons need to reach some agreement on how to do so which avoids violating O and yet is rationally compelling. There seems to be no religious rationale for O that is fully compatible with O; and there seems to be no secular rationale for O that can command general assent. I don't see that it requires religious support to assent to the claim that if something is beyond reason (and neither contrary to it nor concluded from it) that law cannot demand assent to it or denial of it. Law extends as far as reason does. The voice of law, which cannot speak without force, must be silent before whatever goes beyond reason- and this silence is ipso facto a freedom from the coercion of law. But the argument you are making is broader than what is revealed-beyond-reason, since "religion" includes much more than this. For my own part, I think public worship, adoration, and thanksgiving of God as the author of nature is natural and reasonable, and that there would be no contradiction in a state mandating that every citizen- even Christians- must publically worship the first mover, cause, necessary being, highest good, author of nature. Such a law would force secularists too. I don't see this as demanding "religious" support as religion is presently understood (sc. sectarian and/or revealed dogmas). But what if group A was just teaching that beheading memeber of group B was OK. Some members of group A were then acting on this teaching and beheading some members of group B. But it was difficult to identify which member of group A were actually doing the beheading because many members of group A were not cooperating with the police thinking this should no be a crime anyway. So you end up with doctrine that matters. People die because of it. Freedom of religion makes the assumption that doctrine does not matter. That basic respect for human dignity will not be what is at issue. It assumes they are fighting over the papacy or baptism or some such thing. That was the case when the constitution was written. But it isn't anymore. The problem with the very question at hand is that "religious liberty" as a concept is, at a fundamental level, incoherent, which should not surprise us because its current formulation, which we label as "O," is a product of the Enlightenment. As such a product, "O" both presupposes and ignores a pre-existing moral-religious foundation-context and assumes certain impossible divisions between "religion" and "acts flowing from religion" as if there is any way to justify what is, at root, a public/private or material/spiritual or body/mind or doctrine/ethics division. Religions, therefore, that deny such a division such as Islam and, in a different way, non-Gnostic orthodox Christianity, are fundamentally incompatible with modernity's conception of "religious liberty" as commonly understood. In fact, this is exactly why Locke himself denied the possibility that atheists could be good citizens, and in fact was highly suspicious of Catholics. In his own misgivings, he betrayed an acknowledgment of the incoherence of this religion/secular division on which "O" is grounded, a division that denies that Christianity is a holistic way of life that not only includes "religion," i.e. doctrine, but the practices, institutions, artifacts and other cultural aspects that are grounded in the Lordship of Christ over all things as Creator and Redeemer. Really. At some level, I think everyone who is a regular at this site knows this. John Locke himself understood this, that "religious liberty" only applies to religions within a bounded set. In Locke's time, he limited religious liberty to Protestant Christian sects. It is impossible that some such exclusionary boundary should not exist; indeed, modernity and each of us who have absorbed more or less modernity from culture, try to do philosophical contortions to try to rescue such a conception of religious liberty because our entire political regime in the United States of America happens to rest on it. But it is deeply flawed because it presupposes Enlightenment divisions of public/private, "rational"/"irrational," pure subjective/pure objective, etc. etc. and attempts to make the Christian religion fit into that paradigm. This vision could only successfully sustain society for as long as certain public cultural ideas, practices and institutions from pre-modern Christendom (e.g. marriage); unfortunately for the U.S., this vast cultural inheritance of truth, goodness and beauty is more or less used up, and our modern institutions actively prevent its replenishment through the annihilation of tradition, which is the annihilation of culture and of knowledge itself. I think we Christians living in modernity need to be clear about this and not entertain the notion that "religious liberty" is at all coherent or sustainable. Neither is the division between doctrine and ethics (as if theology is ever impractical) which I see some trying to maintain. The question ought not to be whether some Enlightenment ideal of "religious liberty" ought to be maintained, but precisely what religioethical differences ought to be tolerated and which ought not to be tolerated because 1) human knowledge is not comprehensive, and on a similar note 2) sanctification is not complete and all human beings on Earth are fallible. RE: my last paragraph on the grounds of limited toleration, both 1) and 2) are specifically Christian ideas rooted in faith-reason. "Reason alone," "faith/reason," "naked reason," "purely rational," these are all Enlightenment dualism fallacies. Anyone who uses these phrases are evidencing the grip of modernity, if they are not speaking to the natives. They have been or have gone, to that extent, native. Also, in case I was unclear, I am not at all a fan of John Locke and my thoughts are not Lockean. I only cited him to display in his own words the incoherence of his own position as an advocate for "O." I think public worship, adoration, and thanksgiving of God as the author of nature is natural and reasonable, and that there would be no contradiction in a state mandating that every citizen- even Christians- must publically worship the first mover, cause, necessary being, highest good, author of nature. Such a law would force secularists too. I don't see this as demanding "religious" support as religion is presently understood (sc. sectarian and/or revealed dogmas). Spoken like a good Thomist. Problem is, the distinction between natural and revealed religion is no longer generally accepted and understood, and would itself be regarded as one which is peculiar to a relatively small minority of people. Dissenters from your civic religion would accordingly appeal to some deontological ethic according to which requiring worship of the god of natural theology would violate a right that can be known to obtain without postulating any divine lawgiver. What would you say to them? I'm inclined to agree with you that the American experiment in religious liberty is premised on an ideal that "both presupposes and ignores" an essentially religious cultural base. Some of the Founding Fathers thought the same, or what amounts to the same. But I think you're overstating your case. Religions, therefore, that deny such a division such as Islam and, in a different way, non-Gnostic orthodox Christianity, are fundamentally incompatible with modernity's conception of "religious liberty" as commonly understood. I agree with you about Islam, but I don't understand your argument to the same effect about "non-Gnostic orthodox Christianity." What about "render unto Caesar" and all that? Where, for that matter, do you think the logic of Dignitatis Humanae breaks down? The question ought not to be whether some Enlightenment ideal of "religious liberty" ought to be maintained, but precisely what religio-ethical differences ought to be tolerated and which ought not to be tolerated. Given the case of both Islam and militant secularism, I agree that the question ought to be framed as you frame it there. But what I've been trying to get people to do is discuss how to answer the question without ending up rejecting O. I've been trying to do that because I'm not sure whether O requires a specifically religious justification as distinct from a purely philosophical one. I don't see anybody attempting the latter, and I suspect that a specifically religious justification for O might well end up licensing a regime that is incompatible with O. Tentatively, I think it's a simple matter of logic that the scope of O must be limited to people whose religions are compatible with it. BTW, I like you link to that Front Porch Republic article. Polanyi is a very important yet neglected thinker. Suppose, uncontroversially, that it is morally obligatory to refrain from attempts to impose any particular religion on people by force. Call that obligation 'O'. Can I suggest that 0 is improperly stated, that it is not well-defined (in the set-theory parlance). (1) It is one thing to force someone to accept a whole religion, hook, line, and sinker, as if their very consciences in toto were (if that were possible) to be submitted to force. (2) It is (at least potentially) another thing to force them to do one specific act that a foreign religion requires, which is not compatible with their religion. (3) It is a third to require them to do something which they themselves do not feel bound to observe religiously. (4) It is a fourth thing to force someone to refrain from acts which their religion suggests but does not mandate. Any one of these are some sort of "forcing" them to accept another religion, but not all in quite the same moral nor political sense. Therefore, it is not a foregone conclusion that all four fall afoul of 0 equally or in the same way. It is my understanding of medieval teaching on the subject that, contrary to 0 as stated above (taking it in its strong sense), it IS correct for the state to enjoin (3) and (4) at times, at a minimum, but also (2) in some instances. The classic example is to force pagans to refrain from publicly teaching their false religion - the theory being that they can continue to hold paganism within their own hearts, but to publicly teach it is a violation of public order. This theory rested at least in part on the principle that certain religious ideas, and therefore certain religions, were capable of direct rational disproof. There can be no valid obligation in principle to teach something that can be, and is, publicly disproven. [Our modern society culturally denies that principle, though not by reason of believing that they can prove it is defective in logic and reasoning. It is merely assumed defective as unnatural to the "American ideal" of freedom of religion and 'respect' for everyone's opinion, however irrational.] Anyway, Dignitatis Humanae supports the notion that at least in some instances, public teaching of a religion is in fact an infringement of the hearer's rights. The easiest example is that of "teaching" X religion is wrong because 'they claim A and B, and we all know A and B are stupid'. Like some Protestants teaching that Catholics doctrine is that the Pope cannot ever err. (Fortunately, many Protestants do not use such tactics.) Now some of the Protestants who taught this did so because they really believed it, but the FIRST ones who taught it either did NOT believe it, or they believed it on insufficient evidence and they should have done their homework and they refused to do so - failures toward the duty to truth, and as a result they abused their right to speak publicly on the matter. But their are other forms of violation of the hearers rights to proselytize: such as teaching children against their parent's religion, and against the parent's explicit request. It is natural for children to accept the authority of their parents, and teaching them contrary to their parents' religion disrupts that natural bond. Similarly, then, it can be a violation of public justice to use theological arguments on simple folk that they are unequipped to deal with the level of sophistication (although this is a far more delicate thing to claim as justification for suppressing public teaching of a religion). Dignitatis Humanae also stands for the proposition that people have an obligation to form their conscience properly - insofar as that is available. Consequently, a refusal of a non-Christian in a Christian country to be open to following a law respecting some Christian practice primarily on account of an unwillingness to listen to anyone propose (respectfully) reasons why Christianity is right - especially because he knows that if he accepts Christianity as true he would have to undertake unpleasant life changes - seems to violate the objective obligation to form one's conscience well. The need for the law to "respect" the conscience of such a person is not an entirely straightforward proposition. I think that in practice, any hope of relying on all of these notions, successfully, presume and depend on the existence of a public receptive to notions of freedom and of public order, a receptivity that may be common to Christian nations but may not be so common elsewhere. But in any case it is not logically self-contradicting for a state to root its religious freedom stance on a modified 0 that hangs its hat on the principle that while not all truth about religion can be proven with reason and without appeals to revelation, some of it can, and within certain limits the state has a role in support of those truths (both positive and negative, both in helping to form consciences and to to promote true religious practices, and to restrict the abuses of freedom which harm public order). Now, the problem: It can be difficult to decide whether a law falls under (1) or (2) or (3). Suppose a state that is 100% Christian, say Anglican, has a law that everyone must go to church on Sunday. And they have a visitor from Bungawa, who is anti-Anglican. Many people would say "well, going to church doesn't mean you are worshiping God as an Anglican - you could just be an observer. So the law does not force you to do something contrary to your own religion." But that's the Anglicans talking. The visitor says that he feels even stepping within the church makes him impure and violates his religion directly. I think Dignitatis Humanae would say that unless his violating the law damages the public order, the law cannot require this, but (a) if the violating the law DOES damage public order significantly, and (b) a just effort to reform the visitor's conscience does not convince him that it is moral to submit to the law because he unreasonably refuses to accept the fair and true reasons, then the law CAN JUSTLY override his right follow his conscience on the matter. That's my take on it. I could be wrong. This approach means that the law can and should prohibit child-sacrifice to Moloch, and therefore 0 in its strong and pristine form simply is not appropriate. Only a weaker form should be maintained. And its weaker form does not depend on a strictly religious foundation. I've been trying to do that because I'm not sure whether O requires a specifically religious justification as distinct from a purely philosophical one. I don't see anybody attempting the latter, and I suspect that a specifically religious justification for O might well end up licensing a regime that is incompatible with O. Would an argument from Natural Religion/General Revelation (as opposed to revealed religion) be equivalent with "a purely philosophical" justification? If not, what would be the distinction? Mark: See my reply to James Chastek a few comments above. Thanks for trying to address the dilemma. Your strategy appears to be consider various formulations of O, and settle on a "weaker form" that requires no "strictly religious foundation." But it's still not clear to me exactly what that foundation is. It appears to be deontological, having something to do with balancing the rights of conscience with the need to maintain public order and protect "natural" bonds. But I'm not clear on what you think the boundaries of the right of conscience are, or why. Mike, I have not thought through all the steps in perfect clarity, though I have been pondering this since studying Dignitatis Humanae about 15 years ago. So I may be a bit muddled here. I would suggest that the resolution that we need to find is not essentially to be understood as a trade off between the rights of the state and the rights of conscience. The instances of tension arise in part because of a failure, either on the part of the individual to be formed properly in their conscience, or on the part of the state to appropriately make the case rationally for why a certain requirement is to be obligatory. Dignitatis Humanae repeatedly insists that true religion has been given sufficient evidential signs and supports from God to persuade the reasonable person of the reasonableness of it as a religion. This leads one to the conclusion that the people who have refused to admit its reasonableness either (a) have never had the case made to them properly - surely a failure on the part of any Christian society, or (b) are incapable of grasping the reasoning because their mind and will have been damaged through poor training, or (c) they won't accept the evidence out of ill will. Only (b) appears to pose any problem for the state as far as "rights of conscience." If a person is in category (a) and rejects a law, the state and society simply have an obligation to justify the law through proper formation of their conscience. End of tension. If the person is in category (c) and rejects the law, they are unjust in claiming a right to follow their conscience because they are refusing to inform their conscience properly. The state has no need to accede to such an unjust claim. Back to (b). In a sense (and I am uncertain how far to push this analogy) a person in this state is similar to an insane person. Or, perhaps we ought to understand their condition as a type of insanity - religious insanity. We all know that just because an insane person really believes that their blank piece of paper is a plane ticket does not mean the airline is obliged to let them on the plane. But why not? Because the insane person is objectively disordered in their apprehension. (The fact that the airline cannot prove it to the insane person's satisfaction is not the same as saying the airline cannot prove it.) It would be odd if we accept this notion in all walks of ordinary social life except that of obeying laws that touch on religious practices. If a person is insane about one matter but rational generally, at a deeper level he himself would prefer that his friends and the community protect him from his irrational thinking by refusing to allow him to jump out of a tall building because "I can fly". I say "if public need requires", because of the principle of subidiarity. This principle respects that each individual man, in receiving free will from God, has been made his own master except insofar as he impinges on the social order and the common good. So if he religiously believes that pi is 4, the state must leave him alone in that belief (unless perchance he is a civil engineer building a bridge). The mere fact that he is objectively wrong does not give the state a role in forcing him to defy that belief. It is only by reason of his being ordered within a social community, with a common good, that his self-mastery is limited by the needs of others. While there is naturally a practical difficulty in carrying out the specifics of establishing the reasonableness of a law impinging on someone's religious practice, this is to be expected in our fallen state. No program that respects conscience and subsidiarity, and relies on showing to the public the reasonableness of a law, can be free of practical difficulties. Which provides yet another reason to ensure that we have men of true wisdom and sound religious belief in legislatures and the courts. But it is not a reason to refrain from restraining men who violate a law out of mistaken "religious belief". That seems to be a problem of execution, and not of principle. Any law may be difficult to enforce when segments of the population choose not to abide by it, regardless of their reasons for doing so. So, religious motivation need not be treated legally as a special, separate factor from "I just don't want to do _____." Isn't the current status quo that religions are prohibited from doing certain things that are illegal for the entire population? Certainly, US law maintains that there is no religious exemption that allows for human sacrifice, for example. Where we currently have bad law in this country are the areas where courts have carved out special exemptions based on religious dogma. For example, the U.S. Supreme Court has ruled that followers of the Union of the Vegetable, a branch of a Brazilian religion, may use a psychedelic tea called Ayahuasca as part of their religious ceremonies. That is a sort of violation of the principle of O; one ought not be required to believe a particular religion in order to engage in an activity. Either ayahuasca is so dangerous that it can be banned without regard to religious beliefs, or its use should be legal for all citizens of the land. One ought not have to pass a "religious test" in order for an activity to be legal. Since ayahuasca clearly does not fit into the same category of chopping-off-infidel's-heads, it should be universally legal. I believe orthodox Christianity is incompatible with the modern notion of religious freedom commonly understood, i.e. "O," because "O" presupposes that Christianity will not have public consequences because it defines religion as irrational private belief "beyond reason" and makes the secular State the authoritative judge of the proper bounds of Christian life. When Jesus said "render unto Caesar what belongs to Caeser," he did not assume that Caesar gets to define "what belongs to Caesar." The Church defines it. But modernity not only disagree with the Church about "what belongs to Caesar," but it denies the Church's authority to make the determination. According to modernity, Caesar rightly decides what is religious freedom, and this idea has consequences. The logic of supporting "religious freedom" as modernity understands it breaks down with the phrase "within due limits." Who determines what these due limits are? The Church or Caesar? What happens to "religious freedom" when they disagree? This is not an abstract point that will never be relevant. WWWW quite recently had an article about a Kansas abortionist who got shot while attending a Lutheran church. He saw in his abortion practice a proper service to God deriving from his religious compassion for the suffering. There are indissoluble dies between "religion" and ethics that has resulted in tensions throughout U.S. history between religious freedom and state legal requirements which could never resolve the tensions because they are inherent to the incoherency of modernity's attempt to separate religion and public ethics (among other things). Historically, Americans been able to chug along with relative peace despite the tension because we in the West share a cultural inheritance from centuries of Christendom that protects us from cases that might push the tensions to breaking point where Dignitatis Humanae's appeal to "within due limits" will not be sufficient for peace. I think we moderns have been socialized into denying the importance of this inheritance (not to mention the faith-reason religious foundation of it), but it seems to many observers that the common culture we've taken for granted has been undermined over the centuries by modernity's economic form of capitalism and political form of democratic liberalism which have together served as an anti-culture severing parents from children, man from wife, producer from consumer, Christian from the Church, individual from community, man from the rest of creation, faith from reason, humanity from the reality of God's sovereignty, etc., and the consequences of the modern rejection of God's significance in the public sphere are becomingly increasingly evident. The right to religious freedom is exercised in human society: hence its exercise is subject to certain regulatory norms. In the use of all freedoms the moral principle of personal and social responsibility is to be observed. In the exercise of their rights, individual men and social groups are bound by the moral law to have respect both for the rights of others and for their own duties toward others and for the common welfare of all. Men are to deal with their fellows in justice and civility. Furthermore, society has the right to defend itself against possible abuses committed on the pretext of freedom of religion. It is the special duty of government to provide this protection. However, government is not to act in an arbitrary fashion or in an unfair spirit of partisanship. Its action is to be controlled by juridical norms which are in conformity with the objective moral order. These norms arise out of the need for the effective safeguard of the rights of all citizens and for the peaceful settlement of conflicts of rights, also out of the need for an adequate care of genuine public peace, which comes about when men live together in good order and in true justice, and finally out of the need for a proper guardianship of public morality. True justice, good order, civility, rights--all these, because of the unity of truth, rest on religious foundations when you get deep enough. Usually, we do not have to go that far, but increasingly the Church will have to go far because "reason alone" is impossible and insufficient, and I do not believe that the Church can do so if it holds to "O." I think if we do want to hold to a notion of "religious freedom," we must redefine it in ways that may be radical to moderns. But eventually some confrontation with the substantive flaws of "O" must happen, and sometimes I wonder if modern Christians are aware of these flaws when they advocate for "religious freedom." Again, I'm not confident a "purely philosophical" argument exists this side of Colossians 1:15-23, though you might be referring to "an argument that does not explicitly appeal to 'religious' language but to deracinated notions of 'the Good' that we may, for a while longer at least, share." I think such a "purely philosophical" approach that appeals to "reason alone" is rarely attempted because people have a gut sense of the thought implicit in the title of Alasdair MacIntyre's book "Whose Justice? Whose Rationality?" That said, a specifically religious justification for some kind of state-enforced religious freedom would not necessarily license a regime opposed to any kind of religious freedom (depending on what constitutes religious freedom) if the religion were Christianity. The reason I think so is that Christianity forbids the State from attempting to coerce inward conformity, though outward conformity is legitimate, since God is responsible for "the circumcision of the heart" that allows recognition and acceptance of the faith-reason truth of the gospel. One doesn't have to like saluting the flag as a measure of proper respect for authority, but we have to do it. And I do not think the inward-outward distinction is a kind of modern dualism, because the distinction recognizes the unity of the body-soul in that the inner life ought to be conformed to the outer life by grace, unlike Gnostic moderns that believe the inner life is essentially separate from the outer life as in "the body is not important, mere instrumental property" or "the soul is morally sovereign." Obviously, this last point is not very well developed, but I think this is generally the direction that we need to go, and it presupposes both the proper place of the God and his Church and the holistic life character of true religion, the denial of which are two main destructive errors of modernity.
2019-04-26T01:40:58Z
http://whatswrongwiththeworld.net/2009/07/religious_liberty_a_dilemma_1.html
What is hyperlexia? Come take a closer (and more personal) look at the hyperlexia diagnosis. My son has hyperlexia and hypernumeracy. You've likely never heard of those. Either did I until November 6, 2014. But, like me, you have probably broken down those words into pieces and figured out their meanings accordingly. So I took the first logical step when given an unfamiliar diganosis: I googled it. Here I am, after months of wait lists, with some unfamiliar diagnoses, typing those two words into Google only to hit another roadblock. There is practically nothing - yes, nothing - for me to read on the topic beyond the basic definition. Especially on the topic of hypernumeracy (there are currently 63 search results in Google on this particular topic). How disappointing is that? I've quietly struggled for years trying to understand my child’s extreme fascination with letters and numbers, his irrational outbursts, and lack of conversation. And then I am finally given a diagnosis (okay, more like multiple), but end up feeling just as lost as always. The psychologist basically handed me a piece of paper and said, “See you in three years. A full report will be mailed to you shortly.” So between that and the lack of results via Google, I am disappointed in the information on hyperlexia and hypernumeracy that is available to parents like me. Less than two weeks later, I found myself at a meeting for parents at Autism Services. At this meeting, each parent shared their name and a little bit about their child who is either on the spectrum or is waiting to be assessed for autism. I mentioned hyperlexia and hypernumeracy, as I feel it’s important to share these details. I’m glad that I did because after the meeting, a gentleman who was sitting behind me approached me to discuss hyperlexia. Like me, he had never heard the term before. He was interested in reading more about it because his son had been intensely obsessed with numbers. This chance meeting was a light bulb moment for me. I knew that I had to write about hyperlexia. I had to write about it not only as a way to help me understand it myself, but to also hopefully connect with other parents dealing with hyperlexia and/or hypernumeracy. My hope is that I can create a great resource for parents just like me, trying to navigate the crazy, wonderful world of hyperlexia and/or hypernumeracy. Basically, my son started reading and spelling words before he turned two. It was all self-taught. Yet, he cannot carry on a conversation, answers questions with inappropriate answers, and sometimes appears as if he didn't hear me ask a question at all. I realize (and willingly admit) that I do not know enough about what hyperlexia is. And honestly, I don’t think a definition does it justice. Yet, I realize many of you won't know what it is so I highly suggest reading this hyperlexia pamphlet for more information. So although I cannot define hyperlexia confidently and still don’t really know what it’s about (but I'm learning!), I have been living, breathing, and experiencing hyperlexia for five years. That is what I’m going to share with you. I’m going to show you what hyperlexia and hypernumeracy look like. Watching movies in their entirety, including the credits, because the credits are filled with letters. Naming the movie that you want to watch by the length of the video playback instead of its title. Yes, calling a movie 1:26:32 instead of its proper title. And yes, he was always that precise. Walking around the block when you're just 1.5 years old and looking at license plates. Not just looking, but tracing your fingers along every single letter and number on the license plate. Not just one car either. Every single car you walk past. Turning any kind of loose part into letters and numbers. See here, here, here, here, here, here, here, and especially here. Reading and spelling difficult words at an early age. And doing it correctly. Never having a letter reversal stage when learning to write. Spelling words correctly, even if you've just turned two. Learning to spell in another language when you don't speak another language and haven't been taught it. Never having cute kid-invented spelling when learning to spell and write. Flipping through every single page in a book before being able to move on to a new task. Flipping through a new book to find out how many pages there are, browse the table of contents, and peruse the index. Then referring to those books by the number of pages instead of its title. When asked to draw a picture of a big cat, writing the words "Big Cat" instead. Going for a walk, passing under street lights, only to have your child say that's #10 or that's #12 because, believe it or not, if you look up at that street light, you will find a number. It's not a particularly large number, but he's spotted it. Having meltdowns because the clock in the kitchen says 11:20 and the clock on the thermostat says 11:22 and the clock on the microwave says 11:23. Covering all the digital clocks in the house for months because, no matter how hard you try, you can never get the darn clocks to stay in sync and show the exact same time on each one (see above point). Writing the words "My Duck" with magnets after fighting over a toy duck with your younger sibling. Your age at the time: 3 years, 1.5 months. Your brother's age: 14 months. Too bad your brother's not old enough to read! Taking a blank notebook, writing the page numbers for each page in the book, and then writing "The End" on the very last page. Doing math well beyond your age. Asking the pscyhologist if she loves fractions and you just turned five. Making an entire clock using plain wooden blocks. Skip counting by obscure numbers, like the number 12, at age four. Asking him, "How many times do I have to tell you that?" and he responds with a precise, "291 times." Well played, my son. Well played. And to give you the full effect, I made a video! Hyperlexia and hypernumeracy are both extremely fascinating. Some of the things that J does absolutely blows me away and oftentimes, I don't take a photo or write down what he does. I want to consciously take more photos of what he does and keep a better written record of things he says. To do so, I will be sharing photos of his hyperlexia and hypernumeracy on social media using the hashtag #thisishyperlexia. If your child has hyperlexia, then please join in on the fun. Tag your photos on Instagram with #thisishyperlexia. I would love to see them! Or if you're simply fascinated in learning and seeing more, then be sure to follow #thisishyperlexia for photos, as well as useful hyperlexia resources and articles (see #thisishyperlexia on Twitter). Wow. That's crazy. I've never heard of this before, and I'm pretty sure that I don't know anyone who's kid struggles with this, but I pinned to my homeschool board. Thanks so much for sharing this info! It is crazy, but so fascinating! Thanks for pinning, Raia! There isn't much in that section yet. I was just setting it up in preparation for this post and all that I plan on writing about it. And thank you. He is truly an incredible little person. I'm so proud of him! So anxious to read more! He's such a special guy! He truly is. Thank you for your support, Devany! My goodness, this is fascinating! I will be sharing this so you can reach your goal. As you said, as rare as it is, I'm sure another parent or teacher would love the first hand information. You may be starting your own online community soon. That's my hope! I do want to connect with other parents and hopefully reach new parents who may be experiencing hyperlexia and not even know it yet. What an amazing and succinct explanation for a diagnosis that I'm sure many of us have never heard of before, or did not completely understand. As i read your post, I kept thinking, "What a lucky little boy, to have this woman as his mom! " All the best to you! Thank you so much for your wonderful comment! You have no idea how much your kind words mean to me. I appreciate you taking the time to comment. I agree with LB's mom. J is lucky to have you for his mama. Many parents forget to see the awesomeness that comes to the top and focus on hardships. Thank you so much for sharing your story. It will truly help so many families! I found you through Pinterest. First of all, HUGS. Secondly, are you on Facebook? There is a group called the Hyperlexia Parents Network and it's a really great resource and place of support, especially including ASD. Things you'd never think of at this point including dealing with the school system and IEPs and things to ask/do, etc. Great stuff, but we felt a little bit disconnected from the other stories being shared. I kept looking and found a Type III board as well and instantly felt at home, so I follow both. Just wanted to share with you...no matter what your need, there's probably a FB group for it. Check it out. Hope to see you on there, and Godspeed on your journey! Yes, I am a (quiet) member of the Hyperlexia Parents Network. I mostly just read and follow, but it is a great group and was the first resource that I found after my son's diagnosis. I joined the Type III group too to check it out. Thank you for the suggestions! I have a son with hyperlexia who's 24 now. When we was diagnosed at age 4, we were put in touch with a group of parents in the Chicago area. They had founded American Hyperlexia Association to try to get the word out. I became president for two years, my ex-husband made a website. That was when the web was in its infancy! We just couldn't keep the organization going. We were all volunteers with special-needs kids. I still have some of the newsletters with what was great information at the time. We had a couple of conferences. I'm surprised and sad that 20 years later there's not more information available. If I can help, let me know. And it really is sad how there isn't much available to parents and educators. I think what makes me the most upset is that I never stumbled across the term when searching google about things my son could do. That's just not right. And I imagine there are many other parents that are in the same shoes as us, perplexed by their child's abilities and unaware that hyperlexia existed! Thank you for all of your information. I have been searching to put puzzle pieces together for 3 of my sons who have Tourette Syndrome. I was stunned to see that this could be a disorder associated with Tourette Syndrome. It was like snapping puzzle pieces together for my 2nd son who has TS but also have issues with oral fluency, oral comprehension, and conversations. It will be great information to take to the Neuropsychologist, and see if it will be a fit to help us know what to do. I am also a Special Ed teacher, and this is fascinating to me for many levels. I am grateful to put this information in my pocket to use for students and identifying ways to assist them. Thank you for sharing your information and research. This is really interesting. I have a degree in maths and teaching, been teaching for 18 years with children aged 5 to 11, and have still never heard of it. Don't worry, you're not alone! My son's teacher has been teaching for a long time too and had never heard of it either. Obviously, we need to raise awareness for hyperlexia! If you haven't, try turning on subtitles for DVDs and Netflix (use the hearing impaired ones not the english-as-foreign-language ones so they match the audio track exactly). I think that was very helpful for my son. I will definitely check out your list of resources! Thank you! And yes, we do a lot of subtitles. Funny you mention the subtitles on Netflix. I now have to remember that some shows have bad words that show up on the subtitles and of course my three year old being the self taught phonics king can pronounce them perfectly and has done just that to my horror. This means no more shows/movies, even with the volume off, that are possible F bombers. Wow! My son has always had a fascination for letters, but nothing quite like this! It sounds as if you have an amazing little boy there! I know your posts will help others in the future! I have heard the term hyperlexia but not hypernumeracy. Although now, looking back, I recognize at least two children with whom I have worked in the past (I used to work with children on the autism spectrum) that seem to fit the diagnosis for one or both. I worked with a 3-year-old two years ago who was fascinated by numbers and counting and could do addition and subtraction well beyond his years. It is fascinating how differently our brains can work! Thanks for sharing, stopping by from Sharefest. It is fascinating to see how we are all wired so differently, I agree. Yeah, that's my son. Tonight at supper he was doing subtraction with fractions. He's five! Thank you for this article. Your son sounds amazing. My son is 29 months and I'm positive hyperlexic. His play therapist says she thinks he is as well. He has been obsessed with license plates and counting since 18 months and developed letter skills closer to 2 years old. He can spell, identify from spelling or read up to 25 words and even if he can't spell something, he can give me the first few letters of a word from sounding it out. I hazard a guess that he doesn't know what most of the words he uses actually mean but It's been a delightful and strange red flag as we pursue an autism evaluation. I love how happy numbers and letters make him. Thanks for the resources and I am looking forward to following you. Sounds like you have an amazing little guy on your hands too! And you're lucky to have heard the term hyperlexia so early. I so wish I knew that it existed back when my son was around age two. It would have helped in so many ways! I wish you luck on your autism evaluation journey. A friend directed me here. My daughter has both hyperlexia and hypernumeracy; as well as aspergers, spd, and a pragmatic language delay. She is 8 now, diagnosed several years back. I have found it extends beyond letters and numbers and is more symbol based (at least in her experience.) She now studies Chinese and excels in music. Anyway, I will tag some photos on IG and follow you there. She is older now and has come so far. I remember reading the book "Reading too soon" by Susan Martin's Miller when she first received the diagnosis and it was a little helpful. Other than that...not a lot of info there. Anyway, I look forward to following you and chiming in with what I know where I can and learning from you as well. I'm still learning about hyperlexia too, but I don't think it's something they outgrow. I could be wrong. And I guess time will tell with my son. As for your second question, it's usually diagnosed hand-in-hand with autism, but it can occur without too. If you go to my hyperlexia resources page (link at the top of the blog), there is an article by Dr. Darold Treffert that talks about the three subtypes of hyperlexia. That should help answer any additional questions that you may have. And thank you! He is definitely an incredible little person! From my own reading (as I suspect my almost-3-year-old is hyperlexic; I already have had him in speech therapy due to a moderate speech delay) hyperlexia IS usually outgrown (as far as any deficits it may cause) if the kid gets assistance from an early age, i.e. speech therapy, social therapy. I've been a teacher for almost ten years, and had never heard of this. But I find it incredibly interesting. Your post made it easier to understand what it is, but also was fascinating to read. As a mother, I admire your openness of writing about this as you're discovering more about it yourself. I am looking forward to hearing more about how you move ahead with your son so that you can both help him expand on this amazing diagnosis but also learn to live with it comfortably so that some of the things don't preoccupy him as much when you need him focused on other things. Aw thanks, Kate! What a sweet comment to read! The diagnosis alone has helped in so many ways, giving me a better understanding of how to help him communicate better. It's also making me a much better parent! Happy kids, happy mom, right? Does this fall under autism spectrum disorder then? Just curious because my nephew's son is exactly like this. I just went back and read some other comments. I see where you said it is usually diagnosed hand-in-hand with autism, but not always. I would think that the expressive language component would be the key to whether the child would be considered on the autism spectrum or not. Hyperlexia is often diagnosed with autism, but not always. Most kids with hyperlexia express themselves through echolalia at first, which is also common in autism. Dr. Darold Treffert, for example, writes often about how some kids with hyperlexia show autistic like symptoms that they eventually outgrow. It's fascinating for sure, so be sure to check out our Hyperlexia Resources section at the top of the blog to read more about the diagnosis. Not necessarily. My son (3) doesn't display any of the sensory issues often found along with hyperlexia and is not on the spectrum. He just has the speech and social quirks/delays that are usually found with hyperlexia. Many kids with autism also have hyperlexia, but not all kids with hyperlexia are on the spectrum. He sounds like an incredible little boy. What a fascinating topic thanks for sharing. He certainly is, Amy! And I agree. The more I read and learn about hyperlexia, the more fascinated I become! My mom sent me your blog entry, as it seems our boys have a lot in common. It's fun to know i'm not alone! :) Thank you for sharing! My 7.5 year old has autism and hyperlexia. We discovered at 2 years old that he taught himself to read, but believe now that he learned much earlier. Even after 5 years I am still amazed by it all!! It sure is amazing to watch how they learn! Copying across my comment from The Mighty: Hello! I'm hyperlexic. I could read before I could talk, and I can't remember a time when I couldn't read. I have to read anything in print that comes across my field of vision, which makes me a rather hazardous driver. Luckily, I can read very quickly, scanning a whole billboard and having it in my head straight away. I'd be happy to answer anyone's questions about what it's like to experience hyperlexia. So interesting about the numbers! Also, I never thought about the impact hyperlexia would have on driving. Luckily, I won't have to deal with that for another 11 years, but thank you for raising that concern! I would love to know how it is to be an adult with hyperlexia. I have a 3 year old with hyperlexia. So would I, Deborah! I would love to talk to more hyperlexics as adults to get some insight. This is brand new information and you've explained it so well. Dealing with hyperlexia seems to be both frustrating and fascinating. Very eager to read more from you. It is definitely fascinating and frustrating at the same time. Thanks for reading so many posts today! Your son sounds so similar to mine. Another thing mine would do is referred to stores/places by their address instead of their name, for example if he wanted to go to toys r us, he would say let's go to 4601 or if he wanted to go to IHOP he would say 1536.....it was hard to figure out, but I'm learning.....there are challenges and fascinating moments....it's an exciting ride! Oh my goodness yes! He always calls our house by the house number and he even referred to our backyard neighbor's house by the house number. He said something like, "They're always barbequing at 534 house." I was like, "Where??" Then I figured it out because sure enough the neighbors were currently using the barbeque. Never a dull moment around here! I am so glad you wrote about this. My son is almost 3 and is hyperlexic. It's very hard to find info. People think he's such a genius, and he is, but he struggles to communicate without letters. So glad I found your blog! Liz, I am so happy that you found it too! I really wish there was more information and support available to parents and educators because their brains work in a truly unique way. My son too. Almost 3, has a huge vocabulary and excellent memory and can spell words like violin, umbrella, elephant, and count to 100, but his conversational and social skills just aren't nearly as developed. He's been doing ST for a year and is going to have ST and other therapy in preschool too, to work on his social delay. He's incredibly smart but learns differently from other kids to be sure. Having "hyperlexia" as a label is a big help. Some have suggested autism spectrum (and clinicians have said no) and it just isn't him; he doesn't have any sensory issues, almost never tantrums, is very adaptable and flexible, etc. He just experiences the social and language quirks. Everything I've read has said getting kids with hyperlexia therapy from an early age is the best way to help and most hyperlexic kids do end up being considered neurotypical, with little to no special assistance needed later in childhood once they're done with therapy. Thank you for a very interesting website. We noticed our 3-year-old son could read at the age of 3y2m (but how long had he been reading without us noticing it?). He doesn't have any autistic traits, and he understands fully what he reads (and connects it to previous knowledge). Now he's learnt some times tables and can sum 20+10 and the like, though he's not as enthusiastic as those children parents describe in previous posts. Here in Spain where I live I'd never heard the term hyperlexia, and I dread telling my child's doctor in case he's misdiagnosed, mis-pigeonholed, misunderstood and a long list of mis-fortunes. Keep enlightening us please. I don't think hyperlexia could ever be a bad diagnosis, to be honest. For me, a hyperlexia diagnosis was helpful because I had never heard of it before and was desperately trying to figure out what was going on with my son. Hyperlexia was that missing piece. As soon as I had that piece, it was like I finally had the right strategies to help him. So I don't think telling your child's doctor about the possibility of hyperlexia will pigeonhole him in anyway. You might be right. I'll let you know when I tell her. My daughter is 3.5 year old and hyperlexic. she is very smart,but her communication is limited. what are the strategies you followed for your kid to communicate better. I am new to this blog, so any information would be useful. - Using social stories to help with social issues, new experiences, etc. - Practicing social scripts of basic communication skills like "What's your name?" or "How old are you?" - Providing lots of things to doodle with: chalk, notebooks, Magna-Doodle, etc. I have lots of great hyperlexia resources here: http://www.andnextcomesl.com/p/hyperlexia-hypernumeracy-resources.html including some free printable WH questions to practice with your daughter and a link to a really great pamphlet about strategies to use at home and in the classroom. I commented elsewhere before seeing it was a repost of your actual story here. I am an older adult with hyperlexia. Of course it was never diagnosed then. I had to figure it out on my own, after my own son was diagnosed with autism. Perhaps you saw it on The Mighty? Regardless, it's so nice to meet you. I’m in the UK and I’ve not yet figured out how much people over here are aware of hyperlexia. I’d never heard of it until I ran into issues with my son - I’m a little bit worried how the educational/medical professionals - as in the psychologists and speech therapist are primed to deal with this in my country. Actually my son has so far only been to one speech therapy session (which was good) – a month ago, and the next is scheduled for after Christmas – my son is now 4 years and 4 months and recently started school. When he was around 2 years old we were starting to get a bit worried about him not developing his spoken language, although we would notice him doing lots of “clever” things so did not worry too much, and his vocabulary was quite extensive – yes he did lots of stuff that fits into the autistic bracket, but he has always been quite affectionate and likes social occasions – running around with lots of kids, although often thinking they were playing some kind of chasing game, when they were not. By 3 years old – I thought I’d teach him to read, as I thought this might help his speech development - and consequently went out and bought some books for this task… only to find that he could already read… Oh, to add to the fun, we are also raising him bi-lingual, his mother’s first language is Spanish - we have subtitles on the TV a lot and I think he just picked up the English from there, although he can read in both languages perfectly well. His fascination with numbers was also non-stop, every morning I’d be woken to a math question, what’s this plus this etc. every toy would be turned into a number, and he would spot numbers everywhere - around 3 years 9 months I remember him doing lots of skip counting (actually he’d been skip counting for months) – and whilst at his nana’s house I always remember him skip counting down the stairs, one step at a time, in 91’s, all the way up to 1000 and something – It sticks in my head because I couldn’t do it. Hi, Dave! Sounds like you have an incredible little guy! I will answer your other questions in the next comment. Dyan, I read that your son was also hypernumeric, I think you’re the only person that I’ve seen mention this term – I know little about this, if you’re hyperlexic are you hypernumeric or is it common to be both or do they also exist separately – like, can you just be hypernumeric?. My son has yet to be diagnosed with anything, but type III hyperlexia seems to fit, he had the precocious ability to read early, but I’d say his comprehension is more like that of a child a year younger. I’ve been reading a lot about hyperlexia and the different types mentioned by Dr Treffert – I also wonder if type III is also on a sliding scale, where you can be more type III than another person with type III, if that makes sense. By about 3 years 10 months my sons fixation with numbers has backed off loads, he can still do the math, but it’s not as intense – In fact he seems to be adjusting quite well into school, although I do worry about his comprehension and whether or not this makes him a bit vulnerable in certain situations. I’m a bit scared that as the kids grow older we will notice more of a gap and then he might not fit into class so well – on the other hand, as the prognosis for type III’s seems to be positive – so I’m hoping his comprehension catches up. Right now we’re working on reading books below his reading ability and focusing more on understanding the content. At the speech therapist he was shown some pictures, an example would be – 1 boy sat on a wall and 2 sat on chairs, and then underneath, the sentence – who is sat on the wall? He would read the sentence himself (instead of the therapist) and answer the question – his comprehension could grasp this. Where it fell down a little was when he was asked a sentence with multiple actions – so there would be 2 teddy’s, a chair, and a table – and he would be asked make red teddy jump on the table, put blue teddy under the chair – so that process of choosing a teddy, choosing the object (table, chair), and choosing an action, he struggled with – so we’re also working with similar exercises to help this. Regarding the hypernumeracy, I simply don't know much about it because frankly, there's like zero information available about it. I do know of one other person who uses the term and that is Daniel Tammet. He has hypernumeracy and has written quite a few books. His book "Thinking in Numbers" is an interesting read. However, based on what I have seen and heard from other hyperlexic parents, not all would be classified as hypernumerate (or would it be hypernumeric? no idea!) as well, although most hyperlexic kids have an interest in numbers as well. However, for J, his fascination with numbers is more dominant than it is with letters. And the things he can do and understand regarding math and numbers is light years ahead of anyone I have ever met that is the same age as him. So my gut instinct is to say they can exist separately and that not everyone who is hyperlexic will be hypernumeric, but that is merely my opinion. We learned about hypernumeracy during my son's autism diagnosis and was given the label, in addition to the hyperlexia one, from the psychologist. The types proposed by Dr. Treffert are extremely interesting and I do think there is a sliding scale, or spectrum, of hyperlexia, regardless of type. For instance, my youngest son K started reading early as well. He was just around age two. However, he can't spell like J could and wasn't nearly as fascinated with letters as J was. He was, however, really into logos. I still find him spelling the word Samsung everywhere! Would he be classified as hyperlexic? Probably. His reading was all self-taught, just like J's. But his hyperlexia doesn't seem to be as intense, if that makes sense. The prognosis for kids with hyperlexia is good, regardless of the type. I personally don't worry too much about the type. Instead, I look at hyperlexia as a practical label. One that tells me how to best understand my child and how to help him. Once you know your child has hyperlexia, then you know that using the written word is tremendously helpful for connecting and engaging your child. Yes, there will be difficulties in comprehension, WH questions, etc., but they do seem to catch up in those areas eventually. Just keep asking him questions about what he is reading to make sure he understands. As for feeling scared that the kids will notice a difference, I hear you! J is in grade two and already the kids are talking about how he is "the smartest kid in the class." They definitely notice, even at this young age. J doesn't really notice that he is different, but we have always tried to encourage him to embrace his unique talents. He also uses his advanced math and spelling skills to help other kids in his class, which boosts his confidence and has been tremendously helpful for his social skills. But to be honest, I am still a wee bit terrified of how things will be in a few years. Kids can be cruel, I know that. And honestly, I would love to chat more with other parents of older hyperlexic children to learn more about what to expect. Anyway, our kids are amazing and I'm so happy to have connected with you! Hopefully my response was semi-helpful. I am tired so I imagine there are a few rambling thoughts or typos above. I’ve had some time to digest what you said, and it was helpful. You write about it with a lovely positivity, something that I’ve been missing. I feel a bit bad, I’ve maybe looked at it the wrong way, like a disadvantage almost. You are right, our kids are amazing - and being a little bit different, well that can be fun. I plan to enjoy it anyway. I’m currently checking out, your tips to improve comprehension – and also Judy and David’s strategies. Oh btw, sorry for another comment but i was curious about (and this is something that we've struggled with) hyperlexia and going to the toilet. I read somewhere (not sue where) that hyperlexia and toilet troubles were common. My son struggled immensely with this, that is, holding in his poops - and even now at 4y4mths he still occasionally holds it. I've made and laminated a "poo poo chart" and fixed it to the bathroom wall so that we can monitor his activity - But sometimes he will still hold it and when I ask him why he replies "I don't know". I was just wondering if you were aware of this issue? It seems like toileting issues are common with hyperlexic kids. No idea why! From what I can recall (I try to block out memories of J's potty training since it was so agonizing), we wouldn't ask him to go to the bathroom. Instead, we would remind him to go the bathroom before leaving the house or heading to school, etc. Essentially we created a routine for him. A visual schedule with written steps also helped him master the separate steps like wiping, flushing, washing hands, etc. Also, if he is holding it in, then I wonder if a foot stool would help? Slide it under his feet while he is pooping. Apparently raising feet and squatting is the best position for pooping so using a foot stool is actually recommended for everyone. I haven't done the research on this particular topic, to be honest, but I have noticed it is helpful for our kids, especially since their feet dangle and cannot touch the ground anyway when they're sitting on the toilet. And I love that your son says "I don't know" to your questions. I get that exact response for pretty much every single WH question that I ask J! Thanks for the reply - The pooping is getting better now, it just seems to be getting better with time. I tried everything, from even buying a doll that cries "we named her Mary", and some fake poop, then getting O to help her go on the potty as she was crying and needed a poop... It maybe helped a little, i'm not sure - what would i give to see inside the mind of a hyperlexic kid and see the thought process??? Because O does seem to like structure and routine - yet sometimes there does not seem to be any logic. Interesting though, about your visual schedule - i will write one too. O does love to ask me the order in which we are going to do things - like when we go to school - he asks, what will we do first? "take off your coat" what next? etc. Yep, the I don't know responses - Example: O, who did you see in school today? i don't know - OK, tell me 3 people you saw in school today, we need to do this before we read your new book. Blake, Kara, and Nathan. Me thinking, why didn't you say this in the first place? However, he will name the same 3 kids if you ask him the same question the next day. Actually though, I do think a lot of kids like to give an "i don't know" response. True that most kids use the "I don't know" response, but I find with our hyperlexic kids, we have to be specific with our questions or else they really don't know how to answer it. So just like you asked about three people he saw in school, I do the same thing. I ask questions like: Did you have gym today? What game did you play in gym? Who did you play with during first recess? What was something funny that happened in your class today? Did anyone wear a green shirt today? Things like that. Usually when I ask a question like that he ends up elaborating and telling me quite a bit about his day. Anyway, glad the toileting is going a bit better. It does get easier with time. I know that's not helpful when you're in the thick of things, but do know it will all be in the past before you know it! I remember the moment I figured this out with my son. I had pointed to a picture of an animals face (can't remember what animal it was. Let's say a lion). I asked him "what is this" (looking for the answer: "lion") and he struggled and struggled. "What am I pointing to?" He couldn't tell me. When I gave up, I heard his little voice say "a nose?" Oops. I should have asked what animal it was, instead. Lesson learned! I have hyperlexia, and I've known about that for years. What I didn't know was how much it was affecting my comprehension. It was also something my teachers never figured out. I didn't get into gifted reading in 3rd grade because of it, and I'm sure my teacher and mom were confused why. They knew I was a voracious reader. My 11th grade English teacher was also confused - she knew I had read the book, but then I got a D on the comprehension quiz. But I think that teachers see a fluent reader and think a) they don't understand and b) they have to help the non-fluent readers because that's what they're taught in school. I'm actually a librarian now (somewhat ironically, I suppose), and a couple of years ago I decided I needed to do something about my lack of comprehension. I heard about a program called Visualizing and Verbalizing - https://lindamoodbell.com/program/visualizing-and-verbalizing-program - and it really changed my life. When they tested me, just two years ago, even as an adult, my reading comprehension was at a 5th grade level. My fluency was over a 12th grade level (that was as high as the test went). After 6 weeks of 2-4 hours a day of practice using their system guided by their teachers, I improved to an 8th grade reading comprehension level. It totally changed my life, as cliche as that sounds. Of course, since this was just two years ago when I basically had to relearn how to read for comprehension, I'm still slow at processing and comprehending, but I'm doing it so much better, and I just keep improving. But I do highly recommend the program. Of course, as an adult choosing to do this program, I was very motivated to do it and get everything I could out of it, but they teach a whole new way of reading instead of just reading word by word, you start to create pictures at a sentence level, then multi-sentence, then paragraph, then multi-paragraphs, then a page, then multi-pages. I'd also be happy to talk to anyone about my experiences with hyperlexia. I'm also starting to look into ways to raise awareness of hyperlexia because I wish my teachers would have known about it and could have helped me at a younger age. Wow, thank you for sharing!! I have heard wonderful things about that program before. Please start a blog!! I am always looking for hyperlexic adults to follow and learn from. Not much available at the moment though! I hadn't considered starting a blog, but maybe I will! I've wanted to blog about books, and I could see it as a two for one - blog about hyperlexia through books in a sense. Hi Dyan, thank you so much for sharing all this valuable information, strategies and resources.I am deeply grateful with you! As you said there is not info available regarding Hyperlexia. My son is a sweet, smart and lovely Autistic 7 years old boy. He is hyperlexic since he was little and hypergrafic too! About hypergraphia there is not much info about it. I am still looking for more. Tomorrow I will advocate regarding his hyperlexia and hypergraphia at his IEP meeting.Nobody in the team knows about it. I thought they immediately notice or be curious but nobody seem to be familiar with hyperlexia at all. It's time to explain what hyperlexia is. My first grader son can read sight-words up to a 6th grade level. He is a self taught kid. He is a Logo expert! Maps! A ton of notebooks and white paper with his writings (he can do any type of font!) and drawing (all logos and brands you can imagine) Hewite and name all he knows and see! He is an expert researching things. Thank God for Google search, images and translator too ...they are his toys! He sounds like an amazing kid! I hope the IEP meeting went well! I am in tears right now. My son will be 3 in just a couple weeks, and I havr finally found something that describes him, perfectly! As soon as I read the license plates, I just burst into tears. This is my son. He speaks in letters and numbers, almost exclusively. If hes upset, he counts, often just repeating, 1-2, 1-2, 1-2. He loves shirts with writing. I swear he reads his books. Always has. He was 1.5 years old, and was sitting in a chair, with a book. It looked like he was actually reading. And he read the entire book. My husband and I laughed, thought it was adorable. Didn't think much else. We have both witnessed him reading. Of course, we never thought he actually was, buy now... I'm starting to think he is, and has been. He was mistaken for having a hearing issue. He acts like he doesn't ecen know his name. Rarely will even look at you, as you say his name over and over. Thank you so much for providing this information! I will be bringing this up at our appointment in a couple weeks. I'm scared, sad, relieved.... so many emotions right now. I just found all the answers I've been looking for! Oh goodness, I know how you feel. I felt the exact same way when I finally learned about hyperlexia. I'm so glad you have finally found what you have been looking for!! My son as I believe so, has almost all of the symptoms you have mentioned of being hyperlexic. How did you help him in this case? I just started to write stuff down more and using strategies that I mention in my book Beyond the Letters or that can be found on the hyperlexia resources page. Wow, your son sounds incredible!! Happy to meet you. And feel free to reach out any time! Oh my word. I just came across your blog and you've brought tears to my eyes. Our sons could be twins, they are so alike... even down to pointing out the numbers on the bottom of the street lights. Thank you so much for sharing your story and for posting all these resources!!!! THANK YOU! Thank you so very much for sharing. I am blessed to have found your post and now realize that there are more resources and actual names for these behaviors my ASD 3 year-old exhibits. I am trying to keep ahead of his needs and have been very concerned how pre-K and kindergarten would work for him and what I can do to place him in a way so he may use his gifts to the fullest.
2019-04-24T12:44:28Z
https://www.andnextcomesl.com/2015/01/what-is-hyperlexia-hypernumeracy.html
When people think of brownies, they don’t usually think of them being too healthy. However, that thought is about to change thanks to the addition of hemp seeds in to the traditional brownie recipe. With the recent explosion of hemp knowledge and support, more and more people are beginning to incorporate hemp in to their diets, more specifically the seeds. The seeds of the hemp plant are the most helpful part, containing an excellent source of vegan protein, dietary fiber and all essential amino acids, plus the added benefit of antioxidants, vitamins, and minerals. Not only are hemp hearts an extremely nutritious part of a diet but they are also gluten free and are considered a raw food, plus they never contain allergens. The hearts aren’t nuts either, leaving them to be enjoyed by basically everyone. They can be eaten raw like peanuts or added to snacks like cereal, yogurt, or fruit salad. Taste-wise, they resemble sunflower seeds so if you enjoy those, you’ll definitely love the taste of hemp hearts. And if you don’t, simply juice them and drink them as a shot. It may taste bad but the health benefits are worth you taking a shot of something that doesn’t taste very good! The recipe for these hemp brownies is extremely easy, not to mention no bake! With only six ingredients to gather up, even the stoniest stoner can pull these off and make them taste amazing! You can store these treats in the fridge or the freezer if you like them chilly. This recipe makes about 9 servings so be ready to indulge in these delicious snacks that also happen to be good for you! Set aside two tablespoons of hemp seeds in a small owl. Take the remaining hemp seeds, cacao powder, salt, and walnuts it to a small food processor and pulse for 10 seconds until the mixture is finely ground. Take half of the dates and the vanilla extract and add them in. Puree everything for about 15 seconds and then move it to a mixing bowl. Form 15 to 18 small meatball sized balls and roll them in the remaining hemp seeds to give the a nice covering. Set the balls in a container and let them sit in the fridge for about two hours. You can enjoy them then or wait and store them in the fridge like stated above! Enjoy! StonerDays Cookbook Persimmon Bread is not like your Grandma’s . This is a stoners little twist on Grandmother’s Persimmon Bread Recipe. Not only does this bread taste delicious and make you feel good it also calls for fresh persimmons, which are a super sweet fruit full of vitamins, minerals, and anti-oxidants. It stays good for about a week and is a bread that does well freezing for later too. Enjoy! Preheat oven to 350*. Grease 2 loaf pans with butter or cooking spray and set aside. In a large bowl mix sugar and cannabis butter using an electric hand mixer. Mix well & add the eggs, vanilla, and persimmon pulp and continue until all ingredients are mixed together really good. In a separate bowl sift your flour, baking soda, salt, spices, nuts, and raisins. When the nuts and raisins are evenly coated in the flour mixture slowly add a little at a time now using a wooden spoon to stir into your cannabis persimmon mixture until all ingredients are combined well. Now pour your bread mixture evenly into your 2 greased loaf pans and bake in preheated oven at 350* for 55 minutes. A toothpick can be used to check if your bread is done. When toothpick comes out clean your bread is done. If it doesn’t it will need another 5-10 minutes depending on your oven. If your bread is done remove loaves and let cool on a wire rack. This bread does great for freezing and tastes just as fresh once defrosted. That’s right. Cinnamon cannabis oatmeal cookies. Oatmeal isn’t the most popular flavor of cookies but cinnamon roll is something that most people agree is amazing. On a scale of 1 to 10, this recipe comes in at about a 3 for difficulty, meaning that pretty much anyone is capable of accomplishing the task of making these. They’ll also get you pretty stoned, an added bonus. These will do well at a party or a gift for a friend and they’re the perfect recipe to begin your cannabis culinary adventure. Whatever you choose to do with them, you’ll love the way they taste! Preheat your over to 350 degrees F. While it heats up, mix the butter and the sugars together until they’re a very creamy, smooth consistency. Grab the two eggs and beat them in to the mix. After that, add in the baking soda and the flour, while still stirring consistently. Slowly pour the 1/4 cup of water in, along with all of the oatmeal packets. Continue to stir the mix until everything combines well. The mixture should be similar to cookie dough. Take bits of the mixture and roll them in to balls and place them on to a greased up cookie sheet. Place them in the preheated over for around 13-15 minutes until they are a golden brown color. Once they’ve hit that point, remove them from the oven and place them on to a plate to allow them to fully cool off. Now they’re ready to eat! Enjoy! Oh the holidays are here again! If you’re celebrating this Christmas stoner style, you’re sure to be looking for some goodies to grace your dinner table on Christmas Day. And if you’re not celebrating Christmas, well… These Gingerbread Cannabis Cupcakes are delicious and you don’t really need a reason to make them. If you like gingerbread and you like cannabis, there’s like a 95% chance that you will absolutely love these cupcakes. No holidays required (although it is that time of year). Start off by preheating your oven to 350 degrees and line sixteen muffin tins with cupcake liners. Using a small bowl, combine the baking powder, flour, salt, ginger, cinnamon, baking powder, cloves, keif or hash, and nutmeg. Stir until it’s well combined and the mixture is smooth. Beat together the melted butter, brown sugar, molasses, milk, and eggs until they are well blended in a separate bowl. Combine all of the ingredients until the batter is smooth and fill each of the lined muffin cup 3/4 of the way full with the mixture. Put the cupcakes in the preheated oven and let them cook for 15-18 minutes. Be sure to test them with a toothpick to make sure that they are cooked all the way through. Let the cupcakes cool before frosting them to be sure the frosting isn’t too runny. To make the icing (which you can totally throw together while your cupcakes are cooking), all you have to do is beat the cream cheese with the butter with an electric mixer. Beat in the molasses and the vanilla extract and then proceed to beat in the powdered sugar. Continue to mix until the frosting is smooth and then use the back of the spoon to spread the icing on top of the cupcakes, after they cool of course. Then you can sprinkle the coarse raw sugar over the top of the icing and bam! Your cupcakes are ready! Christmas is less than a week away and you’ve got to get your cooking in order before the guests start to arrive! As I always say, dessert is the most important part of the holiday season… Or you can just give these little treats away as gifts, as there are plenty of people who would love a tray of truffles for Christmas! No matter what you’re doing with these medicated treats, you’ll be sure to fall in love! Take four cups of the chocolate chips and mix in the weed, then melt it in the microwave. Only keep the mix in the microwave until melted. Avoid letting the mix bubble. Once the chocolate has melted, remove the bowl from the microwave and add in the water, coffee, and cream cheese. Mix together well. Chill the mixture in the fridge for about an hour until it is firm enough to roll in to small balls, measuring about an inch. Place these on a sheet of wax paper and place in the freezer for an hour. In the microwave, melt the last two cups of chocolate chips and butter. When the mixture is smooth, drop a few of the frozen balls in at a time and stir vigorously. Quickly remove the balls and place on a wax paper lined cookie sheet. Let them cool and harden, then wrap them or eat them as desired. You can buy fancy wrappings for these and use them as stocking stuffers or you can eat them yourself or even serve them at parties! Enjoy! Depending on the kind of stoner you are, you have a favorite kind of candy. While some smokers enjoy the overpoweringly sweet taste of lollipop, others prefer the smooth taste of chocolate and caramel. Luckily for the stoners who like chocolate and caramel, Stonerdays has found a recipe that you’re going love. Medicated cannabis caramel snacks are a great way to stay high all day and they taste incredible! Stir together the brown sugar, salt, and melted cannabis butter. Mix together well, at which point you should add in the corn syrup. Continue to stir the mix while slowly adding in the milk. Be sure that all ingredients are getting blended together well. Put this mixture in a pot and place on the stove over medium heat. Let this cook for 10-15 minutes, stirring occasionally. The ingredients should have taken on a firm texture, almost like pizza dough. Take the pan off of the stove and add in the vanilla that you have ready. After adding the vanilla, pour the entire mix in to a pan (Be sure to spray it with cooking spray first so nothing gets helplessly stuck). Let the pan cool off and you’re ready to cut your candies in to whatever shape you want. You can wrap them and give them to friends as special little medicated surprises as well! There are other things that you can add in to this recipe, depending on how you like your caramel. It’s possible to coat the candies with salt or even add dried fruit in to the mixture when making in order to add some extra flavor to your treats. Halloween is coming faster than most people realize so if you’re having a party, these treats are going to be a hit! I can’t say that I’m a huge fan of mayo but working in the food business has shown me that it’s probably the single most popular condiment out there. People put mayo with everything. They’ll put it on subs, dip their fries in it, put it in the calzones and on their pizza. It’s insane how much people like mayo. So here’s this recipe for mayo that will taste awesome and it will also give you a little buzz. The recipe is really easy but just know that you will need cannabis oil so have some of the on hand before you start. All you have to do to get your medicated mayo is whisk together the egg yolks, the salt, vinegar, lemon juice, and mustard together. Make sure it’s mixed up well. Slowly add in the cannabis oil while still whisking the mixture. Do this carefully or risk making a huge mess. Once the oil is completely added in, continue to whisk the mixture until is begins to thicken. If it gets too thick, you can add a few drops of water to get the right consistency. Put the mayo in an airtight container and let it chill in the refrigerator for about two hours. And here’s a secret, for those of you that live on the west coast, I know how much you appreciate thousand island dressing and you can make your own using this medicated mayo by adding in equal parts of ketchup and relish. You may have to mess around with how much of each you add but once you get the consistency right, you will end up with an amazing medicated condiment that you can pretty much put on anything. You’re welcome! The wake and bake is the most important part of the stoner morning. Without a proper wake and bake, the poor pothead can’t go about their day. So in case you don’t have time to smoke and eat, it’s highly recommended that you eat. But just in case you want to get high while you eat, you can make these super easy wake and bake sandwiches that will fill your stomach and get you perfectly medicated. Toss the bread in the toaster and when it’s done, butter it generously with the cannabutter. Grab a pan and put the stovetop on high heat. Cook the bacon and the scrambled eggs. You can cook them in separate pans if you want to, although it will all be together eventually on your awesome sandwich. Next, assemble the sandwich. Sprinkle the ground bud in between the layers. Stick the whole sandwich in the toaster oven on broil until the cheese is melting. Remove it, let it cool off a bit, and enjoy! You should feel the effects of your dank sandwich about an hour after you eat it. Enjoy your breakfast! Start off by grinding up the rosin chips in the coffee grinder until they are a fine powder in the coffee grinder. Set them aside and take a measuring cup and scoop the coconut oil in to it. Put the measuring cup with the coconut oil in the microwave and heat it slowly until the oil is a liquid. Measure out your required amount (I believe you will need 1 1/3 cups total for the two boxes) and pour it in to a pot. Add in the rosin chips and let the mixture simmer for about half an hour to forty five minutes, stirring occasionally. Make sure to keep the heat low. If the mixture is bubbling a lot, it’s too hot. After the time is up on the canna-coconut oil, you need to strain the mixture through cheesecloth to extract the plant matter. Over a bowl, strain the oil in the cheesecloth (be sure that you squeeze the cloth to make sure that you get all of the oil) and mix up the brownie batter following the instructions on the box. Finish cooking them according to the brownie instructions. Once they are done cooking in the oven, you will have some extremely potent and incredibly delicious coconut-canna-brownies made with recycled rosin chips! Enjoy! Whip up these holiday treats and be sure to decorate with red frosted eyes! 1. In a large bowl, sift together flour, baking soda, and spices. 2. Using an electric mixer cream the butter and add sugar and beat until fluffy. Mix in eggs and molasses. Gradually add the flour mixture. Divide dough into three equal portions and wrap each plastic. Chill for at least 1 hour or overnight. Before rolling, let sit at room temperature for 5-10 minutes. 3. Heat oven to 350°. 4. Place a portion of dough on a piece of lightly floured parchment paper. Roll dough 1/8 inch thick. Refrigerate again for 5-10 minutes to make it easier to cut out the cookies. Use either a cookie cutter or place a stencil over the dough and use a knife to cut into little gingerbread men. 5. Move to ungreased baking sheets. Bake until crisp but not darkened, 8 to 10 minutes. Let sit a few minutes and then move cookies to a wire rack to cool completely. Though preparing marijuana butter can take an entire afternoon, you can store it for future projects. Even lazy stoners might want to take a stab at whipping up a batch of the THC-laden butter—it lasts a long time and can be used anywhere you’d use regular old butter. The possibilities are endless! Put the water, marijuana, and butter into a large pot and bring to a boil. Reduce heat and let simmer up to five hours. Turn heat off and run the mixture through a fine metal strainer or cheesecloth into a bowl. Squeeze cheesecloth to remove whatever butter you can from the marijuana. Discard the weed when you’re done. Put the bowl of hot water and butter in the fridge or freezer. When the butter hardens, dump out the water, microwave the butter a bit, and then transfer to a Tupperware container. The butter will keep for several weeks. That time of the year is here! Pumpkin Pie is one of my favorites and if you are anything like us your going to love this recipe. Your kitchen time will be about an hour and you should be able to serve 6-8 but that all depends on how you cut your pie. In a large bowl, combine the milk, eggs, molasses, cinnamon, nutmeg, vanilla, brown sugar, and pumpkin – mix well. Add the cannabutter to the mixture and stir to combine. Pour the mixture into the piecrust and bake the pie for 50 minutes. The pie is ready when the filling has settled. Enjoy! Who doesn’t love Pancakes? This is a great way to start your morning. You’ll need 20 mins for prep time and about 20 mins for cooking time so in all this shouldn’t take you more then an hour to make. Here’s what you’ll need. Beat egg, milk and oil or butter in a large bowl. Mix dry ingredients, then add to egg mixture and beat until smooth. Pour 1/3 cup of batter onto heated, greased frying pan for each pancake. When bubbles appear on top of pancakes, it should be ready to flip. You can add chocolate chips, nuts, fruits, berries or anything you like to this batter prior to cooking. With summer basically here, people are spending a lot of time outside. Which is definitely a good thing, as most of us have been seriously deprived of Vitamin D for the past few months. So hiking, kayaking, running, or whatever other outdoor activities people enjoy are at the top of everyone’s list of things to do… But it’s also important to stay healthy and stoned, right? The following recipe will teach any stoner how to make a delicious trail mix blend that will keep you full, medicated, and healthy this summer while you’re out enjoying yourself! Start off by preheating your oven to 350 degrees and combining both the Chex cereal and the pretzels in a large mixing bowl and stir them together. Then, in a medium saucepan begin to melt the cannabutter and when it’s melted, stir in the garlic powder, salt, and Worcestershire sauce. While that simmers (as always, never boil the cannabutter or you’ll lose the THC), spread the cereal and pretzels mix on a cookie sheet and pour half of the butter mix over them using a spatula and spoon. Toss the remaining butter mixture well while you bake the trail mix on the cookie sheet for five minutes. When the five minutes is up, repeat the previous step, pouring the butter over the cookie sheet. Let the mix cool and then sprinkle some crushed cannabis over the top and toss it together. Once you do that, your trail mix is ready to be packaged up and enjoyed! Taffy is one of the best candies that one could hope to have, especially in the summer. For some reason, it just reminds me of the beach and of barbecues and genuine good times. So I figured that with the approaching summer months, making some taffy might be a good idea! And, as always, you know that anything made in my kitchen absolutely has to be medicated! This recipe is super easy and simple so pretty much anyone can get it done! Set up a double boiler (take a large mason jar and a large saucepan and fill the pan about half way with water). Take your coconut oil and chips and add them to the mason jar, letting the chips slowly melt. It’s important to do this slowly so that you won’t lose any THC from the oil or butter that you’re using. Once the chips are melted, add in your Karo syrup. Be sure that everything is mixed (once the chips have melted fully, you can move the mixture to a bowl but you have to be quick because the liquid solidifies quickly once the heat source is removed) and then pour the mixture in to a saran-wrap lined 8×8 pan. Be sure that the saran-wrap covers the sides of the pan that you’re using so that the candy doesn’t stick. The wrap should overhang far enough that you can now wrap the top of the saran-wrap over the candy, fully covering it. Let the candy sit out overnight. The following day, the candy should have hardened in to a taffy like substance, not too hard but not too soft. If the mixture hasn’t gained the correct consistency, continue to let it sit out until it does. Once the mix has the taffy consistency that we all love, you can cut it in to pieces and wrap them individually in wax or cellophane. Give them out as treats or hoard them all for yourself! Either way, enjoy your awesome taffy candy! If you were looking for the perfect game-day snack to serve to all your pals, then search no more! This nacho cheese is creamy cheesy bliss and when the high kicks in while the game’s on it won’t matter if your team wins or not, either way you’ll be happy dipping crunchy chips into this dip again and again. Both canna-butter and canna olive oil can be used in this dip so be prepared for some pretty potent bites. Grab a saucepan and melt down the canna-butter on low heat. Once it’s melted pour in the canna-flour slowly while lightly stirring it with a wire whisk until it’s good and mixed in. Now add the milk while simultaneously stiring until it thickens. Now add the chedder cheese and salt whille still mixing everything together until the cheese is fully melted and everything is combined. If you choose to use the Optional Spice , cut the maters and jalapeno chili into small squares and stir into cheese. Pour into a dish of your choice, grab the chips, and find the best spot on the couch because you’re in the zone. Nice, you just learned How to make Nacho Cheese with Marijuana! Liked this article? Check out our stoner dictionary! For Stoners. By Stoners. In the spirit of St Patrick’s Day, making everything that we eat/use/interact with green is kind of part of the holiday. What better way to wake up on a holiday like this then with a medicated breakfast of green eggs and ham? The following recipe will not only give you weed infused eggs and ham but they’re actually green as well, making them the perfect breakfast for a festive stoner. Begin by placing the cannabutter (or regular butter) and the ham in a larger frying pan. Take the eggs that you have ready and crack them in to a mixing bowl, making sure to whisk them together well, so that all of the yolks are broken. Grind up your marijuana very fine (it’s a good idea to use a coffee grinder and to be sure that your weed is incredibly dry) and add it in to your eggs. This is also where you add in your food coloring, making the eggs green in two different ways. By the time you finish mixing together your marijuana/egg/food coloring mix, the ham that’s been cooking should be done. Remember to keep an eye on it while mixing up the eggs as well, to make sure that it doesn’t burn. When the ham has finished cooking to your liking, pour the eggs over the ham in the frying pan. Continue to cook the eggs and ham together until the eggs are scrambled (it shouldn’t take too long). Serve up your green eggs and ham with some toast (preferably with medicated butter or jelly on top!) and enjoy your holiday! One of my good friends sent me this recipe and it looks really delicious actually. I don’t tend to like hummus but I would definitely recommend trying this recipe out if you’re looking for something new to try. Not only that but hummus has amazing health benefits, including high amounts of fiber and protein. Since hummus also contains beans, hummus has the potential to lower cholesterol and reduce the risk of cancer. If you’re looking for a new healthy sandwich spread or chip dip, give this hummus a shot (it’ll also get you stoned so if it doesn’t taste that great, at least it’ll have a good effect). Since this recipe is designed to be pretty stoney, your first step is to heat up your THC oil in a medium sized pan over low heat. Add in your keif as well and let it simmer. Never let the mixture boil, as you’ll lose precious THC to the heat. Allow to simmer for about ten minutes, stirring constantly and keeping an eye on it. You can add more keif in if you want or if you’d prefer a less strong end result, you can substitute normal olive oil for the THC oil. Remember that eating you cannabis effects you differently then smoking it and you should know your tolerance before making your edibles too strong. Then, take the tahini, garlic, lemon juice, beans, and cumin to a food processor and grind everything in to a paste. Then, slowly add in your oil, blending the mixture occasionally. Once you’ve added your satisfactory amount of THC oil, you can top the hummus with salt and pepper to taste if you’d like. This delicious and healthy snack is great for pita dipping, chips, or to take the place of mayonnaise in sandwiches. You’ll get a much more intense flavor without the added fat. Enjoy your hummus! Healthy eating is important in the life of a stoner! Stir fry has always been a favorite of mine and now you can make it medicated! It’s a far cry from the food we made in Home Ec in middle school but it tastes even better, now that we’re old enough not to burn the veggies to the pan. You can add in veggies or meats if you feel like it and of course, more bud if you feel inclined. Just always remember that eating cannabis is much different than smoking cannabis and you should always know your tolerance before eating too much! First, take the three peppers and cut them in to strips, about 1/2 inch wide and the proceed to chop the onion in to small pieces. Put all of the veggies (and meats if you so choose) in to a skillet and add in your Cannabutter. You can replace the butter with cannabis infused olive oil, as well, if you want to be a little more health conscious. Sauté everything until cooked well and then serve the mix over rice or noodles or alone if you’d like. As for the leftover oil in the pan, you can pour it over the rice/veggie/meat mix to ensure that you get the most out of your meal! Enjoy your medicated stir fry! With such an awesome title, how can you not be intrigued as to how to make this amazing holiday treat? It’s medicated, delicious, and can make the perfect addition to a holiday party or as a present. These cookies are your normal medicated chocolate chip cookies but with a twist! Theres vanilla pudding added in as well, giving these cookies a different taste then what most people are used to. This will definitely give you the upper hand at winning who makes the best cannabis cookies! As always, you first preheat the oven. This recipe calls for the oven to be set to 375 degrees. Grab a mixing bowl and mix in your sugars and the cannabutter, mixing them together well. Add in your eggs, pudding mix, and vanilla. Stir everything together until the mixture is creamy. Mix together the flour and baking soda and gradually add in to the mixing bowl. Stir everything together well (use a mixer if it makes you more comfortable). Then, proceed to stir in the chocolate chips. Measuring them out by the teaspoonful, place the cookies on to an ungreased baking sheet (Or you can grease it with some cannabutter to give the cookies an even stronger effect). Bake the cookies in the preheated oven for about 11 minutes or until they are lightly browned. Allow the cookies to cool before serving and enjoy your new twist on an old favorite! Hempseed milk is an incredible health benefit. It contains 10 of the essential amino acids. There’s actually an amino acid in hemp that’s only found in this particular plant, something called Edestin. Hemp is also incredibly easy for your body to digest, making it extremely simple for you to get the nutrients that you need. Without requiring a lot of energy to digest, plus it’s amazing health benefits, makes hemp something that every one should be including in their diet at least three times a week. This recipe will let you make your own raw hempseed milk in a few minutes, without having to soak the seeds. Take all of the ingredients and add them in to your juicer. Start blending them at a slow speed and the increase to high speed for around a minute. You can sweeten the milk to taste if you desire and can make the milk richer by adding the lecithin and the coconut butter. Drinking the milk unstrained hold the most nutritional value but if you prefer a smooth milk, you can strain out the mix with a nut bag, an item that you can find at a health food store or online. Always be sure to wash the bag before using it with something you plan to ingest. Strain the milk like you would a tincture or butter. Store the milk in a sealed glass jar (Mason jars work best!) in the fridge. Also, if you do plan on straining the milk, you can save what gets taken out of the mix and dry it. Store this mixture to use in edibles later! It’s always nice to have a recipe that reuses ingredients more than once, making sure to get as much benefit as possible from everything. This milk can also be flavored with all kinds of natural flavors! For this season, cinnamon would be absolutely perfect. Of course, try out a bunch and pick your favorite! Enjoy your healthy, delicious hempseed milk! This recipe sounds absolutely incredible. With the holidays fast approaching, making desserts should be number one on people’s list of things to do. A holiday dinner isn’t complete without desserts, right? If you show up to dinner with this cake, or just plan on making it for yourself (you know, since it’s medicated), you’re sure to enjoy it. First, as always, preheat your oven to 350 degrees and be sure to put a center rack in the oven. Grease a 10x3in Bundt pan and sprinkle flour all over it. This will prevent the cake from sticking to the inside of the pan once it’s finished. You don’t want the cake to get stuck. It’ll make a mess and you will ruin your cake. It is also important that you leave all of your ingredients sitting out at room temp for at least 40 minutes before you start baking. This includes the eggs, buttermilk, and butter. So your oven should be preheating. Sift together the baking soda, salt, flour, and baking powder. Set these items aside. In a different bowl, use an electric mixer to beat the butter for about 45 seconds. Add in your lavender flowers and sugar in a consistent stream. Be sure to pause and scrape the side of the bowl to make sure that everything is getting mixed in. Beat everything together on medium power until the substance is fluffy and light. Then, keeping the mixer on medium speed, add in the eggs, beating steadily until everything is combined. Lower the power of the mixer and add in 1 cup of flower, constantly beating, then add 1/2 cup of buttermilk, beating again to make sure that everything is mixing together well. Add in another cup of flour, beating, and then add in the last of the buttermilk, continuously beating. Then add in the remaining flour, pouring it slowly. Continue to beat until the mixture is mixed together well. Remember to get the mix that gets stuck up on the side of the bowl. Grab a stirring instrument and put the beater down. Stir in the lemon juice and lemon zest. Take the mixture and slowly pour it in to the previously greased pan until the pan is three quarters full. Make sure that the batter is even in the pan. Toss the cake in to the oven and leave it in there for 60-65 minutes. Test the center of the cake with a toothpick. The pick should come out completely clean and that’s how you’ll know the cake is finished. Remove the cake once you get the clean toothpick and let it cool for about a half an hour. Your cake is done and ready to be enjoyed! There’s so many stoners that love to wake and bake. The only thing that can be added to an awesome morning smoke session to make it better is coffee. Stoners love their coffee. What happens if you’re rushing though and you have to make a choice? Not anymore. Following this short recipe will provide you with the most delicious medicated coffee drink for those busy days! This recipe is best used if you can plan ahead, as the cannabis should sit in milk overnight. The fat in the milk draws out the THC so you get the best high possible. Grind the cannabis up in to a fine powder before adding it to the milk. In the morning, take the milk, ice cream, vanilla, and coffee in a blender. Blend the mixture until it’s creamy and smooth. It also happens that the instant coffee in this recipe can be replaced with hot chocolate mix. Use the same amount of chocolate as you would with coffee. You now have a chocolate medicated shake, with no coffee, if that’s what you prefer! Snacks are the best thing to make containing cannabis. Not only are you getting high but you’re curing the munchies at the same time. By eating weed, you save time and manage to not eat as much because you’re already full! This recipe for Canna Goo Balls is absolutely amazing. You’re missing out if you don’t give this recipe a try! First, melt the cannabutter in the microwave. Do this in short increments. If the butter is exposed to too much heat, some of the THC will escape and the butter won’t be as potent. While you’re melting the butter, combine the peanut butter, oats, cinnamon, cocoa, and honey in a larger bowl. Once the butter has completely melted, add it to the bigger bowl and stir everything together. This recipe is super simple and the only other step that you need to take is putting them in the freezer. You have two choices. You can put the whole bowl in the freezer and let them freeze in a large mass. This method is good if you prefer to eat ice cream right out of the tub. Just make sure that you have a good container that seals well. The other way that you can go about this is to roll the mixture in to small balls and freeze them that way. Whichever method you choose, this treat will cure hunger and get you baked! Edibles are always a favorite of stoners everywhere Even better when you can make them yourself! After assembling your materials, put your cannabis butter on low (REALLY LOW) heat on the stove the melt it. Take half of your Oreos and crush them up with the half of the Heath bars and add them to the butter. Put the other half of the crumbs on the inside of a 9×13 pan. Cover the crumbs as best as you can with the 1/2 gallon of ice cream. Then, take the butter and crumb mix and coat the top of the ice cream. Take your favorite flavor of syrup and cover the top layer. Stick this whole pan in the freezer and let it freeze. After a few hours, you’ll have a dank treat that will get you extremely baked… And taste so good! These treats make a great party favor or possibly just something for a hot summer night. Making delicious edibles is also a great way to impress your friends. A good marijuana cook can make the best dishes “special”. Your friends are sure to always come to you if they want some dank goodies. Who knows, if you’re good enough at baking them, maybe you can start your own edibles business! Not only are edibles a strong high, they’re a great way to medicate for patients that can’t smoke. I don’t know about any of you stoners out there but I personally love Goldfish. I really just love snacks. I also love the fact that not only are stoners incredibly brilliant when it come to making snacks, but the recipes always seem to be so simple that everyone can try them in the comfort of their own home. The following recipe will not only let you make your own Goldfish snacks but they’re medicated. These make perfect solo snacks or (since they’re moldable), for parties. Trust me, these little crackers look really good on a plate. Enjoy this recipe for medicate Goldfish crackers, my fellow stoners! Using a food processor, grind up the butter, flour, cheese, salt, and pepper until the materials are a coarse mixture. One tablespoon at a time, add about 3-4 tablespoons of water. Be sure to grind the mixture in between each tablespoon. The mixture should begin to form a doughy substance. Remove the dough from the food processor and wrap it in plastic. Place the dough in the refrigerator until it is cold all the way through. Get a cookie sheet and grease it with some cooking spray, then roll the dough out on the tray so that it covers the whole pan. Next, you can either use a Goldfish cookie cutter or one of your choosing (I know that they make weed shaped ones, even though the crackers will be orange). These crackers are delicious. Plus, since they’re medicated, they make a good middle-of-your-shift snack if you’re having a rough day at work. Or they’re good to munch on while watching a movie. I highly suggest that you try these crackers if you’re feeling up to baking one day. Not only that, but since you’ll have leftover dough, you can make smaller, shapeless crackers that are also medicated. Stoners love burgers. What about burgers that have the garnish of fried cannabis leaves on it? Not only that but adding cannabis butter to a burger is a lot easier than most people think. By mixing cannabis butter with ketchup, mayonnaise, or mustard, you can make any beefy (or veggie) burger medicated. Adding the cannabis butter will give you a delicious meal that will give you a long lasting high. Keep that method in mind for when this burger is complete, fried cannabis leaves in all. In order to fry cannabis leaves, you have to sauté them in a pan. You should use regular butter for this, as the heat would disband the THC that is contained in cannabis butter. Once the leaves turn a golden brown, they’re done. Drain the butter so that they leaves aren’t soaking in it. Cook your burger in the fashion you choose. Grilling usually works best, although those George Foreman grills can pumped out some delicious patties. While the burger is cooking, make sure to assemble your canna-condiments in little containers so that they’ll be ready when the burger is done. When your burger is cooked to the temp that you enjoy, place it on the bun. Add the fried cannabis leaves, as well as your condiments, cheese, and whatever else you’ve decided to put on this delicious sandwich. Burgers are definitely popular in the stoner community. The amount of In-N-Out Burger photos that permeate stoner Instagrams is out of control. Whether you’re eating your home made bud burgers or going to grab fast food, you can’t really go wrong with a burger. Even if you don’t eat meat, you have the option to eat veggie burgers. Now, medicated burgers can be the favorite of stoners all over the world. I hope that you enjoy this cannabis leaf/butter burger and that it keeps you flying all day! A true stoner bakesale just wouldn’t be complete without the cupcakes! Cupcakes make a great all in one dessert bite and you’re sure to be amazed by just how delicious they can be with an added touch of canna-flour for an elevated kick that’s much more exciting than your grandmother’s recipe. These light and fluffy little cakes give you more than just a sugar high and you’ll be reaping the benefits of your baking in no time. First things first, set your oven to 350 degrees, then begin lining your muffin tin with cupcake paper liners and set that aside for later. Using a large mixing bowl or an electric mixer you want to sift in the baking powder, baking soda, salt, cocoa, sugar, and canna-flour and mix them well. In another mixing bowl begin adding the wet ingredients, eggs, vanilla, buttermilk, and vegetable oil and mix on low speed in an electric mixer or whisk together briskly by hand. Next slowly pour the wet ingredients into the dry ones while simultaneously mixing everything together. Once you have your mix, stir in the coffee with a rubber spatula as not to “over mix” your batter. Fill the cupcake tins with the batter about 2/3 of the way full to leave room for your THC treats to fluff up and be pretty. Put them inside the oven and let them hang out in there for about 17-20 minutes or until completely cooked in the middle. (Poke a toothpick in the middle of the cupcakes to check, if the pick comes out clean with no batter then they’re done) When they’re finished in the oven let them sit for 5-10 minutes to cool. Now it’s time to hand out these yummy marijuana chocolate cupcakes and get couch locked. You says you can’t have you cake and get high too? This recepie is very easy and quick to whip up making them great to make as a midnight snack. Peanut butter goodness all mixed in with canna-butter greatness can only lead to one thing, and that’s a very tasty high. This preparation puts a fun twist on a cookie classic and might just leave your mind a little twisted too. Preheat your oven to a nice and hot 350 degrees. Then on a large baking/cookie sheet place some wax paper or grease well with butter or cooking spray. In a large bowl mix together peanut butter, canna-butter, sugar, vanilla, and egg. Once everything’s mixed together, begin rolling the dough into little balls about half the size of a golfball and place them on your already prepared baking sheet. For the finishing touches put a bit of sugar in a bowl to dip a fork in, then press the ever so famous criss cross pattern onto your cookie dough balls. Into the oven they go for only about 12 minutes. Then take them out to cool. Now you’ve got yourself a super yummy cookie fit for a pot head. How to make Peanut Butter Cookies with Marijuana, enjoy! Banana bread is scrumptious comfort food that when biting into it makes you feel like everything’s alright in the world, and this recepie enhances that feeling ten fold. It’s one of those any time of the day foods that is of course that much better when Mary Jane’s included. It also makes for a healthy nutrient rich boost that’s fruity and nutty. Heat the oven to 325 degrees and butter a bread baking tin. First smash the bananas in a large bowl and then add the eggs, sugar, canna-flour, salt, baking soda, and walnuts. Mix all the ingredients in together and pour mixture into your buttered baking tin. Put it in the oven and let it cook for an hour. Once it’s done you get to bite into chewy, nutty, banana bread that not only fills your stomach but gets you baked too! Enjoy Marijuana Banana Bread!! This delicious Tokyo style dessert snack puts bananas in a league all their own and is sweet in all the right ways. With the added canna-flour, these fried bananas would workd great for medicinal patients who’d like to releive pain and eat good at the same time. It’s pretty simple to prepare and might just have you hooked eating your high fried banana style. Depending on the amount of bananas you’ll be making will determine the amount of batter you’ll need. Slice each banana in half horizontaly and then again vertically. In a mixing bowl stir together waffle/pancake mix, canna-flour, cinnamon, and sugar. If using only 1 cup of waffle mix then use a 1/2 cup of milk, or if using 2 cups use 1 1/3 cup measure of milk. Mix well. Next, fill a large pan with the vegetable oil and let that get nice and hot. Remember to be careful when handling hot oi,l it has a tendancy to be mean and pop around when it’s hot. You’ll know the oil is the right temperature if you put a small drop of batter in, and it starts to sizzle and turn brown, now it’s ready to start cooking your special bananas. After bananas are battered, place them in the very hot oil and let them sizzle and get yummy until they turn golden brown in color. Leave them to cool on a plate with 2 paper napkins to soak up any excess oil. Once cooled, add a little more pizazz and sprinkle them with sugar and cinnamon. Or if you’re in the mood to be really naughty, serve with ice cream and indulge yourself in a banana sweet stone. It’s never too early to get high, and marijuana waffles seem to be the best way to get your morning started off right. This recipe calls for canna-flour as well as canna-butter so be ready for a very happy and uplifting breakfast. This same mixture can be applied to pancakes as well, so if flapjacks are your thing you’re still in luck. Stoner Cookbook – How to make waffles with marijuana. In a large bowl you’re first going to mix together salt, sugar, baking powder, and canna-flour. With the separated eggs add the yolks one at a time while simultaneously stirring into the dry mix. In a smaller separate bowl, beat the egg whites until stiff. Next add canna-butter and milk into the dry ingredients and mix it up really well. Lastly add in the egg whites while gently stirring. Make sure the pan you plan to use is nice and hot before you start adding batter. You can use 1/3 to 1/2 of a cup to determine how much should be poured into the pan. When your pan is hot enough, begin pouring in the batter and be ready to flip it when you see bubbles popping up throughout the batter. For even more simplicity, pour the batter into a waffle maker. Now all that’s left to do is grab the syrup and enjoy the most important meal of the day while cheesing from ear to ear, Marijuana Waffles! The infamous weed brownie is infamous for a reason and incorporates two of the best things on the planet; brownies and weed. Brownies are a perfect baked good to share with friends and when you serve these they’ll be knocking down your door to get another taste of your bud brownies. Once you’ve whipped up a batch of these goodies, you might not be able to go back to regular box mix brownies again. You need to set your oven to 350 degrees for this one and take out a 9×3 baking dish. Begin mixing oil, sugar, eggs, and vanilla in a small bowl and blend well. In a larger mixing bowl, combine the cocoa powder, salt, canna-flour and walnuts if you want to be a bit fancy. Next add the wet mix in slowly with the dry ingredients while stirring everything together. Pour the trippy brownie batter into the 9×3 pan. If you happen to have a love connection with caramel, spread over top the batter and with a knife slice through the batter in different directions to allow the caramel to seep into the brownies; oh. my. yum. Pop in the oven and let it cool for about 30 minutes or until it’s no longer gooey. When they’re done, take them out the oven and let them get cool enough to demolish. Slice into brownie pieces and prepare to get lost in a high all mixed in with chocolate and good vibes. Thats How to Make Marijuana Brownies! Snap, Crackle, and Pop would turn into stoners if they tasted these rice krispy treats!. Rice krispies are a common edible found in many medical marijuana dispensaries, but are a really fun project to take on yourself. With whatever dank you choose to use for your canna-butter, you can make these some very potent treats. Start by buttering a 13x9x2 inch pan making sure to coat the entire pan evenly. Melt canna-butter in a large sauce pan on low heat while stirring continuously making sure it doesn’t burn, you don’t want a nasty mess. Once it’s melted, add the bag of marshmallows and mix them in until they’re completely melted as well, then remove from heat. Pour in the cereal making sure to mix it well and to get all the cereal generously coated with the sticky marshmallow mix. Place it inside your pan spreading it out evenly and press down on the mix to help the firming process. leave it to cool while you think about how good it’s going to taste and then cut into whatever fancy shapes you like. If you thought rice kripsy treats were boss before, wait till you experience what the power of canna-butter can do… And thats how to make Rice Crispies with Marijuana! Learn How to Make Marijuana Chocolate Chip Cookies! Without a doubt these were the cookies cookie monster was so chronically addicted to. Everyone and their mom loves chocolate chip cookies. They possess a flavorful chocolate and cookie taste that’s simply irresistable and as a stoner, with these sweets you really get the best of both worlds. They put milk and cookies in a whole new dimension and chances are you’ll want to be there for a while. Preheat the oven to 350 degrees. While that’s getting hot, cover a cookie sheet with wax paper to make them easier to remove when they’re finished. In a mixing bowl combine the canna-butter and sugar. Then add the molasses and vanilla. In a sperate bowl mix flour, baking soda, and salt. Next add the dry mix in with the canna-butter mix and make sure everything’s well combined. After all the ingredients are mixed in well and partying together, fold in the chocolate chips. Roll the dough into spoonful size balls and line them on the cookie sheet. Put them in the oven to bake for about 8-10 minutes or until golden brown. Take them out to cool and you’re done. So sit back, relax, and get cozy with your canna-cookies. You’ve just learned How to Make Marijuana Chocolate Chip Cookies! Oatmeal cookies provide such a hearty bite that it’s hard not to fall in love with them, especially when you’ve got oats and raisins falling out of your mouth. Raisins and oats are both good for your health and so is cannabis. So it’s only right that they join forces to produce this super cookie. So if you love eating, and you love Mary Jane it’s time to start cooking! First heat your oven to 350 degrees. Line a cookie tray with wax paper or use a non-stick pray so you won’t have the headache of cooies that don’t want to come off the pan. In a bowl, combine flour, baking powder, baking soda, cinnamon, and oatmeal, mix well. Grab another bowl and beat eggs, salt, and vanilla. In another large bowl add the canna-butter, oil, and both sugars. Add in the egg mix until creamy and smooth. Then pour in the flour mix and stir everything in together. Now add in the raisins and mix once more. Roll the cookie batter into whatever size balls you’d like and put them on the cookie sheet and into the oven to bake for 12-15 minutes. After they’re out the oven let them cool for a bit. You’ll love biting into these scrumptious cookies, especially when you know what’s in store. Enjoy Making Oatmeal Cookies with Marijuana! Thinking about baking? Well canna-flour is exactly what it takes to make your sweet treats that much sweeter and requires so little preparation, you’d be crazy not to keep a batch on hand. You’re going to be needing very finely ground marijuana for this one, so maybe a few runs through the grinder plus a little added man power to make it dust like. Don’t feel bad about beating the crap out of your nuggets, they’re being put to good use. ½ cup of finely ground marijuana for every 1 cup of flour. Simply ground your choice of KGB as finely as possible until it looks lke powdered weed. Butter is used in a multitude of recepies in cooking and is loved by many, but spread this stuff on your toast in the morning and everyone around will just have to watch you float away, and then ask you for some. Canna-butter is one of the most commonly used forms of cannabis when it comes to cooking and whipping up edibles because of its versatility, and the fact that it’s pure genius in butter form. First, melt the butter in a saucepan on medium heat and when it begins simmering, stir in the dank and let it simmer for 30 minutes. How to make Marinated Chicken Legs with Marijuana… Stoner life isn’t all about snack,s and we do know how to enjoy a well cooked savory meal. Chicken is the bomb, and pretty much everyone on the planet agrees, but chicken that gets you high; whoa! This recipe is a weed smokers dream meal. The marinade is delicious and penetrates through the chicken legs to give you a burst of moist chicken flavor in every bite. Grab a leg and eat it alone, or serve with your favorite side for complete satisfaction. We’re going to start with the marinade, so grab a large mixing bowl and pour in canna-oil, lemon juice, mustard, soy sauce, pepper, and garlic powder. Mix them together. Now place your chicken in the marinade making sure it’s completely coated in the mix. Cover them with plastic wrap and let it sit in the fridge for about 2 hours or longer. (The longer it chills in the marinade the better the taste and the high) After the time passes, preheat your grill to high heat and pour some of the chicken juice on the grill to oil it up and further cook the flavor into the legs. Now put the chicken on the grill and pour the rest of the mixture over top it right after throwing it on the grill. Now let it cook on the grill for about 8-10 minutes or until the insides are no longer pink (when checking for pinkness, pick the largest part of the chicken). If you like your grilled chicken smothered in perfectly sinful sauce, use 2 cups of honey BBQ sauce with 2 teaspoons of canna-oil and stir together, it adds a great finishing touch. This is what you would call a gourmet way to get blown, bon appetit!
2019-04-22T14:57:43Z
https://stonerdays.com/marijuana-stoner-cookbook/
Maya: Hi, my name is Maya, and I am a program officer at a private foundation that cares about making positive change in the world. Right now, I’m looking at a potential venue for a global health conference that my foundation is hosting. It’s still a few months away, but our team has lots of good ideas for the event. It’s going to be great! Narrator: Hi, Maya! Can we talk a minute before you start planning this important event? Maya: Oh…hello! I wasn’t expecting to hear from you today. I’m just working on a conference, booking hotel rooms, lining up speakers. No legal issues here! Narrator: Well, Maya, have you considered whether any government officials will attend the conference? You know, there are special rules that apply when a foundation interacts with someone from the government. You need to consider those rules before you make plans involving a government official because the rules will determine what the foundation may and may not do or pay for under the rules. Maya: Really? We want to invite the Secretary of the US Department of Health and Human Services to the conference. But, we won’t treat the Secretary differently than all the other attendees. Does that resolve the legal concerns? Narrator: I’m afraid not, Maya. If you invite a government official, we have to navigate the legal rules even if the government official doesn’t receive any special treatment or benefits. Maya: Hmm, I wouldn’t have thought of that. After all, we’re all working towards the same important goal… But I’m guessing you can walk me through all the rules before I do any more planning? Narrator: I sure can. And you will see that you can follow the rules and still accomplish your foundation’s objectives while working with a government official. It just takes some planning. And that starts with this course that consists of the five modules listed on your screen. Maya: Great! I want to make sure I understand the applicable rules. After this training, will I have all the information I need? Narrator: Well, this course will be a really good start. But it’s not possible to cover every detail about all the rules that might apply to the different scenarios you could face. What is possible-and I believe will be quite useful for you-is that this course will help you identify the situations when your foundation’s activities may be covered by the IRS tax rules and various ethics rules for working with government officials. Narrator: My goal is to help you learn how to spot issues that require special consideration. As these situations come up, you should seek help from the person at your foundation who is responsible for legal compliance. Depending on your organization, that may be your in-house legal staff, outside legal counsel, or another department responsible for compliance. Your legal advisor can help you analyze each situation and determine what steps you must take to follow the rules while accomplishing your foundation’s goals. And, you can always refer back to this course as a refresher. Narrator: Now, before we get started, if you’re taking a LearnFoundationLaw.org course for the first time, it’s best that you start by clicking the Course Navigation button on the bottom of your screen to learn how to control your training experience. Additionally, if you’re taking this course for the first time we recommend that you go through each module in order, starting with the module called “Overview of the Rules”. If you are a returning user, please select any of the modules to continue with your learning. To mute the sound, click the Mute button. To pause or play, click the… well, Pause or Play buttons. If you want to access a particular section at any point during the training, use the Course Map tab at the top of the screen. Alternatively, you can click on one of these buttons here, which help you track where you are at in the course, and can also take you to a specific module. The Home button will bring you back to this list of modules. Maya: Hi, this is Maya. (Hand over the phone, whispers, “It’s my boss.”) Sure, I can meet tomorrow to discuss the global health conference. I was just working on it. See you tomorrow! I really am glad you are here. Is now a good time to help me with my conference? Narrator: Sure! Before you dive into planning, you need to consider two kinds of rules anytime the foundation will be working with a government official. There are the IRS tax rules and there are federal, state and local ethics rules. Maya: That sounds simple …. and harsh! Narrator: It does, but in practice, it is neither of those things. The rules seem simple, but they can be quite complicated when applied to everyday situations. And while they sound harsh, the IRS tax rules actually permit private foundations to include government officials in many aspects of their charitable activities. But you need to think about these issues before you start working with a government official and definitely before you offer gifts or extend a formal or informal invitation. Maya: So it’s a big deal? Narrator: Yes, it is. The bottom line is that your foundation can get into trouble if it offers or provides a prohibited gift or benefit to a government official-even if the gift or benefit is something that furthers your foundation’s charitable mission. Maya: Okay, then, what I need to know is what my foundation is allowed to do when working with government officials. I’m ready to learn! But first, I have a question about our grantees. Do these IRS tax rules apply to our public charity grantees as well? Narrator: No, Maya. These IRS tax rules relating to government officials do not apply to public charity grantees, as long as the private foundation has not directed grant funds to be used for the benefit of a particular government official. So, assuming you don’t earmark, or tell your public charity grantees they have to provide money or payments to benefit certain government officials, the grantees may have more flexibility than your private foundation when working with government officials. Narrator: You should also know that the IRS tax rules do not apply to foreign government officials. But the rules do cover officials at all levels of the U.S. government, including federal, state and local government. The size of the government agency doesn’t matter. So, even someone at a small department in a small town may be a government official under the IRS tax rules. We’ll talk more about which government employees fit the definition of “government official” in Module 2. Maya: When I think about tax rules and working with the government, I usually think about the prohibition on lobbying by private foundations. Will we be talking about that in this course? Narrator: No, not in this course, Maya. But those rules matter, too, and may come up when you work with government officials. Questions about the prohibition on campaign intervention, also called electioneering, may also arise. If you have questions about either lobbying or electioneering, you should ask your legal advisor. In addition, you can view the courses on Advocacy and Lobbying Rules for Private Foundations and Electioneering Rules by clicking the links on your screen. Click Next when you’re ready to continue. Maya: There sure are a lot of rules to worry about. Who is responsible for getting all of this right? Narrator: Let’s talk about the IRS tax rules first. Each year, when a private foundation completes its annual tax return, it has to report whether it made any impermissible payments to government officials. If it has made an impermissible payment, the foundation is required to undo the payment, and under certain circumstances, foundation executives and government officials may be subject to a penalty tax. Maya: Wow. I really do need to learn these rules! What about the ethics rules? Who is responsible for getting those right? Narrator: For the ethics rules, it’s both the private foundation and the government official, but the penalties generally fall primarily on the government official. Maya: Hmm, it seems like, for their own protection and credibility, a government official would be more likely to want to work with a private foundation that understands the rules. Narrator: Exactly. Keep in mind, that in addition to the legal risks, there are reputational risks. Violating the rules could attract media attention for everyone involved, including the private foundation. Maya: You mean if we get this wrong then the people we’re trying to work with could be penalized and we could all end up on the front page of the newspaper even if no one meant to do anything wrong? Maya: Okay, there is an awful lot to keep track of here. I wish I had a checklist to help me work through the questions I should be asking. What do your internal foundation rules say? This question is important because each private foundation may have its own approach to complying with both the IRS tax rules and the ethics rules. Is this a payment to a government official under the IRS tax rules? If it is, is it a permissible payment to a government official under the IRS tax rules? If it’s not permissible, how can the foundation achieve its objective while complying with the IRS tax rules? Then, once you’re done with the analysis under the IRS tax rules, is this a permissible payment to an employee of the government under the applicable ethics rules? We will call these key questions the “Government Officials Checklist”. The goal of this course is to help you learn to spot the potential issues under the tax and ethics rules and this Checklist should help you do that. See the Resource tab for a printable version of these questions, and remember, when interacting with government officials, you should also always consider the lobbying and electioneering rules. Alright, are you ready for your first Knowledge Check? Click Begin to get started. Maya: Earlier, you said there were two sets of rules, the IRS tax rules and the ethics rules. Are the ethics rules part of the IRS tax rules, or are they something different? Narrator: They are something different. Federal, state and some local governments have ethics rules, otherwise known as gift rules, that dictate what types of gifts and benefits a government employee may accept from a non-governmental source. The federal, state and local ethics rules may define “government official” differently than the IRS tax rules, making navigation of all the rules tricky. Maya: What ethics rules will apply to my work with government officials? Narrator: That depends on where the government officials work. Each branch of the federal government has ethics rules that apply to it’s employees. States and many cities and towns also have their own ethics rules which apply to their employees. Plus, many foreign countries have ethics rules for their employees. We can’t cover all of these rules in this course, so we are going to focus on a few rules that are most likely to come up in your work. Maya: What’s the point of all these rules? Why make it so difficult to work with government officials? Narrator: That’s an important question, Maya. The rules are designed to ensure that government works for the benefit of everyone, not just a few. The rules prevent government officials from accepting inappropriate gifts or benefits from private parties, including foundations. Both the IRS tax rules and the ethics rules are designed to prohibit the sorts of transactions that people believe lead to corruption in government. Maya: Wow, these rules may make my job harder, but they do serve an important purpose. Aren’t there other laws that deal with corruption and bribery? Are you going to talk about those, too? Narrator: Not in this course, Maya, but if you would like to learn more about them, you can view the course on Anti-Bribery and Anti-Corruption by clicking the link on your screen. When you are ready to move on, click Next. Narrator: Okay, Maya. Now that you understand what rules we need to consider, let’s start planning your conference. It sounds very interesting. Maya: Well, my team just got approval for the conference on global health. We have been bouncing around lots of ideas but don’t have any set plans yet. We’ve identified quite a few people from government who may be interested in attending. Narrator: First, consider what your foundation rules say before you start to implement any idea. As a foundation employee, you should know and follow the foundation’s internal policies because they were adopted to protect the foundation and its resources. You may find that your foundation does not permit certain activities even if they are allowed by the law. Maya: Good point. I am sure the foundation policies were drafted with both the legal requirements and the foundation’s reputation in mind. It makes sense to start there. I will consult my legal advisor to make sure I am not missing anything, but, in looking at my foundation rules, they say we are allowed to invite government officials to conferences. Who is a Government Official? Maya: So, let’s move on to the next question: Is this a payment to a government official under the IRS tax rules? Is everyone who works in government a “government official” under the IRS tax rules? Narrator: No, not everyone. But the definition of a “government official” in the IRS tax rules is quite technical and can be complicated to work through, so you should consult with your legal advisor before deciding that a government employee is not a government official. One option is to treat all government employees as government officials. You can’t get into trouble if you do that. Click the button on your screen to see exactly who is a government official under the IRS tax rules. When you’re ready to move on, click the Next button. Maya: Practically speaking, government officials may not be able to attend the conference unless the foundation flies them in, gives them a place to stay and provides meals. What about those costs? Are they allowed? Narrator: Yes, they are, within certain limits. A foundation is permitted to pay travel expenses for government officials within the United States, including meals and lodging, if the travel is for a charitable purpose. In this example, we already know the global health conference is being held within the U.S., and it is related to the foundation’s charitable purpose. Maya: Does that mean that if the foundation held a meeting in a foreign country, a government official could come and participate, but the foundation couldn’t pay for their airfare or for their meals and lodging? Narrator: That’s right, Maya. A foundation can only pay for expenses associated with domestic travel. That means travel must begin and end in one of the fifty states or the District of Columbia. Travel cannot begin or end in a U.S. possession or territory, like Puerto Rico, or in any foreign country. Maya: I’m glad this conference is in the U.S. But we can still pay expenses for the foreign health minister to come, right, since the IRS tax rules only apply to officials of governments in the U.S.? Narrator: Correct! Although it’s always important to be mindful of other rules that might affect payments to foreign government officials, such as the U.S. Foreign Corrupt Practices Act or any rules in the foreign official’s home country. Maya: Okay, what about the limits you mentioned? Narrator: Well, in addition to the domestic travel limitation, there is a limit on cost. The foundation can pay no more than the actual cost of transportation, which most foundations apply to mean no more than a reasonable amount. Maya: That seems simple enough. Our foundation prefers to book and pay for travel through our travel service. Is that okay? Narrator: Yes, that’s perfectly fine. The rules allow you to pay for actual travel expenses directly or through reimbursement, or you can even make reasonable advances for expected travel expenses. Maya: So, now it’s on to the next question in the checklist: Is this a permissible payment to a government official under the IRS tax rules? In other words, is it permissible for the foundation to invite government officials to attend a conference it is sponsoring? Narrator: Yes, a government official is permitted to attend or participate in a conference sponsored by the foundation in furtherance of the foundation’s charitable purposes. And, Maya, I understand you are focused on your global health conference right now, but you should know that this same principle applies to other foundation meetings like the foundation’s board or committee meetings. The key is that each meeting must be in furtherance of the foundation’s charitable purposes. Maya: That’s good news, and I’ll remember that this doesn’t just apply to something labeled a “conference.” But this time we are hosting a conference, and it will definitely further the foundation’s charitable purposes because it’s about educating people and solving global health problems. But the government official will also receive some benefits from attending. Is that okay? Narrator: Yes, it’s clear that information and materials offered to a government official in connection with the conference are not a problem under the IRS tax rules, provided those materials are related to the educational purpose of the conference. For example, you might want to provide written or electronic materials to attendees before, during and even after the conference. Maya: That makes sense. If we are holding a conference to educate people, we certainly should be able to provide them with educational information. Maya: But can we spend money to make sure the conference is enjoyable? Can we hire entertainment? Narrator: Well, Maya, what do you think? Maya: Hmmm. I think that if the entertainment is related to the charitable purpose of the conference, then it’s okay. Like if a grantee wants to have a student band perform to show off how its program benefits kids, then that should be okay. But a popular singer or rock band, maybe not so much. If I have any questions, I’ll ask my legal advisor. Narrator: That’s right, Maya! You get it. Narrator: Maya, who would you like to invite to the conference? I can help you figure out if they are government officials under the IRS tax rules. They sound like government officials to me! Narrator: I can see why you would think they are all government officials. But, according to the IRS tax rules, only two of these individuals count as government officials: the Secretary of the Department of Health and Human Services and her top policy advisor. Maya: Really, that’s surprising? Why isn’t the foreign health minister on the list? That’s a pretty important job. Narrator: Remember, Maya, the IRS tax rules only apply to U.S. government officials. So the IRS tax rules don’t apply to a foreign health minister. However, other rules apply that you should be mindful of, such as the Foreign Corrupt Practices Act and foreign country ethics rules. Narrator: The IRS tax rules also don’t cover “special government employees”, essentially, part-time or short term employees. The White House task force member is very likely a special government employee who is not covered by the rules. Maya: Thanks, I wouldn’t have guessed that either. I will definitely consult with my legal advisor about who is-and who is not-a government official. Narrator: One other way to get help is to ask government employees to sign a form indicating whether they hold a position that is covered by the IRS tax rules. Maya: That’s a great tip and certainly would help show that the foundation is trying to follow the rules. Maya: Okay, now I know that I can pay the actual costs of transportation. Can I do the same thing for other expenses, like meals and lodging? Narrator: Well . . . up to a point. There is a limit. The IRS tax rules say that a foundation can pay for the actual cost of meals and lodging if they are related to its charitable purpose, but only up to a specified amount. The limit is based on the per diem amounts that have been set by the federal government for its employees. Foundations are permitted to pay actual costs for other travel expenses, such as food and lodging, but only up to 125% of the maximum federal per diem rate, set for the relevant destination and time of year. Maya: So, actual costs that exceed that standard per diem amount would be an impermissible payment for a private foundation? Narrator: That’s right, Maya, in most circumstances. However, your legal advisor can help you determine whether a special per diem rate might apply. Your global health conference might qualify for this special per diem rate if all the lodging and meals take place at the same venue where the conference is being held. Maya: Okay, but it sounds like I should never plan to pay expenses above the standard per diem rate without approval from my legal advisor. Narrator: That is absolutely right! Do you have any more questions about per diem expenses? Maya: Yes, I do. How can I tell the difference between an expense that is related to the conference, which is not subject to per diem limits, and the expense of a meal, which is subject to the per diem limits? This is why I’m asking: My boss knows of a great speaker for a lunchtime session who does a multi-media presentation. We’ll need to rent special equipment to do it. Does that sort of expense count as part of the cost of the meal? Narrator: As long as the speaker is related to the charitable purpose of the conference, it is not counted as part of the meal expense. The fact that people may be eating during the presentation doesn’t change the treatment of those expenses. Maya: Okay, one more question: What about gift bags? I mean people are traveling all this way, it’s inconvenient, they get behind at work, they don’t see their families for a few days … It seems like we should be able to offer them something nice for their trouble. Narrator: Well, it depends on how much the gift bags are worth, Maya. There is an exception to the IRS tax rules for token gifts. And by “token,” I mean gifts from the foundation that are worth no more than $25 in total to the government official in a calendar year. So if you provided a token gift to the official earlier in the year worth $10, you could only spend $15 on the government official’s gift bag at this particular conference. Narrator: Nope, sorry, Maya. SWAG is out of bounds. Fancy gifts are unlikely to have any relationship to the foundation’s charitable purpose. So, if they have a value of more than $25, aggregate in a calendar year, they are not allowed. You may also want to check your internal foundation policy. Some foundations do not allow for even token gifts to government officials. Maya: Okay. I get it. The key thing I learned is that, so long as we stay within the limitations, our conference and associated travel expenses are permissible payments to government officials under the IRS tax rules. Narrator: That’s right, Maya. And for your further learning, click the button on your screen to see a list of payments to government officials that are not permissible under the rules. When you’re ready to move on, click the Next button. Maya: Got it. Let’s move on down the checklist … What do the ethics rules say that might affect our planning of the global health conference? Maya: I remember you said that we can tell which ethics rules apply if we know where a government official works. Well, we know we would like to invite officials who work for the Department of Health and Human Services. Narrator: That’s right, and they are both covered by the federal executive branch ethics rules. And the task force member is, too. Like I said earlier, special government employees aren’t covered under the IRS tax rules, but they are covered under federal executive branch ethics rules. Maya: Okay, that’s kind of tricky when the IRS tax rules and the ethics rules cover different people. Narrator: You’re right-it can be tricky. You should assume that anyone who works for the federal executive branch is covered by the ethics rules, whether they are political appointees or civil servants. The executive branch ethics rules spell out what executive branch employees are able to accept from private parties, like the foundation. This includes “gifts” such as meals, lodging, and travel. Maya: Do the executive branch ethics rules allow the Health and Human Services secretary, her policy advisor and the task force member to attend our conference? Narrator: They can attend if the agency they work for says it’s okay. Each person must get prior written approval from their executive branch agency to accept payment for travel expenses. Generally, an agency will approve the payment if it is related to the official duties of the employee and the travel is in the interest of the government. Maya: Will our conference qualify? Narrator: I expect it will. Maya: So, this is my takeaway: As long as executive branch employees get advance approval from their federal agency employers, they can attend and participate in the conference and the foundation can pay for all of their reasonable expenses for travel, food and lodging. Is that right? Maya: Okay! So the Health and Human Services employees and the task force member should be able to come to the conference. Are we done with the rules on the conference for now? I feel like I’m ready to start talking about all of this with my boss. Narrator: We’re almost done. Remember that the foreign health minister may attend, so you should work with your legal advisor to determine whether any ethics rules apply to the foreign government official and how your foundation handles payments involving foreign officials. One final key piece of advice… Navigating all these rules and getting any required government approvals takes time. You don’t want to have to deal with these issues at the last minute. It’s a good thing you still have some time before your conference to plan. Alright Maya, ready for another Knowledge Check? Click Begin to get started. Maya: Oh hi, Evan, how’s it going? Evan: Well I’ve been working on a project on nutrition in schools. I have been trying to get a meeting with the Health and Human Services policy advisor who is coming to your global health conference. Would it be okay if I invited her to a dinner while she’s in town for the conference? I am also inviting a senior congressional staffer, the city school superintendent and a couple of other foundation staff. The dinner would be kind of a working session where we get input on a grant program we’re planning. Maya: That seems like a good opportunity. I have been learning about the rules on working with government officials and they can be complicated. Before extending an invitation, you should check with our legal advisor. Evan: Thanks for the tip, Maya. Will do. Maya: Hello? … Did you hear Evan’s question? I’m curious, is the foundation allowed to invite these government officials to a meeting. Does it matter that a meal will be served during the meeting? Evan: Hey, do you mind if I listen in? I could learn something. Narrator: Sure you can, Evan! And, hi, Maya. Great job spotting this issue. Let’s use our Government Officials Checklist to think about your question. Maya: Got it. So the first question we need to ask is: What do your internal foundation rules say? I checked my foundation’s rules earlier today, and they say we can invite government officials to meetings as long as we get approval from our manager and comply with all applicable legal rules. Evan: My boss has already approved it! Maya: I think we are ready to move on to the second question on the checklist! Narrator: Sounds good, team. So, is this a payment to a government official under the IRS tax rules? Maya: I know the safest thing is to assume every government employee is a government official under the IRS tax rules, but I am going to check anyway. Narrator: If you would like to look at the definition of government officials with Maya, click on her laptop. Click the Next button when you’re ready to move on. Maya: So, according to the definition of a government official, the policy advisor and the congressional staffer are government officials. What about the school superintendent? Narrator: Because the school superintendent reports to the school board, which makes the policy, he is not a government official. Click on each person to see why they are or are not covered under the IRS tax rules. Click the Next button when you’re ready to move on. Maya: Two out of the three potential guests are “government officials,” so the dinner expenses will definitely have to comply with the IRS tax rules for payments to government officials. So, next question… Is this a permissible payment? Narrator: The short answer is yes, but it will have to be a moderately priced dinner that fits within the IRS tax rule limits. Under the IRS tax rules, there are two types of permissible payments that might cover a meeting with government officials where a meal is served. One is the token gift exception. Maya: Isn’t that limited to $25, aggregate for the year? Would it have to include taxes and tip, too? Narrator: Yes, the limit is $25 per calendar year for all gifts given by the foundation, so you have to consider if anyone else at your foundation has already given a gift to the same government official. And the value of the meal should include tax and tip. Maya: Twenty-five dollars is not very much to spend… Remind me of the second type of permissible payment that might cover a meal? Narrator: Under the IRS tax rules, as long as the expenses are incurred for a charitable purpose, a foundation can pay for meals based on the per diem amount set by the federal government. Maya: Oh that’s right! That’s the same analysis we did about meal expenses for the global health conference. This meeting has a charitable purpose, too, so we should be able to pay for a meal based on the standard per diem rate. Narrator: Yes, as we talked about earlier, your legal advisor can help you determine the maximum allowable amount for a meal based on the standard per diem rate. Remember, though, that the amount will be modest, probably not significantly more than $25. Click the button on your screen to learn more about the Standard Per Diem. When you’re ready to move on, click the Next button. Maya: Can Evan use the special per diem rate for the dinner that we may be able to use for the global health conference? Narrator: Probably not, Maya. Evan should discuss it with your legal advisor to be sure, but the special per diem rate is generally not an option for private meals attended by a small group, even if everyone present is working on foundation business. Narrator: That’s a good segue…. Let’s consider the next question on the Government Officials Checklist: How can the foundation achieve its objective while complying with the IRS tax rules? The objective is to get these people together for a working session to get input on a grant program. Evan: You’re right, and that can happen without a dinner. Maybe we could all meet at the foundation for our working session? If we meet at an earlier or later time, we won’t need to worry about dinner. Maybe I can offer light refreshments like we do for most meetings at the foundation. Or, we could meet somewhere before the conference for coffee and bagels? That would be very inexpensive and still give us a chance to talk. Narrator: Good job thinking up options, Evan. The key thing is to think about ways you can achieve the foundation’s objective while following the IRS tax rules. This is why it’s so important to plan ahead. Maya: Isn’t that the truth! Before I learned about the rules for working with government officials, I would have thought it was fine for Evan to have this dinner and then, after the fact, the foundation would have had some problems to deal with. Maya: Okay, now let’s move on to the ethics rules. We have invitees from three different places in government, so I guess I have to consider separate ethics rules for each one of them. We have the congressional staffer, the policy advisor and the city school superintendent. Narrator: You’re right, Maya. Let’s look at the rules for the congressional staffer first. The Congressional ethics rules tell us what members of the U.S. Senate and the U.S. House of Representatives and their staff can accept from private parties, like the foundation. This includes gifts, such as meals or travel. Maya: Even though it looks like having a meeting with dinner may not be the best option under the IRS tax rules, can you tell me whether the congressional ethics rules would even allow it? Narrator: The congressional ethics rules currently allow the foundation to provide meals to Members of Congress and their staff under two main circumstances. The first way is if the meal is less than $49.99, and gifts given to the person by the foundation for the calendar year, including the meal, total less than $100 in value. The second way is if the meal is part of a “widely attended event”. Maya: What counts as a widely attended event? Would Evan’s dinner count? Narrator: Unfortunately, no Maya. Widely attended events are not small meetings like the one you are thinking about. They are larger events like conferences. Click the button on your screen for more information about what events may qualify as “widely attended events”, and click the Next button when you’re done. Maya: Now let’s think about the possible alternatives that would be permissible under the IRS tax rules and whether those are also allowed under the congressional ethics rules, such as having a meeting at the foundation with refreshments or going out somewhere and meeting over coffee. Narrator: Sure. The congressional staffer should be able to attend either the meeting at the foundation or at a coffee shop because the congressional ethics rules allow members and staff to accept non-meal food and refreshments of nominal value like modest hors d’oeuvres or appetizers, coffee, soft drinks and other beverages, and continental breakfast. Maya: All of this information has been really helpful. Do I need to know anything else about the ethics rules? Narrator: Two things. First, you should be aware that I am talking about the congressional ethics rules that apply when an organization does NOT employ or retain a federal lobbyist. Private foundations will usually fall into this category. You should ask your legal advisor if you have any questions about the stricter rules that apply to lobbying organizations. Maya: Okay, that’s good to know. What’s the second thing I need to know? Narrator: The second thing is to remember that executive branch employees and local government employees are subject to their own specific ethics rules. So, you’ll need to work with your legal advisor to check those ethics rules as well before sending out any invitations. Maya: Okay, I will give our legal advisor a call as soon as we are done talking. Narrator: Sounds good. In the meantime, click Begin when you’re ready to move on to the Knowledge Check! Maya: Hello, this is Maya! Hi, Evan. I’m glad you got clearance to have your meeting with the congressional staffer, policy advisor and school superintendent. I think it’s a great idea to skip the outside dinner and instead have the meeting here at the foundation with some light refreshments. Wow, thanks. Since the meeting will take place here at the office, I would love to join you. It would be great if we could give the attendees a small token to remind them of our work with the local schools. Before we offer anything, we need to make sure it’s okay under the rules. Let me do some research and I’ll get back to you with some ideas. Narrator: Hi, Maya – shall we take a look at the Government Officials Checklist again? Maya: Sure, let’s do it! I first need to check my internal foundation policies. They say that we can provide token gifts to government officials if we get approval from our manager and comply with all applicable legal rules. Narrator: Okay, next: Is this a payment to a government official under the IRS tax rules? Maya: Well, the congressman and the policy advisor are definitely government officials under the IRS tax rules. Narrator: So, what “payments” are you concerned about here, Maya? Maya: Well, I am wondering about what kind of gift we can give. I like the idea of a plaque that talks about the schools, or maybe a framed photo. These typically cost about $75 each. Is that okay? Narrator: No it’s not, Maya. Remember the IRS tax rules only allow gifts with a total value of $25 in a calendar year. Maya: Hmmm, that’s pretty low. The foundation sometimes gives a book published by one its grantees, but it retails for $35. So that’s out. We also have some cool mugs and T-shirts that might fit under the limit.. Hey, I know I’m thinking out loud a bit…Doesn’t it make sense to also consider what the ethics rules say about this before we make any decisions? Narrator: Yes, it does. Actually, the congressional ethics rules would have allowed the foundation to give the plaque to the congressional staffer, but, as we just discussed, that’s not permitted under the IRS tax rules. Narrator: The congressional ethics rules do allow the congressional staffer to accept token gifts and items of little intrinsic or nominal value. You should check the cost, but the coffee mug or t-shirt are probably okay under both the IRS tax rules and the congressional ethics rules. Click the button on your screen for more information about token gifts and items of nominal value permitted under these congressional ethics rules. When you’re ready to move on, click the Next button. Maya: Well a coffee mug or t-shirt is not really what I had in mind … What about a jacket? Our foundation has some cool jackets left over from a research trip. We wouldn’t have to buy anything new. Wait, sorry, I know it’s about the value, not whether we purchase it for this event. Okay, the jackets are worth more than $25. They also are not permitted under the IRS tax rules. Maya: Oh, that’s right. What rules apply to the Health and Human Services policy advisor? Narrator: Well, just like the congressional staffer, it might have been okay to give him the plaque. Executive branch officials are generally allowed to accept gifts of nominal value for presentation. Narrator: Additionally, the executive branch ethics rules generally allow executive branch officials to accept gifts valued at no more than $20 per occasion up to $50 per calendar year in total. Maya: $20? I guess the mug or the t-shirt would still be permissible, but , again, that’s not really what I had in mind. Narrator: Maya, it’s time for some creative problem solving: How can the foundation achieve its objective while following the rules? Maya: I knew you were going to ask that. And I suppose the answer is that we either go with the mug and t-shirt, or just decide that it’s better not to give a gift. Giving a token gift may not be worth the time and trouble. After all, we don’t really need to give a gift. Our primary objective is to get broad input on the proposed grant program to support the local schools. A gift, in the end, is just not that important. One last question: Can we still give a gift to the superintendent? Her assistant told Evan that we don’t have to worry about the state or local ethics rules for her. Narrator: Well, Maya, my advice is that you should check in with your foundation’s legal advisor about that. While the ethics rules are primarily the responsibility of the government employee, the superintendent’s assistant may not be familiar with the rules, and the consequences of getting it wrong could be bad for the superintendent and for the foundation. Maya: Okay, I’ll be sure to do that. Narrator: It’s that time again. Click Begin to complete another brief Knowledge check. Oh, really. Those sound like interesting opportunities. Keep my posted! Are you there? My boss just told me about three other possibilities for working with government officials. First, we just had a new position approved for the team and my boss thinks the senior congressional staffer who attended the global health conference is the perfect person for the job. He understands our issues really well. I remember that he’s a government official. Are there any rules on hiring government officials that we need to worry about before we contact him about the possibility? Narrator: Hi, Maya. Let’s pull out the Government Officials Checklist. Maya: Ok, first question: “What do your internal foundation rules say?” My boss said that our legal advisor and the human resources team were okay with us considering this person as a candidate. They said it doesn’t violate the foundation’s conflict of interest policies to consider a government employee, but we need to do it in a way that complies with any legal obligations. So what’s next? Narrator: You know this prospective foundation employee is a government official under the IRS tax rules, so what you need to think about is whether it’s a permissible payment? Maya: I need some help with this. Is it a permissible payment? Narrator: It can be. The IRS tax rules permit a private foundation to hire a government official as long it follows one simple rule: The foundation cannot agree to hire a government employee more than 90 days before the employee leaves government service. For example, if the foundation agrees on March 1 to hire the congressional staffer, he must terminate his government employment within 90 days of March 1, or the foundation will have violated the IRS tax rules. Maya: Okay, that is pretty easy to understand. Let’s say it takes us four months to bring someone on board. Entering into an employment agreement now-four months early-is not allowed under the IRS tax rules, and that matters because I know the staffer is a government official. So, I can achieve my objective by waiting to enter into the agreement until I know the staffer can leave his current position within 90 days. That’s pretty clear. We should be able to follow that rule without too much trouble. And it makes sense, too. It seems like a reasonable requirement to prevent corruption in government. Once someone has agreed to work for us, I can see how it might be problematic if they continued as a government employee. Normally, we would talk about ethics rules next. But there’s no gift here. Maya: Normally, we would talk about ethics rules next, but there’s no gift here. Narrator: That’s right, Maya, but just like the government has rules about employees accepting gifts, the government also has strict rules about the future employment of its employees. The government’s post-employment rules kick in as soon as negotiations for employment start. Maya: That’s good to know. Anything we have to do to comply with the rules will be worth it. This staffer is really knowledgeable about our issues. Narrator: Your foundation should also be aware that some of the post-employment restrictions continue even after the government employee has taken a new job. There are often restrictions on the sorts of contacts former government employees can have with their former employer. In addition, they may not be able to work on matters they worked on while in the government. In some cases, those restrictions expire after a certain period of time, but not in all cases. And the penalties for violating these types of rules can be severe. Maya: Thanks for the warning. We will be very careful about how we handle the negotiating process. And then we’ll be sure to understand what the former staffer-if we’re lucky enough to hire him-can and can’t do once he’s on board at the foundation. Narrator: Some foundations require their new hires from government to ask their former employer to give them written information explaining the applicable post-employment restrictions, before they leave government service. That’s one way of being sure that the foundation understands what the staffer can and can’t do once he’s on board. So, what was the next opportunity your boss told you about? Maya: Okay, I have one more question about employment from the conversation with my boss. She said the White House wants our foundation’s senior vice president to serve on a presidential commission. We want her to do it, but how does that work? How can she still be our employee and accept a paycheck from the foundation if she also works for the government? Narrator: This can work out under the IRS tax rules, if her position on the commission fits the description of “a special government employee.” “Special government employees” are not subject to the IRS tax rules. Narrator: A special government employee is someone who is retained, designated, appointed, or employed to perform temporary duties, with or without compensation, for not more than 130 days during any period of 365 consecutive days. Maya: How do you count the 130 days? Do we just count up how much time our employee will spend in commission meetings each year? Narrator: No, Maya. You need to count all the time-phone calls and any other work on commission business. Have your foundation employee keep track of her time, so you will know if you need to start thinking about an alternative solution under the IRS tax rules. Maya: Okay, for now, it sounds like her commission service will make her a special government employee and the IRS tax rules won’t apply. But what about ethics rules? Narrator: Although the IRS tax rules don’t apply to special government employees, the executive branch ethics rules do. So, be aware of that. Your foundation’s senior vice president should consult your legal advisor on how her foundation duties and her commission duties might intersect. Maya: Thanks! This has been super helpful! Narrator: Ok Maya, ready for the final Knowledge Check? Click Begin to get started. Maya: This one is not about an employee coming from government to the foundation. It’s about an employee going in other direction-that is from the foundation to government. One of my colleagues has the chance to go work with a federal government agency on a temporary basis. Have you ever heard of anything like that? Narrator: Yes, I have heard of it. There is a federal law called the Intergovernmental Personnel Act (or the IPA). It provides for temporary assignments between federal government agencies and eligible organizations, including private foundations. The point of the program is to allow organizations and government to share resources and expertise to solve mutual problems and improve public services. Maya: It sounds like there is a good policy rationale for IPAs, but do the IRS tax rules allow the foundation to permit an employee to participate in an IPA and go work for the government temporarily? Narrator: It is possible for a private foundation to participate in an IPA-or to fund a grantee to participate in an IPA-without violating the IRS tax rules, but not in every case. Each IPA assignment is structured according to an agreement between the agency and the participating organization. So the terms of that agreement determine whether an IPA is permissible under the IRS tax rules. Maya: This sounds like something that is very fact-specific. My boss will need to work closely with our legal advisor to see if we can make this work under the tax rules. Narrator: That’s exactly right, Maya. Maya: What about the ethics rules? How do they apply to a foundation employee on a federal IPA assignment? Narrator: Generally speaking, the executive branch ethics rules will apply to IPAs, whether the assignment is in to or out of the federal government. But each IPA assignment is subject to the terms of the agreement, and it should spell out how issues like travel expenses should be handled and how costs might even be shared between the federal agency and the foundation or grantee. The foundation should expect to work through concerns about possible conflicts of interest and other ethics issues when it negotiates the IPA agreement with the agency. Maya: Wow, I am glad that my foundation’s legal advisor will be involved as the IPA agreement is structured. This sounds complicated. Maya: This has been great! I’m going to quickly write down the main points that I need to keep in mind. One, special rules apply when working with government officials. And three, find out the expenditure limits. Narrator: I think those are great takeaways, Maya. Maya: I’m leaving today feeling confident that I have a general understanding of the rules for working with government officials. I know that I can use the Government Officials Checklist to help me consider how the rules apply to foundation activities. And most importantly, I understand that my legal advisor will be a great resource to help me accomplish the foundation’s objectives while complying with the rules on government officials. Narrator: It’s been great talking with you today, Maya. I’m glad you found this helpful. You can use this course as a reference, as often as you need. To access any topic of interest to you, you can click the Course Map button. If you want to return to the Home screen, then click … you guessed it … the Home button. You can now print a certificate of completion and provide feedback on the course. We hope you will take the time to give feedback. Your input will help us design future courses! See you next time!
2019-04-24T13:30:55Z
http://learnfoundationlaw.org/transcript/working-with-government-officials-course-transcript/
Invite us to your school or next learning event. Explore how a design thinking approach to curriculum can help overcome the traditional structures in classrooms and nurture a culture of innovation. In this workshop, participants will develop knowledge, understanding, and proficiency in using Google and the Web to develop student-centered, creative, and community-minded learning environments. In this hands-on session, we will use elements of Design Thinking to begin the process of crafting new PBL experiences. In this workshop, we will explore how various tools and apps can facilitate differentiation and personalization and create rich learning experiences that meet the needs of ALL students. Gain an abundant time to explore sites, tools, apps, and strategies that can be applied to any device – and any classroom – in order to help students develop into master learners. In this workshop, we will explore the evergreen uses of technology in specific content areas to suit the needs of the grade and level. Use the table below to browse all our workshops filtering by Topics, Grade Level, and more. 3D Printing Onsite Your School Greg Kulowiec 1-2 days By Appointment 3D Printing, 3D Printers, 3D, MakerSpace, MakerEd, Design Thinking Elementary, Middle School, High School All devices As schools are making 3D printers available to students for creation of real world, tangible models of their 2D prototypes and designs, educators are placed in a challenging position to develop an effective and meaningful vision for integrating this emerging technology into their classroom. This one (or two) day workshop will help build capacity to use a 3D printer in an educational setting and will explore a framework for the meaningful and intentional use of 3D printing. Through examining existing use cases, projects and classroom ideas, workshop attendees will leave the workshop with increased technical skill and practical application of 3D printing in the classroom. We will explore free, web or app based design platforms that allow students to create models ready for 3D printing. Further, we will explore the process of creating problem-based learning experiences for students that move 3D printing beyond a repetitive checklist where all students print an identical, prescribed object, to one where students design and print an object with the intention of solving a meaningful problem. The workshop is designed for educators of all grade levels and for those beginning or intermediately involved with 3D printing in education. Artificial Intelligence & EdTech Onsite Your School Shawn McCusker, Greg Kulowiec 1 or 2 days By Appointment AI, edtech, Artificial Intelligence All devices With Artificial Intelligence poised to have an impact in many facets of our society, it is critical that we begin to consider and explore the implications for AI in education and the classroom. The session will explore the current state of AI and will be an entry point to begin the discussion about where AI is going in education in the near future. Assessment in Tech-Infused Classrooms Onsite Your School Tom Daccord 1 Day By Appointment Assessment, Formative, Formative Assessment, Quiz ALL All devices Technology allows students to demonstrate their learning in a variety of ways, allowing educators to differentiate instruction and gain a deeper understanding of student learning. In this session we’ll take a look at how you can use digital tools for assessment with learners before, during and after learning with a focus on how to enhance and develop students metacognition. A wide variety of strategies will be shared for assessment during direct instruction, activities and larger projects allowing you the educator to use the results to inform and refine your lessons. Augmented and Virtual Reality: Fostering Innovation and Engagement in EDU Conference Boston Shawn McCusker 1 Day November 5,2018 AR, VR, Augmented, Virtual, Augmented Reality, Virtual Reality Middle School, High School All devices For educators looking to take their technology-rich classrooms, schools, and districts to the next level, Augmented, Virtual, and Mixed Reality: Fostering Innovation and Engagement in EDU is for you. Educators will spend the day learning the why, what, and how behind the integration of AR, VR, and MR in any preK-12 classroom. Discover innovative ways to transform teaching and learning with pedagogical practices that align with the International Society for Technology in Education (ISTE) Standards and help consistently redefine students’ learning experiences. Immersive technology is taking education by storm. Learn how to take students on virtual reality field trips, manipulate 3D objects, augment the world around them, and more. In this workshop, participants will experience first-hand the immersive capabilities of AR, VR, and MR in the classroom and begin aligning those experiences with student standards of learning to increase the rigor, relevance, and engagement. Participants will then curate tools, resources, and lesson ideas to transform the learning experiences of their students. And finally, participants will learn how to create their own immersive experiences and help foster student creativity with immersive technology. Deeper Learning for a Modern World Conference Vermont Tom Driscoll 2-day April 3-4, 2018 Personalized Learning, Learner Profile, Deeper Learning Elementary, Middle School, High School All devices As our world continues to shift in many ways, so to do the knowledge and skills needed to navigate our evolving knowledge economy and interconnected global community. Deeper learning represents a set of key competencies that today’s students must develop to thrive in our modern world. Built upon a strong foundation of academic knowledge, deeper learning classrooms and schools foster learning environments that promote the application of student knowledge in authentic and challenging ways. These environments call upon students to develop questions, iterate on ideas, and apply what they have learned in real-world contexts. Key student competencies that transcend several deeper learning frameworks include critical thinking, collaboration, communication, developing academic mindsets and, what many consider most essential, learning how to learn. In this day #1 session, participants will dive into the core competencies of Deeper Learning and engage in case studies of schools and districts across the nation that have effectively fostered deeper learning environments. Differentiated Instruction thru Technology: A Foundation for Instruction and Learning - Conference Vermont Rosey McQuillan & Avra Robinson 2-day April 3-4, 2018 Differentiation, Differentiated Instruction, Personalization Elementary, Middle School, High School All devices This course will begin with defining Differentiation and Universal Design and how technology can meet the needs of student variability inherent in all classrooms. We know that it can be challenging to design the learning environment and experiences that meet the needs of all learners. We will look at Universal Design for Learning (UDL) as a way to remove barriers in the designing of the classroom environment and implementation of the curriculum so that all learners can be successful. Participants will explore how technology can be leveraged to facilitate differentiation and foster self-advocacy in students. Differentiation is not a one-size-fits-all solution; rather, it is a flexible approach to teaching in which educators actively plan for the differences in their students. The goal is for students to be able to effectively learn, see themselves as learners and take ownership for their learning. By utilizing technology to differentiate instruction, teachers can better ensure that learners can achieve the skills and strategies necessary to foster student advocacy. What Does Awesome Look Like? Design the School of the Future Onsite Your School Tom Daccord 1 Day By Appointment ALL ALL All devices “If you don’t know where you are going, how do you know you’ve arrived?” At some schools tech-integration programs are stagnating because they do not have a galvanizing vision of enhanced teaching and learning. The first step to successful innovation is to imagine what is possible. So, what if there were no limitations? What if resources were not a problem? What would the ideal learning environment look like? In this hands-on session, we will collaborate to create an ideal school for the future from three diverse perspectives - physical space, curriculum & pedagogy, and professional learning. Learn the importance of vision and planning and what happens in its absence. Whether you are a school administrator, a division head, or a technology advocate, come contribute your ideals to see what could be possible and start planning for it. What Will Future Learning Look Like? Onsite Your School Tom Daccord 1 Day By Appointment ALL ALL All devices EdTechTeacher believes that schools should be leveraging computers and devices as “hubs of innovation” that teachers can use to nurture learning skills, competencies, and habits of mind that provide students essential skills for tackling new and demanding cognitive challenges. With the increased mobility, personalization, and differentiation possible in a world of mobile devices, what will the future of student learning look like? This workshop is designed to explore near-term technology developments that will transform classrooms of the 21st century. For one, educational publishers are actively surpassing the affordances of print with a variety of technologies and innovations, including 3D simulations, embedded videos, interactive maps and photos, formative quizzes, reading and writing aids, the ability to share notes and bookmarks, audio commentaries, regularly updated and searchable content, music, etc. -- all with one’s fingers on a tablet. Second, virtual reality and artificial intelligence are poised to change the way students view and interact with educational content. Come explore a range of scenarios developed by academics, research organizations, and tech savants that are likely to impact our students in the near future and discuss how we might best prepare for that future. Entrepreneurship in the Digital Age Conference Vermont Greg Kulowiec 2-day April 3-4, 2018 ALL, Networking, Design Thinking, Entrepreneurship, Digital Age, iPads, Chromebook, Collaboration, Content creation Middle School, High School All devices With current and emerging technologies, the barriers that have historically existed for students to engage in entrepreneurship are nearly non-exsitent. Through connecting with experts in their field, to networking via technology, to building a brand and virtual business, the purpose of the workshop is to explore the potential for students to define a problem, identify a market & space to engage as a digital entrepreneur. In day one of the workshop we will explore what is possible in the world of entrepreneurship with technology. By examining current practice by entrepreneurs as well as how schools are embracing the potential of technology to build an entrepreneurial culture, workshop attendees will develop a sense and understanding of what is currently possible and how to begin embracing entrepreneurship as a component of their school and curriculum. We will define why entrepreneurship can and should be a component of a student's education and experience as it can act as a mechanism to help students develop fundamental skills to become valuable contributing members of society." Beyond Exit Tickets: Getting Creative with Formative Assessment Onsite Your School ALL 1 or 2 days By Appointment Assessment, Formative Assessment, Quiz, Exit Ticket All devices Formative assessment can be a powerful means to measure where students are in the learning process and can help teachers modify instruction and learning activities to improve student comprehension. But they can also become a bit boring to complete and cumbersome to track. It’s time to move beyond the standard exit ticket. In this interactive session, teachers will learn creative, engaging and effective formative assessment strategies to use across platforms. Whether you are new to formative assessment or an experienced practitioner, you will take away new ideas that you can use immediately to transform your classroom. Visible Thinking & Assessment 2.0 Onsite Your School Any instructor 1-2 days By Appointment Assessment, Visible Thinking, Creativity Elementary, Middle School, High School All devices What does assessment look like in a Digital Age classroom of technology integration and multimodal projects? How do we distinguish between higher-order thinking and "bells-and-whistles?" In this session, we will explore the role of a backward-design principles in developing effective “Assessment 2.0” strategies. We will look at storyboarding techniques and rubrics that help establish a clear relationship between project goals and skill benchmarks. We will also focus on the critical role of formative assessments and timely intervention incorporating instant response systems such as Socrative, Formative, Padlet, Nearpod, and Kahoot to instantaneously uncover what students know, think, feel, and understand. Furthermore, we will examine how a "2.0" assessment model differs from traditional assessment. A fundamental goal of this workshop is to identify the characteristics of effective assessments that link to and measure student mastery of worthwhile learning goals. BYOD: Integrating Web Tools & Apps for ANY Classroom Onsite Your School Any instructor 1-2 days By Appointment BYOD Elementary, Middle School, High School All devices This BYOD workshop highlights innovative educational uses of web tools to empower students and facilitate creative and collaborative learning opportunities regardless of the device. Participants will gain an overview of some of the best and latest web tools and apps as well as explore classroom-tested projects and techniques for using them in the classroom. By the end of this workshop, participants will have built a toolkit of web tools to promote and support creation and collaboration across their curriculum in a learner-centered classroom. Managing the Technology Classroom Summer Workshop Boston Avra Robinson, Anissa Labrador Half Day June 27 Classroom Management Elementary, Middle School, High School All devices BYOD, iPads, Chrombooks, or somewhere in between? Gain the valuable knowledge and skills necessary to manage your technology-rich classroom. Get the tips, tricks, and classroom hacks to make teaching and learning in a digital environment a breeze. Learn how to transform your rules, policies, and procedures to increase student engagement, reduce off-task behavior, and improve student success. Increase student productivity through proven technological tools and pedagogical strategies for success. Coding Onsite Your School Greg Kulowiec 1-2 days By Appointment Coding, Code Elementary, Middle School, High School All devices Coding and algorithmic or computational thinking could be “the new 21st century literacy.” We believe that anybody can learn how to code, so come explore how use coding as a tool to teach any subject. Using an approach that incorporates design thinking for any age, the goal of this workshop is to provide educators the opportunity to explore tools and approaches to facilitating a creatively curious learning environment through coding and programming. Coding, Making, & Critical Thinking Onsite Your School Greg Kulowiec 1 or 2 days By Appointment Coding, MakerSpace, MakerEd All devices Coding, making, and algorithmic thinking are being promoted as “the new 21st century literacy." The goal of this workshop is to provide educators the opportunity to explore ideas and approaches to facilitate a creatively curious learning environment. From hands-on, “unplugged” activities to logic-based coding exercises, come learn ways to provide your students with a new way to engage in critical thinking and express their learning. Idea Garden: Turning Evergreen Apps into Performances of Understanding Onsite Your School ALL 1 or 2 days By Appointment Collaboration, App Smash, iPad, Creativity All devices There are incredible opportunities for active, immersed learning emerge when educators consider how a small suite of apps can support diverse student performances of understanding. In this session, we'll explore how to turn a small set of “Evergreen Apps” into almost limitless instructional possibilities. Evergreen Apps—such as Book Creator, iMovie, Explain Everything, Notability, Tellagami, Padlet, Thinglink and others —are non-subject apps useful throughout the year for speaking, writing, listening, drawing, annotating, collaborating, sharing, and more. Using apps that help students consume, curate, create, and collaborate, educators have more than enough firepower to develop creative and purposeful activities that extend the entire academic year. Not Another Paper! Alternative Projects & Creative Student Expression Onsite Your School Any instructor 1-2 days By Appointment Creativity, Projects, Creativity, Multimedia Middle School, High School All devices Join in reviewing alternative activities and projects and learn how to empower student-centered learning. Using apps and web tools that help students create representations of their learning, educators will have more than enough firepower to develop creative and purposeful alternative activities. These activities not only extend the entire academic year, but also help generate what author and Harvard fellow Tony Wagner terms “a culture of innovation”— an environment that encourages students to be the kind of active, immersed thinkers essential for today’s cognitively demanding and competitive global workforce. By the end of the workshop participants will be able to identify qualities of effective alternative activities and assessment, explain how powerful activities emerge from empowering challenges, and identify several apps and social media tools that can be used to create alternative activities. Foster Creativity in your Classroom using Chrome Apps and Extensions Onsite Your School ALL 1 or 2 days By Appointment Creativity, Chrome, G Suite, Chrome Extensions, collboaration, Chromebook All devices G Suite for Education and Chrome Extensions provide creative and collaborative learning opportunities for laptop, desktop, and Chromebook classrooms. Learn some of the best uses of Google Drive Add-Ons and explore helpful Chrome apps and extensions. Among the tools featured are Soundtrap, Kami, VideoNot.es, Screencastify, and many others! Examine how educators make the most of tools that extend Google capabilities and plan effectively for integration strategies. Create & Collaborate with Book Creator and Explain Everything Onsite Your School ALL 1 or 2 days By Appointment Creativity, Chromebooks, Chrome, Google, GSuite All devices Book Creator and Explain Everything both provide extraordinary opportunities for students to create and collaborate. We will look at the potential for students to co-construct artifacts as evidence of their learning using these two apps combined with AirDrop. A Design Thinking Approach to Education Onsite Your School Tom Driscoll, Greg Kulowied 1-2 days By Appointment Design Thinking Elementary, Middle School, High School All devices In an era where machines are replacing many people’s jobs, author Seth Godin describes linchpins as individuals who are unique, who seek out problems to solve, and who re passionate about what they do. Ultimately, linchpins emerge as irreplaceable, creative problem solvers in their communities and organizations. We are often told that education must nurture these skills within our students, and yet we face the challenge of how to enhance and develop these skills. Together we will explore how a design thinking approach to curriculum can help overcome the traditional structures in classrooms and nurture a culture of innovation. In this interactive workshop, participants will gain hands-on experience with the design thinking process and discuss ideas for how they can begin implementing a design thinking approach into their curriculum. Creating Innovators with Design Thinking and Makerspaces Onsite Your School Greg Kulowiec By Appointment Design Thinking ALL All devices While we cannot predict what the future looks like, we do know that innovation and creativity are skills that our students need and Design Thinking has emerged as a proven framework for helping people develop a creative problem-solving mindset. The Design Thinking process first identifies a problem and then proposes and tests solutions, all with the needs of the end-user in mind. In this session, we will take a hands-on approach to understanding Design Thinking and how we can use its principles to create a learning environment that engages students, fosters curiosity, and encourages a collaborative approach to solving problems. In the first part of this session, we will engage in hands-on design challenges. Next, we will explore ways that exemplar schools have incorporated Design Thinking activities into their own curriculum and how the Maker Movement, a movement to empower students as creators and tinkerers, can be utilized to support students and educators as they prototype solutions to problems. We will also explore how to incorporate varied approaches to making, both analog and digital throughout the workshop. Finally, we will create specific activities and examples that you can use with your teachers and students right away to foster exploration and creativity through Design Thinking & Making. Design Thinking Conference Vermont Greg Kulowiec 2-day April 6-7, 2018 Design Thinking Elementary, Middle School, High School All devices During the first workshop day, participants will be introduced to the concept of Design Thinking and will engage in the Design Thinking Process to experience the framework first-hand. During the second workshop day, the emphasis will be on exploring Design Thinking in a classroom / educational setting. Teaching for the 21st Century: Design Thinking & Maker Spaces Onsite Your School ALL 1 or 2 days By Appointment Design Thinking All devices While we cannot predict what the future looks like, we do know that innovation and creativity are skills that our students will need. Design Thinking has emerged as a proven framework to support people in developing a creative problem-solving mindset. The Design Thinking process first asks individuals to engage in empathy and inquiry to seek out and define a problem. From there, the process encourages brainstorming, prototyping, iterating, and testing in order to produce possible solutions - whether it be a 3D printed product, a piece of creative writing, a multi-media project, a community service endeavor, or any other possibility. Hands-on introduction to Design Thinking Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, 1 or 2 days By Appointment Design Thinking, hands on, collaboration All devices During the first face-to-face workshop, participants will be introduce to the concept of Design Thinking and engage in a series of activities to experience the design thinking process. Throughout the day, participants will work through the 5 phases of Design Thinking as defined by the Stanford d.School - Empathy, Define, Ideate, Prototype, Test. Objective For Workshop #1: participants will develop an initial understanding of the Design Thinking process and experience a series of activities as students so that they can engage in empathy and begin to brainstorm ways to bring this process into their classrooms. Design Thinking & Making Pre Conference Boston Greg Kulowiec 1-day November 8 Design Thinking, Makerspaces Elementary, Middle School, High School All devices While we cannot predict what the future looks like, we do know that innovation and creativity are skills that our students need and Design Thinking has emerged as a proven framework for helping people develop a creative problem-solving mindset. The Design Thinking process provides an effective framework that can be implemented in classrooms to create an environment that values collaboration, research, and creativity. This process ultimately helps facilitate the process of carefully identifying a problem, and proposing, prototyping and testing solutions. The foundation of Design Thinking is the capacity to empathize with the end-user or intended community, so special attention will be given to thoroughly understanding all aspects of the process. Making will be addressed through various design challenges that participants will complete throughout the workshop. From analog, non-technology making to making via coding, the Design Thinking process will be used as a foundation to support Making in the classroom that has clear a clear purpose and intention. Getting Started with Design Thinking Onsite Your School Greg Kulowiec, Tom Driscoll 1 or 2 days By Appointment Design Thinking, Empathy, collaboration, brainstorm, All devices The Design Thinking process, initially developed by the Stanford University d-school, encourages students to seek out a problem, brainstorm and test potential solutions, and then produce their final product. In this session, we will learn the steps of the process and explore ways to encourage students to engage in empathy, collaboratively brainstorm, and then ultimately demonstrate their learning through the development of a final product. Creating Differentiated Learning Environments with Technology Onsite Your School Any instructor 1-2 days By Appointment Differentiation, Differentiated Instruction, Personalization Elementary, Middle School, High School All devices In this workshop, we will explore how technology can facilitate differentiation and create rich learning experiences that scaffold struggling students and enrich those who work at an accelerated pace. Given the accessibility features native to mobile devices such as text-to-speech, speech-to-text, interactive content, and quick access to supplemental resources, technology can be leveraged to create a "Least Restrictive Environment" for all students. During this hands-on workshop, participants will have abundant time to explore features, tools, apps, and pedagogical strategies to help students achieve the desired learning objectives. Evernote - Building Digital Notebooks Onsite Your School ALL 1 or 2 days By Appointment digital notebooks, portfolios, collaboration, Evernote, Note taking All devices How are you and students going to organize yourself to collect resources, take notes, and then access them from any device? While Google Drive and One Note are great options -- and will be explored -- it often becomes cumbersome as more and more files are added on a regular basis. Creating Digital Portfolios Onsite Your School Any instructor 1-2 days By Appointment Digital Portfolios Elementary, Middle School, High School All devices Beginning a journey into digital portfolio creation can be both exciting and daunting. While there are so many benefits to the creation of digital portfolios, they don't have to be as complex as most people think! From simple to complex, we will explore many different ways that you can start creating a digital portfolio today! With the influx of devices into the classroom, students may now create as many digital projects as they do physical ones. Once students create all of these artifacts of their learning, curating a portfolio allows students to chart their growth over time. In this hands-on workshop, we will explore the importance of having students curate and reflect on their work, develop a personal web presence, and capture both their digital products as well as their thinking about the process. To model this process, we will work with a number of tools and apps such as blogs, Evernote, Google Drive, Google Sites, and e-book creators that can be used to build and publish a digital portfolio. We will also design instructional strategies to help foster student reflection, and examine how best to incorporate the process of reflection into the curriculum. At the end of this workshop, participants will leave with a detailed plan for how they can begin the process of digital portfolios with their students using the technology available in their classrooms. Digital Portfolios - Best Practices in the Elementary Classroom Onsite Your School ALL 1 or 2 days By Appointment Digital Portfolios All devices What is a digital portfolio? Who should create a digital portfolio? Why are digital portfolios useful and important? Most importantly, HOW does one create a digital portfolio? Join us for an engaging session filled with tools that you can take back to your classroom for immediate implementation! Participants will be introduced to a variety of ways they can increase student engagement and get students reflecting on their learning through the use of digital portfolios. Digital Portfolios & Reflections on Learning Onsite Your School ALL 1 or 2 days By Appointment Digital Portfolios All devices What is a digital portfolio? Who should create a digital portfolio? Why are digital portfolios useful and important? Most importantly, HOW does one create a digital portfolio? Join us for an engaging session filled with tools that you can take back to your classroom for immediate implementation! Participants will be introduced to a variety of ways they can increase student engagement and get students reflecting on their learning through the use of digital portfolios. People of all technology comfort and skill levels will discover new ideas. Student Digital Portfolios with Google Tools Onsite Your School ALL 1 or 2 days By Appointment Digital Portfolios, Google Chromebook In this session, we will discuss the importance of student-created digital portfolios. From WHY portfolios are important, to HOW we can use the power of Google tools to help students showcase and own their learning, we will address strategies for digitizing, uploading and publishing student work. With a focus on the best iPad apps that integrate with Google Drive, you will discover why digital student portfolios should be a goal in 2019! Creating & Publishing Dynamic Digital Stories with Book Creator Onsite Your School ALL 1 or 2 days By Appointment Digital Storytelling 6-12 All devices Storytelling provides students with opportunities to construct narrative, express their ideas, and stretch their imaginations. With the Book Creator app, students of all ages can combine text, drawing, images, video, audio, and more to create and publish their own books. In this hands-on, collaborative session, you will learn how to harness the power of this app to develop student projects for any grade level. Digital Storytelling Strategies & Tools Onsite Your School Any instructor 1-2 days By Appointment Digital Storytelling Elementary, Middle School, High School All devices Digital Storytelling on the iPad can transform student writing into video masterpieces ready to be shared with the world. iPads take digital storytelling to a new level by making the process easier and able to engage students and teachers art every grade level. We will use iPads to create digital stories while enhancing writing and critical thinking skills. Advanced Creation in the Primary Classroom Onsite Your School ALL 1 or 2 days By Appointment Elementary, Primary All devices - Even the youngest of students can “App Smash!” We will look at how to develop App Fluency in primary classrooms and scaffold the process of teaching students to become active constructors of their own learning artifacts as well as master problem-solvers. Integrating Technology in the Elementary Classroom Onsite Your School Any instructor 1-2 days By Appointment Elementary Elementary All devices Whether your students have access to a computer lab, a cart of iPads, 1:1 Chromebooks, or a handful of laptops, technology can transform learning when used in appropriate and meaningful ways. In this workshop, we will explore tools, apps, activities, and strategies that nurture essential K-6 developmental and learning skills such as fluency, numeracy, storytelling, critical thinking, and voice. We will address core technology skills, formative assessment, media literacy, student-centered learning, collaborative projects, and safe publishing with early learners. Participants will gain hands-on experience with some of the best K-6 web tools and apps in order to build creative, collaborative, and globally-connected classrooms. Collect-Relate-Create-Donate: Innovative Uses of Technology in English, History & Foreign Language Classrooms, Grades 5-12 Onsite Your School Tom Daccord, Greg Kulowiec 1-2 days By Appointment English Elementary, Middle School, High School All devices Used wisely, academic technology empowers students to take responsibility for their own learning. In Leonardo’s Laptop, Ben Shneiderman provides teachers with a powerful framework, Collect-Relate-Create-Donate (CRCD), for designing student-centered learning opportunities using technology. In CRCD projects, students research information, work collaboratively to create a meaningful product that demonstrates their learning, and contribute that project to a larger learning community. Shneiderman designed the Collect-Relate-Create-Donate framework as a vehicle for preparing young people for a 21st century world where innovation, creativity, and collaboration will be more highly prized than retention and repetition. This session provides numerous examples of innovative uses of technology in ELA, foreign language and social studies classrooms, and includes opportunities for targeted web or app exploration after each "mini" lesson. Examples highlight both inquiry-based and research-oriented technology applications for middle and high school classrooms where students present their learning in multiple modalities. Teaching English & Language Arts with Technology Onsite Your School ALL By Appointment English, Language Arts ALL All devices The Teaching English with Technology workshop is an intensive workshop that offers hands-on opportunities for English and Language Arts educators to explore practical ways to use technology to enrich the study of literature, poetry, grammar and writing. The workshop will explore innovative ideas, effective techniques, and thoughtful plans for incorporating Web-based resources, G Suite for Education, apps mobile devices, and new and emerging technologies into classroom instruction of English and Language Arts. Participants will examine examples of the best ELA-related web sites, work with innovative tools to help improve student reading and writing, and develop skills with emerging technologies such as Add-Ons, Chrome Extensions, social networks and more. Participants will learn strategies to build creative, collaborative, and community-minded classrooms. Curating & Creating for the Flipped Classroom - Tips & Tools Onsite Your School ALL 1 or 2 days By Appointment Flipped Classroom All devices How can we maximize the face to face time with our students? That is the real question that the flipped classroom concept seeks to answer. In a flipped classroom, teachers "flip" traditional teaching methods - delivering instruction online, outside of the classroom, and allowing "homework" to become classwork. To effectively deliver that instruction outside the classroom, curating and creating plays a large role. We will explore tips, tricks, and tools that make curation and creation of digital, cloud-based content easier and more effective so that you can maximize the face-to-face time with your students. The Flipped Classroom Onsite Your School Any instructor 1-2 days By Appointment Flipped Classroom Middle School, High School All devices With the Flipped Classroom, teachers turn the traditional classroom structure on its head and use technology to reorganize class so that students maximize the value of their time with their teachers and peers. In this workshop, teachers will develop the skills to flip their own classrooms. From conceptual framework, to formative assessment strategies, to screencasting and media production tools that allow teachers to create their own content, we will examine how teachers and students can use a variety of collaborative platforms in class to maximize the value of their class-time together. Because video plays a significant role in the flipped classroom, the cornerstone of this workshop will be how to find, curate, present and create video content. Through various screencasting technologies, workshop participants will develop the ability to create video content to deliver instruction and course material outside of the classroom. Finally, we will explore online assessment tools that allow teachers to quickly and effectively assess student understanding of the flipped content. Participants will leave with an understanding of how the Flipped Classroom isn’t just about bringing new technologies into classrooms – it’s about using technology to transform the way students learn. Flipped Classroom 101: Getting Started with the Flipped Classroom Model Onsite Your School ALL 1 or 2 days By Appointment Flipped Classroom, iPads, Chromebook, Screencasting All devices Workshop participants will explore the fundamentals and framework for flipped class instruction. Additionally, a set of tools will be introduced and demonstrated that can be implemented in a flipped learning model. Tools include but are not limited to: EdPuzzle, Perusal, Microsoft / Google Forms & screencasting tools. Formative, Padlet & Visual Assessment Onsite Your School ALL 1 or 2 days By Appointment Formative Assessment, G-Suite, Chrome, YouTube, Padlet, Flipgrid All devices Formative is an exciting new instance response system that enables teachers to upload Word and PDF documents online and insert interactive questions that can be automatically graded. Formative also allows for the insertion of YouTube videos into documents. In addition to traditional text responses, students can draw and upload images as part of their answers and teachers can view all student responses in real time. Padlet is an intuitive web and app-based interactive platform that accommodates text, audio, video and more and helps facilitate many purposeful pre-assessment and formative assessment activities. In this session you'll experience both Formative's and Padlet’s engaging features and the powerful ways that both can be used for visual, formative assessment. Improve Efficiency & Feedback with Web Based Formative Assessment Onsite Your School Greg Kulowiec, Shawn McCusker, Avra Robinson, Tom Driscoll 1 Day By Appointment Formative Assessment, synchronous, asynchronous, web tools Elementary, Middle School, High School All devices Increasing teacher efficiency and insight into student understanding is one of the fastest entry points for teachers looking to implement technology in a 1:1 classroom environment. Whether it be synchronous, in class formative assessment, or an asynchronous, outside of class & multi-day process, there are a host of free, web-based formative assessment platforms that allow teachers to quickly and easily create, distribute and collect student responses from any device. This workshop will help classroom teachers develop a comfort level with web-based formative assessment tools and may include but is not limited to the exploration of: Socrative, GoFormative, Google / Microsoft Forms. HyperDocs Summer Workshop Boston Rosey McQuillan, Robinson, Labrador 1-day June 26 G-Suite, Docs, Sheets, Sites, Slides, Google, Chromebook Elementary, Middle School, High School Chromebook Combine the power of Google Slides and your curriculum content to create engaging lessons that promote collaboration, communication, reflection, and creativity among students! In this session, you'll learn the key components of a HyperDoc, explore subject-specific examples, and take away valuable resources by grade level. Bring your computer to begin designing your first HyperDoc to use right away with your students! Level Up With Gamification & Game-Based Learning Onsite Your School Tom Driscoll 1 or 2 days By Appointment gamification All devices Tap into the power of gamification and game-design principles to increase engagement and enhanced learning experiences. Learn strategies to effectively leverage game design concepts such as leveling, mastery-based progressions, real-time feedback, leaderboards, and compelling narratives. Explore how you can leverage gamification and game-based design too! Advanced G Suite Onsite Your School Greg Kulowiec , Avra Robinson, Tom Driscoll 1 or 2 days By Appointment Google, GSuite, Chromebook ALL All devices The G Suite environment is a powerful collaborative environment with equally untapped classroom potential. This session will explore a few advanced approaches to G Suite classroom integration including: Hyperdocs, Interactive Student Notebooks & Interactive Google Drawings. Advanced Google Classroom Onsite Your School Greg Kulowiec , Avra Robinson, Tom Driscoll 1 or 2 days By Appointment Google, GSuite, Chromebook ALL All devices Google Classroom provides a streamlined interface to manage digital workflow yet there are a few approaches that can add helpful layers to Google Classroom that allow students to turn in digital content beyond documents, slides and sheets. Further, there are tool that can be used in conjunction with Google Classroom that allow teachers to potentially provide more effective feedback through integrated rubrics and audio comments. Chromebooks 2.0 - Unlocking Chromebooks as Multimedia Creation Devices Onsite Your School ALL 1 or 2 days By Appointment Google, Gsuite, Chromebook, multimedia Chromebook Unlock the creative potential of the Chromebook and move beyond using the device for word processing, productivity and organization. The session will explore the creative potential of the Chromebook to give your students the ability to craft amazing multimedia masterpieces! Participants, will explore various apps, web tools and extensions available for students to create multimedia such as interactive images, video, and audio. In addition, learning strategies and thoughtful approaches to Chromebook creation will be woven throughout. Create with Tablets Onsite Your School Greg Kulowiec, Avra Robinson, Tom Driscoll. Anissa Labrador 1 or 2 days By Appointment Google, mobile, tablet ALL All devices This workshop will focus on the potential for students to create with tablets beyond text documents and slide presentations. Workshop participants will explore multimedia creation with tablets that includes: Screencasting, Video and Audio Creation. Creation & Chromebooks Onsite Your School ALL 1 or 2 days By Appointment Google, Gsuite, Chromebook, Creation, Creativity Chromebook While typically viewed as devices that allow for Google Drive collaboration through Docs, Sheets and Slides, Chromebooks also allow for immense creative potential by integrating a select few web tools, Chrome screencasting extensions, YouTube’s internal editing features and any type of additional mobile device. This session will explore how students can push the creative limits of a Chromebook to create multimedia content through collaboration, creation and publishing one’s work to the web. Creative and Innovative Approaches to Google and G Suite in the Classroom Pre Conference Boston Avra Robinson 1-day November 8 Google, Creativity, GSuite Elementary, Middle School, High School Chromebook G Suite for Education not only facilitates creative and collaborative learning opportunities for your students but also provides amazing tools for curating and publishing student work. In this hands-on workshop, we will explore best practices for using Google Apps on laptops and Chromebooks. From innovative uses of the core Google tools, to creating multimedia with new Chrome apps and extensions, we will explore powerful and innovative ways to empower students to demonstrate and share their learning. Powerful Blended Learning with Google Classroom Onsite Your School Any instructor 1-2 days By Appointment Google, Blended Learning, Google Classroom Elementary, Middle School, High School Chromebook With the combination of Google Classroom and Google Drive, teachers in any 1:1 environment now have the capacity to create a blended learning environment where students can create, collaborate and submit all course work through one unified Google environment. This workshop will demonstrate and explore effective strategies for integrating Google Classroom to create powerful and helpful learning environments for students. Participants will learn how to create lessons and streamline the turn-in process, organize assignments with due dates, view student work and provide feedback, integrate a calendar, distribute resources and send announcements, share work with multiple classes, conduct polling and create links, integrate video, foster collaborative work, and much more. Since Google Drive is at the core of Google Classroom, participants will learn some of the best uses of Google Drive, including Google apps and Google Docs add-ons. Powerful Ways to Engage Students using Google Classroom Onsite Your School ALL 1 or 2 days By Appointment Google, GSuite, Google Classroom Chromebook One of the most difficult tasks teachers have when shifting to a digital environment involves the struggle of organizing all the digital documents. Where do they go? How can you possibly keep track? What will you do without that massive bag of papers to haul home and grade every night? Your answer is Google Classroom! Google Classroom was released by Google at the start of the 2014 school year. Since then it has grown tremendously and provided teachers and students a learning space to organize and effectively manage digital course work. This presentation will combine explanation and exploration of Google Classroom as a means of streamlining workflow while engaging students in authentic learning experiences. If participants have access to Google Classroom, they will be given the opportunity to build a class in conjunction with the presentation. If they do not have access, a class will be created in Google Classroom during the presentation demonstrating all of the powerful capabilities. Google Classroom will revolutionize your class’s digital experience! Student Creations with Google Drive Add-Ons & Chrome Extensions Onsite Your School Any instructor 1-2 days By Appointment Google, GSuite, Extensions, Creativity Elementary, Middle School, High School Chromebook Google Apps for Education and Chrome Extensions provide creative and collaborative learning opportunities for Chromebook and laptop classrooms. In this session we will explore uses of Google Drive, the Chrome Browser, and select Google Apps in ways that facilitate creative student demonstrations of learning. Participants will be introduced to valuable "Add-Ons" that extend the functionality of Google Drive, "Extensions" that boost Chrome's capabilities, as well as Google-friendly apps that facilitate a wide range of innovative possibilities. Examples include: Kaizena to record audio commentary and VideoNot.es to sync note-taking of YouTube videos; Screencastify and Snagit to to do screen and image capturing and narration. We’ll also explore a range of creative Web tools for producing audio, visuals, animation or video, such as Padlet, Vocaroo, Canva, Storybird Animoto, Thinglink, Powtoon and WeVideo. In all, this session will provide participants with a strong foundation for powerful and creative student Google integration. The Advanced G Suite Google Classroom Onsite Your School ALL 1 or 2 days By Appointment Google, Gsuite, Google Classroom, gsuire Chromebook This workshop is designed specifically for participants who have experience with G Suite for Education (formerly Google Apps for Education) or those who have previously attended an EdTechTeacher Summer Workshop, an EdTechTeacher Pre-Conference, or teachers and administrators who have at least one year of experience in a 1:1 or shared classroom. The Elementary G Suite Google Classroom Onsite Your School ALL 1 or 2 days By Appointment Google, GSuite, Elementary, Google Classroom Chromebook From recording reading fluency, to developing storytelling skills, to demonstrating problem solving, G Suite for Education can be used in a myriad of ways in the elementary classroom. This workshop will focus specifically on using G Suite for Edu at the K-5 grade levels. We will explore apps and strategies specific to young learners to empower them as creators of their own learning artifacts. Whether utilizing G Suite for Education on a Chromebook or on a computer, participants will begin to gain an understanding of the core suite of programs and also ways to leverage other web applications and Google Chrome extensions to augment teaching and learning. Key topics addressed in this workshop will include reading and writing, visible thinking strategies, creating interactive learning experiences, portfolios and publishing, and collaborative projects. Whether you have a cart of shared Chromebooks, a 1:1 program, or a single computer in your classroom, this workshop provides an excellent forum for thoughtful integration into the elementary classroom. Travel the World Through a Chromebook - Onsite Your School ALL 1 or 2 days By Appointment Google, Chromebook, Geography Chromebook Have you ever wanted to take a field trip to Paris but found that the school budget is a little thin on overseas flight money? Have you wanted to take your students to the base of the Grand Canyon, but found that some are scared of the donkeys? Well have no fear, Google Maps and Google Maps Treks can take you and your class anywhere in the world with just a few clicks. In this session we will explore how to use Google Maps, implement Google Maps into your curriculum, and create custom maps that bring learning to life. Come discover how the power of this simple tool can transform your students’ learning experience into a worldwide adventure! Uncover Your Magic Wand with Google Apps for Education- Onsite Your School ALL 1 or 2 days By Appointment Google, GSuite, Chromebook All devices Are you new to Google Apps for Education? There is great power and magic when these tools are utilized to help students learn, collaborate, and grow! Participants will be introduced to many of the functions of Google Docs, Slides, Sheets, Forms, and Drawings. A wide variety of ideas will be shared that can be immediately implemented in the classroom. Teachers will discover new ways to engage & excite students about learning. What Every Educator Should Know About Chromebooks Onsite Your School Any instructor 1-2 days By Appointment Google, GSuite, Chromebook Elementary, Middle School, High School Chromebook In this hands-on workshop, we will explore proven strategies for using Chromebooks, the Chrome Browser, and Google Apps for Education in ways that purposefully impact student learning. The workshops will progress through the following path to ensure a solid understanding of the capacities of both Chromebooks and the Google Apps suite: 1. Understanding a Chromebook and the Chrome OS 2. Understanding and exploring Google Drive with a focus on organization, workflow, and collaboration. 3. The Chrome Browser, Chrome Extensions, Chrome Apps, and the Chrome Web Store. 4. Google Apps beyond Google Drive - Google Sites, YouTube, and connected Drive apps such as VideoNot.es or Coggle 5. Web Tools - non-Google products to support student creation. 6. Workflow with Google Apps - how to manage daily workflow with both Google and non-Google products. By the end of the workshop, participants will leave with the skills, abilities, strategies, and practice to effectively use Chromebooks and Google in the classroom. What Every Educator Should Know About Google & Chromebooks Onsite Your School ALL 1 or 2 days By Appointment Google, GSuite, Chromebook Chromebook In this workshop, we will look at proven strategies for using Chromebooks, the Chrome Browser, and Google Apps for Education in ways that purposefully impact student learning. First, we will begin by making the most of Google Drive, Chrome Apps, and Extensions, learning how to make instructional improvements that allow for thoughtful and purposeful use of these tools in the classroom. Then, we will examine ways to leverage the power of YouTube, Calendar, Sites and more to support high-level classroom instruction. From Google Docs for collaboration to Google Sites for publishing, we will explore all of the amazing ways to use Google Apps for Education to redefine learning and inspire your students curiosity and creativity. Google Certified Educator Workshops, Level 2 Onsite Your School Greg Kulowiec, Avra Robinson, Tom Driscoll 1 or 2 days By Appointment Google, certification, Google, Drive, Docs, Slides, Sheets, Sites, YouTube, Google Hangouts, Google Classroom, Chrome, exam, data collection, task management, Google Calendar, advanced search, Google scholar ALL All devices Join an exciting day of preparing for the Google Certified Educator Level 2 Exam! Over the course of this one or two day workshop, you will learn how to master the Google “products” and “skills” specific to the Level 2 exam. Participants will walk away proficient in the following Level 2 exam skills: Advanced organizational schemas & skills with Google Drive Exploration of new learning models to help personalize the learning experience, including: Blended Learning, the Flipped Classroom, and Project Based Learning Collaboration and HyperDoc lesson building strategies with Google Docs Research strategies and tools with Google Scholar Advanced data analysis with Google Sheets Advanced formative Assessment and data collection with Google Forms Increasing efficiency with Gmail and Calendar Labs Communication & collaboration with Google Hangouts and Hangouts on Air Organization of information, communication, and collaboration with NEW Google Sites Advanced Search Techniques with Google Search Research and exploration with Google Maps and Google Earth Utilizing Add-ons and Extensions to enhance student learning Participants will also learn how to apply the Google “product” and “skills” to the Level 2 exam themes of: professional growth and leadership, increasing efficiency and saving time in the classroom, facilitating and inspiring student learning and creativity. Upon completion of the workshop, participants will not only greatly advance their knowledge and skill set, they will also gain valuable instructional tips and best-practices for skillful Google implementation in schools and classrooms. Join us for a fantastic workshop filled with learning and growth using the G Suite for Education products! Google Certified Educator Workshops, Level 1 Onsite Your School Greg Kulowiec, Avra Robinson, Tom Driscoll, Anissa Labrador 6 hours By Appointment Google, certification, Google, Drive, Docs, Slides, Sheets, Sites, YouTube, Google Hangouts, Google Classroom,exam, data collection, task management, Google Calendar, advanced search, Google scholar ALL All devices Join an exciting day of preparing for the Google Certified Educator Level 1 Exam! Over the course of this one day workshop, you will learn how to master the Google “products” and “skills” specific to the Level 1 exam. Participants will walk away proficient in the following Level 1 exam skills: Organizational schemas & skills with Google Drive Collaboration and lesson building strategies with Google Docs & Slides Research strategies and tools with Google Docs Data collection and analysis with Google Sheets Formative Assessment and data collection with Google Forms Communication and collaboration with Google Groups Task management and organizational strategies with Gmail Task management and organization with Google Calendar Communication & collaboration with Google Hangouts Organization of information, communication, and collaboration with Google Sites Individual and shared note-taking using Google Keep Digital resource and learning management with Google Classroom Advanced Search Techniques with Google Search Upon completion of the workshop, participants will not only greatly advance their knowledge and skill set, they will also gain valuable instructional tips and best-practices for skillful Google implementation in schools and classrooms. Google Add-Ons and Chrome Extensions for Productivity and Creativity Summer Workshop Boston ALL Half Day June 27 Google, Chrome, Chromebook, communication, collaboration, creativity, Google Drive, Google Add-ons, Extensions, Elementary, Middle School, High School Chromebook Discover some of the best Google Add-Ons and Chrome Extensions for productivity and creativity perfect for laptop, desktop, and Chromebook classrooms. Also learn strategies that promote more effective teacher integration. Featured tools include: Google Explore, SAS Writing Reviser, Screencastify, PrintFriendly, Kami, Mercury Reader, and others. Explore how educators can make the most of these powerful, free tools that extend Google capabilities! Google Add-Ons & Chrome Extensions for Research, Writing & Feedback Onsite Your School ALL 1 or 2 days By Appointment Google, Chrome, Chromebook, communication, collaboration, creativity, Google Drive, Google Add-ons, Extensions, Google Classroom All devices Discover some of the best Google Add-Ons and Extensions that provide an excellent array of research, writing and editing tools perfect for laptop, desktop, and Chromebook classrooms. Also learn strategies that promote more effective teacher feedback and guidance. Among the tools featured include: WriteWell for Google Docs, Google Explore, SAS Writing Reviser, VideoNot.es, Screencastify, and others. Examine how educators make the most of tools that extend Google capabilities. G-Suite: Using Google Apps in the Classroom Onsite Your School Any instructor 1-2 days By Appointment Google, Chrome, Chromebook, communication, collaboration, creativity, Google Drive, Google Add-ons, Extensions, Google Classsroom Elementary, Middle School, High School Chromebook Google Apps for Education encourages communication, collaborative learning, information sharing, creative expression,student engagement, and community building. These hands-on workshops help educators use Google Drive and related Chrome and Google apps for synchronous and asynchronous collaboration. In addition to uses of Google Docs and Drive, we will address advanced topics such Google Add-Ons, Chrome Apps and Extensions, as well as other apps that connect to Drive. Not only will we discuss how to use these tools to support collaboration and creativity, but also why. Google Classroom - the Tool Onsite Your School Any Instructor 1 or 2 days By Appointment Google, Chrome, Classroom, Google Classroom, collaboration, workflow ALL All devices One of the most difficult tasks teachers have when shifting to a digital environment involves the struggle of organizing digital documents. Where do they go? How can you possibly keep track? The answer is Google Classroom! Google Classroom provides teachers and students a learning space to organize and effectively manage digital course work. Throughout this workshop, participants will have the benefit of both the teacher and student perspectives as we combine explanation and exploration. We will explore the wide variety of ways that Google Classroom can be used to create authentic learning experiences for students, increase collaboration, strengthen communication skills, engage students, and streamline digital workflow. Collaboration with Google Apps & Chrome Extensions Onsite Your School ALL 1 or 2 days By Appointment Google, Collaboration, Chrome, extensions Chromebook Google Apps for Education and Chrome Extensions provide creative and collaborative learning opportunities for laptop, Chromebook, and tablet classrooms. Learn some of the best uses of Google Forms and Google Documents and explore helpful apps and extensions, such as Kaizena, VideoNot.es, Screencastify and others. Examine how educators make the most of Google and plan effective integration strategies. Effectively Managing a 1:1 Chromebook Environment using the Google Admin Console - Onsite Your School ALL 1 or 2 days By Appointment Google,Admin, console, domain, management, G-Suite, Chrome, Chromebook As more schools adopt Google Apps for Education and Chromebooks, it is becoming increasingly important for school leaders to understand how to appropriately manage their new environments. For schools using Google Chromebooks, the Google Management Console provides strategies for ensuring that students and teachers are able to focus on learning in lieu of managing technology. When implemented properly, the Google Admin Console has the power to revolutionize the educational experience. In this session, participants will be presented with best practices for utilizing the Google Admin Console. The session will not only focus on managing Chromebooks, but other aspects including, Drive, Google Vault, and YouTube management. Teaching History with Technology Onsite Your School Greg Kulowiec, Shawn McCusker, Tom Daccord, Tom Driscoll By Appointment History, Social Studies ALL All devices The Teaching History with Technology Workshop is an intensive hands-on environment for History and Social Studies educators. During this intensive workshop, participants will explore practical, dynamic, and creative ways to use technology in the classroom to enhance their curricula and provide students with unique opportunities to create original content to demonstrate their understanding. The workshop examines innovative ideas, effective techniques and thoughtful approaches for incorporating web tools, mobile devices, apps and emerging technologies into History and Social Studies curricula. In addition to exploring examples and content applicable to World History, United States History, and Civics at the middle school, high school and college level, this workshop emphasizes the use of technology to provide students with the ability to create digital stories, screencasts, collaborative documents and presentations, interactive maps, Virtual field trips, and timelines. Other topics include social networking, evaluating sources, and emerging technologies. The projects, concepts, and tools addressed in this workshop apply to the 4Cs - Communication, Collaboration, Critical Thinking, and Creativity - as defined by the Partnership for 21st Century Skills. Fostering a Culture of Innovation Onsite Your School ALL 1 or 2 days By Appointment Innovation, Design Thinking, Problem Based learning, collaboration All devices In business, "Blue Ocean Strategy" refers to seeking out new markets that previously never existed. Think about innovative companies like Uber or AirBnB that have created opportunities where nothing previously existed. On the other hand, a "Red Ocean" is an already crowded market. When it comes to implementing new technologies, where teachers and administrators already feel flooded with tools that may or may not meet their need, what are the blue ocean opportunities? In this session, we will engage in a series of hands-on activities to examine the concepts of empathy, strategy, and edupreneurship as a means to empower all stakeholders within the school community. App Smashing and App Fluency Onsite Your School ALL 1 or 2 days By Appointment iPads,app smash, creativity, collaboration, curation iPad The ability to combine the creative potential of multiple applications to have students create dynamic, creative and unique content to demonstrate their understanding and mastery of class concepts could ultimately be considered the most powerful way to integrate an iPad into the classroom. This session will explore the framework to approach app-smashing from a technical perspective (how to physically create with one app, export to another app and add a layer of complexity) as well as addressing the “why” question. Attendees will walk away with concrete examples and approaches to app-smashing as well as increased technical ability to begin app-smashing in their classroom. AppSmashing & Creativity with iPads Onsite Your School ALL 1 or 2 days By Appointment iPads,,app smash, creativity, collaboration, curation iPad As iPads are being integrated into the classroom, both teachers and students quickly realize that using one app in isolation can limit the creative potential of this device. This session will explore the creative potential of iPads for multimedia creation when multiple apps are used in conjunction with one another to create final products that would otherwise not be possible by limiting oneself to a singular application. Creating Learning Centers with iPad - Beginner/Intermediate Onsite Your School ALL 1 or 2 days By Appointment iPads, centers, creativity iPad Especially in elementary classrooms, iPads are a fantastic device for creating learning centers. By taking this approach, students learn to communicate and collaborate through guided, small group activities. In this hands-on session, we will explore how iPads can be used to create fluency centers, math centers, writing centers, observation stations, and more. Bring your iPad, and come explore new ways to use it in your classroom. Differentiating with iPads to Reach All Learners - Beginner/Intermediate Onsite Your School Rosey McQuillan, Anissa Labrador, Avra Robinson 1 or 2 days By Appointment iPads, accessibility, differentiation, apps, extensions Chromebook, Mac, iPad, iPads present enormous potential to reach all learners from leveraging accessibility settings to offering up multiple pathways to learning. In this session, we will begin by exploring the capabilities built into the device and then transition into ways that teachers can create multi-modal content and students can develop new ways to demonstrate their understanding. Keep Explaining! (advanced) Onsite Your School Greg Kulowiec 1 or 2 days By Appointment iPads, Notability, Explain Everything, animation, mind mapping iPad Without question Explain Everything and Notability are powerful classroom apps. Yet, the ways in which they are being used in the classroom often do not exploit their full potential. This session will explore the more complex uses for Explain Everything and Notability. Ideas discussed in the session will range from creating flash style animation to mind mapping and presentation-tutorial innovations. Lights, Camera, Action! MovieMaking with iPads Onsite Your School ALL 1 or 2 days By Appointment iPads,imovie, creation,collaboration iPad iPad is a perfect tool for creating and sharing video. In this hands-on workshop, we will discover ways that you and your students can use video and animation to explore course content and express creativity. You will gain valuable hands-on practice with the best apps for creating movies on the iPad and learn about great uses. Productivity with iOS Onsite Your School ALL 1 or 2 days By Appointment iPads, organization,productivity,ios features iPad To-do lists, notes & calendars, all a part of being organized and productive for both teachers and students. Through the use of a carefully selected core set of productivity tools, both teacher and students can enhance both their organization and productivity with an iPad. By allowing all three mechanisms to communicate, to-do lists can be finalized by examining one's calendar, notes can be synced as calendar reminders and follow up tasks can be organized and completed. The session will use a combination of: Evernote, Google Calendars, Google Keep,Todoist to increase iOS productivity. The Advanced iPad Classroom Onsite Your School ALL 1 or 2 days By Appointment iPads, app fluency, app smashing, Consumption, Curation, Creation & Collaboration ALL iPads For those who have extensive experience with iPads, this workshop will include an exploration of advanced topics as we progress through a continuum from Consumption to Creation to Curation to Connection. From App Fluency and App Smashing to large scale collaboration and extending the classroom, we will push the limits of what is possible with iPads. Following the 4C’s philosophy of technology and specifically iPad integration (Consumption, Curation, Creation & Collaboration) the Advanced iPad Classroom session will provide an overview of the types of tools, processes and procedures that need to be in place in order to move towards powerful classroom uses of iPads. In an effort to make the iPad “invisible” in the classroom, participants will explore a combination of day to day uses to support consumption and curation as well as more complex, longer processes to support student creation and collaboration. The iPad Classroom – Middle School & High School Onsite Your School ALL 1 or 2 days By Appointment iPads,,consumption, creation, curation 6-12 iPad This workshop is geared towards middle and high school teachers looking to create an iPad classroom. From consumption to curation to creation, you will learn strategies and apps for putting iPads in the service of learning and students at the center of the process. What Do Great Teachers Do With iPads? Onsite Your School ALL 1 or 2 days By Appointment iPads, personalized, differentiated, k-12 iPad An iPad provides unprecedented opportunities for mobile, personalized, and differentiated learning. Great teachers identify important learning goals and construct innovative tablet-integration activities that help students reach these objectives. Come explore a range of creative and authentic K-12 activities across subjects and disciplines and developed by talented and progressive educators in the U.S. and beyond. Enhancing Creativity: App Smashing on the iPad (advanced) Onsite Your School ALL 1 or 2 days By Appointment iPads, digital storytelling, creativity, collaboration, curation,apps k-12 iPad App Smashing allows for the creation of previously inconceivable objects. By combining the power of apps, students can create, collaborate, and curate media into entirely new learning artifacts. During this hands-on session, we will explore a number of smashes using tools such as Explain Everything, Book Creator, Thinglink, Tellagami, iMovie and others to push what is possible with iPads. Elementary iPads Onsite Your School ALL 1 or 2 days By Appointment iPads, elementary, digital storytelling, creativity, collaboration, curation k-6 iPad From recording reading fluency, to developing communication skills, to demonstrating problem solving, iPads can be used in a myriad of ways in the elementary and middle school classroom. This workshop will focus specifically on iPad innovation at the K-8 level, as we will explore apps and strategies specific to younger learners that empower them as creators of their own learning artifacts. With "purposeful play" as the objective for this workshop, participants will be immersed in a hands-on learning environment designed to help them experience the possibilities when they put the power of iPads in their students' hands. Whether you are new to iPads or looking for new inspiration, this workshop is a perfect way to uncover a new realm of possibility for your students. iPads and Excutive Functioning Supports and Strategies Onsite You School Rosey McQuillan 1 day iPads, executive function, special education, organization, time management iPad Many of our students struggle with executive functioning. Executive Functioning skills are those that are needed for everyday life. They include: planning, problem solving, flexibility, organization, time management and task initiation. For many of our students, these skills can be challenging and pose many educational hurtles. In this workshop, participants will explore a variety of tools, resources and strategies that can aid in time management, organization, note taking and reading. Exemplary Group Projects with iPads - Onsite Your School ALL 1 or 2 days By Appointment iPads, integration, creativity, collect, create, innovation, app smash, portfolio iPad In this workshop we’ll examine and develop exemplary iPad integration group projects in a range of K-12 classrooms. Starting with a simple question, teachers can initiate innovative iPad integration activities and the C-R-C-D framework -- Collect, Relate, Create, and Donate -- can serve as wonderful project framework. Furthermore, with the increasingly flexibility of the iPad iOS and the ability to share content on one iPad from app to app, from iPad to iPad, and from an iPad to the web, both students and teachers have the ability to create truly remarkable creations on an iPad. Building the iPad Teacher Onsite Your School Tom Daccord 1 or 2 days By Appointment iPads, Leadership, strategic planning, innovation, goal oriented iPad For years, EdTechTeacher has been working with schools and districts in all stages of iPad integration. One fundamental truism has emerged: The real challenge for educators is not learning the iPad. It’s working to develop a pedagogical vision of what’s possible and implementing a strategic plan to make it happen. From concepts to practice, this session will focus on progressing the iPad classroom and iPad program from "1.0 to 3.0.” It begins with a vision of what we want students to do and a plan for how we get there. It includes positioning the iPad as a portable media creation device to support all learners in diverse student performances of understanding. It involves constructing activities that encourage ingenuity and nurture innovative, problem-solving, and entrepreneurial minds. It integrates specific classroom strategies, such as “challenge-based” instruction, “Evergreen App” convergence, and "App-Smashing" creations. Whether beginning an iPad classroom or assessing an iPad program, this session will help you develop and nurture an iPad "culture of innovation”— an environment that encourages students to be active, immersed, and creative thinkers. Design the iPad School of the Future Onsite Your School Tom Daccord 1 or 2 days By Appointment iPads, Leadership, strategic planning, integration, goal oriented, innovation 3-8 iPad What if there were no limitations? What if resources were not a problem? What would the ideal iPad learning environment look like? In this brainstorming session, we will explore the school for the future from diverse perspectives - curriculum & pedagogy, professional learning, and physical space. Come evaluate provocative future-learning scenarios and better understand the choices that must be made. Learn the importance of vision and planning and what happens in its absence. Whether you are a school administrator or a technology advocate, come contribute your ideas to see what could be possible. Redefining the Writing Process with iPads Onsite Your School ALL 1 or 2 days By Appointment iPads, iOS accessibility, diverse learners, access 6-12 iPad Writing and communicating ideas clearly through text is a fundamental skill that plays a critical role in every classroom. How can the process be improved with technology? Text-to-speech, speech-to-text, mind-mapping apps, multimedia, and collaborative documents, all available on iPad can transform the ways in which we think about the development of new literacies across grade levels. We will explore tools to meet a diverse set of learners, and participants will leave this presentation with a host of tools, ideas, and resources to support the writing process with mobile devices. Extending the Physical with the Digital Intermediate Onsite Your School ALL 1 or 2 days By Appointment iPads,camera, geolocation, QR codes, Augmented Reality, iPad As mobile devices, iPads present a unique opportunity for students to take technology into the world. In this session, we will explore how to leverage the camera, geolocation capabilities, as well as tools such as QR Codes and Augmented Reality to extend what’s possible in the physical world with these digital devices. Creative Uses of iPads in the Elementary Classroom Summer Workshop San Francisco Rosey McQuillan +Avra Robinson+ Anissa Labrador 2-day June 20-21 iPads, integration, creativity, collect, create, innovation, app smash, portfolio Elementary iPad From recording reading fluency, to developing storytelling skills, to demonstrating problem solving, iPads can be used in a myriad of ways in the elementary classroom. This workshop will focus specifically on unleashing the creative potential of the iPad at the K-5 level. We will explore apps and strategies specific to young learners to empower them as creators of their own learning artifacts. With our philosophy of “All the Good Apps Fit on One Screen” as a guiding principle, this workshop provides participants not only with an understanding of the device itself, but also ways to leverage essential tools and apps in the classroom. Key topics addressed in this intensive workshop will include reading and writing, visible-thinking strategies, multimedia creation, portfolios and publishing, and collaborative projects. Whether you have a cart of shared iPads, a 1:1 program, or a single device in your classroom, this workshop provides an excellent forum for thoughtful integration into the elementary classroom. iPads in the Classroom Onsite Your School Any instructor 1-2 days By Appointment iPads, integration, creativity, collect, create, innovation, app smash, portfolio Elementary, Middle School, High School iPad iPads have proven to be powerful creation and curation device in the hands of students. This workshop focuses on effective iPad integration from both a conceptual as well as a practical standpoint. With our philosophy of "All of the Good Apps Fit on One Screen" as a guiding principle, this workshop provides participants not only with an understanding of the device itself, but also its potential for empowering students as creators of their own learning artifacts. Key topics include reading and note taking, screencasting and multimedia creation, portfolios and publishing, as well as collaborative projects. Our instructors customize the content of each workshop to match the development level of the students and the content area of the teachers. Whether you are looking for ideas to bring into an elementary classroom, strategies to support reading and research, or activities to allow students to delve into mathematical or scientific concepts, our instructors will design a program to support your faculty. The Idea Garden: Turning Evergreen Apps into Performances of Understanding Onsite Your School Any instructor 1-2 days By Appointment iPads, integration, creativity, collect, create, innovation, app smash, portfolio Elementary, Middle School, High School All devices There are incredible opportunities for active, immersed learning emerge when educators consider how a small suite of apps can support diverse student performances of understanding. In this session, we'll explore how to turn a small set of “Evergreen Apps” into almost limitless instructional possibilities. Evergreen Apps—such as Padlet, Socrative, Book Creator, Explain Everything, and others —are non-subject apps that can be used throughout the year for speaking, writing, listening, drawing, annotating, collaborating, sharing, and more. Using apps that help students consume, curate, create, and collaborate, educators have more than enough firepower to develop creative and purposeful activities that extend the entire academic year. Google Apps & iPads Onsite Your School Any instructor 1-2 days By Appointment iPads, Google, Drive, Docs, Slides, Interactive Notebooks, Sheets, Sites, YouTube, Google Hangouts, Google Classroom, workflow Elementary, Middle School, High School Google + iPad may be the ultimate combination with the collaborative capabilities of Google Apps combined with the creative possibilities of iPads. This workshop will focus on understanding a variety of Google for Education apps and resources including Google Drive (Docs, Slides, and Sheets), Google Sites, YouTube, and Google Hangouts. The workshop will also explore how non-Google apps can be used in conjunction with Google Drive on iPad to allow for creation and collaboration. Finally, workshop participants will explore Facilitate Classroom Workflow on iPad with Google Apps that will range from manual Google Drive organization to automated workflow solutions for distributing and collecting student work. This hands-on workshop will provide participants with extensive time to explore, role-play, create, and practice the ideas explored. Going Global - Collaboration with iPads Onsite Your School ALL 1 or 2 days By Appointment iPads, screen recording, epubs, creation, collaboration, global collaboration 6-12 iPad Global collaboration is now possible in a way that could not easily be achieved without the integration of mobile devices. From collaborative video to screencasting and digital eBooks, students can now create and collaborate with students from across the globe. This session will explore the technical & logistics to set-up such work and will also examine existing global collaboration projects. Building Community in the Cloud with iTunes U Onsite Your School ALL 1 or 2 days By Appointment iTunes U, Course management, online learning, eBooks, iPad iTunesU brings custom content to student iPads and helps them to navigate the information in a clear and concise manner. With the recent updates, students can curate all of their course content and notes in one place while teachers can track their progress and mark grades. Teachers can send out assignments and students can hand in assignments. Furthermore, iTunes U provides an opportunity to build community in the cloud through interactive discussions. In this session, come get hands on with iTunesU and discover the possibilities that it presents for your iPad classroom. Beyond the "One and Done Workshop" Onsite Your School ALL 1 or 2 days By Appointment Leadership, innovation, strategic planning, goal oriented All devices Harnessing the Power of Online Learning to Create Meaningful Professional Development - Effective professional development shares several common characteristics. It occurs over an extended time, is situated within the teacher's context, allows for active learning and collaboration, and focuses on student cognition (Garet et al., 2001). However, despite this precedence, most professional learning instead follows a "one and done" workshop model. This session will explore the barriers to effective professional learning and encourage participants to seek out ways to mitigate them. Challenge-Based, One-Screen, & T21: The EdTechTeacher Approach to PD Onsite Your School ALL 1 or 2 days By Appointment Leadership, innovation, strategic planning, goal oriented All devices Learn about EdTechTeacher's philosophical and practical approach to professional development and explore a blended model that provides sustained individual and community support. Explore how EdTechTeacher empowers and motivates teachers and moves them through a consumption-curation-creation-connection pedagogical spectrum to nurture creative learning environments. We will look at particular strategies to make hands-on and online PD dynamic, interactive, and meaningful to teacher practice. Leading and Learning in Innovative Schools and Districts Onsite Your School Tom Daccord 1-2 days By Appointment Leadership, innovation, strategic planning, goal oriented Elementary, Middle School, High School All devices Technology can play a powerful role in expanding the possibilities of learning environments, but technology alone does not change schools. Leadership plays an essential role in ensuring that new technologies are paired with innovative and effective pedagogical practices. This workshop is for leaders of learning - principals, superintendents, IT directors, and academic leaders - to help develop a vision for how technology and pedagogy investments will improve student learning. We will outline key characteristics of successful technology leadership and discuss frameworks and models that help create and sustain a culture of innovation. In all, participants will leave the program with a greater comprehension of leadership around emerging technologies, a deeper understanding of effective technology integration, and an action plan for leading change in their school. Leading Teachers From Monday to Someday Onsite Your School Tom Daccord 1 or 2 days By Appointment Leadership, innovation, strategic planning, goal oriented All devices In successful tech-integration programs, conversations about great teaching center on the technology as an effective learning platform. Schools that share a common vision for learning, extensive support for teachers, and a willingness to learn from others are much more likely to reap the benefits of technology integration. Moreover, successful leaders recognize that effective tech integration is as much about attitude as aptitude and they encourage and support innovation and risk-taking. These leaders also understand that teachers often instinctively view devices as “productivity” tools to do what they've always done, so they demonstrate and communicate how teaching and learning can be enhanced. Though thoughtful integration of learning technologies requires reflecting on pedagogy, curriculum, and teacher practice (Someday), many teachers need small chunks or stepping stones (Mondays) to gain experience and confidence, and leaders leverage Monday-Someday connections. Even so, many teachers are reluctant to take risks or say they don't have the time to do so. Additionally, negative staff members with strong personalities may intimidate some innovative and risk-taking teachers. Therefore, it’s essential that leaders take away negative power and combat stagnation. Fortunately there are many ways to do so. Explore how innovative leaders in the U.S., Canada, and other countries think beyond a device or platform and promote conscientious innovation with learning technologies. We will examine common traits of innovative school technology leadership: 1) the power of vision and mission 2) planning for learning, not technology, 3) a “backward-design” alignment of mission with instruction, 4) empowering classroom innovation both formally and informally, 5) structured support for developing institutional capacity, and 6) blended professional development opportunities for teachers. We will also look at best practices for dealing with reluctant and negative teachers or administrators and for tackling the omnipresent "I don't have time to use technology" quandary. Workshop content is drawn not only from experiences at hundreds of school and thousands of educators, but also from notable researchers such as Linda Darling-Hammond, Robert Marzano, Grant Wiggins, Richard Dufour, Scott McLeod, Larry Cuban, Dan Lortie, Peter Senge, and others. In all, participants will walk away with a vision, a mission, a clear pedagogical framework, and a set of practices for transforming learning spaces to better meet the demands of an increasingly connected and cognitively demanding world. Leading Innovation in Civic Education: Preparing Citizens for a Modern World Onsite Your School Tom Driscoll, Shawn McCusker 1 or 2 days By Appointment Leadership, civics, history, ss All devices Although preparing students to become informed and engaged citizens has been a foundational goal of public education since its’ inception, there has been a renewed call to strengthen civic education across our country. We must not only recommit to civic education, but also redesign our approach so that today’s graduates are prepared to effectively engage in modern civic life. Along with a foundational knowledge about our nation’s values and government, today’s students must also effectively evaluate the validity of claims in the digital media space, take and defend positions across multiple platforms, and leverage technology to inform and mobilize their community around ideas they care about. To achieve this, all students deserve civic education experiences that are authentic and connected to the their communities, grounded in student-centered practices, and effectively leverage technology to enhance learning experiences. In this workshop, we will explore several effective approaches to civic education that incorporate instructional strategies aligned to Project Based Learning, Gamification, Design Thinking and more. We will also share high impact resources and proven instructional programs that schools can leverage to enhance civic education for all students. We will close by discussing the future of civic education and how educators across the nation can help amplify best practices that will prepare our students to be informed and engaged modern citizens. Playful Practice: Developing Games and Simulations for Teacher Learning with the MIT Teaching Systems Lab Pre Conference Boston Justin Reich, Dan Roy, Libby Falck 1-day November 8 Leadership, Gamification Elementary, Middle School, High School All devices Play and practice are powerful tools for learning, for both teachers and students. At the MIT Teaching Systems Lab, we research and develop new approaches to professional development based on games and simulations. In this workshop, we will play a variety of teacher learning games, from BalderMath to MetaRubric, and then develop prototypes for new playful learning experiences that you can take back to PD sessions at your own school. How Do We Change? Promoting Conscientious Innovation & Combating Stagnation Onsite Your School Tom Daccord 1 Day By Appointment Leadership, personalization, student -centered, pedagogy, innovation, ALL All devices Schools and districts face similar challenges in navigating the emerging technologies that are transforming society: new technologies create new pathways to learning and new forums for relationships among teachers, students, parents, and administrator; students bring new personal technologies that can enhance or interrupt learning routines. Technology environments offer unprecedented opportunities to develop personalized, student-centered learning environments, but developing effective instructional and cultural practices is challenging. In every school or district there are “pockets of excellence,” great teachers innovating and enhancing pedagogical practices. But if schools are to move from pockets of excellence to widespread reform they have to develop a system that acknowledges, encourages, and rewards innovative teachers willing to take chances to meet student needs. In this session, we'll examine concepts and practices designed to nurture innovative practices across an entire faculty and combat stagnation. As Stanford researcher Linda Darling-Hammond underlines, "the intensive development of teachers and leaders" should be the central focus of school improvement and is they key to developing a positive and risk-taking culture. How Do Thoughtful School Leaders Plan and Support 1:1 Learning ? Onsite Your School Tom, Shawn, Greg, 1 or 2 days By Appointment Leadership, personalization, student -centered, pedagogy, innovation, All devices Schools and districts face similar challenges in navigating the emerging technologies that are transforming society: new technologies create new pathways to learning and new forums for relationships among teachers, students, parents, and administrator; students bring new personal technologies that can enhance or interrupt learning routines. 1:1 technology environments -- especially mobile ones -- offer offer unprecedented opportunities to develop personalized, student-centered learning environments, but developing effective instructional and cultural practices is challenging. We’ll examine how innovative school leaders thinking beyond a device (or a platform) and redefine learning environments to promote conscientious innovation within new learning environments. Creating Maker Spaces Onsite Your School Greg Kulowiec 1-2 days By Appointment Makerspaces, computing, technology, problem solving, collaboration, Elementary, Middle School, High School All devices The Maker Movement--a movement to empower students as creators and tinkerers--has exploded in popularity. Making incorporates STEAM while emphasizing student-centered values of tinkering, low-stakes failure, design thinking, and learning through making and constructing. In this workshop, we will take a hands-on approach to understanding the Maker Movement and how we can use its principles to create a learning environment that engages students, fosters curiosity, and encourages a collaborative approach to building and constructing knowledge. In the first part of this workshop, we will explore ways that exemplar schools have incorporated Maker Movement activities into their own curriculum and structure. Next, we will discover specific activities and examples that you can use with your teachers and students right away to foster exploration and creativity. In the process, we’ll explore the impressive Makers Empire app for 3D printing. Finally, we will collaborate on making and creating curricula together as we embody the Maker ethos of collaborating and sharing in order to create lessons that are uniquely useful in our own classrooms. Makerspace Summer Workshop Boston Greg Kulowiec 1-day June 27 Makerspaces, computing, technology, problem solving, collaboration, Elementary, Middle School, High School All devices What is the "Maker" movement, and how can we effectively and creatively use a school makerspace? How can coding be used to make real objects come to life, allow students to tell stories or solve problems? In this hands-on workshop we will explore the purpose and philosophy of of school based makerspaces. By adopting a Design Thinking mindset, makerspaces and making can become more than a process of following a recipe for a prescribed product. Instead, it can become a creative environment that values both lo-fi analog creation and coding, 3D design and printing. With the underlying purpose of fostering creativity and innovation, the workshop will help educators frame the purpose of a makerspace to foster problem solving, creation and innovation. Hands-on learning in Math Classrooms Onsite Your School Greg Kulowiec, Shawn McCusker, Tom Daccord, Tom Driscoll By Appointment Math, Geogebra, Geometry Pad, manipulatives, screencasting, hands on ALL All devices Combining apps such as Geogebra, Geometry Pad, FluidMath, and manipulatives such as DigiCubes allow students to engage in hands-on learning with math concepts. We will use these apps in conjunction with a screencasting app to explore ways for students to experience math via hands-on experiences and then explain their thinking through screencasting. Differentiation & Personalization with Technology - Beginner/Intermediate Onsite Your School Rosey McQuillan & Avra Robinson, Shawn McCusker 1 or 2 days By Appointment Personalized Learning, personalization, flexible environment, Differentiation, ongoing assessment, flexible grouping All devices Laptops, iPads, Chromebooks, and even smart phones, have the potential to support struggling learners and provide opportunities for enrichment to all learners. In this workshop, we will explore how various tools and apps can facilitate differentiation and personalization and create rich learning experiences that meet the needs of ALL students. Using Universal Design for Learning (UDL) as a framework to guide our exploration, we will examine how technology can be leveraged to both scaffold and augment student learning. In particular, we will focus on how technology might support reading, writing, and note-taking, as well as provide students with multimedia options and various choices for how they demonstrate their understanding. During this intensive, hands-on workshop, participants will have abundant time to explore sites, tools, apps, and strategies that can be applied to any device - and any classroom - in order to help students develop into master learners. Personalized Learning Conference San Diego Tom Driscoll 2-day February 4-5, 2019 Personalized Learning, personalization, flexible environment, Differentiation, ongoing assessment, flexible grouping Elementary, Middle School, High School All devices Take a deep dive into personalized learning and explore the rapidly emerging and evolving concept of personalized learning. Through an examination of current research and practical examples in action across the nation, participants will identify key elements of personalization and how these approaches can advance learning for all students. Key ideas explored will include: dynamic learner profiles, flexible pathways and progressions, learner agency, and the essential role of social-emotional learning (SEL) in student-centered environments. Personalized Learning Full Year PD Your School, Online Tom Driscoll Full Year By Appointment Personalized Learning, personalization, flexible environment, Differentiation, ongoing assessment, flexible grouping Elementary, Middle School, High School iPad Throughout this T21 course, we will take a deep dive into personalized learning and explore how we leverage its key principles to enhance teaching and learning across grade levels and content areas. We will also collaboratively determine which elements of personalized learning best support the vision of your school and practical strategies for implementation at scale. Collaborative PBL Unit Development Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management All devices With the foundation of PBL in place, cohort participants will collaborate and work through a structured design process to create an activity or unit based in the principles of PBL. The purpose of workshop 2 is to have all cohort participants develop a PBL unit and to understand how to begin integrating PBL into their classroom. By the end of the workshop, participants will have developed a PBL unit that includes: Clearly defined Learning Objectives, Driving Questions to foster student inquiry Entry events for the PBL experience, Further, cohort participants will investigate the process of developing an inquiry based approach and mindset towards a traditionally structured curriculum. Design Think Your PBL Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management All devices Crafting true Project-Based Learning experiences can be daunting. Teachers struggle with the process of crafting driving questions, designing entry events, and clearly defining learning objectives. In this hands-on session, we will use elements of Design Thinking to begin the process of crafting new PBL experiences. Bring an idea for an upcoming experience, and we will start to put it in action. PBL Rebuild & Feedback Loops Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management All devices The focus of workshop three is to test the PBL unit prototypes in small group settings. Alternatively, if cohort participants are able to implement their PBL design into a class, they will report out the experience to their small work group for feedback. Prototype feedback will be based on working through the designed PBL unit to provide critique on the entry events, student experience, alignment with UBD principles and a connection to defined learning objectives. To conclude the final cohort workshop, participants will identify next steps to successfully implement a PBL experience in their classroom. Project Based Learning Conference San Diego Shawn McCusker 2-day February 4-5, 2019 Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management Elementary, Middle School, High School All devices Project Based Learning is a teaching method in which students explore real-world problems and challenges over an extended period of time, acquiring deeper knowledge and expertise. Applicable across grade-levels and content areas, PBL has seen a resurgence in interest. Project Based Learning, paired with the ever-growing technology access available in many educational settings, offer educators unique possibilities in unit design. Project Based Learning & Technology Onsite Your School Tom Daccord, Greg Kulowiec, Shawn McCusker, Tom Driscoll 1-2 days By Appointment Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management Elementary, Middle School, High School All devices Project Based Learning is an instructional strategy that encourages students to explore real-world problems and challenges, acquire deeper content knowledge, and engage in problem-seeking. Applicable across grade-levels and content areas, PBL has seen a resurgence in interest as it provides educators a framework for thinking about how to innovate their classroom practice. When paired with the ever-growing technology access available in many educational settings, PBL offer educators unique possibilities in unit design, the opportunity to provide students with alternative methods to demonstrate their understanding of concepts, a chance to refine 21st Century Skills, and the possibility to publish to a Public Audience. In this workshop, educators will experience the elements of PBL through inquiry, collaboration, sharing, and publishing. By the end of the workshop, they will have had a chance to explore exemplars in the field as well as begin to craft their own experiences for students. Project-Based Learning: Integrating Technology to Support Meaningful Student Learning Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment Project Based Learning, Voice and Choice, student learning goals, critical thinking, problem solving, collaboration, self management All devices Project Based Learning is a teaching method in which students explore real-world problems and challenges over an extended period of time, acquiring deeper knowledge and expertise. Applicable across grade-levels and content areas, PBL has seen a resurgence in interest. Project Based Learning, paired with the ever-growing technology access available in many educational settings, offer educators unique possibilities in unit design. Intentional use of technology within the essential design elements of PBL provide students with the opportunity to demonstrate their understanding of concepts, refine 21st Century Skills, and publish to a Public Audience. In this intensive workshop, participants will learn the essential design elements of PBL, meaningful ways to integrate technology as an integral component in student engagement and motivation, and instructional strategies to support student learning. With PBL, we will identify and align student learning goals, construct driving questions to support sustained inquiry, and maximize authenticity, in addition to offering student choice and voice through the use of technology. Participants will also explore examples of PBL, identify and create assessment frameworks for PBL, and reimagine current curriculum in order to implement Project Based Learning in their classroom. Universal Design for Learning & Project Based Learning Onsite Your School Rosey McQuillan 1 or 2 days By Appointment Flexible learning environments, accommodation, Inclusion, equal opportunity, All devices The first workshop in the program will focus on defining and unpacking both UDL and PBL as effective methods to develop and implement instruction. Workshop participants will explore the philosophy and method behind UDL as defined by Dr. David Rose & CAST. Further, cohort participants will engage in a UDL exercise to unpack and reconstruct a unit based on UDL principles and practice. The second element of the first workshop is to define Project Based Learning. Building off of the work of the Buck Institute for Education and “Gold Standard PBL”, workshop participants will examine the core tenets of PBL and real world examples of PBL in practice. Reading, Writing & Research in the Digital Classroom Onsite Your School ALL 1 or 2 days By Appointment Reading, Writing, Research, ELA, G Suite for EDU, Chrome, Web 2.0 apps, collaboration, resources, language, English, All devices Across content areas, reading, writing, and research sit at the heart of middle and high school curricula. Whether students have iPads, Chromebooks, or laptops, the potential exists to transform these processes in order to take advantage of the available tools. Using the TIMS model as a framework for our discussion, we will look at how these core learning tasks can be enhanced and reinvented with new technology. * Reading ­ Each device offers a host of tools, features, and apps to scaffold and enhance the reading process. We will explore options for PDF annotation, active reading with eBooks, collaborative reading, as well as content creation and dissemination to support reading instruction.* Reading ­ Each device offers a host of tools, features, and apps to scaffold and enhance the reading process. We will explore options for PDF annotation, active reading with eBooks, collaborative reading, as well as content creation and dissemination to support reading instruction. * Writing ­ From brainstorming and mind mapping to revising and publishing, we will examine ways to enhance and evolve your existing writing and note taking processes with Google Docs and the capabilities of your students' devices. From collaborative writing and editing to multimedia feedback, we will explore how you can modify the process and the product.* Research ­ Mobile devices give students instant access to digital content, collaborative annotation tools, as well as the potential to share findings with a global audience. Building off of the processes defined during the first two phases of the workshop, participants will design and plan a research project for their students to engage in during the upcoming school year. Reading, Writing & Research in the Digital Classroom Onsite Your School Greg Kulowiec, Shawn McCusker, Tom Daccord, Tom Driscoll, Avra Robinson By Appointment Reading, Writing, Research, ELA, G Suite for EDU, Chrome, Web 2.0 apps, collaboration, resources, language, English, Social Studies, history, ALL All devices Across content areas, reading, writing, and research sit at the heart of middle and high school curricula. Whether students have iPads or laptops, the potential exists to transform these processes in order to take advantage of the available tools. Using the TIMS model as a framework for our discussion, we will look at how these core learning tasks can be enhanced and reinvented with new technology. * Reading- ­ Each device offers a host of tools, features, and apps to scaffold and enhance the reading process. We will explore options for PDF annotation, active reading with eBooks, collaborative reading, as well as content creation and dissemination to support reading instruction. * Writing- ­ From brainstorming and mind mapping to revising and publishing, we will examine ways to enhance and evolve your existing writing and note taking processes with the capabilities of your students' devices. From collaborative writing and editing to multimedia feedback, we will explore how you can modify the process and the product. * Research- ­ Mobile devices give students instant access to digital content, collaborative annotation tools, as well as the potential to share findings with a global audience. Building off of the processes defined during the first two phases of the workshop, participants will design and plan a research project for their students to engage in during the upcoming school year. Innovative Uses of Technology in Math & Science Classrooms, Grades 5-12 Onsite Your School Greg Kulowiec 1-2 days By Appointment STEM, Math, Science, technology, problem solving, critical thinking Elementary, Middle School, High School All devices In this workshop, we will explore tools, apps, activities, and strategies that nurture essential Math and Science learning skills such as critical and abstract thinking through a tasks-based approach. We will explore hands-on student activities to improve understanding and encourage greater ownership, motivation, and retention. STEM Workshop Onsite Your School Greg Kulowiec 1 day By Appointment STEM, Math, Science, technology, problem solving, critical thinking Middle School, High School All devices This one day, hands on workshop will explore the purpose and structure of an effective STEM activity and classroom environment. Further, it will provide workshop attendees with both an experiential and pedagogical understanding of STEM through both a hands on STEM challenge and a thorough examination of the critical components of a STEM lesson or activity. Workshop participants will engage in and complete a challenge by following a structured design process that can be used with students in a STEM environment to facilitate meaningful STEM challenges. The focus and purpose of the workshop is to thoroughly explore and understand the purpose, structure and process of a STEM challenge and classroom environment. Participants will develop an understanding of STEM as a framework that emphasizes critical thinking, problem solving, creativity, communication & collaboration as embedded skills within the STEM process. Enhancing STEM with Technology Onsite Your School ALL 1 or 2 days By Appointment STEM, STEAM, Web 2.0, apps, ePub, creation, interactive notebooks, innovation, collaboration, resources All devices This hands-on workshop is an opportunity for science, technology, engineering and math (STEM) educators to explore practical ways to use technology to enrich their STEM curricula and engage students. The session emphasizes innovative ideas and projects that incorporate both Web 2.0 tools and apps involving laboratory simulations, equations and graphing, electronic laboratory notebooks, ePub creation, and more. The Enhancing STEM Curriculum with Technology workshop is an intensive, hands-on opportunity for science, technology, engineering, and math (STEM) educators to explore practical ways to use technology to enrich their curricula and engage students. The workshop explores innovative ideas, effective techniques, and thoughtful plans for incorporating web-based resources, mobile devices, and emerging technologies into classroom instruction. Excutive Functioning Supports and Strategies Onsite You School Rosey McQuillan 1 time management, organization, chromebook, iPads, engagement, problem solving, task initiation, multitasking Chromebook, iPads Many of our students struggle with executive functioning. Executive Functioning skills are those that are needed for everyday life. They include: planning, problem solving, flexibility, organization, time management and task initiation. For many of our students, these skills can be challenging and pose many educational hurtles. In this workshop, participants will explore a variety of tools, resources and strategies that can aid in time management, organization, note taking and reading. Twitter for Teachers: Why and How Onsite Your School ALL 1 or 2 days By Appointment Twitter, Personal Learning Network, PLN, social, networking, social media All devices Twitter is the most popular social-networking microblogging site on the web and the most important professional development tools for connected educators. Yet, many educators do not understand the potential that it has to inform, communicate and collaborate, especially in education. Twitter can be an amazing tool to harness the power of social-networking for our students and for professional growth. We will focus on our own professional growth and create a PLN or “Personal Learning Network.” You will find educators, educational organizations, authors, scientists and many others from around the globe who are eager to share and learn with you. Coaching Teachers to Student Success & Learning Onsite Your School ALL 1 or 2 days By Appointment Collaboration, problem solving, professional development, coaching, teachers, staff development Chromebook Digital Age Teaching and Learning As schools integrate technology into the core curricula, teachers need support! The role of technology coach is a relatively new concept being adopted by districts everywhere. Whether you are a tech savvy teacher coaching colleagues informally, an administrator, or formal tech coach, come learn strategies for success in helping adults learn and adopt technology skills & processes. Taking teachers from reluctance to self‑confidence is paramount in the adoption and infusion of technology into the classroom. Teachers need to know that it’s not just about the technology. It’s not about the device. It’s about the LEARNING and the STUDENTS. Collect - Relate - Create – Donate Onsite Your School ALL 1 or 2 days By Appointment Collaboration, curation, creation, sharing, ELA, math, science, social studies All devices In Leonardo’s Laptop, Professor Ben Shneiderman provides teachers with a powerful framework, Collect-Relate- Create-Donate (CRCD), for designing student-centered learning opportunities using computers. Shneiderman developed his model by applying new insights from creativity researchers like Mihaly Csikszentimihaly and Howard Gardner to establish creative problem solving methods. In CRCD projects, students research information, work collaboratively to create a meaningful product that demonstrates their learning, and contribute that project to a larger learning community. Shneiderman designed the Collect-Relate-Create-Donate framework as a vehicle for preparing young people for a 21st century world where innovation, creativity, and collaboration will be more highly prized than retention and repetition.Each training session is guided by the CRCD model and is geared towards the goal of developing digital citizenship skills and fostering learner-centered collaborative learning. We expect participants to demonstrate knowledge, understanding, and proficiency in digital citizenship including finding, selecting, analyzing, manipulating, modifying, and distributing information. We also expect participants to demonstrate knowledge, understanding, and proficiency in using emerging technologies to develop collaborative, learner-centered, and community-minded learning environments. Collect-Relate-Create-Donate: Innovative Uses of Technology in Humanities Classrooms Onsite Your School ALL 1 or 2 days By Appointment Reading, Writing, Research, ELA, G Suite for EDU, Chrome, Web 2.0 apps, collaboration, resources, language, English, Social Studies, history, All devices Used wisely, academic technology empowers students to take responsibility for their own learning. In Leonardo’s Laptop, Ben Shneiderman provides teachers with a powerful framework, Collect-Relate-Create-Donate (CRCD), for designing student-centered learning opportunities using computers. In CRCD projects, students research information, often work collaboratively to create a meaningful product that demonstrates their learning, and contribute that project to a larger learning community. This session provides several examples of innovative uses of technology in social studies, ELA and language classrooms. Examples highlight both inquiry-based and research-oriented technology applications for middle school and high school classrooms where students present their learning in multiple modalities. Combining the Physical and the Digital Onsite Your School ALL 1 or 2 days By Appointment physical artifacts, artifacts, artifacts of learning, technology, innovation, digital, digital tools, English, social studies, math, science, language, ELA, language arts (Secondary) All devices When students have an opportunity to combine physical and digital resources, they can engage in deeper inquiry, access content through a variety of modalities, and experience learning in a whole new way. In this session, we will look at how to use QR codes and Augmented Reality to extend the learning context. Coming to a Classroom Near You: 3D Networked Textbooks Onsite Your School Greg Kulowiec, Shawn 1 or 2 days By Appointment 3D, network, textbooks, English, math, science, social studies All devices Exploring the Future of Educational Resources This workshop is designed to explore near ­term developments in educational technology that will transform classrooms of the 21st century. First, educational publishers are actively surpassing the affordances of print with a variety of technologies and innovations, including 3D simulations, embedded videos, interactive maps and photos, formative quizzes, reading and writing aids, the ability to share notes and bookmarks, audio commentaries, regularly updated and searchable content, music, etc. ­­ all with one’s fingers on a tablet. Second, augmented reality is poised to change the way students view and interact with educational content. Picture a student sitting in a classroom and alternately watching a civil rights era video, listening to Martin Luther King's "I Have a Dream Speech," examining an historical calendar of events, and reading a primary source, simply pointing her mobile device at various designated points in the room. As classroom textbooks become not only digital, but socially connected with the ability to interact online in real time, will they become our principal learning management system ­­complete with discussion forums, electronic portfolios, and e­gradebooks? With the emergence of iBooks Author and other applications, will schools now start creating their own textbooks and readers? So, will classrooms become increasingly immersed in a world of devices, apps, and browser? Or will schools opt for "open source" textbooks and other e­readers? Might schools instead become ensconced in a "cloud" of virtual and augmented networks dominated by just about bringing new technologies into classrooms. Participate in both a conceptual and practical exploration of digital age publication tools and processes. Create with Chromebooks Onsite Your School ALL creation, Chromebooks, G Suite for EDU, Google, Google tools, English, math, science, social studies, technology This workshop will focus on the potential for students to create with Chromebooks beyond the G Suite environment. Workshop participants will explore multimedia creation on chromebooks that includes: Screencasting, Digital Storytelling and Audio Creation. Create your School/District Guide to Design Thinking Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker 1 or 2 days By Appointment Design Thinking, design, problem solving, making, maker space, makerspace, All devices Using the Design Thinking Toolkit and DEEPdt Toolkit as exemplars, in the final workshop cohort participants will design a school specific Design Thinking Toolkit to begin the process of introducing, supporting and integrating Design Thinking into their larger school community. Participants will also develop a lesson plan, project plan or unit that integrates Design Thinking principles and leverages a school MakerSpace or the concept of “making” into their classroom. Creating a Paperless Classroom Onsite Your School ALL 1 or 2 days By Appointment paperless, Google Drive, environment, Green, English, Math, Science, Social Studies All devices While going paperless is not a learning objective in the classroom, it does provide unique and numerous benefits to both the classroom teacher and student. The session will explore multiple approaches to going paperless that will include but are not limited to exploring Google Drive, Evernote and Notability. Various aspects of going paperless will be examined from that will specifically include the ability to distribute paperless work to students as well as workflow solutions for the classroom to both view and provide feedback on student work. Along with the technical approach to transitioning to and becoming a paperless classroom, the session will examine the benefits and value added to the classroom environment when adoption a paperless approach. Creating Custom Course Content Onsite Your School ALL 1 or 2 days By Appointment PDF, book creator, ELA, English, history, social studies, math, science, creation, course content, textbooks, e-books, iPad iPads provide excellent opportunities for students to engage with content in a number of ways. In this session, we will explore ways that teachers can easily create and curate content for students to then access via their iPads. In particular, we will examine the power of PDFs - how to create them using services such as PrintFriendly as well as how students can manipulate them with apps like Notability or Explain Everything. We will also look at ways that teachers can create custom eBooks using Readlists or Book Creator. Deepening Technology Integration Onsite Your School ALL 1 or 2 days By Appointment innovation, SAMR, Ruben, Ruben Puentedura, framework, technology, integration, technology integration All devices In this session, we will explore what it means to create a dynamic and innovative learning environment. Using Ruben R. Puentedura’s SAMR model (Substitution - Augmentation - Modification - Redefinition) as a framework, we will analyze iPad-integrated activities and work through the process from Enhancement to Transformation with the goal of creating technology-rich environments that support student acquisition of higher-order thinking skills. Demonstrating Student Thinking with Audio Creation Onsite Your School ALL 1 or 2 days By Appointment audio, podcast, auditory feedback, innovation, speaking and listening, speaking, English, math, science, social studies, language, history, foreign language All devices When given access to new technologies, students have the ability to demonstrate their thinking in new and powerful ways.Tools available on the web and mobile applications have given students the ability to express themselves verbally and in a way that allows teachers to collect and retain that verbal expression. In this session, teachers will explore tools available to them that give students this power of creating audio in a new and exciting manner including: podcast creation, auditory feedback collection, and many other classroom examples. Designing Learning Centers Onsite Your School ALL 1 or 2 days By Appointment learning centers, centers, elementary, middle school, ELA, English, math, science, social studies, group work, All devices Not 1:1? No problem! iPads are a great addition to any learning center or small-group, collaborative activity. We will explore ideas and concepts for how iPads can help to document and extend student learning in a shared environment. Differentiating and Personalized Learning with Technology Onsite Your School ALL 1 or 2 days By Appointment UDL, universal design for learning, special ed, special education, sped, ELA, english, writing, reading, differentiation, personalization, G Suite for EDU, Google, Google Tools, web 2.0 tools, tools, All devices Laptops, iPads, Chromebooks, and even smart phones, have the potential to support struggling learners and provide opportunities for enrichment to all learners. In this workshop, we will explore how various tools and apps can facilitate differentiation and personalization and create rich learning experiences that meet the needs of ALL students. Using Universal Design for Learning (UDL) as a framework to guide our exploration, we will examine how technology can be leveraged to both scaffold and augment student learning. In particular, we will focus on how technology might support reading, writing, and note-taking, as well as provide students with multimedia options and various choices for how they demonstrate their understanding. During this intensive, hands-on workshop, participants will have abundant time to explore sites, tools, apps, and strategies that can be applied to any device – and any classroom – in order to help students develop into master learners. Digital Portfolios with SeeSaw Onsite Your School ALL 1 or 2 days By Appointment Seesaw, digital, digital portfolio, problem solving, curation, artifact, collaboration, communication, community All devices SeeSaw is a fantastic platform for curating and sharing student work. Students can share images, text, videos, links and more to their SeeSaw portfolio, ultimately sharing their work with their teacher, classmates, and even their parents. In this hands-on session, we will explore the power of SeeSaw to introduce students to the world of publishing and sharing as well as to encourage them to curate their and reflect on their learning artifacts. Improved Student Reflection and Sharing: Flipgrid Onsite Your School ALL 1 or 2 days By Appointment video, reflection, communication, speaking, listening, innovation, English, math, social studies, science All devices Allowing students to reflect and share with their classmates is a powerful. Video reflection is a way to let students showcase their knowledge and add depth to the conversation beyond the classroom. Develop speaking skills and give a voice to students who might not otherwise speak up in class. Infuse Technology into the Social Studies Classroom Onsite Your School Tom Daccord, Greg Kulowiec, Tom Driscoll, Shawn McCusker, 1 or 2 days By Appointment social studies, humanities, history, research, reading, writing, technology, innovation, podcast, video, digital portfolio, website creation, collaboration All devices Specifically targeted to social studies & history teachers, this session will address meaningful, productive, creative and content specific uses of technology in the social studies classroom. Going beyond being device specific, this session will focus on a multitude of tools and resources that can transform learning in social studies classrooms. From digital portfolios to website creation, podcasts, and more. Innovation in Social Studies, English & Language Arts, and World Language Classrooms Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment social studies, humanities, history, research, reading, writing, technology, innovation, podcast, video, digital portfolio, collaboration, English, language, foreign language, All devices Used wisely, the iPad helps empowers students to take responsibility for their own learning. This session provides several examples of innovative uses of technology in social studies, English & language arts, and language classrooms. Key concepts to be addressed include communication with varied modalities, leveraging audio and video, and creating electronic publications, In designing activities, teachers are encouraged to integrate non-subject Evergreen apps useful for speaking, writing, listening, drawing, annotating, collaborating, sharing, and more. Leveraging Devices and Digital Tools to Create a Differentiated Learning Environment Onsite Your School Rosey McQuillan 1 or 2 days By Appointment UDL, universal design for learning, special ed, special education, sped, ELA, english, writing, reading, differentiation, personalization, G Suite for EDU, Google, Google Tools, web 2.0 tools, tools, All devices In this workshop, educators will explore how various tools and apps can facilitate differentiation and how to personalize instruction to meet the needs of all students. This workshop will use the Universal Design for Learning framework, which provides a blueprint for creating instructional goals, methods, materials, and assessments that work for all learners. This is not a one-size- fits all solution; rather, it is a flexible approach that can be customized and adjusted to accommodate individual differences.During this hands-on workshop, participants will explore a variety of sites, tools, apps and strategies that can be applied to any device in order to leverage technology and scaffold student learning. In particular, we will focus on how these tools can support reading, writing and note-taking while allowing students some voice and choice in how they demonstrate their understanding. Make Student Thinking Visible & Engage Learners via Screencasts Onsite Your School Avra Robinson, Rosey McQuillan, Anissa Labrador By Appointment screencast, video, innovation, engagement, communication, speaking, listening, english, math, science, social studies, visible thinking ALL All devices A screencast is so much more than just a way to learn a math problem. Through screencasting, students can engage in self-reflection, peer-editing, deeper learning, and much more! Teachers can also create additional opportunities for connections with parents, students, and colleagues by creating screencasts themselves. In this session, we will explore using screencasts for a variety of purposes including formative assessment, communication, and making student thinking visible. Making Thinking Visible Onsite Your School ALL 1 or 2 days By Appointment screencast, video, innovation, engagement, communication, speaking, listening, english, math, science, social studies, visible thinking, Project Zero All devices Beyond the confines of an 8.5x11 page, how can students truly show what they know? With iPads, the opportunities for students to demonstrate their thinking and understanding are virtually unlimited. We will examine both the capabilities of the device to scaffold how students make their thinking visible as well as strategies to support their thinking and reflection. Making Thinking Visible by Leveraging Technology in the Classroom Onsite Your School ALL 1 or 2 days By Appointment screencast, video, innovation, engagement, communication, speaking, listening, english, math, science, social studies, visible thinking All devices Students that are given access to technology in the classroom have the ability to make their thinking visible in new and exciting ways. The question is: how can teachers encourage students to be critical thinkers and not just accept simple answers to questions they find in a quick internet search? Harvard’s Project Zero has developed a series of visible thinking routines that “loosely guide the learner's’ thought process and encourage active processing.” These routines are not centered around technology, however, when paired with technology tools, students are challenged to ask deeper questions and use technology to demonstrate their understanding. This session will focus on integrating Project Zero’s thinking routines and combine them with technology to better help students make their thinking visible. Nearpodize Your Learning Onsite Your School ALL 1 or 2 days By Appointment Nearpod, Powerpoint, slides, interactive, feedback, visible thinking, presentation, paperless, multimedia All devices Nearpod empowers teachers to facilitate lessons in a way that will spark students’ curiosity, excitement, and motivation. Teachers can share multimedia activities, receive real-time feedback, and instantly gauge student understanding. In this session, you will learn how to incorporate this powerful tool in your classroom, and leave with an interactive lesson to share with your students tomorrow. Not Another Paper! Alternative Student Communication Projects Onsite Your School ALL 1 or 2 days By Appointment multimedia, inniovation, UDL, differentiation, personalization, (Elementary or could be customized for Secondary) All devices Join in reviewing alternative activities and projects using interactive technologies and see how online media and apps can help empower student­-centered learning. By the end of the workshop participants will be able to: 1. describe the qualities of effective alternative activities and assessment 2. explain how powerful activities emerge from well­ chosen essential questions 3. identify several Read/Write Web, social media tools, and apps that can be used to create alternative activities. Nurturing Digital­ Age Writing & Communication Onsite Your School ALL 1 or 2 days By Appointment (Secondary) All devices The possibilities inspired by the presence of laptops, iPads, Chromebooks and other devices in today’s classrooms provide a tremendous opportunity for educators to rethink the design of learning environments in ways that will best suit the needs of today’s students. By embracing multimodal devices that allow students to communicate and create, as well as developing a pedagogy and curriculum that encourages ingenuity, we can reinforce a process of learning that crafts innovative and minds. This hands­-on workshop highlights creative educational uses and shows how teachers can employ it as a portable media creation device. Adopting a collect-­relate-­create­-donate framework, this session will focus on what students and teachers can ­­ from creating audio, video, and screencasts to crafting digital reports and collaborative publications. Once educators focus on creative learning potential, they can start to cultivate a small set of web tools and “Evergreen Apps” into almost limitless instructional possibilities for speaking, writing, listening, drawing, annotating, curating, collaborating, sharing, and more. Publish All About It Onsite Your School ALL 1 or 2 days By Appointment blog, book creator, Google, ipad, chromebook, laptop, ELA, English, history, social studies, math, science, creation, course content, textbooks, e-books, multimedia All devices The power off a wider, more authentic audience can be the factor that takes student work from just mediocre to great. It can be the drive that brings JOY back into learning. When students are introduced to the feeling of producing an artifact of learning that is then shared with people beyond the classroom walls, motivation is born. In this session, we will explore a variety of tools and strategies to help students get bitten by the "publishing bug." Reaching Diverse Learners: Technology Integration to Empower, Engage and Support Onsite Your School Rosey McQuillan, Avra Robinson By Appointment diverse, UDL, universal design for learning, IEP, special ed, special education, sped, ELA, differentiation, personalization, G Suite for EDU, Google, web 2.0 tools, tools, ALL All devices Technology permeates all aspects of our lives and those of our students. How can we plan and implement technology effectively so that we can empower, engage and support our students while meeting IEP goals and objectives? In this workshop, participants will learn multiple ways in which designing and delivering curriculum can meet student variability in their classrooms. In this hands-on session, participants will explore a variety of sites, tools, apps and strategies that can be used to provide differentiated instruction while allowing for student voice and choice in how they demonstrate their learning. In particular, we will focus on how these tools can support curriculum access while accommodating for student differences. Participants will leave this workshop with a host of tools, resources and ideas to support students in their classrooms. Teaching Foreign Language with Technology Onsite Your School Tom Daccord 1 or 2 days By Appointment languages, foreign languages, world languages, EFL, ESL, ELL, spanish, french, italian, german, mandarin, chinese, japanese, english, speaking, listening All devices This intensive workshop will offer hands-on opportunities for Foreign Language / World Language educators to explore practical ways to use technology to enhance instruction through the 5C’s framework (Communication, Creativity, Culture, Community, and Critical Thinking) — with specific attention to listening, speaking and writing skills. The workshop will incorporate Web-based resources, apps, social media, mobile devices, and emerging technologies into foreign language classrooms with an eye towards building communication skills, creativity and critical thinking. Examples of technology use in foreign language classrooms will be drawn from a variety of contexts and languages and the workshop is appropriate for teachers of any foreign language. The combination of presentations, resources, and hands-on exploration will leave participants with tools and strategies to build creative, collaborative, and community-minded classrooms of the 21st century. Teaching Foreign Languages with Flipgrid and Quizlet Onsite Your School Tom Daccord 1 or 2 days By Appointment video, languages, foreign languages, world languages, EFL, ESL, ELL, spanish, french, italian, german, mandarin, chinese, japanese, english All devices Flipgrid and Quizlet are two great tools to enhance speaking and comprehension in a languages classroom. Flipgrid is a free video reflection platform owned by Microsoft that where teacher creates "topics" and students provide a video response to a question or prompt. Student logs in through the app or web and students can record what they think or feel and demonstrate what they understand. Quizlet is a free web and app-based application that enables users to create flashcards with terms and definitions. Flashcards can be turned into different types of learning activities and the Quizlet Live feature enables teachers to use flashcards in a fun and collaborative game environment. Teaching Humanities With Technology Onsite Your School Greg Kulowiec, Tom Driscoll, Shawn McCusker, Tom Daccord 1 or 2 days By Appointment history, social sciences, geography, civics, english, ELA, literature, humanities All devices This workshop offers hands-on opportunities for educators to explore practical ways to use technology to enrich the study of ELA and Social Studies. The workshop will explore innovative ideas, effective techniques, and thoughtful plans for incorporating Web-based resources, G Suite for Education, apps for mobile devices and new and emerging technologies into classroom instruction. Participants will examine examples of the best humanities-related websites, work with innovative tools to help improve student reading, writing, and research, and develop skills with emerging technologies such as Google Add-Ons, Chrome Extensions, video discussion forums, social networks and more. Telling Your Story with Social Media Onsite Your School Greg Kulowiec, Tom Driscoll 1 or 2 days By Appointment social media, publish, digital, storytelling, twitter, facebook, instagram, snapchat, ipads, writing, publishing, feedback All devices Who better to tell the story of your classroom than you and your students? Whether you choose Twitter, Facebook, Snapchat, or any other social media tools, with iPads, you have the power to share your learning with a broader community. In this session, you will learn tools to tell and share your story as well as strategies for using them with your students. The Power of Screen Time! Reading, Writing, & Devices Onsite Your School ALL 1 or 2 days By Appointment screens, screen time, children, reading, writing, research, notes, note taking, ipads, chromebook, smartphone, laptop All devices The Association of Pediatrics recommends limits on screen time. Researchers have recently proven note taking with laptops to be ineffective for retaining higher-order cognitive knowledge. However, rather than blame the tools, let's examine the process. In this session, we will look at the power of screens to scaffold, enrich, and augment the processes of reading, writing, research, and note taking. When we combine the functionality of technology with re-envisioned tasks, amazing things can happen! Understanding The Flipped Classroom: Concept & Strategies Onsite Your School ALL 1 or 2 days By Appointment flip, flipped, classroom, screencast, video, multimedia, formative, assessment, publishing, YouTube, All devices The Flipped Classroom is essentially about using technology to transform the way students learn. From conceptual framework, to formative assessment strategies, to screencasting and media production tools that allow teachers to create their own content, we will examine how teachers and students can use a variety of platforms to maximize the value of their class-time together. Upload and Transform Your Handouts! (Go Formative) - Onsite Your School ALL 1 or 2 days By Appointment formative, goformative, formative, summative, assessment, handouts, workflow, PDF, PowerPoint, quiz, YouTube, instant response, interactive, multimedia All devices Formative at goformative.com is an exciting instance response system that enables teachers to upload Word and PDF documents online and insert interactive questions that can be automatically graded. Formative also allows for the insertion of YouTube videos into documents. In addition to traditional text responses, students can draw and upload images as part of their answers and teachers can view all student responses in real time. In this session you'll experience Formative's intriguing interactive features and the powerful ways that Formative can be used for visual, formative assessment. Using Mobile Devices and Web Tools to Create Video in the Classroom Onsite Your School ALL 1 or 2 days By Appointment mobile, video, BYOD, iPad, Chromebook, smartphone, laptop, iMovie, DoInk, WeVideo, Screencastify, Adobe Spark, book creator. All devices As more and more devices enter into our classrooms, teachers are presented with an opportunity to expand the way students are able to demonstrate their learning. Traditionally, teachers have opted for the essay, but with all of the technology currently available to students, alternate ways of presenting knowledge are readily available. Video creation can be a powerful alternative to written composition. In this session, participants will be presented with the benefits of student created videos, along with tools for creating those videos on the iPad, Chromebook, smartphone or laptop. Potential tools may include include: iMovie, DoInk, WeVideo, Screencastify, and Adobe Spark Video. VR in Edu - From Consumption to Creation Onsite Your School Shawn McCusker, Greg Kulowiec 1 or 2 days By Appointment VR, virtual, reality, visual, Google, Carboard, Expeditions, moblile, laptop, ipad, chromebook, phone, smartphone All devices From the Virtual Reality Bus to Google Cardboard and everything in between, this session will explore the potential of virtual reality in the classroom. With the recent emergence of virtual reality environments in education, much of the VR content on the market for classroom use is pre-created by VR developers. However, there are VR creation platforms emerging that allow both teachers and students to capture environments and create virtual reality environments of their own. Join us as we explore the spectrum of possibilities in this emerging field and critically evaluate the potential use in the classroom. NOTE: Multiple devices will be used in the workshop to both consume and create the VR content (mobile phone, laptop & iPad). Please bring both a laptop/tablet & modern mobile phone (iOS or Android) to the workshop. What Does Learning Look Like? Onsite Your School ALL 1 or 2 days By Appointment blended, assessment, formative, visual, feedback, toolkit, visible thinking, nearpod, goformative All devices Capturing Student Understanding in a Blended Environment - During this session, participants will play the role of student and experience hands-on learning using Formative and Nearpod in different learning contexts. Both tools provide the opportunity for students to demonstrate their understanding either synchronously or asynchronously and with a variety of media. Using the Qualitative Formative Assessment Toolkit as a model, we will examine how students can make their thinking visible and teachers can respond with immediate, personalized feedback. Justin Reich is an educational researcher interested in the future of learning in a networked world. He is the executive director of the PK-12 Initiative at the Massachusetts Institute of Technology, a research scientist in the MIT Office of Digital Learning, and a lecturer in the Scheller Teacher Education Program. He is also a Fellow at the Berkman Center for Internet and Society, and the co-founder of EdTechTeacher, a professional learning consultancy devoted to helping teachers leverage technology to create student-centered, inquiry-based learning environments. He was previously the Richard L. Menschel HarvardX Research Fellow, where he led the initiative to study large-scale open online learning through the HarvardX Initiative, and a lecturer at the Harvard Graduate School of Education. He earned his doctorate from Harvard University, where he created the Distributed Collaborative Learning Communities project, a Hewlett Foundation funded initiative to examine how social media are used in K-12 classrooms. He writes the EdTechResearcher blog for Education Week, and his writings have appeared in Science, The New Yorker, The Atlantic,Educational Researcher, the Washington Post, Inside Higher Ed, the Christian Science Monitor, and other publications. His forthcoming book, Massive: The Future of Learning at Scale, is under contract with Harvard University Press. Justin started his career teaching wilderness medicine, and later taught high school world history and history electives, and coached wrestling and outdoor activities. Shawn McCusker has 25 years of experience as a middle and high school teacher in public, private and alternative schools. In 2006, he was recognized as a finalist for the Golden Apple Award for Excellence in Teaching. An innovator in the creation and organization of online learning communities such as the #sschat, #1to1techat and #engsschat on Twitter, he is an expert in both iPad and Chromebook integration in the classroom. His innovative lessons and student products have been shared nationwide and have been featured in the Journal, Educational Leadership and the Huffington Post. In 2016 he was named a Top Trailblazing Educator on Twitter by eSchoolNews.
2019-04-18T14:40:18Z
https://edtechteacher.org/workshops-keynotes/
Plettenberg Bay, or “Plett” as the locals call it, and the surrounding area is a place I could spend a lot more time. Like a month or so. At least. From the beautiful lush coast landscape, including hiking trails and National Parks that run along the beach, to the extensive wildlife, including the Birds of Eden Bird Sanctuary (the second largest aviary in the world; so big it doesn’t really feel like you are in any type of enclosure), a Wolf Sanctuary, a Lion Sanctuary, an Elephant Sanctuary, a Leopard Sanctuary, and more. There’s also the adventure sports here: the Bouji?? Bungy Bridge (highest bungy bridge in the world), paragliding, kite surfing, shark diving, kayaking, surfing, etc. World’s highest bungee bridge at just over 700 feet. Uh, maybe next time. Or not. I will definitely return to Plett. I am feeling guilty that I don’t have enough time to see and do everything I want to experience here. But unfortunately I’ve created a bit of a schedule for myself that I am going to have to somewhat stick to. I don’t have a hard-and-fast daily schedule, but I have a limited amount of time to cover this continent and the next, while staying within the preferable weather window. The elephant just grabbed my hand with her trunk, and we walked along like that…. Ok, so maybe it wasn’t quite like that. I stopped at the Elephant Sanctuary, where not only did I get to walk trunk-in-hand with the elephants, but I learned a tremendous amount about elephants. For example, one big difference between an Indian Elephant and an African Elephant is the size of their ears. African elephants have larger ears. They use their ears as radiators and fans for body temperature control. The larger ears have more blood flowing through them to help cool it, and they flap their ears to help stay cool. They also roll around in the mud as a natural sunblock. Did you know elephants only have four teeth: all molars, for chewing. But they go through six sets of these teeth in a lifetime. Also, elephants’ front feet are larger and round, because they carry more weight on their front feet than the rear. Two of the elephants I met at the sanctuary had lost the tip of their trunks. Normally an elephant has a couple of projections at the tip of its’ trunk that it uses like fingers to grab and pull grass up to eat. The two elephants that had lost this part of their trunks (the handlers at the sanctuary thought it had probably happened in a snare trap) had learned to use their feet to kick at the ground and tear the grass up before eating it. After leaving the elephant sanctuary, I headed inland, over the Outeniqua Pass towards Oudtshoorn (“Ostrich Capitol of the World”) and the Klein Karoo, or Little Karoo. Once through the pass, the scenery quickly changed from the lush green coastal landscape to arid semi-desert. At Oudtshoorn I turned back west on Route 62, which is South Africa’s version of our Route 66, and much of it looks like Route 66 through New Mexico or Arizona: red rock bluffs, high desert scrub, and a long two-lane highway. I camped at the Station Inn campground, where Cheryl and Michael have converted the old Calitzdorp railroad stop into a campground and pub. I entered the coordinates for Calitzdorp into my GPS and then rode until I saw the pin. Yes, the trolley cars function, and you can take one and go to the end of the property on it. I was the only one at the campground this night. Across the tracks from the old ticket office is an old warehouse that Cheryl and Michael have turned into a pub and party hall. I was the only camper, though several locals showed up to play darts at the pub, and I spent some time talking with the owners about my travels, their travels (Michael has a BMW 650), and other travelers who have come through. The next morning I continued northwest on Route 62, and once again the winds picked up, causing me to fight for lane position again. By the time I reached N2 (the main highway to Cape Town), I was exhausted and my back, shoulders and neck were aching from straining to hold the bike on course. I had one more pass to cross before I would hopefully be out of the strong winds and back on the Cape Town side of the weather. Near the top of this pass is the Hugenot Tunnel, a 4 km long tunnel through the mountain. As I had hoped, the wind on the other side of the tunnel was just a slight breeze and things returned to a more relaxed ride, even though the pace was still much faster than I would have liked. As I finished packing to leave the Backpacker Hostel in Agulhas, a gentleman approached me and asked some of the usual questions: where was I headed, where did I come from (which typically starts a much longer conversation when they realize that i rode 35,000 kilometers on a 250 to get here). Within a few minutes, his family joined him; it’s often the “I sold my house, my car, and most of my belongings before leaving on this trip” that gets the wife interested. Suddenly, it’s not just about motorcycles any more. Once again, South African kindness prevailed, and before leaving, Mrs. Charda gave me a slip of paper with their phone numbers on it and asked me to call them when I returned to Cape Town and she would cook an Indian dinner for me. Nearly the entire day was spent on major highways, which I hate. But the N2 highway is the coast road along this section of the Garden Route, so I had no real choice. The speed limit here is 120 kph (about 74 mph) in many places, and that’s faster than the XT likes to go. I felt bad pushing it at 100 kph for any extended period, but with all of the Easter traffic returning home today, I had to get out of the way. This is the first time of my entire trip that I’ve felt I was going slower than the majority of the traffic, and it’s an indication that I’m not on the roads I want or like to be on. In South Africa, it’s common to pull onto the shoulder to let faster traffic pass (much like in Texas), and here nearly every car that passed me, including a police car, turned their flashers on for two or three flashes after passing as a “thank you”. Speaking of road customs, I hadn’t really considered it until today, but motorcyclists here have a bit of a difficulty with being friendly. In the States, it’s very common for two bikers to “wave” at each other when they pass on the highway. This is done by extending the left hand out to the side and down slightly. In South Africa, that doesn’t work so well, since you’re on the opposite side of the road and the “wave” is on the wrong side. Of course, you can’t just take your right hand off the throttle to wave (unless you have cruise control, which is a small percentage of bikers). In France and Italy, when I would pass other bikes, they would hang a foot off the peg as a means of waving without removing a hand from the bars. Here in South Africa, they do this “head nod” thing: they kind of flop their head to the right side, like waving your head instead of your hand. It looks odd at first, but I caught on after a while. After a relatively long (450 km) day on the highway, I arrived at Natures Valley National Park, just outside of Plettenberg Bay. It’s a fairly small camping area, but nice, filled with trees, and baboons apparently. Sign posted on the door to the kitchen area at the campground. I didn’t see any, but I heard some odd noises during the night. My food stays locked in the panniers while camping here, just in case. Am I Back in Patagonia?? It poured down rain all night. I stayed dry in my tent, though for the first time I had a little drip where the fly and tent touch the main pole. It stopped after a bit and never really became a problem. I slept really well, other than occasionally having to peek outside to make sure the river wasn’t rising too fast. I knew when I went to bed it was about four feet lower than my tent. It rained a bit over an inch during the night. So I didn’t float away. It continued to rain on and off until about 10am, when the sun peeked through the clouds long enough to dry the rain fly and footprint of my tent and get everything packed. I headed for the coast, to the town of Strand, then followed the coast road to Betty’s Bay and Hermanus. The road to Hermanus from Strand is another one of those epic coastal roads, just hanging there over the ocean. With the front that blew through last night, the wind was howling and the seas were really churning. Waves looked like they would crash and stop, the wind forcing them back and not allowing any further forward progress. Like Chapman’s Peak, this is a road I could ride several more times just for the scenery. The coastal route runs right along the edge of the mountains here. Spectacular! Not sure if the black flag with the shark on it is truly a shark warning for surfers, but I don’t want to find out. Beyond Hermanus I turned inland and really fought the wind. At one point I found myself fighting hard to stay on the road at 28mph. Any faster and I couldn’t keep the bike in the lane. A large dust storm blew across the road for about a mile, reducing visibility and making it feel like the front tire would slip out from under the bike at any moment. It was worse than anything I had experienced in Patagonia. Eventually I made it to Cape Agulhas, although I have to admit that for the last ten miles I was seriously questioning if it was worth it. The whole reason to go to Agulhas is like going to Ushuaia: it’s the furthest point south on the African continent, and of course I just had to have the photo. But getting there made getting to Ushuaia look easy. It’s not always like this here; I just picked the worst possible day, just after a strong front passed through. Ok, that’s it for “south”. Time to start heading north. I had planned to camp at a caravan park in Agulhas but it’s just a big grass lot a block from the ocean, and I was afraid the wind was too strong for my tent, so I began to look for a place to stay. Unfortunately it’s Easter Sunday, and everything in town was booked. I stopped at several places, and at one the couple who own it called around for me, confirming that nothing was available. Ugh. Into the wind….always point it directly into the wind, not at an angle. While waiting for the couple to check on alternative lodging for me, the wind managed to blow my bike OVER the kickstand and onto the ground. First time I’ve had that experience. I knew when I parked the bike I should have pointed it into the wind, but at the time there was a lull and I thought I could make it. I resigned myself to trying to pitch my tent at the caravan park. When I got there, it was closed, and there was a sign that said their Sunday hours were until noon, and listed an after-hours number to call. I fished my phone out of my pocked and started to dial, but before I could finish a woman walked up and asked if I was looking for accommodation. Well, that decided it for me. I got back on the bike and rode back across town to the hostel. The guy at reception was very nice, showed me a great place to put my tent with good wind protection, and gave me a tour, including all the amenities available to me even though I was just camping. Hot showers, free coffee and tea 24/7, swimming pool. All for 80 Rand, or five dollars. The wind is supposed to die down tomorrow. I hope so. I’m not sure I can get out of this town otherwise, as it will be worse heading the other way. Tomorrow will be a long day, with or without the wind, but I’m looking forward to more spectacular scenery. And I’m only a couple of days away from large animals! It’s Easter weekend, and while summer has just ended, it’s a holiday (think Labor Day at the end of summer in the U.S.). I’m headed first to Franschhoek (Afrikaans for “French Corner”) and then to a campground on the river for my first night in the tent in Africa. Franschhoek is less than an hour from Cape Town. Nestled between mountains in a beautiful valley, the road there is lined with vineyards and wineries for miles. It seems like every few hundred yards is an entrance to another winery. They all have beautiful large Provencal looking buildings. It definitely feels like I’ve arrived in Provence. It’s a town of only 15,000 residents, but it swells on weekends and holidays. Huguenot museum in Franschhoek. Huguenots were French protestant refugees in the 16th and 17th centuries who settled here after fleeing religious persecution in France. Just before riding into town, I spot the Franschhoek Motor Museum on the opposite side of the road, and turn around to take a photo. I really wanted to tour this museum, but I visited their website and found that while their collection includes antique cars and motorcycles, motorcycles are not allowed on the grounds. Seemed very hypocritical to me: “If you are a true motorcycle enthusiast, you would surely appreciate our collection of rare motorcycles. But you are not welcome to view them. However, if you arrive in a car and have no interest in motorcycles, feel free to have a look.” I even sent them an email explaining that I had ridden my motorcycle around the world to see their collection, and received no reply. No motorcycles allowed to visit this motorcycle museum. I rode through Franschhoek all the way from end to end twice. It’s a small town. A beautiful, but touristy, small town. I quickly noticed that I was the only motorcycle in town. After seeing tons of BMWs all over Cape Town, I thought sure I’d see a few here, mixed in with the occasional vintage Rolls Royce and Mercedes that I saw easing down the main street. Perhaps Franschhoek is just too snooty to accept any motorcycles. After two passes through town, and not finding a parking spot within viewing distance of a sidewalk cafe, I decided to ride on. I’m sure the parking lots off of the main street are safe, but with all of my gear on the bike i just didn’t feel right walking away from it. In other places in both South America and in Cape Town, I simply pulled over the curb and parked on the sidewalk (no reason for a bike to waste an entire car space), but here it just didn’t feel right. After a late lunch I headed towards the campground I had found on iOverlander.com. It’s Easter Saturday, and I was afraid I might not find a space for my tent, so I figured mid-afternoon might be better than waiting too late. When I arrived at Berg River Resort, I asked if they had a spot for my tent. What is with this country?? After a brief discussion, I agreed to their terms. It turns out, my campsite (the last one they had) is in direct view of the gate and only about 100 yards away. It took three trips to haul my gear from the bike to the campsite. As I was covering the bike, two guys in a loud small car came through the campground. If it’s the noise that made them prohibit motorcycles (and I don’t know that’s the case, but I suspect it is), then the Honda Civic just proved that point wrong. Hard to see, but three trees back, you can just see my blue motorcycle cover. That’s the entrance to the campground, and as far as motorcycles are allowed to go. I had expected to be denied access to the National Parks in Africa due to safety concerns with the wild animals. I was not expecting to be denied access to motorcycle museums and campgrounds. Still, this is the only real negative I’ve found so far in South Africa, and it’s offset by the tremendous kindness that continues to arise from total strangers. Like tonight: as I was about to fire up my stove to cook my now standard pasta-in-a-mug dinner, my neighbors at the campsite, Franz & Christie invited me to share their dinner, which was way better than my pasta…rice and veggies stir fried with ostrich meatballs. After dinner, Franz pulled out his Africa Road Atlas, turned to the South Africa section, and began circling roads and places that I should see. Then he gave me the book! I couldn’t believe it. It includes nearly all of the countries I intend to visit. Inside the cover, they wrote their phone number, and told me to call them if/when I got to Mossel Bay and I could stay with them. Unfortunately, I may pass through Mossel Bay before they even return home from the campground, but if the timing works, I intend to take them up on their invitation. Yesterday I tried to go to Table Mountain and ride the aerial tramway to the top for a look around. Unfortunately, the wind was blowing like I was back in Patagonia, and the Tram was closed due to weather. So instead I rode up to the top of Signal Hill, which is near Table Mountain, and took in the views of the city from there. Looking across at Table Mountain from Signal Hill. Today I played tourist and ticked off a bunch of places to see and things to do on the Cape Peninsula south of Cape Town. I started by heading towards Table Mountain again. After checking their website, I decided to pass on the cable car ride to the top, for two reasons: first and foremost, today is a holiday, and there are tons of people there; the website said there was a two hour wait at the bottom to board the tram. Second, it’s a bit pricey at 240 Rand, or a bit over $15, just to get a view of Cape Town from higher up. Yesterday I rode to the top of Signal Hill and the view from there was good enough for me. So instead of going to the west side of Table Mountain, I rode down around the east side, and then around to Hout Bay. The traffic this morning was a bit worse than normal due to the Two Oceans Ultra-Marathon that is taking place tomorrow. As a warm-up, there were several different “fun runs” this morning. Several roads will be closed tomorrow, and all along my route today I saw television cameras being set up on platforms alongside the road. I’m thankful that I was able to do this trip today and didn’t accidentally stumble into that mess tomorrow. It was cool to meet someone randomly in traffic from “home”. I didn’t get to speak to them for long, but it appeared that perhaps they were here for a bit longer than a week’s vacation. Beautiful beach at Hout Bay. There’s a small island just outside of Hout Bay with a large colony of Cape Fur Seals. You can take a boat ride to the view the seals, and it’s relatively inexpensive. I would have done it, but between the marathon crowds and the holiday weekend crowds, I decided to skip it. I plan to see a lot more “fur” later on in Africa. Just past Hout Bay is a spectacular road along the coast called Chapman’s Peak Drive, or simply “Chappie” by the locals. Chapman’s Peak Drive. Spectacular road and scenery. Chappie ends at the town of Noordhoek on the south end. From there the road splits, and I chose to head further south to Scarborough before turning east and cutting across the peninsula to Simon’s Town. Toto, we’re definitely not in Kansas any more…and by the way, how do I roll up my windows and lock my doors on this bike? Yep. Not Kansas. Or Texas. Simon’s Town is a quaint little seaside village that has become quite a tourist draw. The South African Navy is based here (both ships, from the size of the harbor…just kidding), and just south of Simon’s Town is Boulders Beach, which is home to a colony of 3,000 African Penguins. These penguins used to be called Jackass Penguins, due to the donkey braying sound that they make, but somebody decided they needed a more attractive name, so now they are known as African Penguins, and are the only penguins that breed in Africa. Penguins, on the rocks. Shaking, not stirred. Young ones, molting. These penguins change their feathers once a year, and it takes 21 days to do it. During that time, they can’t go in the water, so they have to eat a lot before hand, then starve themselves for three weeks. Unlike in Ushuaia, these penguins are provided fiberglass “nests” which they seem to have adopted without a problem. We had a brief conversation about my travels thus far, they wished me luck, and off they went. Heading back up the east side of the peninsula, I stopped at Kalk Bay for lunch at Kalky’s Fish & Chips. As I was walking to the restaurant, a couple walked up next to me. Lunch at Kalky’s: Prawns & chips, and a fizzy. In the States, this would be shrimp & fries, and a soft drink. Very messy, very spicy, and very delicious. After a bit of clean-up, I was back on the bike and headed to Muizenberg Beach. Tomorrow I leave Cape Town for “greener” pastures. My bike flew into Cape Town from Buenos Aires via London yesterday. This morning I went to the airport to begin what I assumed would be a long process of getting the bike through South African Customs. I had set aside a couple of days for this process just in case, especially since I still didn’t have a title for the bike (it’s on its’ way; in South Africa now but hasn’t been delivered yet), and I wasn’t sure if I could get the bike released without the title. First up: find the bike. It arrived on a British Airways 747, but nobody, including Google, seemed to know the location of British Airways Cargo Services. I wandered the airport for a while, until someone pointed me towards South African Airways Cargo. It was a large building, so I thought maybe they shared it with British Airways. After going through their security checks and signing in, I was told that British Airways cargo was handled by Swissport, which was a few more blocks down the street. When I got to Swissport, they immediately knew my bike was there, and handed me paperwork and directed me towards Customs which was just across the parking lot. This is the point that I figured I was going to spend the rest of the day, and I fully expected to have to hire a customs broker in the end to complete the transaction. But I was determined to try to do it myself first and save the expense. To my surprise, the woman in the Customs office was incredibly helpful and very knowledgeable. She handed me another form to fill out, which I recognized as the form that a customs broker would normally complete. I took this as a good sign. She then asked me to sign a form giving Customs the authority to fill out my carnet de passage. For those of you who aren’t familiar with the carnet, it’s basically a form stating that you have put up money for a bond, and are temporarily importing the motorcycle and will take it back out of the country within a certain time limit or forfeit your bond. This is required in many countries, including most of Africa. I’ve been carrying it with me but hadn’t needed it until now. I signed the letter of authorization and she filled out and stamped my carnet. She never asked for any other paperwork for the motorcycle. At this point she and I walked back over to the Swissport warehouse together and she verified the chassis number of the bike, then signed the release form. Wait, what? That’s it? You mean I’m done? I can take the bike? Are you sure? Wow. Well, I did have to pay Swissport $18.95 for handling charges. But within two hours I had my bike and was free to go. No hassles. Very little waiting. It probably took me longer to get to the airport and find the right warehouse than actually walking the bike through Customs. “Me.” I waved my helmet at him. The grin on his face was huge. I’m not sure, but I think he was thinking, “This guy is crazy, and too old to do this.” Apparently I don’t look like a motorcyclist here. I haven’t decided yet if that’s a good or bad thing. I took the bike off the pallet, connected the battery, installed the mirrors, pulled my compressor out and aired up the tires, and I was ready to go. Slowly. Very slowly and cautiously. Because they drive on the left here. Which makes intersections, especially right turns, a bit tricky at first. Not too bad if you’re in traffic and can follow other cars, or when the street is well marked with arrows painted on the lanes. Without all of that, it requires a bit of extra concentration. As I approached the first roundabout, I was constantly repeating “LEFT! CLOCKWISE!!” in my helmet. I know from past experience riding in England that it will quickly get easier. I’ll spend the next few days sight-seeing around Cape Town and prepping the bike, then I plan to head along the coast for a few days, camping and visiting some of the spectacular spots in South Africa. It’s all coming together. Feels like Southern California (temperature and neighborhoods), looks a bit like Honolulu. That’s Table Mountain in the background. I’m headed there tomorrow. More details on that later. I couldn’t decide if this guy’s board was really wood, or just fiberglass made to look like an old-school wood board. It has grain and knots and the whole bit, but I’m pretty sure it’s fiberglass. Looked cool though. Cape Town’s version of Alcatraz: that’s Robben Island in the distance. Originally a leper colony, later a prison, this is where Nelson Mandela was imprisoned for 18 of the 27 years he served behind bars. In addition to Mandela, two other South African presidents, including current President Jacob Zuma, were former inmates here. It is now a museum and the tour guides are former prisoners. Buenos Aires, Argentina to Cape Town, South Africa. Direct, it’s a bit over four thousand miles. Not bad. That would be about eight hours on a plane. If there was a plane from Buenos Aires to Cape Town. But there isn’t. For me, or for the bike. South African Airways used to fly between these two cities, but no longer does. Which means that instead of eight hours to cover 4,300 miles, it now takes 37 hours and just over 13,000 miles to travel between South America and South Africa. I left Buenos Aires at 9:30pm on Thursday night. Eighteen hours later (and seven hours of time zone changes), I landed in Dubai, UAE, at 10:30pm Friday night. I’ve traveled to Japan many times from the United States, but this was the first time I had been served dinner, breakfast, lunch, and dinner again on a flight. I had a nine and a half hour layover in Dubai, and the airline provided me with a free hotel room near the airport to get some proper sleep before continuing on in the morning. I was a bit disappointed to be there only at night, and not get to experience this incredible city in the daylight. But I was also exhausted from being on a plane for so long, and was ready for a bed. Arriving in Dubai Friday night. The hotel apparently functions solely as a stopover for Emirates Airlines. When I checked in, they already knew my schedule, and had already set up a 5am wake-up call, and informed me that check-out was at 6am (how’s that for efficiency?). By 6:30am I was back at the airport and about to board my nine hour flight to Cape Town. You’ve probably never heard of more than half of these movies. I hadn’t either. But I have to say, they were all good. Some were good for helping me catch up on my sleep. Others, like Barney Thompson, were just plain strange. As of this writing, the bike hasn’t left Buenos Aires yet. It will fly to London, then change planes and head to Cape Town, and should arrive here Tuesday afternoon. Meanwhile, I’m on foot (well, foot and a half, actually; my ankle swelled up tremendously from all of the plane time, but I’m still walking fairly well), so I plan to do some walking today, and head to the shopping area to acquire some things that I couldn’t fly with, such as gas canisters for my camp stove. 27 hours in economy coach seating is not good for the ankle. The area I’m staying in reminds me a lot of Southern California, and in particular Orange County. The neighborhood, the weather, and the landscape looks and feels a lot like it. Since I’m restricted to short distances for a few more days, I probably won’t post much until the bike arrives, unless something interesting happens between now and then. Otherwise, I plan to catch up on my reading and rest until then. Never let it be said that I am not capable of doing some really stupid stuff. Yesterday is just my latest shining example. Yesterday (Tuesday) was supposed to be “shipping day”: the day I took the bike to the airport and delivered it to the shipper. I had a 10:30am appointment at the cargo terminal. It takes just under an hour to get to the airport from where I am staying in Palermo, and I needed to get just a little gas before heading that way so I wouldn’t run out (the bike is supposed to have less than two liters of fuel in it when it goes on the plane). I made sure the bike was sorted, packed and ready to go the night before. Tuesday morning I left about 9am, and rode a block to the gas station where I bought exactly two liters of fuel, figuring I would burn about a liter on the way to the airport. After getting fuel, I pushed the bike off to the side, out of the way, and pulled out my waterproof zip-lock pouch with all of my documents in it. I looked at the information from the shipping broker, DakarMotos, which had the GPS coordinates of the cargo area on it, and entered the coordinates into the Maps.Me app on my phone. The route came up, I slid the pouch into my tank bag, put my gloves on, and set off for the airport. About two miles up the road, I stopped at a stoplight. A cab pulled up behind me, honking furiously. I looked back, and the cab driver was pointing behind him and yelling something at me, but with all of the traffic noise I couldn’t hear him. I assumed I must have run a red light or cut him off in traffic, so I simply waved at him and when the light turned green, I took off. About a half mile later, I looked down and noticed my tank bag was open. And my document pouch was gone. Massive panic immediately took over. The pouch contained the original title to my bike, my Argentina temporary import certificate, my Argentina reciprocity fee document, the shipping paperwork for the bike, and a bunch of other stuff that I can’t even remember. I spun an illegal U-turn in the middle of an eight lane busy avenue and started splitting lanes as fast as I could to get back to where the cab driver had been honking at me. I rode in the gutter, between cars, around trucks and buses. When I got back to the street where the cab driver waved me down, I rode slowly up and down the street all the way back to the gas station, several times, looking for my documents. I kept thinking someone would see me and yell at me, waving my documents. No such luck. Dejected, I went back to the apartment, and set off on foot to walk the entire route. I spent another two hours walking both sides of the street, looking on cars, in windows of buildings, in trash cans, everywhere I could think, with no success. Eventually, I began to accept that my documents were gone, and I was stuck in Argentina. I wasn’t sure how long it would take to get a replacement title from the US, and a new temporary import document from the Argentina Customs offices, or if that was even possible. Fortunately, I had two pieces of good news: first, I had the original Texas registration for the bike in a different pouch at the apartment, and I thought I might be able to use it in lieu of the title at Customs. Second, Sandra and Javier at DakarMotos had photocopies of my temporary import certificate, which I hoped would make it easier to get a replacement original. I contacted Sandra, and after a long discussion with the airport Customs officials, she suggested I file a report with the local police, and get an affidavit from them advising that I had lost the documents. So after a couple of hours at the police station, and the help of Sandra’s daughter-in-law acting as translator, I walked out with the affidavit. Meanwhile, my brother in Texas was working on getting a certified copy of my title from the Texas DMV. I was somewhat shocked to learn that I could send him an email and he could take it to the DMV and they would give him a copy of my title. For all the difficulties I usually suffer at the DMV, this seemed way too easy. Perhaps they felt sorry for me? Nah, it’s still the DMV. I went to bed with the bike still in the garage…it should have been on a plane or at least in the cargo area at the airport. I couldn’t help but think of all the things that had to be addressed now: besides documents, there was local logistics (I had to be out of the apartment by Friday morning, as new renters were moving in, and now I had two large roller bags with all my stuff packed in them that wouldn’t fit on the bike); travel logistics (I was going to miss my flight Thursday night, and I wouldn’t arrive in Cape Town when I was supposed to, so my hotel reservation needed to be changed or canceled); and bike logistics (what if I exceeded my time limit in Argentina waiting on documents? I had no document to allow me to exit the country with the bike and then return to start the clock over). It’s amazing how quickly the stress level can rise after months of virtually no stress. Eventually I took a deep breath, sat down and made my “to do” list, and got to work. Sandra and Javier are experts at shipping bikes into and out of Argentina, and I was not the first person they had dealt with who for one reason or another didn’t have a full set of documents. After exchanging a few texts, Sandra agreed (for a small “Stupidity Fee”) to meet me at the airport Wednesday morning with the remaining copies of my documents that she had, along with the registration and police affidavit that I had, to see if we could convince Customs to accept what we had and allow me to ship the bike. After four hours, and another hand-written statement explaining what had happened, I was allowed to take the bike into the freight warehouse and put it on the pallet. Things were once again moving forward! Before putting the bike on the pallet, I rolled it onto a freight scale. The fully loaded bike, with everything except my camping gear, weighs 174.5 kg, or 384 pounds. For reference, an unloaded BMW 1200GS weighs 260kg, or 573 pounds dry, and a stock KLR650 with no luggage weighs just more than my fully loaded bike, at 176 kg claimed dry weight. It’s definitely getting real now. This is the first shipment for the bike with the exception of the Stahlratte; I’ve ridden it everywhere until now. It’s a lot farther to ride home from Africa than from Argentina. And finally some good news: since my bike is considerably smaller than the typical 1200cc adventure bike, the shipping cost turned out to be 20% less than I was originally quoted. So even with the Stupidity Fee it turned out to be less than I had budgeted. One more day in South America, then a very long flight to South Africa. With the bike prepped and ready to deliver to the shipper on Tuesday, I have a few days to relax, wash gear, pack everything, and see the sights. This is a very lively city, with tons of sidewalk cafes and beautiful parks. Today I walked about six miles in one direction, then caught a cab home at the end of my tour. From the apartment, I walked to Plaza Serrano, a small park surrounded by bistros and sidewalk bars and cafes. Being Saturday, the park was covered with arts and crafts vendors selling their wares, while others continued to assemble more booths for Sunday’s large event. I stopped at a nearby cafe for a couple of empanadas and a smoothie, then continued walking northeast. The trees and plants here are beautiful. The front of this cafe was covered in an enormous bougainvillea. Saw this nice Triumph parked on the sidewalk while walking along. My route took me past the Buenos Aires Zoo. Beautiful place…I might even go back and pay to go in. But for free, from the sidewalk, I saw flamingoes, giraffes, and hippos. For a moment I couldn’t help but think about the expense of shipping to and from Africa, versus walking past the zoo here and seeing the same animals. Yeah, I know….I’m going to Africa. Past the zoo, I walked through several more large, shaded parks. In the corner of one, near Plaza Italia, is the Jardin Japones, or Japanese Garden. I found my ultimate dream job: I want to be the guy that changes the date every day on this rock calendar at the Japanese Gardens in Buenos Aires. The most stress he could possibly experience is leap year. Eventually I made my way to the Cementerio del Recoleta. This huge cemetery in the middle of Buenos Aires is absolutely incredible. Well worth the price of admission, which by the way is nothing. Nada. Free. Cementerio del Recoleta. Feels like a small city of buildings. Next up was Calle Defensa, a street in the San Telmo district that is lined with flea market vendors on Sundays. Probably a kilometer of them. With a few side streets joining in with vendors as well. It ends at Plaza de Mayo, which is also filled with vendors. I ran into this guy with a Luckenbach Texas t-shirt. You can tour Buenos Aires in a stretch limo Citroen 2CV. Then back at the apartment, I was looking through a coffee table book on Banksy, the graffiti artist, and ran across this. Apparently there is quite a bit of copy-cat Banksy artwork in Buenos Aires. I’m guessing the overpass sign is one of them. Before I could allow myself to do any serious sight-seeing in this city, I needed to get to work: I had a list of items to be done on the bike before taking it to the airport for it’s first flight. First things first: get all the mud, dirt, and grime off so I can work on it. It’s nice to have car washes that will actually wash bikes too. These guys did a great job: they used degreaser, soap, and not too much pressure. Cost: about $7. The Butterfly Effect: lots of white butterflies on Ruta 3 heading north. Many of them were kamikazes, turning my helmet into a sticky mess. Meet Paolo. This guy is awesome. He runs Moto Avenida, a little one-man independent parts, accessory and service shop just around the corner from my apartment on Avenida Cordoba in Buenos Aires. I stopped in and asked him if he would let me use his shop to change my oil & filter and chain & sprockets. He gladly allowed me to use his space. I bought a few small items and my oil from him. As usual, not a word of English, but incredibly nice and helpful. I had to remove the swingarm to install the endless chain, but everything I did took about an hour and a half at his shop. Just coincidence that he was wearing a Yamaha t-shirt when I showed up. Back at the apartment, I removed the fuel tank and swapped out the fuel pump and fuel filter. As noted earlier, there’s nothing wrong with the fuel pump, but unfortunately the in-tank fuel filter is part of the fuel pump and only comes as an assembly. One of these things is not like the other: old fuel filter/pump on the left. Filter is just a wee bit black compared to the new one. I’ll clean it again and keep it as a spare just in case. I also replaced the mirror that was broken when the bike was dropped off the worklift in Punta Arenas. I removed my GPS, its’ mounting dock and associated wiring for shipping, and installed a new air filter. At this point, the bike is ready to ship. I’ll cover those details Tuesday when it goes to the shipper.
2019-04-21T10:28:16Z
http://www.2ridetheglobe.com/2016/03/
The mediatisation of young people daily lives constitutes a significant subject due to the expressive use of media in their daily routines. In this article, we resort to a representative sample of 3609 online respondents aged between 14 and 30 years old from nine European countries (Belgium, Croatia, Denmark, Germany, Hungary, Israel, Italy, Poland and Portugal), in order to perceive the impact new (and “old”) media have in these youngsters daily media consumption activities. The results of this online survey show complementary uses between networked and traditional media, but also highlight a gradual substitution of “old” by “new” networked individualized media when leisure and news-related activities are at stake. Keywords: young e-audiences, online media, networked media, traditional media, mediatisation, media usage. This article focuses on the daily use of media by European e-audiences, from adolescence to young adulthood. Europe—the European Union and the rest of the region—represents a living laboratory of communication and culture. Growing out of a European Cooperation in Science and Technology (COST) Action involving more than 300 scholars from 33 countries (http://www.cost-transforming-audiences.eu), the nine-country study examined changing patterns of media use in Belgium, Croatia, Denmark, Germany, Hungary, Israel, Italy, Poland, and Portugal. Often thought of as one cultural unit, Europe, in fact, comprises a variety of political and economic systems and a similarly differentiated set of media systems (Hallin & Mancini, 2004). Media users, in their turn, are local cultural agents who participate in, and contribute to, the ongoing structuration of their societies (Giddens, 1984). Media afford essential discursive resources of social action, that the data hereby presented and discussed grasps. Data collection was conducted as an online survey (computer-assisted web interviewing, or CAWI), using the Ipsos commercial respondent panels in five of the nine countries (in Belgium, Croatia, Hungary, and Israel, identical procedures of data collection were undertaken using other panels). This process was completed during February 2013, with two exceptions: In Italy and Portugal, data collection was conducted during April 2013 because the planned survey dates coincided with key national events that received wide media coverage and which could thus be expected to skew media use patterns during that period. Data analysis and interpretation was conducted between 2014 and 2015. The nine country samples were designed to be representative of the age distribution of the segment of the population that had access to the Internet in each country, for people aged 14 to 75.1 For the particular case of the analysis conducted in this paper, a partial sub-sample of 9 online respondents aged between 14 and 30 years, was considered. In addition, the national samples were balanced according to gender and across geographical regions in order to represent responses from both rural and urban areas. Because national statistics about the demographic composition of the online population vary considerably across the nine countries, both in terms of availability and quality and in terms of the demographic categories used, the study did not have a further basis of balancing across all national samples. One single instrument was designed, translated and adapted to all countries and relevance assured via pre-testing in all countries. Sociocultural differences, inevitably, influenced the wording of questions, specifically regarding education and income, for which established national categories vary substantially. For income, respondents were informed of the median national income, and were next asked if their personal income level was (substantially) above or below this number. Since income levels differ markedly across the nine countries in the study, devising a meaningful set of intervals that would cover all countries was deemed unfeasible. A related but different problem had to do with educational levels: National educational systems in Europe differ substantially with regard to the classification of types and levels of schooling. Again, rather than attempting to devise a unified typology, respondents were asked about the number of years of education they had completed beyond mandatory elementary school. Upon completion of data collection, the educational data were recoded into an approximated International Standard Classification of Education (ISCED) classification (UNESCO, 2013). Beyond recoding of the material, the national survey data were combined into a unified data set. During this process, the individual variables of all data sets were tested for consistency of structure, and variable names were homogenized in English to facilitate comparative and collaborative analyses. The final data set consists of 10,742 cases, with 1,200 to 1,216 cases from each of the nine countries, with the exception of the Belgian data set, which contains 1,100 cases. The COST Action project approached the contemporary media environment as a cultural forum (Jensen & Helles, 2011; Newcomb & Hirsch, 1983), in which classic human and social concerns and issues are being articulated and negotiated under new technological and institutional circumstances. Traditional forms of one-to-one and one-to-many communication have been complemented by many-to-many communication, as typified by social network sites. All three of these prototypes of communication are now available and accessible on digital platforms that integrate a range of old and new media. A central aim of the project was to examine new digital and social media and old mass media as part of a complex and changing configuration of technologies, institutions, and users (Jensen & Helles, 2015). Previous research allowed us to isolate a cluster constituted by individuals with younger ages (aged between 14 and 30 years old), with a simultaneous use of networked media (i.e social network sites) and traditional media (Authors, 2015). We therefore decided to go further on the comprehension of this cluster and better perceive variables such as time spent on different media and devices, media usage in everyday life (namely in what refers to leisure time, or information search), the possible correlation between the type of activities conducted and the features of the media supporting those same activities. We specifically aimed to understand which medium was chosen to perform a specific activity and the daily options these individuals in particular took, namely in terms of managing their free time, deciding on which activities to conduct, or establishing a sense of the purpose of those same activities (social interaction, news consumption, leisure, or work). The Internet and, to a certain extent, mobile technology, have enabled the establishment of a growing number of interconnections between media. Those bridges have been culturally appropriated by users and have shaped the way in which media participates within our lives (Jenkins, 2006; Livingstone, 1999). Additionally, the rise of digital and multimedia technologies enables the so-called old media to become more multifunctional, integrating functions such as information, communication, transaction, entertainment, sociability, education and identity building (van Dijk, 2006). Arguing that the hypothesis of convergence often underlines discontinuities between the old and new and the erosion between media boundaries, some researchers propose the concept of intermediality, focusing in the “continuity of media forms” and in the “articulation and re-articulation of the media through changes in social and cultural contexts” (Herkman, 2012). Paying attention to the overall relationship between all available media types may allow to frame a more developed inquiry into how different media affect each other and why (Helles, 2013). Plus, the complex and diverse nature of networked individualized digital media has led researchers to shift from technical determinism, focusing on the effects media have on individuals and society, to the relevance of communicative practices. More particularly, recent researches have explored the ways by which different flows of communication intersect across different categories of media and across the online/offline (Jensen and Helles, 2011; Jensen, 2013). This performative crossing options between different media and the increasing role of media in daily life has changed what is nowadays called mediatized society. Mediatisation concerns the ubiquity and omnipresence of media in the current world (Hepp, 2013). Increasing mediatisation implies that different types of human actions are increasingly connected with the media (Kramp et al., 2014). Media are a relevant part of today’s daily life, determinant for the evolution of civic cultures. “It may help to think of media not merely as technologies, but rather as means through which much of the life of society takes place” (Dahlgren & Álvares, 2013, p. 51). In this context, cross media activities are a face of both contemporary societies and mediascape: media increasingly saturate everyday life and the so-called media diet is supplied by different platforms. This leads to cross-media practices (Bjur et al., 2014) that in turn have a direct and scarcely empirically studied relation with the organization of personal daily life and activities. Since there is a construction of mediated lives through media options and since daily life choices are intrinsically related to media habits (Author 3, 2010; Jensen & Helles, 2011; Jensen, 2013), everyday life media uses give us relevant sociological indicators of daily social and individual practices: they are not external or an adornment to our lives, instead they are part of it. Hepp (2013) refers to the opportunities of studying mediatised worlds in longitudinal studies but also in synchronous mediatisation research, especially with comparisons cross generations, pointing to possible different media habits and socializations. The author considers that research on mediatisation analyses the altering communicative figures of mediatised spheres (Hepp, 2013). Although the use of “traditional” or “old media” such as television, newspapers or radio has not come to an end – as Henry Jenkins states, “history teaches us that old media never die” (Jenkins, 2001 p. 93) – contemporary audiences have unprecedented degrees of freedom in selecting media for multiple purposes (Helles et al., 2015), particularly when considering the digital information sphere, which implies a opulent menu of options of interactive information (Bennett, 2007). Established media institutions and traditional business models are thus being challenged by digital options (Jensen & Helles, 2015). In this context, the so-called “old” or traditional media and “new” or networked media are deeply connected (Beckett, 2008) and tend to interact in many and new complex situations (Jenkins, 2006). This, in turn, transforms the fragmented and diverse mediated environments into spaces of multiple opportunities (Bennett, 2007; Beckett, 2008). For instance, the use of internet, especially for informational purposes is, at least in some European countries, very much connected to the use of traditional media, such as newspapers and books (Carlsson, 2010). However, this is a changing tendency, as stated Reuters Institute Digital News Report 2016 concerning news consumption. “In terms of the key social networks for news, we have seen little significant change since last year with Facebook maintaining its dominant position. Across our sample 44% say they use Facebook for news, which in turn represents two-thirds of all Facebook users. YouTube is also a key network (19%) while Twitter remains an important social network for news (10%) favoured by journalists, politicians, and heavy news users in particular. Instagram continues to grow fast, along with WhatsApp in some countries” (Newman, Fletcher, Levy & Nielsen, 2016, p. 10). This growing tendency, nevertheless, also means that there still exists a complementarity between platforms, that is to say, different platforms still cohabit. Nielsen and Schrøder (2014) point precisely to a relative importance of social media for accessing, finding, and engaging with news. So we can identify and recognize the importance of online world, but also a lack of prominence comparing with traditional media. The rise of new, digital media and the emergence of new patterns of media use may be interpreted as evidence of an “ecological reconfiguration”, rather than a process of displacement (Gurevitch et al., 2009). Consequently, the mapping of changing patterns of media use has become more and more difficult to accomplish. Indeed, users combine and apply several media across diverse domains of their daily lives, as resources of social interaction in multiple and interrelated contexts of action (Helles et al., 2015). New information and communication technologies have thus radically changed norms and practices in several domains – from access to culture and politics to participation in private and public spheres – transforming the ways that people develop social ties, select cultural preferences or spend their time (Nimrod et al., 2015). Digital technologies in general, and the network digital media such as the internet in particular, invite researchers to clarify the relationship between technology and practices: “one material medium may support several communicative practices; some communicative practices travel well between media; and certain familiar practices come back in style when new platforms become available” (Jensen, 2011, p. 13). It is the role of these material, productive and social features of the media in shaping patterns of media daily use that we are interested in. Moreover, digital technologies have destabilized traditional roles of political communication and somewhat modified the communicative balance of power, as audiences are becoming more and more active participants in public communication. In fact, “digital convergence may lead to an intensification of public connection, as people become more skilful at adapting their media consumption to suit their everyday habits and pressures” (Couldry & Markham, 2006, p. 256). These reconfigured social connections may have brought sociocultural advantages for some groups, who have now unprecedented opportunities to feel better informed (Gurevitch et al., 2009). In particular, young media audiences tend to be more innovative in the adoption of new media and communicative practices (Nimrod et al., 2015). However, as Jenkins (2006) points out, convergence is a process and not an end in itself – citizens can be more powerful under a convergence culture, but mainly if they can recognize their power as participants in this new culture. Research tends to show that the more dynamics in youth social, cultural and economic capitals, the more there is a convergence and diverse use of media for different purposes and also for news consumption (Author 3, 2012, 2015). In this convergence process, social class, gender and age are bases to better understand audiences and how they make sense of media, especially the Internet (Couldry et al., 2007; Maass & Gonzalez, 2005). The economic situation of families and individuals has thus a great relevance in the mediatised choices, especially in a context of economic crises. Daily social routines, such as parents’ habits (e.g. youngsters driven to school by parents), may have a role in youngsters options (e.g. consumption of news or music through the radio). Additionally, young adults show online news searching routines during weekdays, while at work (Author 3, 2010, 2012; Boczkowski, 2010; Jorge et al., 2011). This might imply that social structures also contribute to diverse mediatised options and to the way that media habits are appropriated. Concerning the consumption of print media, newer types of media or Internet use, research has shown that traditional literacy in its different forms (namely intellectual skills developed through a lengthy period and constant exposure) are a function of the cultural capital acquired by individuals at an early age within the informal setting of the family (Nossek et al., 2015). Overall, cross media consumption practices blur traditional frontiers between leisure and work time - for instance, when it transforms information acquisition practices into entertainment ones. At the same time, this calls for new forms of literacy and multitasking that resort to supplementation as a core media use feature. From an audience perspective, analysing the new media emergence and users’ consumption of media provides an opportunity to take a deeper look at the ways by which the linkages between different media are culturally appropriated by users, shaping social patterns of interaction and cultural patterns of information exchange. Research indeed reveals that multitasking activities are a planned and conscious strategy according to the audience needs (Székely, 2015). In particular, younger segments of the population come out as early adopters of multitasking in media use (van Dijk, 2006) and new communicative practices, but more studies are needed of age groups as cohorts to establish the extent to which new technological resources and general life circumstances, respectively, shape communicative practices (Jensen & Helles, 2011). Looking at youngsters’ daily media consumption activities, this article arises in the context of the work developed out of a European Cooperation in Science and Technology (COST) Action involving more than 300 scholars from 33 countries (http://www.cost-transforming-audiences.eu). The central aim of the “E-audiences” developed within that COST action, was examining new and old media uses in the context of the changing configuration of technologies, institutions, and users (Jensen & Helles, 2015), relying on a communication centric (rather than media centric) research design covering the full age range in an online survey applied to an extensive sample (N = 10.742) from nine European countries (Belgium, Croatia, Denmark, Germany, Hungary, Israel, Italy, Poland and Portugal)(i). Aiming to produce a comprehensive account of audience preferences and practices across the full set of available media (Helles et al., 2015), the project intended to describe media usage patterns and thus examine the ways that people create their own individual media repertoires, representing a significant empirical step in regards to the interpretation of the shifting flows of communication between and across different media of diverse demographic and cultural segments (Hasebrink et al., 2015). This comparative research employed national online samples designed to be representative of the population in each country for people aged 14 to 75. Respondents were asked to answer questions regarding access to, use of, and time spent on different media and technological platforms; other questions addressed different kinds of Internet usage and the functions that respondents would use on their mobile phone; further questions included the private and public locations in which different media and genres are used as part of everyday life. Additionally, the analysis departed from a selection of prototypical social contexts of media use that included both concrete tasks and activities, from changing a dinner date to getting access to news. An initial cluster analysis indicated a robust model with three clearly different clusters in this sample based on demographics and media usage (Authors, 2015): the first cluster was characterized by older ages, more likely to performing traditional media practices, but also more likely to write and read e-mails and to shop online; the second cluster was characterized by younger ages, more likely to use online media, social network sites, chat programs, download music and send SMS; finally, the third cluster was characterized by younger and medium ages (young adults and adults, aged between 14 and 30 years old) showing mixed media practices and strong online practices. In this paper we will follow Hepp (2013) indications for using cohorts to explore different mediatisation’s and ages groups. Departing from the results achieved within this cross-collaborative European project, this article focuses on those youngsters’ daily use of media (identified on the third cluster), from adolescence to young adulthood, particularly in what refers to: time spent on different media and devices (e.g. to watch television on a TV set, computer or mobile phone; to listen to radio on a radio set, computer or mobile phone; to read newspapers, magazines and book in the printed version or on the internet or in the electronic version); and media usage in everyday life, in what respects leisure time, contact with an old acquaintance, or information research and confirmation. In contemporary modern societies young people's transitions to adulthood (in general and particularly in labour context) have lost their linear nature. Compared to some decades ago when standard biographies were highly predictable and therefore provided both individual orientation and social integration, they may now be pictured as ‘yo-yos’ going up and down, back and forth (Pais, 1996). The age limit of child benefits, the conclusion of compulsory education or the voting age are key milestones that are mainly related to age, but adulthood is also considered as the time when young people become financially self-sufficient. The average age of independence increases especially combined with difficulties in getting a paid job and access to affordable housing have increased the length of the transition from youth to independence (Galland, 1997). The first online generations are the Millennials (or Generation Y), the target respondents of this article (born early 1980’s to mid 1990’s to the early 2000’s as last birth years), and the Z generation (that followed Millennials), referring only to a small part of the sample. This Millennials generation that grew up in an increasingly online and networked world is influenced by new technologies, especially social media. In fact, other characterizations, like “digital natives” (Prensky, 2001) or “net generation” (Tapscott, 1998), point to the idea of individuals that are online born and net navigators. Even so, their media uses are diverse and affected by different subgroups categories. According to Kilian, Hennigs and Langner (2012, p. 121), “the Restrained Millennials group is the easiest to serve because they are generally happy with traditional media products and services and only partly shift their time and income to the Internet”. On the contrary, “Entertainment-seeking Millennials use social media more heavily but often in a lean-back mode, where they merely consume the content that other users have created” (ibidem). Finally, “the Highly Connected Millennials are the role models of the Internet Generation. They adopt social media both passively and actively. They do not always use social media, but they do so quite often” (ibidem). Taking these previous ideas in consideration, this article aims to understand the role that different media play in the daily life of European youth: what do young people actually do when they are online and do they make sense of those activities (i.e do they see it as leisure or work time?), what amount of time do they spend in using specific media for information consumption purposes (or for social interaction purposes) and whether we are facing a replacement process of “old” media by new media. 4 - Imagine that you and a friend are discussing an issue, and you need some factual information about that issue (e.g., a historical date or an economic figure) (To find out the information, you have the following options – indicate the three sources that you are most likely to use). Following the previously identified third cluster (14-30 years old respondents), the total sample examined in this article is constituted by 3609 individuals, divided by three young people age groups: 14-18 years old = 381 individuals; 19-24 years old = 1580 individuals; and 25-30 years old =1648 individuals (see Table 1 – Distribution of the sample by country). The first age group corresponds to the younger audiences, associated with the children limit of age defined by the Convention on the Rights of the Child; this is also the age of transition from childhood to adulthood. The limit of age of the second group was defined by the boundary to youth age established by the General Assembly of United Nations; this is also an age where in Europe young people enter in the university or in the labour market. Finally, the third group corresponds to young adults. The EU policies aiming youth tend to end at the age of 291, but there is no clear-cut definition of youth since it may be considered as a transition phase. Youth can be defined as a passage from childhood to adulthood and from a dependent to independent style of life, being therefore a moment of transition to a world of choice and risk (Walther et al., 2002). For the purposes of this study, individual answers per country were not considered. The data collected in the survey answered a battery of questions related with media usage in daily lives (for instance, time, place, media preferences), which made possible the exploration and testing our hypothesis, related with media uses of the youngsters, which are our focus in this paper. Data was analysed with the help of IBM SPSS Software (V22). In terms of the overall sample of the E-audiences project, one of the most significant conclusions consisted in the fact that print media still constitute an important component of the new communications environment for European audiences: more than half of the population surveyed read print newspapers and nearly half still read print books; one-fifth of the sample read digital books. Results also suggested a general preference for traditional media use (watch TV in a TV set, listen to radio in a radio set, and read print books), which may indicate equivalence between the material conditions of a medium and its affordances and practices (Author 3, 2015). In all nine countries, “old” media still constitute an integral part of most users’ media repertoires. Furthermore, online mobile media practices were much less common than either traditional or online media use via a computer, and were more likely to be performed by the youngest age group (14–30 years old). In respect to youngsters’ media consumption by device, it’s clear that young people also spend a considerable amount of time consuming media contents in traditional media outlets (see Table 2): the highest means are in watching television in a traditional TV set (and the most impressive number is in the young adults group: 108 minutes). These results also show the importance of television in daily life, since all age groups said they had spent more than an hour watching television in the day before. That may lead us to the second most performed media consumption activity which shows a high time spent in watching television on a computer, specially between the 14-18 years old respondents. Younger media users who have had less contact with a specific media artefact in the past may resort to a material form they know, “provided it presents the necessary affordances to fulfil the gratifications they are looking for (watching a film)” (Authors, 2015, p. 409). However, very few respondents said they used the mobile phone to watch television or listen to radio. This can be related with the internet services offered in each country at the time that the survey was conducted. A speedy connection to the Internet is needed in order to perform these activities on a mobile phone; if it is made through the mobile data, they consume a lot on of the data available per month. On the other hand, when they are made through wifi, it is frequent that the connection is not good enough. But it’s very likely that this result will change in the future, with the fast technological developments and the better access to the internet all over. According to Special Eurobarometer 438, on E-Communications and the Digital Single Market, “mobile Internet access has increased significantly since the last survey – up 23 points to 75% of households with mobile phone access. Overall, this means that in 69% of the EU households have at least one of its members with Internet access on their mobile” (European Commission, 2015, p. 7). This means that there is effectively a lack of optimal conditions, in spite of the improvements. Regardless the device, the age group which listens to radio more time per diem is the oldest one (25-30 years old). Listening to music on other formats as CD, MP3 or Wi-Fi is an activity in which respondents spend a great amount of time – more than an hour in all age groups, as well as watching other TV contents as DVDs or programs for TV Box DVR. One possible explanation for these results may be the stratification of audiences, i.e., they are actively seeking for what they want to listen or watch, even when they use traditional media outlets for the effect. We can also say that the respondents spend more time reading newspapers and magazines on the internet and less on their print versions. But in what concerns reading books, all age groups prefer the printed version, the age group of 19-24 being the one that spends more time reading books. This can relate to the composition of the sample in what concerns to the referred age group: mostly constituted by students, possibly having more time to read than the people that have a full-time job, as it is most probable in the older age cohort of the sample. We can, therefore, say that traditional devices (such as TV or radio sets, and books in the printed version) still matter a lot in terms of time spent on media by young audiences when compared to new platforms, except for the time spent on reading newspapers and magazines, in which the Internet version surpasses the printed version. This also confirms the results of the sample of the study, which point out to a displacement process of print newspapers, with new technologies (digital news sites, convergence of these platforms with computers and smartphones) apparently fulfilling “both the traditional need for information and new and unique psychosocial needs for active social and political participation” (Nossek et al., 2015, p. 379). These results consubstantiate what we already suspected: sending text messages is mainly a teenager’s habit. The number of minutes spent texting not only decreases when ages grow, but the difference of time spent between the youngest age group and the second one is almost the double. Finally, we can tell that listening to audio books is the less popular activity amongst the ones listed in the survey. In respect to Internet usage (see Table 3), we can conclude that “using social network sites” is the activity in which the youngsters, in general, spend more time, confirming SNS’s relevance in the current web landscape. The age group 14-18 said they had spent, in average, 79 minutes in SNS in the previous day of the survey. One of the explanations to these results can be the “need for popularity”, which assumes a major importance in the teenage years. Indeed, previous research shows that this need is the strongest and most consistent predictor of SNS behaviours (Utz et al., 2012), as the use of SNS has effects in teenager's self-esteem and well-being (Valkenburg et al., 2006). The second most popular activity for all age groups is “using websites concerning my interests and hobbies”. All of the three age groups spend similar time doing that, which makes us think that the Internet websites are a major source of information to the so-called Millennials. It shows that they generally trust in the information they discover online and is where they can find relevant information related to their interests and hobbies, probably because of the enormous amount of information about everything available online(ii). Major trends were found between age groups in the following cases: while the youngsters spend 25 minutes in average using chat programs, the oldest (25-30 years old) don’t spend much time in this activity, spending more time writing and reading e-mails (which could be related to their profession) as well getting news. The youngest group is the one spending less time writing and reading e-mails and news. This figure confirms our hypothesis that networked digital media is being more used mostly for entertainment purposes in this cohort. In respect to the global sample of the project, one of the conclusions pointed out to a significant age divide in terms of media practices, “with the younger audience manifesting greater use of social media and messengers and the older audience displaying use of traditional synchronous mass media and older forms of new media, such as e-mail” (Nimrod et al., 2015, p. 330). When we surveyed the ways that the respondents used to contact an old acquaintance (they could choose three options of a pre-given range), the most chosen was through a social network site and the less chosen was by posting a letter. The second option more chosen was through a SMS, followed by a phone call in third. The results are homogeneous, i.e., they don’t show a great variation between age groups, which make us believe that the preferences of teenagers and young adults are similar. Concerning this issue, digital technologies in general, and the Internet in particular (integrating one-to-one, one-to-many, and many-to-many forms of communication), indeed invite research that seeks to clarify the relationship between media and communicative practices via the understanding of the role individual and collective communicative needs have in shaping those same communicative practices through the use of different platforms as a mean to perform distinctive activities (Jensen, 2011). In fact, the arrival of new media may change the usefulness of the existing ones – Rasmus Helles (2013) gives the example of Denmark and other Western countries, in which the decline in text messaging is due to social networking services (SNSs) becoming available on mobile media, “enabling young people to shift portions of their group communication from cluttered flows of multirecipient text messages to a more streamlined format on Facebook” (Helles, 2013, p. 16). To better understand the role played by different media in their daily life, we asked the respondents to imagine that they had free time on a Saturday afternoon and what would they do according to a range of pre-given options (see Table 4). The results show that Internet is an important medium to spend free time, perhaps the most important one, at least in the age groups considered in the sample for this article. The preferred activity for a Saturday afternoon is using social network sites. At the same time, watching TV is still a very mentioned activity to fulfil youngsters’ leisure time, being the second one most chosen. Visiting websites is the third most chosen Internet activity. To call friends or family is also a common activity, as well as sending SMS, but, surprisingly, almost as common as it is read printed books, newspapers or magazines. We also asked the respondents to imagine a scenario where they want to find some information quickly, such as the result of an election or who won a football match. They also could choose three options, and the most chosen one was check the information in websites. It was followed by the use a social network site (especially by the youngest group, 14-18) and turning on TV or radio. The less probable way mentioned was a chat program (see Table 5). Another scenario presented to the respondents was: imagine you have a friend at your home and you have doubts about some fact. How would you confirm the information? As in other questions, respondents could choose three options. Confirming our expectations, to search for the information on Google or another search engine was the option with more answers by far. The second choice was also to look for the information online, but this time in specific websites. It seems that “Internet really knows it all” for our respondents. If they choose to ask to another person, the most likely way of doing it is calling, instead of sending a text message or e-mail. To change a dinner invitation, the preferred form is through an SMS or a phone call. We believe that happens because of the urgency of delivering the message to the recipient. In this one, the Internet is not prevalent, probably because you still don’t know if everyone is always connected. As expected, the less likely way to change a dinner invitation is by posting a letter. In our research we found that Internet is ubiquitous in youngsters daily lives, not only for the enactment of daily life activities (as checking for information and other leisure activities) but also for social purposes. Nevertheless, data also shows that there is a complementarity in media usage amongst this group, with television still being very relevant as a device in which they spent a considerable amount of time. There are no big differences among these age groups, but even so we will point to some of the major differences we identified. The option of watch television in a computer could also express a desire for a more individualized consumption of contents, in their own device (the computer is more often of their than tv devices, which are more frequently shared by the all family members). They have more privacy to choose what to watch. Data also shows that respondents spend more time reading online newspapers and magazines than reading print versions. In this regard, we must not forget that this was an online survey, representative for that regard, with people that are online. Nielsen and Schrøder (2014) and Newman, Fletcher, Levy and Nielsen (2016) also pointed to an evolution with complementarities, thus supporting our supplementary hypothesis. Looking specifically at networked digital media (i.e the internet), using social networks is the most frequent activity carried online, especially amongst the younger group, that in average spent 79 minutes using SNS in the day prior to the of the survey. Particularly looking at the use of free time, results point to the major relevance that internet has amongst all age groups. This might be easily connected with the use of SNS, but, once again, TV is also pointed as relevant in leisure activities. In what concerns checking for factual information, search for information on Google or another search engine was the option with more answers. The second choice was also to look for the information online through specific websites. As a final remark, we would like to note that “complementarity” along with supplementation are the two main patterns of youngsters’ daily use of the media. Both these processes should be taken into consideration when it comes to define and promote public policies in the area of youth, namely in face of an ever more mediatised and information populated social context. Additionally, we must underline that this article results of the analysis of an online sample, meaning that these respondents all use, at least to at a certain degree, the internet. Results identify changes in daily life use of digital devices, which may point to the need of continuously promote digital affordances, from access to use. A different sample – i.e not only made of “online” subjects may have pointed to lower digital access and use. We are aware of the limitations of a study entirely based on quantitative comparative surveys, and future research on youngsters use of digital media, should include both exploratory qualitative methods, namely netnography, and descriptive structured and unstructured observation, namely based on data for online behaviours. The use of qualitative methods in the context of exploratory and descriptive designs, not only would allow us to gain a better insight of the uses youngsters do of digital media while conducting their during daily life activities, but would also allow us to better understand the representativeness of such uses and infer on possible future avenues of development. Still on the topic of future research, we would also like to point out that these results also highlight the need to conduct the same type of research with different types of samples and further cross data between different countries. Gurevitch, M., Coleman, S., & Blumler, J. G. (2009). Political Communication – old and new mediarelationships. The Annals of the American Academy of Political and Social Science, 625: 164-181. Giddens, A. (1984). The constitution of society. Berkeley, CA: University of California Press. Hepp, A. (2013). The communicative figurations of mediatized worlds: Mediatization research in times of the ‘mediation of everything’’. European Journal of Communication, 28 (6): 615-629. Jensen, K. B. (2011). Meta-media and meta-communication: Revisiting the concept of genre in the digital media environment. MedieKultur, 51, 8–21. Livingstone, S. (2007). From family television to bedroom culture: Young people’s media at home. In E. Devereux (Ed.), Media Studies: Key issues and Debates (pp. 302-321). London: Sage. Nossek, H., Adoni, H., and Nimrod, G. (2015). Is print really dying? The state of print media use in Europe. International Journal of Communication, 9: 365-385. Pais, J. M. (1996). A geração yô-yô, Dinâmicas Multiculturais, Novas Faces, Outros Olhares. Actas das sessões temáticas do II Congresso Luso-Afro-Brasileiro de Ciências Sociais. Lisboa: ICS, pp. 111-125. Prensky, M. (2001). Digital Natives, Digital Immigrants Part 1. On the Horizon, 9, 2001, pp. 1–6. 1 The common survey dates coincided with relevant national events with significant media coverage in Portugal and in Italy, which could change the results.
2019-04-21T20:10:08Z
http://www.scielo.mec.pt/scielo.php?script=sci_arttext&pid=S1646-59542017000400001&lng=pt&nrm=iso&tlng=pt
Assignees: INDUSTRY-ACADEMIA COOPERATION GROUP OF SEJONG UNIVERSITY SAMSUNG ELECTRONICS CO., LTD. A cache memory system and a caching method for a tile-based rendering may be provided. Each of cache lines in the cache memory system may include delayed-replacement information. The delayed-replacement information may indicate whether texture data referred to at a position of an edge of a tile is included in a cache line. When a cache line corresponding to an access-requested address is absent in the cache memory system, the cache memory system may select and remove a cache line to be removed from an associative cache unit, based on delayed-replacement information. 1. A cache memory system, the system comprising: a first associative cache unit to simultaneously search for a cache line corresponding to an access-requested address from one or more first cache lines; and a second associative cache unit to store one or more second cache lines, and to simultaneously search for a cache line corresponding to the access-requested address from the second cache lines, wherein the first associative cache unit includes delayed-replacement information for each of the first cache lines, and the first associative cache unit selects and removes one cache line from among the first cache lines based on the delayed-replacement information for the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit. 2. The system of claim 1, wherein the delayed-replacement information indicates whether texture data that is referred to at a position of an edge of a tile is included in a cache line. 3. The system of claim 1, wherein, when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, the first associative cache unit searches for a cache line that is un-accessed for a longest period of time from among the first cache lines, and moves the searched cache line to the second associative cache unit when a value of delayed-replacement information for the searched cache line is a first predetermined value. 4. The system of claim 3, wherein, when the value of the delayed-replacement information for the searched cache line is a second predetermined value, and a number of times that the searched cache line is excluded from the searching is less than or equal to a third predetermined value, the first associative cache unit re-searches for a cache line that is un-accessed for a longest period of time from among cache lines of which values of delayed-replacement information are the first predetermined value among the first cache lines, and moves the searched cache line to the second associative cache unit. 5. The system of claim 1, wherein, when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, the first associative cache unit searches for a cache line that is un-accessed for a longest period of time from among the first cache lines, selects one of the second associative cache unit and an external memory of the cache memory system, based on a value of delayed-replacement information for the searched cache line, and moves the searched cache line to the selected external memory or the selected second associative cache unit. 6. The system of claim 1, wherein: the second associative cache unit includes a plurality of sub-associative cache units; and the first associative cache unit searches for a cache line that is un-accessed for a longest period of time from among the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, selects one of the plurality of sub-associative cache units based on a value of delayed-replacement information for the searched cache line, and moves the selected sub-associative cache unit to the selected sub-associative cache unit. 7. The system of claim 6, wherein each of the plurality of sub-associative cache units stores a different number of cache lines. 8. The system of claim 1, wherein the first associative cache unit comprises one or more sets, each set stores k cache lines each, and the first cache lines correspond to k cache lines stored in a set corresponding to the access-requested address. 9. A caching method, the method comprising: simultaneously searching, by a first associative cache unit, for a cache line corresponding to an access-requested address from among one or more first cache lines, the first associative cache unit including delayed-replacement information for each of the first cache lines; simultaneously searching, by a second associative cache unit storing one or more second cache lines, for a cache line corresponding to the access-requested address from second cache lines; selecting, by the first associative cache unit, one of the first cache lines, based on delayed-replacement information for the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit; and removing, by the first associative cache unit, the selected cache line from the first associative cache unit, wherein the first associative cache unit uses the delayed-replacement information for the first cache lines to select one of the first cache lines and to remove the selected cache line. 10. The method of claim 9, wherein the delayed-replacement information indicates whether texture data referred to at a position of an edge of a tile is included in a cache line. 11. The method of claim 9, wherein: the selecting comprises: searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from among the first cache lines, and the removing comprises: moving, by the first associative cache unit, the searched cache line to the second associative cache unit when a value of delayed-replacement information for the searched cache line is a first predetermined value. 12. The method of claim 11, wherein: the selecting further comprises: re-searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from among cache lines of which values of delayed-replacement information is the first predetermined value among the first cache lines when the value of the delayed-replacement information for the searched cache line is a second predetermined value and a number of times that the searched cache line is excluded from the searching is less than or equal to a third predetermined value, and the removing further comprises: moving, by the first associative cache unit, the searched cache line to the second associative cache unit when the value of the delayed-replacement information for the searched cache line is the second predetermined value and the number of times that the searched cache line is excluded from the searching is less than or equal to the third predetermined value. 13. The method of claim 9, wherein: the selecting comprises: searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from the first cache lines, and the removing comprises: selecting, by the first associative cache unit, one of the second associative cache unit and an external memory of a cache memory system, based on a value of delayed-replacement information for the searched cache line; and moving, by the first associative cache unit, the searched cache line to the selected external memory or the selected second associative cache unit. 14. The method of claim 9, wherein: the selecting comprises: searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from among the first cache lines, and the removing comprises: selecting, by the first associative cache unit, one of a plurality of sub-associative cache units based on a value of delayed-replacement information for the searched cache line; and moving, by the first associative cache unit, the searched cache line to the selected sub-associative cache unit, wherein the second associative cache unit includes the plurality of sub-associative cache units. 15. The method of claim 14, wherein each of the plurality of sub-associative cache units stores a different number of cache lines. 16. The method of claim 9, wherein the first associative cache unit comprises one or more sets, each set stores k cache lines each, and the first cache lines correspond to k cache lines stored in a set corresponding to the access-requested address. 17. A non-transitory computer-readable medium comprising a program for instructing a computer to perform the method of claim 9. This application claims the priority benefit of Korean Patent Application No. 10-2011-0105939, filed on Oct. 17, 2011, in the Korean Intellectual Property Office, the disclosure of which is incorporated herein by reference. Example embodiments relate to a cache memory system and a caching method, and particularly, to a cache memory system and a caching method for a tile-based rendering. An object-based rendering (OBR) or a tile-based rendering (TBR) may be used for rendering an image. The OBR scheme may be utilized as an important algorithm by a desktop graphic processing unit (GPU), since the OBR has intuitive processing, and designing of hardware for the OBR is easy. The OBR may perform rendering based on an object. Accordingly, the OBR may induce a random access to an external memory, for example, a dynamic random access memory (DRAM) for each pixel in a pixel pipeline end. The TBR may divide a screen area into tiles, and may perform rendering based on a tile. According to the TBR, an external memory may be accessed once per tile. The tiles may be rendered using a quick internal memory, and a rendered result may be transmitted to an external memory. Therefore, the OBR may be at a disadvantage when compared to the TBR, in terms of power consumption and memory consumption. The foregoing and/or other aspects are achieved by providing a cache memory system, the system including a first associative cache unit to simultaneously search for a cache line corresponding to an access-requested address from one or more first cache lines, and a second associative cache unit to store one or more second cache lines, and to simultaneously search for a cache line corresponding to the access-requested address from the second cache lines, and the first associative cache unit includes delayed-replacement information for each of the first cache lines, and the first associative cache unit selects and removes one cache line from among the first cache lines based on the delayed-replacement information for the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit. The delayed-replacement information may indicate whether texture data that is referred to at a position of an edge of a tile is included in a cache line. When the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, the first associative cache unit may search for a cache line that is un-accessed for a longest period of time from among the first cache lines, and may move the retrieved (or searched) cache line to the second associative cache unit when a value of delayed-replacement information for the retrieved (or searched) cache line is a first predetermined value. When the value of the delayed-replacement information for the retrieved cache line is a second predetermined value, and a number of times that the retrieved cache line is excluded from the searching is less than or equal to a third predetermined value, the first associative cache unit may re-search for a cache line that is un-accessed for a longest period of time from among cache lines of which values of delayed-replacement information are the first predetermined value among the first cache lines, and may move the retrieved cache line to the second associative cache unit. When the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, the first associative cache unit may search for a cache line that is un-accessed for a longest period of time from among the first cache lines, may select one of the second associative cache unit and an external memory of the cache memory system, based on a value of delayed-replacement information for the retrieved cache line, and may move the retrieved cache line to the selected external memory or the selected second associative cache unit. The second associative cache unit may include a plurality of sub-associative cache units, and the first associative cache unit may search for a cache line that is un-accessed for a longest period of time from among the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, may select one of the plurality of sub-associative cache units based on a value of delayed-replacement information for the retrieved cache line, and may move the selected sub-associative cache unit to the selected sub-associative cache unit. Each of the plurality of sub-associative cache units may store a different number of cache lines. The first associative cache unit may include one set or more, each set stores k cache lines each, and the first cache lines correspond to k cache lines stored in a set corresponding to the access-requested address. The foregoing and/or other aspects are achieved by providing a caching method, the method including simultaneously searching, by a first associative cache unit, for a cache line corresponding to an access-requested address from among one or more first cache lines, the first associative cache unit including delayed-replacement information for each of the first cache lines, simultaneously searching, by a second associative cache unit storing second cache lines, for a cache line corresponding to the access-requested address from second cache lines, selecting, by the first associative cache unit, one of the first cache lines, based on delayed-replacement information for the first cache lines when the cache line corresponding to the access-requested address is absent in the first associative cache unit and the second associative cache unit, and removing, by the first associative cache unit, the selected cache line from the first associative cache unit, and the first associative cache unit uses the delayed-replacement information for the first cache lines to select one of the first cache lines and to remove the selected cache line. The selecting may include searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from among the first cache lines. The removing may include moving, by the first associative cache unit, the retrieved cache line to the second associative cache unit when a value of delayed-replacement information for the retrieved cache line is a first predetermined value. The selecting may further include re-searching, by the first associative cache unit, for a cache line that is un-accessed for a longest period of time from among cache lines of which values of delayed-replacement information is the first predetermined value among the first cache lines when the value of the delayed-replacement information for the retrieved cache line is a second predetermined value and a number of times that the retrieved cache line is excluded from the searching is less than or equal to a third predetermined value. The removing may further include moving, by the first associative cache unit, the retrieved cache line to the second associative cache unit when the value of the delayed-replacement information for the retrieved cache line is the second predetermined value and the number of times that the retrieved cache line is excluded from the searching is less than or equal to the third predetermined value. The removing may include selecting, by the first associative cache unit, one of the second associative cache unit and an external memory of a cache memory system, based on a value of delayed-replacement information for the retrieved cache line, and moving, by the first associative cache unit, the retrieved cache line to the selected external memory or the selected second associative cache unit. The removing may include selecting, by the first associative cache unit, one of a plurality of sub-associative cache units based on a value of delayed-replacement information for the retrieved cache line, and moving, by the first associative cache unit, the retrieved cache line to the selected sub-associative cache unit, and the second associative cache unit includes the plurality of sub-associative cache units. FIG. 6 illustrates a caching method of a cache memory system according to example embodiments. FIG. 1 illustrates an edge effect according to example embodiments. A tile-based rendering (TBR) divides a screen area 100, that is, a frame, into a plurality of tiles. Referring to FIG. 1, the screen area 100 may be divided into tiles in a configuration of 7 rows×7 columns. In the screen area 100 of FIG. 1, three objects, that is, a first object 130, a second object 140, and a third object 150, are included as an aspect of the present embodiment. In FIG. 1, a portion 112 of a first tile 110 and a portion 122 of a second tile 120 are shown in a magnified form. An edge 105 exists between the first tile 110 and the second tile 120. A portion 142 of the second object 140 may be included in the first tile 110 and the second tile 120. A graphic processing unit (GPU) may perform rendering of each tile, for example, the first tile 110 or the second tile 120. When the GPU performs rendering of the first tile 110, the GPU may perform rendering of a triangle, that is, the second object 140, included in the tiles, along a scan line. When the GPU processes pixels or fragments in the first tile 110, the GPU may request data, for example, texture data, from an external memory (not shown). The requested data may be stored in a cache (not shown), so that the data may be reused afterward. Here, data may be requested based on a block unit. A block 160 may include a plurality of texels. Referring to FIG. 1, the block 160 includes four texels 162, 164, 166, and 168 in a configuration of 2 rows×2 columns. A magnitude of a block may be arbitrary and a shape of the block is not limited to that of a regular square. A texel may be a single pixel. A single texel may include at least one byte or at least one word. Among the texels 162, 164, 166, and 168 included in the block 160, the texels 166 and 168 included in the second tile 120 that is adjacent to the first tile 110 may not be used in performing rendering of the first tile 110. That is, when the block 160 exists at an edge between the first tile 110 that is rendered and the second tile 120 that is adjacent to the first tile 110, data associated with pixels in the second tile 120, for example, the texels 166 and 168, may not be used while the first tile 110 is being rendered. Although the first tile 110 and the second tile 120 are close to each other, it is not guaranteed that the second tile 120 is processed immediately after processing of the first tile 110, such as, rendering of the first tile 110. In particular, it is not guaranteed when the first tile 110 and the second tile 120 are close to each other in the vertical direction. Accordingly, although the block 160 is stored in a cache while the first tile 110 is being processed, texels 166 and 168 in the second tile 120 may not be referred to for a long period of time, that is, until the second tile 120 is processed. Accordingly, when new data is stored in the cache (not shown), data of the texels 166 and 168 may be removed from the cache. In a case where the data of the texels 166 and 168 is removed from the cache, the block 160 may need to be read again from the external memory and stored again in the cache to process the second tile 120 afterward. For example, when texture-mapping is performed with respect to fragments existing in a boundary between tiles, a probability that the cache reuses data of a texel included in a tile different from a tile currently being processed among data that is read from a memory and stored in the cache, that is, among data of a block, may be significantly low. The data that is not to be used, that is, the data of the texel in the tile different from the tile currently being processed may occupy the cache and thus, an efficiency of the cache may be decreased. That is, as a number of blocks included in an edge between different tiles increases, a utilization of the cache that utilizes a reusability of data may decrease. Here, the decrease in the utilization may negatively affect a performance of the GPU or a system, and may induce a relatively wide texture bandwidth when compared to an object-based rendering (OBR). When data of the block 160 is stored in the cache for a relatively long period of time, the data of the block 160 may continuously exist in the cache until the second tile 120 is processed. In this example, the data of the texels 166 and 168 in the second tile 120 may be accessed directly through the cache, and a cache miss may not occur and thus, the utilization of the cache may increase. The cache may use a cache line as a unit for storing data. That is, storing of certain data, for example, data of the block 160 or data of texels 166 and 168, in the cache for a relatively long period of time may indicate that a cache line corresponding to the certain data is stored in the cache for a relatively long period of time. To store a certain cache line in the cache for a relatively long period of time, the cache line may need to include information that is referred to for determining whether to perform replacement. The information referred to for determining whether to perform replacement may be referred to as delayed-replacement information. That is, each cache line may include delayed-replacement information, and the delayed-replacement information may refer to information that is used by the cache to select a cache line to be changed from among a plurality of cache lines. Here, the delayed-replacement information may indicate whether a corresponding cache line includes texture data referred to at a position of an edge of a tile. That is, the delayed-replacement information for the cache line may indicate whether the cache line includes texture data referred to at the position of the edge of the tile, that is, data of a block included in at least two tiles, and the cache may determine a cache line to be changed from among one or more cache lines based on delayed-replacement information for each of the cache lines. Accordingly, the texture data referred to at the position of the edge of the tile may be stored in the cache for a relatively long period of time. The delayed-replacement information may be formed of one bit. When a value of a bit of delayed-replacement information is `0` or `false`, the delayed-replacement information indicates that a corresponding cache line may not need to be stored in the cache for a relatively long period of time. Conversely, when a value of a bit of delayed-replacement information is `1`, a value different from `0`, or `true`, the delayed-replacement information may indicate that a corresponding cache line needs to be stored in the cache for a relatively long period of time. At least one bit included in the delayed-replacement information may be referred to as an E-bit. Here, `E` may denote an edge. That is, the E-bit of a cache line may indicate whether the cache line includes texture data referred to at a position of an edge of a tile. When a value of the E-bit is `1`, the value indicates `true`, that is, that the texture data referred to at the position of the edge of the tile is included in the cache line. When a value of the E-bit is `0`, the value indicates `false`, that is, that the texture data referred to at the position of the edge of the tile is absent in the cache line. When texture data stored in the external memory is stored in a cache memory since a cache miss occurs while texture-mapping is being performed with respect to a position of an edge of a tile, an E-bit of a cache line storing the texture data may be set to `1`. When data different from texture data referred to at an edge between tiles is stored in the cache memory, an E-bit of a cache line storing the data may be set to `0`. The cache line of which the E-bit is set to `1` may be stored in the cache, as long as possible, by increasing a priority of the cache line. FIG. 2 illustrates a cache memory system 200 according to example embodiments. The cache memory system 200 may include a first associative cache unit 210 and a second associative cache unit 220. The cache memory system 200 may receive an address of an access-requested memory, hereinafter, an access-requested address. An address may include a tag field or tag index, a set field, and a word field or combination thereof. The first associative cache unit 210 may include one or more set. In FIG. 2, the first associative cache unit 210 may include n sets including a set 0 through a set n-1. The set field in the address may indicate an area where data of the address is stored in the first associative cache unit 210. For example, a value of the set field of the address is `00` as a binary number, the address may correspond to the set 0 from among four sets. Each set includes k ways including a way 0 through a way k-1. A way may include a cache line and information used for the cache line. The way may include the cache line, a tag of the cache line, and delayed-replacement information for the cache line. Here, the tag and the delayed-replacement information may be stored in a random access memory (RAM) 212, and the cache line may be stored in a data static random access memory (SRAM) 214. However, it is not limited thereto. The cache line may include one or more words. The tag may indicate a portion, corresponding to a tag field in an address of data. The tag of the cache line may be common to all words stored in the cache line. That is, the words in the cache line may be words corresponding to k addresses having the same value of the tag field and the same value of the set field. A cache line in the first associative cache unit 210 may be selected by a set field and a tag field. Also, a word may be selected by a word field from among one or more words in the selected cache line. For example, when a value of the word field is `01` as a binary number, a word 1 from among four words in the selected cache line may be selected as a word corresponding to an access-requested data. The second associative cache unit 220 may include one or more cache lines and a tag of the cache lines. The second associative cache unit 220 may not include a set. Accordingly, a tag of the second associative cache unit 220 may indicate a portion, corresponding to a tag field and a set field in an address of data. Here, data of the cache line may correspond to words included in the cache line. A cache line of the second associative cache unit 220 may store the same number of words as a cache line of the first associative cache unit 210. The cache line of the second associative cache unit 220 may be selected by a set field and a tag field, and one or more words in the cache line of the second associative cache unit 220 may be selected by a word field. When the cache memory system 200 is requested to access data at a selected address, whether the data at the address exists in the first associative cache unit 210 may be verified. The first associative cache unit 210 may select a set corresponding to the access-requested address, using a set field of an access-requested address. In FIG. 2, a set 1 is illustrated as a set corresponding to the access-requested address. The first associative cache unit 210 may simultaneously search for a cache line corresponding to the access-requested address from among one or more cache lines stored in the selected set. Here, a cache line stored in the selected set corresponding to the access-requested address may be referred to as a first cache line. That is, the first associative cache unit 210 may simultaneously search for a cache line corresponding to the access-requested address from among the first cache lines. Here, `simultaneously` may be used to indicate a meaning opposite to that of sequentially verifying of whether each of the first cache lines corresponds to the access-requested address. The first associative cache unit 210 may simultaneously compare a value of a tag field of the access-requested address and values of tags of the first cache lines and thus, may verify whether a tag having the same value as the value of the tag field exists. When the tag having the same value as the value of the tag field exists, a cache line corresponding to the tag may include access-requested data, that is, an access-requested word. Accordingly, a cache hit may occur in the cache line corresponding to the tag having the same value. That is, the cache line corresponding to the tag having the same value may be a hit. When the tag having the same value is absent, a cache miss may occur. The cache miss may be a primary miss. As described in the foregoing, the first associative cache unit 210 may simultaneously compare a value of a tag field and values of k tags in a set. Accordingly, the first associative cache unit 210 may be a k-way set associative cache unit. Hereinafter, an operation of the cache memory system 200 when a hit occurs in the first associative cache unit 210 will be described. When a hit occurs in the first associative cache unit 210, all words corresponding to a set and a tag of an access-requested address may be stored in a hit cache line. Accordingly, the first associative cache unit 210 may use a word field of the access-requested address, may select an access-requested word from among the words in the hit cache line, and may provide the selected word as access-requested data. For example, when a value of the word field is `00` as a binary number, the first associative cache unit 210 may provide word 0, that is, a first word, from among four words in the hit cache line, to a central processing unit (CPU) or a GPU, as the access-requested data. Hereinafter, an operation of the cache memory system 200 when a primary miss occurs in the first associative cache unit 210 will be described. When the primary miss occurs in the first associative cache unit 210, the second associative cache unit 220 may simultaneously search for a cache line corresponding to an access-requested address from among one or more cache lines stored in the second associative cache unit 220. Here, a cache line stored in the second associative cache unit 220 may be referred to as a second cache line. The second associative cache unit 220 may simultaneously compare values of tags of the second cache lines with a value of a tag field of the access requested address or a value of a tag field and set field of the access requested address and thus, may verify whether a tag having the same value as the tag field or a tag having the same value as the tag field and the set field exists. When the tag having the same value exists, a cache line corresponding to the tag may include access-requested data. Accordingly, a cache hit may occur in the cache line corresponding to the tag having the same value. That is, the cache line corresponding to the tag having the same value may be hit. When the tag having the same value is absent, a cache miss may occur. The cache miss may be a secondary miss, and may be a final cache miss occurring in the cache memory system 200. Hereinafter, an operation of the cache memory system 200 when a primary miss occurs in the first associative cache unit 210 and a hit occurs in the second associative cache unit 220 will be described. Referring to FIG. 2, a hit occurs in a second cache line. When a hit occurs in the second associative cache unit 220, the first associative cache unit 220 may select an access-requested word from among words in a hit cache line, using a word field of an access-requested address, and may provide, to a CPU or a GPU, the selected word as access-requested data. In this example, the hit cache line may be replaced with one of the first cache lines in the first associative cache unit 210. That is, the hit cache line may be moved to a position of the cache line selected from among the first cache lines, and the selected cache line may be moved to a position of the hit cache line. In the switching, a method to be described with reference to FIG. 3 will be used to select one of the first cache lines. Hereinafter, an operation of the cache memory system 200 when a primary miss and a secondary miss occur will be described. When a cache line corresponding to an access-requested address is absent in the first associative cache unit 210 and the second associative cache unit 220, the access-requested address is transferred to a next lower memory layer, and data at the access-requested address may be read from the next lower memory layer, for example, an external memory. In this example, the data corresponding to the access-requested address may be read along with data at an address having the same tag field and the same set field as the data. The cache memory system 200 may use a cache line as a unit for storing data. Accordingly, although an access to a single word is requested, words belonging to the same cache line as the access-requested word, that is, words having the same tag field value and the same set field value as the access-requested word, may be read from the next lower memory layer and may be stored in a cache line. A newly stored cache line due to a cache miss may be referred to as a third cache line. To store the third cache line, the first associative cache unit 210 may select and remove one from among the first cache lines. That is, the first associative cache unit 210 may store the third cache line in a position of the removed cache line. For example, the first associative cache unit 210 may select and remove one from among the first cache lines, based on replacement information for the first cache lines. Here, `removing` may indicate moving of the selected cache line from the first associative cache unit 210 to the second associative cache unit 220 or to the external memory of the cache memory system 200. A method of selecting and removing a cache line based on replacement information will be described in detail with reference to FIGS. 3 through 5. The cache line removed from the first associative cache unit 210 may be moved to a position of a cache line selected from among the second cache lines of the second associative cache unit 220. That is, the second associative cache unit 220 may store a cache line selected, as a victim, from the first associative cache unit 210. Accordingly, the second associative cache unit 220 may be a victim cache. Also, the second associative cache unit 220 may simultaneously search for a cache line corresponding to an access-requested address from among all cache lines stored in the second associative cache unit 220. Accordingly, the second associative cache unit 220 may be a full-associative victim cache. The second associative cache unit 220 may use a first-in first-out (FIFO) scheme or a least recently used (LRU) scheme, to select one of the second cache lines. When the FIFO scheme is used, the second associative cache unit 220 may select a cache line stored for a longest time in the second associative cache unit 220 from among the second cache lines, and may remove the selected cache line so as to store a victim cache line transmitted from the first associative cache unit 210. When the LRU scheme is used, the second associative cache unit 220 may select a cache line referred to at an earliest point in time from among the second cache lines, and may remove the selected cache line so as to store a victim cache line transmitted from the first associative cache unit 210. When a selected cache line is removed from the second associative cache unit 220, values of words included in the cache line to be removed may be transferred to the next lower memory layer. In this instance, the next lower memory layer may update values of stored words, corresponding to the cache line removed from the second associative cache unit 220, based on the transferred values. FIG. 3 illustrates a method of selecting a cache line to be removed according to example embodiments. Referring to FIG. 3, a primary miss and a secondary miss may occur. An access-requested address may indicate a set 1. Accordingly, the first cache lines of FIG. 2 may be k cache lines in the set 1. When a cache line corresponding to the access-requested address is absent in the first associative cache unit 210 and the second associative cache unit 220, the first associative cache unit 210 may select a cache line to be removed, based on the LRU scheme. That is, the first associative cache unit 210 may select a cache line accessed at an earliest point in time from among the first cache lines, as the cache line to be removed. The first associative cache unit 210 may search for a cache line un-accessed for a longest time, and may move the retrieved cache line to the second associative cache unit 220 when a value of delayed-replacement information, for example, an E-bit, of the retrieved cache line is a first predetermined value. Here, the first predetermined value may be a value, for example, `0`, indicating that a cache line may not need to be stored in a cache for a relatively long period of time. That is, when the cache line selected to be removed is the cache line that may not need to be stored for a relatively long period of time, the first associative cache unit 210 may move the retrieved cache line directly to the second associative cache unit 220, as a victim. When the value of the delayed-replacement information for the retrieved cache line is a second predetermined value, and a number of times that the retrieved cache line is excluded from the searching is less than or equal to a third predetermined value, the first associative cache unit 210 may re-search for a cache line un-accessed for a longest period of time from among cache lines of which delayed-replacement information is the first predetermined value among the first cache lines, and may move the retrieved cache line to the second associative cache unit 220. Here, the second predetermined value may be a value, for example, `1` or a value different from `0`, indicating that a cache line may need to be stored in a cache for a relatively long period of time. That is, when the cache line selected to be removed is the cache line that may need to be stored for a relatively long period of time, the first associative cache unit 210 may reselect one of cache lines that may not need to be stored for a long period of time as a cache line to be removed, instead of the selected cache line, and may move the reselected cache line to the second associative cache unit 220 as a victim. For example, when a cache line of a way 1 is selected as a cache line un-accessed for a longest period of time from among the first cache lines, a value of delayed-replacement information for the way 1 may be `1`, that is, a value indicating that a cache line needs to be stored for a relatively long period of time. Accordingly, a cache line un-accessed for a longest period of time may be reselected from among cache lines of which values of delayed-replacement information are different from `1`, as a cache line to be removed. In this example, a cache line of which a value of delayed-replacement information is the second predetermined value may not be always excluded from a target to be moved. Accordingly, the first associative cache unit 210 may limit, to the third predetermined value, a maximum number of times that a certain cache line is excluded from a target to be moved. When a number of times that a certain cache line is excluded from the target to be removed is equal to the third predetermined value, the certain cache line may not be excluded from the target to be removed any longer. To exclude a certain cache line from the target to be moved, the first associative cache unit 210 may count a number of times that a cache line is excluded from the target to be moved, for each cache line, and may store information associated with the count, for example, an exclusion count bit. A method of limiting the number of exclusions may be embodied by using a value of delayed-replacement information. For example, when the third predetermined value is 3 and a cache line is stored in the first associative cache unit 210, delayed-replacement information for the cache line may be set to 3. Subsequently, when the first associative cache unit 210 selects the cache line as a cache line to be removed, the first associative cache unit 210 may exclude the cache line from the target to be removed, and may decrease the value of the delayed-replacement information for the cache line by 1. When the cache line is excluded from the target to be moved three times, the value of the delayed-replacement information for the cache line may become 0 and thus, the cache line may not be excluded from the target to be moved, any longer. That is, when a certain cache line is excluded from the target to be moved, the certain cache line may be decreased by 1 for each time and thus, the certain cache line may be regarded as a cache line that may not need to be stored for a long period of time. FIG. 4 illustrates a method of removing a selected cache line according to example embodiments. Referring to FIG. 4, a primary miss and a secondary miss may occur. An access-requested address may indicate a set 1. Accordingly, the first cache lines of FIG. 2 may be k cache lines in the set 1. When a cache line corresponding to the access-requested address is absent in the first associative cache unit 210 and the second associative cache unit 220, the first associative cache unit 210 may select one of the first cache lines. The first associative cache unit 210 may search for a cache line un-accessed for a longest period of time from among the first cache lines. The first associative cache unit 210 may select one of an external memory of the cache memory system 200 and the second associative cache unit 220, based on a value of delayed-replacement information for the retrieved cache line, and may move the retrieved cache line to the selected one from the external memory or the second associative cache unit 220. The first associative cache unit 210 may move the retrieved cache line to the external memory when the value of the delayed-replacement information for the retrieved cache line is a first predetermined value. When the retrieved cache line is moved to the external memory, the external memory may update values of words, corresponding to the retrieved cache line, stored in the external memory, using values of words of the retrieved cache line. The first associative cache unit 210 may move the retrieved cache line to a position of the one selected from among the second cache lines of the second associative cache unit 220 when the value of the delayed-replacement information for the retrieved cache line is a second predetermined value, similar to when a primary miss and a secondary miss occurs as described in the foregoing with reference to FIG. 3. Accordingly, when the value of the delayed-replacement information for the cache line is the first predetermined value, the cache line may be moved to the external memory immediately when the cache line is removed from the first associative cache unit 210. Conversely, when the value of the delayed-replacement information is the second predetermined value, the cache line may be moved to the second associative cache unit 220 when the cache line is removed from the first associative cache unit 210. Accordingly, the second associative cache unit 220 may store cache lines of which values of delayed-replacement information are the second predetermined value. That is, the second associative cache unit 220 may store only cache lines that need to be stored for a long period of time. The cache lines stored in the second associative cache unit 220 may be moved again to the first associative cache unit 210 afterward and thus, a cache line of which a value of delayed-replacement information is the second predetermined value may be stored in the cache memory system 200 for a relatively long period of time. The second associative cache unit 220 may include the plurality of sub-associative cache units, for example, a first sub-associative cache unit 522 and a second sub-associative cache unit 524. Each of the plurality of sub-associative cache units may operate as the second associative cache unit 220. Referring to FIG. 5, the sub-associative cache unit 522 and the sub-associative cache unit 524 may exist. That is, two sub-associative cache units exist. Referring to FIG. 4, a primary miss and a secondary miss occur. Here, an occurrence of the secondary miss may indicate that a cache line corresponding to a set field and a tag field is absent in the first associative cache unit 210 and the plurality of sub-associative cache units 522 and 524. An access-requested address may indicate a set 1. Accordingly, the first cache lines of FIG. 2 may be k cache lines in the set 1. When a cache line corresponding to the access-requested address is absent in the first associative cache unit 210 and the second associative cache unit 220, the first associative cache unit 210 may search for a cache line un-accessed for a longest period of time from among the first cache lines, may select one of the plurality of sub-associative cache units 522 and 524, based on a value of delayed-replacement information for the retrieved cache line, and may move the retrieved cache line to the plurality of cache lines 522 and 524. The first associative cache unit 210 may move the retrieved cache line to the second sub-associative cache unit 524 when the value of the delayed-replacement information for the retrieved cache line is a first predetermined value. Also, the first associative cache unit 210 may move the retrieved cache line to the first sub-associative cache unit 522 when the value of the delayed-replacement information for the retrieved cache line is a second predetermined value. Each of the plurality of sub-associative cache units 522 and 524 may store a different number of cache lines. A number of cache lines that the first sub-associative cache unit 522 is able to store may be greater than a number of cache lines that the second sub-associative cache unit 524 is able to store. In this example, a cache line stored in the first sub-associative cache unit 522, that is, a cache line of which a value of delayed-replacement information is the second predetermined value, may be stored in the cache memory system 200 for a relatively longer period of time than a cache line stored in the second sub-associative cache unit 524, that is, a cache line of which a value of delayed-replacement information is the first predetermined value. The cache line in the first sub-associative cache unit 522 is moved again to the first associative cache unit 210, the value of the delayed-replacement information for the cache line may become the second predetermined value. The cache line in the second sub-associative cache unit 524 is moved again to the first associative cache unit 210, the value of the delayed-replacement information for the cache line may become the first predetermined value. FIG. 6 illustrates a caching method of the cache memory system 200 according to example embodiments. In operation 610, the first associative cache unit 210 may simultaneously search for a cache line corresponding to an access-requested address from among one or more first cache lines. The first associative cache unit 210 may include delayed-replacement information for each of the first cache lines. When the cache line corresponding to the access-requested address exists in the first associative cache unit 210, the method may proceed with operation 660. When the cache line is absent, the method may proceed with operation 620. In operation 620, the second associative cache unit 220 that stores one or more second cache lines may simultaneously search for a cache line corresponding to the access-requested address. When the cache line corresponding to the access-requested address exists in the second associative cache unit 220, the method may proceed with operation 660. When the cache line is absent, the method may proceed with operation 630. That is, operation 630 may be performed when the cache line corresponding to the access-requested address is absent in the first associative cache unit 210 and the second associative cache unit 220. In operation 630, the first associative cache unit 210 may select one of the first cache lines based on replacement information. In operation 640, the first associative cache unit 210 may remove the selected cache line from the first associative cache unit 210. The first associative cache unit 210 may use delayed-replacement information for the first cache lines to select or to remove one from among the first cache lines in operations 630 and 640. In operation 650, the first associative cache unit 210 may store data corresponding to the access-requested address in the first associative cache unit 210. The first associative cache unit 210 may store data corresponding to the access-requested address and data included in the same cache line as the data, as a new cache line. The first associative cache unit 210 may store the new cache line in a position of the cache line removed in operation 640. In operation 660, the first associative cache unit 210 or the second associative cache unit 220 may provide the data corresponding to the access-requested address to a processor, for example, a CPU or a GPU. The selection in operation 630 and the removal in operation 640 may be performed in varied schemes described in the foregoing with reference to FIGS. 3 through 5. First, a case in which the method described in the foregoing with reference to FIG. 3 is applied to the selection in operation 630 and the removal in operation 640 will be described. In this example, operation 630 may include an operation in which the first associative cache unit 210 searches for a cache line un-accessed for a longest period of time from among the first cache lines. When a value of delayed-replacement information for the retrieved cache line is a second predetermined value and a number of times that the retrieved cache line is excluded from the searching is less than or equal to a third predetermined value, operation 630 may further include an operation in which the first associative cache unit 210 re-searches for a cache line un-accessed for a longest period of time from among cache lines of which values of delayed-replacement information is a first predetermined value among the first cache lines. Also, operation 640 may include an operation in which the first associative cache unit 210 moves the retrieved cache line to the second associative cache unit 220 when the value of the delayed-replacement information for the retrieved cache line is the first predetermined value. When the value of the delayed-replacement information for the retrieved cache line is the second predetermined value and the number of times that the retrieved cache line is excluded from the searching is less than or equal to the third predetermined value, operation 640 may further include an operation in which the first associative cache unit 210 moves, to the second associative cache unit 220, a cache line retrieved by re-searching. Subsequently, a case in which the method described in the foregoing with reference to FIG. 4 is applied to the selection in operation 630 and a removal in operation 640 will be described. Operation 640 may include an operation in which the first associative cache unit 210 selects one of the second associative cache unit 220 and an external memory of the cache memory system 200, based on delayed-replacement information for the retrieved cache line. Also, operation 640 may include an operation in which the first associative cache unit 210 moves the retrieved cache line to the one selected from among the second associative cache unit 220 and the external memory. Subsequently, a case in which the method described in the foregoing with reference to FIG. 5 is applied to the selection in operation 630 and the removal in operation 640 will be described. The second associative cache unit 220 may include the plurality of sub-associative cache units 522 and 524, and each of the plurality of sub-associative cache units 522 and 524 may store a different number of cache lines. Operation 630 may include an operation in which the first associative cache unit 210 searches for a cache line un-accessed for a longest period of time from among the first cache lines according to an aspect of the embodiment. Operation 640 may include an operation in which the first associative cache unit 210 selects one of the plurality of sub-associative cache units 522 and 524, based on a value of delayed-replacement information for the retrieved cache line. Also, operation 640 may include an operation in which the first associative cache unit 210 moves the retrieved cache line to the selected sub-associative cache unit 522 or 524. The example embodiments described with reference to FIGS. 1 through 5 may be applicable to the present embodiment and thus, detailed descriptions thereof will be omitted for conciseness. The method according to the above-described embodiments may be recorded in non-transitory computer-readable media including program instructions to implement various operations embodied by a computer. The media may also include, alone or in combination with the program instructions, data files, data structures, and the like. Examples of non-transitory computer-readable media include magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD ROM discs and DVDs; magneto-optical media such as optical discs; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory (ROM), random access memory (RAM), flash memory, and the like. Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter. The described hardware devices may be configured to act as one or more software modules in order to perform the operations of the above-described embodiments, or vice versa.
2019-04-24T02:34:16Z
http://www.patentsencyclopedia.com/app/20130097386
DELIVERED ON SABBATH MORNING,SEPTEMBER 16, 1860, BY THE REV. C. H. SPURGEON, AT EXETER HALL, STRAND. "The light of the body is the eye: if therefore your eye is good, your whole body will be full of light. But if your eye isevil, your whole body shall be full of darkness." THIS sentence has in it the nature of a Proverb. It is well worthy of frequent quotation, as it is applicable to such variouscircumstances. It is one of the most pithy, terse utterances of our Savior. So full of meaning is, it that it would be utterlyimpossible for us to draw out all its analogies. It is capable of adaptation to so many different things that the ablest commentatorsdespair of being able to give you the whole of its fullness. But mark-very much of the meaning is to be discovered by theuse-as the varieties of our personal experience furnish varieties of practical reflection. For example, we may interpret thepassage of conscience as the eye of the soul-conscience must be clear and simple. If the conscience, which is the candle ofthe Lord, and which searches the secret parts of the belly, is not light but darkness, how great must be the darkness! Ifa man has not enough conscience to know darkness from light, and light from darkness, then he puts bitter for sweet, and sweetfor bitter; if that only power, on which seems to tremble some rays of the ancient light of manhood, is darkened-if the lighthouseis quenched, if the windows are sealed up-how great, indeed, must be the darkness of man! We cannot wonder, when once a manhas a depraved, and seared conscience, that he willingly runs into iniquity, commits sin with both hands, and goes from stepto step till he obtains the highest seat in the scale of sin! The symbol of the eye here may also refer to the understanding, taken in a yet broader sense than as the conscience; for,I suppose, that conscience is, after all, but the understanding exercised about moral truth. If the understanding of man isdark, how dark must be man's soul! If that which judges, and weighs, and tests-if that which is to us the teacher, the recorderof the town of Mansoul-if that is amiss, if the recorder make wrong entries, if the understanding has bad scales and usesdifferent weights, how gross, indeed, must be the ignorance of man! What? Seal up the windows of the house? Surely the thicknessof the walls will not so much keep away the light as the sealing up of the windows! Let but the understanding be enlightened,and the rays will diffuse themselves and illuminate every faculty of the whole man-but, ah, if it is darkened, man is in darknessas respects all his powers! Yet again, the term, "eye," may also refer to the heart; for, in some sense, the heart is the eye of the soul. The affectionsturn the man in a certain direction, and where the affections go, the eye is turned. There is such a connection between theheart and the eye of man, that well might this text have such a reference. If the affections are pure, the man will be pure;but if the affections themselves are perverted, debased, degraded, we need not marvel that the man's whole life should bedegraded, debased and filthy, too. You see the aptness of the proverb by the numerous moral truths it may serve to illustrate;but time will only allow me to take it in more than one or two aspects and may God bless what I shall have to say to all ourhearts. I shall regard our text as having to do, first, with the eye of our faith And, secondly, with the eye of our obedience. I. First, with THE EYE OF OUR FAITH. Faith to the spiritual man is his eye. It is with that he looks to Christ- looks untoHim whom he has pierced and weeps for his sin. It is by faith that he walks; not by natural sight, but by the sight whichis yielded to him by his spiritual eye-his faith. It is by this faith that he sees things not as yet visible to the eye ofsense-realizes the unseen and beholds the substance of things hoped for, the evidence of things which the natural eye cannotdiscern. Faith is to the Christian an eye both quick and sharp, an eye which discovers sin, an eye which discerns the Master'swill, an eye which looks forward, and down a lengthy racecourse to the reward which awaits all those who so run as to receivethe prize, looking unto Christ Jesus. Faith peers across the stream of death, and longs for the rest which remains for thepeople of God. Faith has, indeed, so sharp a vision, that it sees the glories which God has prepared for them who love Him.Faith beholds the face of the crowned Redeemer in bliss, and meekly bows before Him in adoration. Faith, then, is the eyeof the Believer's soul. Any disease, therefore, in our faith will bring disease into the entire man! If our faith is weak,then the light in our entire spirit will be very hazy. He who staggers at the promise, through unbelief, will stagger in otherplaces besides his faith; he will stagger on his knees; his hands will become weak, and his heart will often palpitate. Hewho can see well with the eye of faith, can do all things. If our faith is the measure of our strength, he that is strongin faith is strong to do mighty exploits. By his God shall he break through a troop; in the name of his God, shall he leapover a wall. But he who is afraid of the promise, staggering at its greatness, instead of adoring the greatness of the Giver-hewho looks at the blessing, and trembles because of his unworthiness, forgetful of the graciousness of Him who gives giftsto the undeserving-he must be a weak and sorrowful man! Little-Faith is safe, but he is seldom happy. It is very rarely thatReady-to-Halt can dance upon his crutches. Miss Much-Afraid is usually of a sorrowful countenance. But Great-Heart is a manwhose face is anointed with fresh oil, and faithful is he who can look into the midst of the fires and fear not their fury!Hopeful is one that can pass through the river Jordan, itself, and cry, "Fear not, I feel the bottom and it is good." Disease, I say, in our faith will bring disease into the whole spiritual man, and weakness here will make us weak everywhere.If our faith is also variable, if it has its uphills, and its downhills, its ebbing, and its flowing, then it will in everyebb and flow affect the whole spiritual being. When faith is in its flood-tide, the soul floats joyously above every rock-norfears even the thought of quicksand. But when faith is at its ebb, then-though blessed be God the tide never goes so low asto wreck the vessel-yet sometimes she seems to bump upon the sands, or the rocks grate against her keel. It is hard sailingwith Little-Faith; it is difficult traveling on the road to Heaven when faith varies and is unstable as water. That Christiancannot excel whose faith is of an inconstant character. But, my Brothers and Sisters, there is one disease of faith whichwill not merely bring disease into the soul, but positive death! There is one sickness of our faith which is mortal-whichmust bring the man who labors under it inevitably to destruction-and that is a lack of singleness in our faith, the lack ofsimplicity in it. He who has two grounds of trust is lost! He who relies upon two salvations, and cannot say of Christ, "Heis all my salvation and all my desire," that man is not only in danger of being lost, but he is already condemned; because,in fact, he believes not on the Son of God! He is not alive to God at all, but rests partly on the Cross, and then in somemeasure on something else. He only is the quickened and living child of God whose faith is "fixed on nothing less than Jesus'blood and righteousness." It is with this disease of faith I have to deal this morning. Be it so, that the light of your body is the eye of your faith,therefore when your eye is good, when you see but one objective and look unto Jesus, alone, your whole body will be full oflight. There shall be the light of peace and joy in Christ Jesus. But if your eye is evil, and it must be evil if it is notgood, if it is divided between two objects, know that your whole body shall be full of darkness! Doubt and despondency shallcast its thick shadows over you now, and worse, you shall be presently overtaken with the Egyptian darkness of despair, whenGod shall cast you away. For hear me, you who are trusting to two things-trusting partly in Christ, and partly in your goodworks, or in ceremonies, or in almsgiving, or in prayer, or in your experience, or your doctrinal knowledge-all or any ofthese as objects of confidence do but treacherously cast a slur upon the name of Jesus, the Savior of men! What, Sirs? Andis not Jesus able enough to save with His own right hand, that you must come and seek some assistance for Him? Why, Man, youmake Him to be less than Omnipotent, for Omnipotence can do all things without assistance! And yet you would meddle with Him,and think that He has not might enough to save, unless you shall supplement His strength by the addition of your own! Whatwould have been said to the brightest angel if he had stepped forward with impertinent audacity to assist His Maker in thecreation of the world? Or, what would be said of Gabriel, himself, if he should offer to bend his shoulders, that he mightassist the Eternal One in bearing up earth's huge pillars and sustaining the arches of Heaven? Surely, such impertinence wouldbe punished with the direst doom! And yet were his sin less blasphemous than yours; you who think Christ's blood is not enoughto ransom you, and you must bring your own gold and silver and precious stones? What have I said? No, you must bring yourdross and dung to eke out the Savior's redemption. You say His Cross is not high enough, and the transverse beam not broadenough to bear you up, and lift you up to Heaven! And so you would add your puny strength to the strength of Him who is God'sequal, who is the eternal God, Himself, though He bear our sins in His own body on the tree! Oh, Soul, have done with suchpride, I pray you; for such pride must sink you lower than the lowest Hell! It was by less pride than this that Satan fell,and surely you will not escape! Christ will never let you enter Heaven while you blot, and blur, and stain, and smear theescutcheon of His Omnipotence. Be done, then, with seeking to have two objects for your trust! Besides, let me ask you now with whom it is that you would yoke the Son of God? Are you about to yoke Him to yourself? Shallthe eternal God plow with you, a puny worm, a creature of today-one who knows nothing, who is and yet is not-who is gone beforethe breath of the morning gale? What? Would you yoke Leviathan with a worm, or seek to put a gnat to the chariot with an elephant?If you did, the disparity would not so shut out every semblance of reason as to put yourself in conjunction with Jehovah'sChrist! To yoke an angel with a fly were absurd enough, but to put yourself side by side with the Lord's Anointed-that youmay do a part, and He may do the rest-oh Man, be not so mad! Let go of the absurd idea, and know that Jesus is Savior alone-Hewill have no helper, no compeer, no assistant-He will do all, or He will do nothing, for when you put another with Him, youdo dishonor and degrade Him. Is your Baptism to assist His blood? Drops of water on an infant's brow to save its soul? Ora bath in which you are immersed to help you wash away sins which no mortal's blood could purge? What? And is the eating ofbread and wine to be the means of saving a soul because Christ's own flesh and blood could not suffice to save? I love bothof these sacred ordinances, both Baptism and the Lord's Supper, but if you bring them as part-saviors and rest on them, Isay, away with them! Away with them! Away with them! An antichrist, even when made of gold, is as damnable an antichrist aswhen made of dross! And even God's own ordinances, if they are put as helpers to Christ, or if observed with a sense of merit,must be met with the cry, "Away with them! Away with them!" They cannot save, and they may destroy. "He who eats and drinksunworthily"-and he does so who trusts to them-"eats and drinks damnation to himself, not discerning the Lord's body." Theymay condemn! They cannotsave apart from Christ. "None but Jesus, none but Jesus, Can do helpless sinners good." Oh, you whose eye is not good, let me remind you of anotherthing. Do you not know, O Man, that your idea of mixing your merits, or your doings up with Christ, betrays an utter ignoranceof what you are, and of what your good works are? Your good works are stained with sin! Your best performances need to bewashed in blood! When you have prayed, you have need to ask forgiveness for your prayer! Though you should give your bodyto be burned, and spend your whole life in the service of Christ, yet at last you will have to confess you were but an unprofitableservant; you will have to be saved by Divine Grace, or not at all! It is your ignorance, Man, that makes you think you canhelp Christ, for you are naked and poor and miserable! You may chink your counterfeit merits in your hand and say, "I am richand increased in goods;" you may look upon your spangled cobweb robe, and say, as the dew drops hang on it, "I am adornedwith diamonds, and clad in needlework and fine linen." But ah, Soul, it is but a spider web, and only your ignorance makesyou think otherwise. Oh that God the Holy Spirit may enlighten you! That eye which sees anything good in the creature is ablind eye; that eye which fancies it can discern anything in man, or anything in anything he can do to win the Divine favor,is as yet stone blind to the Truth of God, and needs to be lanced and cut, and the cataract of pride removed from it! Yet, again, O Sinner, you say, "My merits and my doings will help Christ." Why, Man, is not this contrary to all precedent?Who has helped Christ as yet? When He stood in the Eternal Council with His Father, who gave Him wisdom? Who was prompterto our Divine Representative, and put words of wisdom on His lips? With whom took He counsel, and who instructed Him? DidHe not ordain the Covenant alone? And when He came to build the heavens, and arch the skies, were you with Him? When He laidthe pillars of earth, when He weighed the clouds in scales, and the hills in balances, were any there who were His counselors?Were you one of the king's Cabinet? Oh, you audacious worm! To counsel Him, and to help Him in Redemption, when you couldnot help Him in the planning of Redemption, nor in His Creation work? Who was with Him when He routed the enemies of His people,and redeemed their souls with blood? Hear Him-"I have trod the winepress alone, and of the people there was none." The bloodupon His garment is His own blood, not the blood of any of His fellow comrades! His disciples forsook Him and fled; He looked,and there was no man-He wondered that there was no man to save. His own arm brought salvation, and it is His own righteousnesswhich upheld Him! And do you think after He has fought the battle alone, that He needs you to be His ally and save you? DoesHe need your strength to back up His eternal might? Stand back, and lay your finger upon your mouth, and say, "Lord I am vile!You have finished the work which Your Father gave You to do, and I cannot interfere. You have done it! You have done it all,and I accept Your finished righteousness, Your complete redemption. I am willing to be anything, that You may be All-in-All.I take Your Grace as a free gift; I come to You naked to be clothed, helpless to be helped, dead to be made alive! I cometo Your merit without presence of any; I come, although without any fitness, without any qualification, with a hard heart,with a stubborn will, yet I come to You just as I am! Lord, do the work from beginning to end; work in me to will and to doof Your good pleasure, and then help me to work out my own salvation with fear and trembling." Sinner, with divided hope, a solemn thought I have to suggest to you on the terribleness of your delusion. Remember, if youtrust in any measure to your works, you are under the Law, and as many as are under the Law are under the curse! Oh, whatmultitudes of professed Christians might be thundered at by that text! It is true they would not say that they hoped to besaved by legal works; but then they hope to be saved by certain works which they regard as being the works of the Christiandispensation! Now, remember, we speak not of three Covenants, but only two! One is the Covenant of Works. If any man is tobe saved by that, he must keep the Covenant and never break it; but inasmuch as every man has already broken it, whoever isunder that Covenant is accursed. He is accursed by the Law of God! The Ten great Commandments utter ten solemn curses uponhim! The other Covenant is a Covenant of Grace. There is no covenant half of works, and half of Grace. The Covenant of Graceis a Covenant of free gift, in which Christ gives to all those who willingly receive, but asks nothing of them. Albeit, afterwardsHe works in them all, that His Spirit loves and makes them to serve Him out of gratitude; not that they may be saved, butbecause they are saved; not to win salvation, but because they have obtained it, and wish to let that salvation manifest anddevelop itself in all their daily acts. Many professing Christians, I believe, imagine that there is a remedial covenant,a sort of sincere obedience covenant, in which if a man does as much as he can, he will be saved by that. Oh, Sinner, Godwill never take a composition of you! There is no court of heavenly bankruptcy where so much in the pound may be accepted,and the debtor then discharged! It is all or none! If you come to pay, it must be to the uttermost farthing. Agree with yourAdversary quickly, therefore, and take the receipt of your debt freely from His loving hands-for if not, and you attempt topay, you shall never be let out of prison until all is paid-and that will never be, though you swelter in the pains of Hellforever and ever! I know that people labor under the idea that going to Church and Chapel, taking the Sacrament, and doing certain good deedsthat pertain to a respectable profession of religion, are the way to Heaven. It is the way to Hell, believe me! Although itis strewn with clean gravel, and there are grassy paths on either side, it is not the road to Heaven for all that. You knowhow I have insisted in reading the Chapter this morning, upon the certainty of good works. I have told you that it is onlyby this, that you can be known, and that you are not Christians unless you produce good works. But at the same time, Beloved,if you rest on anything butChrist, or on anything with Christ-if you try to prop up His Grace-if you try to add to the perfectrobe of His righteousness-you are under the Law, and you are under the curse! And you shall find that curse in the daily tremblingof your conscience, and meet with it in its fullness at the awful Day of God, when the Lord shall curse every soul who isunder it! But one more remark, and I will leave this point of the singleness of the eye of faith. If you can be saved by two things,then the glory will be divided! A quaint minister once said if sinners went to Heaven of their own works, and their own will,they would throw up their caps and say, "glory be unto myself-men would take the honor and certainly the praise, if they contributedany part to their own salvation! The song would not be, "Unto Him who loved us," but, "unto Him and myself," or, "with myworks and my merits." Do you think, Sirs, that Christ died to win divided homage, and share a divided throne? Did He comefrom Heaven's highest glories, and stoop to the Cross of deepest woe, that His name might be sung in conjunction with yourpoorname? Oh, no! God forbid that we should indulge in so profane a thought! He must be ALL! He must have all the crown, and everyjewel in it shall be His own. "Not unto us, not unto us, but unto Your name be all the honor, and glory, and majesty, foreverand ever." Every syllable of every song; every shout of every angel; every cry of every redeemed one must bear the same sacredburden and must rise up to the same Divine Throne! And we ought, we must, go bow and ascribe to Him, and Him, only, "Glory,honor, and majesty, and power, and dominion, and might, forever and ever. Amen." Bear with this word of exhortation-poor Sinners,trust Jesus Christ now! Just as you are, come to Him now! Bring nothing with you, come empty handed! Robe not yourself, comenaked! Wash not yourself, come filthy! Seek not to soften your heart, come with it, hard as it is. Try not to get a littlecomfort-come despairingly. You can come no way else; but come now to His Cross! He was naked when He bought you, and you mustbe naked when He wins you; He was in shame when He served for you, and you must be ashamed when He shows His love to you.He drank the wormwood when He redeemed you, and if the wormwood of despair is in your mouth, yet come to Him now, and sayto Him now, "Heal my backslidings, receive me graciously, and love me freely." And when you have said it, "venture on Him,venture wholly." Throw your arms about His Cross, and be this the spirit of your faith-"sink or swim, here I must abide. Iknow I perish if I withdraw; I cannot perish here. Jesus, let Your pitying eyes look down on me! I do believe, I will believethat You have power to save even me! I trust You with my all forever." If you can say that, Sinner, then you are saved, your sins are forgiven you-go in peace! Take up your bed and walk, you palsiedone! "In the name of Jesus of Nazareth, I bid you stretch out your hand, you with the withered arm." Awake, arise and live!He who believes is justified from all things. Your sins are gone; your soul is accepted. You are saved this morning, and youshall see His face and sing His love in Glory everlasting! II. Now I come to my second point. It is a fact, that to obey and to believe is in the sacred language very much the same, so that truly to believe Christ isto give security for a willing obedience. As soon as ever we believe Him, we obey Him. In fact, Christ does not promise tosave us if we disobey His laws. But His promise is this-if we trust Him, He will save us. But then He has His way of savingus, and He will only save us in His own way! And if we really trust Him, we shall yield to His ways, and be willing to beobedient to His commands. The eye of obedience, however, sometimes in the Christian is not good-I mean in the profssedChristian!That word has been so dishonored that I often use it without meaning the true child of God. And sad that I should be compelledtoo often to apply the term, "Christian," to those who are not of Christ, and who have never learned His love nor have knownHis name. There are many professors whose eye of obedience is not single. They live in this world, they say, "for Christ,"but really no one can believe them. If you can judge them by their fruits, they seem to live for almost any other objectivethan Christ! At any rate, if they do give Jesus their allegiance, they seem to give Him but half their heart, and serve Himwith a love that is neither cold nor hot, but lukewarm. Sometimes they are zealous for Jesus, and at other times just as eagerafter the things of this world. No, I must confess that even true Christians do not always keep the eye good-the speck getsinto it, if not the beam. And there are times when even God's minister has to bow his knee, and with bitter weeping, to confessthat he cannot keep his motives always good. I have often to mourn over this myself. I can say from my inmost heart that Ilove my Master's cause, but I have to ask myself this, "Do not you love to see your Master's cause prosper by you, more thanby another?" Oh that wicked thought, that ever it should cross our hearts! And yet, what minister of Christ is there who hasnot to confess it, if he but examine himself? I do feel that when we are in our right state, we would as soon souls were savedby anybody else, as ourselves, and that God should bless another as us; for it can make no difference to us, if we reallylove the Master-who it is by whom He honors Himself! Our honor, our standing, ought to be less than nothing-yet it will creepup. One serves Christ at times very earnestly, but then gets the fly into the sweet pot of ointment-the wishing to serve Christthat self may share in the pleasure of doing good! We must be content to do good, and have no self-gratification to indulge-contentto serve Christ and know no reward-content to serve our generation, though our names should be cast out. We must be content,though we should only hope to hear the, "Well done," when we shall be in our Master's Presence. Well, now, let me say a few things about having a good eye. Professors, I speak to you at large, whether you are Christiansor not. Get rid of that evil eye which looks asquint and crossways-looking one way at the world, and the other way at theCross-not straight forward at any object, but is turned here, and there, and everywhere! Remember, this is the worldling'seye; the worldling thinks he can serve God and Mammon, and will you think the same, you professed follower of Christ? Willyou try to serve two masters who are at deadly enmity to one another? I tell you, Man, when God will say to you, "Take nothought for the morrow, be careful for nothing"-Mammon will say to you, "Look ahead, be careful about everything." And whenGod says to you, "Give of your substance to the poor;" Mammon will say, "Hold it tight, it is that giving that spoils everything."And when God will say unto you, "Set not your affections on the things of earth;" Mammon will say, "Get money, get money,get it any way you can!" And when God says, "Be upright," Mammon will say, "Cheat your own father if you can win by it!" Mammonand God are at such extreme ends of the earth, and so desperately opposed, that I trust, Christian, you are not such a fool,such an arrant fool as to attempt to serve them both! If you do you have the worldling's eye, and you are a worldling yourself,remember, too, if you try to do this, we may suspect you of having the hypocrite's eye! As Matthew Henry says, "The hypocriteis like the waterman. He pulls this way, but he looks that. He pretends to look to Heaven, but he pulls towards his own interest.He says he looks to Christ, but he is always pulling towards his own private advantage. The true Christian, however, is likea traveler; he looks to the goal, and then he walks right straight on to it; he goes the way he is looking." Be not like thehypocrite, who has this double eye, looking one way and going the other. An old Puritan said, "A hypocrite is like the hawk-thehawk flies upward, but he always keeps his eyes down on the prey. Let him get up as high as he will, he is always lookingon the ground. Whereas, the Christian is like the lark, he turns his eyes up to Heaven, and as he mounts and sings, he looksupward and he mounts upward." Be one of God's own larks; be an honest lark, looking and going in the same direction with asingle purpose, for your double purpose will make the world suspect you of hypocrisy! Yet further-remember, Christian, unless you have a good eye, your usefulness will be entirely ruined. This has been the spiritualdeath of many a man, who bade fair to do good in the world, but who did not live with one objective. I have known ministerspreach a sermon in which they wished to profit all, but they wished to please the deacon in the green pew, too, and the sermonfell dead to the ground. We have known men too anxious to win sinners, but at the same time they were equally anxious thatthey should be thought well of in their oratory, so that they should not say a course rough word, for fear of degrading theirstanding among the eloquent of the age. It is all over with the usefulness of such! A Christian minister, above every man,must have no objective in life but to glorify his God, and whether it is fair weather or foul weather, it should be nothingto him. He should be a man who looks for fights, and expects storms-and in proportion to his faithfulness, he will be sureto meet with both. He must be one who girds up his loins, and makes ready for the battle. Let him understand it is to be battle-andmake no preparation for the flesh. And, Christian, if you would do good in this world, you must live for that simple objective,and not live for anything else. If you run after two objectives, you will not come upon either, or rather, the world willget the mastery over you! When Christians have two aims, they are like two rivers which flow near the city of Geneva, theArve and the Rhone. The Rhone comes flowing along, a beautiful blue-a blue which painters give to Italian skies and to therivers of Switzerland. It is no exaggeration that they are as blue as they are painted! The Arve comes down from the glacier,a chalky, dirty white. I stood sometime ago at the place where these two rivers join. It was not long before the Arve hadquenched the Rhone; all that beautiful blue had fled away, and nothing but white was seen! "Evil communications corrupt goodmanners." If your life is made up of two streams, worldliness running in like the Arve, and you hope to have spiritualityrunning in like the blue Rhone, you will soon be mistaken! Your spirituality, if their is such a thing, will become a stalkinghorse to your worldliness; your religion will be swallowed up, for you cannot serve two masters-you cannot serve either ofthem well, and you cannot serve Christ at all-if you are divided in your aims. And then, further than this, Christian, do you not know that if you have divided aims, you will be an object of contempt tothe world? The world comes to despise the Church at this very period because she perceives that the Church is not chaste toher husband, Christ. Ah, I love not to say what I am going to say, but really, when I have looked on some professing Christians,a thought I do not like to indulge has crossed my mind! I have seen them so worldly, so sharp in their business, so mingledwith the world, that you could not tell which was worldling and which was Christian! And I have thought, did Christ shed Hisblood to make such a thing as this? Is the only thing that Christ's Redemption can produce, a thing no better than Naturecan bring forth? I have seen worldly men better than such Christians, in many virtues excelling them. And I have thought,"What? Is it worth while making all this noise about a Redemption that does not redeem these men any more than this, but leavesthem slaves to the world?" And I have looked at them, and the tears have been in my eyes as I have thought, "Is this the HolySpirit's work? Was there any Holy Spirit necessary here at all? Would they not be as good men without the Holy Spirit, asthey seem to be with Him? Is this the best thing Heaven can produce? Has Heaven been in labor and brought forth this mouse?Is this all the Gospel has to give?" Now, judge you, whether I am not warranted in such thoughts; and if they cross my mind,think how often such thoughts must flit across the mind of the worldling! "Oh," says he, "this is your religion, is it? Well,it is not such a mighty thing, after all. I bought such goods at such a shop, and I was fairly taken in. This is your Christianity,is it?" "I worked for such a master," says another, "he is a deacon, he is a skinflint, too. This is your Christianity!" "Ah,"says a laborer, "I am employed by So-and-So, and he is just as proud and domineering in his behavior to his workmen as ifhe were a Pharaoh, and not a follower of Christ. This is your Christianity, is it?" Indeed, the worldling has good groundsfor saying something like it! How has the fine gold become dim! How has the glory departed! The precious sons of Zion, comparableto fine gold-how have they become as earthen pitchers-the work of the hands of the potter! Oh Zion! Your Nazarites were purerthan snow; they were whiter than milk; but their face is become black as coal, and their skin is tarnished with mire! Yoursons lie in the corners of the street like a wild bull in the net; your strong men faint, and your valiant ones fail, becauseyour glory is departed from you! Would to God we were all Christians who profess to be Christians, and that we lived up to what we profess. Then would theChristian shine forth "clear as the sun, fair as the moon," and what besides-why, "amazing as an army with banners"! A consistentChurch is an amazing Church-an honest, upright Church would shake the world! The tramp of godly men is the tramp of heroes;these are the thundering legions that sweep everything before them. The men that are what they profess to be, hate the semblanceof a lie-whatever shape it wears-and would sooner die than do that which is dishonest, or that which would be degrading tothe glory of a Heaven-born race, and to the honor of Him by whose name they have been called! O Christians! You will be theworld's contempt; you will be their despising, and hissing unless you live for one objective! I know the world will pat youon the back, and flatter you, but it will despise you all the while. When I am abused, I know what it means. I look at itin the right spirit and say, "Be it so. It is the highest compliment the world can pay me!" If I am serving my God, I mustnot expect to be honored of men; but if I am not serving my God, I know I shall be despised of men! So will it be with you.Get a single solitary thought in your mind, and that thought the precious love of Jesus-and go and live it out, and come whatmay-you will be respected though abused! They may say you are an enthusiast, a fanatic, a fool, but those names from the worldare titles of praise and glory! The world does not take the trouble to nickname a man unless he is worth it. It will not giveyou any censure unless it trembles at you! The moment they begin to turn at bay, it is because they feel they have a man todo with. So it will be with you. Be men, each one of you; stand up for Christ, and the Word of God you believe, and the worldwill respect you. I met with a coachman some time ago, who said to me, "Do you know the Rev. Mr. So-and-So?" "Yes, I do knowhim very well," "Well," he said, "he's the sort of man I like. He's a minister, and I like him very much. I like his religion.""What sort of a religion is it?" I asked, for I was anxious to know what sort of a religion it was he could like. "Why," hesaid, "you see this box seat? Well, he has ridden on this box seat every day for this six months, and he's the kind of manI like, for he has never said anything about religion all the while!" That is the sort of Christian the world likes, and thatis the sort they despise! They say, "Ah, we will not speak against him, he is one of our own." And if he were to come outone day, and speak about religion, what would they say? "He does not mean it, let him alone! He was silent as a man, and whenhe speaks, he speaks in his official capacity." There is no respect for that man, for it is not the man in the office, butit is the office that overpowers the man for the time being! Let it not be so with you. Tread the world under your feet, andserve God with all your heart, for you may never expect to have peace in your conscience until you have turned all the idolsout of your soul! Live for Christ alone, for where your consecration ends, there your peace ends, too! Christian, you cannever hope to stand accepted before God, while you only serve Him with half your heart; you can never hope to enter triumphantlyinto Heaven when you have only used part of your manhood in the service of your Redeemer. "All your goods and all your hours, All your time and all your powers, All you have and all you are," and you will be a happy, blessed, honored, useful man! Divide your allegiance, and you shall be a hissing reproach to sinners;you shall be a pain to yourself, you shall be a dishonor here, and you shall be held up to shame and everlasting contemptwhen Christ shall appear in the Glory of His Father, and all His holy angels with Him. Charge, Christians, in the name ofChrist, charge against the embattled marks of sin! But do it with one heart; break not your rank; hold not out the flag oftruce to the world with one hand, and draw the sword with the other. Throw away the scabbard. Be the sworn enemies, forever,of everything that is selfish and sinful. And trusting in the precious blood of Christ, and wearing the Cross in your hearts,go forward conquering, and to conquer, making mention of your Master's name, preaching His Word and triumphing in His Gracealone! God grant, if we must have two eyes, that they may be both clear ones, one the eye of faith wholly fixed on Christ, the otherthe eye of obedience equally and wholly fixed on the same objective!
2019-04-20T19:13:13Z
https://liveprayer.com/spurgeon-sermons-reference.cfm?s=187016
2010-05-20 Assigned to THE RAYMOND CORPORATION reassignment THE RAYMOND CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Baldini, Augustus, KIRK, JOHN BRYANT, MCCABE, PAUL P. Deterioration of a cable, that connects a battery to an industrial vehicle, is detected by an electronic controller. An electrical parameter, such as voltage, is measured proximate to a connection of the cable to the battery, thereby producing a first measurement. The same electrical parameter also is measured proximate to a connection of the cable to the industrial vehicle, thereby producing a second measurement. The first and second measurements are received at the electronic controller which uses those measurements to produce an indication of deterioration of the cable. The present invention relates to battery powered industrial vehicles, such as lift trucks; and more particularly to monitoring the performance of the battery. Electric lift trucks employ large lead-acid batteries to power their traction and lift drives. Many lift trucks are operated almost continuously throughout three work shifts a day. When the battery becomes discharged, it is replaced and the truck is immediately put back into service. The battery that was removed is then recharged off the truck and prepared for use on another truck. In a warehouse serviced by many such trucks, batteries continuously cycle through stages including: recharging (typically 7 to 8 hours); cool down period (typically another 7 to 8 hours); and use (typically 7 to 8 hours). Therefore a typical warehouse many have 2 or 3 times the number of batteries as the number of industrial vehicles. Because is takes some time to replace these relatively large batteries, during which time the truck is out of service, an objective in this industry is to operate the truck as long as possible on a battery charge. To do this, however, one must accurately know the state-of-charge or present capacity of the battery. It also is desirable to know when a particular battery is approaching the end of its useful life at which time it may no longer be recharged to a level sufficient for a reasonably long working period. Nevertheless it is undesirable from an economic perspective to take a battery out of service before absolutely necessary. In order to determine when a particular battery is approaching the end of its useful life operational data has to be gathered over days or weeks to be able to detect a performance degradation trend. In addition, a need exists to be able to detect several operating conditions that indicate a need to perform maintenance or repairs on a battery. For example, repeated disconnection and connection of the battery to a truck and recharging equipment cause wear of the battery cable. That wear often results in power losses in the cable and thus inefficient battery use. Electric current leakage also can occur between the battery and the frame of the lift truck which may be disadvantageous. Therefore, a need exists for a system and method that monitors performance of each battery for a fleet of lift trucks. A business has a fleet of industrial vehicles each powered by a rechargeable battery. When recharging is required, the battery is removed from a vehicle and replaced by another fully charged battery. A method is provided for detecting deterioration of a cable that connects a battery to an industrial vehicle, wherein one of the industrial vehicle and the battery includes an electronic controller. An electrical parameter is measured proximate to a first connection of the cable to the battery, thereby producing a first measurement. The same electrical parameter also is measured proximate to a second connection of the cable to the industrial vehicle, thereby producing a second measurement. For example, the electrical parameter may be voltage between two conductors in the cable. The first and second measurements are received at the electronic controller. In response to those measurements, the electronic controller produces an indication of deterioration of the cable. For example, the indication of deterioration of the cable is produced by deriving a voltage drop between opposites ends of the cable. An alert is issued when voltage drop exceeds a predefined threshold. In another aspect of the present method, the electric current flowing through the cable also is measured to produce an electric current measurement. The indication of deterioration of the cable is produced in response to employing the voltage measurements and the electric current measurement to derive a resistance of the cable. In yet another version, the indication of deterioration of the cable is produced in response to employing the voltage measurements and the electric current measurement to determine an amount of power lost in the cable. FIG. 10 is a flowchart of a method for restricting operation of the industrial vehicle when an installed battery has insufficient weight to properly counterbalance a load being carried. The present invention relates to the operation of an industrial vehicle. Although the invention is being described in the context of a stand-up, counterbalanced lift truck used at a warehouse, the inventive concepts are applicable to other types of industrial vehicles, and their use in a variety of facilities, such as a factories, freight transfer stations, warehouses, and stores, for example. With initial reference to FIG. 1, an industrial vehicle 10, specifically a lift truck, includes an operator compartment 11 with an opening for entry and exit by the operator. Associated with the operator compartment 11 are a control handle 14, a floor switch 12, and steering wheel 16 that collectively serve as operator controls 17. The industrial vehicle 10 has a load carrier 18, such as a pair of forks, that is raised and lowered on a mast 19. As will be described in further detail, a communication system on the industrial vehicle is able to exchange data and commands via an antenna 15 and a wireless signal with an external warehousing system. FIG. 2 is a block diagram of a control system 20 for a typical industrial vehicle 10 that incorporates battery monitoring equipment. The control system 20 comprises a vehicle controller 21 which is a microcomputer based device that includes memory 24, analog to digital converters, and input/output circuits. The input/output circuits receive operator input signals from the operator controls 17 to activate and govern operation of the vehicle functions such as forward and backward travel, steering, braking, and raising and lowering the load carrier 18. In response to the input control signals, the input/output circuits send command signals to each of a lift motor control 23 and a propulsion drive system 25 comprising a traction motor control 27 and a steer motor control 29. The propulsion drive system 25 provides a motive force for moving the industrial vehicle 10 in a selected direction, while the lift motor control 23 drives load carrier 18 along a mast 19 to raise or lower a load 35, such goods being warehoused. The industrial vehicle 10 is powered by a multiple cell battery 37 that is electrically coupled to the vehicle by a cable 38 that has two conductors. A connector at a first end of the cable 38 is attached to the battery terminals and another connector 36 at the opposite, second end of the cable is connected to a mating connector 34 on the industrial vehicle. The battery 37 furnishes electrical power to the vehicle controller 21, propulsion drive system 25, steer motor control 29, and lift motor control 23 through a bank of fuses or circuit breakers in a power distributor 39. The traction motor control 27 drives one or more traction motors 43 which is connected to a propulsion wheel to provide motive force to the industrial vehicle. The speed and rotational direction of the traction motor 43 and the associated propulsion wheel are designated by the operator via the operator control handle 14, and are monitored and controlled through feedback derived from a rotation sensor 44. The rotation sensor 44 can be an encoder coupled to the traction motor 43 and the signal therefrom is used to measure the speed and distance that the vehicle travels. The propulsion wheel is also connected to friction brake 22 through the traction motor 43, to provide both a service and parking brake functions for the industrial vehicle 10. The steer motor control 29 is connected to drive a steer motor 47 and associated steerable wheel 49 in a direction selected by the operator by rotating the steering wheel 16, described above. The direction of rotation of the steerable wheel 49 determines the direction that the industrial vehicle 10 travels. The lift motor control 23 sends command signals to control a lift motor 51 which is connected to a hydraulic circuit 53 that forms a lift assembly for raising and lowering the load carrier 18 along the mast 19. In some applications, the mast 19 can be a telescoping mast, in which case the hydraulic circuit also raises and lowers the mast. As shown here, a height sensor 59 provides a signal to the vehicle controller 21 indicating the height of the load carrier on the mast 19. Similarly, a weight sensor 57 is provided on the load carrier 18. A load sensor 58, such as a radio frequency identification (RFID) tag reader, is mounted on the mast to obtain an identification of the goods being transported. In addition to providing control signals to the drive and lift control systems, the vehicle controller 21 furnishes data to an operator display 55 that presents information to the vehicle operator. In addition, the display indicates vehicle operating parameters, such as for example, the speed of travel, battery charge level, hours of operation, time of day, and maintenance needed to be performed. Although not shown here, temperature sensors can also be included to monitor the temperature of the motors and other components. Alert annunciations are presented on the operator display 55 to alert the operator of vehicle conditions requiring attention. Referring still to FIG. 2, a number of data input and output devices can also be connected to the vehicle controller 21, including, for example, a vehicle power sensor 60 that measure the voltage and electric current received at the industrial vehicle from the battery 37. As will be elaborated upon hereinafter, a battery sensor module (BSM) communication interface 62 exchanges data with a battery sensor module 64 that is mounted on the battery 37. Each battery 37 for the fleet of industrial vehicles has a battery sensor module 64 mounted thereon to gather and store data regarding that particular battery. The industrial vehicle 10 also has a communication port 69, and a maintenance service port 65 by which the vehicle controller 21 communicates with external devices. The communication port 69 is connected to a wireless communication device 66 that includes a transceiver 68 connected to the antenna 15 for exchanging data and commands with a communication system in the warehouse or factory in which the industrial vehicle 10 operates. Any one of several communication protocols such as Wi-Fi, can be used to exchange messages and data via that communication link. Each industrial vehicle 10 has a unique identifier, such as its manufacturer's serial number or a communication network address, that enables messages to be specifically communicated to that vehicle. The vehicle controller 21 stores data regarding the operation of the industrial vehicle 10. That data can include number of hours in operation, battery state of charge, and fault codes encountered. In addition, load lifting operations are monitored using the time that the lift motor 51 is active. Various speed parameters, such as speed and acceleration of the vehicle and of the mast 19, can also be monitored. The vehicle operational data are collected and stored in a memory 24 in the vehicle controller 21. Referring now to FIG. 3, a warehouse 100, in which one or more industrial vehicles 10 operate, includes a communication system 102 that links the vehicles to a warehouse computer 104. The communication system 102 includes a plurality of wireless access points 106 distributed throughout the warehouse 100, such as in the shipping dock and goods storage areas. The wireless access points 106 are wireless transceivers that are connected via a conventional local area network 105 or a TCP/IP communications link to the warehouse computer 104. Alternatively the wireless access points 106 can be wirelessly coupled, such as through a Wi-Fi link, to the warehouse computer 104. The warehouse 100 has one or more battery charging stations 101 where the batteries 37 are removed from the industrial vehicles and recharged by equipment 103. The charging equipment 103 also is connected to the local area network 105 for exchanging data with the warehouse computer 104. The warehouse computer 104 is connected to the Internet 108. The warehouse computer 104 communicates with a management computer system 114 at the headquarters of the warehouse company via the Internet 108. That connection enables the management computer system 114 to receive data regarding the operation of the fleet of industrial vehicle at all the warehouses in the company. Both warehouse computer 104 and the warehouse management computer system 114 execute software for storing, analyzing and reporting the operating information for the industrial vehicles. The connection of the warehouse computer 104 to the Internet 108, or other external communication network, enables the warehouse computer to access a database 110 that stores vehicle specific data provided by the manufacturer from a manufacturer computer 112. The data gathered from the industrial vehicles at the warehouses also is uploaded and stored in the database 110. Selected data can also be accessed by, for example, warehouse management personnel or vehicle dealers, who can connect to the database 110 through the Internet 108. The various computers can analyze and compare the data gathered from all the industrial vehicles at a given warehouse, at all facilities of the warehouse company, or all the vehicles made by the manufacturer. As shown in FIG. 2, every battery 37 for use on an industrial vehicle has a battery sensor module 64 mounted thereto. The battery sensor module 64 may be built into the battery so as to be permanently integrated therewith. Alternatively, the battery sensor module 64 may be removable, in which case it remains attached to a particular battery as long as that battery remains in service at the warehouse 100. The battery sensor module 64 gathers operational data while the battery is powering any one of the industrial vehicles 10 and while the battery is being recharged at the charging station 101. With reference to FIG. 4, the battery sensor module (BSM) 64 comprises a microcomputer 150 that includes a digital processor input/output circuits and analog to digital converters. The microcomputer 150 is connected to a memory 152 that stores a software program which is executed by the microcomputer to govern the operation of the battery sensor module 64. In addition, data which is used or produced by that program are stored with the memory 152, as will be described. A memory 152 contains a table with manufacturer specification data related to the battery 37 as depicted in FIG. 5. That specification data table 160 contains a first field 161 in which a unique serial number is stored which identifies and distinguishes that associated battery 37 from all the other batteries in the warehouse 100. A second field 162 stores a value denoting the battery's nominal voltage. The data in a third field 163 indicates the rated capacity of the battery as specified by its manufacturer. Battery capacity is a measure of the charge stored by the battery and represents the maximum amount of energy that can be extracted from the battery under certain stated conditions. The actual energy storage capability of a battery, however, can vary significantly from the rated capacity, because the actual battery capacity depends strongly on the age and past history of the battery, e.g., the charging or discharging regimes and the temperature to which the battery has been exposed. Battery capacity is commonly denoted in terms of ampere hours (Ah) or kilowatt-hours (kWh). Ampere hours is defined as the number of hours for which a battery can provide an electric current equal to the discharge rate at the nominal voltage of the battery. For example, a 400 Ah battery can deliver 40 amperes of current for 10 hours or 20 amperes of current for 20 hours. The kilowatt-hour capacity is approximated by multiplying the ampere hour capacity by the nominal battery voltage. Thus a 24 volt, 400 Ah battery has a 9.6 kWh capacity. Depending upon the particular industrial vehicle, the battery can have a nominal voltage of 24, 36 or 48 volts and typical capacities of 4-32 kWh for a 24 volt battery, 16 to 54 kWh for a 36 volt battery, and 22 to 43 kWh for a 48 volt battery. The data in a fourth field 164 indicates the battery's weight. A fifth field 165 stores an identification of the chemistry type of the battery and the sixth field 166 stores the date on which the battery was manufactured. Alternatively the sixth field 166 could contain an indication of the date on which the battery was first put into service in the warehouse 100. A seventh field 167 is provided to store a count of the number of times that the battery has been recharged, referred to as the charging cycle count. This count is incremented by the microcomputer 150 in battery sensor module 64 each time the battery is recharged. Returning to FIG. 4, the battery sensor module 64 has several sensors located on the battery 37. A voltage and current sensor 154 measures the voltage and electric current at the terminals 156 of the battery to which a first end of the battery cable 38 connects. The voltage and current sensor 154 detects a level of electric current flowing in either direction at those terminals and thus the current used to power an industrial vehicle as well as the current that recharges the battery. Alternatively, the voltage may be detected in each of the individual cells of the battery 37. A temperature sensor 158 detects the temperature of the battery 37 and a fluid level sensor 159 detects the battery's electrolyte level. Periodically, the microcomputer 150 in the BSM reads the signals produced by the battery sensors 154, 158 and 159 and stores the measurement data in other data tables within memory 152. Specifically, FIG. 6 depicts a temperature table 170 in the BSM memory 152 that stores a plurality of measurements from (T1) through (Tn). Similarly, FIGS. 7 and 8 represent data tables 172 and 174 for the output voltage (V) and output current (I), respectively. Another data table 176, depicted in FIG. 9, stores data indicating the condition of the battery at different points in time, such as each time that recharging occurs. As will be described, this data designate by the symbol X may be any of several parameters, such as battery capacity, state of charge or battery resistance, for example. The BSM 64 has a power line communication circuit 153 that enables the microcomputer 150 to exchange messages bidirectionally with the vehicle controller 21, when the battery 37 is attached to the industrial vehicle. At other times, when the battery is at the charging station 101, the power line communication circuit 153 communicates with the controller of the charging equipment 103. The power line communication circuit 153 is a well known device for sending digital communication signals over a power line, in this instance the battery cable 38. When the microcomputer 150 has data to send to the industrial vehicle 10 or to the charging equipment 103, that data modulates an oscillating carrier signal produced in the power line communication circuit 153. The modulated carrier signal then is sent through the battery cable 38. In another technique, the digital data are transmitted serially as pulses of a high frequency signal. The serial number of the battery is transmitted along with the data in order for the recipient device to identify which battery is associated with the data. With reference to FIG. 2, the control system 20 for the industrial vehicle 10 has a BSM communication interface 62 electrically attached to a connector 34 that mates with the connector 36 of the battery cable 38. The BSM communication interface 62 receives the information sent through the battery cable 38 by power line communication circuit 153. The BSM communication interface 62 also is able to transmit data and operating commands through the battery cable 38 to the power line communication circuit 153 in the BSM 64 using the same power line communication protocol. Periodically or when specifically queried, the battery sensor module 64 sends the acquired battery data and its serial number to the BSM communication interface 62 on the industrial vehicle 10. That battery information is forwarded via the communication port 69 to wireless communication device 66 and then onward through the local area network 105 to the warehouse computer 104. In this manner, the warehouse computer stores the performance for all the batteries 37 that are available for use on the industrial vehicles 10 at that facility. The warehouse computer 104 also can forward the battery data to the database 110 and other computer systems, such as computers 112 and 114 for example. When the battery 37 is connected to the charging equipment 103 in the warehouse 100 as shown in FIG. 3, a similar BSM communication interface 62 within that equipment enables bidirectional communication with each battery sensor module 64 using that same power line communication protocol. This enables the charging equipment 103 to monitor the parameters, such as temperature, electrolyte fluid level and battery current and voltage, that are measured by the sensors in the BSM 64. The charging equipment 103 also is able to send the acquired battery data to the warehouse computer 104. The electrical parameters of the battery 37 that are measured by the BSM 64 and by the battery charging equipment 103 are used to calculate the battery capacity, state of charge and internal resistance, which provide an indication of the present condition of the associated battery. When a battery ages or is not maintained properly, the lead plates become “sulfated.” Deposits of lead sulfate form on the plates which effectively reduces the active area of each plate. This action reduces battery capacity and increases internal resistance. The calculation of one or more of the actual battery capacity, state of charge or battery resistance is performed by at least one of the microcomputer 150 within the BSM, the vehicle controller 21, a controller within the battery charging equipment 103, or the central warehouse computer 104. The capacity of a battery is defined as the electric current load divided by the charge or discharge rate. Any of several well known techniques can be employed to derive the present, or actual, capacity of a given battery. That calculation is performed by the battery sensor module 64, each time the associated battery is recharged, and the calculated value then is stored in data table 176 in the BSM memory 152. The present battery capacity derived at the end of recharging may be used as a direct indication of battery aging or can be compared to the battery capacity rating stored in field 163 within the BSM memory 152 to determine the degree of aging. The battery capacity rating represents the capacity of the battery when newly manufactured. A significant decrease (e.g. 20%) in the actual battery capacity from the specified rating indicates that the battery has reached the end of its useful and thus when the battery should be taken out of service. Alternatively the present condition of the battery 37 can be indicated by the state of charge at the end of recharging or the present internal resistance. These parameters can be determined utilizing any one of several well-know techniques, such as the one described in U.S. Pat. No. 6,556,020, the description of which is incorporated herein by reference. Thus each time a particular battery is recharged one or both of these parameters is calculated by the battery sensor module 64 and then stored in data table 176 in the BSM memory 152. Thus any one of several parameters can be employed to indicate the present condition of a battery and the degree of deterioration of the operational ability of the battery. The present battery condition, such as the actual battery capacity upon recharging, also is employed to determine with which of the plurality of industrial vehicles 10 within a warehouse a particular battery 37 can be used. In a typical warehouse, certain industrial vehicles are assigned to more strenuous tasks or are used for a greater amount of time during each work shift than other industrial vehicles at that facility. For example, an industrial vehicle 10 at a loading dock may be used almost continuously to load and unload delivery trucks. In contrast, another industrial vehicle may be assigned to a warehouse location in which it is only occasionally used to transport items. Thus, this latter vehicle is used a lesser amount of time during each work shift and does not require a battery that has as great an actual capacity as the battery for a vehicle at the loading dock. Certain industrial vehicles 10 perform more strenuous load handling tasks and thus require a battery with a greater capacity. For example, certain vehicles may be assigned the task of placing goods onto to warehouse shelves which involves lifting heavy loads. In contrast other industrial vehicles may only work at transferring goods from the shelves to the loading dock wherein lowering the goods takes advantage of gravity and is less strenuous that raising the goods onto the shelves. The environment in which an industrial vehicle is used also affects the performance demands placed on its battery and thus whether a lesser capacity battery can be used. For example, an industrial vehicle that works in an extremely cold environment, such as within a freezer area of a warehouse, requires a battery with more actual capacity than a vehicle that is utilized in warmer areas. As a consequence, a battery that is aging and can no longer be charged to its full rated capacity may not be satisfactory for use in certain industrial vehicles, but will still provide adequate service in vehicles used less strenuously. Even though a particular battery has aged to the point where it can no longer be charged to its full rated capacity, that battery still can be used in certain industrial vehicles and thereby prolonging the useful life of that battery before it has to be taken out of service completely. To prolong the usefulness of each battery, every industrial vehicle 10 within the warehouse is assigned one of several work ratings indicating the relative intensity of its use during each work shift and the relative performance demands that are placed on its battery. Industrial vehicles with a more intense work rating will receive batteries that have been charged to substantially their full capacity rating. In contrast, industrial vehicles with less intensity work ratings typically receive batteries that are charged only to a fraction of their full capacity rating. Thus, upon being recharged, the present, or actual condition of the battery is determined, either in terms of the actual capacity or internal resistance, for example, as noted previously, and that present condition is used to categorize the battery for use with industrial vehicles particular work ratings. As an example, batteries that presently can be charged between 90% and 100% of their capacity rating are assigned for use in industrial vehicles with the highest intensity rating, whereas batteries with a present charge less that 90% of their capacity rating are assigned for use in industrial vehicles with a lower intensity rating. More that two levels of vehicle intensity ratings and more than two battery capacity categories can be employed. The association between various capacity batteries and the appropriate industrial vehicles can be accomplished by a color coding scheme, for example, in which the work intensity level of each industrial vehicle is indicated by a colored label and the appropriate batteries for that vehicle based on their present actual capacity are indicated by a similar colored label. Obviously, a battery with a colored label indicating a greater capacity than is required by a particular industrial vehicle can be utilized on that vehicle. In addition, the present battery condition can be calculated by the battery sensor module 64 or the vehicle controller 21 periodically during use on an industrial vehicle. When that condition falls below predefined threshold, the vehicle operator is notified that the battery capacity is diminishing to a point where recharging soon will be required. At such times, the operation of the industrial vehicle may be restricted to prolong the operational period so that recharging will not have to occur until the end of a work shift. Because some time is required to replace these very heavy batteries, such reduction in vehicle performance minimizes the down time and prolongs the useful work time. The difference between the battery capacity rating for a new battery and the actual battery capacity also is employed to estimate when a particular battery will have to be taken out of service. This capability allows supervisory personnel at a warehouse to order replacement batteries before they are actually needed. With reference again to FIG. 1, the weight of the battery 37 in a lift type industrial vehicle 10 is important to providing ballast to counterbalance the weight of the load 35 that is being transported on the load carrier 18. Such ballast gives the vehicle stability especially when the load is raised high on the mast 19. The manufacturer specification for a particular industrial vehicle includes a minimum battery weight that is required for proper counterbalance. Although physically possible, it is improper to install a battery that is less than the specified minimum battery weight. Therefore, whenever a battery is replaced on an industrial vehicle, the vehicle controller 21 executes a battery weight verification software routine 180 depicted in FIG. 10. That routine commences at step 181 with the vehicle controller 21 in FIG. 2 sending an inquiry via the BSM communication interface 62 to the BSM 64 on the battery 37, requesting the specification data that is stored in data table 160 within the memory 152. The BSM 64 responds to that inquiry by transmitting the specification data through the battery cable 38 from which it is received by the BSM communication interface 62 and forwarded to the vehicle controller 21. The vehicle controller memory 24 also stores the minimum weight specified for the battery in this vehicle, which is read by the vehicle controller 21, at step 182. At step 184, the actual battery weight is compared to the minimum battery weight to determine whether the presently installed battery is heavy enough to counterbalance the vehicle. If the presently installed battery 37 is not heavy enough, the program execution branches to step 186 at which the industrial vehicle 10 is configured for restricted operation. This may be accomplished by setting a flag within the vehicle controller 21. As long as that flag remains set, the vehicle controller 21 limits the operation of the vehicle. For example, the height to which a load 35 is raised on the mast 19 may be restricted so that the loads can not be raised to a height which could create an instability condition. In addition or alternatively, the weight of the loads 35 that may be transported can be limited. As noted previously, a weight sensor 57 measures the weight of the load 35 being on the load carrier 18 and provides an indication of that weight to the vehicle controller 21. Therefore, an attempt to lift an excessively heavy load 35, in this restricted operating mode, causes the vehicle controller to disable the lift motor control 23 thereby preventing that load from being raised. Another operational restriction, when the installed battery has insufficient weight, involves the vehicle controller 21 limiting the maximum speed at which the traction motor 43 propels the industrial vehicle 10. In this situation, the vehicle controller 21 may permit a heavy load 35 to be lifted a small amount off the floor, but then limit the vehicle traction speed. The maximum traction speed that now is permitted is significantly less than the maximum speed permitted when a properly sized battery is installed. Other types of operational restrictions may be implemented when a battery of insufficient weight is installed. During the periods when vehicle operation is limited, the vehicle controller 21 provides an indication of the load restriction mode to the operator via the operator display 55. Other types of visual and audible annunciations can be issued. Because the batteries 37 are frequently removed from one industrial vehicle 10, attached to and detached from the charging equipment 130, and reinstalled on another vehicle, the battery cable is subjected to wear. With reference to FIG. 2, in addition to receiving voltage and electric current data from the BSM 64 on a battery 37, the vehicle controller 21 occasionally receives data from the vehicle power sensor 60. This latter data indicate the electric current and voltage received from the battery 37 at the connector 34 on the industrial vehicle 10. This provides a measurement of the voltage and electric current at the second, or vehicle, end of the battery cable 38. Thus, the vehicle controller 21 receives data regarding the voltage and electric current at both ends of the battery cable 38. By comparing that data from opposite ends of the battery cable 38, the vehicle controller 21 determines whether a substantial voltage drop occurs in that cable and thereby whether the cable has deteriorated to a degree where replacement is required. The voltage drop in that cable is directly related to the resistance in the cable to the flow of electric current between the battery and the industrial vehicle 10. A similar comparison of the voltage at opposite ends of the battery cable 38 occurs when the battery 37 is connected to the equipment 103 at the charging station 101. If the voltage drop across the cable exceeds a predefined threshold, an alert is given to either the operator of the vehicle via the operator display 55 or to personnel at the charging station 101. Other forms of visual and audible annunciations can be issued. The level of electric current at both ends of the battery cable 38 can also be compared to detect current leakage to the frame or other components of the industrial vehicle as may occur if the insulation of the battery cable has cracks. Here too, a difference in the electric current levels measured at both ends of the battery cable 38 exceeding a predefined threshold causes an alert to be given to the vehicle operator or personnel at the battery charging station 101. Therefore, the present system provides a mechanism for automatically checking the integrity of the battery cable 38 and providing an alert when significant deterioration has occurred. Referring to FIGS. 2 and 4, a circumstance encountered on these industrial vehicles is electric current leakage from the battery 37 to the metal case 151 that houses the battery. This leakage may occur due to a number of conditions such as unevaporated electrolyte spilled on the cell tops or internal sulfation build-up at the bottom of the cell. Typically, the frame 30 of the industrial vehicle 10 is not connected to the negative terminal of the battery 37 because of this leakage possibility. It is important that operating personnel become aware of this electric current leakage in order that corrective measures can be taken. For that purpose, the voltage and current sensor 154 in the battery sensor module 64 includes an input that is connected to the metal battery case 151. Thus, in addition to detecting the voltage across the output terminals 156 of the battery, the voltage and current sensor 154 periodically measures the resistance between the battery case 151 and each of the positive and negative output terminals 156. If the resistance level with respect to the battery case 151 and either of these terminals is below a predefined level, an alert message is sent by the BSM 64 to the vehicle controller 21. The vehicle controller 21 responds to that alert message by providing an alert indication on the operator display 55 or by another visual or audible annunciation. An additional or alternative test can be performed by sensing the level of any electric current flow through the voltage and current sensor 154 between the input connected to the battery case 151 and the inputs coupled to the battery terminals 156. If such electric current exceeds a predefined threshold level, e.g., 1.0 mA, an alert message is sent to the vehicle controller 21 or the charging equipment 103, which issues an alert to the operator. With particular reference to FIG. 2, to detect electric current leakage elsewhere on the industrial vehicle 10, the vehicle power sensor 60 has an input connected to the frame 30 of the industrial vehicle. This enables the vehicle power sensor to detect the level of resistance between the vehicle frame and the B+ and B− conductors of the electrical system. A low resistance indicates a short circuit or current leakage in other components of the vehicle, such as the motors, control circuits or cabling. When such an abnormal condition is found, an appropriate alert is given via the operator display 55. If an alphanumeric type operator display 55 is used, that alert indicates the nature of the condition, such as current leakage detected by the battery sensor module or by the vehicle power sensor which thus indicates the approximate location and nature of the abnormal condition. The various items of operational data received by the vehicle controller 21 from the BSM 64 can be used to detect other abnormal conditions of the battery. When such conditions are found, an appropriate alert is provided to the operator of the vehicle 10 via the operator display 55 or to personnel at the charging station 101 via a similar display on the charging equipment 103. For example, the temperature data sent from the BSM 64 can indicate that the battery is overheating or has been subjected to freezing temperatures. Similarly, the data produced by the fluid level sensor 159 can be utilized to alert the appropriate personnel that the electrolyte level in the associated battery 37 is abnormally low and additional water needs to be added to the battery. As noted previously, all the gathered data from the battery sensor module, other sensors on board the vehicle, and the charging equipment 103 can be transmitted to the central warehouse computer 104 for storage and analysis. The central warehouse computer 104 can also relay that battery related data via the internet to the central database 110 or to other computers, such as those for the vehicle manufacturer, a local dealer, or the warehouse company management. The foregoing description was primarily directed to a certain embodiments of the industrial vehicle. Although some attention was given to various alternatives, it is anticipated that one skilled in the art will likely realize additional alternatives that are now apparent from the disclosure of these embodiments. Accordingly, the scope of the coverage should be determined from the following claims and not limited by the above disclosure. in response to the first measurement and the second measurement, the electronic controller producing an indication of deterioration of the cable. 2. The method as recited in claim 1 wherein the electrical parameter is electric current flowing through the cable. 3. The method as recited in claim 1 wherein the electrical parameter is voltage across two conductors of the cable. determining resistance of the cable in response to measurements of the voltage and the electric current. determining power loss in the cable in response to measurements of the voltage and the electric current. 6. The method as recited in claim 1 wherein receiving the first and second measurements at the electronic controller comprises transmitting one of the first measurement and second measurement through a wire of the cable through which electric current from the battery flows to operate a motor on the industrial vehicle. 7. The method as recited in claim 1 altering operation of the industrial vehicle in response to the an indication of deterioration of the cable. in response to the first voltage measurement, the second voltage measurement, and the current measurement, the electronic controller producing an indication of deterioration of the cable. 9. The method as recited in claim 8 further comprising determining resistance of the cable in response to measurements of the voltage and the electric current. 10. The method as recited in claim 8 further comprising determining power loss in the cable in response to measurements of the voltage and the electric current. 11. The method as recited in claim 8 further comprising transmitting one of the first voltage measurement and second voltage measurement through a wire of the cable through which electric current from the battery flows to operate a motor on the industrial vehicle.
2019-04-23T03:39:09Z
https://patents.google.com/patent/US20110260735A1/en
A wrong course has been followed by the denomination in ignoring, evading, or denying the fact of the mistaken teaching of the early years. Had all the facts been know to our people, they could not have continued to regard the testimonies as infallible. But the facts have not been known. They have been covered up. In saying this I am not bringing a railing accusation against anyone. I do not say that all who have helped to bring about this situation or to perpetuate it have done so willfully. A good deal has been due to a prevalent feeling that the Testimonies must be held to and believed in as inspired, notwithstanding the most serious difficulties and evidences to the contrary. It seems to be felt by many that it is duty to close the eyes to the clearest indications that Sister White held mistaken views, and taught doctrines out of harmony with the Bible; and that she eliminated passages from her writings, and changed them, for the very evident reason that she had taken mistaken positions, and had been compelled to relinquish them. These changes have been made even in what have been claimed to be inspired visions. I know that an effort is made to deny this; but it is an entirely unsuccessful effort. The evidence of a change in Sister White’s teaching on the sanctuary question is overwhelming and undeniable. The evasion of the force of the facts in this case on the part of those who know them may in many cases be due to the weakness rather than the willfulness; but it is a culpable weakness nevertheless; for no Adventist minister can stand free from the responsibility to face the facts referred to, to weigh them, and protect the church from being misled. Instead of the facts in the case being made available to our people, important information has been withheld, and unpleasant facts denied. This is not right. Many of our ministers have been kept in ignorance these things for a long period of years. The writer had been connected with the organized work for almost a quarter of a century before learning the truth about the eliminations from “Early Writings”, for instance. Such information should have been furnished us in a proper way from within the body. Is it right that our ministers here in the Antipodes, and in all the other ends of the earth should be encouraged, and even required to teach the inspiration and infallibility of the Testimonies, and at the same time be denied vital information bearing on the question of such infallibility? It certainly is not right. For we are expressly directed in connection with prophesyings to “prove all things”, and to hold fast only that which is good. And it is impossible to prove the nature of the gift when the vital information is withheld. When only that which is favorable to the claim is related and recorded, and all that is unfavorable is withheld or eliminated, neither the ministry nor the church is in a position to judge or to “prove” anything. Sister White in the early years of the work taught the “shut door” view of the sanctuary service, and taught it on the authority of her visions, and in the name of inspiration. All the pioneers taught the “shut door” theory during those years. When sufficient time had elapsed to demonstrate that the views held were mistaken, they were modified and revised. Important passages teaching the “shut door” were either eliminated from Sister White’s “Early Writings” or else explained away by notes claiming that they did not teach that view. A publisher’s preface was introduced claiming that in that edition “no changes from the original work had been made, except the occasional employment of a new word, or a sentence, to better express the idea, and no portion of the work had been omitted”, which certainly was not true with reference to the original publication of the earlier visions, and was consequently very misleading. This course of action has been continued right down to the present time, articles having been published of quite recent years in our leading church paper, denying that the “shut door” was taught in the early days. Why all this evasion? Why this denial of indisputable facts testified to by the printed records of those days? Would it be a really fatal thing to acknowledge that our pioneer brethren for a time held mistaken views? Certainly not! We would not need to be ashamed of it. It would be sufficient for us to be able to show that not with standing early misconceptions, the brethren were eventually led into a wide field of truth. Why should there be a persistent effort to deny the “shut door” experience? The answer is, that it is because Sister White was involved in that experience, and set the seal of the approval of her testimonies upon that teaching. To acknowledge this would be to rob of their reputation for infallibility subsequent teachings of the same author. The facts are there in our early records, and cannot be denied. A comparatively recent publication, “The Shut Door and the Close of Probation”, written in defense of the Testimonies, acknowledges the fact that the pioneers did for a number of years hold to the “shut door” theory. This pamphlet even quotes statements made by the author of the Testimonies teaching that view, including some of the eliminated passages; but endeavors to show that Sister White did not really mean what she said in some of those instances. The appearance of this publication is gratifying in the respect that it frankly acknowledges that the “shut door” was taught in the early days of our work, and also in that it acknowledges the fact of certain eliminations from “Early Writings”, and even reproduces some of them. This is a refreshing departure from the policy of evasion or denial followed for so many preceding years. Why should there be this very reluctant and restrained reproduction of the writings of the early days? We are practically limited to vague assurances from those who have access to the early volumes that everything is all right; that the pioneers did not teach the “shut door”; or that if they taught it, Sister White did not; or that if Sister White taught it, if she did not do so on the authority of the visions; or that if she taught it in relating the visions she did not really mean what she said! Meanwhile others are publishing the very words of the pioneers and of Sister White on those subjects, publishing them voluminously and in detail.2 Why does not the General Conference undertake that work? Why does not one of our publishing houses reproduce the whole of the publications of those early years? This would provide some original research work, and would provide valuable reference books for the denominational history classes in our school and colleges. The report adopted by Australian union conference committee follows the usual practice of referring to favorable features of Sister White’s work, and ignoring those features which if properly weighed could not but prove that she was mistaken in her claim to be the channel of direct revelation from God. I do not deny the favorable features. Sister White’s pointed testimonies of reproof for sin, and her uncompromising and convicting demands for vital godliness, holy living, and unswerving devotion to the cause and kingdom of Christ have always impressed me greatly. But I cannot because of these things close my eyes to the evidence that her claim to inspiration, in the highest sense of all, was a mistaken one. Just how much she herself was responsible for the mistake I do not presume to judge. It seems that she was sincerely mistaken. But even this view does not justify her course in all respects in connection with her writings. It seems however, that she was an earnest fervent-spirited Christian woman. God is very merciful, and graciously blesses and uses his children despite their mistaken views, and their oft-times mistaken actions. So also with some of those who have participated in ignoring, covering up, or explaining away facts that if generally know would long ere this have compelled a great modification of the claims made in behalf of Sister White. Doubtless this has in many cases been due to a mistaken sense of duty, and a fear that to doubt the inspiration of the Testimonies because of these facts would be a manifestation of unbelief, and thus displeasing to God. But this is not unbelief in the Bible sense for the faith that God calls for is defined as “the belief of the truth”. There is no genuine piety in believing things that are not true. God has mercifully blessed many who in sincerity of heart have believed in the plenary inspiration of the Testimonies. He has just as mercifully blessed a multitude of earnest men and women in other religious bodies, notwithstanding mistaken views on some points of truth and doctrine tenaciously held by them. The undue authority attached to Sister White writings has nevertheless had a harmful influence. Any help the Lord may have been able to give to those who believed the claims made, or to the one who made them, is to be attributed to his mercy, and not to the truth of the claims. The Lord has been good to his God-fearing children despite this mistake and not because it. As for the harmful influence referred to, there has been a tendency to subject Bible teaching to the teaching of the Testimonies. Bible truth has been regarded as being “clinched”, when it could be supported by a statement from the Testimonies. And a statement from the Testimonies on any point has been sufficient to deter from the investigation of scriptures apparently teaching to the contrary. Voices that would teach differently from Sister White on any point, even in the smallest details, are immediately silenced by an appeal to something she has written. This could not be harmful if everything Sister White has written were in very truth by direct revelation from God; but if Sister White were mistaken in any teaching, it most effectually binds that mistake upon the whole church forever. No amount of evidence from the Bible, differing from Sister White, is sufficient to convince believers in the inspiration of the Testimonies. Even in regard to Christian experience, many of our people are more familiar with what Sister White has said regarding forgiveness, and acceptance and the gift of Holy Spirit, than they are with the declarations and promises of the Bible itself. They seem to feel that the statements of the Testimonies are plainer and more understandable, and therefore a safer basis of reliance than their own understanding of the teaching of the Bible. This is a serious weakness. For the full assurance of faith springs from reliance upon the very word of God itself. Faith requires God’s word to rest upon, and not something Sister White has said about that word, no matter how good the saying may be. The writer then proceeds to give an outline of his method of teaching various phases of Christian experience by using Steps to Christ, giving page and paragraph from that book an all different points. The object of this section is to make available to the reader evidences that show that for a period of years in their early history, Seventh-day Adventists held and taught the “shut door” theory, a form of the sanctuary teaching which was afterwards relinquished as mistaken; that Mrs. E. G. White held and taught the mistaken view, on the authority of what were claimed to be visions of revelation of God; and that a wrong course has been followed in subsequent years in ignoring these facts, denying them, or attempting to explain them away, so that both laity and ministry have been to a large extent kept in ignorance of them, and thus prevented from realizing their full force and significance. The original teaching concerning the sanctuary as held by the denomination from 1844 to 1851, was that Christ’s intercession in behalf of the world of sinners ceased when He finished his ministration in the first apartment in heaven in 1844; that probation closed at that time; and that Christ’s intercession in the second apartment from 1844 onward , was in behalf of “the whole house of Israel” only. James White states plainly that the brethren regarded their “work for the world” as “finished forever”. He also expounds the reasons for holding the shut door view. “‘Then shall the kingdom of heaven be likened (compared) unto ten virgins.’ When? At this very time, when the faithful servant is giving meat to the “HOUSE HOLD” (not to the unbelieving world) and is opposed by the evil servant, and when the advent history, marked out by the parable, is fulfilled, and the shut door is in the past. Now we may see that the only place for the shut door was in 1844. Amen. The Seventh-day Adventists continued the teaching of the shut door until 1851. It was expected by them that Christ’s ministry in the second apartment would extend over a very limited period. It was inferred by some, from the fact that in the type the high priest sprinkled the blood of the sin-offering upon the mercy-seat seven times, that Christ’s ministry in the most holy place would continue for only seven years. After the seven year period had passed, and nothing had happened to marks its termination, the shut door form of the teaching was relinquished, and the doctrine of the sanctuary as it is now held by the denomination was gradually formed. In reading the following extracts from articles by Joseph Bates, it should be borne in mind that our Seventh-day Adventist pioneers spoke of the Advent church as it existed in 1844, and continued in those who held the shut door teaching, as the Philadelphia church. The Adventists who gave up the shut door doctrine were referred to as Laodiceans. The Protestant churches in general were described as Sardis, and regarded as having been rejected. Seventh-day Adventists took strong positions against the other Adventist brethren, who in 1845 gave up the shut door view. James White speaks of the same three classes, who might be subjects of conversion. “Conversion, in the strictest sense, signifies a change from sin to holiness. In that sense we readily answer, that it [the shut door] does not exclude ALL conversion, but we believe that those who heard the ‘everlasting gospel’ message and rejected it, or refused to hear it, are excluded by it. We have no message to such. They have no ears to hear us unless we lower the standard of truth so low that there would be no salvation in it. But there are those who may be converted. With all this differentiation, the brethren made it clear that no names might be added to the breast-plate of judgment after 1844, although the names of those who refused to accept further light might be erased. DID MRS. E.G. WHITE TEACH THE SHUT DOOR? That the “Advent people” were now separated from “the world”. Sister White looked for them “in the world”: she could not see them there, but found them on a path “cast up high above the world”. The point at which the Advent people were separated from the world, was the giving of the “midnight cry”, in 1844. “They had a bright light set up behind them at the beginning of the path which an angel told me was the midnight cry”. To deny the light behind them (the “midnight cry” as “being in the past”) resulted in their fall from among the Advent people “down into the dark and wicked world below”. Such backsliders had no hope of restoration. “It was impossible for them to get on the path again”. The world, aside from the Advent people, is described as “all the wicked world which God had rejected.” It was impossible for them to get on the path” and “go to the City”. This sentence should appear in Early Writings in the chapter headed “Subsequent Visions” on page 27 of the old edition and page 33 of the new, between the words, “waiting saints”, and “I saw God had children”. The vision seems to have been first written in a letter to Joseph Bates, and was published in that form in A word to the Little Flock, p. 19, in 1847. As then published it contained the sentence quoted above, which since been omitted. These statements are in agreement, first with themselves and second with the views held by the brethren at that time. The testimony of Jesus “related to the shut door”, and became, with the Sabbath, the “present truth”, the “meat in due season”. When the little flock were “established on the Sabbath, and [their] past Advent experience”, they were established on “the Sabbath and the shut door”, for the “past Advent experience” had reference to the midnight cry and the shut door proclamation of 1844. Brother White has already told us that Sister White was shown in her first vision that it was an error to give up the view of “the midnight cry and shut door as being in the past”. So Brother Rhodes has spoken “against the present truth”, when he had spoken against “the Sabbath and the Shut Door”; but there had nevertheless been no guile in his mouth in speaking thus. The company of Adventist believers is then represented as praying, and receiving light from the Father and the Son. Thus much for the professed Christians. But what became of “the world”, those who from the first had “stood disinterested and careless”? This is what one might describe (using one of the expressions of the pioneers) as “a shut door of the closest kind”.38 The door was shut so tightly and so effectively that there was neither chink, crack, nor crevice through which so much as “one ray of light” might pass “to the careless multitude”! Their darkness was complete! The passage printed in red was contained in the vision as originally published; but has been omitted from Early Writings. See page 45 of the new edition, and page 37 of the old edition. This paragraph plainly teaches that the time for the salvation of sinners was past. The antecedent of the pronoun “their” in the last sentence, is the noun “sinners” in the preceding sentence. This is made doubly clear when the eliminated sentence is restored. For many years, in the old edition of Early Writings, a note by the publishers sought to make out that the last sentence applied to false shepherds. “It is the false shepherds therefore, and not sinners in general, to whom this sentence applies”. (See page 37). This questionable explanation does not appear in the present edition of that book. Such an interpretation fails entirely to harmonize with the text. The “false shepherds”, or “ministers who have rejected the truth” are not referred to in the immediate context. It is the “sinners” of the last paragraph whose “salvation is past”. This passage does not speak of some sinners, who have passed the boundary line, and cannot be saved. The statement is a sweeping one, referring to sinners in general. What would James White have thought, if his wife had in 1849 [had] gone out “laboring for sinners”? He was willing to admit, in 1851, that “God had reserved to himself a multitude of precious souls, some even in the churches”, those who were “living up to what light they had when Jesus closed his mediation for the world”; “But,” he added, “we think we have no message for such now.” Did his wife, two years earlier, have a message for “the world”, for whom Christ’s mediation had “closed”, and fail to tell her husband of it, or convince him of it? Speaking of “the autumn of 1844” James White says that at “that point all our sympathy, burden and prayers for sinners ceased”.41 Sister White says that they “lost their burden of soul for the salvation of sinners”.42 In March 1849, she wrote that her accompanying angel bade her “look for the travail of soul for sinners as used to be”. She “looked, but could not see it; for the time for their salvation” was “past”. Who had lost the “travail of soul for sinners” that they used to have? Mrs. White and her husband, and their associates according to their own testimony. For whose salvation, was “The time…past”? Was it past for those who had lost their burden, or for sinners for whom the burden was lost? It is obvious that when Sister White wrote that “the time for their salvation is past”, she had reference to sinners. The assertion of the publishers that “at the very time when these things were written she [Sister White] herself was laboring for the salvation of sinners”, is one that is frequently repeated by those who seek to maintain the infallibility of the Testimonies. Let the reader take due note of the fact that not one scintilla of evidence from the documents of that early period is ever produced to justify this assertion. The reason for this is that there is none to produce. The early publications abound with evidence to the contrary, that from 1844 to 1851 all the pioneers regarded their “work for the world” as “finished forever”, and were giving their time to providing “meat in due season” for the “household” of faith. By “the scattered flock” the pioneers meant the Advent people. The Adventists were united up to 1844; but the great disappointment of that year threw them into confusion and “scattered” them. Sister White speaks of this as “the scattering time.” After discovering what they thought to be the true light on the sanctuary, the Seventh-day Adventists felt that they had a message that would once more unite the scattered flock, and spoke of this as “the gathering time”. Sister White’s labors, and those of her associates, were all directed toward this on end, the gathering of the “scattered” flock. On page 62 of Early Writings Sister White speaks of “the last message of mercy that is now being given to the scattered flock”. This agrees precisely with James White’s statement that the third angel’s message is “the last message of mercy to the scattered flock”, in contrast with the first angel’s message, which he taught was “the last message of mercy to the world”, closing in 1844. But no such message as this from her pen is found in the records of the years 1844 to 1851. How unwarranted then, and how misleading is the oft-repeated assertion that when Sister White wrote that “the time for their salvation is past” she herself “was laboring for the salvation of sinners”. In what way would such seeming conversions be likely to “deceive God’s people”? The answer is that the believers might be deceived into thinking the door, must be open, and not shut. Those sentences should never have been eliminated from the Early Writings. They help to fix the meaning of the context. Having fully received the view that in 1844 Christ “rose up and shut the door” of the first apartment, “where he had been Mediator for all the world”, the pioneers could not credit the genuineness of revivals or of the conversion of sinners reported by the “Sardis” or “fallen” churches, or by the “Laodicean” Adventists. These were ether denied, or explained away, or attributed to Satanic agencies. David Arnold applies the passages in the same way, in the Present Truth for December, 1849. It is exceedingly regrettable that these facts should have been covered up for many years, denied, or explained away so that our people generally, and the great body of our workers have not been acquainted with them. The present writer finds no pleasure in reviewing such items of past history, nor in discussing what he believes to be the mistaken course of those who have subscribed to the policy of preventing them from becoming generally known. This unpleasant task becomes a duty, however, in the present circumstances. Thousands have been taught to regard the sanctuary teaching as now held as having the authority of a divine revelation; whereas it has no such authority. The shut door teaching was the aftermath of William Miller’s mistake in preaching that Christ’s second advent would take place in 1844. The present sanctuary teaching is the aftermath of the mistaken shut door doctrine of 1844 to 1851. The mistakes of the past have led on to the mistaken teaching of the present. The present erroneous views regarding the sanctuary are being assiduously taught to our children and young people, and thus passed on to another generation. It becomes the duty of Christ’s ministers, when they become aware of these things, to speaks out and let the facts be known. The darkest page in our denominational history is not that which records the mistakes of the Miller movement; nor that which records the shut door teaching of subsequent years; but that which records an effort to cover up the facts of the past. It is to be deeply regretted that our own pioneers did not follow the same commendable course, when, late in 1851, or thereabout, they in turn gave up the shut door teaching. In the Review for March 17, 1853, the editor, James White, quotes form the “Harbinger” a statement in which O.R.L. Crozier said that he understood the Seventh-day Adventists now disclaimed the doctrine of the shut door. Brother White then makes the curt rejoinder, “On the above we will first remark, that as C. has informed the readers of the Harbinger that we disclaim the doctrine of the shut door, that paper should no longer reproachfully call us ‘shut door Sabbatarians’”. Seeing that the pioneers taught the shut door so long and so emphatically, and so unsparingly reproached the other Adventists for giving up that doctrine, the editor of the Review should have voluntarily and frankly acknowledged the mistake, and should not have left it to “C”, or anyone else, to “inform the readers of the Harbinger”, and other interested persons, of the change of convictions. It was not true that no portion of the original work had been omitted. The writer of the preface (if he knew of the omissions) may have satisfied his conscience by thinking of the publication of 1851 as the “original work”; but he must have known that the readers of his preface would understand him as referring to the visions as originally published. There were considerable omissions from the contents of the original documents when the visions were first re-published in 1851, and among them statements that undoubtedly taught the shut door. Even after the omissions were made, there still remained passages that could lead to no other conclusion than that the visions taught the shut door. Instances of these have already been given in preceding pages. For many years Elder J.N. Loughborough occupied a position tantamount to that of historian to the denomination. Brother Loughborough went farther than to deny that Sister White taught the shut door: he stoutly maintained that it was not taught by Seventh-day Adventists at all. Sufficient evidence has already been presented in preceding pages to demonstrate the utter falsity of these statements. The reverse is the truth, that the First-day Adventists early gave up the doctrine, and the Seventh-day Adventists doggedly maintained it. How does Brother Loughborough deal with James White’s statement that the Lord showed Sister White in vision that she and all the band in Portland had fallen into error in having “given up the midnight cry and shut door as being in the past”? He simply omits the words, “and shut door”, and makes the sentence read, “had given up the ‘midnight cry’ as being in the past.”69 Here he gives no indication that any words have been omitted. This is a serious offence, for the clauses omitted from both the quotation above referred to are key phrases, the omission of which is calculated to keep the reader in ignorance of the fact that the pioneers taught that doctrine; facts that Brother Loughborough categorically denies in the book in which he makes these mangled quotations. This conference address was signed by J.H. Waggoner, James White, J,N. Loughborough, E.W. Shortridge, Joseph Bates, J.B. Frisbie, M.E. Cornell, Moses Hull, and John Byington. Brother Loughborough, then, was a signatory of this address and was indeed himself the ‘one of their number” referred to who was “nearly refused the message” because of doubts entertained as to the possibility of his salvation, seeing he was “not in the ’44 move”. And yet, knowing all this, Brother Loughborough has dared to deny in his book that Seventh-day Adventists taught the shut door during the early years of their history! It is a thousand pities that the degree of candor exhibited in this 1861 conference was not maintained and extended during subsequent years. It is an honor to a people as well as to an individual frankly to acknowledge mistakes, and to retract them. But this degree of candor was not maintained, the said conference address being apparently only a sporadic manifestation of that quality. And the chief reason for this reticence with reference to the early mistakes is that Sister White is involved in them, and the authority of the Testimonies is at stake. Brother Spicer does not bring any evidence from the early publications to warrant these statements. We have already seen that the records of the early years tell a very different story from that which our brother would have us believe. In the face of all this evidence, how can anyone conscientiously maintain that “all the time, form the very beginning, the spirit of prophecy was…setting forth an open door”, and telling the pioneers of the “great world-wide work of which they had little idea”? In order to test the soundness of Brother Daniells’ conclusion let us consider briefly one of the three statements to which he refers,--“It was just as impossible for them to get on the path again and go to the City, as all the wicked world which God had rejected.” Of this sentence Brother Daniells says that he sincerely believes that it “does not, taken apart from the context, express the view of the author as clearly as was intended.” “This opinion”, he continues, “is strengthened by the action of Mrs. White when, in revising the printed message, she eliminated this sentence”.76 No one suggests, however, that this sentence be “taken apart from its context”. We want it with its context, where it rightly belongs. It was “separated from its context” when Sister White eliminated it. In seeking a way out of the difficulty, Brother Daniells pleads that this and other passages are “so worded that two different and conflicting interpretations can be places upon them.”79 No attempt is made to show how these conflicting constructions could be arrived at. Speaking of Sister White’s first vision (of which the particular passage under discussion formed a part), Brother Daniells says,--“It is plainly evident that this view revealed a great evangelical movement in operation throughout the world until the coming of the Lord”.80 This claim is based on Sister White’s repeated reference to the 144,000, a number of believers which Brother Daniells affirms was nowhere in sight at the time. This argument loses its force, however, when one knows that the Adventists influenced by the Miller movement were estimated to exceed that number, and these were the ones that Sister White and her associates were so diligent in searching out. Moreover, Joseph Bates, discussing the question of the 144,000 at the time, declared that he believed them to be already in existence. He published a 70-page pamphlet, entitled, “The Seal of the Living God - A Hundred and Forty-four Thousand of the Servants of God being Sealed”, in 1849. She said again, that “if one believed, and kept the Sabbath, and received the blessing attending it, and then gave it up, and broke the holy commandment, they would shut the gates of the Holy City against themselves as sure as there was a God that rules in heaven above.” Where is the “ambiguity of expression” that Bother Wilcox speaks of? In a chapter headed “The Open and the Shut Door”, Sister White wrote, “My accompanying angel bade me look for the travail of soul for sinners as used to be. I looked, but could not see it; for the time for their salvation is past.” Is “the wording of the sentence not clear”? When Sister White wrote to Eli Curtis in April, 1847: “The Lord has shown me in vision, that Jesus rose up, and shut the door, and entered the Holy of Holies, at the 7th month, 1844”; and when she related another vision in 1850, in which she said, “I did not see one ray of light pass from Jesus to the careless multitude after He arose, and they were left in perfect darkness”; did she not express herself “fully, and without possibility of misunderstanding”? Why do our leading brethren use their influence to persuade the church that such expressions as these; bold, clear, and uncompromising in their definiteness and outspokenness; are obscure and ambiguous? Sister White well knew how to say what she meant; and she certainly did not fail in these and other similar instances. Battle Creek Mich., Aug. 24, 1874. I hereby testify in the fear of God that the charges of Miles Grant, of Mrs. Burdick, and others, published in the CRISIS is not true. The statements in reference to my course in forty-four is false. With my brethren and sisters, after the time passed in forty-four I did believe no more sinners would be converted. But I never had a vision that no more sinners would be converted. And am clear and free to state no one has ever heard me say or has read from my pen statements which will justify them in the charges they have made against me upon this point. It was on my first journey east to relate my visions that the precious light in regard to the heavenly sanctuary was opened before me and I was shown the open and shut door. We believed that the Lord was soon to come in the clouds of heaven. I was shown that there was a great work to be done in the world for those who had not had the light and rejected it. Our brethren could not understand this with our faith in the immediate appearing of Christ. Some accused me of saying my Lord delayeth His coming, especially the fanatical ones. I saw that in ’44 God had opened a door and no man could shut it, and shut a door and no man could open it. Those who rejected the light which was brought to the world by the message of the second angel went into darkness, and how great was darkness. The publication of this letter may be regarded as a very belated acknowledgment of the truth concerning certain matters referred to in this article. The acknowledgment, however, both on the part of the writer of the letter and of those who now publish it, is only partial, and is entirely inadequate. Let us consider first of all the significance of the acknowledgments made, and then review the evidence that something more far reaching is called for by the facts in the case. Sister White states in this letter that “after the time passed in forty-four”, she, in common with the brethren and sisters of the time, “did believe that no more sinners would be converted”. This is an important admission, because the denomination has for many years sough to maintain the very opposite. Brother Loughborough declared that those who held such views “were not Seventh-day Adventist.” Speaking of Sister White he wrote that “she does not even intimate that she believed it.”83 It makes one blush for Brother Loughborough to reflect that when he published these statements he had in his possession the very letter now reproduced by the Review and Herald in which Sister White makes the solemn assertion (no mere “intimation”) that she and the other pioneers did believe that doctrine. Provided of course that our brother actually received the letter. The Review speaks of it as being found among Sister White’s old letters and documents. In any case, however, Brother Loughborough had access to all the information it contains, and much more. Brother Loughborough is not the only one to appear in an unfavorable light as a result of the publication of this letter. A grave reflection falls upon Sister White herself. She must have known that a false representation regarding these matters was being made to our people, not only in Brother Loughborough’s book, but also in other publications including notes and prefaces in her own Early Writings, and yet did nothing to prevent it. These things could not possibly have continued in the face of her direct and expressed disapproval. Her silence or inaction involves her deeply in responsibility for the course so long followed by the denomination in this connection. More than eighty years have expired since the close of that early period of “shut-door” teaching. The letter under consideration was itself written almost fifty-eight years before its recent publication. During all this time a wrong impression has been given our people. A grave reflection falls not only upon Sister White and Brother Loughborough, but upon all who, closing their eyes to the very evident facts in the case, have persisted in maintaining that impression. Now that we have Sister White’s own acknowledgment that she and the other pioneers “did believe that no more sinners would be converted”, what will the ex-president of the general conference say, who in 1926, writing professedly in review of the evidences contained in the early documents, maintained in our leading church paper that “so far from the shut door meaning to those believers that probation closed in 1844, the new view of the shut door and the Sabbath truth was an incentive to go out and work for the salvation of others”?84 How will the same writer justify his assertion that “all through those years Sister White herself was out preaching the gospel and seeking to save sinners”? (Ibid. April 15, 1926). For how could Sister White and the pioneers work for the salvation of sinners when it was their firm belief that “no more sinners would be converted”? What will the editor of the Review and Herald say, who in the January 30, 1930, number of that paper wrote that “We have no evidence that Mrs. White had the same idea about the work to be done as her associates”, and that “her instruction to the church through all the years is definite and decided in presenting an open door of mercy to any and every penitent of every race and nation who would seek salvation in Christ Jesus”? For how could Sister White be so “definite and decided in presenting an open door of mercy” during the period in which according to her own admission she believed the door was shut, and “no more sinners would be converted”? We turn now to consider the evidence that a more far-reaching acknowledgment is called for than is furnished by the letter under consideration. Sister White here affirms that she “never had a vision that no more sinners would be converted”. It seems that our sister must have written this sentence with certain mental reservations. She may not have related a vision in which it was said in so many words that “no more sinners would be converted”; but she did relate a vision in which it was declared that “the time for their salvation is past”, and that such so-called conversions or “reformations” as were then being seen were only “from bad to worse”; and another declaring that it was “impossible” for “all the wicked world which God had rejected”, or for Adventist backsliders to “get on the path” and “go to the City”; and another in which she was shown that “Jesus rose up and shut the door, and entered the Holy of Holies at the 7th month, 1844”; and another which she “did not see one ray of light pass from Jesus to the careless multitude after He arose, and they were left in perfect darkness”; and still other visions of the same purport and to the same effect. It is idle for Sister White and to the defenders of her inspiration to maintain that these visions did not teach that no more sinners would be converted. How can one reconcile this bold claim with the fact that such a book as Sister White’s Sketches from the Life of Paul contained so much matter copied without acknowledgement from the well-known Life and Epistles of the Apostle Paul by Conybeare and Howson, that the representatives of the latter threatened to bring suit against the Review and Herald Publishing Company for the plagiarism? Sister White’s book had to be withdrawn from sale on that account. Who, in this instance, received “the light shining from the throne”? Sister White, or Messrs. Conybeare and Howson? Nothing could be clearer than that in these statements Sister White agreed with Brother Bates in teaching that the Sabbath and the shut door were the present truth. What light was this? The opening and shutting doors in heaven! Is that all? There is neither light, nor life, nor salvation in this theory of the pioneers relating to the doors of the sanctuary, either in the form in which they originally held it, or in the form in which they passed it in to us, and in which we are asked to pass it on to our children. In his pamphlet, “The Shut Door and the Close of Probation”, Brother Daniells solemnly argues that “in not one of the five references to the shut door does Mrs. White state that the door of the second apartment of the sanctuary in which Christ ministers as High Priest or Mediator for a lost world was closed in 1844.”86 Why does Brother Daniells specify “the door of the second apartment”? Sister White taught that the door was shut, but she did not say that it was the door of the second apartment! Profound distinction! As though sinners could gain access to the inner door, when the outer door was closed against them! William Miller made a grievous mistake in preaching that Christ would come in 1844. Our pioneers decided that Brother Miller was quite right in preaching the time, that God’s hand was in it, and that the mistake was only in the event that was expected to take the place. From 1844 to 1851 the pioneers taught that the door was shut, and that probation for the world had closed. When it became evident that they were mistaken in this, instead of dropping the shut door theory altogether, they only modified it. They had not been mistaken in teaching that the door was shut; it was only a question as to which door was shut! There is sense in which the world in departure from God is a doomed, lost world. Sister White would not have erred from the truth had she spoken of it as such. That would be very different from saying that “the time for their salvation is past”. For although it is true that the world is a lost world, it is also true that “the Son of Man came to seek and to save that which was lost”. It is not true, however, that “Satan has taken full possession of the churches as a body”, and our Sister (partly excusable no doubt because of the fanatical “shut door” viewpoint of her early years) erred greatly in attributing those words to the angel of God. The admissions contained in the letter under consideration are therefore entirely inadequate. Let not the reader be deceived. The documentary evidence coming down to us from those early years, reviewed in this treatise is not so lightly to be set aside. There has been an effort by some to maintain the old ground, that the pioneers did not teach the shut door; but that effort has entirely collapsed. The endeavor now is to show that Sister White did not participate in the shut door view or at least that she did not teach it on authority of her visions. To establish this, however, the brethren must account for the numerous statements of Sister White that have been reviewed in this treatise. How do they do this? They ask us to regard these passages as “ambiguous” and “obscure”! Is this the best the brethren can do? Therefore some very unpleasant facts have been painfully pressed upon us. We have learned that vital passages teaching the shut door were eliminated from Sister White’s Early Writings; we have seen that despite this, the publishers for many years assured us in their “Preface” that “no changes from the original work had been made”, that “no portion of the work had been omitted”; and indeed that “no shadow of change had been made in any idea or sentiment of the original work”; we have learned that for a period of seven years after 1844 our Seventh-day Adventist pioneers were the dogged defenders of the shut door doctrine, and the stern denouncers of the Adventist who in 1845 renounced that theory; and yet for many years a large volume, purporting to be a historic account of the early days of our movement, has been circulated among our people, falsely accusing the First-day Adventists of being the propagators of that error, and just as culpably denying that our own pioneers taught it; we have been made painfully conscious of a weakness on the part of leading brethren over a long period of time, in relating only that which seemed favorable, and not telling us “the truth, the whole truth, and nothing but the truth”, concerning Sister White’s experiences, and the early days of the movement. But what can be said with regard to the “unpleasant facts” referred to above? It has been impossible to deny the charges so painfully pressed upon us! There was a great stir in America, when William Miller and his associates preached that Christ would come on the 22nd of October 1844. So profound was the impression upon some, that even when the disappointment came, they still felt that the Lord was in the definite time preaching. They could not doubt the “experience” through which they passed in connection with that movement. One reads that over and over again in the early records. It was this every attitude of mind, in which they felt bound to justify their experience of the past, that led our pioneers to hold so tenaciously to the shut door theory. Seventh-day Adventists are in danger today of holding on blindly to a misinterpretation of prophecy, because they feel that so much of their past experience in the things of God must stand or fall with it. In this we have received our impressions from Sister White and the pioneers, a relic of similar impressions that led them to persist in a mistaken position some eighty years ago. Let us beware of reaping the results of their error, and passing them on to perplex the minds of our children, and to make faith difficult for them. We have not been mistaken in cherishing the blessed hope of Christ’s soon-coming. I would exhort the reader not to relinquish this hope, but to cherish it with increasing earnestness. God has light for us on the prophecies, light that is increasing more and more. And the light will continue to increase, unto the perfect day. What are God’s people to do in these circumstances? There is only one thing to do. Let us get back to the Bible, and the Bible only as the rule of our faith. In that word we are exhorted not to despise prophesying, but to prove them, and to hold fast only that which is good. God has given us in the Holy Scriptures the true norm, not only of Christian doctrine, but also of Christian experience. In her warfare in this world, the church is likely to be perplexed through the extravagances in experience of some of her children. It is not always possible to explain or account for the mistaken impressions and conviction of apparently fervent and spiritually-minded Christians. We do not have to do that. We do not need to do it. Our responsibility and our safety is to get back to the Bible, and rely upon that sure word, both for teaching and for experience, whether we can account for the experiences of the other Christians or not. In declining to accept Sister White’s testimonies as a direct revelation from God, we do not have to account for all her exercises, and explain how an apparently earnest Christian could be mistaken in such claims as she made. It will be urged by some that the work must have been either wholly of God, or wholly of the devil. We are not bound to accept either alternative. Whether this Brother’s diagnosis of Sister White’s condition in vision was correct or not we do not need to decide. His was at any rate a kindly and merciful view to take. Let us be as kindly and just as merciful. There doubtless was, at any rate at that time, “no shade of dishonesty” in Brother and Sister White in this matter. It is not so easy to take that view, when, later on, passages were eliminated from the writings, and gross misrepresentations permitted such as has been reviewed in these pages. It is not so easy to overlook the part played by others in continuing these misrepresentations. The responsibility for the misrepresentations is a grave one, for by them the church has been prevented from obeying the injunction to “prove all things”. Nevertheless we are bound in this instance also to take the merciful view. One of the characteristics of fanaticism is blindness. Very questionable things may be done by otherwise pious man in support of a claim they have come to believe to be as fundamental and essential as that of the inspiration of the Bible. And there has certainly been a degree of fanaticism manifested in the course followed by some, in their efforts to bolster up Sister White’s claim to direct revelation. Let us leave it at that. And let us at the same time turn anew to the Bible, and to the God of the Bible, and his son, our blessed Savior, Jesus Christ. For my own part, I rejoice greatly in God my Savior. My faith in Him and in the promises of his world increases day by day. The blessed hope of Christ’s soon-coming is more precious to me than ever before. 1. J.N. Loughborough, Rise and Progress of the Advent Movement. 2. Author is referring to the publications of Ellen White critics A.G. Ballenger and F.E. Belden. 4. Ellen White, Great Controversy, p. 429. 5. A. Hale, Review and Herald, September 16, 1851; editor, James White, husband of Ellen White. 6. James White, Editorial on the Sanctuary, 2300 days and “The Shut Door” in The Present Truth, for May, 1850. 7. James White in “A Word to the Little Flock”, p. 2, (1847). 8. Ellen White, Spiritual Gifts, Vol. 4, p. 271. 10. E.P. Butler, Review and Herald, January 1851. Emphasis his. 11. E.P. Butler, Review and Herald, February 1851. 12. Letter from “A Second Advent brother to his Son.” Review and Herald, February, 1851. 13. Ellen White, Present Truth, December, 1849. 14. Joseph Bates, unspecified tract, emphasis his. 15. George Needham, “The voice of Truth”, March 19, 1845, p. 12. 16. J.B. Cook, Advent Review, pp. 30-34. 17. Joseph Bates, “The Laodicean Church,” Review and Herald, November, 1850. Emphasis throughout by Joseph Bates. 18. Joseph Bates, “Midnight Cry in the Past”, Review and Herald, December 1850. 19. Joseph Bates, “The Sealing Message”, p. 56, (1849). 20. Joseph Bates, Review and Herald, August 19, 1851. 21. David Arnold , Present Truth, December 1849. 23. Hiram Edson, “An Appeal to the Laodicean Church”, Advent Review extra, 1850. 24. James White, Review and Herald, April 7, 1851. 25. Joseph Bates, Review and Herald, January, 1851. 26. James White, A Word to the Little Flock, p. 22, (1847). 27. Ellen White, A Word to the Little Flock, p.14. 28. Ellen White, A word to the Little Flock, p. 19. 29. Ellen White, A Word to the Little Flock, pp. 11,12. 30. O.R.L. Crozier, quoted in Review and Herald, March 17, 1853. 31. James White, Review, March 17, 1853. 32. Ellen White, Early Writings, p. 42. 33. Ellen White, Present Truth December, 1849. 34. Ellen White, Early Writings, pp. 54. 38. Advent Review, p. 18. 39. Ellen White, Present Truth, August, 1849. 40. New edition of Early Writings, page 45. 41. James White, Present Truth, May, 1850. 42. Ellen White, Spiritual Gifts, vol. 4, p. 271. 43. James White, Present Truth, April 1850. 45. Ellen White, Present Truth, December, 1849. 47. S.W. Rhodes, Present Truth, November, 1850. 49. Joseph Bates, Report of labors at Baltimore, Review and Herald, October 7, 1851. 50. Ellen White, Present Truth April, 1850, article entitled, “To the Little Flock”. 51. Ellen White, Early Writings, p.47, written in 1849. 54. Ibid. p. 75, written in September, 1850. 55. Ellen White, Present Truth, September, 1849. 56. Ellen White, Review and Herald, February 17, 1863. 57. A. Hale, Review and Herald, September 16, 1851. 58. David Arnold, Present Truth, December, 1849. 59. Ibid. Letter from Brother Holt. 60. James White, Present Truth, May, 1850. 61. Joseph Bates, Review and Herald, August 19,1851. 62. Ellen White, Present Truth, March,1850. 63. Ellen White, Spiritual Gifts, vol.4, p, 172. 64. Publishers, Early Writings, preface to the 2nd edition. 65. J.N. Loughborough, Great Second Advent Movement, p. 222. 67. Joseph Bates, A World to the Little Flock, p. 21. 68. Loughborough, Great Second Advent Movement, p. 263. 70. Review and Herald, June 11, 1861. 71. Review and Herald, April 1, 1926. 72. Ibid. April 15, 1926. 73. A.G. Daniells, The Shut Door and the Close of Probation, p. 5. 81. F.M. Wilcox, Review, Jan. 30, 1930. 82. Ellen White letter to J.N. Loughborough as printed in Review and Herald, January 14, 1932. 83. Loughborough, Great Second Advent Movement, pp. 234, 222, 223. 84. A.G. Daniells, Review and Herald, April 1, 1926. 85. Ellen White, Testimonies for the Church, Vol. 5, p. 67. 86. A.G. Daniells, The Shut Door and the Close of Probation, p. 26. 87. Ellen White, Great Controversy, p. 430. 88. Ellen White, Early Writtings, p. 273. 90. Quoted in Advent Review, p. 84. 91. A Word to the Little Flock, p. 22.
2019-04-26T04:50:49Z
http://www.nonegw.org/egw84.shtml
Currently, when a crime is committed, two primary questions are asked: who did it and what should be done to the offender? The latter question is generally followed with another question about the most appropriate punishment and/or, at least in the case of a juvenile offense, most appropriate treatment or service to promote rehabilitation. The question of punishment or treatment has been a primary preoccupation of criminal justice dialogue for the past four decades. Indeed, modern criminal justice ideologies — conservative, liberal, libertarian, "just desserts" — can be easily grouped into general categories based on different views of how this question of intervention should be addressed.1 In the past two decades several of these ideologies appear to have coalesced at the policy level around a broad framework that gives priority to punishment and lesser emphasis to rehabilitative goals, places central focus on "desert" as the primary rationale for decision making, and expands the use of incarceration at all levels of criminal and juvenile justice in the U.S.2 Despite a continuing failure to find clear empirical evidence in support of the deterrent value of incarceration, this retributive justice framework3 or punitive paradigm4 has attained dominate influence in national and state policy.5 In response, many corrections professionals and their allies continue to promote an individual treatment model of rehabilitation and have emphasized need for treatment and services which, they argue, if adequately funded and administered with regard to "what works" best for specific populations of offenders, can reduce crime by rehabilitating offenders6 . Other critics of the new punitiveness in criminal justice point both to the expense and the injustice of these policies, especially as they have impacted minority communities7. But the retributive paradigm has become popular not because of the efficiency of punishment but because, in the minds of policymakers and the public, punitive sanctions serve to affirm community disapproval of proscribed behavior, denounce crime, and provide consequences to the lawbreaker.8 The treatment model, on the other hand, clearly fails to accomplish these functions. Rather, treatment appears to be unrelated to the offense, related solely to the needs of lawbreakers, and to require nothing of offenders beyond participation in counseling or remedial services. It is difficult to convince most citizens that treatment programs provide anything other than benefits to offenders (e.g., services, educational and recreational activities), and there is little in the message of the treatment response which attempts to communicate to an offender that he or she has harmed someone and should take action to repair damages wreaked upon the victim(s). Increasingly, critics from a variety of different perspectives are beginning to view the obsession with offender punishment and treatment in the current response to crime as one-dimensional and insular. Too often the treatment and punishment intervention paradigms reduce the justice function and process to a simplistic choice between helping or hurting offenders, and hence fail to address and balance the multiple justice needs of communities. In addition, these approaches share an insular, "closed-system" focus on the offender that ignores the needs of crime victims and other citizens and fails to engage them effectively in the response to crime. Moreover, with the exception of libertarian perspectives,9 all promote expanding the reach and responsibility of the criminal justice system, while in some cases undercutting the role of communities in the response to crime. In repairing the harm caused by crime, restorative responses necessarily elevate the role of crime victims in the justice process. Because victims have been neglected as a client of criminal justice systems,13 much of the literature and practice of restorative justice in the past decade has focused on victim reparation and involvement. 14 But restorative justice does not pose "victim rights" against the rights of offenders. Nor does it view advocacy for victims needs and involvement as a zero-sum game which is incompatible with a concern with the needs and risks presented by offenders and with a concern with the general justice needs of communities.15 To date, however, there has been little specific discussion of the role of offenders in restorative justice once they have been held accountable by repairing harm to the victim and victimized community. Is there a "restorative" approach to offender reintegration, or would offenders simply be punished and/or provided with standard correctional treatment? I will argue that restorative justice principles imply a unique approach to offender rehabilitation that necessarily involves victim and community, symbolically if not always actively, in the reintegrative process. This process, that I will refer to here as "earned redemption,"16 requires a sanctioning approach that allows offenders to "make amends" to those they have harmed in order to earn their way back into the trust of the community.17 To be effective, reintegration ceremonies focused on earned redemption would also require that rehabilitative efforts work in close harmony with these sanctioning processes, with efforts to promote safer communities, and with the efforts to meet the needs of crime victims. Finally, a process of earned redemption must be built upon naturalistic, rather than expert-driven processes of maturation and reintegration in communities. The primary purpose of this chapter is to explore prospects for expansion of earned redemption as a restorative justice model of offender reintegration. In Part I of this paper, I first attempt to place the reintegration issue in the larger context of restorative justice as an evolving, emerging movement and paradigm for criminal and community justice that is primarily distinguished by an emphasis on the role of victims and communities in the justice process. Part II describes three general components of a restorative justice model of reintegration, which give primary emphasis to refocusing criminal justice sanctions and the sanctioning process. The discussion and conclusion outlines structural and cultural obstacles to implementing such an approach in the U.S. and considers a basic strategy for linking what have thus far been micro-level responses to crime to the larger task of systemic criminal justice reform. Receive support, assistance, compensation, information and services. Receive restitution and/or other reparation from the offender. Are involved and are encouraged to give input at all points in the system and direct input into how the offender will repair the harm done. Have the opportunity to face the offenders and tell their story to offenders and others if they so desire. Feel satisfied with the justice process. Provide guidance and consultation to justice professionals on planning and advisory groups. Complete restitution to their victims. Provide meaningful service to repay the debt to their communities. Must face the personal harm caused by their crimes by participating in victim offender mediation, if the victim is willing or through other victim awareness process. Complete work experience and active and productive tasks which increase skills and improve the community. Are monitored and supported by community adults as well as justice professionals and are supervised to the greatest extent possible in the community. Improve decisionmaking skills and have opportunities to help others. Are involved to the greatest extent possible in holding offenders accountable, rehabilitation, and community safety initiatives. Work with offenders on local community service projects. Provide support to offenders as mentors, employers, and advocates. Provide work for offenders to pay restitution to victims and service opportunities which provide skills and also allow offenders to make meaningful contributions to the quality of community life. Community groups assist families to support the offender in obligation to repair the harm and increase competencies. Play an advisory role to courts and corrections and/or play an active role in disposition through one or more neighborhood sanctioning process. been rare. Moreover, there are already multiple tendencies and priorities within what might be called a restorative justice "movement" and several competing philosophical, ideological, and theoretical themes in the restorative justice literature.20 However, many apparently new initiatives are actually modern adaptations of ancient settlement and dispute resolution practices. n The Sumerian Code of UrNammu (c. 2060BC) required restitution even in the case of violent offenses. n The Roman Law of the Twelve Tables (449 BC) required convicted thieves to pay double the value of stolen goods, and more if the thief had concealed the stolen goods in his or her home. The earliest surviving collection of Germanic tribal laws (the Lex Salica promulgated by King Clovis soon after his conversion to Christianity in AD 496) includes restitutionary sanctions for offenses ranging from homicides to assaults to theft. n Ethelbert the Anglo-Saxon ruler of Kent, England, issued the Law of Ethelbert (c. AD600) containing detailed restitution schedules. For example, the laws differentiated the value of the four front teeth from those next to them, and those teeth from all the rest. While any justice agency can add new programs, programmatic reform in the absence of change in values and priorities is unlikely to lead to restorative outcomes. If only 10 percent of offenders are referred to a court’s restitution program, for example, and similar proportions complete meaningful community service, or meet with their victims, the jurisdiction can hardly be said to be "restorative." Although the restorative justice framework has been developed and refined based on a process of examining innovative programs and processes such as restitution, community service, victim offender mediation and FGC rather than through a more deductive process,43 programs are not ends in themselves but simply a means to achieve outcomes that should flow from a clear understanding of community and other client needs.44 In most criminal and juvenile justice systems, staff roles and management imperatives are seldom examined to ensure that they are driven by these needs and expectations. The reality, unfortunately, is that in justice systems more concerned with incapacitation, deterrence, and offender-focused interventions, restorative practices and programs remain on the margins, and generally receive low priority. Criminal justice reform is nothing new. However, as closed-system initiatives, few if any modern reforms have been spurred by community input but have instead been system-driven, and often top-down and reactive, responses to crisis and abuse. Like the treatment and punishment paradigm, on which they are based, modern reform efforts have been insular and one-dimensional, and while system-driven, no reform has been truly systemic. While many modern reforms have brought about well-intended improvements, whether focused on diversion, deinstiutionalization, case management, detention crowding, or due process concerns, these reforms share a piecemeal quality in their focus on one component or system function. Most criminal justice reforms have sought to rationalize and improve the structure, process and techniques by which offenders are treated and punished, but have not questioned why we do so or the nature of the intervention enterprise. At the end of most reform initiatives, paid professionals continue to administer treatment, punishment, and offender surveillance outside the context of the offender’s and victim’s community. As they fail to address other community concerns that crime surfaces, it is little wonder that these interventions often do not mean much to offenders, victims, and other citizens. professionals "do" in the response to crime — as well as resource allocation and management approaches, are based primarily on tradition and the needs of criminal justice bureaucracies (e.g., for police officers, guards, case workers) and on the current skills and role definitions of criminal justice professionals. Innovation, when it occurs, is often based on the addition of specialized units or programs, and often seems to be driven by the need to be in step with the "program trend of the month." What is most "new" and different about restorative justice theory and practice, however, is its three-part agenda for systemic reform in the response to crime based on the priority given to repairing harm, by involving victim, community and offender in the justice response and attempting to address the diverse justice needs of communities. First, restorative justice advocates propose broad changes in the justice process itself which ultimately shifts the focus more toward community rather than criminal justice system solutions, and seeks to build capacity in communities to sanction crime, reintegrate offenders, repair harm to victims, and promote genuine public safety. In this regard, genuine systemic reform makes possible a questioning of basic values and assumptions about crime, as well as the ends and means of the response to it. Systemic reform initiatives therefore first raise questions about the context of intervention: what values, principals, and assumptions define the essence of crime and what should be done about it; who should the system serve as "clients" and who should be involved in the response to crime and in making decisions about intervention, and by what process should these decisions be made (see figure 1). Second, as the right side of figure 1 suggests, based on the answers to these questions and an effort to develop intervention aimed at meeting community needs and expectations, systemic reform would then seek change in the mission of criminal justice. Such change would focus on the content of intervention: what goals and performance outcomes are sought as the justice system seeks to address the needs of its clients, what messages are to be communicated, and what changes in clients are to be brought about as a result of intervention; what methods — programs and intervention practices — will be used to accomplish these goals. While current policy is often program-driven, systemic reform would ensure that program priorities are value-driven and that practices are selected based on their capacity to accomplish mission outcomes. Finally, the choice of intervention priorities should then dictate the structure of the criminal justice system and thus determine what staffing patterns, resources, and professional roles are required to carry out these interventions and accomplish system goals. Hence, while current policy and reform begins with the current structure and seeks to make changes in procedure and programs, systemic reform ends with questions about structure after holistic change in content and context has been addressed (see Figure 1). n Different Outcomes: While the ultimate, long-term intervention goal of most criminal justice systems is reduced recidivism, short-term objectives are often elusive or limited to incapacitation and provision of services. In restorative justice, intervention outcomes seek change not just in offenders, but in each of three clients focused on healing, repair, reintegration, safety and sense of community. These outcomes move beyond efforts to punish offenders or deliver treatment in the traditional sense and are designed to address multiple justice needs/expectations based on restorative principles. Examples include: proportion of victims involved in and satisfied with the justice process; proportion of offenders completing restitution and community service agreements; number of citizens involved in crime prevention, sanctioning, offender mentoring and victim services; reductions in fear of crime and in school violence; and number of offenders completing work and service experiences and increasing attachment to conventional groups. n Different Program Priorities: While there is no single restorative justice practice or program, accomplishing these objectives assumes that several programs and practices focused on repairing harm to the victim, holding offenders accountable, and enhancing public safely and peacemaking, would get priority under restorative justice. Restorative programs and practices include a range of interventions aimed at meeting public safety, sanctioning, and rehabilitative, as well as victim restoration objectives (see table 2). Restitution to Crime Victims: It is important that payment be clearly linked to the victim, even if it is processed through the court and that young offenders be provided opportunities to earn funds to repay victims (e.g., through employment programs). Victim Offender Mediation: Offenders meet with victims and a third party mediator to allow the victim to obtain information about the crime and express feelings to the offender, to develop a reparative agreement, and to increase offender awareness of the physical, emotional, and material impact of crime. Direct Service to Victims: At the victim’s request (usually through mediation or other process), offenders are required to perform direct service. Service to Surrogate Victims: Offender work crews (Crime Repair Crews) repair homes and businesses damaged by break-ins and vandalism. Restorative Community Service: Work which is valued by the community and often suggested by neighborhood groups or by crime victims; such service often helps the disadvantaged, promotes economic development or improves the general quality of life. Service Chosen by the Victim: Victims recommend service projects for offenders as part of a mediation agreement. Payment to Victim Service Fund: Offenders pay to support victims services when restitution to their specific victim is not needed. Victim Impact Statements: With approval from the victim, young offenders can read victims’ impact statements or listen to and view audio/video statements, that tell how the crime detrimentally affected the victim and his/her loved ones. Victim/Offender Mediation: A well-planned constructive dialogue facilitated by a mediator trained in both juvenile justice and victimology tenets, that can increase victim satisfaction and develop mutually agreed-upon plans that hold the offender accountable for her/his actions. Victim Awareness Programs: Incorporate an educational model that helps youthful offenders understand the impact their crimes have on their victims, their communities, their families and themselves, and include crime victims as guest speakers. Criminal justice professionals cannot begin to change their missions (outcomes, practices, and management protocols) without a clear understanding of restorative values, the role of clients/ co-participants, and the new decisionmaking process needed to gain their input and participation. These values, participants and processes form the context for restorative justice reform and are discussed briefly below before considering the specific issue of offender reintegration. Victim Active participation in defining the harm of the crime and shaping the obligations placed on the offender. Community Responsible for supporting and assisting victims, holding offenders accountable, and ensuring opportunities for offenders to make amends. Offender Active participation in reparation and competency development. Sanctioning Facilitate mediation; ensure that restoration occurs (by providing ways for offenders to earn funds for restitution); develop creative and or restorative community service options; engage community members in the process; educate community on its role. Rehabilitation Develop new roles for young offenders which allow them to practice and demonstrate competency; assess and build on youth and community strengths; develop partnerships. Public Safety Develop range of incentives and consequences to ensure offender compliance with supervision objectives; assist school and family in their efforts to control and maintain offenders in the community; develop prevention capacity of local organizations. Viewed through the restorative "lens," crime is understood in a broader context than what is suggested by the questions of guilt and what should be done to punish or treat the offender. Howard Zehr argues that, in restorative justice, three very different questions receive primary emphasis.47 First, what is the nature of the harm resulting from the crime? Second, what needs to be done to "make it right" or repair the harm? Third, who is responsible? This assumed incompetence of the formal justice system and the need for a different set values, a different sense of the coparticipants in the justice process, and better ways to involve them in decisionmaking processes is best seen by examining the experience of these coparticipants in two cases. Recently, in a large city a 32 year-old man entered the home of a neighbor, and walked upstairs into the bedroom of her 14 year-old daughter. For almost an hour, the man made lewd and offensive comments while sitting on the girl’s bed. After the man had been arrested and charged, the young woman and her mother were asked by the court to complete a victim impact statement. Except for a brief moment when the man had lightly stroked her hair, she had not been physically molested by the intruder. Yet, the young girl had felt traumatized and "dirtied" by the fact that the man had sat on her bed. After talking at length with her mother, the two decided that what the girl most needed was a new bed. The victim impact statement submitted asked for $500 in restitution from the offender to cover the cost of the bed, an apology, and a recommendation for a year of therapy and other assistance for the offender. The judge ordered 12 months’ jail time and a $500 fine, but payable to the court. In a small town in the same state, a 14-year-old male, after pointing a loaded gun (which was actually a BB rifle) at a neighbor, was arrested, charged with second degree assault with a deadly weapon, and taken juvenile court intake in the small town where he resided. The neighbor, an adult male of about 35 who had been so frightened and upset by the incident that he insisted the case be fully prosecuted, was reluctantly persuaded to participate with the offender in a victim offender mediation session. At the session, after venting his anger and frustration at being startled with the loaded weapon, the victim learned that the boy liked to hunt. When he asked in the mediation session whom the boy hunted with and learned that it was his grandfather, an idea emerged that he would later propose when it was time to discuss an appropriate sanction. The outcome of the mediation was that, at the victim’s request, the boy would be required to tell his grandfather what he had done. After several days of reluctant hesitation, the boy told his grandfather and so informed the victim. The experiences in each case were dramatically different for the offender, the victim, and even the community. Most audiences who have heard the young man’s story believe that he learned an important lesson (and did not get off easy) and that the victim was satisfied. Moreover, some have observed that the small community may have witnessed an important example of how a dispute that might otherwise have created a serious offense record for the youth, wasted court time, provided little relief to the victim, and created fear in the community of "armed and dangerous" juveniles could be effectively resolved. In the first case, most agree that the victim was ignored and again victimized, that the offender got no treatment and might even have been more dangerous at the completion of his jail time, and that the community paid the cost of the jail term while receiving little in return. Most who hear the young girl’s story are also upset with the judge in the first case for ignoring the victim’s request. But while the conversion of the victim’s request for restitution into a court fine seems especially insensitive, the judge was merely operating on the basis of the assumptions of the current system of justice decisionmaking. Referred to by some as a retributive justice paradigm,51 these assumptions result in the exclusion and disempowerment of victims, offenders and other citizens and, in part, are responsible for the general absence in most criminal justice systems of the co-participant involvement depicted earlier in Table 1. Although these cases are not necessarily typical, the experiences of victim, offender, and community parallel those that occur daily in criminal justice agencies everywhere. In addition, the contrast between them provides a useful illustration of how client needs are not addressed effectively by an approach to dispositional decisionmaking that is limited by rigid, rule-driven, impersonal procedures focused on defining "winners and losers" and fixing blame52 (see table 4). Crime is an act against state, a violation of law, Crime is an act against another person. community or an abstract idea. a. The threat of punishment deters crime. b. Punishment changes behavior. Crime control lies primarily in the community. The criminal justice system controls crime. Victims are peripheral to the process. Victims are central to the process. No encouragement for repentance and make reparation. While it places central emphasis on victim needs and the requirement that offenders are held accountable to victims, the restorative justice paradigm also responds to the "mutual powerlessness" of offenders and victims in the current system and assumes the need for communities to provide opportunities for offender repentance and forgiveness following appropriate sanctioning.58 Restorative processes, whose potential benefits to each co-participant are illustrated by the first case, work best when there is active participation of victim, offender and community. They, therefore, demand opportunities for such participation that are sensitive to and supportive of victim and citizen needs. Although court proceedings with some flexible discretion by judges and other court decision makers could accommodate some of the changes needed to increase such active involvement, critics of the formal, retributive justice structure agree that minor changes in the court process will be insufficient to alter the current focus of these insular systems that have proved themselves inadequate to the task.59 Achieving restorative goals and the general vision of restorative justice is therefore likely to require expanded use of nonadversarial and less formal community decision making alternatives that allow for greater and more meaningful involvement of citizens and victims in decisions about the response to those who commit crimes and rely heavily on informal conflict resolution based on dialogue and negotiation. Table 5 suggests some promising existing models for victim and citizen participation in decision making. In the past five years, an explosion of interest in these new models has been a major catalyst behind support for restorative justice. n In inner-city Pittsburgh, young offenders in an intensive day treatment program solicit input from community organizations about service projects the organizations would like to see completed in the neighborhood. The offenders then work with community residents on projects that include home repair and gardening for the elderly, voter registration drives, painting homes and public buildings, and planting and cultivating community gardens. Victim Offender Mediation - Trained mediators facilitate face-to-face discussion between offender and victim to allow for expression of feelings, discussion of harm and obligation, and arrive at agreement with offender to repair the harm. Family Group Conferencing - Allows for community, victim and family input into the development of a restorative sanction for juvenile offenders in a process initiated by a trained facilitator. Circle Sentencing - A sentencing and problem-solving process currently being implemented in Canada facilitated by a judge or community member and attended by victim, offenders and a variety of local citizens who support both and wish to develop a local resolution of the crime. Community Reparative Boards - Currently being implemented in Vermont, these citizen sentencing panels develop agreements with nonfelony offenders that focuses their probation on victim and community reparation, understanding of harm caused by their crime, avoiding future offending behavior. Reparative Court Hearings - Though best implemented in an informal community setting, some judges hold special hearings to determine victim reparation as a separate part of the dispositional process in court. n In South Florida, youthful offenders, sponsored by the Florida Department of Juvenile Justice and supervised by The 100 Black Men of Palm Beach County, Inc., plan and execute projects that serve a shelter for the care and treatment of abused, abandoned, and HIV positive/AIDS infected infants and children. n In cities and towns in Pennsylvania, Montana and Minnesota—as well as in Australia and New Zealand—family members and other citizens acquainted with an offender or victim of a juvenile crime gather to determine what should be done in response to the offense. Often held in schools, churches or other community-based facilities, these Family Group Conferences are facilitated by a Community Justice Coordinator or Police Officer, and are aimed at ensuring that offenders are made to hear community disapproval of their behavior, that an agreement for repairing the damage to victim and community is developed and a plan for reintegrating the offender is designed and executed. n In Cleveland, ex-offenders mentoring young offenders in juvenile justice programs work with chores and faith communities to provide shopping and support services for the home-bound elderly. n In Minnesota, Department of Corrections staff collaborate with local police and citizens groups to establish FGC programs and ways to inform the community about and involve them in offender monitoring and victim support. In Dakota County, a Minneapolis suburb, local retailers and senior citizens whose businesses and homes have been damaged by burglary or vandalism call a crime repair "hotline" to request a work crew of probationers to repair the damage. n In secure facilities for young offenders operated by the California Youth Authority, crime victims organize victim awareness training and crime impact panels designed to sensitize offenders to the personal harm resulting from their crimes. n In Deschutes County, Oregon, juvenile offender work crews cut and deliver firewood to senior citizens and recently worked with a local contractor to build a homeless shelter. n In the city of Whitehorse, Yukon and other Canadian towns and villages, First Nation as well as non-aboriginal citizens sit sometimes for hours in a circle listening to offenders, victims, their advocates and other community members speak about the impact of crimes. When the feather or "Talking Stick" is passed to them and it is their turn to speak without being interrupted, they may comment favorably on rehabilitative efforts already begun by the offender, who may be a chronic and sometimes violent perpetrator well known to the community. Speakers in these Circle Sentencing (CS) sessions also express concerns for the victim or the continuing threat posed by the offender and, at the end of the session, attempt to come to consensus about a rehabilitative plan for the offender and an approach to healing victim and the community. n In several Montana cities, college students and other young adult "core members" in the Montana Conservation Corps supervise juvenile offenders on environmental restoration, trail building and other community service projects and also serve as mentors to one or more of the young offenders. What do these examples have to do with reintegration or rehabilitation? Very little, if the reference is to most treatment programs in most criminal justice systems in the U.S. While it is possible to find similar activities in various locations around the world, those interventions are viewed by many justice professionals — and most correctional program staff — as "side shows." They are clearly not viewed as part of the rehabilitative agenda of most courts and corrections agencies. Yet, these case studies contain at least some of the seeds of a new way of thinking about rehabilitation and reintegration that is focused less on treating offenders than on building communities; less on new treatment programs and more on institutional reform to promote youth development; less on counseling to improve self-image and more on changing the public image of people in trouble who have earned their way back into the community; less on criminal justice "experts" and more on building connections between offenders and community residents. The value of restorative justice to victims and communities goes well beyond the primary concern of this paper with meaningful offender reintegration. In addition, the current climate of "get tough" responses to crime provides few opportunities for meaningful discussion of offender reintegration and acceptance, whether or not it is earned. The principles of restorative justice, however, provide some hope for promoting a new way of thinking about both sanctioning and reintegration that make possible, and even encourage, offender repentance, and begin to create cultural prototypes for community reacceptance of offenders who have "made amends" for the harm they have caused. Forgiveness has been an important concept implicit in much restorative writing, and explicit in some.60 However, forgiveness has become an unpopular term in the crime victims' movement because it has been identified with an overt or implied coercion of victims to forgive the offender and a suggestion that those who do not, or cannot, are less worthy of justice system concern and support.61 But while reintegration through earned redemption does not imply any obligation on the part of victims, it does imply some tradition of societal mercy and some basic level of community capacity to forgive, if not to forget, the actions of offenders once they have made reparation to individual victims and victimized publics.62 Hence, rather than look to correctional programs or treatment models, this concern with "earned redemption" suggests that it is more important to look to community dynamics and the link between communities, crime, sanctioning and public safety. Partly because of the emphasis in restorative justice practice and literature on the victim-offender dyad,63 the community role as coparticipant in restorative processes has been the least well developed. The role of the community in offender reintegration, and in a sanctioning process consistent with reintegrative efforts, is the cornerstone of a theory of restorative rehabilitation. Increasing the capacity of community groups and institutions to demonstrate collective mercy and develop strategies to reintegrate offenders who have earned their way back into the "good graces" of the community is thus a major agenda for restorative justice advocates. Because restorative justice ideas have in fact emerged "from the field," it has been said that the restorative framework is largely practice in search of a theory of crime. But while restorative practice is not associated with a specific etiological perspective, restorative justice principles are consistent with several traditions in criminological theory.64 At the macro level, ecological theories of community and crime focus on the relationship between structure and culture as manifested in social disorganization and the inability of informal controls to limit deviant behavior.65 Of special salience here are emerging attempts to develop a theory of neighborhood "collective efficacy" based on recent research conducted in Chicago.66 This research, which compared crime rates in some of that city's poorest neighborhoods, found significant differences in crime rates between neighborhoods virtually identical in income and ethnic composition. This finding led the study's authors to conclude that the level of community organization and mutual support was the primary factor in low crime rates. Specifically, differences in the willingness of neighbors to support other families and to intervene in the lives of children were shown to characterize low crime neighborhoods. It is in this emphasis on crime as both a cause and result of weak or damaged relationships between community members that restorative justice may have the most to offer in reconceptualizing current approaches to intervention with both victims and offenders. At the micro level, social control perspectives67 emphasize the importance of the "bond" individuals have to conventional groups. This bond can in turn be viewed as culturally and structurally fixed in the roles individuals assume in the context of socializing institutions (e.g., family, work, school) and it is these roles that account for informal constraints on deviant behavior. Such constraints are based on affective ties to significant others (teachers, parents), as well as on a more rational "stake in conformity" that limits individual involvement in crime by the risk criminal behavior poses to the future legitimate opportunities.68 These constraints may in turn be weakened by the stigmatizing and isolating nature of current justice responses, or they may be strengthened by responses which sanction crime in a way that strengthens relationships between victim, offender, and community. Against this theoretical backdrop, the restorative view of crime and community can be understood with reference to a familiar cycle of crime, fear, withdrawal, isolation, weakened community bonds, and more crime.74 This sequence provides an important key to thinking about patterns of crime, community dynamics, and the reaction to offenders75 and about the capacity of community norms and tolerance limits to control harmful behavior and to reinforce law-abiding behavior. The more connected community members are, the more likely they are to restrain criminal impulses. As community bonds are weakened, the power of community disapproval as a force restraining crime is reduced. Crime harms victims, communities, offenders, other citizens, and in essence damages the social fabric and peace of communities.76 While it is impossible to say which comes first, citizens, crime victims, offenders are caught up in a cycle in which crime is both a cause of breakdowns in individual and community relationships, and a result of these breakdowns. One of the most basic themes in restorative justice is the need to strengthen or rebuild social and community relationships.77 Restorative justice responses to crime attempt to break into the cycle of crime, fear and weakened relationships, and in so doing offer a holistic approach to addressing the sanctioning, safety, preventative, peacemaking, and rehabilitative needs of communities. In the case of delinquent young people, the intervention approach to achieve rehabilitation, integration, and habilitation would have the primary objective of strengthening bonds to conventional groups and would, as in conventional maturation processes, be centered around developing and enhancing youth/adult relationships. From a restorative perspective, this would begin with the small "communities of concern"83 around the offender and branch outward as the offender increases her/his ability to build and manage relationships and strengthen both affective and rational ties to conventional adults and adult institutions. The broader relational rehabilitation "project" would then be focused on a community and institutional learning process by which members practice, create and replicate models of offender reintegration. It goes almost without saying that the criminal and juvenile justice systems were not set up to support or enhance this kind of relationship-building. Rather than strengthen bonds between offenders and community groups, correctional treatment programs are individualistic interventions designed to "cure" psychological problems or remediate presumed deficits. Based on an individual treatment, or "medical model," paradigm that generally locates the cause of crime and delinquency in individual offenders, this approach is theoretically and practically insular and one-dimensional. At best, treatment programs may seek to influence family dynamics — but often with little or no theoretical guidance about how and why the family intervention effort is in any way related to the offender’s behavior.84 For the most part, treatment programs are decontextualized attempts to address the offender’s thinking and behavior in settings isolated from crime victims and victimized communities, in which the real harm that resulted in the offender’s criminal justice involvement is no longer viewed as relevant. Juvenile justice interventions, for example, target individual youth rather than adults and adult institutions for change and fail to address the role of relationships, group conflict, and institutional and community processes in crime causation.85 Moreover, such interventions do not take account of how these factors may either promote or hinder rehabilitation. By promoting an implicit view of habilitation and rehabilitation as something that happens in treatment programs, the treatment model also fails to build on naturally occurring supports that may enhance positive relationships and bonds with conventional community adults.86 The insular focus on offender deficits and disturbances also supports a closed-system of intervention outcomes which are effectively limited to successful adjustment and accommodation to the regime of treatment programs87 and which define success almost exclusively in terms of process measures (e.g., number of clients served, number of program graduates, successful program completion), rather than outcomes relevant to reintegration.88 Finally, treatment programs have increasingly taken responsibility away from communities and the socializing institutions (e.g., schools & work) that serve them. In reinforcing the value of treatment "experts" and highly specialized services, while downplaying the role of nonprofessionals, treatment programs distance the rehabilitative enterprise from communities and the real people in them. First, if there is to be a restorative justice "theory" of reintegration, it must therefore include a concern with the extent to which community and victim are meaningfully engaged in a more integrated justice process and the extent to which key community needs other than the need for offender rehabilitation are addressed. An underlying premise of restorative justice is the idea that offenders are not well served when the needs of victims and community are neglected and when these two coparticipants are not in some way involved in the process. More than this, the logical and theoretical assumptions of restorative justice suggest that it is difficult to effectively address the needs of any one juvenile justice client without involving and addressing the needs of the other two. For example, from a restorative perspective, important first steps in an offender’s rehabilitative or reintegrative process include a feeling of shame or remorse and an effort to make amends;94 the voluntary involvement of victims and community to the greatest extent possible in holding the offender accountable is an important component of this process. Similarly, to make progress toward healing and restoration, many victims rely on the reparative actions of offenders and the community, to provide restitution, acknowledge their suffering, provide information and support, and express apology and remorse. When justice is viewed as repairing the harm, and rebuilding damaged relationships, the response to crime must attend to all of those damaged by the crime. Completing treatment programs does not solve these problems of connectedness and lack of legitimate identity of young offenders. While treatment programs may be helpful, being "drug free," for example, does not give young offenders the skills needed for access to those roles (in work, family & community) that provide law-abiding adults with a stake in conformity. A restorative approach to rehabilitation would seek to enhance those competencies which help young offenders develop positive relationships with conventional adults, and would seek to increase the capacity of adults and adult organizations to allow young offenders to demonstrate competency by creating new roles for youth to contribute productively to their communities. Increasing vocational, educational, social and interpersonal and decisionmaking competencies, for example, is best accomplished through an effort to provide young offenders access to roles which engage them experientially in productive activities including work, community service, and conflict resolution. Policy and intervention strategy must then build upon and seek to enhance the capacity of both socializing institutions such as school and work, as well as informal networks and processes to support reintegration. Elsewhere I have addressed this third component of an approach to offender reintegration based on restorative justice and youth development principles in a more comprehensive way.99 The remainder of this chapter therefore focuses primarily on the first and second theoretical projects. To do so, I address need for a new approach to sanctioning, and an integration of sanctioning and rehabilitation functions as a means of improving the prospects for "earned redemption." Because sanctioning offenders has so commonly been thought of only in terms of the narrow objectives of "just punishment," — or as Christie suggests, to cause pain to the offender,100 — it is especially important to think about the resonance, or lack of it, between sanctioning and rehabilitative interventions. "Project One," the focus on the needs and involvement of victims, offenders, and community in all interventions, is incorporated in this discussion. Punishment, by stigmatizing, humiliating and isolating the offender, may have a counter-deterrent effect by minimizing prospects that the offender may gain or regain self-respect and the respect of the community.101 Ironically, punishment often encourages lawbreakers to focus on themselves rather than the person they harmed as the victim102 and may undermine self-restraint by attenuating natural feelings of shame and a sense of morality103 while weakening community bonds by damaging family, peer, and other adult relationships.104 Although the current trends in most of the world (and certainly in the U.S.) seems to be to move more in the direction of punitive sanctions that maximize harm to the offender,105 the continuum of possible sanctions ranges from those intended primarily to threaten or harm offenders (and would be offenders), which generally emphasize incarceration, to other approaches which may build community solidarity and commitment and ultimately strengthen the bonds between offenders and community members. From this perspective, expressive sanctioning aimed at communicating value-based messages to offenders and the community and affirming obligations and accountability should be more effective in regulating conduct and more likely to promote community solidarity and peaceful dispute resolution.109 Although punitive sanctions may detract from the accomplishment of both reparative and rehabilitative goals, if intended to educate, sanctions can, as Durkheim pointed out, reinforce obligation and responsibility, and provide an understanding of the suffering caused to other individuals that resulted from an offender’s crime.110 Such a sense of obligation, as modern communitarians would argue, can strengthen bonds and reinforce a sense of justice.111 From a restorative perspective, sanctioning should be first focused on repairing the harm to victims and the community, and in so doing, allowing communities an outlet for symbolic, collective denunciation of crime, as well as the affirmation of tolerance limits.112 But while sanctions are intrusive and coercive and should not be disguised as "treatment," the sanctioning process has important implications for any rehabilitative approach. When carried out based on restorative principles, sanctions may themselves have rehabilitative impact. Unfortunately, reparative sanctions have been criticized unfairly by a group of treatment researchers119 who have for the most part ignored, misread, or misinterpreted positive (or at least encouraging) findings from experimental and other empirical studies of the impact of restitution and community service as well as promising results on victim offender mediation, victim impact panels, family group conferences and related interventions.120 A major distortion of this critique has been a tendency to portray all sanctions as negative and as detracting from the reintegrative process,121 and a failure to distinguish theoretically and empirically between sanctions with reparative focus and aim such as victim restitution and restorative community service, and sanctions with solely punitive or deterrent intent. In their list of programs that do not work, for example, Krisberg, Currie and Onek122 reinforce this tendency by including restitution and community service — along with "shock incarceration," "Scared Straight," and Boot Camps — in a category of interventions they conclude are ineffective, and possibly harmful. But sanctions that reinforce and affirm values about obligations to others and provide benefit to the community do not detract from rehabilitative goals, and it seems foolish at best not to consider the possibility that such sanctions could have independent rehabilitative impact. Are we to believe that meeting with one’s victim, paying restitution, or completing community service is as demeaning, stigmatizing, and humiliating as being forced to clean toilets in a Boot Camp? Does community service in which youth work with adults to build a community shelter for abused women123 provide the same experience as a chain gang? Being required to face one’s victim or face the community and work to repair the harm caused by one’s crime may well be tougher and more painful for offenders than standard punishments focused on incarceration.124 But, in lumping such dramatically different sanctions as Boot Camps and restitution together and discounting the contextual importance of the sanctioning function, critics ignore the intent of sanctions and reinforce by default the one-dimensional approach to rehabilitation. Most important, politically, they strengthen the hands of those policymakers promoting truly harmful, retributive sanctions. In the absence of an alternative sanctioning model,125 treatment is in any case most likely to be used as an add-on to destructive punishments whose impact is likely to counter any possible positive effects. Yet, as is the case with restitution or victim-offender mediation programs, the impact of spending two hours in an FGC should not be expected to produce remarkable results and does not offer a complete model of rehabilitation.134 There is nothing easy about the restorative justice process, and it will in fact require far more time up-front, as well as follow-up time than formal court processes. Offenders will not be quickly "cured," and as Braithwaite & Mugford suggest, several family group conferences may be necessary before an offender "gets the message."135 As an ex-felon, who is now an active leader in a local community juvenile justice committee in northern Canada and mentor for young offenders participating in circle sentencing processes told Judge Barry Stuart, "I’m still a crook... I still want to sell and use drugs and fence stereo equipment. But if I do that, I lose this connection. It’s this connection here (the community justice committee) that makes me not do it." Practically, from a rehabilitative perspective, these community sanctioning models provide one possible "gateway" to engage community support for offender reintegration at a time when this is a very difficult political enterprise. Some have suggested, however, that what may be most important about these community sanctioning processes is their potential for increasing citizen participation in and support for reintegrative processes by providing a sense of ownership over a primary justice decisionmaking function.139 As the quote from Judge Stuart at the beginning of this section suggests, citizen involvement may also widen the range of offenders viewed as acceptable for community sanctioning to include serious and violent lawbreakers generally viewed as beyond eligibility for reintegrative processes. The "hook" to attract such community support is that citizens who had formerly been uninvolved and concerned about offenders only in the abstract, and then often as objectives of punishment, will be more willing to participate when given the opportunity for input into sanctioning decisions. Once involved in this way, restorative justice advocates assume, citizens will be more likely to also better understand the needs of the offenders (as well as those of victims) and will be more likely to also support a reintegrative agenda for offenders who fulfill their obligations through a restorative process of earned redemption. Although the more obvious criticisms of restorative justice can be answered persuasively, numerous obstacles remain to widespread expansion of a restorative agenda in the U.S. Both generic questions about restorative justice and specific questions about the prospects for offender reintegration based on development and expansion of processes of earned redemption need to be addressed. Restorative justice advocates do not have all the answers for criminal justice reform or for changing the community response to crime. Although addressing the range of criticisms of this "new paradigm" is beyond the scope of this paper, several of the most common questions about restorative justice can be at least provisionally answered. 3. Victims, Communities and Offenders as Obstacles — Numerous questions remain about the practicality and overall effectiveness of restorative approaches. Common concerns focus, for example, on assertions that "victims are angry and punitive and do not want to have anything to do with the offender;" "offenders have no empathy, are incompetent, and are incapable of restoring the loss or harm caused by their crimes;" "the community is apathetic and citizens do not wish to be involved;" or "juvenile justice workers are required to spend too much time in court or doing paperwork and have not been trained to work with the community." Interestingly, criminal justice professionals committed to achieving the restorative justice goals view these very rationales for opposing the approach as precisely the reasons a new mission is necessary.145 That is, if victims are angry and offenders lack skills and empathy, a primary objective should be to develop interventions that facilitate changes in offender empathy and competency and attempt to meet the needs of victims and ask them for their input. If citizens seem apathetic, a primary objective should be to work toward reducing community apathy and non-involvement and strengthening neighborhoods by changing the nature of current practices and decision-making processes. Finally, if staff do not have time or skills to perform such tasks, it may be time to reexamine and consider changing priorities and incentives. Many "baby-boomers" and older generations often recall a time when adults in their neighborhoods or small towns took responsibility for "looking after" neighborhood children other than their own. In effect, community members, with the encouragement and support of police, schools, and other institutions, often "took care of " problems that now end up in juvenile courts or diversion programs. One of the things neighborhood adults did, as Braithwaite155 reminds us, is reinforce community standards, norms and expectations. These adults set community tolerance limits, and through verbal or other sanctions (including telling our parents), often persuaded young people to refrain from whatever troublemaking or annoying behavior they were involved in. As adults were involved in expressing disapproval of behavior they viewed as wrong, they maintained a relatively strong system of informal social control. While it is possible to simply write these actions off as nostalgic memories of a different era — and some of these social control techniques were discriminatory and undemocratic — we can also examine cultural and structural forces that have fundamentally limited the capacity of neighborhoods to develop common tolerance limits.156 Moreover, it is important to ask questions about the ways in which criminal justice intervention itself may have reinforced a process by which community adults, and adult institutions, appear to have become helpless and hapless in socializing young people. Several developments in U.S. criminal justice have expanded the government role in social control while undercutting the community’s role. The movement away from informal, neighborhood policing which emphasized local responses to crime to centralized intake bureaus where juvenile justice professionals process young offenders through courts and treatment programs157 is one example. Similarly, three decades of failure in the experience with juvenile diversion programs in the U.S.158 can teach related lessons about the intrusiveness and expansiveness of early intervention programs and the social service bureaucracies that support them. The problem with diversion and the centralization and specialization of the response to crime was the failure to distinguish between interventions that strengthened youth commitments and youth-adult relationships and those that further stigmatized and excluded young people, isolated youth from conventional adults, and usurped the community’s responsibility. A relational approach to offender rehabilitation must at some point confront social service bureaucracies which focus primarily on deficiency and exclusion and which, in the attempt to provide help, actually minimize the prospects for bonding and relationship building. In place of this youth service and individual treatment model, a new intervention paradigm is needed which seeks to rediscover and, if necessary, reinvent ways for communities to begin to take back the responsibility for youth socialization and offender rehabilitation. Citizens who look closely at the causes of crime suspect that courts and justice systems have already reached beyond their competence in the effort to control crime, sanction offenders, or build safer communities.160 Similarly, government cannot be solely responsible for rehabilitating offenders. The "good news" is that most offenders "age out" of crime or experience "maturational reform."161 While this process doesn’t happen magically, it typically has nothing to do with treatment programs. Rather, known institutional and social ecological factors — notably a job, family ties (both family of origin and family of choice), access to higher education, and community supports — are primarily responsible.162 Moreover, the resiliency of young people in high risk neighborhoods seems to be due to one relatively simple factor: the ongoing presence of one or more caring adults (not necessarily parents) who are able to provide them with ongoing support and access to roles which allow them to develop legitimate identities.163 What is of most significance is the role of the relationships most young offenders eventually build with other law-abiding citizens in their own communities. Hence, effective strategies for long-term rehabilitation must maximize neighborhood ties and seek to enhance those nonprofessional adult relationships. But naturalistic does not mean "naturally occurring." There is nothing accidental about reintegration and a relational strategy based on restorative principles is not a libertarian approach. Moreover, there is nothing magical about "the community," and identifying and mobilizing citizens to allow for a greater community role in rehabilitation will require a very intentional strategy which redefines, rather than seeks to eliminate the government role.164 Hence, a naturalistic approach to rehabilitation would build on a general belief in the capacity of communities and nonprofessional adults, if encouraged and supported, to develop and assist young people in getting through problems such as delinquency and growing up. Relational rehabilitation would maximize use of informal support networks while minimizing use of formal social control and professional intervention services. Currently, in the U.S. we appear to lack two essential ingredients necessary to make the restorative justice response to crime more than a marginal and ancillary feature of the current predominately retributive criminal justice response. To move forward with an agenda for offender reintegration based on earned redemption, it is necessary to consider how the restorative justice project, which necessarily consists of micro efforts to repair harm to victims and victimized communities, might interact with more macro efforts to build a supportive culture of redemption and to develop structural paths which support integration and reintegration. In the U.S. in particular, however, the prospect of a more systemic and societal application of earned redemption must confront both cultural and structural obstacles. One typical response to restorative justice arguments about offender reintegration is that when it comes to young people in much of the Western world, we lack even an approach to integration.166 The increasing structural separation of young people from adults is indeed both a cause of crime and a formidable barrier to even a productive dialogue about offender reintegration. Addressing this separation as an international problem of marginalization of young people will require a dramatic shift in work and educational policies and priorities. Such a shift requires a willingness to confront structural economic changes that have created an international crisis of youth marginalization.167 This crisis is, of course, greatly exacerbated for young minority people as illustrated graphically by rates of unemployment for 16-19 year old African-Americans that in recent years have run as high as three times those for whites (the white rate has averaged approximately 20 percent). While the emphasis on the personal "communities of concern" around offender and victims as discussed above is a useful beginning in the effort to define community in terms useful for criminal justice intervention, this focus has little apparent relationship to a macro reintegration strategy based on earned redemption. One initial linkage proposed by Braithwaite and Parker is to begin to connect community sanctioning and reintegration ceremonies to what they refer to as "vibrant social movement politics."170 The purpose of such a linkage is to address structural inequities directly implicated in race and class bias in the criminal justice process, while also checking the potential tyranny of both state and community. Infusing more macro, movement politics into such micro processes as FGC, victim offender dialogue, or circle sentencing, on the one hand, runs the risk of altering the dynamic of these ceremonies in a way that may alienate some participants. On the other hand, broader community and social justice concerns which appear to be clearly grounded in movement politics have been a consistent feature of some of these efforts to devolve, and assume community control over, justice decisionmaking. In fact, community control over justice processes has been a strong driving force among those Canadian and New Zealand aboriginals, although the devolution movement in these communities has been as much about local ownership as indigenous solidarity.171 Similar initiatives could possibly build on anti-criminal justice system sentiments in African-American and Hispanic communities in the U.S. in a way that encourages local community-building to improve the response to crime. Case One - In San Diego the tragic shooting of the teenage son of a well-to-do San Diego businessman by a 14-year old gang member after the man’s son had refused to give him a pizza was to result in the transfer of the offender’s case to adult court for disposition. Rather than seek waiver of his son’s killer to adult court, the father, who blamed the state of California for allowing teenagers such easy access to guns, chose to reach out to the grandfather of the boy both for a resolution to this case and to develop a potential solution to the broader problem of youth violence. After a series of meetings that involved the extended families of the father of the victim and the offender, the father and grandfather formed a national coalition dedicated to remedying the two conditions the father blamed for his son’s shooting: the ready availability of guns to teenagers and the need for training in peaceful alternatives to resolving conflict among young people. Case Two - A St. Paul Minnesota man, whose home had been burglarized and his possessions (including several valuable antiques) badly damaged by a vandalism spree of two young neighborhood boys, recognized that his neighborhood lacked the sense of community he once felt. Feeling some personal responsibility for this breakdown in relationships as well as anxiety about his loss, the victim suggested to the prosecutor in the case that a meeting with the offenders be arranged in hope that he might involve them in an effort to do something in the neighborhood to restore a sense of community. After this suggestion was rebuffed by the prosecutor who explained that the courts were "interested in consistency, not creativity," the man — with the support of victim-offender mediation case workers — arranged a block party in which the offenders were required to work with him to prepare a barbeque for neighborhood residents. It is apparent that cultural expectations in those societies and communities that find an easy fit between restorative justice and criminal justice support and encourage offender confession and repentance for their wrongdoing. Once this occurs, it is also assumed that societal forgiveness and an effort to reintegrate the offender will be forthcoming.172 Building support for earned redemption within a culture of blame and retribution based on what one observer labeled "constitutionalized revenge" presents enormous challenges. One of the greatest of these challenges is the mutually reinforcing character of a justice system focused on fixing blame and determining punishment by means of the most adversarial process in the world and the tendency of offenders to deny guilt — or admit to the lowest acceptable charge until a plea agreement can be negotiated. On the one hand, the current attempt to "import" processes that use shame and remorse in ways that promote repentance, forgiveness, and resolution in such a culture runs a substantial risk of perverting these concepts. On the other hand, despite these cultural obstacles, the cases described above, however atypical they may appear in the American cultural context, are not unique. Moreover, the cultural significance of a few widely publicized cases that seem to stretch the concepts of forgiveness and repentance to the limit could enhance the strength of emerging grassroots support by providing a kind of "folklore" that illustrates a much wider range of possibilities in the community response to crime. In addition, consistent with Naroll’s theory of "snowballs,"173 as reintegrative sanctioning ceremonies are repeated and publicized often enough in what some see as a period in which policymakers are sensing that they have reached the limits of the punitive and treatment reactions, a community and cultural learning process may take place.174 Such a process may allow these alternatives to slowly seep into the cultural repertoire of potential responses to crime and to the harm crime causes. Proponents of restorative justice approaches are indeed engaged in micro attempts to "build community" from the ground up using the vehicle of sanctioning ceremonies. While the prospects of such activity bringing about systemic change in criminal justice seem remote, other examples from community organizing suggest that it is often one signifying incident (e.g., a police shooting) that mobilizes neighborhoods to implement reforms. It might not stretch this analogy too far to argue that new awareness of the crime problem in a community, growing problems with neighborhood young people, concern about increased victimization, or a particularly disturbing case, could, in the context of an effective participatory community sanctioning model, provide a "wake-up" call to a few individuals who band together to initiate fundamental change in the response to crime. 1.Conservative philosophers have generally enshrined punishment as the cornerstone of moral authority and thus the priority for intervention in response to crime, and have little faith in the capacity of most offenders to change behavior except in response to the threat of coercive responses centered primarily on incarceration (van den Haag, 1975). Liberal approaches have traditionally focused on rehabilitative approaches that seek to treat the assumed underlying causes of crime. Based on the idea that criminal justice intervention must be kept to a minimum, proponents of libertarian approaches, emphasize procedural restrictions on the system because they are equally skeptical of the motives of those seeking to either punish or treat offenders (Platt, 1977; Rothman, 1980), and are concerned that intervention, no matter what the intent, often makes matters worse (AFSC, 1967; M. Lemert, 1971; E. Schur, 1972). 2. B. Feld, "The Punitive Juvenile Court and the Quality of Procedural Justice: Distinctions Between Rhetoric and Reality," Crime & Delinquency 36 (1990); B. Feld, "The Criminal Court Alternative to Perpetuating Juvenile in Justice," The Juvenile Court: Dynamic, Dysfunctional, or Dead? (Philadelphia: Center for the Study of Youth Policy, School of Social Work, University of Pennsylvania, 1993), 3-13; D.R. Gordon, The Justice Juggernaut (New Brunswick, NJ: Rutgers University, 1991); M. Tonry, Malign Neglect, Race, Crime and Punishment in America (New York: Oxford University Press, 1995). 3. H. Zehr, Changing Lenses: A New Focus for Crime and Justice (Scottsdale, PA: Herald Press, 1990); M. Umbreit, Victim Meets Offender: The Impact of Restorative Justice and Mediation (Monsey, NY: Criminal Justice Press, 1994). 4. F.T. Cullen & J.P.; Wright, "The Future of Corrections," The Past, Present, and Future of American Criminal Justice, ed. B. Maguire and P. Radosh (New York: General Hall, 1995). 5. The retributive/punitive paradigm that emerged in the juvenile justice system in the 1980s was in no way a pure "just deserts" approach. (Thompson & McAnany 1984). Rather, retributive justice, as implemented, combines the emphasis on the primacy of punishment philosophy and certain policy trappings (e.g., determinate sentencing guidelines) of just deserts with a general concern with deterrence, incapacitation and more traditional punitive objectives. 6. F.T. Cullen & K.E. Gilbert, Reaffirming Rehabilitation (Cincinnati: Anderson, 1982); B. Krisberg, The Juvenile Court: Reclaiming the Vision (San Francisco: National Council of Crime & Delinquency [NCCD], 1988); P. Gendreau & R. Ross, "Correctional Treatment: Some Recommendations for Successful Intervention," Juvenile and Family Court Journal 34 (1994): 31-40. 9. AFSC, Struggle for Justice; E. Schur, Radical Nonintervention (Berkeley: University of California Press, 1972); Feld, "The Criminal Court," 3-13. 11. Zehr, Changing Lenses; D. Nan Ness, et. al., "Restorative justice Practice," Monograph (Washington, DC: Justice Fellowship, 1989). 12. Zehr, Changing Lenses; Van Ness, "New Wine and Old Wineskins: Four Challenges of Restorative Justice," Criminal Law Forum 4 (1993): 251-76; G. Bazemore, "Three Paradigms for Juvenile Justice," in The Practice of Restorative Justice, ed. Joe Hudson and Burt Galaway (Monsey, NY: Criminal Justice Press, 1996). 13. R. Elias Victims Still: Political Manipulation of Crime Victims (Newbury Park, CA: Sage, 1993); Bazemore, "Understanding the Response to Reforms Limiting Discretion: Judges’ Views of Restrictions on Detention Intake," Justice Quarterly 11 (1994): 429-53. 14. Indeed, restorative justice is often equated with one program, victim offender mediation (Umbreit, 1994; M. Wright, 1991). There is good reason, however, for this emphasis on victims in restorative justice. Early research and theoretical discussion of practices such as restitution and even victim-offender mediation was, on the contrary, almost exclusively offender-focused, giving primary emphasis to use of these sanctions to promote diversion or alternatives to incarceration. The term "restorative justice" is generally attributed to Albert Eglash. (A. Eglash, 1975). "Client" as used in this paper refers to an individual or group that receive services from a governmental agency based on need and are targeted for intervention by the agency intended to change behavior or alter their current situation. A "coparticipant" is actively engaged in the government intervention process as a key decisionmaker. 15. G. Bazemore & M. Umbreit, "Rethinking the Sanctioning Function in Juvenile Court: Retributive or Restorative Responses to Youth Crime," Crime and Delinquency 41 (1995): 296-316; Zehr, Changing Lenses. 16. Although the term "earned redemption" has probably been used before in various contexts, I credit its use in the modern restorative justice movement to Dennis Maloney, Director, Deschutes County Department of Community Corrections, Bend, Oregon. 17. K. Pranis, "Communities and the Justice System: Turning the Relationship Upside Down," paper presented before the Office of Justice Programs, U.S. Department of Justice, Washington, DC (1996). 18. Van Ness, et.al., "Restorative Justice Practice." 19. Bazemore, "Three Paradigms"; M.J. Dooley, Reparative Probation Program (Vermont Department of Corrections, 1995). 20. G. Bazemore, "What’s New About the Balanced Approach?" Juvenile and Family Court Journal 48 (1997): 1-23. 21. Van Ness, "New Wine and Old Wineskins," 251-76; Zehr, Changing Lenses. 23. R.J. Michalowski, Order, Law, and Crime (New York: Random House, 1995); Van Ness, et.al., "Restorative Justice Practice." 24. Van Ness, et.al., "Restorative Justice Practice." 25. Weitekamp, "The History of Restorative Justice." 26. Van Ness, et.al., "Restorative Justice Practice." 27. Monarchs who succeeded William, competed with the church’s influence over secular matters and effectively replaced local systems of dispute resolution. In 1116, William’s son, Henry I, issued the Leges Henrici securing royal jurisdiction over certain offenses against the king’s peace, including arson, robbery, murder, false coinage, and crimes of violence. 28. S. Schafer, Compensation and Restitution to Victims of Crime (Montclaire, NJ: Smith Patterson, 1970). 29. J. Hudson, et.al., "Research of Family Group Conferencing in Child Welfare in New Zealand," in Family Group Conferences: Perspectives on Policy and Practice (Monsey, NY: Criminal Justice Press, 1996); A. Schneider, "Restitution and Recidivism Rates of Juvenile Offenders: Results from Four Experimental Studies," Criminology 24 (1986): 533-52; Umbreit, Victim Meets Offender. 30. Zehr, Changing Lenses; J. Hudson, et.al., "Research of Family," 1-16; Bazemore & Umbreit, "Rethinking the Sanctioning," 296-315. 31. E. Barajas Jr., "Moving Toward Community Justice," Topics in Community Corrections (Washington, DC: National Institute of Corrections, 1995); C.T. Griffiths and R. Hamilton, "Spiritual Renewal Community Revitalization and Healing: Experience in Traditional Aboriginal Justice in Canada," International Journal of Comparative and Applied Criminal Justice 20 (forthcoming); B. Stuart, "Circle Sentencing: Turning Swords Into Ploughshares," in Restorative Justice International Perspectives, eds. B. Galaway and J. Hudson (Monsey, NY: Kugler Publications, 1996): 193-206. 32. M. Young, "Restorative Community Justice: A Call to Action," report for National Organization for Victim Assistance, Washington, DC (1995); G. Bazemore & M. Schiff, "Community Justice/Restorative Justice: Prospects for a New Social Ecology for Community Corrections," International Journal of Comparative and Applied Criminal Justice 20 (1996): 311-35. 33. J. Robinson, "Research on Child Welfare in New Zealand," in Family Group Conferences: Perspectives on Policy and Practice, eds. J. Hudson, B. Galaway, A. Morris and G. Maxwell (Monsey, NY: Criminal Justice Press, 1996): 49-64. 34. J. Belgrave, "Restorative Justice: A Discussion Paper" (Wellington, New Zealand: New Zealand Ministry of Justice, 1996); Dooley, Reparative Probation Program. 36. Young, "Restorative Communitive Justice." 37. M. Sparrow, et.al., Beyond 911 (New York: Basic Books, 1990); M. Moore & R. Trojanowicz, "The Concept of Community," Perspectives on Policy No. 6 (Washington, DC: United States Department of Justice, National Institute of Justice, 1988). 38. Griffiths and Hamilton, "Spiritual Renewal"; A. Melton, "Indigenous Justice Systems and Tribal Society," Judicature 70 (1995): 126-33. 39. M.K. Harris, "Moving into the New Millenium: Toward a Feminist Vision of Justice," in Criminology as Peacemaking, eds. H. Pepinsky & R. Quinney (Bloomington, IN: Indiana University Press, 1990), 83-97; C.G. Bowman, "The Arrest Experiments: A Feminist Critique," in Taking Sides: Clashing Views on Controversial Issues in Crime and Criminology, ed. R. Monk (Gilford, CT: Dushkin Publishing Group, 1994), 186-91. 40. J. Braithwaite & P. Petit, Not Just Desserts: A Republican Theory of Criminal Justice (Oxford: Clarendon Press, 1992); Bazemore & Umbreit, "Rethinking the Sanctioning"; L. Walgrave, "The Restorative Proportionality of Community Service for Juveniles: Just a Technique or a Fully-Fledged Alternative?" Howard Journal of Criminal Justice, 34 (1995): 228-49. 41. Philosophically and politically, a restorative approach is also consistent with insights from the new communitarianism (e.g., Etzioni, 1993; Moore & O’Connell, 1994) both in its demand for active involvement of citizens in community problem solving and skepticism about the ability of government to resolve problems (e.g., Van Ness, et.al., 1989; Stuart, 1995). Restorative justice principles are also consistent with recent developments in both private sector and public management focused on reinventing organizational responses to "customers" (Deming, 1996; Martin, 1993), as well as with concepts from the environmental movement focused on sustainable growth. 42. Many of these new practices in fact address that portion of the reform agenda of restorative justice aimed at establishing a community-based alternative to the formal justice system and the need to transform justice decisionmaking processes to better accommodate the needs and interests of victims, offenders and communities. Both are discussed in subsequent sections. 43. Zehr, Changing Lenses; J. Braithwaite & S. Mugford, "Conditions of Successful Reintegration Ceremonies: Dealing with Juvenile Offenders," British Journal of Criminology 34 (1994): 139-71. 44. H. Goldstein, "Improving Policing: A Problem-Oriented Approach," Crime and Delinquency 25 (1979): 236-58; H. Goldstein, "Toward Community-Oriented Policing: Potential, Basic Requirements and Threshold Questions," Crime and Delinquency 33 (1987): 6-30. 45. Zehr, Changing Lenses; Van Ness, "New Wine and Old Wineskins." 46. K. Pranis, "From Vision to Action," Church & Society 87 (1997): 32-42; Stuart, "Circle Sentencing." 49. Pranis, "From Vision to Action." 51. Zehr, Changing Lenses; Bazemore and Umbreit, "Rethinking the Sanctions." 52. Zehr, Changing Lenses; H. Messmer and H. Otto, eds. Restorative Justice on Trial: Pitfalls and Potentials of Victim Offender Mediation:International Research Perspectives (Norwell, MA: Kluwer Academic Publishers, 1992). 53. S. Hillsman and J. Greene, "The Use of Fines as an Intermediate Sanction," in Smart Sentencing, eds. J.M. Byrne, A.Lurigio, and J.Petersilia (Newbury Park, CA: Sage Publications, 1992), 123-41. 54. C. Shapiro, "Is Restitution Legislation the Chameleon of the Victims’ Movement?" in Criminal Justice, Restitution, and Reconciliation, eds. B. Galaway and J. Hudson (Monsey, NY: Willow Tree Press, 1990), 73-80. 56. M. Umbreit, "Holding Juvenile Offenders Accountable: A Restorative Justice Perspective," Juvenile & Family Court Journal 46 (1995): 31-41; Bazemore, "Understanding the Response." 57. Elaine Berzins, quoted in Stuart, "Circle Sentencing." 58. Wright, "Justice for Victims and Offenders"; Zehr, Changing Lenses. 61. Young, "Restorative Community Justice." 62. Indeed the experience with victim-offender mediation and some research on crime victims’ attitudes suggest that victim mercy toward offenders may be less at issue than the capacity of community groups and certainly public officials to forgive (Umbreit, 1994; Pranis and Umbreit, 1992). 63. Umbreit, Victim Meets Offender; Wright, "Justice for Victims and Offenders." 64. D. Karp, Community Justice, Research Seminar on Community, Crime, and Justice (George Washington University/National Institute of Justice, Washington, DC, 1997); Bazemore, "Three Paradigms." 65. R.J. Sampson and W.B. Groves, "Community Structure and Crime: Testing Social-Disorganization Theory," American Journal of Sociology 94 (1989): 774-802; Karp, Community Justice. 66. R. Sampson, S. Rodenbush, and F. Earls, (1997) "Neighborhoods and Violent Crime: A Multi-level Study of Collective Efficacy," Science Magazine, Vol. 277, August. 67. T. Hirschi, Causes of Delinquency (Berkeley, CA: University of California Press, 1969); T. Rose, & T. Clear, 1998, "Incarceration, Social Capital & Crime: Implications for Social Disorganization Theory." Criminology, 36(3), 471-479. 68. S. Briar and I. Piliavin, "Delinquency, Situational Inducements, and Commitments to Conformity," Social Problems 13 (1965): 35-45; K. Polk and S. Kobrin, Delinquency Prevention Through Youth Development (Washington, DC, Office of Youth Development, 1972). 69. E.H. Sutherland and D.R. Cressy, Criminology, 10th Edition (Philadelphia: Lippincolt, 1978). 71. Braithwaite and Mugford, "Conditions of Successful Reintegration." 72. H. Garfinkel, "Conditions of Successful Degredation Ceremonies," American Journal of Sociology 61 (1956): 420-4; Stuart, Sentencing Circles; Wright, "Justice for Victims and Offenders." 73. At this interactional level, restorative justice is also consistent with a growing body of empirical research on the role of informal sanctions such as shame, embarrassment and the role of significant others in promoting conformity to conventional norms (Thompkins, 1992; Retzinger & Scheff, 1997). 74. Pranis, "From Vision to Action." 75. A.J Reiss and M. Tonry, eds., Communities and Crime (Chicago: University of Chicago Press, 1986). 76. Van Ness, et.al., "Restorative Justice Practice." 77. Van Ness, et.al., "Restorative Justice Practice"; Stuart, Sentencing Circles; Pranis, "From Vision to Action." 79. Van Ness, et.al., "Restorative Justice Practice." 80. N. Christie, Limits to Pain (Oxford: Martin Robertson, 1982); F. Schweigert, Learning the Common Good: Principles of Community-Based Moral Education in Restorative Justice (St. Paul, MN: University of Minnesota, 1997). 82. J. Braithwaite, Crime, Shame, and Reintegration (New York: Cambridge University Press, 1989). 83. Braithwaite and Mugford, "Conditions of Successful Reintegration." 84. G. Bazemore and S. Day, "The Return to Family Interventions in Youth Service: A Juvenile Justice Study in Policy Implementation," The Journal of Sociology & Social Welfare 22 (1995): 25-50. 85. Reiss and Tonry, eds., Communities and Crime. 86. K. Pittman and W. Fleming, "A New Vision: Promoting Youth Development," Testimony to House Select Committee on Children, Youth and Families, Academy for Education and Development, Washington, DC, September 1991; J.H. Brown and J.E. Horowitz, "Why Adolescent Substance Abuse Prevention Programs Do Not Work," Evaluation Review 17 (1993): 5. 87. G. Melton and P.M. Pagliocca, "Treatment in the Juvenile Justice System: Directions for Policy and Practice," in Responding to the Mental Health Needs of Youth in Juvenile Justice, ed. J.J. Cocozza (Seattle, WA: National Coalition for the Metnally Ill in the Criminal Justice System, 1992), 107-39. 88. R.W. Scott, Organizations: Rational National, and Open Systems (Englewood Cliffs, NJ: Prentice-Hall, 1987). 89. I.M. Schwartz, "Public Attitudes Toward juvenile Crime and Juvenile Justice: Implications for Public Policy," in Juvenile Justice Policy, ed. I. Schwartz (Lexington, MA: Lexington books, 1992), 225-50. 90. Bazemore and Umbreit, "Rethinking Sanctioning." 91. Braithwaite and Mugford, "Conditions of Successful Reintegration," 5. 92. K. Polk, "Family Conferencing: Theoretical and Evaluative Questions," in Family Group Conferencing and Juvenile Justice: The Way Forward or Misplaced Optimism?, eds. C. Adler and J. Wundersitz (Canberra, ACT: Australia Institute of Criminology, 1994), 155-68; James Wilson, The Truly Disadvantaged (Chicago: University of Chicago Press, 1987). 93. It is ironic then that a discipline such as criminology so grounded in sociological theories about the complex and community-oriented causes of crime at times appears atheoretical and willing to beg the basic question of whether anyone should expect young offenders to be rehabilitated — habilitated and reintegrated — in settings that involve limited and relatively short-term individually-focused treatment by experts detached from communities. This basic suspension of doubt is not apparently shared by average citizens (and juvenile justice professionals) when they remind us that young offenders — even in the best treatment program — will go back to the same neighborhoods they came from. Although theories of crime have come primarily from sociology, it is clear that the treatment paradigm has been almost exclusively influenced by abnormal psychology and clinical social work. 94. Schneider, "Restitution and Recidivism"; Braithwaite and Mugford, "Conditions of Successful Reintegration." 95. Van Ness, "New Wine and Old Wineskins"; G. Bazemore and C. Terry, "Developing Delinquent Youth: A Reintegrative model for Rehabilitation and a New Role for the Juvenile Justice System," Child Welfare, forthcoming (1997). 96. This concept of "resonance" was first articulated by Troy Armstrong (see Armstrong, Maloney & Romig, 1990). 97. Van Ness, et.al., "Restorative Justice Practice"; Stuart, "Circle Sentencing"; M. Brown and K. Polk, "Taking Fear of Crime Seriously: The tasmanian Approach to Community Crime Prevention," Crime & Delinquency 42 (1996): 398-420. 98. Hirschi, Causes of Delinquency. 99. Bazemore and Terry, "Developing Delinquent Youth"; G. Bazemore, "After the Shaming, Wither Reintegration: Restorative Justice and Relational Rehabilitation," in Restoring Juvenile Justice, eds. G. Bazemore and L. Walgrave (Amsterdam: Kugler International Publications, forthcoming 1998). 100. Christie, Limits to Pain. 101. T. Makkai and J. Braithwaite, "Reintegratiive Shaming and Compliance with Regulatory Standards," Criminology 31 (1994): 361-85; Bazemore and Umbreit, "Rethinking the Sanctioning." 102. Wright, "Justice for Victims and Offenders." 103. E. Durkheim, Moral Education: A Study in the Theory and Application of the Sociology of Education, trans. E.K. Wilson and H. Schnuter (New York: Free Press, 1961); D. Garland, Punishment and Moderns Society: A Study in Social Theory (Chicago: University of Chicago Press, 1990). 104. L. Zhang and S.F. Messner, "The Severity of Official Punishment for Delinquency and Change in Interpersonal Relations in Chinese Society," Journal of Research in Crime and Delinquency 31 (1994): 416-33. 105. Bazemore and Umbreit, "Rethinking the Sanctioning." 106. H. Packer, The Limits of the Criminal Sanction (Palo Alto, CA: Stanford University Press, 1968), 41, 296-316. 107. Braithwaite, Crime, Shame, and Reintegration; L.T. Wilkins, Punishment, Crime, and Market Forces (Bookfield, VT: Dartmouth Publishing Company, 1991); Garland, Punishment and modern Society. 108. Durkheim, Moral Education, 181-2; cited in Braithwaite, Crime, Shame, and Reintegration, 178. 109. Griffiths and Hamilton, "Spiritual Renewal"; Wilkins, Punishment. 112. Braithwaite, Crime, Shame, and Reintegration; Garland, Punishment and Modern Society; Wilkins, Punishment. 113. J. Butts and H. Snyder, Restitution and Juvenile Recidivism (Pittsburgh: National Center for Juvenile Justice, 1991); Schneider, "Restitution and Recidivism"; L. Walgrave and H. Geudens, "Community Service as a Sanction of Restorative Justice: A European Approach," paper presented at the Council Meeting of the American Society of Criminology, Chicago, November, 1996; M. Schiff, "The Impact of Restorative Interventions on Juvenile Offenders," in Restoring Juvenile Justice: Changing the Context of the Youth Crime Response, eds. G. Bazemore and L. Walgrave (Monsey, NY: Criminal Justice Press, forthcoming ). 114. Schneider, Deterrence and Juvenile Crime; M. Umbreit and R. Coates, "Cross-Site Analysis of Victim-Offender Conflict: An Analysis of Programs in These Three States," Juvenile and Family Court Journal 43 (1993): 21-8. 115. Umbreit, Victim Meets Offender. 116. Schneider, Deterrence and Juvenile Crime. 117. S. Tomkins, Affect/Imagery/Consciousness (New York: Springer, 1992). 118. Stuart, Sentencing Circles; Griffiths and Hamilton, "Spiritual Renewal." 119. B. Krisberg, et.al., "What Works with Juvenile Offenders: A Review of Graduated Sanction Programs," Criminal Justice (1995): 20; Gendreau and Ross, "Correctional Treatment." 120. Schiff, "The Impact of Restorative Interventions." 121. Gendreau and Ross, "Correctional Treatment." 122. Krisberg, et.al., "What Works." 123. G. Bazemore and D. Maloney, "Rehabilitating Community Service: Toward Restorative Service in a Balanced Justice System," Federal Probation 58 (1994): 24-35. 124. M. Crouch, "Is Incarceration really Worse? Analysis of Offenders’ Preferences for Prison Over Probation," Justice Quarterly 10 (1993): 67-88. 125. Bazemore and Umbreit, "Rethinking the Sanctioning." 126. Bazemore and Maloney, "Rehabilitating Community Service"; Bazemore and Umbreit, "Rethinking the Sanctioning"; Polk, "Family Conferencing." 127. Schneider, Deterrence and Juvenile Crime. 128. Bazemore and Maloney, "Rehabilitating Community Service"; Walgrave and Geudens, "Community Service." 129. Braithwaite and Mugford, "Conditions of Successful Reintegration"; Stuart, Sentencing Circles. 131. Braithwaite and Mugford, "Conditions of Successful Reintegration"; Stuart, Sentencing Circles. 132. Bazemore, G. (1997b) "The 'Community' in Community Justice: Issues, Themes and Questions for the New Neighborhood Sanctioning Models," The Justice System Journal, 19(2): 193-228; M. Umbreit and S. Stacy, "Family Group Conferencing Comes to the U.S.: A Comparison with Victim Offender Mediation," Juvenile and Family Court Journal 11 (1996): 29-39. 133. With the exception of victim offender mediation (VOM), few restorative sanctioning process have been to date rigorously evaluated. VOM studies show positive impact on offenders, to supplement clearly documented positive victim effects (Umbreit & Coates, 1993), and the various affect theories and related perspectives underlying the reintegrative shaming process in family group conferencing (Tomkins, 1992; Scheff & Retzinger, 1995; Moore & O’Connell, 1994) are providing further impetus for expansion of sanctioning processes aimed at reintegration as well as at holding offenders accountable (Maxwell & Morris, 1933; Hudson & Galaway, 1996). 134. C. Alder and J. Wundersitz, Family Group Conferencing and Juvenile Justice: The Way Forward or Misplaced Optimism? (Canberra, ACT: Australia Institute of Criminology, 1971); Bazemore, "After the Shaming." 135. Braithwaite and Mugford, "Conditions of Successful Reintegration." 136. Polk, "Family Conferencing"; Umbreit and Stacy, "Family Group Conferencing." 137. Braithwaite and Mugford, "Conditions of Successful Reintegration." 138. D. Kahan, "What do Alternative Sanctions Mean? The University of Chicago Law Review 63 (1996): 591-653; Garfinkel, "Conditions of Successful Degredation." 139. Bazemore, "The ‘Community’ in Community Justice." 140. Few advocates of restorative justice argue that a restorative approach is likely to, or should, completely replace existing justice systems (at least not in the near future) (cf., Christie, 1982). In fact, the most common debate is over the extent to which energies should be focused on developing a parallel, informal, or "community justice," system along the lines of the dual-track Japanese model (Haley, 1989), or on efforts to modify the current formal system by changing the role and function of professionals to support restorative practices and processes. The restorative vision is, however, one of an entire justice system, and ancillary community networks, both with a variety of flexible options to meet the needs of the three clients at any point in the justice process. 141. Feld, "The Punitive Juvenile Court." 142. Messmer and Otto eds., Restorative Justice on Trial. 143. J. Eisenstein and H. Jacob, Felony Justice: An Organizational Analysis of Criminal Courts [2nd edition] (Boston: Little Brown, 1991); J. Hackler, The Possible Overuse of Not Guilty Pleas in Juvenile Justice (Edmonton, Alberta: Centre for Criminological Research., University of Alberta, 1991). 144. Even if restorative justice options were restricted only to those who admit guilt through plea bargaining or other mechanism, they would still be applicable for the vast majority of criminal and juvenile court cases. Moreover, in contrast to the "individualized" justice especially characteristic of juvenile courts and the traditional treatment model, restorative justice acknowledges and builds on group and community responsibility for crime (Van Ness, 1993; McElrae, 1993; Braithwaite and Parker, 1998) rather than simply directing blame — and thus sanctions or treatment — at individual offenders. In short, there is little debate that an adversarial system is needed, especially and primarily for decisions about guilt and innocence, but much agreement that this system could be improved if it received fewer cases and/or was modified to be more attentive to client needs. 145. Bazemore and Day, "The Return to Family." 146. Braithwaite and Mugford, "Conditions of Successful Reintegration"; P. Robinson, "Hybrid Principles for the Distribution of Criminal Sanctions," Northwest University Law Review 19 (1987): 34-6. 147. Braithwaite and Mugford, "Conditions of Successful Reintegration." 148. Braithwaite and Mugford, "Conditions of Successful Reintegration"; Young, "Restorative Community Justice." 149. Wright, "Justice for Victims and Offenders." 150. Barajas, "Moving Toward Community Justice." 151. K. Daly, "Shaming Conferences in Australia: A Reply to the Academic Skeptics," paper presented at the American Society of Criminology, Chicago (1996). 152. Bazemore and Walgrove, Restoring Juvenile Justice. 153. Sampson, Rodenbush and Earls, "Neighborhoods and Violent Crime: A Multi-level Study of Collective Efficacy;" Elliot, "Serious Violent Offenders." 154. D.B. Moore, "Illegal Action--Official Reaction," unpublished paper (Canberra, ACT: Australian Institute of Criminology, 1994): 9. 155. Braithwaite, Crime, Shame, and Reintegration. 156. Braithwaite, Crime, Shame, and Reintegration; Haley, "Confession"; R.J. Sampson and J. Wilson, "Toward a Theory of Race," in Crime and Urban Inequality, eds. J. Hagan and R.D. Peterson (Stanford, CA: Stanford University Press, 1995), 37-54. 157. Wilson, The Truly Disadvantaged. 158. J.T. Whitehead and S.P. Lab, Juvenile Justice: An Introduction (Cincinnati, OH: Anderson, 1996); M. Ezell, "Juvenile Arbitration: New Widening or Other Unintended Consequences," Journal of Research in Crime and Delinquency 26 (1992): 358-77. 159. J. McKnight, The Careless Society: Community and its Counterfeits (New York: Basic Books, 1995), 20. 161. G. Bazemore, "Delinquent Reform and the Labeling Perspective," Criminal Justice and Behavior 12 (1985): 131-69; D. Elliott, "Serious Violent Offenders: Onset, Development Course, and Termination," (The American Society of Criminology 1993 Presidential Address) Criminology 32 (1994): 1-25. 162. Elliott, "Serious Violent Offenders." 163. M. Rutter, "Resilience in the Face of Adversity: Protective Factors and Resistance to Psychiatric Disorder," British Journal of Psychiatry 147 (1985): 598-611. 164. Karp, Community Justice; Bazemore, "The ‘Community’ in Community Justice." 165. This is not to suggest that treatment providers lack skill and commitment, or that some treatments are not better than others, given the choices corrections administrators must make. Rather, the problem of avoiding "doing harm," like the obstacles to promoting positive youth development, is more systemic. Despite their unique professional focus, what the designating social service systems have in common is a deficit focus emphasizing identification of needs and risks and the provision of services intended to correct presumed deficits and dysfunctions. Just as youth do not "grow up in programs," treatment and service programs are often irrelevant to the larger social ecology or context in which maturation occurs (Halperin, et.al., 1995). 166. K. Polk, "The New Marginal Youth," Crime and Delinquency 30 (1984): 462-80. 167. Polk, "New Marginal Youth"; Sampson and Wilson, "Toward a Theory." 168. Halperin, et.al., "Introduction," 2-7; Bazemore and Terry, Developing Delinquent Youth"; A. Sum, et.al., "Confronting the Demographic Challenger: Future Labor Market Prospects of Out-of-School Young Adults," A Generation of Challenge: Pathways to Success for Urban Youth, A Policy Study of the Levitan Youth Policy Network, Monograph No. 97-03 (Baltimore: Johns Hopkins University, 1997): 13-45. 169. E. Currie, Reckoning--Drugs, the Cities and the American Future (New York: Hill and Wang, 1986), 12. 170. Braithwaite and Parker, "Restorative Justice." 171. Griffiths and Hamilton, "Spiritual Renewal." 172. Braithwaite, Crime, Shame, and Reintegration; Haley, "Confession." 173. R. Naroll, The Moral Order: An Introduction to the Human Situation (Beverley Hills, CA: Sage, 1983). 174. Stuart, Sentencing Circles; Braithwaite and Mugford, "Conditions of Successful Reintegration." 175. Schweigert, Learning the Common Good. 176. P.L. Benson, Creating Healthy Communities for Children and Adolescents (Minneapolis, MN: Search Institute, 1996). 177. Schweigert, Learning the Common Good, 27. 178. L. Walgrave, "Beyond Retribution and Rehabilitation: Restoration as the Dominant Paradigm in Judicial Intervention Against Juvenile Crime," paper presented at the International Congress on Criminology, Budapest, Hungary (1993), 9. Adler, C. & Wundersitz, J., (1994). Family Group Conferencing and Juvenile Justice: The Way Forward or Misplaced Optimism? Canberra, ACT: Australia Institute of Criminology. Andrews, D.A., Bonta, J., & Hoge, R. D., (1990). "Classification for Effective Rehabilitation: Rediscovering Psychology." Criminal Justice and Behavior, 17(1): 19-52. American Friends Service Committee (AFSC). (1971). Struggle for Justice. New York: Hill & Wang. Armstrong, T., D. Maloney, & D. Romig. (1990). The Balanced Approach in Juvenile Probation: Principles, Issues and Application. Perspectives, Winter, 8-13. Barajas, Jr., E., 1995. "Moving Toward Community Justice." Topics in Community Corrections, National Institute of Corrections, Washington D.C. Bazemore, G. (in press) "After the Shaming, Whither Reintegration: Restorative Justice and Relational Rehabilitation," in Restorative Juvenile Justice: Repairing the Harm of Youth Crime. Monsey, New York: Criminal Justice Press. Bazemore, G. (1997a). "What's New About the Balanced Approach?" Juvenile and Family Court Journal, 48(1), 1-23. Bazemore, G. (1997b) "The 'Community' in Community Justice: Issues, Themes and Questions for the New Neighborhood Sanctioning Models," The Justice System Journal, 19(2): 193-228. Bazemore, G. (1996). "Three Paradigms for Juvenile Justice." Chapter 2 in Joe Hudson and Burt Galaway (Eds.) The Practice of Restorative Justice. Monsey, New York: Criminal Justice Press. Bazemore, G. (1992). "On Mission Statements and Reform in Juvenile Justice: The Case of the ?Balanced Approach'," Federal Probation. 56(3): 64-70. Bazemore, G. (1985). "Delinquent Reform and the Labeling Perspective." Criminal Justice and Behavior, 12 (2): 131-169. Bazemore, G. & Day, S. (1995) "The Return to Family Interventions in Youth Service: A Juvenile Justice Study in Policy Implementation." The Journal of Sociology & Social Welfare. 22(3), 25-50. Bazemore, G. & Maloney, D. (1994). "Rehabilitating Community Service: Toward Restorative Service in a Balanced Justice System." Federal Probation. 58: 24-35. Bazemore, G. & M. Schiff. (1996). "Community Justice/ Restorative Justice: Prospects for a New Social Ecology for Community Corrections." International Journal of Comparative and Applied Criminal Justice, 20 (1): 311-335. Bazemore, G. & Terry, C. (1997). "Developing Delinquent Youth: A Reintegrative Model for Rehabilitation and a New Role for the Juvenile Justice System." Child Welfare, 76(5): 665-716. Bazemore, G & M. Umbreit. (1995b). "Rethinking the Sanctioning Function in Juvenile Court: Retributive or Restorative Responses to Youth Crime." Crime and Delinquency, 41(3): 296-316. Bazemore, G. & Lode Walgrave (Eds) (in press). Restorative Juvenile Justice: Repairing the Harm of Youth Crime. Monsey, New York: Criminal Justice Press. Becker, H. (1960). Studies in Sociology of Deviance. New York: Free Press. Belgrave, J. (1995) "Restorative Justice: a Discussion Paper." New Zealand Ministry of Justice. Wellington, New Zealand. Benson, P.L. (1996). Creating Healthy Communities for Children and Adolescents. Minneapolis, MN: Search Institute. Bowman, C.G., (1994). "The Arrest Experiments: A Feminist Critique." pp 186-191 in R. Monk (Ed.) Taking Sides: Clashing Views on Controversial Issues in Crime and Criminology. Gilford, Connecticut: Dushkin Publishing Group. Braithwaite, J. (1989). Crime, Shame, and Reintegration. New York: Cambridge University Press. Braithwaite, J. & Petit, P., (1992). Not Just Desserts: A Republican Theory of Criminal Justice. Oxford: Clarendon Press. Braithwaite, J. & C. Parker (in press). "Restorative Justice is Republican Justice" in Restorative Juvenile Justice: Repairing the Harm of Youth Crime, G. Bazemore & L. Walgrave (Eds.) Monsey, New York: Criminal Justice Press, in press. Braithwaite, J. & Mugford, S. (1994) "Conditions of Successful Reintegration Ceremonies: Dealing with Juvenile Offenders.? British Journal of Criminology. 34(2): 139-171. Briar, S. & I. Piliavin (1965)." Delinquency, Situational Inducements, and Commitments to Conformity." Social Problems 13 (1): 35-45. Brown, M & Polk, K. (1996) "Taking Fear of Crime Seriously: The Tasmanian Approach to Community Crime Prevention." Crime & Delinquency, Vol. 42, No. 3, July, 398-420. Brown J. H., & Horowitz, J. E. (1993). "Why Adolescent Substance Abuse Prevention Programs Do Not Work." Evaluation Review, (October), 17, 5. Butts, J. & Synder, H. (1991) Restitution and Juvenile Recidivism. Monograph. Pittsburgh, PA, National Center for Juvenile Justice. Christie, N. (1982). Limits to Pain. Oxford: Martin Robertson. Crouch, M. (1993) "Is Incarceration Really Worse? Analysis of Offenders' Preferences for Prison Over Probation," Justice Quarterly, 10:67-88. Cullen, F.T. & Gilbert K. E. (1982) Reaffirming Rehabilitation. Cincinnati: Anderson. Cullen, F.T. & Wright, J. P. (1995) "The Future of Corrections. ," In B. Maguire and P. Radosh (Eds) The Past, Present, and Future of American Criminal Justice. New York: General Hall. Currie, Eliot. (1986). Reckoning -- Drugs, the Cities and the American Future, New York: Hill & Wang. Daly, K. (1996). "Shaming Conferences in Australia: A Reply to the Academic Skeptics," paper presented at the 1996 American Society of Criminology: Chicago, IL. Dooley, M. J., (1995). Reparative Probation Program. Monograph. Vermont Department of Corrections. Durkheim, E. (1961). Moral Education: A Study in the Theory & Application of the Sociology of Education. Translated by E .K Wilson & H. Schnuter. New York: Free Press. Eglash, Albert, (1975). "Beyond Restitution: Creative Restitution.? pp. 91-101 in Restitution in Criminal Justice, edited by J. Hudson & B. Galaway. Lexington, MA: Lexington Books. Eisenstein, J. & Jacob, H. (1991). Felony Justice: An Organizational Analysis of Criminal Courts, 2nd ed. Boston: Little Brown. Elias, R. (1993). Victims Still: The Political Manipulation of Crime Victims. Newbury Park, CA: Sage. Elliott, D. (1994). "Serious Violent Offenders: Onset, Developmental Course, and Termination," The American Society of Criminology. 1993 Presidential Address. Reprinted from Criminology, 32,1. Etzioni, A. (1993). The Spirit of Community: Rights, Responsibilities and the Communitarian Agenda. New York: Crown Publishers. Ezell, M., (1992). "Juvenile Arbitration: Net Widening and Other Unintended Consequences." Journal of Research in Criminology & Delinquency. 26(1): 358-77. Feld, B. (1993). "The Criminal Court Alternative to Perpetuating Juvenile in Justice." pp. 3-13 in The Juvenile Court: Dynamic, Dysfunctional, or Dead? Philadelphia: Center for the Study of Youth Policy, School of Social Work, University of Pennsylvania. Feld, B. (1990). "The Punitive Juvenile Court and the Quality of Procedural Justice: Distinctions Between Rhetoric and Reality." Crime & Delinquency, 36:4. Finckenauer, J. O. (1982). Scared Straight! And the Panacea Phenomena. Englewood Cliffs, NJ: Prentice-Hall. Freedman, M., Harvey, C.A., & Venture-Merkel, C. (1992). "The Quiet Revolution: Elder Service and Youth Development in an Aging Society." Washington, DC: Task Force on Youth Development and Community Programs, Carnegie Council on Adolescent Development. Galaway, B. & J. Hudson (Eds). (1990). Criminal Justice, Restitution and Reconciliation. Massey, NY: Criminal Justice Press. Garfinkel, H., (1956). "Conditions of Successful Degradation Ceremonies," American Journal of Sociology, 61: 420-4. Garland, D. (1990). Punishment and Modern Society: A Study in Social Theory. Chicago, IL: University of Chicago Press. Gendreau, P., Cullen, F. & Bonta, J. (1994). "Up to Speed - Intensive Rehabilitation Supervision: The Next Generation in Community Corrections." Federal Probation, 58(1): 72-79. Gendrau P. & Ross, R. (1994). "Correctional Treatment: Some Recommendations for Successful Intervention." Juvenile and Family Court Journal. 34: 31-40. Goldstein, H., (1987). "Toward Community-Oriented Policing: Potential, Basic Requirements and Threshold Questions." Crime and Delinquency 33: 6-30. Goldstein, H. (1979). "Improving Policing: A Problem-Oriented Approach." Crime and Delinquency, 25: 236-58. Griffiths, C.T. & Belleau, C. (1993). "Restoration, Reconciliation and Healing - The Revitalization of Culture and Tradition in Addressing Crime and Victimization in Aboriginal Communities. ? Paper presented at the meeting of the 11th International Congress on August 13, 1997. Criminology, Budapest, Hungary. Guarino-Ghezzi, S. & Loughran, N. (1995). Balancing juvenile justice. New Brunswick, NJ: Transaction Publishers. Hackler, J. (1991). "The Possible Overuse of Not Guilty Pleas in Juvenile Justice," (Monograph). Edmonton, Alberta: Centre for Criminological Research, University of Alberta. Haley, J. (1989). "Confession, Repentance, and Absolution." pp. 195-211 in Mediation and Criminal Justice: Victims, Offenders and Community, edited by M. Wright & B. Galaway. London: Sage. Halperin, S., Cusack, J., O'Brien, R, Raley, G., & Wills, J. (1995). Introduction. pp.2-7. In Contract with America's Youth: Toward a National Youth Development Agenda. Harris, M. K., (1990). "Moving into the New Millennium: Toward a Feminist Vision of Justice." pp. 83-97, in H. Pepinsky & R. Quinney (Eds.), Criminology as Peacemaking. Bloomington: Indiana University Press. Hillsman, S. & Greene, J. (1992). "The Use of Fines as an Intermediate Sanction." pp. 123-41 in Smart Sentencing, edited by J.M. Byrne, A. Lurigio & J. Petersilia. Newbury Park, CA: Sage. Hudson, J., Galaway, B., Morris, A., & Maxwell, G. (1996) "Research of Family Group Conferencing in Child Welfare in New Zealand." pp. 1-16 in Family Group Conferences: Perspectives on Policy and Practice. Monsey, NY: Criminal Justice Press. Kahan, D., (1996). "What Do Alternative Sanctions Mean?" The University of Chicago Law Review, 63: 591-653. Karp, D., (1997). "Community Justice," Research Seminar on Community, Crime, and Justice. Monograph. George Washington University/ National Institute of Justice. Krisberg, B. (1988). The Juvenile Court: Reclaiming the Vision. San Francisco: National Council of Crime & Delinquency (NCCD). Krisberg, B. Currie, E. & Onek, D. (1995) "What Works with Juvenile Offenders: A Review of Graduated Sanction Programs," Criminal Justice, pg. 20, September.
2019-04-18T23:18:32Z
https://www2.gwu.edu/~ccps/Bazemore.html
There are a million things to do in Kyoto, but these were my personal favorites from my time in the most historical city in Japan. Here are my 10 best things to do in Kyoto: ** The most important advice I can give is to wake up as early as possible, I mean super early. 1. Rent a bike - this is the best way to beat the tourist traffic in Kyoto. --- 2. Bamboo Forest - Small forest in the neighboring area of Arashiyama. --- 3. Fushimi Inari Shrine - It is literally a mountain of hidden shrines, symbolic figurines and a seemingly never-ending pathway to spiritual enlightenment. --- 4. Ninja Dojo Class - Kyoto is the cultural mecca of Japan, and while you’re here its good to get a taste of that - be it fact or folklore. --- 5. Kyoto Samurai Experience - As you’ve seen in last week’s video, begin to understand the way of the warrior through samurai training. --- 6. Imperial Palace - Within Kyoto’s Central Park, is the Imperial Palace. Its a massive campus with pristine gardens and lots of room to do royal things. --- 7. Kinkaku-ji - “the Golden Pavilion” another expansive grounds centered around this lavish zen buddhist temple. --- 8. Heian Shrine - a beautiful Shinto shrine. --- 9. Gion District - Perhaps the most popular thing to do in Kyoto. This is where you can spot the famous geishas heading to and from appointments. Watch the sunset next to the Yasaka Pagoda. --- Bonus: Find a great Shabu Shabu restaurant. --- 10. Karaoke - Finish the day at a Japanese Karaoke spot where you pay by the hour to sing and party! --- In my personal opinion, these are the best things to do in Kyoto. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Arriving in Manila, Philippines to start a three month adventure around The Philippines! I met up with a local Filipino friend and explored the capital city of metro Manila. --- Where else should I visit in The Philippines? Comment below! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Porto, Portugal is one of the most beautiful and relaxing cities I have ever visited. Here is how to spend a perfect day in Porto. For a full list of all the places I visited in Porto, visit http://www.tourist2townie.com/ --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VIDEOGRAPHY & PHOTOGRAPHY GEAR - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO - Amazon Kindle → http://amzn.to/2gBiiZ6 Additional Travel Gear I use: - Case Logic Travel Backpack → http://amzn.to/2g9IZzP - Think Tank Travel Drone Bag → http://amzn.to/2gvesR8 - Dakine Split Luggage → http://amzn.to/2fkihHg - Merrell Men’s Hiking Boots → http://amzn.to/2fi9hz0 - Icebreaker Men’s Travel Shirts → http://amzn.to/2gCjkoz - Mitchum Deodorant → http://amzn.to/2fkfA8y - Philips Norelco Multigroom Trimmer → http://amzn.to/2gkrfDK --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Capsule Hotels in Tokyo Japan are a unique aspect of Japanese culture. I had one night in between an apartment and a flight so I decided to go experience a capsule hotel first hand. The Capsule Hotel Featured: Capsule Hotel Anshin Oyado Shinjuku https://www.anshin-oyado.jp/shinjuku/ Price: One-night rates start at around $40USD *Many capsule hotels in Tokyo are men only. If you ever come to Japan, experiencing a capsule hotel (pod hotel) is one of the best things to do in Tokyo. Also check out my videos about the "Weirdest Cafes in Tokyo" https://www.youtube.com/watch?v=arZgxjJeD54&t=10s and The Tsukiji Fish Market experience (including tuna auction) https://www.youtube.com/watch?v=jQQog7MnEAM&t=196s For more of the best things to do in Tokyo! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Things to do in El Nido, Philippines - I only had one day in El Nido before joining Tao Philippines on a 5-day island-hopping expedition to Coron, so I wanted to make the most of my time here. I rented a scooter at my hotel in downtown El Nido, got some work done at the Art Cafe, went to Las Cabanas Beach, drove to Nacpan Beach, and watched the sunset at Republica Sunset Bar. It was a great day in El Nido! — SUBSCRIBE ► http://bit.ly/TravelDeeper — POPULAR Travel QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER. Siargao, Philippines - Siargao turned out to be one of my favorite islands in The Philippines, and there are so many incredible things to do in Siargao - hence why it is becoming one of the most popular destinations in The Philippines. Beyond all the great things to do in Siargao, there is something that I can't overlook - the amount of garbage and pollution in and around the ocean in The Philippines is a very serious problem. It is also a serious problem throughout the world. This is my Philippines vlog from my day with The Sun Crew in Siargao as they attempt to change the course of history for the better. — SUBSCRIBE ► http://bit.ly/TravelDeeper — FOLLOW THE SUN CREW ON IG http://www.instagram.com/thesuncrew — POPULAR QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER. Siargao, Philippines - Siargao Island is becoming one of the most popular travel destinations in The Philippines. Along with Boracay and Palawan, Siargao is a popular Philippines travel island because of their famous surf breaks and laidback atmosphere. I'm not a very good surfer, so instead, I decided to eat my way around General Luna in between all the things to do in Siargao. This is a list of my favorite places to eat in Siargao - From smoothies at Shaka and tacos at Miguel's to Pizza at Kermit and grilled fish at Mama's Grill. Enjoy! — SUBSCRIBE ► http://bit.ly/TravelDeeper SUBSCRIBE to Ave ►https://www.youtube.com/user/avelovinit — A HUGE THANK YOU TO JOJO Aquino for sharing her Kermit Footage with me - because somehow I deleted mine. Go Follow her!! youtu.be/fViaEYegZNk — POPULAR QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER. Akihabara District in Tokyo, Japan is the world headquarters for Japanese anime, manga, comic books, video games, and electronics. -- Thankfully I had my Japanese friend Sabbaro there to help guide me around Akihabara or I would have been completely lost! --- Akihabara History Lesson: After WWII Akihabara was best known as a black market for electronic goods like radios and refrigerators which earned them the nickname “Electric Town” but fast forward to the 1980s when those same household electronics began to loose their futuristic appeal, so the shops shifted their focus towards home computers at a time when they were only used by specialists and hobbyists. This brought in a new customer - the computer nerd or OTAKU - and they ran with it! Years later Akihabara is THE hot spot in Tokyo for all things electronics, comic books, video games, and tech! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. El Nido to Coron, Palawan, Philippines - 5-Day Tao Expedition from El Nido, Palawan to Coron, Palawan - one of the most popular areas of The Philippines. As you may know already if you've been watching this channel for some time - I don't usually like group tours. This Tao Expedition however, was much different. Check them out here: https://www.taophilippines.com/ — SUBSCRIBE ► http://bit.ly/TravelDeeper — POPULAR QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER. I spent a week exploring (and eating) my way around The Island of Hawaii. A big thank you to Hawaii Tourism USA for sponsoring this incredible experience. Plan your trip to Hawaii: https://bit.ly/2nrsjJD Here are my favorite things to do in Hawaii. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. A day in the life on Molokai Island, Hawaii - Thanks to Hawaii Tourism USA!! Plan your trip to Hawaii: https://bit.ly/2nrsjJD - Special thanks to Greg Solatorio and Pilipo Solatorio for allowing me into your home for the day. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Iloilo City, Philippines - The Ati Tribe Competition is the main attraction at the Dinagyang Festival. 10 High School Groups from around the Visayas region of The Philippines compete in a choreographed rhythm and dance. Each of the 10 groups represent a unique Ati Tribe, and they highlight specific cultural aspects of that tribe. For example, some tribes were hunters while others were fisherman. Within the dance, each group demonstrates how the tribes were affected by the arrival of Catholicism (and Santo Nino) to the Philippines. The Dinagyang Festival was very unique compared to the Sinulog Festival I attended in Cebu, just one week before. The city of Iloilo Philippines was one of my favorite places of the entire trip. Enjoy! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. I just thought it was going to be a fun day exploring things to do in Cebu, Philippines. I visited Magellan's Cross, Fort San Pedro, Taboan Public Market, and the House of Lechon, but the most memorable moment came at the hand of two old photos... --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Siargao, Philippines - Siargao Island is becoming one of the most popular travel destinations in The Philippines. Along with Boracay and Palawan, Siargao is a popular Philippines travel island because of their famous surf breaks and laidback atmosphere. I'm not a very good surfer, so instead, I decided to eat my way around General Luna in between all the things to do in Siargao. This is a list of my favorite places to eat in Siargao - From smoothies at Shaka and to Pizza at Kermit and grilled fish at Mama's Grill. Enjoy! — SUBSCRIBE ► http://bit.ly/TravelDeeper SUBSCRIBE to Ave ►https://www.youtube.com/user/avelovinit — A HUGE THANK YOU TO JOJO Aquino for sharing her Kermit Footage with me - because somehow I deleted mine. Go Follow her!! youtu.be/fViaEYegZNk — POPULAR QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER. My goal this year is to connect more with you (subscribers), and I thought the best way for me to start doing that is by telling my story. Please leave a comment with any travel questions you may have for me, and I will try to cover it in an upcoming video. If you haven't already, please subscribe, and if you have, please click on the little bell next to the subscribe button and click "get notifications" so that you known when I launch a new video - my goal is to create a new video weekly! For more information please visit http://www.tourist2townie.com/ Thank you again for watching!! Recife, Brazil - http://www.tourist2townie.com/ It's a quiet morning on the beach in the Boa Viagem neighborhood of Recife. And while you're likely to run into a few fisherman and beachgoers, you won't find many people actually in the water here, As it's said, this is the most dangerous beach in the world do to the heavy shark population just offshore. And as much as I'd love to jump in and prove it, I decided to skip the swim and head downtown to see what life's like on land in the Capital city of Pernambuco. The historical center is lined with colorful buildings and cheerful people. Frevo music is in the air and signs of carnaval are everywhere. Recife and neighboring Olinda, host one of the best carnival celebrations in the country and no matter when you go, you'll witness the setup or remains of the year's big event. One of the main attractions during Carnaval here are the Bonecos Gigantes or Giant Puppets, and I just so happened to followed a guy into the Giant Puppet embassy to see the incredible collection of wood and paper mache figurines on display. The puppets are usually famous celebrities, athletes and public figures and are carried like floats during the local parades. They're a little bit creepy but entertaining to say the least. That afternoon I had the opportunity to do something really special. A local friend invited me to an after-school program that she's involved with in Recife's largest Favela of Brasilia Teimosa. The group is called Driblando Crack and it uses sports like soccer to help kids in the community avoid drugs and trafficking. We spent the afternoon hanging out, talking about life in Recife and of course, playing a little futebol. After an awesome time with the crew, I made my way over to catch a sunset boat tour through downtown Recife. Our large pontoon boat cruised through the wide canals and rivers as I took in all my surroundings. And while I wouldn't consider it to be the "venice of South America" as some have labeled it, it was great to see the city from many different perspectives on day one. The next morning I was up early to go on a little adventure. I borrowed my friend's car and set out on a day trip to Porto de Galinhas. The first thing you notice upon arrival in the small beach town, is that the people of Porto do Galinhas or Port of Chickens really love their name. Besides the tacky bird figures everywhere, the beach itself is long and beautiful, and a natural reef just offshore makes for great snorkeling and scuba diving. I spent the afternoon just relaxing in the sand before making the hour and a half ride back to the city. Luckily for me, I made it just in time to meet up with friends for some traditional Brazilian nightlife… Karokee! Osaka Japan Street Food Guide - one of the best things to do in Osaka is to go experience the incredible Japanese Food in the Dotonbori area of the city. Check out Heiwa's Channel - https://www.youtube.com/channel/UCNDVvOcHFIDpUShDjSnjk3Q/ A few of my Osaka Japanese street food favorites were; Takoyaki - A fried dough filled with scallions, ginger and octopus Yakisoba - Japanese fried noodles with pork and cabbage Okonomiyaki - Japanese-style pancake with pork, shrimp and squid As you could probably tell, my favorite Japanese street food was actually the ice cream filled melonpan! If you are ever looking for things to do in Osaka, I highly recommend coming down to Dotonbori. It was a great day in Osaka! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Along our Italy Road Trip, Taste Bologna asked Clint and I if we wanted to spend the day in Modena, Italy eating food... How could we say no to that? For more information about this Modena Food Tour, visit http://www.tourist2townie.com/ Follow Clint; http://www.triphackr.com/ Book a Food Tour; http://www.tastebologna.net/ --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Manjuyod Sandbar, Bais, Negros Oriental, Visayas, Philippines visit http://www.tourist2townie.com/ for more information. THINGS TO KNOW BEFORE VISITING MANJUYOD SANDBAR: - Manjuyod Sandbar is about 1 hour 15 minutes from Dumaguete Airport - CHECK tide schedule before arriving. This is very important. You can only visit during low tide. - Hire a boat for 3,500 pesos or around $65, so if you’re on a budget go in a group. - Like many boat trips in the Philippines, you can show up to the wharf and wait for others to groups to arrive to share a cost. - You can also go on a tour. - It is best to visit the Bais Tourism Office before hand to book a tour. - If you go solo or with a group, bring your own food and drinks, there are no restaurants or public bathrooms - You can rent the cottages for the night for 6,000 Pesos or less than $120 USD. - It has become relatively internet famous lately because people started calling it the Maldives of The Philippines, however this is not a five-star resort. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- ALL OF MY FAVORITE TRAVEL ACCESSORIES & CAMERA GEAR https://tourist2townie.com/travel-accessories/ --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. After spending almost four months living and traveling around Japan, I am now perhaps even more lost than I was at the beginning. The problem with travel is, the more you learn and discover, you realize the less you actually know. As soon as I think I have Japan figured out… a new door opens. The only solution I’ve ever known for this uncomfortable position is to just absorb as much as possible - like tofu in a big bowl of Chanko Nabe - the goal is to take in substance and gain perspective. New flavors change what I thought I knew about Japanese food. I see the process of sushi auctioned, packaged, prepared and presented. I see the amount care put into each bowl of soup. I see the precision taken by every day cooks - my palette evolves. New adventures change what I thought I knew about Japanese culture. From the snow-capped mountains of Nozawa to the tropical waters of Ishigaki - My outlook widens. And new relationships change what I thought I knew about Japanese people. As it has been with every other chapter in this life, what determines a viewpoint more than anything else - is the people I meet along the way. Truth is, the reason I came to Japan was to find a place that was completely out of my element. I was in search of something unique to anything I’ve ever known. And luckily for me… that’s exactly what I found and I am forever shaped by this experience. --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Exploring Dumaguete and Apo Island Philippines thanks in part to https://atmosphereresorts.com/ for the accommodation. - Apo Island is located 30 Kilometers south of the Capital city of Dumaguate and it’s even closer from Atmosphere’s boat launch. The island itself is only about 182 acres and it’s surrounded by a protected marine reserve. - Mountain Biking on Negros Island included cutting along the foothills of Mount Talinis and through the forests and palm tree farms surrounding the town of Dauin. - A special thank you to Atmosphere for hosting my stay and planning all these great excursions! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Episode 3 of this Iceland Road Trip adventure takes place on the east coast where Steve and I explore the best things to do in Iceland on this side of the Ring Road. ------ Go subscribe to Steve's awesome travel channel: https://www.youtube.com/BackPackerOrg ------ ☆ MORE INFO FROM THIS ICELAND TRAVEL VIDEO ☆ Iceland Travel Partners: - Iceland Car Rental - https://sadcars.com/ - Where to stay in Iceland - homeaway.com (see “WHERE WE STAYED” section below) ------ THINGS TO DO in Iceland (in this episode): ► Hofn - Höfn or Höfn í Hornafirði is an Icelandic fishing town in the southeastern part of Iceland which offers incredible views of the Vatnajökull glacier. ► Jökulsárlón Glacier Lagoon - Massive ice chunks from the nearby Vatnajökull Glacier float down into the glacier lagoon. You can even take a boat tour into the glacier lagoon and get a closer look. ► Diamond Beach - Diamond Beach is just across the road from the Jökulsárlón Glacier Lagoon. It’s called Diamond Beach because large chunks of glacier ice flows down from the lagoon and stick on the black sand beach, which look like diamonds. ► Local Guide of Vatnajökull - Local Guide Glacier Tours is a family owned and operated business that has been running glacier tours since 1991. In the summer months they run glacier hikes over the glacier and in the winter months they offer Ice Cave Tours. Book a tour here - http://localguide.is/ - tell them we sent you : ) ► Vatnajökull Glacier Tour - The Vatnajökull Glacier is Europe’s largest glacier, covering 8% of Iceland’s landmass. Traversing down into the dark gray and bright blue caves, seeing the naturally formed underground passageways and glacier rivers - this is definitely one of the most unique experiences of the entire trip. ► Hengifoss - The third highest waterfall in Iceland at 128 meters high. The rock formation around the waterfall is absolutely incredible and its a great little hike along the Fjord in East Iceland. ► Iceland Reindeer - Wild reindeer live only in East Iceland, but like most animals in Iceland, they are not native. Truly incredible to see! ► Seljavallalaug Pool - Built in 1923, its said to bee one of, if not the oldest swimming pool in Iceland. Although it is technically geothermal heated, it’s not the warmest of waters. Be warned. ► Fjaðrárgljúfur Canyon - 100 meters deep and about two kilometers long, the Fjaðrárgljúfur Canyon is an incredible site to see. It has recently become famous thanks to Justin Bieber shooting his 2015 smash hit “I’ll Show You” here. I can’t lie, I liked the video… minus the underwear scene - not necessary Justin. ► Sólheimasandur Plane Crash - This famous plane crash in Iceland rests on a black sand beach in Southeastern Iceland. It crashed here in 1973, when a US Navy DC plane ran out of fuel - fortunately everyone in the plane survived. It is about a 4km walk from the parking lot to see the plane crash. ------ WHERE WE STAYED in Iceland (with HomeAway): 1. Arnarstapi Cottages - http://bit.ly/Arnarstapi-Cottages 2. Akureyi Nollur Farm - http://bit.ly/Nollur-Farm 3. East Iceland Cottage - http://bit.ly/Iceland-Cottage 4. Southern Iceland Cottage - http://bit.ly/South-Iceland-Cottage 5. Reykjavik Bachelor Pad - http://bit.ly/Reykjavik-Apartment ------ SUBSCRIBE ► http://bit.ly/TravelDeeper ------ FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com ------ MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA ------ P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! ------ TRAVEL DEEPER. Sintra Day Trip from Lisbon - Sintra, Portugal is famous for its large castles and palaces. See the full list of things to do in Sintra at http://www.tourist2townie.com/ Sintra Palaces seen in this video were Quinta Regaleria, Setais Palace, Monserrate Palace, and Pena Palace. Next time I want to explore inside! --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VIDEOGRAPHY & PHOTOGRAPHY GEAR - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO - Amazon Kindle → http://amzn.to/2gBiiZ6 --- Additional Travel Gear I use: - Case Logic Travel Backpack → http://amzn.to/2g9IZzP - Think Tank Travel Drone Bag → http://amzn.to/2gvesR8 - Dakine Split Luggage → http://amzn.to/2fkihHg - Merrell Men’s Hiking Boots → http://amzn.to/2fi9hz0 - Icebreaker Men’s Travel Shirts → http://amzn.to/2gCjkoz - Mitchum Deodorant → http://amzn.to/2fkfA8y - Philips Norelco Multigroom Trimmer → http://amzn.to/2gkrfDK --- P.S. Did you subscribe? If so, thank you! And thank you so much for watching!! --- TRAVEL DEEPER. In search of new things to do in Tokyo, I spent the day with my Japanese buddy Yuta. He acted as my local tour guide as we explored a less-touristy side of Tokyo. Things to do in Tokyo (from this video): Tokyo's Koreatown - In the Shin Okubo neighborhood of Tokyo is Koreatown - A great place for markets, restaurants, street food, and perhaps most popular attraction the pretty faces of Korean Pop World. Record shops of West Shinjuku - The West Side of Shinjuku is a music lovers paradise, home to many recording studios and record shops, its a great place for locals to discover new music and enjoy the classics. Eat Udon - Udon is a thick, wheat flour noodle served al dente in a broth based of soy sauce, rice wine and dashi (like a fish stock). Kagurazaka - Kagurasaka is a quiet traditional Japanese neighborhood left off most tourist maps. home to beautiful maze-like side streets and an interesting french influence. For more things to do in Tokyo, visit http://www.tourist2townie.com/ --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- SUBSCRIBE TO YUTA ► https://www.youtube.com/user/YPlusShow --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com TRAVEL GEAR & VLOGGING EQUIPMENT: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO - Amazon Kindle → http://amzn.to/2gBiiZ6 Additional Travel Gear I use: - Case Logic Travel Backpack → http://amzn.to/2g9IZzP - Think Tank Travel Drone Bag → http://amzn.to/2gvesR8 - Dakine Split Luggage → http://amzn.to/2fkihHg - Merrell Men’s Hiking Boots → http://amzn.to/2fi9hz0 - Icebreaker Men’s Travel Shirts → http://amzn.to/2gCjkoz - Mitchum Deodorant → http://amzn.to/2fkfA8y --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. Dumagueste, Philippines - A day away from the luxury and comfort of the Atmosphere Resort. I explore the early morning Malatapay Market in the morning and visit Atmosphere's Soup Kitchen in the afternoon. Finishing the day with a very popular local treat here in Dumaguete - Silvanas. --- A big thank you to https://atmosphereresorts.com/ for making this day possible --- Visit http://www.tourist2townie.com/ for more information --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. The first stops of my quick Portugal Road Trip was to the beautiful towns of Lagos and Tavira in Portugal's Algarve Region. Lagos is famous for its incredible coastline and beautiful beaches. I stayed at the Canavial Hotel in Lagos, and it was the perfect location (not sponsored). Tavira is one of the most beautiful towns I have ever seen. Whitewashed buildings with a river running right through the middle. The people of Tavira are friendly and laid back, and it's the perfect place to stop while you're in the Algarve region or Portugal. Right next to Tavira is the small fishing town of Santa Luzia, which is the self-proclaimed capital of octopus! I had a dinner at Casa do Polvo (House of Octopus), and I must confess, it was the best octopus, perhaps even the best seafood, I have ever had. I highly recommend it. For more information about my entire Portugal Road Trip, including more travel tips for Algarve, Lagos and Tavira, visit http://www.tourist2townie.com/ --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com TRAVEL GEAR & VLOGGING EQUIPMENT: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO - Amazon Kindle → http://amzn.to/2gBiiZ6 Additional Travel Gear I use: - Case Logic Travel Backpack → http://amzn.to/2g9IZzP - Think Tank Travel Drone Bag → http://amzn.to/2gvesR8 - Dakine Split Luggage → http://amzn.to/2fkihHg - Merrell Men’s Hiking Boots → http://amzn.to/2fi9hz0 - Icebreaker Men’s Travel Shirts → http://amzn.to/2gCjkoz - Mitchum Deodorant → http://amzn.to/2fkfA8y - Philips Norelco Multigroom Trimmer → http://amzn.to/2gkrfDK --- --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. The Mall of Asia in Manila, Philippines is a massive mall, and where I try three popular Filipino fast foods for the first time. Including Jollibee, Chowking, and Mang Inasal. Luckily, I had my Filipino friend Zar with me to teach me about the Filipino fast food I was eating! --- Check out http://www.tourist2townie.com/ for details --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. I'm in Iloilo City, Philippines for the Dinagyang Festival, and I set out to try Filipino food before the Ati Tribe Competition on Sunday. I start with the iconic Lapaz Batchoy at Lapaz Market and then sample a few popular filipino food dishes at the Dinagyang Festival night market. What should I try next? --- SUBSCRIBE ► http://bit.ly/TravelDeeper --- FOLLOW ME: + INSTAGRAM ►https://www.instagram.com/tourist2townie + FACEBOOK ► https://www.facebook.com/tourist2townie + TWITTER ► https://twitter.com/tourist2townie + SNAPCHAT ►@GarethChat + WEB ► http://www.tourist2townie.com --- MY TRAVEL VLOGGING GEAR: - MacBook Pro 15” → http://amzn.to/2g9K6j3 - LaCie Rugged External Hard Drive → http://amzn.to/2fkojHR - Sony a7ii → http://amzn.to/2gCeBDj - Sony a7ii 24-70 Lens → http://amzn.to/2fhWexs - DJI Phantom 4 Drone → http://amzn.to/2g9ALI4 - GoPro Hero 4 → http://amzn.to/2gvfJYI - KNEKT Underwater Dome → http://amzn.to/2gez11u - Rode Shotgun Mic → http://amzn.to/2gvg5yg - Manfrotto 60” Compact Action Tripod → http://amzn.to/2gducpn - Joby Tripod → http://amzn.to/2gdo6FA - Zoom H2n Handy Recorder → http://amzn.to/2gdmKuE - Backup Batteries for Sony A7ii → http://amzn.to/2fhYchl - Backup Batteries for Sony RX100iv → http://amzn.to/2gvbqfO --- P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! --- TRAVEL DEEPER. From Manila, Philippines I journey into Northern Luzon to camp out along the incredible rice terraces of the region. It was most definitely a highlight of my entire trip to The Philippines. — SUBSCRIBE ► http://bit.ly/TravelDeeper — POPULAR QUESTIONS & RESOURCES: ► My Favorite Camera Gear & Travel Accessories - http://bit.ly/My-Travel-Accessories ► How to Start a Blog - http://bit.ly/How-To-Start-A-Blog-2019 ► Where I Get My Music From - http://bit.ly/My-YouTube-Music ► 10 Books That Changed My Life - http://bit.ly/10-Must-Read-Books ► How to Plan a Trip Abroad - http://bit.ly/Go-Plan-Your-Trip ► How To Make Friends While Traveling - http://bit.ly/How-To-Make-Friends ► Get $40 OFF Your First AirBnB - http://bit.ly/Airbnb-Credit-BY — FOLLOW ME: + INSTAGRAM: https://www.instagram.com/tourist2townie + FACEBOOK: https://www.facebook.com/tourist2townie + TWITTER: https://twitter.com/tourist2townie + SNAPCHAT: @GarethChat + WEB: http://www.tourist2townie.com — P.S. Did you subscribe? If so, did you click on the notifications bell to receive updates when I launch a new video? If so, thank you! — TRAVEL DEEPER.
2019-04-26T08:28:45Z
http://bourges-politique.info/author/UCheCB_ewJf_L2kTk0649ZDQ/Gareth+Leonard
Vibrio cholerae is a facultative pathogen that lives in the aquatic environment and the human host. The ability of V. cholerae to monitor environmental changes as it transitions between these diverse environments is vital to its pathogenic lifestyle. One way V. cholerae senses changing external stimuli is through the three-component signal transduction system, VieSAB, which is encoded by the vieSAB operon. The VieSAB system plays a role in the inverse regulation of biofilm and virulence genes by controlling the concentration of the secondary messenger, cyclic-di-GMP. While the sensor kinase, VieS, and the response regulator, VieA, behave similar to typical two-component phosphorelay systems, the role of the auxiliary protein, VieB, is unclear. Here we show that VieB binds to VieS and inhibits its autophosphorylation and phosphotransfer activity thus preventing phosphorylation of VieA. Additionally, we show that phosphorylation of the highly conserved Asp residue in the receiver domain of VieB regulates the inhibitory activity of VieB. Taken together, these data point to an inhibitory role of VieB on the VieSA phosphorelay, allowing for additional control over the signal output. Insight into the function and regulatory mechanism of the VieSAB system improves our understanding of how V. cholerae controls gene expression as it transitions between the aquatic environment and human host. Vibrio cholerae is a human small intestinal pathogen that causes profuse secretory diarrhea and vomiting leading to severe dehydration, which if left untreated can result in death. Upon ingestion of V. cholerae from a contaminated water source, this pathogen travels to the small intestine where expression of the toxin coregulated pilus results in colonization and subsequent expression of virulence genes, such as cholera toxin (CT). Translocation of CT into the epithelial cells lining the small intestine leads to profuse secretory diarrhea and results in the exit of V. cholerae from the host back into the aquatic environment [1-4]. The lifestyle of V. cholerae involves two drastically different environments, the aquatic environment and the small intestine of the human host. For optimal fitness, V. cholerae must be able to sense these environmental changes and it therefore harbors an array of systems that link environmental stimuli to gene expression changes. Bacteria commonly use two-component systems (TCS) to sense a wide variety of environmental cues and transmit this information intracellularly [5-7]. Additionally, given that some bacteria, like V. cholerae, endure dramatic environmental changes as they enter the human host, a number of TCSs have been shown to play a role in bacterial pathogenesis [8-11]. V. cholerae has served as a model organism for studying signal transduction and regulation of virulence genes. One way V. cholerae senses changing environments is through the VieSAB signal transduction system, which was previously discovered through a genetic screen for virulence gene regulators . VieSAB is encoded in a putative operon harboring three genes, vieS, vieA, and vieB. VieS is a complex sensor kinase (SK) containing two putative periplasmic ligand-binding domains and cytoplasmic histidine kinase (HK), receiver domain (REC) and histidine phosphotransferase domains (Hpt). VieS is capable of autophosphorylating and uses the complex phosphorelay system to transfer phosphate to the response regulator (RR), VieA . VieA resembles a traditional RR, containing an N-terminal REC domain and C-terminal helix-turn-helix (HTH) domain. However, VieA is unusual in also harboring a cyclic-di-GMP (cdGMP) phosphodiesterase (PDE) domain that lies between the REC and HTH domains . V. cholerae uses VieA to modulate its intracellular cdGMP concentration in order to regulate gene expression during the transition between the aquatic environment and the human host [14,15]. Lowering the concentration of cdGMP early during infection promotes expression of virulence and motility genes and leads to repression of environmental survival genes, namely biofilm formation genes [16,17]. Indeed, VieS and VieA have been implicated in the negative regulation of biofilm formation, are required for the colonization of the infant mouse, and are important for the positive regulation of the CT genes (ctxAB) and a major virulence gene transcriptional regulator (toxT), highlightening the role of VieSAB in modulating V. cholerae pathogenesis [13-15,18,19]. Additionally, vieA transcription is shown to increase significantly after the binding of V. cholerae to epithelial cells, supporting the hypothesis that VieA is a major contributor to cdGMP cleavage early during infection and is capable of influencing gene expression through this mechanism . These studies point to a role of VieSAB in tying together the sensing of external stimuli with changes in the cytoplasmic cdGMP concentration, allowing V. cholerae to adapt as it transitions between the environment and the host. However, the role of the third component in the VieSAB system, VieB, remains unclear. While VieB contains an N-terminal REC domain, it lacks the typical RR C-terminal HTH domain. Instead, it contains a tetratricopeptide repeat domain, which mediates protein-protein interactions, followed by a C-terminal half of the protein that has no known sequence homology, providing little insight into the function of this protein. Since a majority of well-studied auxiliary proteins have been described as inhibitors , we hypothesize that VieB acts as an inhibitor of the VieSA TCS. In this study, we uncover and characterize the function of VieB and reveal its mechanism of action. Since many other described auxiliary proteins of TCSs negatively modulate their cognate TCS, we hypothesized that VieB functions as an inhibitor of the VieSA TCS. To test this we examined the effect of VieB on phosphotransfer between GST-VieS-C (GST-tagged cytoplasmic portion of VieS) and VieA-His6. In vitro phosphotransfer between an MBP-VieS-C fusion protein and VieA-His6 was previously demonstrated . Using purified GST-VieS-C, we found that autophosphorylation and phosphotransfer to VieA-His6 behaves as expected (Figure 1A). When a five-fold molar excess of VieB was added to the reaction, there was a complete loss of the production of phosphorylated VieA-His6 (Figure 1A). VieB does not become readily phosphorylated in this assay even though it harbors a Rec domain, suggesting VieB does not act as a phosphate sink or compete with VieA-His6 for phosphorylation. However, our data so far cannot rule out the possibility that VieB may harbor high phosphatase activity, which could result in no observable phosphorylated VieB if it is a phosphatase of itself. Together, these data show that VieB is an inhibitor of phosphotransfer between GST-VieS-C and VieA-His6. VieB is a dose-dependent inhibitor of phosphotransfer. (A) Purified GST-VieS-C was incubated with 32P-ATP-γ either alone (lane 1) or in the presence of equimolar VieA-His6 (lane 2) and 5 μM VieB (lane 3) for 30 minutes at 30°C. (B) GST-VieS-C was incubated with 32P-ATP-γ in the presence of equimolar VieA-His6 and either 0, 0.25, 0.5, 1, 2, 4, or 8 μM VieB for 30 minutes at 30°C. Samples were stopped with the addition of 2X-denaturing sample buffer and separated using a 10% SDS-Page gel. Proteins labeled with 32P were observed by radioautography. Figure panels are from the same experiment and exposed for the same amount of time. The radioautographs shown are a representative of three replicates. The band just below GST-VieS-C is a VieS degradation band, which is present in all figures and should be ignored. To examine whether VieB functions enzymatically, we varied its molar ratio relative to GST-VieS-C and P-VieA-His6 and measured phosphorylation of each protein. As seen in Figure 1B, while VieA-His6 is readily phosphorylated in the absence of VieB, as the VieB concentration increases, there was a correlative decrease in the amount of P-VieA-His6. At equal molar amounts, VieB was able to reduce the amount of P-VieA-His6 by approximately 50% (Figure 1B, lane 4). When VieB is increased to twice the molar amount, there was further loss of P-VieA-His6. Total inhibition occurred only when VieB was in molar excess over GST-VieS-C and VieA-His6 (Figure 1B, lane 7). In contrast, the amount of phosphorylated GST-VieS-C was largely unchanged in the reactions except for a modest decrease at the highest concentration of VieB (Figure 1B, lane 7). Taken together, these data suggest that VieB inhibition of VieA phosphorylation is dose-dependent and is not enzymatic. To address the role of VieB in its ability to inhibit autophosphorylation of VieS, phosphotransfer experiments were conducted over time in the absence of VieA-His6. As seen in Figure 2A, wild-type GST-VieS-C was able to autophosphorylate in the presence of five-fold molar excess (5 μM) VieB, though the total amount of phosphorylation was lower (Figure 2A-B). These data could suggest that VieB is weakly affecting autophosphorylation. Alternatively, since VieS has three phosphorylation sites along its phosphorelay, it is also possible that VieB could block the intra-molecular phosphotransfer. If VieB blocks at the first or second site, the total amount of accumulated phosphate on VieS could decrease. VieB moderately inhibits VieS-C autophosphorylation. Purified GST-VieS-C or MBP-VieS-C D1018A was incubated with 32P-ATP-γ in the presence or absence of 5 μM VieB over time at 30°C. Samples were stopped at indicated time points with the addition of 2X-denaturing sample buffer and separated using a 10% SDS-Page gel. GST-VieS-C labeled with 32P were observed by radioautography (A,C) and quantified in (B,D).The radioautograph shown is a representative of three replicates. Error bars represent the SEM of three replicates. To test if VieB has inhibitory activity on the initial autophosphorylation of the HK domain, we used an intra-molecular phosphorelay mutant of VieS-C in the autophosphorylation assay. An MBP-VieS-C D1018A mutant was constructed that has the conserved Asp residue in the REC domain replaced with an Ala, rendering it only able to autophosphorylate at the HK domain while transfer between the REC-Hpt domains and the final transfer to VieA-His6 are disrupted. As seen in Figure 2C, while MBP-VieS-C D1018A was able to rapidly autophosphorylate to high levels over time in the absence of VieB; when VieB was present, the amount of autophosphorylation is significantly reduced (Figure 2C-D). Furthermore, the rate of autophosphorylation was lessened in the presence of VieB, confirming that VieB does inhibit VieS autophosphorylation, though it is not complete. Since VieB is only able to partially inhibit GST-VieS-C autophosphorylation, yet can completely block phosphotransfer between VieS and VieA, we hypothesize that VieB must also be affecting either the VieS intra-molecular phosphorelay or phosphotransfer from the VieS Hpt domain to VieA. To test this hypothesis, the inhibitory effect of VieB on phosphotransfer between GST-VieS-C and VieA-His6 was observed in the absence of ATP. In order to specifically address phosphotransfer in the absence of autophosphorylation, ATP was removed from the reaction after GST-VieS-C was robustly phosphorylated to prevent further autophosphorylation. As seen in Figure 3, phosphorylated GST-VieS-C was able to transfer phosphate to VieA-His6 in the absence of ATP. However, when VieB was present, the amount of P-VieA-His6 was greatly reduced (Figure 3). This suggests that VieB is able to block phosphotransfer between VieS and VieA-His6. While we hypothesize that VieB may be inhibiting the intra-molecular phosphorelay between the VieS HK and REC domains, the data presented here cannot distinguish if VieB is acting intra- or inter-molecularly. VieB inhibits VieS intra-molecular phosphotransfer. Purified GST-VieS-C was incubated with 32P-ATP-γ in the absence of VieA-His6 and VieB for 30 minutes at 30°C. Excess 32P-ATP-γ was removed from phosphorylated VieS-C constructs by gel filtration. P-VieS-C constructs were then incubated with additional MnCl2 and either buffer, 1 μM VieA-His6 or pre-mixed 1 μM VieA-His6 and 5 μM VieB for 60 minutes. Samples were stopped at indicated time points with the addition of 2X-denaturing sample buffer and separated using a 10% SDS-Page gel. VieS-C constructs labeled with 32P were observed by radioautography. The radioautograph shown is a representative of three replicates. Since VieB causes a reduction in the amount of P-VieS-C, VieB could affect the stability (auto-dephosphorylation) of P-VieS-C. To test this hypothesis, both wild-type GST-VieS-C and the mutant MBP-VieS-C D1018A were allowed to autophosphorylate in the absence of VieB and then the rate of loss of P-VieS-C was measured over time. As seen in Figure 4, the addition of VieB did not affect the loss of phosphate in either the wild-type GST-VieS-C or the MBP-VieS-C D1018A mutant. These data suggest that VieB does not alter the stability of phosphate on VieS-C, ruling out this mechanism of action for VieB. VieB does not affect the stability of phosphorylated GST-VieS-C. Purified GST-VieS-C or MBP-VieS-C D1018A was incubated with 32P-ATP-γ in the absence of VieB for 30 minutes at 30°C. Excess 32P-ATP-γ was removed from phosphorylated VieS-C constructs by gel filtration. P-VieS-C constructs were then incubated with additional MnCl2 and buffer or with 5 μM VieB for 60 minutes. Samples were stopped at indicated time points with the addition of 2X-denaturing sample buffer and separated using a 10% SDS-Page gel. VieS-C constructs labeled with 32P were observed by radioautography (A, B) and quantified in (C).The radioautograph shown is a representative of three replicates. Error bars represent the SEM of three replicates. Some auxiliary proteins that negatively modulate TCSs harbor phosphatase activity [22-24]. Since the addition of VieB has its most dramatic effect on the amount of P-VieA-His6, it is possible that VieB is a phosphatase of VieA-His6. To test this hypothesis, we conducted order of addition phosphotransfer experiments, where GST-VieS-C is incubated with either VieA-His6 or VieB prior to the addition of the other protein. When GST-VieS-C was first incubated with VieA-His6 and VieB was added second, P-VieA-His6 was still present, though to a much lesser degree than when VieB was absent (Figure 5A). However, some level of P-VieA-His6 remains even in the presence of VieB (Figure 5A). These data suggest that VieB is either inefficient in or not able to dephosphorylate P-VieA-His6. In contrast, when GST-VieS-C was incubated with VieB prior to the addition of VieA-His6, there was no detectable P-VieA-His6 suggesting a complete disruption of phosphotransfer (Figure 5A). Furthermore, GST-VieS-C was able to acquire phosphate even when VieB was present prior to VieA-His6. Taken together, these data suggest that VieB is not a phosphatase of VieA. VieB is not a phosphatase or stimulates GST-VieS-C phosphates activity. (A) Previously described phosphotransfer assays were conducted at 30°C in the presence of 32P-ATP-γ with the following modifications: Lane 1- GST-VieS-C alone was incubated for 60 minutes, Lane 2- GST-VieS-C was incubated with 1 μM VieA-His6 for 60 minutes, Lane 3- GST-VieS-C was incubated with 1 μM VieA-His6 for 30 minutes then 5 μM wild-type VieB was added for an additional 30 minutes, Lane 4- GST-VieS-C was incubated with 5 μM wild-type VieB for 30 minutes then 1 μM VieA-His6 was added for an additional 30 minutes. Proteins labeled with 32P were observed by radioautography. The radioautographs shown are a representative of three replicates. (B) 32P-VieA-His6 was incubated with buffer, GST-VieS-C alone or GST-VieS-C and VieB for 60 minutes at 30°C. Samples were taken over time and quantified. 0 minute time point represents 100% 32P-VieA-His6. Error bars represent the SEM of three replicates. However, the observed reduction in phosphotransfer could be through the phosphatase activity of the SK. Therefore we next hypothesized that VieB binds GST-VieS-C and stimulates its phosphatase activity [25-27]. To test this hypothesis, we measured the rate of loss of radiolabeled P-VieA-His6 over time in the presence of GST-VieS-C, GST-VieS-C plus VieB, or in buffer alone. When P-VieA-His6 was incubated with buffer alone, there was an intrinsic slow rate of loss of phosphate to water (Figure 5B), which is a common phenomenon among RRs, though the rate of loss can vary [28,29]. When P-VieA-His6 was incubated with GST-VieS-C or with GST-VieS-C plus VieB, there was no difference in the rate of loss when compared to the buffer control (Figure 5B). Therefore these data suggest that GST-VieS-C does not have phosphatase activity nor does the presence of VieB stimulate that activity. It should be noted that in some instances, SK phosphatase activity requires the full-length protein folded properly in a membrane, therefore phosphatase activity of VieS in vivo cannot be completely ruled out by our data. In TCSs, the activity of the RR is regulated though the phosphorylation of a conserved Asp residue in the REC domain, resulting in activation of the RR and execution of its output activity. Due to the high sequence homology of the VieB REC domain to other REC domains and the presence of the conserved Asp (D62) residue, we hypothesized that phosphorylation of VieB affects its inhibitory activity. However, VieB was poorly phosphorylated by GST-VieS-C (Figure 1) or acetyl-phosphate (data not shown); our inability to achieve phosphorylated VieB presents a challenge for addressing if the inhibitory activity of VieB is regulated by its phosphorylation state. Therefore, as substitutes for unphosphorylated and phosphorylated VieB, point mutations in vieB were constructed to replace D62 with either an Ala (D62A), mimicking a non-phosphorylated state, or a Glu (D62E), which mimics a phosphorylated state. Of note, while the amount of wild-type VieB phosphorylation can vary, neither point mutant ever became phosphorylated during the phosphotransfer reactions, suggesting that the D62 residue is indeed the conserved site for phosphorylation and that there is no alternative phosphorylation site in VieB (Figure 6). When the purified VieB D62A was added to the reaction, this mutant was able to inhibit phosphotransfer to the same degree as wild-type VieB. However, the VieB D62E point mutant was a weaker inhibitor, allowing some amount of phosphotransfer to occur between GST-VieS-C and VieA-His6 (Figure 6). These data suggest that the phosphorylation state of VieB affects its ability to inhibit phosphotransfer, where unphosphorylated VieB is an active inhibitor while phosphorylated VieB is less active. Mutation of the conserved Asp residue affects the inhibitory activity of VieB. GST-VieS-C was incubated with 32P-ATP-γ in the presence of equimolar VieA-His6 (lane 1) and either 5 μM wild-type VieB (lane 2), VieB D62A (lane 3), or VieB D62E (lane 4) for 30 minutes at 30°C. Samples were stopped with the addition of 2X-denaturing sample buffer and separated using a 10% SDS-Page gel. Proteins labeled with 32P were observed by radioautography. Figure panels are from the same experiment and exposed for the same amount of time. The radioautographs shown are a representative of four replicates. Standard deviation is shown below. Stars denotes a significant P-value < 0.05 determine by a Mann–Whitney U test. Since VieB prevents phosphorylation of VieA-His6 through the inhibition of GST-VieS-C autophosphorylation and intra-molecular transfer, we hypothesize that VieB binds to GST-VieS-C. To address if VieB can interact with GST-VieS-C, GST pull-downs were conducted. Immobilized GST-VieS-C was able to pull down VieB and VieA-His6 from whole cell lysate (data not shown). To characterize this interaction, we used size-exclusion chromatography coupled with multi-angle light scattering (SEC-MALS) and composition-gradient MALS (CG-MALS) to quantify the self- and hetero-association affinity and stoichiometry for all combinations of the VieSAB proteins. Table 1 summarizes the results of these experiments. As revealed by the MALS data, VieS-C and VieA-His6 are both putative homo-dimers, and each VieS-C dimer binds a single VieA-His6 dimer. The equilibrium dissociation constant (K D ) for this interaction is 1.38 μM. Additionally, VieB exists as a monomer, and each VieS-C dimer binds a single VieB monomer, with K D = 0.467 μM. This affinity is approximately three-fold stronger than that of the VieS-C/VieA-His6 interaction, which is consistent with VieB being able to inhibit the VieS-VieA phosphotransfer. Of note, there were no other stoichiometries present for the VieB/VieS-C interaction, suggesting that only one VieB binding site is present on VieS-C. Similar to wild-type VieB, the VieB D62E point mutant is also a monomer. Unexpectedly, the VieB D62E, which is a weaker inhibitor of phosphotransfer, is still able to bind VieS-C at the same stoichiometry as wild-type VieB with a K D of 0.197 μM. This affinity is about two-fold stronger than that of wild-type VieB. There is no detectable interaction between VieA-His6 and VieB. These data further support the model that VieB specifically interacts with VieS to inhibit phosphotransfer. Characterization of VieS-C, VieA-His6, wild-type VieB and the VieB D62E point mutant (self-association) were determined by Size-Exclusion Chromatography Multi-angle Light Scattering. To determine the protein-protein interactions of various VieSAB protein combinations, hetero-association interaction kinetics were determined over a range of protein concentrations by Composition-gradient Multi-angle Light Scattering. Data for the hetero-association stoichiometry are represented in monomer units. These data represent the average and ± SD of three independently purified replicates. Based on the data presented so far, we propose that VieB functions as a phosphotransfer inhibitor by preventing GST-VieS-C autophosphorylation and phosphotransfer, however the mechanism of inhibition is unclear. Inhibitors are able to block enzymatic activity through two main mechanisms, competitive or noncompetitive binding. Previously, MBP-VieS-C was shown to have kinase activity, operating under second order Michaelis-Menten kinetics . Therefore, to determine the mechanism of inhibition by VieB, we generated a Lineweaver-Burk Plot using phosphotransfer assays. VieB concentrations were varied to determine the rate (velocity) of phosphotransfer between GST-VieS-C and VieA-His6. Since VieB is a dose-dependent inhibitor, we expect that GST-VieS-C/VieA-His6 phosphotransfer will decrease as VieB concentrations increase. As expected, as the VieB concentration increases, the velocity at which GST-VieS-C can phosphorylate VieA-His6 decreases. Extrapolation of the line for each VieB concentration shows that all VieB concentrations result in the same Michaelis K m (x-intercept) but varying V max (y-intercept) (Figure 7). These data suggest that VieB is a noncompetitive inhibitor of GST-VieS-C. VieB is a non-competitive inhibitor. A Lineweaver-Burk Plot was generated using the previously described phosphotransfer assay over a range of VieA-His6 (2, 4, and 8 μM) and wild-type VieB (0, 4, 8, and 12 μM) concentrations. VieA-His6 phosphorylated with 32P (P-VieA-His6) was quantified by radioautography. These data represent the average velocity of three replicates (0, 4 and 12 μM VieB) and four replicates (8 μM VieB). V = velocity. Given the noncompetitive model of inhibition, we would expect the binding of VieB to GST-VieS-C to have little to no effect on the binding ability of VieA-His6 to GST-VieS-C. To test this hypothesis, GST pull-down experiments with purified proteins were conducted. Since VieB was most effective at molar concentrations that are higher than GST-VieS-C and VieA-His6, we chose to conduct these experiments with VieB at a five-fold molar excess over VieA-His6, and with both VieA-His6 and VieB at molar excess over GST-VieS-C. When VieA-His6 was incubated with GST-VieS-C, VieA-His6 was pulled down in the elution fraction with GST-VieS-C (Figure 8, lane 6). Since VieA-His6 was in five-fold molar excess to GST-VieS-C, it was expected that some VieA-His6 would be present in the wash fraction (Figure 8, lane 5). The amount of VieA-His6 that was pulled down in this elution fraction was quantified and set to 100%. In the presence of VieB, the amount of VieA-His6 that was eluted with GST-VieS-C was significantly reduced by 70% (Figure 8, lane 8). However, BSA was used as a negative control to test if the addition of a nonspecific protein at the same five-fold excess molar concentration can prevent VieA-His6 binding. While there was a smaller reduction (26%) in the amount of VieA-His6 bound in the presence of BSA, this decrease is not significantly different from the decrease seen when VieB is present (as determine by one-way ANOVA and Dunn’s Multiple Comparison), suggesting that the reduction of VieA-His6 in both reactions are the result of nonspecific interactions. As a negative control for VieA-His6 and VieB nonspecific interactions with GST, GST alone was immobilized to the glutathione beads. As seen in Figure 8, lanes 11–14, neither VieA-His6 nor VieB interact with GST. Taken together, these data support the noncompetitive inhibition model, whereby the presence of VieB does not affect the ability of VieA-His6 to bind to GST-VieS-C but prevents only phosphotransfer. VieB does not disrupt the GST-VieS-C/VieA-His 6 interaction. GST-VieS-C (lane 5–10) or GST alone (lane 11–14) bound to glutathione beads were incubated with either, pre-mixed 5 μM VieA-His6 and 25 μM VieB (VieB), 5 μM VieA-His6 alone (VieA) or 5 μM VieA-His6 and 25 μM BSA (BSA). Reactions were washed with 150 μl of wash buffer five times and protein was eluted off the beads with 150 μl of elution buffer containing reduced glutathione. Samples were taken from the input (I), wash (W) and elution (E) fractions for analysis on 10% SDS Page gel stained with Lumitein protein stainTM. VieB, VieA and BSA inputs are indicated by lanes 2–4, respectively. Percentage of VieA-His6 bound is the average of four replicates with standard deviation shown below; gel shown is a representative of the replicates. Statistical significance was determined by one-way ANOVA and Dunn’s Multiple Comparison. M = protein standard. VieSAB plays an important regulatory role in allowing V. cholerae to adapt to its environment as this pathogen transitions from the aquatic environment to the small intestine of the human host. VieSA composes a classical TCS, where VieS is a complex SK capable of autophosphorylating and engages in phosphotransferwith the RR, VieA . In this study, we provide biochemical evidence that VieB, the previously uncharacterized third component in the VieSAB signal transduction system, inhibits phosphotransfer to VieA, thus providing a negative feedback mechanism to down-regulate the VieSA TCS phosphorelay. We show that VieB accomplishes this inhibition by binding to VieS and preventing autophosphorylation and phosphotransfer to VieA. Additionally, we show that mutating the conserved phosphorylation site in the REC domain can modulate the inhibitory activity of VieB, where the D62E mutant is a weaker inhibitor than the wild-type VieB or the D62A mutant. vieSAB is well-described as an important contributor to V. cholerae’s control of gene expression during infection. The ability of VieSAB to modulate virulence gene expression is achieved through the VieA PDE domain, which hydrolyzes the secondary messenger molecule, cdGMP, during infection [14,15,20]. Changes in intracellular cdGMP are known to regulate gene expression, where low concentrations of cdGMP result in induction of virulence genes and repression of biofilm genes. Conversely, when cdGMP levels are high, the inverse is observed for these two classes of genes. VieA also contains a putative HTH DNA-binding domain, suggesting that in addition to its PDE activity, VieA may regulate gene expression through direct DNA binding, though this has not been shown. A previous microarray study suggests that VieA is autoregulatory, as a deletion of vieA resulted in decreased expression of the entire vieSAB operon when compared to wild type V. cholerae . Taken together with this study, we present a working model incorporating the role of VieB in negatively regulating the expression of VieA through VieS inhibition (Figure 9). Upon VieS binding to an unknown environmental stimulus, VieS autophosphorylates at the HK domain, transfers the phosphate intra-molecularly, in order to phosphorylate the REC domain of VieA. Given VieA’s suggested autoregulatory activity, we propose that phosphorylation of VieA results in its activation as a transcription factor, triggering an increase in vieSAB expression. This up-regulation increases the quantity of VieA in the cytoplasm resulting in reduction of cdGMP concentration through enzymatic hydrolysis by the VieA PDE domain. This decrease in the intracellular level of cdGMP helps trigger expression of virulence genes needed for survival in the host (Figure 9A). Proposed model for VieB inhibition. Stimulation of the VieSA TCS by binding of external signal (stars) to VieS results in autophosphorylation and phosphotransfer to and activation of VieA. We propose that VieA activation results in the amplification of the vieSAB operon and up-regulation of virulence genes. We hypothesize that this up-regulation of vieA, leads to decreased intracellular levels of c-di-GMP and enhanced expression of virulence genes (A). Over time, or at high levels of transcription of the vieSAB operon, VieB accumulates. This pool of VieB is able to tightly bind, noncompetitively, to VieS. We hypothesize that this binding disrupts autophosphorylation and the transfer of phosphate between the HK and REC domains of VieS, down-modulating the phosphorelay. This lack of phosphotransfer to VieA results in down regulation of vieSAB and virulence genes (B). ‘X’ denotes the inhibitory action of VieB. Black arrows correspond to active phosphotransfer while grey arrows denote incompletion of transfer. Over time, autoregulation of the vieSAB operon results in accumulation of VieB. We hypothesize that VieB is able to tightly bind VieS as a noncompetitive inhibitor, ultimately preventing additional phosphotransfer to VieA. We propose that this disruption of VieA phosphorylation is due to VieB binding at or near the HK domain of VieS and inhibiting both its autophosphorylation and intra-molecular transfer of phosphate to its REC domain. Phospho-VieA levels are then presumably reduced, shutting off or at least down-regulating expression of the vieSAB operon and virulence genes due to increasing cdGMP levels (Figure 9B). Since VieB appears to be a moderate inhibitor of autophosphorylation, it is possible for some VieS to acquire phosphate at the HK domain, even in the presence of VieB. Therefore, if VieS becomes phosphorylated, the ability of VieB to not only prevent further autophosphorylation but also disrupt the transfer of the already bound phosphate ensures that VieA does not become phosphorylated. Negative feedback regulation is not uncommon among TCSs. Indeed, other TCS have incorporated auxiliary proteins in order to inhibit the phosphosignalling between the SK and RR. For example, in B. subtilis, numerous auxiliary proteins negatively control the progression of phosphotransfer in a TCS that controls sporulation [22-24]. The inhibitors Sda and KipI interact with the SK, KinA, binding to the HK domain to block autophosphorylation, specifically the transfer of phosphate from ATP to the His residue. However, neither block phosphotransfer to the RR nor dephosphorylate the SK [23,31]. In addition to Sda and KipI, Rap proteins and Spo0E act as phosphatases at various stages in the phosphotransfer and dephosphorylate two important RRs, Spo0F and Spo0A. Another example of inhibition by auxiliary proteins is modulation of the SK, NtrB, by the PII nitrogen-sensor protein in the NtrBC TCS in E. coli . NtrBC is involved in the assimilation of ammonia and metabolism of alternative nitrogen-containing compounds. NtrB has dual functions, harboring both kinase and phosphatase activities, where the directional flow of phosphate depend on its interaction with PII. When PII is bound to NtrB, this promotes phosphatase activity on the RR, NtrC. Conversely, when PII is not interacting with NtrB, this allows NtrC to act as a kinase to phosphorylate NtrC . We show that VieB interacts specifically with the SK, VieS, however our data suggest that VieB is neither a phosphatase nor does it modulate the phosphatase activity of VieS. While the function of VieB appears similar to the Sda and KipI inhibitors in B. subtilis, our data provide evidence that is also capable of blocking either the intra-molecular phosphorelay or phosphotransfer to VieA. Therefore, we believe that the ability of VieB to specifically block both autophosphorylation and phosphotransfer provides a novel mechanism for the negative regulation of TCS. Our data suggests that the inhibitory activity of VieB may be regulated, which to our knowledge is a novel mechanism for regulating an auxiliary inhibitor of a TCS. Just as the activity of traditional RRs is controlled by the phosphorylation of the REC domain, it appears that VieB also may be controlled by this same mechanism. However, for traditional RRs, phosphorylation leads to activation, whereas for VieB, phosphorylation (mimicked by the D62E mutation) leads to inactivation. This reverse regulation by phosphorylation is an attractive model for an inhibitor like VieB: Since VieB in its unphosphorylated state is able to bind VieS and is active for inhibition, phosphorylation of VieB can then serve as a shut-off signal, allowing VieS to regain function. Intriguingly, the D62E mutant retains strong binding to VieS. This suggests that the mere binding of VieB to VieS is not sufficient for inhibition, but that the structure of VieB that is bound plays an important role. However, we cannot rule out the possibility that the D62E mutant fails to mimic the phosphorylated form of VieB adequately. Our work presented here biochemically characterizes the role of VieB in the VieSA TCS. We show that VieB binds to the VieS sensor kinase and blocks phosphotransfer to the VieA response regulator and cdiGMP phosphodiesterase. Thus, VieB provides what we believe is a novel negative feedback mechanism for controlling a TCS, allowing for tight regulation over VieA activity and subsequent cdGMP levels. This further highlights the role of this TCS in modulating gene expression in V. cholerae and provides a more comprehensive understanding of how VieSAB functions. Future work is necessary for elucidating structural details of the interaction between VieB and VieS, as well as the precise conditions under which VieB is active. Insight into how VieSAB modulates the inverse expression of virulence and environmental genes may aid in the understanding of how and when V. cholerae regulates its complex virulence cascade as it transitions from the aquatic environment into the host. All strains used in this study are listed in Table 2. All PCR primers used are listed in Table 3. Bacteria were grown in Luria-Bertani broth supplemented with 100 μg/ml ampicillin at 37°C with aeration. 1 mM isopropyl-β-D-thiogalactopyranoside (IPTG) was added when necessary to induce protein expression. The cytoplasmic encoding portion of vieS (vieS-C) and full-length vieB (vieB) were constructed using PCR amplicons made from V. cholerae strain O395 template DNA. For glutathione S-transferase (GST) tagged vieS-C, a silent mutation was created at the internal NdeI restriction endonuclease recognition site at position 2916. This mutant allele was generated by overlap extension PCR using primer pairs GST-VieS-C F/GST-VieS-C T2916C R and GST-VieS-C T2916C F/GST-VieS-C R. vieB was generated by PCR using the VieB F/R primers. The outer primers for each of these alleles introduce NdeI and BamHI restriction sites for subsequent cloning. After amplification, PCR products were double-digested with NdeI and BamHI (New England Biolabs). Generation of the GST-vieS-C was ligated into a modified pGEX vector that includes a TEV protease recognition site after the GST tag . vieB was ligated into a modified pET15b plasmid that also includes a TEV recognition site after the poly-Histidine (His6) tag . The maltose binding protein (MBP) tagged vieS-C D1018A mutant was generated using overlap extension PCR using the primer pairs MBP-VieS-C F/MBP-VieS-C D1018A R and MBP-VieS-C D018A F/MBP-VieS-C R. Specifically for MBP-vieS-C D1018A, the outer primers introduced a BamHI and SalI restriction sites for subsequent cloning. Generation of the MBP-vieS-C D1018A was ligated into the pMALc2E vector. Ligations were transformed into E. coli DH5α by electroporation and plated on Luria-Bertani broth supplemented with ampicillin. The insert in each plasmid was confirmed by DNA sequencing. The pMMB67EH::vieA-His 6 was purified from DH5α and transformed into E. coli BL21 (DE3) for protein expression . The VieB D62 point mutants were constructed using the QuickChange site-directed mutagenesis method (Stratagene) using the pET15b::His6-vieB vector. The mutations were confirmed by DNA sequencing, and the plasmids were transformed into E. coli BL21 (DE3) for protein expression. All primers are listed 5′ to 3′. Italics indicate restriction enzymes used for cloning. E. coli BL21 (DE3) containing the protein expression vectors were grown in 1 L cultures to an OD600 = 0.5-0.8. Protein expression was induced by the addition of 1 mM IPTG and grown at 20°C for 17 hours. 1 L cell cultures were harvested by centrifugation at 2, 990 × g for 20 minutes and resuspended in 25 ml of the following buffers: for GST-VieS-C and MBP-VieS-C D1018A, 20 mM Tris pH = 8, 150 mM NaCl, 5 mM beta mercaptoethanol (βME), Complete EDTA-free protease inhibitor cocktail tablet (Roche); and for VieA-His6, His6-VieB, and His6-VieB D62 mutants, 20 mM Tris pH = 8, 150 mM NaCl, 25 mM Imidazole, 5 mM βME, Complete EDTA-free protease inhibitor cocktail tablet (Roche). The resuspended cells were lysed on ice with five, 30-second pulses (0.5 seconds on, 0.5 second off) of sonication at 50% amplitude with one-minute rest in between pulses. Cell debris was pelleted by centrifugation at 38, 464 × g for 45–60 minutes at 4°C and the supernatant was collected. For GST-VieS-C, supernatant was incubated on 7 ml of Glutathione Sepharose 4B beads (GE Healthcare) for 30 minutes at 4°C. The beads were washed with three column volumes of 20 mM Tris pH = 8, 200 mM NaCl, 5 mM βME. Protein was eluted in 30 ml of 100 mM Tris pH = 8, 20 mM reduced glutathione, 100 mM NaCl, 5 mM βME. For VieS-C, the GST tag was removed by the addition of TEV protease overnight at 4°C. Both GST-VieS-C and VieS-C were diluted three-fold with Buffer A (20 mM Tris pH = 8, 1 mM DTT) and applied directly to a 4 ml Source15Q anion exchange column (GE Healthcare) that has been equilibrated in Buffer A. Protein was eluted using a 0-50% (v/v) Buffer B (20 mM Tris pH = 8, 1 M NaCl, 1 mM DTT) gradient developed over 15 column volumes, with protein eluting around 33% (v/v). The peak fractions were pooled and concentrated by centrifugation at 2,514 × g at 4°C using the Amicon Ultra-15 10 K centrifugal filters (Millipore). Protein was then applied to a Superose12 prep grade 16/70 gel filtration (GE Healthcare) column that was equilibrated in Gel Filtration Buffer (25 mM Tris pH = 7.5, 100 mM KCl, 1 mM DTT, 5% glycerol (v/v)). For VieS-C, peak fractions were pooled and incubated a second time on 2 ml of Glutathione Sepharose 4B beads equilibrated in Gel Filtration Buffer for 30 minutes at 4°C to remove any remaining GST tag or GST-VieS-C protein. Flow-through containing VieS-C was collected and concentrated. For MBP-VieS-C D1018A, supernatant was incubated on 5 ml of amylose high flow resin (New England Biolabs) for 30 minutes at 4°C. Beads were washed with five column volumes of 20 mM Tris pH = 8, 150 mM NaCl, 5 mM βME and eluted in 30 ml of 20 mM Tris pH = 8, 100 mM NaCl, 1 mM DTT and 30 mM maltose. Protein was diluted three-fold with Buffer A and applied to a 4 ml Source15Q anion exchange column. MBP-VieS-C D1018A was eluted using a 0-50% (v/v) Buffer B gradient developed over 15 column volumes, eluting around 31% (v/v). The peak fractions were pooled, concentrated and applied to a Superose12 prep grade 16/70 gel filtration column equilibrated in Gel Filtration Buffer. For VieA-His6, His6-VieB and His6-VieB D62 point mutants, supernatant was incubated on 7 ml of His-Pur NiNTA beads (Thermo Scientific) for 30 minutes at 4°C. Beads were washed three times with three column volumes of Wash 1 (20 mM Tris8, 150 mM NaCl, 25 mM imidazole, 5 mM βME), three times with three column volumes of Wash 2 (same as Wash 1 except 50 mM imidazole), and eluted in 30 ml of Elution Buffer (same as Wash 1 except 300 mM imidazole). For VieB and the D62 point mutants, the His tag was removed by the addition of TEV protease overnight at 4°C. Proteins were diluted three-fold with Buffer A and applied to a 4 ml Source15Q anion exchange column. VieA-His6 was eluted using a 0-40% (v/v) Buffer B gradient (eluting around 23% (v/v)) while VieB and the D62 mutants were eluted using a 0-35% (v/v) Buffer B gradient (eluting around 20% (v/v)), both developed over 15 column volumes. The peak fractions were pooled, concentrated, and applied to a Superose12 prep grade 16/70 gel filtration column equilibrated in Gel Filtration Buffer. Phosphotransfer reactions were carried out as described by Martinez et al. with the following modifications. Phosphotransfer reactions were incubated in phosphotransfer buffer (Gel Filtration Buffer supplemented with 5 mM MnCl2, 25 μM radiolabeled 32P-ATP-γ [10 mCi/ml; Perkin Elmer, Boston, MA] and 1.25 μM cold ATP). GST-VieS-C, MBP-VieS-C D1018A and VieA-His6 were at final concentrations of 1 μM while VieB and the D62 mutants were at a final concentration of 5 μM, unless stated otherwise. Once reactions were stopped by the addition of 2X denaturing sample buffer (10 mM Tris pH = 6.8, 4% (w/v) SDS, 20% (v/v) glycerol, bromophenol blue, βME), proteins were separated on 10% SDS-PAGE gel at 200 V for 45 minutes. Time course experiments were stopped at indicated time points shown. Autoradiographs were recorded and quantified with FUJI FILM Image Reader FLA-9000 (Life Science) and FUJI FILM Multi-Gauge software (Life Science). Due to inherent experimental variation, an internal control of GST-VieS-C and VieA-His6 phosphotransfer in the absence of VieB is included with every experiment. 1 μM GST-VieS-C or MBP-VieS-C D1018A was incubated with 25 μM 32P-ATP-γ for 30 minutes at 30°C. To remove excess ATP, phosphorylated VieS-C (P-VieS-C) constructs were passed through a Performa DTR spin gel filtration column (EdgeBio) for two minutes at 750 × g. Additional MnCl2 was added and Gel Filtration Buffer or 5 μM VieB was added to P-VieS-C constructs and incubated at 30°C. The amount of P-VieS-C was measured over time. At indicated time points, reactions were stopped and analyzed as previously described for the phosphotransfer assays. 1 μM GST-VieS-C was incubated with 25 μM 32P-ATP-γ for 30 minutes at 30°C. To remove excess ATP, P-VieS-C constructs were passed through a Performa DTR spin gel filtration column (EdgeBio) for two minutes at 750 × g. Additional MnCl2 was added and then either Gel Filtration Buffer, 1 μM VieA-His6, 5 μM VieB or pre-mixed 1 μM VieA-His6 and 5 μM VieB was added to P-VieS-C and incubated at 30°C. The amount of P-VieS-C was measured over time. At indicated time points, reactions were stopped and analyzed as previously described for the phosphotransfer assays. GST-VieS-C was bound to Glutathione Sepharose 4B beads equilibrated in phosphotransfer buffer. Beads were washed and VieA-His6 was added in the presence of 25 μM radiolabeled 32P-ATP-γ and incubated for 30 minutes at 30°C. Beads were washed three times with 150 μl of 25 mM Tris pH = 7.5, 150 mM KCl, 1 mM DTT by centrifugation for 30 seconds at 12, 000 × g using Pierce Spin Columns (Thermo Scientific) to collect phosphorylated VieA-His6 (P-VieA-His6). P-VieA-His6 was incubated with new GST-VieS-C alone or GST-VieS-C plus VieB in phosphotransfer buffer in the absence of [32P-γ]. Samples were collected over time and reactions were analyzed and quantified using the described method above for the phosphotransfer assays. Phosphotransfer assays described above were used to generate the Lineweaver-Burk plot except VieA-His6 concentrations ranged from 2–8 μM and VieB concentrations ranged from 0–12 μM while GST-VieS-C remained constant (1 μM). Samples were taken at 0, 3.5, 7.5, and 15 minutes. The amount of phosphorylated VieA-His6 was quantified over time in order to generate enzyme reaction velocities at each concentration combination. A double reciprocal plot was generated by plotting the inverse of the enzyme reaction velocity against the inverse of VieA-His6 (substrate) concentration using GraphPad Prism5 (GraphPad). Extrapolation of each line to determine the intercept was determined by linear regression analysis. Size-exclusion chromatography coupled with multi-angle light scattering (SEC-MALS) was used to determine oligomeric state of each protein. SEC-MALS was conducted using the ÄKTA HPLC Explorer system (GE Healthcare) connected to a vacuum degasser (Alltech), a Superose12 10/300 GL gel filtration (GE Healthcare) column equilibrated in 0.1 μm filtered Gel Filtration Buffer that is directly connected to a DAWN HELEOS II light scattering detector (Wyatt Technology Corporation) and an Optilab T-rEX refractive index detector (Wyatt Technology Corporation). The column temperature was held at 4°C while light scattering detection was conducted at 25°C. A MALS baseline was established with Gel Filtration Buffer overnight. Light scattering and concentration data were acquired and analyzed with ASTRA software (version 6, Wyatt Technology Corporation) to determine molar mass in solution, and thus oligomeric sate, of each protein. All light scattering experiments were conducted using the untagged VieS-C protein, which is able to dimerize in the absence of the GST tag. Composition gradient MALS (CG-MALS) was conducted to probe the hetero-association interactions between various combinations of the VieSAB proteins [36-38]. The Calypso II syringe pump system (Wyatt Technology Corporation) was used to inject various protein concentration mixtures to the DAWN HELEOS II light scattering detector that was attached to the UV detector of the ÄKTA HPLC Explorer system (GE Healthcare). The Gel Filtration Buffer was used for all CG-MALS and was filtered through a 0.1 μm filter. Proteins were diluted into this Gel Filtration Buffer at a predetermined stock concentration and were subsequently filtered through a 0.02 μm filter. After each injection, the flow was stopped for 30–180 seconds to allow protein interactions to reach equilibrium. Hetero-association stoichiometry, and dissociation constants (K D ) were determined using the CALYPSO software (version 2.1.3, Wyatt Technology Corporation) based off the light scattering and UV signal acquired during the stopped flow for each concentration gradient. All CG-MALS experiments were conducted using the same untagged VieS-C protein used in SEC-MALS. Unconjugated GST tag, used as a negative control for purified protein GST pull-downs, was purified as follows: TEV protease was added to previously purified GST-VieS-C overnight at 4°C. The sample was incubated on 500 μl of Glutathione Sepharose 4B beads that were equilibrated in Gel Filtration Buffer for 30 minutes at 4°C. Beads were washed and eluted as described above for GST-VieS-C. Protein was directly applied to a HiLoad 16/60 Superdex75 prep grade gel filtration (GE Healthcare) column to separate GST alone from any un-cleaved GST-VieS-C protein. The peak fractions corresponding to GST tag alone were collected and used for subsequent experiments. For pull-downs, 1 μM of either GST-VieS-C or GST tag was incubated on 50 μl Glutathione Sepharose 4B beads for 30 minutes at 4°C using Pierce Spin Columns. Bound protein was washed three times with 150 μl of 25 mM Tris pH = 7.5, 150 mM KCl, 1 mM DTT by centrifugation for 30 seconds at 12, 000 × g. 5 μM VieA-His6 that was premixed with either buffer, 25 μM VieB, or 25 μM BSA was incubated on the beads for 15 minutes at 30°C. Reactions were washed five times each with three column volumes of 25 μM Tris pH = 7.5, 100 mM KCl, 1 mM DTT using the same centrifugation conditions. An additional dry spin was conducted to ensure all of the wash was removed from the column. GST-VieS-C or GST and all bound proteins were eluted using 150 μl of the elution buffer described above for GST-VieS-C purification. Samples from the input, wash and elution fractions were taken, 2X denaturing sample buffer was added, and were analyzed by 10% SDS-PAGE gel that was stained with Lumitein protein stain™. Gel images were acquired using the FUJI FILM Image Reader FLA-9000 and protein bands were quantified using FUJI FILM Multi-Gauge software. We thank members of the Camilli laboratory for critical feedback throughout this project. This work was supported by National Institutes of Health grant AI45746 to AC. AC is a Howard Hughes Medical Institute investigator. SLM conducted all experiments and was responsible for drafting the manuscript. AMI participated in protein purification and multi-angle light scattering. SAK aided in multi-angle light scattering experimental design and data analysis. AC conceived of the study and its design and aided in the preparation of the manuscript draft. All authors have read and approved the manuscript.
2019-04-18T20:52:22Z
https://bmcmicrobiol.biomedcentral.com/articles/10.1186/s12866-015-0387-7
Mutagenesis is a useful tool in many crop species to induce heritable genetic variability for trait improvement and gene discovery. In this study, forward screening of a soybean fast neutron (FN) mutant population identified an individual that produced seed with nearly twice the amount of sucrose (8.1% on dry matter basis) and less than half the amount of oil (8.5% on dry matter basis) as compared to wild type. Bulked segregant analysis (BSA), comparative genomic hybridization, and genome resequencing were used to associate the seed composition phenotype with a reciprocal translocation between chromosomes 8 and 13. In a backcross population, the translocation perfectly cosegregated with the seed composition phenotype and exhibited non-Mendelian segregation patterns. We hypothesize that the translocation is responsible for the altered seed composition by disrupting a β-ketoacyl-[acyl carrier protein] synthase 1 (KASI) ortholog. KASI is a core fatty acid synthesis enzyme that is involved in the conversion of sucrose into oil in developing seeds. This finding may lead to new research directions for developing soybean cultivars with modified carbohydrate and oil seed composition. Seed composition traits are important targets for soybean [Glycine max (L.) Merr.] improvement as human and animal nutrition is largely dependent on the quality and quantity of seed constituents. Modern soybean cultivars contain ∼40% protein, 20% oil, 5% ash, and 35% carbohydrates on a dry matter basis. Of the carbohydrates, 11% are soluble, with sucrose contributing the largest portion (2.5–8.2% total dry seed weight) (Hymowitz et al. 1972; Openshaw and Hadley 1978; Liu 1997). The demand for high-quality soybeans has driven breeders to select for lines with higher protein, higher oil, and improved carbohydrate profiles (increased sucrose content and decreased raffinose and stachyose) (Taira 1990; Hagely et al. 2013). Targeted improvement in soybean seed composition profiles is a goal for many breeding and genetic engineering programs (Hymowitz et al. 1972; Mazur et al. 1999; Herman et al. 2003; Fehr 2007). To increase the efficiency and precision of altering these traits, an understanding of the genes that regulate seed composition is needed. Many studies have been conducted to understand the metabolic pathways governing the accumulation of seed constituents; however, much less is known about the regulation of the partitioning between the various pathways (Ruuska 2002; Santos-Mendoza et al. 2008; Chen et al. 2009; Weselake et al. 2009; Hutcheon et al. 2010; Bates et al. 2013). A comprehensive understanding of the genes that regulate seed metabolism can inform and enable molecular breeding approaches for the development of novel seed composition traits. For example, the development of high-oleic acid soybean lines has been achieved through the identification and utilization of mutations in fatty acid desaturase genes (Pham et al. 2010; Haun et al. 2014). In order to facilitate future genetic gains, it is important to identify new genetic variation that can be utilized by breeders to improve seed composition. Mutagenized populations, created via irradiation or chemical mutagenesis, serve as valuable tools for creating new phenotypic variation and studying gene function. Chemical mutagens, such as ethyl methanesulfonate or N-methyl-N-nitrosourea, have been effective at producing point mutations in soybean for studying gene function (Cooper et al. 2008; Dierking and Bilyeu 2009; Hudson 2012). Ultraviolet, X-ray, or FNs are irradiation mutagen sources that often result in large-scale structural changes on chromosomes (Li et al. 2016). Soybeans have been shown to be resilient to the genome aberrations induced by FNs, including large deletions, duplications, and translocations (Findley et al. 2011; Bolon et al. 2014; Stacey et al. 2016). In subsequent follow-up studies, mapping has been done to associate FN-induced structural variations with traits such as alterations in seed composition, short petioles, and gnarled trichomes (Bolon et al. 2011, 2014; Campbell et al. 2016). The overall objective of this study was to identify the causal variant underlying a soybean mutant with altered seed sucrose and oil content. A soybean FN population (Bolon et al. 2011, 2014) was screened and a high-sucrose/low-oil mutant was identified. This mutant line was identified as having almost twice the amount of sucrose (8.1% on dry matter basis vs. a wild-type value of 4.7%) and less than half the amount of oil (8.5% on dry matter basis vs. a wild-type value of 19.6%) as compared to wild type, while maintaining average levels of protein content (38.2% on dry matter basis vs. a wild-type value of 39.7%). Subsequent mapping and genomic analyses revealed that the region responsible for this trait localizes to a FN-induced translocation that disrupted the coding region of an ortholog of KASI, a gene involved in regulating carbohydrate metabolism during seed filling. The high-sucrose/low-oil mutant was first identified from a mutant screen of ∼17,000 M2 individuals (Bolon et al. 2011, 2014). Nondestructive, whole-seed phenotyping was done on the population using Near Infrared (NIR) Spectroscopy at the University of Minnesota NIR Spectroscopy lab (St. Paul, MN) using a Perten DA7200 diode array instrument (Huddinge, Sweden) equipped with calibration equations developed by Perten in cooperation with the University of Minnesota. Lines of interest based on initial phenotypic screens were advanced, including FN0176450 (Figure 1A). More detailed descriptions of the FN population have been previously described (Bolon et al. 2011, 2014). Briefly, single M2 plants were grown in a grid pattern, the resulting M3 seed from each individual plant was planted in plant rows, and 10 individuals were harvested from each row creating families of 10 plants each. Subsequent generations were bulk-harvested until the M3:7 generation (Figure 1A). Flow chart of mutant line advancement and mapping. (A) Diagram displays how the mutants were advanced starting at the M1 generation. (B) A flow chart of the development of the F2 populations used for mapping and the steps taken to identify the structural variant associated with the phenotype of interest (high-sucrose/low-oil). aCGH, array comparative genomic hybridization; NGS, next-generation sequencing; SSD, single-seed-descent; SV, structural variation. Two separate populations were created with FN0176450, an outcross population for mapping the causal variant and a backcross population for validating the cosegregation of the variant with the phenotype. To generate the outcross population, the M3:7 generation of FN0176450 was crossed to cv. “Noir 1” subline Noir1-SGC-01 (herein called “Noir 1”) (McHale et al. 2012). The F1 seed was planted in a greenhouse, and the segregating F2 population was grown on 30-inch rows at St. Paul, MN during the summer of 2014. All F2 individuals were tagged, and fresh leaf tissue was collected and freeze-dried for later DNA extraction of select individuals. The plants were individually harvested and the F2:3 seeds were analyzed for sucrose and oil content. The backcross population was created by crossing FN0176450 to “M92-220” (Figure 1B). The F1 seed was planted in a greenhouse, and the BC1F2 population was grown on 30-inch rows at St. Paul, MN during the summer of 2015. All BC1F2 individuals were tagged, and fresh leaf tissue collected and freeze-dried for later DNA extraction of all individuals. At maturity, the BC1F2 plants were individually harvested and the BC1F2:3 seeds were analyzed for sucrose and oil content. Seed composition profiles of the high-sucrose/low-oil mutant, the wild-type line (“M92-220”), and the progeny from both the outcross and backcross populations were assessed using multiple methods. Seed composition profiles of all samples in this study were determined using NIR spectroscopy of whole seeds (described above). NIR was considered sufficient for quantifying total protein and oil composition. Chemical analysis to determine soluble carbohydrate (sucrose, raffinose, and stachyose) content of the wild-type and high-sucrose/low-oil mutant lines was done at the University of Missouri (UMO) Agricultural Experiment Station Chemical Laboratories (Columbia, MO) where gas–liquid chromatography (GLC) was used to quantify sugar content (Bhatti et al. 1970; Janauer and Englmaier 1978). Further chemical analysis of seed, including the high-sucrose/low-oil mutant “M92-220” and bulks of segregating BC1F2 plants, were analyzed at Eurofins Nutrition Analysis Center (Des Moines, IA). Sucrose content at Eurofins was analyzed with the Association of Official Agricultural Chemists (AOAC) 982.14 reference method using HPLC and an Evaporative Light Scattering Detector. Crude fat/oil concentration at Eurofins was analyzed using the American Oil Chemist’s Society (AOCS) method Ac 3–44, and protein concentration at Eurofins was measured using methods AOAC 992.15, AOAC 990.03, and AOCS Ba 4e−93. These same bulks were also analyzed at the University of Tennessee gas chromatography lab (Knoxville, TN) for fatty acid composition as described in Hyten et al. (2004). Wet chemistry analysis of soybean seeds is costly and requires large quantities of seed. Therefore, the hundreds of plants that required a sucrose phenotype in the segregating populations were assessed using in-house phenotyping methods. An enzymatic assay was modified from the assay described by Teixeira et al. (2012). Herein, this method will be referred to as the “colorimetric” assay. The assay combines the action of invertase and glucose oxidase and is adapted to a 96-well ELISA plate, allowing for high-throughput and cost-effective analysis of sucrose content on a dry weight basis (Teixeira et al. 2012). First, 20 seeds from each sample were ground using a Hamilton Beach chamber coffee grinder. The samples were dried in an oven at 105° for 5 hr and soluble carbohydrates were extracted with 80% ethanol at 70° for 90 min. Invertase (invertase from baker’s yeast, SKU I4504, Sigma-Aldrich) was used to hydrolyze sucrose into glucose and fructose. A glucose assay kit (Glucose assay kit, SKU 120003400A, Eton Bioscience) was used to quantify the glucose in the solution. The solution in each well became pink based on the concentration of glucose in the sample, and this was quantified by analyzing the absorbance at 490 nm with a microplate reader (BioTek Synergy 2, BioTek Instruments, Winooski, VT) and comparing observed values to a standard reference curve of known sucrose concentrations. These standard solutions were prepared using sucrose analytical standard (Sigma-Aldrich, SKU 47289) and prepared at concentrations of 0, 0.05, 0.075, 0.10, 0.125, 0.15, 0.175, 0.2, 0.225, 0.25, 0.275, and 0.30 g of sucrose/100 ml. Array comparative genomic hybridization (aCGH) is a microarray-based approach that can be used to identify structural variants, as previously described (Bolon et al. 2011, 2014; Haun et al. 2011). In this study, aCGH was performed on M3:8 plants that were direct descendants of the M3:7 mutants used in making crosses (see Figure 1B). The aCGH array (Agilent Technologies, Inc.) was utilized to compare signal intensities of mutant DNA and wild-type (“M92-220”) DNA hybridized to unique probes designed from the soybean reference genome sequence (version Glyma.Wm82.a2.v1; Song et al. 2016). The microarray was designed with one million probes tiled throughout the genome and spaced to enrich for genic regions. Labeling reactions with mutant (Cy3) and reference (Cy5) dye were performed with 500 ng DNA from both the FN0176450 mutant and wild-type “M92-220” leaf tissue. Labeled DNA was hybridized to the microarray for 66 hr at 67° according to the manufacturer’s instructions. Log2 ratios between the control and mutant hybridizations were calculated for each probe. Labeling, hybridization, washing, and data acquisition were all performed according to the manufacturer’s protocols. For each CGH run, the aberration algorithm (ADM-2) in the Agilent Genomic Workbench software (version 7.0.4.0) and the Agilent feature extraction (version 12.0.0.7) were used to extract raw data and call significant aberrations. Visual assessment of aCGH data was done using JMP Pro (version 12) software. BSA using whole-genome sequencing was performed on the F2 population (“Noir 1” × FN0176450) in a similar fashion as in previous experiments (Michelmore et al. 1991; Abe et al. 2012; Campbell et al. 2016). Two pools of bulks were created: a high-sucrose bulk and a low-sucrose bulk. These bulks consisted of 15 F2 individuals with the highest sucrose content in bulk 1 and 19 F2 individuals with the lowest sucrose content in bulk 2. DNA from selected individuals was prepared from freeze-dried leaf tissue from the 2014 growing season. One DNeasy (QIAGEN DNeasy Plant Mini Kit) was used for each bulk using equal amounts of leaf tissue from each individual in the bulk. A total of 20 mg freeze-dried leaf tissue was used for each bulk and ground using a QIAGEN Tissue Lyser II. After DNA extraction, the bulks were sent to the University of Minnesota Genomics Center for Illumina NGS. Samples were sequenced on a HiSequation 2500 HO 100 paired-end run using v4 chemistry and run using Rapid chemistry. The sequence data quality was checked with FastQC version 0.11.2 before and after sequence data alterations to ensure the data were of sufficient quality for downstream BSA applications. Cutadapt version 1.6 was used to trim adapter sequences and remove low-quality reads. A limit was set, at which reads were removed if adapter trimming resulted in reads smaller than 30 bp. Fastx toolkit version 0.0.14 was used to remove low-complexity sequences. Fastq quality trimmer in the fastxtoolkit was also used to remove reads with phred quality scores <20. In this pipeline, BWA mem (v. 0.7.10) was used for mapping, using the Wm82.a2.v1 reference genome sequence. A mismatch penalty was set in BWA to allow for approximately six high-quality mismatches per read. Variant calling was done using the Genome Analysis Tool Kit (GATK version 3.3 49) Unified Genotyper, calling only SNPs at Wm82.a2.v1 positions of the SoySNP50K platform (Song et al. 2013). Uninformative SNPs were removed, including low-quality points where the read depth was <10 and nonpolymorphic SNPs between the parents. After uninformative data were removed, allele frequencies were calculated for each position in the two bulks. A python script (called “VCF_MAF”) was used to calculate the allele frequency of the alternate allele at each of the 50 K positions based on allele depth ratios at each position. This script was used in a previous experiment (Campbell et al. 2016) and is publicly available at “https://github.com/TomJKono/Misc_Utils.” To calculate the percentage of the FN0176450 parent allele in each of the bulks, reference allele frequency was used (1-alt allele frequency) if the mutant parent allele was the same as the reference (genotype Williams 82) allele. The alternate allele frequency was used if the mutant parent allele was the same as the alternate allele. The allele frequencies were plotted and visually analyzed for spreads in allele frequency between the two bulks, as previously demonstrated (Campbell et al. 2016). NGS was also performed on the FN0176450 line using the same sequencing pipeline as that used in the bulked samples. After mapping, Integrative Genomics Viewer Version 2.3 (Broad Institute) was used to analyze Illumina sequencing data of the high-sucrose/low-oil mutant line. The association between the reciprocal translocation and the altered sucrose and oil seed content phenotype was tested by phenotyping and genotyping 93 plants in the backcross BC1F2 population. Phenotyping was done using both NIR and the colorimetric assay. A scatterplot was made using the ggplot2 package in R statistical software (Vienna, Austria). Genotyping was performed using translocation-specific PCR primers (Supplemental Material, Table S1 in File S1) designed using sequencing data from FN0176450. Sequencing data for FN0176450 and “M92-220” is available in the NCBI Sequence Read Archive as accession numbers SRX467183 and SRX82634, respectively. Sequencing data for the two bulked samples are publicly available in the NCBI Sequence Read Archive as accession numbers SRX2438554 and SRX2438555, respectively. The comparative genomic hybridization data for the three replications comparing FN0176450 and “M92-220” can be found as accession number GSE93411 in the National Center for Biotechnology Information Gene Expression Omnibus (http://www.ncbi.nlm.nih.gov/geo). An initial screen of several thousand soybean FN plants by NIR (Bolon et al. 2011) identified plant FN0176450 as a seed composition mutant. This line was advanced for its high-sucrose and low-oil phenotype, along with other lines that were at least 2 SDs above or below the mean of the population for seed composition traits. The phenotype of this mutant was measured over 6 yr and consistently showed an elevated sucrose and reduced oil seed composition phenotype compared to the wild-type “M92-220” line. The protein and oil measurements were determined by NIR analysis, while the sucrose measurements were determined by a combination of NIR and GLC. Seed sucrose and oil levels were significantly different every year between FN0176450 and M92-220, while seed protein levels were not determined to be statistically different. These differences observed for sucrose and oil content over the 6 year period indicated a heritable change induced by the FN mutagen. FN0176450 also exhibited a visible phenotype in the seed, including a whiter coloration and a more wrinkled seed coat than wild-type seeds (Figure S1 in File S1). Seed harvested from the 2015 field season were analyzed by the Eurofins Nutrition Analysis Center to validate and better quantify the seed composition differences between FN0176450 and the wild-type parent. Results from these analyses showed major differences between the mutant and wild-type lines for sucrose, oil, and fatty acids. On average, the high-sucrose/low-oil mutant seeds had a 72% increase in sucrose content compared to wild type on a total seed dry weight basis (from 4.7 to 8.1% sucrose dry weight). In addition, the high-sucrose/low-oil mutant had an average reduction of 57% in seed oil content compared to wild type on a total dry weight basis (from 19.6 to 8.5% oil dry weight). For the fatty acid portion of the seed, the high-sucrose/low-oil mutant exhibited a 25% decrease in oleic acid compared to wild type (from 28 to 21% oleic acid in total fat) and a 120% increase in linolenic acid compared to wild type (from 6.5 to 14.5% linolenic acid in total fat). There were no major differences in protein content, raffinose, stachyose, or other fatty acids (palmitic, stearic, and linoleic) between the mutant and wild-type lines. BSA, aCGH, and NGS were used in combination to map the high-sucrose/low-oil mutant (Figure 1). First, aCGH was conducted to locate putative structural variants throughout the genome. The analysis of the aCGH data revealed many putative homozygous deletions on chromosomes 6, 7, 8, 10, 14, 16, and 18, ranging from 38 kb to 4 Mb (Figure S2 in File S1). Mapping was conducted to identify the structural variant associated with the high-sucrose/low-oil seed composition phenotype. FN0176450 was crossed to genotype “Noir 1” to generate a segregating F2 population for mapping. The distribution of seed sucrose content for the F2 population, as measured by a colorimetric assay, is displayed in Figure 2A, with shaded bars indicating the individuals selected for the high- and low-sucrose bulks for BSA. Across the genome, each bulk is expected to have approximately equal ratios of DNA from each parent. However, at SNPs surrounding the causative QTL, a spread in allele frequencies is expected between the high- and low-sucrose bulks. Visual analysis was done on all 20 chromosomes for this spread in allele frequency, and a 9 Mb interval on chromosome 8 between positions ∼3 and ∼12 Mb was found to be of interest due to its conspicuous spread in allele frequencies between the two bulked samples (Figure 2B). A closer look at the aCGH data in this interval revealed a single probe (Gm_CUST_P11209911) with a log2 ratio of −6.8 in FN0176450 at position 6,358,158 bp, between the fourth and fifth exon of a single gene model Glyma.08G084300 (Figure 2, C and D). Spurious data points can occur in aCGH analyses; however, this particular probe was consistently observed to indicate a deletion at this locus across three replicated aCGH hybridizations. A flow chart of trait mapping. Bulked Segregant Analysis (BSA) was performed on an F2 outcross population to identify a structural variant in a β-ketoacyl-[acyl carrier protein] synthase 1 (KASI) ortholog associated with a high-sucrose/low-oil phenotype. (A) A histogram of sucrose content, as measured by the colorimetric assay, for the 113 individuals in the F2 population (“Noir 1” × FN0176450). Shaded histogram bars indicate those individuals that were selected for BSA and the vertical red and blue dashed lines indicate the parental phenotypes. Two bulks of DNA were formed (high-sucrose individuals and low-sucrose individuals) for whole-genome sequencing. (B) The allelic ratio for each single nucleotide polymorphism (SNP) along chromosome 8 in the high-sucrose (red data points) and low-sucrose bulks (blue data points). (C) The array comparative genomic hybridization (aCGH) graph displays the log2 ratio of the mutant genotype vs. the “M92-220” reference, where each dot represents a single aCGH probe. If the log2 ratio is <0, that indicates that the probe had a stronger signal intensity in wild type than in mutant, while a log2 ratio >0 would indicate a stronger signal intensity in mutant than wild type. A black box was drawn around a single probe with a low log2 ratio (log2 ratio = −6.5) highlighting that this probe was likely present in the wild-type line and absent in the high-sucrose/low-oil mutant line. (D) A structural variant between the fourth and fifth exon of Glyma.08g084300, indicated by the red lightning bolt. Analyses of the FN0176450 resequencing paired-end read data were subsequently used to infer the nature of the structural variation at this chromosome 8 position. A single base pair deletion was found within the sequence that matched the aCGH probe of interest. Furthermore, it was observed that reads flanking the 1 bp deletion were paired with reads mapping to chromosome 13. Moreover, the reads mapping to this chromosome 13 region were located near a 3 bp deletion. It was determined that numerous read pairs exhibited respective reads that mapped to chromosomes 8 and 13 at regions flanking the 1 and 3 bp deletions, indicating that a reciprocal translocation may have occurred between these regions. Subsequent PCR amplification between the chromosome 8 and 13 regions, and Sanger sequencing of the PCR products, confirmed the presence of the reciprocal translocation between the two chromosomes (Figure S3 and Table S1 in File S1). The chromosomal translocation disrupts a gene (Glyma.08G084300) on chromosome 8 between the fourth and fifth exons (Figure 2D) and does not affect any predicted genes on chromosome 13. The closest Arabidopsis ortholog of Glyma.08G084300 is AT5G46290.1, which is annotated as KASI (Wu and Xue 2010). KASI is responsible for playing crucial roles in fatty acid synthesis (Figure S4 in File S1), chloroplast division, and embryo development (Wu and Xue 2010). Glyma.08G084300 has one close paralog in soybean, gene model Glyma.05g129600 (Schmutz et al. 2010; Song et al. 2016). The association of the reciprocal translocation between chromosomes 8 and 13 and the phenotype was validated by analyzing the seed composition profiles in a segregating backcross population developed by mating FN0176450 to M92-220. A total of 93 BC1F2 individuals were genotyped using four separate primer pair combinations, respectively designed to detect the wild-type chromosome 8, the wild-type chromosome 13, the 8–13 translocation junction, and the 13–8 translocation junction (Table S1 in File S1). The individuals were also phenotyped for sucrose content using the colorimetric assay and were assayed for protein, oil, fatty acids, and amino acids using NIR. Three genotypic classes were identified in the population using the PCR assays, consisting of homozygous wild type, heterozygous translocation, and homozygous translocation (Figure 3A). Out of the 93 individuals genotyped, 33 were homozygous wild type, 53 heterozygous translocation, and seven homozygous translocation. Table 1 displays the average seed composition phenotypes of each of these three classes. There was a significant difference for both sucrose content (P < 0.0001) and oil content (P < 0.0001) for each of the three classes, with cosegregation of the translocation and the increased sucrose/decreased oil phenotype (Figure 3B). The seed phenotypes observed in the homozygous translocation BC1F2 individuals exhibited no significant difference compared to the mutant parent FN0176450 (P = 0.15). Similarly, the seed phenotypes observed in the homozygous wild-type BC1F2 individuals exhibited no significant difference compared to the wild-type parent M92-220 (P = 0.083). F2:3 plant rows of select BC1F2 individuals grown in 2016 showed the same results as the individual plant analysis in 2015. All of these results combined indicate that the mutant seed composition phenotype is fully explained by the translocated locus. The association between the reciprocal translocation and seed sucrose and oil content. (A) Chromosome 8 (blue) and chromosome 13 (red) in homozygous translocation, heterozygous translocation, and homozygous wild-type states are shown. (B) The sucrose and oil seed composition in which each data point represents an individual in the BC1F2 population and colored by genotype class. This study utilized BSA, aCGH, and NGS to locate a FN-induced reciprocal translocation associated with increased sucrose and decreased seed oil content in soybean seeds. This association was validated in a more uniform genetic background through the creation and subsequent phenotyping and genotyping of a backcross population. The cosegregation between the translocation and the phenotype provides good evidence of the association. In addition, a single gene (Glyma.08G084300) was disrupted by the translocation event and is a clear candidate gene for this phenotype as it is an ortholog of KASI in Arabidopsis, which also exhibits a similar seed composition phenotype of reduced total oil content (Wu and Xue 2010). The first functional characterization of KASI was performed in Arabidopsis. It was found that KASI is involved in fatty acid synthesis and chloroplast division and development (Wu and Xue 2010). In addition to Arabidopsis, work has been done in barley, rice, peanut, and tobacco to isolate and characterize KASI genes (Siggaard-Andersen et al. 1991; Chi et al. 2010; Domoney et al. 2013; Ding et al. 2015; Yang et al. 2016). Some of these studies suggested that silencing of KASI leads to decreased oil accumulation and altered fatty acid composition in seed, and impaired root cell elongation. In addition to altered seed chemical profiles, the FN0176450 mutant line also showed a wrinkled seed phenotype (Figure S1 in File S1). This phenotype is similar to that seen in an Arabidopsis mutant of wrinkled1 (wri1) (Focks and Benning 1998), which encodes an AP2/EREBP transcription factor that alters the transcription of genes related to the biosynthesis of seed storage compounds (Ruuska 2002). Arabidopsis mutants of wri1 had an 80% reduction in seed oil content accompanied with increased sucrose and glucose content, indicating that wri1 is involved in the regulation of carbohydrate metabolism (Focks and Benning 1998). Mutants of wri1 in Arabidopsis showed altered fatty acid composition profiles similar to that of the FN mutant presented here. The FN mutant in this study showed a 7% point reduction in oleic acid content (21% of the total fat, as compared to 28% in wild type). This is similar to the 10% point reduction shown in the Arabidopsis wri1 mutant (13% of the total fat, as compared to 23% in wild type). Furthermore, the linolenic acid content was increased by 8% points in the FN mutant (14% of the total fat, as compared to 6% in wild type) and by 6% points in the Arabidopsis wri1 mutant (16% of the total fat, as compared to 10% in wild type). As suggested by Focks and Benning (1998), this could be a result of reduced carbon flux into fatty acids. The similarity of the wri1 and FN0176450 phenotypes suggests that disrupting the KASI ortholog in FN0176450 caused both the high-sucrose/low-oil phenotype as well as the wrinkled seed phenotype. Furthermore, it is worth noting that the disrupted soybean KASI ortholog in this study (Glyma.08G084300) has a paralogous copy (Glyma.05g129600), whereas Arabidopsis only appears to have one functional KASI gene. It is likely that a full knockout in Arabidopsis would have a strongly deleterious or lethal affect, and may explain why no known knockout line has been identified to date. In soybean, one might hypothesize that the paralogous copies have fully or nearly identical functions, but knockout of one copy reduces the metabolic flux of this function resulting in a viable but dramatically altered seed composition. This hypothesis is partially supported by the gene transcription of the two paralogous copies, which exhibit similar transcription levels across all tissues (Severin et al. 2010). The silencing or knockdown of wri1 leads to a reduction in seed oil content while the overexpression of wri1 causes an accumulation of triacylglycerols in developing seeds of Arabidopsis, camelina, and maize (Focks and Benning 1998; Cernac and Benning 2004; Pouvreau et al. 2011; An and Suh 2015). In Arabidopsis, only a few genes involved in seed metabolism (45 of the >3500 genes) were differentially transcribed in the wri1 mutant compared to wild type. KASI was among the few seed metabolism genes that exhibited differential transcription (Ruuska 2002), providing further evidence that KASI may be involved in the central metabolism of carbohydrates. The inheritance patterns of the translocation in the BC1F2 population did not match Mendelian expectations, as assessed by the presence and absence of the four PCR assays among the 93 segregating individuals. First, proper Mendelian segregation would predict nine different marker presence/absence combinations among the four PCR assays. However, only three combinations were observed, matching those expected of homozygous wild-type, homozygous translocated, and heterozygous translocated individuals. These three classes are each expected to arise from the fertilization between balanced gametes, wherein each gamete either carries both wild-type chromosomes 8 and 13, or both reciprocally translocated chromosomes (8–13 and 13–8). The remaining six classes, which were not observed, would have been derived from unbalanced gametes, carrying one wild-type chromosome with a translocated chromosome segment. The lack of progeny from these six classes indicates that the duplication and deficiencies harbored by the meiotic cosegregation of a wild-type and translocated chromosome results in nonviable gametes. Given that only balanced gametes were viable in this population, the predicted Mendelian ratio of the three observed genotypic classes would be (1) “homozygous wild type”: (2) “heterozygous translocation”: (1) “homozygous translocation.” While the ratio of homozygous wild type to heterozygous translocation approximated 1:2 (33:53 was observed), the seven homozygous translocated individuals were much lower than expected. This is likely the result of reduced germination of the mutant seed. In fact, the mutant parent line exhibited a germination rate of <50% across multiple years, supporting this hypothesis. It is possible that the fitness penalty of the homozygous translocation is attributable to the extreme high-sucrose/low-oil phenotype of the seed, and its effect on germination. This reduced fertility of the mutant is consistent with other studies that analyzed the fertility of lines harboring mutations in key fatty acid enzymes, including KASI (Mou et al. 2000; Wu and Xue 2010). Therefore, we speculate that the inviability of unbalanced gametes and the penalty on seed viability in the homozygous mutant KASI-like individuals explain the distorted segregation in this population. Lastly, we hypothesize that the altered seed composition of the mutants is determined by the genetics of the seed rather than the genetics of the mother plant. This effect could be tested by phenotyping the segregation patterns of individual seeds derived from a single heterozygous mother plant. In this study, all phenotyping was performed on multiple seeds, following harvest from single plants. Heterozygous individuals in the backcross population had a phenotype (16.2% oil, 5.2% sucrose) that was intermediate compared to the wild-type segregants (19.7% oil, 4.6% sucrose) and the homozygous mutant segregants (8.8% oil, 8.0% sucrose). However, these data do not reveal whether the individual seeds from the heterozygous plant were essentially monomorphic or polymorphic for this phenotype. Assuming that unbalanced gametes are not viable, we would expect that the individual seeds from a heterozygous plant would segregate 1:2:1 for wild-type, intermediate (heterozygous), and mutant seed composition phenotypes. The phenotyping of multiple seeds together thus reveals an intermediate phenotype. While phenotype data from single seeds may exhibit high experimental variability, it may also reveal segregation within a single heterozygous plant, thus confirming the hypothesis that this mutant phenotype is controlled by the genetics of the seed per se. This study provides a candidate gene for further investigation on the regulation of carbohydrate metabolism in soybean seeds. It will be interesting to test alternative alleles of this gene, including nonknockout alleles and those with altered amino acid sequences, to identify different phenotypic outcomes. To our knowledge, there have not been any characterized mutants of this gene in soybean and further understanding of its role in regulating the accumulation of seed storage compounds will provide new methods for altering (and improving) the seed composition profile of elite soybean cultivars for human and animal nutrition and other end uses. The authors are grateful to Dimitri von Ruckert, Jill Miller-Garvin, and Jeffrey Roessler for project support, and acknowledge the Minnesota Supercomputing Institute at the University of Minnesota for providing resources that contributed to the research results reported within this paper (URL: http://www.msi.umn.edu). This work was supported by the Minnesota Soybean Research and Promotion Council (#19-16C), the United Soybean Board (#1520-532-5603), and the National Science Foundation (#MCB-1444581). Author contributions: A.A.D., R.M.S., S.L.N., and G.J.M. conceived this study. A.A.D., J.-M.M., B.W.C., K.S.V., and A.O.S. performed the research. A.A.D., S.L.N., and R.M.S. wrote the manuscript. Supplemental material is available online at www.g3journal.org/lookup/suppl/doi:10.1534/g3.116.038596/-/DC1. Copyright © 2017 Dobbels et al. , 2012 Genome sequencing reveals agronomically important loci in rice using MutMap. Nat. Biotechnol. 30: 174–178. , 2015 Overexpression of Arabidopsis WRI1 enhanced seed mass and storage oil content in Camelina sativa. Plant Biotechnol. Rep. 9: 137–148. , 2013 Biochemical pathways in seed oil synthesis. Curr. Opin. Plant Biol. 16: 358–364. , 1970 The gas chromatographic properties of biologically important N-acetylglucosamine derivatives monosaccharides, disaccharides, trisaccharides, tetrasaccharides and pentasaccharides. Biochim. Biophys. Acta 222: 339–347. , 2011 Phenotypic and genomic analyses of a fast neutron mutant population resource in soybean. Plant Physiol. 156: 240–253. , 2014 Genome resilience and prevalence of segmental duplications following fast neutron irradiation of soybean. Genetics 198: 967–981. , 2016 Fast neutron-induced structural rearrangements at a soybean NAP1 locus result in gnarled trichomes. Theor. Appl. Genet. 129: 1725–1738. , 2004 WRINKLED1 encodes an AP2/EREB domain protein involved in the control of storage compound biosynthesis in Arabidopsis. Plant J. 40: 575–585. , 2009 System analysis of an Arabidopsis mutant altered in de novo fatty acid synthesis reveals diverse changes in seed composition and metabolism. Plant Physiol. 150: 27–41. , 2010 Isolation and expression analysis of a β-ketoacyl-acyl carrier protein synthase I gene from Arachis hypogaea L. Legum. Genomics Genet. 1: 11–17. , 2008 TILLING to detect induced mutations in soybean. BMC Plant Biol. 8: 1–10. , 2009 New sources of soybean seed meal and oil composition traits identified through TILLING. BMC Plant Biol. 9: 89. , 2015 OsKASI, a β-ketoacyl-[acyl carrier protein] synthase I, is involved in root development in rice (Oryza sativa L.). Planta 242: 203–213. , 2013 Exploiting a fast neutron mutant genetic resource in Pisum sativum (pea) for functional genomics. Funct. Plant Biol. 40: 1261–1270. , 2007 Breeding for modified fatty acid composition in soybean. Crop Sci. 47: S72–S87. , 2011 Fluorescence in situ hybridization-based karyotyping of soybean translocation lines. G3 1: 117–129. , 1998 wrinkled1: a novel, low-seed-oil mutant of Arabidopsis with a deficiency in the seed-specific regulation of carbohydrate metabolism. Plant Physiol. 118: 91–101. , 2013 Classification of distinct seed carbohydrate profiles in soybean. Agric. Food Chem. 61: 1105–1111. , 2014 Improved soybean oil quality by targeted mutagenesis of the fatty acid desaturase 2 gene family. Plant Biotechnol. J. 12: 934–940. , 2011 The composition and origins of genomic variation among individuals of the soybean reference cultivar Williams 82. Plant Physiol. 155: 645–655. , 2003 Genetic modification removes an immunodominant allergen from soybean. Plant Physiol. 132: 36–43. , 2012 Soybean oil-quality variants identified by large-scale mutagenesis. Int. J. Agron. 2012: 569817. , 2010 Polyploid genome of Camelina sativa revealed by isolation of fatty acid synthesis genes. BMC Plant Biol. 10: 233–247. , 1972 Relationship between the content of oil, protein, and sugar in soybean seed. Agron. J. 64: 613–616. , 2004 Molecular mapping and identification of soybean fatty acid modifier quantitative trait loci. J. Am. Oil Chem. Soc. 81: 1115–1118. , 1978 Multi-step time program for the rapid gas-liquid chromatography of carbohydrates. J. Chromatogr. A 153: 539–542. , 2016 Genome-wide sequencing of 41 rice (Oryza sativa L.) mutated lines reveals diverse mutations induced by fast-neutron irradiation. Mol. Plant 9: 1078–1081. , 1997 Soybeans Chemistry, Technology, and Utilization. Chapman and Hall, New York. , 1999 Gene discovery and product development for grain quality traits. Science 285: 372–376. , 2012 Structural variants in the soybean genome localize to clusters of biotic stress-response genes. Plant Physiol. 159: 1295–1308. , 1991 Identification of markers linked to disease-resistance genes by bulked segregant analysis: a rapid method to detect markers in specific genomic regions by using segregating populations. Genetics 88: 9828–9832. , 2000 Deficiency in fatty acid synthase leads to premature cell death and dramatic alterations in plant morphology. Plant Cell 12: 405–418. , 1978 Maternal effects on sugar content in soybean seeds. Crop Sci. 18: 581–584. , 2004 Registration of “MN1302” soybean. Crop Sci. 44: 693. , 2010 Mutant alleles of FAD2–1A and FAD2–1B combine to produce soybeans with the high oleic acid seed oil trait. BMC Plant Biol. 10: 195. , 2011 Duplicate maize Wrinkled1 transcription factors activate target genes involved in seed oil biosynthesis. Plant Physiol. 156: 674–686. , 2002 Contrapuntal networks of gene expression during Arabidopsis seed filling. Plant Cell 14: 1191–1206. , 2008 Deciphering gene regulatory networks that control seed development and maturation in Arabidopsis. Plant J. 54: 608–620. , 2010 RNA-Seq Atlas of Glycine max: a guide to the soybean transcriptome. BMC Plant Biol. 10: 160. , 1991 Primary structure of a cerulenin-binding beta-ketoacyl-[acyl carrier protein] synthase from barley chloroplasts. Proc. Natl. Acad. Sci. USA 88: 4114–4118. , 2013 Development and evaluation of SoySNP50K, a high-density genotyping array for soybean. PLoS One 8: 1–12. , 2016 Construction of high resolution genetic linkage maps to improve the soybean genome sequence assembly Glyma1.01. BMC Genomics 17: 33. , 2016 Identification of homogentisate dioxygenase as a target for vitamin E biofortification in oilseeds. Plant Physiol. 172: 1506–1518. , 1990 Quality of soybeans for processed foods in Japan. Jpn. Agric. Res. Q. 24: 224–230. , 2012 Development of a method to quantify sucrose in soybean grains. Food Chem. 130: 1134–1136. , 2009 Increasing the flow of carbon into seed oil. Biotechnol. Adv. 27: 866–878. , 2010 Arabidopsis β-ketoacyl-[acyl carrier protein] synthase I is crucial for fatty acid synthesis and plays a role in chloroplast division and embryo development. Plant Cell 22: 3726–3744. , 2016 β-ketoacyl-acyl carrier protein synthase I (KASI) plays crucial roles in the plant growth and fatty acids synthesis in tobacco. Int. J. Mol. Sci. 17: 1287.
2019-04-18T12:37:58Z
http://www.g3journal.org/content/7/4/1215
Green Mountain Power(GMP) is a wholly-owned subsidiary of GazMetro of Quebec. GMP has applied to the Vermont Public Service Board for permission to take over Central Vermont Public Service: Docket 7700. If GMP owns CVPS, over 70% of Vermont will be served by a utility owned by Gaz Metro. Since Gaz Metro also owns Vermont Gas Systems (VGS), the only natural gas supplier to Vermont, this electric utility merger would be a major consolidation of Vermont energy infrastructure (electric and gas) in the hands of a foreign corporation. To me, this is very different from Unilever owning Ben and Jerry's. There are other sources for ice cream in Vermont. With the Gaz Metro takeover of GMP, there will be no competing sources of energy in most areas of Vermont. Governor Peter Shumlin favored a Gaz Metro takeover of CVPS, discouraging a bid from another Canadian utility. In analyzing the ramifications of this possible merger, I feel it has three over-arching issues. Foreign ownership of much of the energy infrastructure in the state. Weak regulation and conflict of interest in Vermont's own regulatory process. I covered the first two issues in an article this morning at True North Reports: The GMP/Gaz Metro merger. I plan to cover the third issue: weak regulation and conflict of interest, in a future article at True North Reports. This morning, Vermont Digger published an article about the conflict of interest issue in Vermont, which is being energetically pursued by Senator Vince Illuzzi. The Commissioner of the Department of Public Service, Elizabeth Miller, is married to a lawyer who is a partner in the law firm representing GMP in the merger. The Vermont Digger article is Before the PSB: State senator leverages fight over independent counsel for Gaz Metro merger. I encourage you to read it. The DPS says Ms. Miller does not have a conflict that would cause her to recuse herself. The Digger article is excellent, with many links to original documents, such as the DPS answer to Senator Illuzzi. I recommend this article very highly. When I write my own article (promises, promises) I also plan to cover recent Public Service Board decisions that protected utility and Gaz Metro interests, and did not protect the citizens. The charter of the DPS is to be the advocate of the ordinary citizen in cases before the PSB. DPS is not fulfilling to that charter, in my opinion. John McClaughry, head of the Ethan Allen Institute, was one of the first to raise the issue of infrastructure consolidation and conflict of interest, in his Vermont Tiger post Sen Illuzzi and the Utility Merger Case. The picture of Senator Illuzzi is borrowed from that post. On November 30, the film Transparent Radiation will be shown at the Gund Institute of the University of Vermont. The film is about nuclear energy, but the trailers also show nuclear bombs. The trailers also include people talking about how depleted uranium will be radioactive for billions of years. As will granite, of course! Howard Shaffer learned that there would be a panel discussion of the film, and asked to be on the panel. Actually, Howard asked if he and Dr. Ed Maher, recent past-president of the Health Physics Society, could be on the panel. They are now on the panel, along with Arnie Gundersen and others. Arnie Gundersen's wife, Maggie Gundersen, endorses the film very strongly. I am happy that Howard and Ed will be on the panel. However, considering both the venue and the film, I thought it would be good to tell pro-nuclear people about this event, in the hopes that some of us could come and support them. I wrote an email to my email list about it. Rod Adams is on the email list, and Rod posted my email on the Atomic Insights blog today: Nuclear Advocacy Opportunity in Vermont--November 30. I hope some of you can come. The film and panel begin at 4 p.m Wednesday November 30 on the UVM campus. The event is being held in the administration building, which has a visitor's parking lot. Details at Rod Adams blog. Thank you, Rod! Update: A press release at Vermont Digger. Neither rain nor snow nor Thanksgiving weekend stops the Nuclear Bloggers from their work. Today, the 80th Carnival of Nuclear Bloggers is hosted at Next Big Future. Okay. I admit it. It's a smaller Carnival this time. That just means you can read it more quickly! The Carnival includes a fascinating blog post by Will Davis of Atomic Power Review on the history of PRA (Probablistic Risk Assessment). If you ever wondered what that was, but had your eyes glaze over as it was explained, this is a must-read post. Dan Yurman at Idaho Samizdat describes the concrete cracking problems (solvable) that are delaying restart at two reactors. Gail Marcus of Nuke Power Talk has two posts, one about Japan's hundred-year energy plan, and one about polls about nuclear power which show support--even in Japan. Brian Wang of Next Big Future looks at anti-nuclear Chris Busby, who is selling "anti-radiation pills" in Japan (really!). Wang and environmentalist George Monbiot suggest that nuclear opponents run as fast as they can to distance themselves from this guy! Wang notes that the Fukushima reactors are nearing cold shutdown. Wang also includes two radiation surveys of Japan. One, of Fukushima workers, shows no contamination. The other, of the soils in Japan, shows contamination in some areas which must be addressed before these areas can go back to food production. Most of the radiation in one area was emitted on March 15, and in the other area, radiation came March 21. This is not cheery reading. On the other hand, the "on-going spewing from the crippled reactors" scare-mongers are just wrong. Bad things happened in March. We all noticed, and now it is time to clean up. Nagasaki bomb image from Wikipedia. Bomb imagery is included in some of the film trailers. Labels: Blog Carnival, Gundersens, Rod Adams, transparent radiation film. On November 22, a letter about Vermont Yankee appeared in the Brattleboro Reformer. This letter was unusual, because it was sent by the Putney Society of Friends. As members of the Religious Society of Friends, we believe we are called to be good stewards of the earth. Whether through weaponization, accident or mismanagement, the destruction of life and the degradation of nature has been, and continues to be, an ongoing consequence of the use of nuclear technology. As a result of these concerns, Putney Friends Meeting firmly supports the Vermont state government’s efforts to close the Vermont Yankee nuclear power plant by March 21, 2012. We call on all our members and attenders to consider joining the citizen’s movement working to enforce the people’s will on this matter, up to and including nonviolent protest and civil disobedience. We are made to be an integral part of this wondrous Creation. Let us choose now to take up our stewardship commitment, fully accepting our responsibilities to care for our planet and its peoples. Let us choose now to join with other Friends, and all people of good will and understanding, to move forward through worship and through witness to accomplish our goals. However, I do have a friend who is a Friend. Karen Street writes the blog A Musing Environment, and she and I have had friendly discussions on this blog about energy use. We don't always agree. Street wrote an excellent article in the Friend's Journal about nuclear power. She's in favor of it. The article is Earthquake, Tsunami and Nuclear Power in Japan. Here's a few quotes from that article, and I would also recommend reading comment 11, which is her rebuttal to some comments on the article. Fear of other can obscure and distort our perceptions of actual risks. For better or worse, one doesn't have to seek sources of risk in one's own behavior when there is a convenient other to blame for untoward outcomes, such as callous scientists and industry, inadequately regulated by government....Nuclear power plays a pivotal role in the we-good, they-bad fights among many Friends...While we steep ourselves in fears of what might happen at a nuclear plant this month or next, the climate continues to change at a frightening rate....A fear that says, "Well, nuclear power may end up killing someone" is, in this way of thinking, allowed to take precedence over far greater dangers to human beings. Any fear that says, "My fear is more important than the facts," a fear based on "what ifs," blinds us to steps that would address real and present dangers. Her article is very carefully researched. The article, combined with comment 11, is a good resource for anyone studying nuclear power. It is also fairly long. If you don't feel like reading it (or even if you do) I recommend this Friend's radio program interview instead. You can hear Street's kind and thoughtful voice, and think about what it means to be a Friend or a friend or an environmentalist. Here's a link to Street at Northern Spirit Radio. You don't have to sign in, by the way. They want you to sign in, but you don't have to. Separation of Church and State means that the State can't favor any particular Church. However, churches can definitely take stands on matters of state. This is the way freedom works. Still, I was not happy to see a church taking "shut down Vermont Yankee" as a religious injunction. Karen Street is a woman who owns no car, rides a bicycle, does not travel by plane, and is concerned with the future of mankind. As I mentioned before, she walks the talk about environmentalism and climate change. Through Karen Street, I see that the Society of Friends is not monolithic, and I am grateful for that. Update: Karen Street has an excellent update on her post, at Energy Collective today. The Discussion Continues: Nuclear Power in Japan. Street answers the questions raised as comments on the first post. "At today's [natural] gas prices, a new nuclear power plant is out of the money by a factor of two," Rowe said, echoing one of the main points of his speech. ".... It's economically wrong. Gas trumps it," he said. Entergy became the first US electric power company to establish a voluntary stabilization target for carbon pollution emissions and established a $30 million Environmental Initiatives Fund to support internal and external carbon pollution reduction projects. From 2001–2010, Entergy was 14% below its stabilization goals, achieving emission reductions which were 69 million tons below the goals. These CEOs have very different views of the future of fossil fuel combustion! However, both Leonard and Rowe are CEOs, with CEO-type obligations. Rowe of Exelon faced building an expensive new nuclear plant, and he walked away from it. While he was walking away, he took the opportunity to lob a few cracks at nuclear. Meanwhile, Entergy is committed to low-carbon power, but Entergy recently announced it is going to buy a 550 MW natural gas plant in Rhode Island. Both Entergy and Exelon own fossil and nuclear units. Such is the view from the corner office. My own office is a corner. It's a corner bedroom in my house. My view of fossil fuels and nuclear is more limited than the view of the CEOs, but it is also less constrained. I have always admired George Washington Carver, a man who protected the soil of the South and prepared many products from peanuts, thereby partially weaning the South from cotton. Oh, and did I mention he was born a slave? Inspired by Carver, I decided to look at two power plants as the examples of nuclear and natural gas: Vermont Yankee and a local combined cycle gas turbine (CCGT) plant in New Hampshire. Not a Big Picture, just two plants. My blog post comparing the plants is posted at ANS Nuclear Cafe: Gas and Nuclear: A Comparison of Two Local Plants. The post grows out of the Energy Safari course that just finished. Here's a link to the course blog post about the natural gas plant. The course blog post has many excellent pictures, taken by Bob Hargraves. Here are some conclusions about the two plants. For a more complete picture, please see the ANS post and the Energy Safari post. The natural gas plant is very new, clean and efficient. The economic choice between natural gas and nuclear is not a slam-dunk, even if Mr. Rowe thinks it is. Despite the historically low price of natural gas, and the high thermal efficiency of the CCGT plant, the local gas plant is still forced to shut down more often than it would prefer. Its power is among the most expensive power on the grid. Many times, its break-even price is too high for the grid, and the grid operators don't buy its power. The CCGT is a good plant for load-following. Choosing between natural gas and nuclear is a false choice, anyhow. They are both reliable sources of electricity. Fossil fuels, including natural gas, contribute a lot more to global warming than nuclear does. Despite all the hoopla about global warming, this is not usually taken into account in power choices. I encourage you to read the ANS blog post, and tell me what you think of my view-from-the peanut. Think locally, act locally, perhaps? George Washington Carver in his laboratory, photo from Wikipedia. I just finished Tent Life in Siberia, a tale of traveling through Siberia in the 1860s. The author writes like Mark Twain, with a similar sense of humor. I dare anyone to read this book without laughing out loud. Despite the humor, this is a book about--traveling in Siberia in the 1860s. To instill gratitude for absolutely everything in your life, I can't think of a better plan than sitting down to read this book. 2) I have a washing machine, and before I owned one, I used a laundromat. For this, I recommend Roslings' video, below. Why energy availability matters, especially to women. We just returned from a trip to California, where we used to live. This trip gave us another opportunity to realize how grateful we are for our long-term friends. K and K, this means you! The 79th Carnival of Nuclear Bloggers is now posted at ANS Nuclear Cafe. Dan Yurman has put together a fascinating Carnival. Let's start with Nuclear Green's contribution: a three- part interview with Sherrell Greene, a recently retired ORNL reactor researcher. Greene describes several types of new reactors, including several molten salt reactors, and point to the problems of "business as usual" in the nuclear industry. We need to develop new types of reactors! In a similar vein, Brian Wang of Next Big Future describes new types of uranium/thorium fuel under development, and third generation reactors on order in China. In several cheerful notes, both Gail Marcus and I enjoy a pro-nuclear cartoon from a Vermont newspaper. (Yes, you read that right. Pro-nuclear and Vermont newspaper appeared in the same sentence.) Dan Yurman at Idaho Samizdat explains how the next generation of nuclear engineers will have been raised on computer games---and that's a good thing. Gail Marcus of Nuke Power Talk describes the positive effects of Russia's interest in joining the international Nuclear Energy Agency (NEA). In 2006, Marcus headed an NEA delegation to Moscow to sign preliminary papers about cooperation, and that effort is bearing fruit. Good going, Marcus and NEA! Meanwhile, Rod Adams of Atomic Insights reports the good news that reporters are now allowed to visit Fukushima Daiichi. This shows great progress in the clean-up. Rod also reports that USA Today managed to turn this into a bad-news time-to-worry story. Steve Aplin of Canadian Energy Issues wonders why the Occupy protesters in Ottawa are using gasoline powered diesel generators. Pretty dirty electricity. They could connect batteries to the clean Ottawa grid instead. Three quarters of the grid's power comes from non-emitting sources of nuclear and hydro. At ANS Nuclear Cafe, Dan Yurman reviews the issues and consequences of the anti-nuclear protests in India. Let's see. The national government is pro-nuclear, some of the provincial governments are anti-nuclear, and nobody told the people in the area of one plant that the siren-test-evacuation drill was a test. So local citizens were terrified as they heard sirens and saw people streaming from the plant grounds. India is a complicated place, goodness knows, but the nuclear start-up could also be far better organized. Excellent post on an important subject. News and views and updates from all over! Come to the Carnival! I am one of the Page Owners of the Save Vermont Yankee Facebook Page. It is visible just to the right, on this blog. If you are on Facebook, please Like us! You can Like us without even leaving the Yes Vermont Yankee blog site. On the Facebook Page, we often post web links that are interesting or amusing or relevant to energy issues in Vermont. Very few of these links ever make it to a Yes Vermont Yankee blog post. I am trying an experiment today. I am going to post a few of the links that were placed on the FB Page last week. If readers like this, I will try to post some links most weekends. Let me know what you think. Vermont Yankee and Vermont History: Letter in the Reformer. Our economy is in the toilet. Last time this happened in Vermont, about fifty years ago, we climbed out of recession by voting to build Vermont Yankee. Germany faces sticker shock as renewables replace nuclear. A dozen coal-fired plants will also be built. Environment News Service. An attempt to read the Vermont Comprehensive Energy Plan. Letter in True North Reports. The letter-writer struggles along, reading the report, but can't make any progress on figuring out how much all those renewables will cost. States and States Rights in Vermont. VPR interview with McQuiston. Killington couldn't secede from Vermont, and Vermont can't regulate nuclear safety. Timothy McQuiston is editor of Vermont Business Magazine. The earth as seen from Apollo 17. Wikipedia I'm linking to the World Wide Web, so I show the world. I thought of sausage links as a graphic, but this is prettier. Labels: facebook, general links. prejudice against VY employees. In general, I make the optimistic (and I believe correct) assumption that Vermont Yankee will continue to operate until 2032. However, opponents like to talk about the "jobs bonanza" of decommissioning. This blog post looks at the facts of decommissioning. It is updated from a post I did about three months ago at True North Reports. A company has two main choices for decommissioning a nuclear plant. Prompt decommissioning: starting the decommissioning project as soon as the plant is closed. SafStor: keeping the plant intact for many years, until decommissioning is more convenient. In the video below, posted by Vermont Digger from Shumlin's press conference on August 11, Shumlin explains that SafStor (delayed decommissioning) wasn't part of the Vermont Yankee purchase agreement, no matter what papers the state signed, and no matter what words somehow sneaked into those signed papers. The jobs gap doesn’t really happen for about 16 years,” he said. “Five to six years for the plant to cool down, gotta keep all the systems running, that requires a number of employees, several hundred. And ten years of decommissioning. So the jobs cliff, despite what they tell you in those 30 second advertisements, is not as significant as long as they keep their promise on decommissioning the plant whenever it shuts down. Unfortunately, the facts do not agree with Shumlin's optimistic statements. There is a jobs cliff. Shumlin does not believe that Entergy has the right to put Vermont Yankee in SafStor. You can see this in this in the video clip above, and I also described Shumlin's misconception about SafStor in my post In Vermont Our Word is Our Bond, So We Don't Honor Contracts. But Entergy can legally use SafStor, whether Shumlin believes it or not. What will happen if they choose to use it? Many nuclear plants have been put in SafStor. Usually, an older reactor at a site is put in Safstor while newer reactors at the site continue to operate. At Indian Point, for example, the small Unit 1 reactor (274 MW) has been in SafStor since 1974. Meanwhile, Unit 2 and 3 reactors, around 1000 MW each, continue to operate. However, stand-alone plants are also placed in SafStor. For example, the Zion plants in Illinois have been in SafStor since 1998 and they are now beginning decommissioning. In the case of Vermont Yankee, the plant would be put in SafStor while the decommissioning fund (now around $490 million dollars) grew to a larger amount. Meanwhile, the radiation at the plant would decrease, leading to a less expensive clean-up. Shumlin is correct about one thing, however. SafStor does not require many staff people. The site must have security, the fuel pool must be maintained and monitored, and the rest of the system has scheduled inspections. SafStor generally requires a staff of around 100 people, instead of the 650 at Vermont Yankee now. With SafStor, around 80% of the staff at VY would be laid off within a year of shutdown. No further staff would be needed until decommissioning began, which could be many decades in the future. Clearly, SafStor is a "jobs cliff", and Entergy can choose to use it. But what if Entergy chooses prompt decommissioning? This is the option Shumlin wants Entergy to chose, if the plant is shut down. Shumlin says that it would take "five or six years for the plant to cool down" while hundreds of employees monitor it. Shumlin's tale is cheerful but wrong. With prompt decommissioning, the staff at the plant is laid off as soon as possible. The biggest controllable cost in decommissioning is manpower... However, the plants that have been slow to efficiently accomplish...downsizing [the workforce] have had higher decommissioning costs....Severance packages, early retirement, and worker transition services helped workers make the transition. The major downsizing occurred over about a three month period. With SafStor, most plant people lose their jobs within six months. With prompt decommissioning, it takes two years to downsize to a skeleton staff. Shumlin says decommissioning includes hundreds of people keeping their jobs for many years, but that is not the case. Another advantage to early and aggressive downsizing is that it opens up opportunities to bring in workers with skill sets that are more suited to a decommissioning environment. Also, if these workers are contractors, they tend to be more accustomed to completing a given scope of work and moving on to another job. How many contractors? The number of people in the contract work force is hard to estimate because it varies as the job goes through various phases. Decommissioning activities are done on a subcontract basis, with various groups of contractors brought in and later terminated. Decommissioning is basically a construction (de-construction) project. Since radiological safety is important, the construction workers must follow protocols. However, the construction workers don't have the protocol-mindset of nuclear workers, and this can lead to problems. In the case of Maine Yankee, the company hired a general contractor to supervise the subcontractors, but then found so many problems that they terminated the general contractor. This has also happened at other plants. With SafStor or prompt decommissioning, there is a jobs cliff. The people at the plant are mostly gone within six months or two years. The decommissioning workers are not permanent employees, and not encouraged to think of themselves that way. Morale is often low, job security is non-existent, and well-trained people who have other options tend to leave town. Despite Shumlin's optimistic statements about "five years, then another ten years" it's all over for the regular employees within two years. The contractors do not become permanent residents of the area. The contractors come to town and then move on quickly. Decommissioning leads to an instant loss of jobs and community. An earlier version of this post appeared in True North Reports. I thank Rob Roper of True North Reports for permission to repost it here. The picture of dry casks at Maine Yankee is from the 3yankees website about the decommissioned plants. Update: I thank Vermont Tiger for their good words about this blog post in Yankee, What If? The 78th blog Carnival of Nuclear Energy is posted at Next Big Future. Once again, Brian Wang has assembled a great collection of thought-provoking posts. Let's start with morals. Rod Adams of Atomic Insights described The "Moral Imperative to Build More Nuclear Power Stations" to increase prosperity for the growing world population. Meanwhile, Cool Hand Nuke reports on the Dalai Lama endorsing nuclear power at a press conference in Tokyo, directly after touring the tsunami-devastated areas of Fukushima. On the darker side of morals, Gail Marcus at Nuke Power Talk discusses a Japanese article about "sloppy inspection" of Japanese nuclear power plants, and compares Japanese practices with the better practices of the NRC. Most discouragingly, the difference between Japanese practices and U S practices have been known for years, in Japan and elsewhere. Marcus lived in Japan and worked with their regulators in the past. She knows whereof she writes. From morals, it's a quick leap to misconceptions about nuclear and renewables. Gail Marcus summarizes a recent study showing that using wind turbines could add to global warming, because ramping up gas turbines to provide back-up power is inefficient. Using gas turbines as backup produces more carbon dioxide per kWh than using the gas turbines on a steady basis. Wind will not solve global warming problems. NEI Nuclear Notes has two posts about misleading articles and statements: "CNN's Erin Burnett Hoodwinked by Erin Brokovich," and Entergy's response to irresponsible statements by Edward Markey about strontium in fish. Steve Skutnik of Neutron Economy dismisses some misconception about nuclear as he analyzes nuclear regulation, deregulation, and John Rowe's statements in favor of natural gas. Well, on to the good news! Economics. Dan Yurman at Idaho Samizdate shows that cash is flowing into new nuclear build projects. In another piece of cheerful news, NEI Nuclear Notes describes how France is sticking with nuclear power, in this age of austerity. Brian Wang of Next Big Future lists the new builds of nuclear plants. The Carnival includes his list of nuclear plants under construction and planned, based on the EAI energy outlook and the NEI nuclear update. 65 plants, totally 65,000 MW, are currently under construction, with 127 more plants in the planning stage. Okay, I know, I get encouraged and discouraged at the same time. Only one new build is happening in the U.S; the other 64 nuclear plants are in other countries. However, I remind myself the fact we're becoming a global back-water in nuclear (and a global leader in fossil fuel consumption) is old news. Overall, the list of new plants is very cheerful. Finally, we turn to the personal view of nuclear for a few more cheerful posts. At Yes Vermont Yankee, Evan Twarog writes a "Teen's View of Vermont Yankee" showing how plant workers support the town with their daily work and their volunteer work. Moving to events in Japan, Wang describes advances in worker safety at Fukushima in his Next Big Future blog. The Japanese workers are being assisted with robots originally developed to help the elderly. It's a great Carnival, and you will enjoy reading it. Several news stories and blogs have covered Vermont Yankee issues recently. Here's a quick catch-up from the past few days. The cartoon above is by Tim Newcomb and originally appeared in Seven Days. I thank Mr. Newcomb for granting permission to use it in this blog. At ANS Nuclear Cafe, Howard Shaffer covers the background of the opponent rally at the plant gates. The comment stream discusses the rise (and fall?) of the Clamshell Alliance. Senator Markey, a long-time foe of nuclear energy, wrote a letter to the NRC accusing them of letting Entergy get away with a lie about the "strontium fish". Here are two excellent blogs by Victoria Barq of NEI Nuclear Notes about Markey's letter (included in this blog post) and Entergy's response. Yesterday, Barq wrote a follow-up blog post about Entergy's response, including quotes from the Vermont Department of Health (no reason to believe the strontium in the fish came from the plant) and even quotes Governor Shumlin! Entergy has never detected any strontium in liquid releases or required environmental samples of groundwater, etc. Even Shumlin said we could not tell where the strontium came from! A very enjoyable post. It's great to see a solid response to unfounded, publicity-seeking attacks. In local news, Lochbaum joined in the fray on Markey's side, and my hometown paper, the Valley News, published a very misleading Op-Ed quoting Markey and Lochbaum: Entergy "Doublespeak." Howard and I are collaborating on a letter-to-the-editor in answer. For some background: I blogged about the facts and the fish in August. This blog also hosted a guest post by Richard Schmidt in September. His post compared mercury in fish (a real problem) with strontium at background levels. A letter on What It Means to Be a Nuclear Worker in the Commons, a Brattleboro paper. Any nuclear workers reading this blog might want to comment on it: the one comment so far is a plant opponent. Evan Twarog's letter (A Teen's View of Vermont Yankee, on this blog yesterday) was also published at True North Reports. Charles Barton's Nuclear Green Revolution blog ran Robert Hargrave's Vermont Yankee Explained animation. An enjoyable six minute video. The cartoon, by Tim Newcomb, heads this post! This letter to the editor appeared in the Brattleboro Reformer on November 4, 2011. Evan Twarog was kind enough to allow me to reprint it in this blog. Nuclear power ... Vermont Yankee ... all increasingly con­troversial topics today. But no matter what side of the aisle you rest on, if you live in Vermont or New Hampshire, you’ll be affected if Vermont Yankee closes. Do I know for sure what the future holds for Vermont? No, not me and certainly not anyone else. But I can take a look at the statistics to deter­mine what is most likely best for Vermont, and so can you. We all want what is best for Ver­mont, but we all have miscon­ceptions and it takes will-power to overcome them. If we all open our minds to listen to the other side of the argument, we will be in a much better position to make decisions. In order to be a true leader, you need to have the courage to do that. My dad works at Vermont Yan­kee. I’m incredibly proud of him. He’s worked tirelessly to get to the position he has now. He is a shift manager, and is in charge of operations at the plant when he is on shift. He is an incredibly smart man, and he wouldn’t have moved his family to this region if he felt that VY was in any way dangerous. On top of working 12 hour days and being a terrific father, he runs the Keene Youth Lacrosse Program. Many other employees of the plant are actively involved in other organ­izations as well. I understand that you might have negative feelings about the plant, but just try to put yourself in my shoes. Maybe you’ll see that my dad’s not the monster the media and anti-VY groups make him and the other VY employees out to be. I’ve always thought that good things happen to good people, but clearly life is not so simple. I’ve always given back to the community, pushed myself in school, and helped others. Every night my family wonders what we will do if VY does shut down. We have to live with the fact that if VY closes, we won’t have the life that we enjoy now. No one, let alone a kid should have to deal with that. My family’s story is only one story of more than 600. I have done the research, and I truly believe that Vermont Yan­kee is not only safe, but it is a reliable and clean source of energy. It is a major employer, which our area needs desperate­ly in these tough economic times. I am proud to be part of the VY family. Evan Twarog appears in these two pictures of the Rally in support of Vermont Yankee on October 23. He is wearing a red jacket and appears with his mother and younger brother. I thank the Vermont Yankee Nuclear Power Plant Facebook page for allowing me to use these pictures. Governor Peter Shumlin of Vermont is in favor of replacing Vermont Yankee with out-of state and out-of-country power, and of course with renewables.The renewables part isn't going very well. The video below shows Peter Shumlin attempting to shake hands with people who are protesting the Lowell Mountain wind farms. Shay Totten of 7 Days Vermont included this video in his blog post Occupiers and Environmentalists Confronting Vermont Democrats. The post is worth reading. One interesting quote from the Totten article:"When Gov. Shumlin opposed Vermont Yankee, he was doing the right thing and we supported him. But then Green Mountain Power turns around and buys power from Seabrook [Nuclear Power] and he says nothing. Why not?" said Eric Wallace-Senft of Woodbury. Indeed, why didn't Shumlin object to buying nuclear power from New Hampshire? Probably because Governor Shumlin is learning some things about energy supply. In March 2010, Shumlin went on national TV and said that Germany got 30% of its electricity from solar. Now, a year and a half later, Shumlin may have learned the definition of baseload. Meanwhile, there are wind lawsuits. The most active one is about property rights. A retired couple, Don and Shirley Nelson, are neighbors of the Lowell Mountain Wind project. They don't like the project. The contractor for Green Mountain Power is blasting a road near Nelson's property, and wants to be sure nobody is hurt by "flyrock" (blast debris). Wind protestors are on the Nelson's property, and they refuse to move for the blasting. After all, they are on private property by invitation. Nelson's attitude is that he never gave anybody permission to spread flyrock on his property anyway. It has ended up in court (of course). Terri Hallenbeck of Burlington Free Press has an excellent article on the situation. Green Mountain Power first told the Nelsons they would be sued for the cost of delays. The threat was a bit of a public relations nightmare, of course! Next, Green Mountain Power offered to buy their land. So far, the Nelsons have not budged. Two quotes from Don Nelson, from the Hallenbeck article:“After 40 years of working, if you had to sell to someone who wanted to destroy what you built, would you?” asked Don Nelson, who grew up on the property and raised his family there....(Green Mountain Power sent) a letter to the Nelsons warning them that Green Mountain Power would take them to court and hold them financially responsible for the cost of any delays caused by the campers on the ridgeline. The Nelsons characterize that as a threat to force them into selling. Meanwhile, my friend Willem Post has an excellent article in Energy Collective: Was Vermont's Lowell Mountain Wind Turbine Facility a Good Idea? His answer is no, considering both cost and environmental impact. When I show up somewhere with a pro-Vermont Yankee sign, and I try to convince an opponent that nuclear is safer and better than fossil, the opponent is sure to tell me that "We don't need either fossil OR nuclear. We can meet our energy needs with renewables!" Sometimes I wonder if the opponents actually live in Vermont. On September 14, The Department of Public Service (DPS) released a 600 page Comprehensive Energy Plan (CEP) for Vermont. The plan was long, vague, and internally inconsistent. Instead of tacking the whole thing, environmentalist Chris Matera studied a defined chunk: the plan's recommendations for increased use of biomass for electricity production. Matera wrote an opinion for the Bennington Banner titled Vermont's Plan Misses the Forest. He describes how burning wood for electricity causes air pollution, generates carbon dioxide, and causes deforestation. He asks: So how did increased cutting and burning of forests (called "deforestation" and "pollution" when it occurs in other countries) get re-branded as "green" energy..?." The CEP sections on woody biomass were confusing. On some pages, the CEP seems to expect only about a 30% increase in electricity from woody biomass in the near future. On nearby pages, the CEP describes "25 x'25", a plan to produce 25% of Vermont's energy by biomass fuels by 2025. Two years ago, the state legislature convened a biomass working group. The group is supposed to report its results on biomass utilization to the legislature in 2012. It is typical of this administration that it is rushing to adopt the Comprehensive Energy Plan before receiving that report. Is There Enough Biomass, Anyway? Instead of trying to decipher the CEP statements on biomass, let's look at real examples of biomass plants, and what it would take to expand this type of electricity production in Vermont. The Springfield Power LLC biomass plant in Springfield New Hampshire is visible to people who drive south on Interstate 89. It is located at exit 12A, not far from New London. The plant makes 19 MW of power, and runs most of the time, only shutting down for maintenance. It sells its power at about 5 cents per kWh, while paying around 4 cents per kWh for its wood. The Springfield plant is well-equipped with NOx and particulate control, and sells its fly ash as a garden amendment. It also sells Renewable Energy Certificates, and therefore is profitable to run. I visited it with the Energy Safari class. Bob Hargraves wrote a very comprehensive blog post on our visit. The Springfield plant burns 200,000 tons of wood to make 20 MW of electricity. This about 100,000 cords of wet wood (2 tons per cord).). Chuck Theall, the plant manager, says that the plant calls the grid operator daily, and promises to supply energy. The grid counts on his energy, and if the plant does not operate, it has to pay for replacement power. Wood-burning plants are heat engines, which means they can be reliable baseload plants, like Springfield Power. The ability of a wood-burning plant to supply baseload power is in sharp contrast to solar and wind renewables, and makes expansion of wood-burning very attractive for an all-renewable energy plan. How Much Forest Per Megawatt? In terms of power production, the Springfield plant is tiny. Vermont Yankee makes 620 MW of power. It would require 31 Springfield Power plants to replace Vermont Yankee on the grid. How much forest would this require? I did research on sustainable forest yields. I could not find answers in a book, so I asked local foresters: "What is the sustainable yield of firewood for an acre of Vermont forest?" I learned that foresters hate to answer general questions about "Vermont forests" because "Every bit of forest is different." Eventually, I found an approximate consensus: One-half cord per acre is a sustainable yield for most of our forests. As a child, I learned the mantra that you could harvest a cord of wood each year from an acre of forest. Vermont foresters agree that that number was too high. A quick calculation (100,000 cords per year, half a cord per acre) shows that the yield from 200,000 acres is required for a 20 MW plant. To give some context to this number, the entire Green Mountain National Forest is 400,000 acres, and the state of Vermont is 6,000,000 acres. It takes the equivalent of half the harvest of the Green Mountain Forest to make 20 MW of electricity. To make 31 times this amount of electricity, to replace 620 MW of Vermont Yankee with woody biomass power plants--this would mean the entire state would be devoted to raising wood to burn. Six million acres wouldn't even be quite enough. Expanding our current wood-fired electricity production will be difficult, but not impossible. Replacing Vermont Yankee with wood-fired plants is impossible. Going "25% by 2025" for electricity through woody biomass is close to impossible, especially since power plants must compete with homes and schools for firewood. In the long run, our forests are our joy. Our forests are our foliage season. Our forests eat carbon dioxide from the air, and even sustainable harvest will affect this to some extent. We can add some wood-fired electricity in Vermont, but not much. We cannot get one-fourth of our electricity from our forests. We need to be mindful of competing uses for our woodlands. And so, we return at last what Matera said in his op-ed: So how did increased cutting and burning of forests (called "deforestation" and "pollution" when it occurs in other countries) get re-branded as "green" energy..?" Picture of Chuck Theall of Springfield Power, and Neil Daniels, retired engineer, courtesy of Bob Hargraves, from his post on the ILEAD visit to the Springfield plant. True North Reports published a more complete version of this article. I thank Rob Roper and True North Reports for the opportunity to reprint the article on my blog. Picture at upper left is part of the wood pile: approximately two weeks worth of logs, and logs are approximately 1/3 of the wood used. The rest of the wood is delivered as chips. This post also grew out of an earlier Yes VY post about the biomass plant, specifically from the comment section of that post. Occupy Vermont is active in Burlington Vermont, as Occupy movements are active in many states. As usual, however, Vermont is different. Reading the newspaper reports, it seems that Occupy Vermont is now about Shut Down Vermont Yankee. According to WPTZ, Occupy Vermont protesters marched through Burlington chanting "Vermont Yankee has got to go." Shutting the plant down will decrease jobs in Vermont and export the jobs to New Hampshire and Quebec. Shutting the plant will achieve the exact opposite of the Occupy movement's goals. Yes, the goals are fuzzy, but there are goals. The Occupy movement wants decreased income disparity, lower unemployment and no bail-outs for the rich. However, Occupy Vermont been co-opted to the anti-nuclear agenda. Most Occupy movements want changed banking laws, increased economic stimulus measures, and income re-distribution. In Vermont, the anti-nuclear movement provided Occupy Vermont with something easier to achieve. The anti-nuclear movement provided the Occupy movement with....a scapegoat. In my opinion, fear of nuclear is today's opiate of the people. Politicians don't have to worry, as long as there's a nuclear plant around. Keep people busy marching against a nuclear plant, keep the anti-nuclear rhetoric flowing...and people won't notice rising prices, rising taxes, and falling wages. People won't notice that teachers are being laid off, that unemployment is becoming endemic, that bankers get bonuses with taxpayer money...as long as they have a nuclear plant to protest! Was Co-Option of Occupy Vermont Inevitable? Occupy Vermont didn't have to go this way. The Occupy movement has been widely criticized for having fuzzy goals. Indeed, that makes it easy for well-organized groups with clear agendas to co-opt the movement. Still, this co-option has happened in this state because anti-nuclear groups in Vermont are so well-funded and so willing to step into any gap. It didn't happen in other areas. I am aware that what we usually hear about the Occupy movement is about violence and brutality, mostly on the West Coast. I want to compare Vermont's movement, however, with some other East Coast movements. The video below is from the Occupy Boston movement. Occupy Boston is holding a series of lectures, the Howard Zinn lectures. This video is part of that lecture series: a talk given by Vijay Prashad on October 25. Prashad went to several East Coast Occupy sites and asked what their issues were. The goals varied by city: unemployment, hunger, student loans. (This is described in the first five minutes of the video clip.) In other words, the Occupy movement responds to local problems. I am not endorsing their solutions, but the Occupy movement does want economic betterment for ordinary people. Right here, Vermont's middle class is embattled, with long-term unemployment, layoffs, and high heating oil prices affecting everyone. (The Burlington Free Press has an excellent article on Vermont's Shrinking Middle Class.) In our neighboring state, New Hampshire, hospitals are refusing to take Medicaid patients. Things are going badly in our corner of New England. Meanwhile, our Occupy Vermont movement has been co-opted by the anti-nuclear groups! They want to shut down one of the premier economic engines in the state, and cause wide-spread poverty in the southern half of the state, and widespread rejoicing in Canada. Sometimes I think Vermont can't get anything right, even protest! We need to break the stranglehold of anti-nuclear groups on the public discourse. We need to Change Vermont for the better, not for the worse. We need to build the middle class, not destroy it. In other words, we need Vermont Yankee to keep operating and keep employing Vermonters. A reminder. Comments on the Comprehensive Energy Plan for Vermont are due by 5 p.m. tomorrow. You can use the following email address to comment on it. An earlier blog post contains several references that might be helpful in writing your comments. The plan is long, but your comments can be short! Be sure to comment. The plan's length and inconsistencies remind me of the saying: "If you can't blind them with brilliance, baffle them with bull droppings." Luckily, other people have analysed the plan. If you take advantage of their work, you can get a reasonable comment written in short period of time.
2019-04-18T15:09:10Z
http://yesvy.blogspot.com/2011/11/
PA 183 HQ M'Lean George P. Colonel March 8, 1864 Resigned on May 3, 1864. PA 183 HQ Lynch James C. Colonel August 17, 1861 Promoted from Captain of Company B, 106th Regiment, Pennsylvania Volunteers to Lt. Colonel on June 21, 1864 to Colonel on July 19, 1864 - brevet Brigadier General on March 13, 1865 - discharged on October 6, 1864 at expiration of term. PA 183 HQ Egbert George T. Colonel January 13, 1864 Promoted from Captain of Company A, to Major on July 31, 1864 to Lt. Colonel on August 8, 1864 to Colonel on December 4, 1864 - mustered out with regiment on July 13, 1865. PA 183 HQ Powell William Lt. Colonel January 22, 1864 Resigned on May 18, 1864. PA 183 HQ Lynch Augustine T. Lt. Colonel October 3, 1863 Promoted from Captain of Company D to Major on August 9, 1864 to Lt. Colonel on December 4, 1864 - mustered out with regiment on July 13, 1865. PA 183 HQ Reynolds John Major January 22, 1864 Resigned on May 20, 1864. PA 183 HQ Egbert Horace P. Major November 13, 1863 Promoted from Captain of Company A on December 24, 1864 - mustered out with regiment on July 13, 1865. PA 183 HQ Mann Theodore F. Adjutant January 30, 1864 Resigned on May 31, 1864. PA 183 HQ DeGour George W. Adjutant January 22, 1864 Promoted from 1st Lt., Company G on June 30, 1864 to Captain of Company G on August 8, 1864. PA 183 HQ Hall Joseph E. Adjutant September 1, 1862 Promoted from 2d Lt., Company I, 148th Regiment, Pennsylvania Volunteers on September 7, 1864 - mustered out with regiment on July 13, 1865. PA 183 HQ Hague Andrew Quarter Master October 3, 1863 Mustered out with regiment on July 13, 1865. PA 183 HQ Byington William C. Surgeon October 1, 1862 Promoted from Assistant Surgeon, 119th Regiment, Pennsylvania Volunteers on March 8, 1864 - mustered out with regiment on July 13, 1865. PA 183 HQ Richey James A. Assistant Surgeon November 6, 1863 Discharged on Surgeons certificate on October 21, 1864. PA 183 HQ Moody Horace M. Assistant Surgeon April 6, 1864 Mustered out with regiment on July 13, 1865. PA 183 HQ Young John Assistant Surgeon January 5, 1864 Promoted from Private of Company K on April 16, 1865 - mustered out with regiment on July 13, 1865. PA 183 HQ Griffin Charles Chaplain April 23, 1864 Mustered out with regiment on July 13, 1865. PA 183 HQ Park James Sergeant Major January 5, 1864 Promoted from 1st Sergeant of Company K on June 12, 1865 - commissioned 2d Lt. Company K on July 10, 1865 - not mustered - mustered out with regiment on July 13, 1865. PA 183 HQ Loveaire Theodore Sergeant Major January 21, 1864 Promoted from Private of Company H on January 21, 1864 to 2d Lieut. on December 27, 1864. PA 183 HQ Sloan George W. Sergeant Major March 4, 1862 Promoted from Private of Company K on January 1, 1865 - discharged on February 11, 1865 at expiration of term. PA 183 HQ Elliott Francis M. Sergeant Major February 8, 1865 Promoted to 1st Lieut. Company H on June 12, 1865. PA 183 HQ Miller Charles Quarter Master Sergeant February 9, 1864 Promoted from Private of Company B on April 22, 1864 ?commissioned 2d Lt., Company B on May 20, 1865 - not mustered - mustered out with regiment on July 13, 1865. PA 183 HQ Hoover John Commissary Sergeant January 13, 1864 Promoted from Private of Company A on March 5, 1865 - mustered out with regiment on July 13, 1865. PA 183 HQ Davis Sheldon S. Commissary Sergeant November 17, 1862 Promoted from Private of Company D - date unknown - transferred to Company D on December 31, 1864. PA 183 HQ Campbell T. D. Commissary Sergeant January 5, 1864 Promoted from Private of Company K on January 1, 1865 - died on March 3, 1865. PA 183 HQ MacKey Jacob Hospital Steward November 17, 1863 Promoted from Private of Company D on May 27, 1865 - mustered out with regiment on July 13, 1865. PA 183 HQ Rice William C. Hospital Steward January 5, 1864 Promoted from Private of Company K on February 25, 1864 - discharged by General Order on May 27, 1865. PA 183 HQ Ford Ellis W. Principal Musician February 8, 1864 Promoted from Musician Company F on May 1, 1865 - mustered out with regiment on July 13, 1865. PA 183 HQ Mead Thomas J. Principal Musician March 28, 1862 Promoted from Corporal of Company C on May 26, 1865 - mustered out with regiment on July 13, 1865. PA 183 HQ Hoffman Harry A. Principal Musician January 5, 1864 Promoted from Musician Company K - date unknown - transferred to Veteran Reserve Corps on January 11, 1865 - discharged by General Order on July 28, 1865. PA 183 HQ Sanderson P. C. Principal Musician December 24, 1863 Promoted from Private of Company D on July 1, 1864 - transferred to Company D on May 25. 1865. PA 183 A Egbert George T. Captain January 13, 1864 Promoted to Major on July 31, 1864. PA 183 A Egbert Horace P. Captain November 13, 1863 Promoted from 2d to 1st Lt. on July 11, 1864 to Captain on August 8, 1864 to Major on December 24, 1864. PA 183 A M'Nutt Samuel Captain January 13, 1864 Promoted from 1st Sergeant to 2d Lt. on July 22, 1864 to 1st Lt. on August 8, 1864 to Captain on April 17, 1865 - mustered out with company on July 13, 1865. PA 183 A Ottinger John M. 1st Lt. January 13, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 A M'Gowan Edward L. 1st Lt. March 8, 1864 Promoted from 1st Sergeant to 2d Lt. on March 4, 1865 to 1st Lieut. on April 17, 1865 - mustered out with company on July 13, 1865. PA 183 A Flaherty Patrick J. 2d Lt. August 10, 1861 Promoted from 1st Sergeant on August 8, 1864 - discharged on Surgeons certificate on December 22, 1864. PA 183 A M'Gowan Benjamin H. 1st Sergeant January 13, 1864 Transferred to Company K on December 27, 1864. PA 183 A Pearce George G. 1st Sergeant October 10, 1861 Promoted from Sergeant on March 5, 1865 - discharged by General Order on July 31, 1865. PA 183 A Atkinson Spencer K. Sergeant September 27, 1861 Mustered out with company on July 13, 1865. PA 183 A Beale Colin M. Sergeant August 10, 1861 Promoted from Corporal on May 23, 1865 - commissioned 2d Lt. on July 10, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 A Daisy George W. Sergeant January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Purves Alexander Sergeant June 6, 1864 Promoted to Sergeant on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 A Burke Eli Sergeant January 13, 1864 Discharged by General Order on May 30, 1865. PA 183 A Mammill Bernard Sergeant January 13, 1864 Captured - died at Andersonville, Ga. on September 28, 1864 - grave 10, 022. PA 183 A Crawford Charles L. Corporal January 13, 1864 Promoted to Corporal on March 1, 1865 - mustered. out with Company on July 13, 1865. PA 183 A Alexander James Corporal March 27, 1864 Promoted to Corporal on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 A Hampson Charles Corporal January 13, 1864 Promoted to Corporal on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 A M'Combs Thomas Corporal January 13, 1864 Promoted to Corporal on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 A Patterson William H. Corporal August 10, 1861 Promoted to Corporal on May 23, 1865 - mustered out with company on July 13, 1865. PA 183 A M'Gurk John Corporal January 13, 1864 Captured - date unknown - promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 A Neill George S. Corporal January 13, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 A Porter Edward R. Corporal January 13, 1864 Absent, sick, at muster out. PA 183 A Foster William Corporal September 10, 1861 Discharged on October 7, 1864 at expiration of term. PA 183 A M'Nabb William Corporal January 13, 1864 Discharged by General Order on May 26, 1865. PA 183 A Purves Lewis R. Corporal January 13, 1864 Discharged on Surgeons certificate on January 13, 1865. PA 183 A Rhoades Charles H. Corporal January 13, 1864 Transferred to Company D, 14th Regiment, Veteran Reserve Corps on December 3, 1864. PA 183 A M'Caulley William Corporal January 13, 1864 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 A Rowe Edward C. Corporal January 13, 1864 Died at Andersonville, Ga. on August 24, 1864 - grave 6,725. PA 183 A Williams Charles Corporal January 13, 1864 Deserted on January 21, 1864. PA 183 A Yarnall Benjamin Corporal January 13, 1864 Deserted on April 8, 1865. PA 183 A Bleyler Samuel R. Corporal September 8, 1862 Deserted on January 22, 1865. PA 183 A Charlton Charles P. Musician August 10, 1861 Mustered out with company on July 13, 1865. PA 183 A Taylor James Musician February 8, 1864 Mustered out with company on July 13, 1865. PA 183 A Smith Benard Musician October 9, 1861 Discharged on October 11, 1864 at expiration of term. PA 183 A Henderson James Musician January 13, 1864 Deserted on March 10, 1864. PA 183 A M'Kinley John Musician January 13, 1864 Deserted on January 20, 1864. PA 183 A Andress Edward T. Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Benner Edward S. Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Bierney Charles Private January 13, 1864 Wounded at Spotsylvania Court House, Va. on May 11, 1864 - absent, in hospital, at muster out. PA 183 A Baxter George W. Private January 13, 1864 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 A Bailey William Private January 13, 1861 Transferred to 22d Company, 2d battalion, Veteran Reserve Corps on December 23, 1864 - discharged by General Order on November 21, 1865. PA 183 A Bennett Henry Private October 9, 1861 Captured - died at Salisbury, N. C. on November 13, 1864. PA 183 A Brown William Private January 7, 1865 Deserted on June 20, 1865. PA 183 A Boyle Peter Private January 13, 1864 Deserted on January 5, 1865. PA 183 A Conway Charles Private September 19, 1864 Not on muster-out roll. PA 183 A Campbell James Private August 10, 1861 Mustered out with company on July 13, 1865. PA 183 A Chester Edward Private January 13, 1864 Absent, sick, at muster out. PA 183 A Cooper Richare D. Private January 13, 1864 Absent, sick, at muster out. PA 183 A Curran John Private January 13, 1864 Discharged by General Order on June 23, 1865. PA 183 A Comegys Cornelius L. Private January 13, 1864 Discharged by special order on August 15, 1864. PA 183 A Champion David B. Private January 13, 1864 Discharged on Surgeons certificate on December 23, 1864. PA 183 A Clark James Private January 13, 1864 Deserted on January 20, 1864. PA 183 A Connegan James Private January 13, 1864 Deserted on January 20, 1864. PA 183 A Daimon James Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Deveney Henry Private April 8, 1864 Mustered out with company on July 13, 1865. PA 183 A Dougherty James P. Private January 13, 1864 Absent, sick, at muster out. PA 183 A Doak James Private January 13, 1864 Absent, sick, at muster out. PA 183 A Deveney James Private October 15, 1861 Captured and prisoner from August 16, 1864, to March 9, 1865 - discharged by General Order on April 15, 1865. PA 183 A Day George W. Private August 29, 1862 Captured - died at Philadelphia, Pa. on March 20, 1865. PA 183 A Doyle Wiliam Private January 13, 1864 Deserted on January 20, 1864. PA 183 A Ellingsworth Robert Private January 13, 1864 Killed at Deep Bottom, Va. on July 27, 1864 - burial record, JuIy 22, 1864 - buried in Poplar Grove National Cemetery, Petersbur.g, div. D, sec. H, grave, 197. PA 183 A Ely Watson Private January 13, 1864 Deserted on January 14, 1864. PA 183 A Farren George W. Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Fields Edward Private January 13, 1864 Transferred to Company E, 14th Regiment, Veteran Reserve Corps on December 17, 1864 - discharged by General Order on July 31, 1865. PA 183 A Fowler Orlando Private January 13, 1864 Transferred to Company E, 16th Regiment, Veteran Reserve Corps on January 19, 1865. PA 183 A Fraley George W. Private January 13, 1864 Captured - died at Richmond, Va. on July 28, 1684. PA 183 A Fraizer Walter Private October 10, 1862 Captured - died at Salisbury, N. C. on November 13, 1864. PA 183 A Freenay James Private Deserted on May 23, 1865. PA 183 A Gysi Charles Private January 10, 1864 Mustered out with company on July 13, 1865. PA 183 A Glenn John T. Private January 7, 1865 Mustered out with company on July 13, 1865. PA 183 A Guinn David Private August 10, 1861 Wounded in action - absent, in hospital, at muster out. PA 183 A Gilbert Henry C. Private January 13, 1864 Transferred to Company D on January 20, 1865. PA 183 A Hizer William H. Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Hunter Edward C. Private January 13, 1864 Discharged by General Order on June 17, 1865. PA 183 A Hess George W. Private January 13, 1864 Discharged on Surgeons certificate on May 18, 1865. PA 183 A Hendricks Samuel Private January 13, 1864 Discharged on Surgeons certificate on December 10, 1864. PA 183 A Hennessev William Private January 13, 1864 Discharged on Surgeons certificate on April 8, 1864. PA 183 A Hoover John Private January 13, 1864 Promoted to Commissary Sergeant on March 5, 1865. PA 183 A Hawks Samuel Private January 13, 1864 Deserted on January 20, 1864. PA 183 A Hughes Andrew F. Private January 13, 1864 Deserted on January 29, 1864. PA 183 A Jeffries John V. Private August 11, 1862 Captured and prisoner from August 16, 1864, to March 9, 1865 - discharged by General Order on July 19, 1865. PA 183 A Jones Edward Private October 18, 1861 Discharged on October 18, 1864 at expiration of term. PA 183 A Keenan Patrick Private October 11, 1861 Discharged on October 14, 1864 at expiration of term. PA 183 A Keegan Joseph Private January 13, 1864 Captured - died at Andersonville, Ga. - date unknown. PA 183 A Lyons Dennis Private January 13, 1864 Absent, sick, at muster out. PA 183 A Loechner Christian Private January 13, 1864 Absent, sick, at muster out. PA 183 A Lynch William Private January 13, 1864 Discharged - date unknown. PA 183 A Labbree John M. Private January 13, 1864 Discharged by General Order on June 7, 1865. PA 183 A Loud Harris Private January 13, 1864 Died on October 14, of wounds received at Todds Tavern, Va. on May 8, 1864 - buried in National Cemetery, Arlington. PA 183 A Lloyd Job Private October 10, 1861 Died at Washington, D. C. on November 9, 1864 - burial record on October 19, 1864, at Annapolis, Mid. - buried in U. S. Hospital Cemetery. PA 183 A Moore Robert Private August 10, 1861 Mustered out with company on July 13, 1865. PA 183 A Munson John Private May 7, 1864 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 A Mullin Bernard Private January 13, 1864 Discharged by General Order on June 28, 1865. PA 183 A Morris Philip Private January 13, 1864 Discharged by General Order on May 27, 1865. PA 183 A Mastoff John T. Private January 7, 1865 Died at Washington, D. C. on April 3, 1865 - buried in National Cemetery, Arlington, Va. PA 183 A Moore William Private January 13, 1864 Deserted on January 20, 1864. PA 183 A M'Dermott William Private October 15, 1861 Discharged on October 17, 1864 at expiration of term. PA 183 A M'Caffrey Owen Private January 13, 1864 Died at Washington, D. C. on September 4, 1864 - buried in National Cemetery, Arlington, Va. PA 183 A M'Gowan Robert Private January 13, 1864 Deserted on January 20, 1865. PA 183 A M'Sorley Hugh Private January 13, 1864 Deserted on January 23, 1864. PA 183 A Nauman William C. Private January 13, 1864 Wounded at Petersburg, Va. on June 16, 1864 - discharged by General Order on June 24, 1865. PA 183 A Newall George S. Private January 13, 1864 Captured - died at Andersonville, Ga. on July 20, 1864 - grave, 3,653. PA 183 A Polly James Private January 13, 1864 Absent, sick, at muster out. PA 183 A Potts Charles H. Private January 13, 1864 Absent, sick, at muster out. PA 183 A Pemberton William Private January 13, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 A Pattison Rufus Private August 10, 1864 Discharged by General Order on May 30, 1865. PA 183 A Roberts David Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Roberts Joseph Private January 13, 1864 Absent, sick, at muster out. PA 183 A Rodgers Francis Private January 13, 1864 Absent, sick, at muster out. PA 183 A Rohsi Frederick Private January 7, 1865 Absent, sick, at muster out. PA 183 A Rowan Francis Private January 13, 1864 Transferred to Company D on January 19, 1865. PA 183 A Robinson Joseph Private January 13, 1864 Deserted on January 24, 1864. PA 183 A Sailor John V. Private January 7, 1865 Mustered out with company on July 13, 1865. PA 183 A Stainwork George W. Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 A Springfield Thomas Private March 3, 1864 Discharged by General Order on July 1, 1865. PA 183 A Smiley Robert Private October 10, 1861 Discharged on December 29, 1864 at expiration of term. PA 183 A Sharp John J. Private January 13, 1864 Transferred to Company K, 12th Regiment, Veteran Reserve Corps on November 17, 1864 - discharged on July 27, 1865. PA 183 A Springfield William Private March 23, 1864 Transferred to Company K, 11th Regiment, Veteran Reserve Corps on April 17, 1865. PA 183 A Snowden Carter L. Private January 13, 1864 Promoted to 1st Lt., Company E on February 10, 1864. PA 183 A Snyder Michael S. Private January 13, 1864 Captured - died at Andersonville, Ga. on September 3, 1864 - grave, 7,662. PA 183 A Stinsman George V. Private January 13, 1864 Deserted on January 30, 1864. PA 183 A Satterthwaite S. K. Private January 13, 1864 Deserted on July 1, 1865. PA 183 A Weller Michael Private January 7, 1865 Mustered out with company on July 13, 1865. PA 183 A Wakely Robert Private August 10, 1861 Absent, sick, at muster out. PA 183 A Walton Lewis P. Private January 13, 1864 Killed at Todds Tavern, Va. on May 8, 1864. PA 183 A Young George Private January 7, 1865 Deserted on March 2, 1865. PA 183 B Richardson David Captain February 12, 1864 Discharged by special order on July 18, 1864. PA 183 B Savage Southey L. 1st Lt. February 9, 1864 Discharged by special order on July 12, 1864. PA 183 B Lancashire W. H. 2d Lt. February 9, 1864 Wounded at Cold Harbor, Va. on June 3, 1864 - commissioned 1st Lt. on July 20, 1864 - not mustered - transferred to 12th Regiment, Veteran Reserve Corps on August 25, 1864 - Brevet. Captain on March 13, 1865 - discharged on June 20, 1866. PA 183 B Caterson Robert G. 2d Lt. January 14, 1864 Promoted from private to Sergeant on February 9, 1864 to 2d Lt. on June 16, 1865 - commissioned 1st Lieut. on May 20, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 B Riley John L. 1st Sergeant February 9, 1864 Promoted from private to Sergeant on June 14, 1864 to 1st Sergeant on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Hamm Charles H. 1st Sergeant February 5, 1864 Commissioned 2d Lt. on July 20 and 1st Lt. on September 8, 1864 - not mustered - captured - died at Annapolis, Md. on March 26, 1865. PA 183 B Locker Theodore Sergeant August 10, 1861 Promoted to Corporal on September 1, 1864 to Sergeant on February 28,1865 - mustered out with company on July 13, 1865. PA 183 B Hanlon Joseph Sergeant February 9, 1864 Promoted to Corporal on May 13, 1864 to Sergeant on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Selah Josiah Sergeant February 9, 1864 Promoted to Corporal on February 28, 1865 to Sergeant on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Weeks William W. Sergeant February 9, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864 - buried in Wilderness Burial Grounds. PA 183 B Ellis George T. Sergeant February 9, 1864 Discharged by General Order on July 31, 1865. PA 183 B Tomlinson William Corporal February 9, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Lennex John Corporal February 9, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Johnston Taylor Corporal February 9, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Lamb Francis Corporal February 9, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Schryer George P. Corporal February 9, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Miller Albert Corporal February 9, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Hubert William A. Corporal February 9, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Reed Thomas Corporal February 9, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 B Abell Amasa B. Corporal October 2, 1863 Discharged on Surgeons certificate on May 10, 1865. PA 183 B Gallagher John F. Corporal February 9, 1864 Transferred to Company H, 14th Regiment, Veteran Reserve Corps on September 16, 1864 - discharged by General Order on July 24, 1865. PA 183 B Thorn Abraham S. Corporal February 9, 1864 Killed at Todds Tavern, Va. on May 10, 1864. PA 183 B Lynch John F. Corporal February 9, 1864 Died at City Point, Va. on July 30, 1864. PA 183 B Spears William Corporal February 9, 1864 Captured - died at Philadelphia, Pa. on April 25, 1865. PA 183 B Miller Peter Corporal February 9, 1864 Deserted on March 15, 1865. PA 183 B Kent Thomas Musician February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Vanderslice George Musician February 9, 1864 Dishonorably discharged on October 7, 1865. PA 183 B Anderson William Private February 20, 1865 Mustered out with company on July 13, 1865. PA 183 B Amber John Private August 10, 1861 Absent, sick, at muster out. PA 183 B Abell Morris H. Private March 28, 1862 Discharged on March 27, 1865 at expiration of term. PA 183 B Alexander William J. Private February 9, 1864 Discharged on Surgeons certificate on May 30, 1865. PA 183 B Bozz Joseph Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Bernard Joseph C. Private February 9, 1864 Discharged on Surgeons certificate in January, 1865. PA 183 B Baird Isaac Private August 10, 1861 Discharged on May 30, 1865 at expiration of term. PA 183 B Bremm Leopold Private February 9, 1864 Captured - died at Andersonville, Ga. on October 3, 1864 - burial record, October 30, 1864 - grave, 11,667. PA 183 B Burk James Private February 9, 1864 Captured - died at Salisbury, N. C. on December 13, 1864. PA 183 B Christy Peter Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Coil James Private February 25, 1864 Mustered out with company on July 13, 1865. PA 183 B Cavnaugh John Private February 9, 1864 Deserted on February 18, 1864. PA 183 B Creighton Robert J. Private September 18, 1861 Never joined company. PA 183 B Donohue Timothy Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Dobbins Alexander W. Private August 10, 1861 Discharged by General Order on May 30, 1865. PA 183 B Estlin Joseph L. Private February 9, 1864 Discharged by General Order on August 28, 1865. PA 183 B Faunce William Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Foreman Nathan Private February 9, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 B Fasey John H. Private February 9, 1864 Discharged by General Order on May 15, 1865. PA 183 B Flood William Private February 9, 1864 Discharged by General Order on June 3, 1865. PA 183 B Frieze Jackson Private February 9, 1864 Died at Fredericksburg, Va. - date unknown, of wounds received at Spotsylvania Court House, Va. on May 12, 1864. PA 183 B Foreman Samuel Private February 9, 1864 Missing since May 10, 1865. PA 183 B Farrington Alfred Private February 9, 1864 Deserted in July, 1864. PA 183 B Grant David Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Griffith Charles W. Private June 16, 1864 Mustered out with company on July 13, 1865. PA 183 B Garmon Samuel G. Private December 31, 1863 Absent, sick, at muster out. PA 183 B Goode William H. Private March 14, 1862 Discharged on March 15, 1865 at expiration of term. PA 183 B Gillian George Private September 18, 1862 Discharged by General Order on May 30, 1865. PA 183 B Grover Isaiah Private March 31, 1864 Discharged by General Order on June 5, 1865. PA 183 B Gilday Patrick Private February 9, 1864 Discharged on Surgeons certificate on April 8, 1865. PA 183 B Gifford John Private March 28, 1862 Discharged on March 27, 1865 at expiration of term. PA 183 B Gibson John Private March 17, 1864 Transferred to 43d Company, 2d battalion, Veteran Reserve Corps on May, 1865 - discharged by General Order on September 7, 1865. PA 183 B George John Private February 9, 1864 Deserted on June 28, 1865. PA 183 B Griffin George Private February 9, 1864 Deserted on March 18, 1864. PA 183 B Hanson Alexander Private September 18, 1861 Discharged on September 18, 1864 at expiration of term. PA 183 B Hoover Samuel Private September 18, 1861 Discharged on September 18, 1864 at expiration of term. PA 183 B Hastings Jacob Private February 9, 1864 Died at Philadelphia, Pa. in July, 1864 - burial record on June 11, 1864 - of wounds received at Spotsylvania Court House, Va. on May 12, 1864. PA 183 B Humphries James M. Private February 12, 1864 Died at Washington, D. C. on June 8, of wounds received at Spotsylvania Court House, Va. on May 15, 1864. PA 183 B Hickson Thomas Private February 9, 1864 Died at New York on August 26, 1864 - buried in Cypress Hill Cemetery, L. I. PA 183 B Hort Frederick Private September 18, 1861 Never joined company. PA 183 B Huob Flavian Private September 18, 1861 Never joined company. PA 183 B Hammet Robert W. Private January 31, 1865 Not on muster-out roll. PA 183 B Jones Harrison W. Private January 23, 1864 Discharged by General Order on May 31, 1865. PA 183 B Knorr William E. Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Kline Peter B. Private September 17, 1862 Discharged on December 5, 1864. PA 183 B Kelly Thomas Private April 14, 1864 Deserted on August 4, 1863. PA 183 B Keyser Charles H. Private February 9, 1864 Discharged by General Order on July 31, 1865. PA 183 B Kildauf William Private January 7, 1865 Not on muster-out roll. PA 183 B Kelly Hugh Private September 28, 1864 Not on muster-out roll. PA 183 B Landauer Lewis Private February 9, 1864 Discharged on Surgeons certificate on December 30, 1864. PA 183 B Laughran Francis Private February 9, 1864 Discharged by General Order on May 17, 1865. PA 183 B Love William Private September 18, 1861 Discharged on September 18, 1864 at expiration of term. PA 183 B Lenney Daniel J. Private February 9, 1864 Deserted on March 12, 1864. PA 183 B Lannerbach Charles Private September 18, 1861 Never joined company. PA 183 B Morton Robert F. Private September 4, 1862 Absent, wounded, at muster out. PA 183 B Murphy John S. Private February 9, 1864 Discharged on Surgeons certificate on April 9, 1865. PA 183 B Miller John Private February 9, 1864 Discharged on Surgeons certificate on May 29, 1865. PA 183 B Miller Charles Private February 9, 1864 Promoted to Quarter Master Sergeant on April 22, 1864. PA 183 B Moore Robert Private February 9, 1864 Deserted on October 1, 1864 - returned on December 5, 1864 - absent, in arrest, at muster out. PA 183 B Miller William Private January 14, 1864 Deserted on February 13, 1864. PA 183 B Maxwell Alexander Private February 9, 1864 Discharged in November, 1864. PA 183 B May John P. Private February 9, 1864 Discharged by General Order on September 11, 1865. PA 183 B Madigan Patrick Private February 9, 1864 Deserted on February 16, 1864. PA 183 B Miller John Private September 28, 1864 Not on muster-out roll. PA 183 B M'Kay Hugh Private February 9, 1864 Captured at Deep Bottom and prisoner from August 16, 1864, to March 17, 1865 - discharged by General Order on July 12, 1865. PA 183 B M'Connell Robert B. Private February 9, 1864 Absent, sick, at muster out. PA 183 B M'Carroll Joseph Private July 20, 1862 Absent, sick, at muster out. PA 183 B M'Kenna James Private September 18, 1861 Discharged on September 18, 1864 at expiration of term. PA 183 B M'Coy James Private September 18, 1861 Discharged on December 9, 1864. PA 183 B M'Farland Alex Private February 9, 1864 Deserted in June, 1864 - returned - absent, in arrest, at muster out. PA 183 B M'Cormick Aaron Private February 9, 1864 Deserted on February 13, 1864. PA 183 B M'Call Edward Private February 8, 1864 Deserted on February 13, 1864. PA 183 B Nagle Henry L. Private February 9, 1864 Discharged by General Order on June 17, 1865. PA 183 B Patterson Edward Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Powers John Private February 9, 1864 Captured at Deep Bottom, Va. on August 16, 1864 - discharged by General Order on July 17, 1865. PA 183 B Price John N. Private February 9, 1864 Deserted on October 4, 1864. PA 183 B Powers Patrick Private February 9, 1864 Deserted on February 17, 1864. PA 183 B Riday John E. Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Scanlan John Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Sova John Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Seninger Anthony Private February 9, 1864 Captured at Deep Bottom, Va. on August 16, 1864. PA 183 B Schibraski Michael Private February 9, 1864 Wounded at Petersburg, Va. on March 25, 1865 - discharged by General Order on July 20, 1865. PA 183 B Shuster William H. Private September 18, 1861 Absent, wounded, at muster out. PA 183 B Swift Edward Private February 9, 1864 Discharged by General Order on May 15, 1865. PA 183 B Singley Amos E. Private February 9, 1864 Deserted on February 18, 1864. PA 183 B Suptkin Luke Private February 9, 1864 Deserted on February 12, 1864. PA 183 B Snyder John Private September 28, 1864 Not on muster-out roll. PA 183 B Torrance William Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 B Thompson William Private February 9, 1864 Died near Petersburg, Va. in July, 1864. PA 183 B Thomas Samuel B. Private February 9, 1864 Deserted on May 25, 1864 - returned on June 16, 1864 - absent, in arrest, at muster out. PA 183 B Walls John Private February 9, 1864 Wounded at Spotsylvania Court House, Va. on May 11, 1864 - absent, in hospital, at muster out. PA 183 B Walker Samuel L. Private February 9, 1864 Discharged by General Order on June 29, 1865. PA 183 B Whiting John H. Private February 9, 1864 Discharged by General Order on May 29, 1865. PA 183 C Graeff Henry W. Captain April 10, 1864 Resigned on May 18, 1864. PA 183 C Elliott George T. Captain September 18, 1861 Promoted from 1st Lt. Company G on March 5, 1865 - absent, with leave, at muster out. PA 183 C Griffith James 1st Lt. September 30, 1863 Promoted from 2d Lieut. on November 12, 1863 to Captain, Company E on February 4, 1864. PA 183 C Lathbury Benjamin B. 1st Lt. December 24, 1863 Promoted from 2d Lt. on February 5, 1864 - died at Richmond, Va. on June 27, 1864, of wounds received in action. PA 183 C Jones Benjamin F. 1st Lt. November 12, 1863 Promoted from 1st Sergeant on May 21, 1865 - mustered out with company on July 13, 1865. PA 183 C Mills Jr. Jacob 2d Lt. November 17, 1863 Promoted from private of Company D on February 6, 1864 - discharged on January 7, 1865. PA 183 C Hawk Samuel S. 2d Lt. December 24, 1863 Promoted from 1st Sergeant on April 17, 1865 - absent at muster out. PA 183 C Devlin Daniel J. 1st Sergeant November 12, 1863 Promoted to 1st Sergeant on May 21, 1865 - mustered out with company on July 13, 1865. PA 183 C Cadwalader Henry Sergeant November 12, 1863 Mustered out with company on July 13, 1863. PA 183 C Murphy John Sergeant December 24, 1863 Promoted to Corporal on May 1, 1864 to Sergeant on April 16, 1865 - mustered out with company on July 13, 1865. PA 183 C Hyneman George W. Sergeant November 12, 1863 Promoted to Sergeant on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Thomas George H. Sergeant December 24, 1863 Promoted from Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Dickinson Louis Sergeant November 12, 1863 Dishonorably discharged on October 5, 1865. PA 183 C Rose Joseph Corporal August 10, 1861 Promoted to Corporal on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 C M'Adams James Corporal December 24, 1863 Promoted to Corporal on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 C M'Guire Joseph Corporal December 24, 1863 Promoted to Corporal on May 1, 1865 - deserted - returned - mustered out with company on July 13, 1865. PA 183 C Morrow Samuel Corporal November 12, 1863 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Torrode William J. Corporal November 12, 1863 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Phillips Franklin Corporal November 12, 1863 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Care Jacob E. Corporal April 4, 1865 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 C Bechtel Jacob M. Corporal December 24, 1863 Discharged by General Order on July 15, 1865. PA 183 C Widdoes Stanley Corporal September 12, 1862 Discharged by General Order on May 30, 1865. PA 183 C Hess Philip Corporal November 12, 1863 Transferred to Veteran Reserve Corps on April 10, 1865. PA 183 C Given David B. Corporal December 24, 1863 Transferred to Company C, 18th Regiment, Veteran Reserve Corps on April 16, 1865 - discharged by General Orider on July 26, 1865. PA 183 C Mead Thomas J. Corporal March 28, 1862 Promoted to Principal Musician on May 26, 1865. PA 183 C Johnson James Corporal November 12, 1863 Killed at Deep Bottom, Va. on August 16, 1864. PA 183 C M'Farland James Corporal November 12, 1863 Captured - died at Richmond, Va. on June 3, 1864, of wounds received in action. PA 183 C Love Andrew Corporal November 12, 1863 Captured - died at Lynchburg, Va. on July 24, 1864. PA 183 C Brady John Corporal November 12, 1863 Deserted on August 3, 1864 - returned on May 5, 1865 - mustered out with company on July 13, 1865. PA 183 C Maxwell William H. Corporal October 16, 1861 Discharged on October 23, 1864 at expiration of term. PA 183 C Buchanan John Private November 12, 1863 Absent, in arrest, at muster out. PA 183 C Bowles Charles Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C Bovell William Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C Burns John Private April 4, 1865 Mustered out with company on July 13, 1865. PA 183 C Bass Christopher Private April 13, 1864 Absent, sick, at muster out. PA 183 C Bernard William Private September 8, 1862 Discharged by General Order on June 5, 1865. PA 183 C Broomall Elwood Private October 22, 1861 Discharged on October 22, 1864 at expiration of term. PA 183 C Boucher George Private November 12, 1863 Killed at Petersburg, Va. on June 17, 1864. PA 183 C Bender Charles Private December 24, 1863 Deserted on April 15, 1865. PA 183 C Clark John Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C Cannon Edward Private November 12, 1863 Absent, sick, at muster out. PA 183 C Clark Samuel Private December 24, 1863 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent at muster out. PA 183 C Crouse Charles W. Private November 12, 1863 Wounded at Petersburg, Va. on March 25, 1865 - absent, in hospital, at muster out. PA 183 C Cullin Daniel Private October 8, 1861 Discharged on December 8, 1864 at expiration of term. PA 183 C Crouse Joseph Private December 24, 1863 Killed at Deep Bottom, Va. on August 16, 1864. PA 183 C Canavan Andrew Private November 12, 1863 Died at New York on April 4, 1865. PA 183 C Cannon Patrick Private May 11, 1864 Deserted on May 11, 1864. PA 183 C Devlin Miles Private November 12, 1863 Deserted - returned - mustered out with company on July 13, 1865. PA 183 C Devenny Edward H. Private April 4, 1865 Mustered out with company on July 13, 1865. PA 183 C Dillan Joseph Private April 4, 1865 Mustered out with company on July 13, 1865. PA 183 C Delap John Private October 19, 1861 Discharged on October 17, 1864 at expiration of term. PA 183 C Davidson William Private November 12, 1863 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 C Dougherty Patrick Private November 12, 1863 Captured - died at Richmond, Va. on June 16, 1864. PA 183 C Dickerson Calvin Private November 12, 1863 Dishonorably discharged on October 7, to date July 13, 1865. PA 183 C Denney Benjamin Private December 24, 1863 Deserted on December 30, 1863. PA 183 C Dugan William Private December 24, 1863 Deserted on February 22, 1864. PA 183 C Farrell George Private November 12, 1863 Killed at Todds Tavern, Va. on May 8, 1864. PA 183 C Furrey Auther Private November 12, 1863 Died at Philadelphia, Pa. on July 22, of wounds received at Cold Harbor, Va. on June 3, 1864. PA 183 C Faith Alexander Private December 21, 1863 Captured - died at Andersonville, Ga. on November 14, 1864 - burial record on September 27, 1864 - grave, 9,869. PA 183 C Francis Henry Private November 12, 1863 Died at Philadelphia, Pa. on September 18, 1864 - burial record on December 11, 1864. PA 183 C Foster Frank Private November 12, 1863 Deserted on December 1, 1863. PA 183 C Ford James R. Private December 24, 1863 Deserted on December 25, 1863. PA 183 C Goodhart Frederick Private November 12, 1863 Mustered out with company on July 13. 1865. PA 183 C George Samuel Private November 12, 1863 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 C Grey John Private December 24, 1863 Discharged by General Order on June, 16, 1865. PA 183 C Grey William Private November 12, 1863 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 C Gorgas Theodore Private November 12, 1863 Dishonorably discharged on October 7, to date July 13, 1865. PA 183 C Guiger John Private November 12, 1863 Deserted on July 26, 1864. PA 183 C Hennessey John Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C Hall Samuel C. Private December 24, 1863 Wounded at Petersburg, Va. on June 18, 1864 - absent, in hospital, at muster out. PA 183 C Hawk Edward Private December 24, 1863 Dishonorably discharged on October 7, to date July 13, 1865. PA 183 C Hoye James Private December 24, 1863 Deserted on December 27, 1863. PA 183 C Hedricks Benjamin F. Private December 24, 1863 Discharged by General Order on July 31, 1865. PA 183 C Jones William Private November 12, 1863 Wounded at Sailors Creek, Va. on April 6, 1865 - discharged by General Order on June 2, 1865. PA 183 C Johnson James K. Private October 18, 1861 Discharged on October 18, 1864 at expiration of term. PA 183 C Kane James Private December 24, 1863 Dishonorably discharged on October 7, to date July 13, 1865. PA 183 C King Samuel Private December 24, 1863 Deserted on June 16, 1865. PA 183 C Lacey Ferdinand J. Private August 20, 1862 Transferred to 105th Company, 2d battalion, Veteran Reserve Corps on January 18, 1865 - discharged by General Order on May 30, 1865. PA 183 C Louder James Private March 25, 1864 Discharged by General Order on June 3, 1865. PA 183 C Lower Joseph Private December 24, 1863 Discharged by General Order on June 3, 1865. PA 183 C Marshall Jacob Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C Maguire Thomas Private October 23, 1861 Discharged on October 23, 1864 at expiration of term. PA 183 C Myers Samuel C. Private November 12, 1863 Discharged on Surgeons certificate on June 28, 1865. PA 183 C Moore Andrew J. Private August 29, 1862 Discharged by General Order on June 3, 1865. PA 183 C Moore Thomas J. Private November 12, 1863 Killed at Todds Tavern, Va. on May 8, 1864. PA 183 C Moore George L. Private April 4, 1865 Discharged by General Order on May 23, 1865. PA 183 C Miller Charles Private November 12, 1863 Deserted on November 22, 1863. PA 183 C Maxwell Alexander Private December 24, 1863 Deserted on June 1, 1864. PA 183 C Mitchell William Private November 12, 1863 Deserted on November 20, 1863. PA 183 C M'Wade Robert Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 C M'Gronnin Thomas Private December 24, 1863 Absent, sick, at muster out. PA 183 C M'Laughlin Samuel Private December 24, 1863 Discharged by General Order on May 26, 1865. PA 183 C M'Ginty Hugh Private May 11, 1864 Deserted on May 11, 1864. PA 183 C M'Bride Michael Private November 12, 1863 Deserted on November 23, 1863. PA 183 C Nichols William Private April 14, 1864 Absent, sick, at muster out. PA 183 C Nugent Thomas Private December 24, 1863 Deserted on December 30, 1863. PA 183 C O'Connor William Private November 12, 1863 Mustered out with company on July 13, 1865. PA 183 C O'Neil Robert Private August 10, 1861 Captured at Petersburg, Va. on June 26, 1864 - discharged by General Order on June 26, 1865. PA 183 C O'Neil Patrick Private May 11, 1864 Deserted on May 11, 1864. PA 183 C Paul Nichols Private October 18, 1861 Discharged on October 18, 1864 at expiration of term. PA 183 C Perkins James Private September 12, 1864 Deserted on December 1, 1864. PA 183 C Quinn Mark Private April 4, 1865 Deserted on June 16, 1865. PA 183 C Robertson Joseph Private October 31, 1863 Captured - discharged by General Order on July 25, 1865. PA 183 C Riggs Charles W. Private December 24, 1863 Transferred to 2d battalion, Veteran Reserve Corps on May 18, 1865 - discharged by General Order on September 12, 1865. PA 183 C Rudloff William Private November 12, 1863 Killed at Totopotomoy. Va. on May 31, 1864 - buried in National Cemetery, Yorktown, sec. A, grave, 335. PA 183 C Reible Jacob Private August 10, 1861 Dishonorably discharged on October 7, to date July 13, 1865. PA 183 C Searmon John Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 C Squibb Robert Private August 10, 1861 Deserted - returned - mustered out with company on July 13, 1865. PA 183 C Swayne George Private March 23, 1864 Absent, sick, at muster out. PA 183 C Saunders Thomas Private October 22, 1861 Discharged on December 6, 1864 at expiration of term. PA 183 C Sample John Private November 12, 1863 Transferred to 8th Company, 2d battalion, Veteran Reserve Corps - discharged by General Order on August 9, 1865. PA 183 C Schneider Ignus Private November 12, 1863 Captured - died at Salisbury, N. C. on November 20, 1864 - burial record: November 30, 1864. PA 183 C Trainor John Private April 4, 1865 Mustered out with company on July 13, 1865. PA 183 C Virden Thomas Private October 12, 1861 Discharged on December 28, 1864 at expiration of term. PA 183 C Weir Hugh Private November 12, 1863 Deserted - returned - mustered out with company on July 13, 1865. PA 183 C White James Private April 4, 1865 Mustered out with company on July 13, 1865. PA 183 C West Joseph Private April 7, 1864 Absent, sick, at muster out. PA 183 C Wallen August B. Private September 12, 1862 Discharged by General Order on May 30, 1865. PA 183 C Wittaker William J. Private August 13, 1862 Discharged by General Order on July 13, 1865. PA 183 C Wiseman John Private October 1, 1862 Discharged by General Order on May 30, 1865. PA 183 C Wilson William Private November 12, 1863 Died at Philadelphia, Pa. in August, 1864 - burial record, at Beverly, N. J. on September 4, 1864. PA 183 C Wilson James Private December 24, 1863 Died at Philadelphia, Pa. on June 9, 1865. PA 183 C Wetzell Wiiliam Private December 24, 1863 Deserted on June 16, 1865. PA 183 C Wilson George F. Private December 24, 1863 Deserted on February 21, 1864. PA 183 C Young William S. Private November 14, 1863 Discharged on Surgeons certificate on June 22, 1865. PA 183 D Lynch Augustine T. Captain October 3, 1863 Promoted from 2d Lt. on December 24, 1863 to Major on August 9, 1864. PA 183 D Hartzell Michael Captain November 17, 1863 Promoted from 1st Sergeant to 1st Lt. on August 18, 1864 to Captain on December 31, 1864 - mustered out with company on July 13, 1865. PA 183 D Korony Theo. G. 1st Lt. November 17, 1863 Commissioned Captain on July 20, 1864 - not mustered - discharged on Surgeons certificate on August 18, 1864. PA 183 D Lynch Bennett B. 2d Lt. December 24, 1863 Promoted to Sergeant on February 13, 1864 to 2d Lt. on September 11, 1864 to 1st Lt. on December 31, 1864 - mustered out with company on July 13, 1865. PA 183 D M'Alpine Thaddeus L. 2d Lt. December 24, 1863 Resigned on May 15, 1864. PA 183 D White John A. 1st Sergeant November 17, 1863 Promoted to 1st Sergeant on September 1, 1864 - commissioned 2d Lt. on July 10, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 D Genth Frederick Sergeant November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Campbell John Sergeant December 24, 1863 Promoted to Corporal on December 25, 1863 to Sergeant on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Wilson Thomas J. Sergeant December 24, 1863 Promoted to Corporal on April 2, 1865 to Sergeant on May 18, 1865 - mustered out with company on July 13, 1865. PA 183 D Pierce William K. Sergeant November 17, 1863 Promoted to Sergeant on May 11, 1864 - wounded at Spotsylvania Court House, Va. on May 11, 1864 - absent, in hospital, at muster out. PA 183 D Smith Hugh H. Sergeant December 24, 1863 Wounded and captured at Cold Harbor, Va. on June 3, 1864 - died at Andersonville, Ga. on November 2, 1864 - grave, 11,741. PA 183 D Weber William Corporal November 17, 1863 Promoted to Corporal on December 25, 1863 - mustered out with company on July 13, 1865. PA 183 D Anderson Isaac Corporal December 24, 1863 Promoted to Corporal on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 D Watson James C. Corporal November 17, 1863 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Carson Isaac Corporal December 24, 1863 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Lindsay John F. Corporal January 4, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Taylor William Corporal November 17, 1863 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Connehey Henry Corporal December 24, 1863 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 D Bechtel David S. Corporal March 13, 1862 Wounded at Deep Bottom, Va. on August 16, 1864 - captured and prisoner from August 16, to December 20, 1864 - discharged on March 18, 1865 at expiration of term. PA 183 D Arthur William M. Corporal September 13, 1862 Killed at Deep Bottom. Va. on August 16, 1864. PA 183 D Kibler Joseph Corporal November 17, 1863 Died at Philadelphia, Pa. on October 3, 1864, of wounds received in action. PA 183 D Dickerson Francis E. Musician March 8, 1862 Mustered out with company on July 13, 1865. PA 183 D Wallace William Musician December 1, 1861 Deserted on July 4, 1865. PA 183 D Stevenson William Musician November 17, 1863 Died at Philadelphia, Pa. on February 24, 1864. PA 183 D Adams Alexander Private January 30, 1864 Mustered out with company on July 13, 1865. PA 183 D Barnett Henry Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Baehr Edward J. Private November 17, 1863 Discharged by General Order on June 14, 1865. PA 183 D Barry John Private January 28, 1865 Deserted on June 20, 1865. PA 183 D Burns George A. Private December 24, 1863 Deserted on February 8, 1864. PA 183 D Cathcart Joseph Private November 17, 1863 Deserted - returned - mustered out with company on July 13, 1865. PA 183 D Campbell Reese Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Cook William H. Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Conville Francis Private December 24, 1863 Wounded at Petersburg, Va. on June 17, 1864 - absent, in hospital, at muster out. PA 183 D Clavercaney William Private March 17, 1864 Killed at Totopotomoy, Va. on May 30, 1864. PA 183 D Cameron George W. Private November 17, 1863 Died at Philadelphia, Pa. on March 23, 1864. PA 183 D Casner Thomas Private December 24, 1863 Discharged by General Order on July 31, 1865. PA 183 D Chambers John Private December 24, 1863 Deserted on January 8, 1864. PA 183 D Curran Michael Private December 24, 1863 Deserted - date unknown. PA 183 D Colgin Joseph Private September 18, 1862 Deserted in March, 1865. PA 183 D Colgin William Private August 10, 1861 Deserted in March, 1865. PA 183 D Cress Edmund J. Private August 26, 1862 Deserted in May, 1864. PA 183 D Darrah John Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Davis Sheldon S. Private November 17, 1863 Discharged by General Order on May 30, 1865. PA 183 D Donohoe Michael F. Private August 10, 1861 Transferred to Company G on December 19, 1864. PA 183 D Duttonfield Arthur Private December 24, 1863 Transferred to Company G, 14th Regiment, Veteran Reserve Corps on January 18, 1865 - discharged by General Order on July 25, 1865. PA 183 D Dober Francis Private November 17, 1863 Deserted on November 22, 1863. PA 183 D Davidson John H. Private December 24, 1863 Deserted on January 4, 1864. PA 183 D Delaney James Private April 28, 1864 Never joined company. PA 183 D Edwards John Private April 25, 1864 Never joined company. PA 183 D Ford Robert Private January 30, 1864 Mustered out with company on July 13, 1865. PA 183 D Freeman David S. Private August 15, 1862 Discharged by General Order on May 30, 1865. PA 183 D Funk John Private December 24, 1863 Discharged by General Order on June 6, 1865. PA 183 D Flanigan James Private March 8, 1862 Deserted on July 4, 1865. PA 183 D Foter Henry J. Private December 24, 1863 Deserted on January 4, 1864. PA 183 D Fisher Henry Private December 24, 1863 Deserted on February 23, 1864. PA 183 D Goldsmith Samuel Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Gilbert Henry C. Private January 13, 1864 Captured - discharged by General Order on July 31, 1865. PA 183 D Gillen Joseph Private October 21, 1861 Never joined company. PA 183 D Glenn George M. Private December 24, 1863 Deserted on June 7, 1865. PA 183 D Hixson William C. Private November 17, 1863 Discharged by General Order on June 26, 1865. PA 183 D Herbert William Private October 18, 1861 Discharged by General Order on May 31, 1865. PA 183 D Hunt William T. Private August 26, 1862 Discharged by General Order on May 30, 1865. PA 183 D Hoffman Sebastian Private January 4, 1864 Transferred to Veteran Reserve Corps on April 18, 1865. PA 183 D Harp William F. Private August 26, 1862 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 D How William A. Private December 24, 1863 Died on March 6, 1865 - buried in Poplar Grove National Cemetery, Petersburg, Va., div. D, sec. F, grave, 25. PA 183 D Henderson David Private November 17, 1863 Deserted on January 5, 1864. PA 183 D Hall Edward Private April 23, 1864 Never joined company. PA 183 D Hackett James Private May 11, 1864 Never joined company. PA 183 D Johnson Cornelius Private December 24, 1863 Discharged by General Order on May 20, 1865. PA 183 D Jeffries Barry Private December 24, 1863 Died at Beverly, N. J. on January 21, 1865. PA 183 D Kelley Arthur F. Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Kunkle Gustave Private March 15, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 D Larkins Michael Private January 30, 1864 Mustered out with company on July 13, 1865. PA 183 D Lowry Thomas Private November 17, 1863 Deserted - returned - mustered out with company on July 13, 1865. PA 183 D Langan John Private December 24, 1863 Killed at Todds Tavern, Va. on May 8, 1864. PA 183 D Lackey James Private December 24, 1863 Captured - died at Andersonville, Georgia on June 21, 1864 - grave, 2,250. PA 183 D Mills Jr. Jacob Private November 17, 1863 Promoted to 2d Lt., Company C on February 6, 1864. PA 183 D Mott John Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Merriam Chester S. Private November 17, 1863 Discharged by General Order on June 20, 1865. PA 183 D Michaels John Private April 15, 1864 Transferred to Company K, 14th Regiment, Veteran Reserve Corps on April 22, 1865 - discharged by General Order on August 16, 1865. PA 183 D Mackey Jacob Private November 17, 1863 Promoted to Hospital Steward on May 27, 1865. PA 183 D Maloney William Private November 17, 1863 Missing in action at Reams Station, Va. on August 25, 1864. PA 183 D Mills Benjamin H. Private November 17, 1863 Killed at Totopotomoy, Va. on May 30, 1864 - buried in National Cemetery, Yorktown, section A, grave, 379. PA 183 D Murry William Private February 1, 1864 Died at Philadelphia, Pa. on July 22, 1864. PA 183 D Moffit William Private November 17, 1863 Died at New York on July 31, 1864 - buried in Cypress Hill Cemetery, L. I. PA 183 D Merple Edward D. Private November 17, 1863 Deserted in March, 1864. PA 183 D Mackey Frederick Private April 2, 1864 Never joined company. PA 183 D M'Keenan William Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D M'Ewan Walter Private November 17, 1863 Discharged by General Order on July 31, 1865. PA 183 D Naylor Benjamin F. Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Noll Tobias Private December 24, 1863 Discharged by General Order on July 31, 1865. PA 183 D Nelson Joseph Private December 24, 1863 Deserted on January 4, 1864. PA 183 D Oakes William Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Off Gustavus Private September 13, 1862 Discharged by General Order on May 30, 1865. PA 183 D Parker Mark K. Private November 17, 1863 Captured at Deep Bottom, Va. on August 16, 1864 - died at Salisbury, N. C. on December 7, 1864. PA 183 D Price Edwin Private November 17, 1863 Deserted on January 4, 1864. PA 183 D Pugh John A. Private August 10, 1861 Never joined company. PA 183 D Quigley Hugh F. Private December 24, 1863 Discharged by General Order on June 17, 1865. PA 183 D Roettger Gustavus Private September 6, 1864 Mustered out with company on July 13, 1865. PA 183 D Rowan Francis Private January 13, 1864 Mustered out with company on July 13, 1865. PA 183 D Renze Augustus Private November 17, 1863 Died on U. S. Transport on May 30, of wounds received at North Anna, River, Va. on May 25, 1864. PA 183 D Rowe James Private November 17, 1863 Deserted on June 28, 1865. PA 183 D Schmidt Daniel Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Scott Samuel Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Smith Philip Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Sanderson Pnilip C. Private December 24, 1863 Mustered out with company on July 13, 1865. PA 183 D Slick Gottleib Private November 17, 1863 Wounded at Reams Station, Va. on August 24, 186 - absent, in hospital, at muster out. PA 183 D Stratton William Private December 24, 1863 Discharged on Surgeons certificate on December 19, 1864. PA 183 D Sherry Hugh Private December 24, 1863 Discharged by General Order on May 26, 1865. PA 183 D Stevens Isaac A. Private December 24, 1863 Missing in action at Wilderness, Va. on May 5, 1864. PA 183 D Smith Euclid Private December 24, 1863 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 D Schanck Samuel Private November 17, 1863 Killed at Todds Tavern, Va. on May 8, 1864. PA 183 D Schlabach Daniel K. Private December 24, 1863 Captured at Deep Bottom, Va. on August 16, 1864 - died at Salisbury, N. C. on December 17, 1864. PA 183 D Sharkey Arthur Private December 24, 1863 Died at Philadelphia, Pa. on December 12, 1864. PA 183 D Steel Josiah H. Private December 24, 1863 Discharged by General Order on July 31, 1865. PA 183 D Smith Peter Private April 1, 1864 Never joined company. PA 183 D Tomlin George Private November 17, 1863 Mustered out with company on July 13, 1865. PA 183 D Tyson Isaac R. Private January 22, 1864 Not on muster-out roll. PA 183 D Vanfleet Alexander Private November 17, 1863 Discharged by General Order on May 18, 1865. PA 183 D Wotters Charles H. Private December 24, 1863 Discharged on Surgeons certificate on November 10, 1864. PA 183 D Welch Henry Private March 9, 1862 Discharged on March 7, 1865 at expiration of term. PA 183 D Wales James Private January 30, 1864 Discharged by General Order on June 26, 1865. PA 183 D Walters Frazer Private November 17, 1863 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 E Griffith James Captain September 30, 1863 Promoted from 1st Lieutenant of Company C on February 4, 1864 - absent, with leave, at muster out. PA 183 E Crawford Charles H. 1st Lt. February 18, 1864 Captured - promoted from 2d Lt. on May 28, 1865 - absent, with leave, at muster out. PA 183 E Snowden Carter L. 1st Lt. January 13, 1864 Promoted from private of Company A on February 10, 1864 - discharged on October 9, 1864. PA 183 E Pono Richard S. 1st Sergeant February 3, 1864 Promoted to Corporal on February 6, 1864 to Sergeant on October 26, 1864 to 1st Sergeant on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 E Waldron William H. 1st Sergeant February 3, 1864 Transferred to Veteran Reserve Corps on January 13, 1865. PA 183 E Earnest Jr. William S. Sergeant March 8, 1864 Promoted from private on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 E Lewis William L. Sergeant February 3, 1864 Promoted from private on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 E Maxwell John F. Sergeant February 3, 1864 Promoted from private on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 E M'Anally James Sergeant February 3, 1864 Promoted to Corporal on September 1, 1864 to Sergeant on October 26, 1864 - mustered out with company on July 13, 1865. PA 183 E Bradley Adad J. Sergeant February 3, 1864 Discharged on October 12, 1864, for wounds received in action. PA 183 E Kelley John W. Sergeant August 10, 1861 Discharged by special order on October 17, 1864. PA 183 E Quinn Andrew J. Sergeant February 3, 1864 Died on July 11, of wounds received at Cold Harbor, Va. on June 3, 1864 - buried in National Cemetery, Arlington. PA 183 E Esray Theodore B. Sergeant February 3, 1864 Died at Philadelphia, Pa. on October 1, 1864. PA 183 E Hinton George L. Sergeant September 7, 1862 Discharged by General Order on June 16. 1865. PA 183 E M'Vey Edward J. Sergeant October 25, 1861 Discharged on September 27, 1864 at expiration of term. PA 183 E Gorman Henry Corporal February 3, 1864 Absent, without leave, at muster out. PA 183 E Strockline Martin Corporal February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Simon Jacob Corporal February 3, 1864 Promoted to Corporal on October 26, 1864 - mustered out with company on July 13, 1865. PA 183 E Hasson John T. Corporal August 10, 1861 Deserted - returned - promoted to Corporal on June 19, 1865 - mustered out with company on July 13, 1865. PA 183 E Davis Robert Corporal February 3, 1864 Promoted to Corporal on June 20, 1865 - mustered out with company on July 13, 1865. PA 183 E Smith Charles Corporal February 3, 1864 Promoted to Corporal on June 22, 1865 - mustered out with company on July 13, 1865. PA 183 E Gaffney William Corporal February 3, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 E Gear Henry M. Corporal February 3, 1864 Discharged by General Order on May 12, 1865. PA 183 E Gorman Thomas Corporal February 3, 1864 Discharged by General Order on June 13, 1865. PA 183 E Hooft John Corporal February 3, 1864 Discharged on Surgeons certificate on January 20, 1865. PA 183 E Townsend Charles L. Corporal February 3, 1864 Captured - died at Andersonville, Ga. on November 18, 1864 - grave, 12,080. PA 183 E O'Neil Hugh Musician February 3, 1864 Discharged by General Order on June 7, 1865. PA 183 E Grady Francis Musician March 10, 1862 Discharged on March 12, 1865 at expiration of term. PA 183 E Banks Isaac Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Boutcher Theodore Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Boylen Patrick B. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Campbell William Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Cook John Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Clare Thomas Private February 3, 1864 Absent, sick, at muster out. PA 183 E Campbell John Private February 3, 1864 Discharged by special order - date unknown. PA 183 E Cook Philip Private October 31, 1861 Discharged on September 16, 1864 at expiration of term. PA 183 E Collins George W. Private February 3, 1864 Died at Washington, D. C. on August 24, 1864. PA 183 E Carr John Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Dempsey John Private August 5, 1862 Discharged at expiration of term. PA 183 E Dougherty John Private February 3, 1864 Transferred to Veteran Reserve Corps on March 7, 1865. PA 183 E Dock James Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Duncan James Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Doyle John Private February 3, 1864 Deserted on January 1, 1865. PA 183 E Ellinger Josiah Private February 3, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 E Frew William Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Ford James Private February 3, 1864 Transferred to Veteran Reserve Corps on February 15, 1865. PA 183 E Geary William H. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Goldsmith William Private February 3, 1864 Absent, sick, at muster out. PA 183 E George William Private October 25, 1861 Discharged - date unknown. PA 183 E Guy William Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Gousha Valentine Private February 3, 1864 Discharged on September 15, to date July 13, 1865. PA 183 E Hemphill James Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Hayes Hugh Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Hart Paul Private February 15, 1864 Mustered out with company on July 13, 1865. PA 183 E Hagerty Thomas Private March 9, 1864 Mustered out with company on July 13, 1865. PA 183 E Hanley Francis Private March 9, 1864 Mustered out with company on July 13, 1865. PA 183 E Hopkins Allen Private February 3, 1864 Discharged on Surgeons certificate on October 20, 1864. PA 183 E Hutton Thomas Private February 3, 1864 Died at Philadelphia, Pa. on February 16, 1864. PA 183 E Hanna Thomas Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Houston Alexander Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Hurley David Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Ihern Michael Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Kelley Joseph S. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Kelley Hugh Private February 13, 1865 Mustered out with company on July 13, 1865. PA 183 E Kelley Michael Private August 10, 1861 Captured and prisoner from June 22, 1864, to April 24, 1865 - discharged by General Order on June 6, 1865. PA 183 E Kyle James Private October 25, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 E Kelley Michael Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Klemm Jacob Private February 3, 1864 Deserted on June 1, 1864. PA 183 E Kurza John Private February 17, 1864 Discharged by special order on July 31, 1865. PA 183 E Landis Lewis L. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Lochrey John B. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Laughlin William Private February 3, 1864 Discharged on Surgeons certificate on November 1, 1864. PA 183 E Larmour James Private February 3, 1864 Discharged by General Order on May 16, 1865. PA 183 E Lugar William B. Private August 10, 1861 Discharged - date unknown. PA 183 E May Bartley Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Mitchell John Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Mansfield Edward Private May 30, 1864 Mustered out with company on July 13, 1865. PA 183 E Myers John Private February 3, 1864 Wounded in action - absent, in hospital, at muster out. PA 183 E Moore Thomas P. Private February 3, 1864 Deserted - returned - absent, sick, at muster out. PA 183 E Marshall Isaac Private October 21, 1861 Discharged on November 23, 1864 at expiration of term. PA 183 E Mitchell Hugh Private February 3, 1864 Transferred to Veteran Reserve Corps on September 16, 1864. PA 183 E Moore John Private February 3, 1864 Transferred to Veteran Reserve Corps on April 16, 1864. PA 183 E Marshall William Private February 3, 1864 Deserted February 23, 1864. PA 183 E Morris Charles Private February 3, 1864 Deserted February 23, 1864. PA 183 E Madison Charles Private August 10, 1861 Captured and prisoner from June 22, 1864, to April 9. 1865 - discharged by General Order on June 5, 1865. PA 183 E Miller William Private January 14, 1864 Not on muster-out roll. PA 183 E M'Kellen Patrick Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E M'Pherson Allen Private August 10, 1864 Discharged by General Order on June 17, 1865. PA 183 E M'Pherson Henry Private October 25, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 E M'Mullin James B. Private February 3, 1864 Died on June 27, of wounds received at Cold Harbor, Va. on June 5, 1864 - buried in National Cemetery, Arlington. PA 183 E M'Ferran Charles Private February 3, 1864 Died at Philadelphia, Pa. on January 14, 1865 - burial record on January 29, 1865. PA 183 E M'Learn Joseph D. Private February 3, 1864 Captured - died at Richmond, Va. on June 20, 1864. PA 183 E M'Kenna Dennis Private February 3, 1864 Deserted on February 23, 1864. PA 183 E M'Clellan Robert Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Nesbitt William Private February 3, 1864 Absent, sick, at muster out. PA 183 E Nunday Thomas Private February 3, 1864 Discharged by General Order on June 14, 1865. PA 183 E Newton Isaac Private October 25, 1861 Never joined company. PA 183 E Nugent William Private February 3, 1864 Captured at Spotsylvania C. H. and prisoner from May 12, 1864, to April 17, 1865 - discharged by General Order on June 27, 1865. PA 183 E Porter Robert J. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Pierce Albert J. Private February 3, 1864 Deserted on September 20, 1864. PA 183 E Pike John Private Deserted on June 12, 1865. PA 183 E Restine Henry Private February 3, 1864 Died at Davids Island, New York on August 3, 1865. PA 183 E Spence James Private February 3, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 E Smith James B. Private February 3, 1864 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 E Schmeild Arthur Private February 3, 1864 Captured - died at Salisbury, N. C. on November 13, 1864. PA 183 E Smith George Private February 3, 1864 Deserted February 23, 1864. PA 183 E Smith John Private February 3, 1864 Deserted on June 20, 1865. PA 183 E Thomas George Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Taylor Daniel Private February 3, 1864 Captured - died on October 24, 1864. PA 183 E Williamson George P. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 E Wood George W. Private October 25, 1861 Discharged on September 29, 1864 at expiration of term. PA 183 E Woodcock Thomas Private February 3, 1864 Captured - died at Salisbury, N. C. on November 3, 1864 - burial record on November 14, 1864. PA 183 E Wagenheim Otto Private February 3, 1864 Deserted on February 23, 1864. PA 183 E Wright Frederick R. Private February 3, 1864 Deserted on February 23. 1864. PA 183 F Campbell Alexander Captain February 8, 1864 Died at Philadelphia, Pa. on June 20, 1864. PA 183 F M'Cullough John Captain February 8, 1864 Promoted from 2d Lieutenant of Company I on August 8, 1864 - mustered out with company on July 13, 1865. PA 183 F Huston William H. 1st Lt. February 9, 1864 Discharged on Surgeons certificate on July 19, 1864. PA 183 F Edggar William 1st Lt. February 8, 1864 Promoted from Sergeant on February 12, 1865 - mustered out with company on July 13, 1865. PA 183 F Gladding Henry C. 2d Lt. February 8, 1864 Discharged on Surgeons certificate on September 19, 1864. PA 183 F Weiser John J. 2d Lt. February 8, 1864 Promoted from Sergeant on February 12, 1865 - mustered out with company on July 13, 1865. PA 183 F Warner George C. 1st Sergeant August 10, 1861 Promoted from Sergeant on May 1, 1865 - mustered out with company on July 13, 1865. PA 183 F Touladoux Camille 1st Sergeant February 8, 1864 Transferred to 2d battalion, Veteran Reserve Corps on September 17, 1864 - discharged by General Order on September 12, 1865. PA 183 F Payne George A. Sergeant February 8, 1864 Promoted to Sergeant on February 24, 1864 - mustered out with company on July 13, 1865. PA 183 F Helena Philip Sergeant February 6, 1864 Promoted to Corporal on March 9, 1865 to Sergeant on June 18, 1865 - mustered out with company on July 13, 1865. PA 183 F Brockaway Samuel Sergeant February 8, 1864 Promoted to Corporal on June 18, 1865 to Sergeant on July 5, 1865 - mustered out with company on July 13, 1865. PA 183 F Edwards William J. Sergeant February 8, 1864 Promoted to Sergeant on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 F Gladding Norwood P. Sergeant September 10, 1862 Discharged by General Order on June 1, 1865. PA 183 F Flood Thomas Corporal February 8, 1864 Promoted to Corporal on March 9, 1863 - mustered out with company on July 13, 1865. PA 183 F Lindsay Albert Corporal February 8, 1864 Promoted to Corporal on June 28, 1865 - mustered out with company on July 13, 1865. PA 183 F Charbonnier Alfred Corporal February 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 F Adams William Corporal February 8, 1864 Absent, sick, at muster out. PA 183 F Ross Enos W. Corporal February 8, 1864 Wounded at North Anna River, Va. May 25, 1864 - transferred to Company I, 14th Regiment, Veteran Reserve Corps - discharged by General Order on August 1, 1865. PA 183 F Wilson William F. Corporal February 8, 1864 Discharged on Surgeons certificate on June 17, 1864. PA 183 F Schiebler Lewis F. Corporal February 8, 1864 Captured and prisoner from August 16, 1864, to March 1, 1865 - discharged by General Order on June 25, 1865. PA 183 F Fields Thomas W. Corporal August 17, 1862 Transferred to Veteran Reserve Corps on April 18, 1865. PA 183 F Hennessey James Musician February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Ford Ellis W. Musician February 8, 1864 Promoted to Principal Musician on May 1, 1865. PA 183 F Burnett Joseph T. Private February 8, 1864 Absent, on detached service, at muster out. PA 183 F Barger Charles Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Burns Jacob A. Private February 8, 1864 Wounded at Spotsylvania Court House, Va. on May 10, 1864 - absent, in hospital, at muster out. PA 183 F Branigan John Private February 8, 1864 Discharged by General Order on June 7, 1865. PA 183 F Burger Roland M. Private September 9, 1862 Discharged by General Order on June 1, 1865. PA 183 F Bechtel Benjamin Private October 31, 1861 Discharged on March 28, 1865. PA 183 F Barr Alexander Private February 8, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 F Breyer Lawrence Private February 8, 1864 Missing in action at Reams Station, Va. on August 25, 1864. PA 183 F Bowers John L. Private August 10, 1862 Discharged by special order on November 8, 1864. PA 183 F Carmon William P. Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Condon James Private February 8, 1864 Killed at North Anna River, Va. on May 25, 1864. PA 183 F Care Joseph Private February 8, 1864 Deserted - returned - discharged on November 23, to date July 13, 1865. PA 183 F Christ David Private February 8, 1864 Deserted on February 24, 1864. PA 183 F Canfield Johannes Private February 8, 1864 Deserted in February, 1864. PA 183 F Coleman William Private October 31, 1861 Never joined company. PA 183 F Dunlap John W. Private February 3, 1864 Mustered out with company on July 13, 1865. PA 183 F DeHaven John B. Private February 8, 1864 Wounded at Petersburg, Va. on March 25, 1865 - absent, in hospital, at muster out. PA 183 F Drury John Private February 8, 1864 Deserted on February 8, 1864. PA 183 F Eckstein Joseph Private February 8, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 F Elliott Isaac Private February 8, 1864 Discharged by General Order on May 13, 1865. PA 183 F Edge John Private August 31, 1861 Discharged on December 27, 1864 at expiration of term. PA 183 F Fitzgerald John Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Fitzgerald Patrick J. Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Fisher Walter J. Private February 9, 1864 Mustered out with company on July 13, 1865. PA 183 F Fenton Thomas H. Private February 8, 1864 Discharged by General Order on June 5, 1865. PA 183 F Fitzgerald David Private February 8, 1864 Discharged by General Order on April 28, 1865. PA 183 F Finan John Private April 25, 1864 Deserted in April, 1864. PA 183 F George John Private February 8, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 F Glackins Henry Private March 25, 1862 Discharged on March 25, 1865 at expiration of term. PA 183 F Griffin Frank Private February 8, 1864 Deserted on February 10, 1864. PA 183 F Gilmore John Private April 25, 1864 Deserted on April 28, 1864. PA 183 F Hicks Alfred J. Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Hall Ezekiel Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Holt James Private February 8, 1864 Absent, in hospital, at muster out. PA 183 F Heaton Charles B. Private February 8, 1864 Deserted on June 1, 1864 - returned on April 1, 1865 - discharged by General Order on June 20, 1865. PA 183 F Hesson John Private February 8, 1864 Discharged on Surgeons certificate on March 21, 1865. PA 183 F Hibbs Stephen Private February 8, 1864 Killed in action on July 27, 1864. PA 183 F Hays Samuel Private February 8, 1864 Killed at North Anna River, Va. on May 25, 1864. PA 183 F Harberger Emanuel Private February 8, 1864 Died at Washington, D. C. on July 9, 1864, of wounds received in action. PA 183 F Hetrick Joseph Private February 8, 1864 Deserted on February 20, 1864. PA 183 F Jarton Joseph Private February 22, 1864 Absent, sick, at muster out. PA 183 F Johnson Samuel D. Private February 8, 1864 Absent, sick, at muster out. PA 183 F Jackson Charles C. Private February 8, 1864 Discharged on Surgeons certificate on March 5, 1865. PA 183 F Jackson William Private February 8, 1864 Deserted on February 10, 1864. PA 183 F Keiser Jesse Private February 8, 1864 Wounded at Cold Harbor, Va. on June 3, 1864 - absent, in hospital, at muster out. PA 183 F Klingler Charles P. Private February 8, 1864 Died near Sheppards Grove, Va. on February 29, 1864. PA 183 F Lynch Thomas Private February 8, 1864 Wounded at Cold Harbor, Va. on June 3, 1864 - transferred to 2d battalion, Veteran Reserve Corps - discharged by General Order on September 12, 1865. PA 183 F Lewis Thomas B. Private February 8, 1864 Discharged by General Order on May 15, 1865. PA 183 F Lewis Stanley F. Private February 8, 1864 Killed at North Anna River. Va. on May 25, 1864. PA 183 F Lord Samuel Private February 8, 1864 Died at Washington, D. C. on May 26, of wounds received at Spotsylvania Court House, Va. on May 12, 1864. PA 183 F Monagan Edward Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Miller William H. Private October 31, 1861 Absent, sick, at muster out. PA 183 F Matlack Timothy Private February 8, 1864 Killed at Totopotomoy, Va. on May 30, 1864 - buried in National Cemetery, Yorktown, sec. A, grave, 317. PA 183 F Mower Benjamin Private February 8, 1864 Deserted on June 18, 1864. PA 183 F Madden William Private April 25, 1864 Deserted on April 28, 1864. PA 183 F M'Connell William Private February 8, 1864 Discharged by General Order on May 16, 1865. PA 183 F M'Cool William D. Private February 8, 1864 Discharged by General Order on June 9, 1865. PA 183 F M'Dermott Patrick Private February 8, 1864 Discharged by General Order on May 26, 1865. PA 183 F M'Cabe Michael Private February 17, 1864 Missing in action at Reams Station, Va. on August 25, 1864. PA 183 F M'Mann Henry J. Private February 8, 1864 Deserted on July 1, 1865. PA 183 F Osborn John Private February 8, 1864 Deserted on February 12, 1864. PA 183 F Porter John A. Private February 8, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 F Price William Private February 8, 1864 Discharged by General Order on June 12, 1865. PA 183 F Porter William Private February 8, 1864 Discharged by General Order on May 31, 1865. PA 183 F Porter James Private February 8, 1864 Killed at Totopotomoy, Va. on May 30, 1864. PA 183 F Pennville Charles Private February 8, 1864 Deserted on February 12, 1864. PA 183 F Prescott John Private April 20, 1864 Deserted on April 24, 1864. PA 183 F Robinson James T. Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Rogers Elias T. Private February 8, 1864 Wounded at Cold Harbor, Va. on June 3, 1864 - discharged by General Order on May 13, 1865. PA 183 F Ryland Thomas Private February 8, 1864 Transferred to Veteran Reserve Corps on April 25, 1865. PA 183 F Rider John Private February 8, 1864 Deserted on February 22, 1864. PA 183 F Rambo John Private February 8, 1864 Deserted on February 22, 1864. PA 183 F Reynolds Charles Private April 20, 1864 Deserted on April 23, 1864. PA 183 F Sternman George W. Private February 8, 1864 Mustered out with company on July 13, 1865. PA 183 F Steinman Jacob C. Private March 30, 1864 Mustered out with company on July 13, 1865. PA 183 F Schoedler Albert Private February 8, 1864 Wounded at Totopotomoy, Va. on May 31, 1864 - absent, in hospital, at muster out. PA 183 F Sayers William P. Private October 31, 1861 Discharged on September 16, 1864 at expiration of term. PA 183 F Smith Henry Private October 31, 1861 Discharged on September 16, 1864 at expiration of term. PA 183 F Souders Joseph Private February 8, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 F Steele James R. Private February 8, 1864 Deserted on February 20, 1864. PA 183 F Smith Jackson Private November 14, 1864 Deserted on June 12, 1865. PA 183 F Semler Henry C. Private October 31, 1861 Never joined company. PA 183 F Taylor James Private February 8, 1864 Transferred to Company A in November, 1861. PA 183 F Thompson William B. Private March 6, 1862 Captured - died at Andersonville, Ga. - date unknown - burial record at Salisbury, N. C. on November 24, 1864. PA 183 F Wentz John Private March 27, 1864 Mustered out with company on July 13, 1865. PA 183 F WVeed William H. Private October 3, 1861 Discharged by special order on December 28, 1864. PA 183 F Wright Charles E. Private February 8, 1864 Discharged by General Order on May 26, 1865. PA 183 F Walters Samuel S. Private September 16, 1861 Discharged by General Order on August 19, 1865. PA 183 G Smith Joseph R. Captain January 22, 1864 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 G De Gour George W. Captain January 22, 1864 Promoted from Adjutant on August 8. 1864 - mustered out with company on July 13, 1865. PA 183 G Elliott George 1st Lt. September 18, 1861 Promoted from 1st Sergeant on December 13, 1864 to Captain of Company C on March 5, 1865. PA 183 G Loveaire Theodore 1st Lt. January 21, 1864 Promoted from Sergeant Major to 2d Lieut. on December 27, 1864 to 1st Lieut. on March 5, 1865 - mustered out with company on July 13, 1865. PA 183 G Keyser Eyre 2d Lt. January 23, 1864 Commissioned 1st Lt. on July 20, 1864 - not mustered - discharged on August 20, 1864, for wounds received in action. PA 183 G Donohue Michael F. 1st Sergeant August 10, 1861 Commissioned 2d Lt. on July 10, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 G M'Laughlin George Sergeant January 21, 1864 Promoted to Sergeant on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Farrell John A. Sergeant January 21, 1864 Promoted to Sergeant on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Henk John Sergeant August 10, 1861 Promoted to Sergeant on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Gordon Charles W. Sergeant January 21, 1864 Absent, sick, at muster out. PA 183 G Robinson W. W. Corporal January 31, 1864 Mustered out with company on July 13, 1865. PA 183 G Hoizer Henry S. Corporal February 16, 1864 Promoted to Corporal on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Richardson William Corporal February 21, 1864 Promoted to Corporal on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Rush Lewis Corporal September 28, 1863 Promoted to Corporal on September 1, 1864 - mustered out with company on July 13, 1865. PA 183 G Harris George Corporal January 21, 1864 Promoted to Corporal on June 20, 1864 - mustered out with company on July 13, 1865. PA 183 G Hunt James Corporal January 21, 1864 Promoted to Corporal on June 28, 1865 - mustered out with company on July 13, 1865. PA 183 G Rowland Benjamin Corporal February 15, 1864 Promoted to Corporal on July 8, 1865 - mustered out with company on July 13, 1865. PA 183 G Connelly William D. Corporal August 25, 1862 Wounded at Cold Harbor, Va. on June 3, 1864 - absent, in hospital, at muster out. PA 183 G Clark Joseph Corporal January 21, 1864 Captured at Cold Harbor and prisoner from June 3, to November 20, 1864 - discharged by General Order on June 8, 1865. PA 183 G Fredericks William H. Corporal January 21, 1864 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 G Dilks Joseph W. Musician January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Donahue William Musician March 28, 1862 Mustered out with company on July 13, 1865. PA 183 G Ayers George W. Private January 21, 1864 Captured - died at Salisbury, N. C. on November 6, 1864. PA 183 G Boyd John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Barr John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Brooks Edwin H. Private January 21, 1864 Wounded at Petersburg, Va. on March 25, 1865 - absent, in hospital, at muster out. PA 183 G Broadhurst Henry Private February 5, 1864 Discharged on Surgeons certificate on May 19, 1865. PA 183 G Bramen Oliver Private July 29, 1864 Discharged by General Order on May 30, 1865. PA 183 G Broadwater R. G Private January 21, 1864 Discharged by General Order on May 27, 1865. PA 183 G Bramen David Private January 21, 1864 Died at Philadelphia, Pa. on March 20, 1864. PA 183 G Bair George Private January 21, 1864 Captured - died at Andersonville, Georgia on October 26, 1864 - grave, 11,504. PA 183 G Comfort Stephen G. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Cardwell William J. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Conyers George S. Private January 21, 1864 Absent, sick, at muster out. PA 183 G Chambers Frank Private January 21, 1864 Absent, sick, at muster out. PA 183 G Crouse Robert P. Private January 21, 1864 Discharged by General Order on May 27, 1865. PA 183 G Connelly John Private January 21, 1864 Captured and prisoner from May 12, to December 13, 1864 - discharged by General Order on June 19, 1865. PA 183 G Conrad Joseph E. Private January 21, 1864 Transferred to Veteran Reserve Corps on April 16, 1865. PA 183 G Counsellor Elijah Private August 25, 1862 Transferred to Veteran Reserve Corps on May 24, 1865 - discharged by General Order on July 13, 1865. PA 183 G Clouser Adam Private January 21, 1864 Killed at Totopotomoy, Va. on May 31, 1864. PA 183 G Carlin James Private January 21, 1864 Deserted on January 25, 1864. PA 183 G Connelly Hugh Private February 6, 1865 Deserted on June 6, 1865. PA 183 G Dey John H. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Denachy Thomas Private January 21, 1864 Absent, sick, at muster out. PA 183 G DuComb Phil. N. G. Private January 21, 1864 Discharged on Surgeons certificate on April 20, 1865. PA 183 G Dickel George Private January 21, 1864 Transferred to Veteran Reserve Corps on April 16, 1865 - discharged by General Order on August 18, 1865. PA 183 G Derr George L. Private January 21, 1864 Killed at Petersburg, Va. on June 17, 1864. PA 183 G Doudle William Private January 21, 1864 Captured - died at Salisbury, N. C. on November 14, 1864 - burial record, November 5, 1864. PA 183 G Esher Linden B. Private August 10, 1861 Absent, in arrest, at muster out. PA 183 G Elkins Albert Private April 19, 1864 Captured - died at Salisbury, N. C. on January 8, 1865. PA 183 G Easterday Charles Private January 21, 1864 Deserted on April 4, 1865. PA 183 G Foster Henry Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Foley Richard Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Foulds Aaron Private February 6, 1864 Discharged on Surgeons certificate on October 30, 1864. PA 183 G Fisher William H. Private January 21, 1864 Discharged by General Order on June 30, 1865. PA 183 G Gretzinger John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Gibbons John H. Private January 21, 1864 Wounded at Todds Tavern, Va. on May 8, 1864 - absent, in hospital, at muster out. PA 183 G Gardener Lewis Private January 21, 1864 Wounded at Five Forks, Va. on April 1, 1865 - discharged by General Order on June 20, 1865. PA 183 G Gorman John J. Private January 21, 1864 Captured and prisoner from August 28, 1864, to April 5, 1865 - discharged by General Order on June 21, 1865. PA 183 G Garkins Edward W. Private February 6, 1865 Discharged by General Order on June 25, 1865. PA 183 G Groff Peter Private January 21, 1864 Transferred to 187th Company, 1st battalion, Veteran Reserve Corps on April 16, 1865 - discharged by General Order on July 31, 1865. PA 183 G Guinard Adolph Private January 21, 1864 Deserted on February 1, 1865. PA 183 G Hensler John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Higgins Joseph Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Hall Joseph W. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Hemphill Joseph R. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Hagerman Alfred Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Henderson William Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Hallewell George Private February 27, 1865 Mustered out with company on July 13, 1865. PA 183 G Hanmett Robert W. Private January 31, 1865 Mustered out with company on July 13, 1865. PA 183 G Henner Philip Private April 19, 1864 Absent, sick, at muster out. PA 183 G Hoeninger Frederick Private January 21, 1864 Died on May 30 - burial record. May 19, 1864 - of wounds received at Spotsylvania Court House, Va. on May 12, 1864 - buried in National Cemetery, Arlington. PA 183 G Hart James Private January 21, 1864 Died at Annapolis, Md. on November 28, 1864. PA 183 G Hughes William Private January 21, 1864 Deserted on February 1, 1864. PA 183 G Hughes John Private January 21, 1864 Deserted on February 16, 1864. PA 183 G Jordan William W. Private January 21, 1864 Absent, sick, at muster out. PA 183 G Johnson John C. Private January 21, 1864 Deserted on February 19, 1864. PA 183 G Kaye William W. Private January 21, 1864 Absent, sick, at muster out. PA 183 G Kappis Charles Private September 17, 1861 Discharged on November 5, 1864 at expiration of term. PA 183 G Kelly Thomas Private January 21, 1864 Discharged on Surgeons certificate on May 25, 1865. PA 183 G Keho Patrick Private January 21, 1864 Killed at Cold Harbor, Va. on June 3, 1864. PA 183 G Kane Daniel Private January 21, 1864 Deserted on February 6, 1864. PA 183 G Lewis John L. Private March 7, 1864 Mustered out with company on July 13, 1865. PA 183 G Lippencott Edmond Private January 21, 1864 Absent, sick, at muster out. PA 183 G Lyons Thomas Private January 21, 1864 Captured - died at Salisbury, N. C. on December 17, 1864. PA 183 G Lafferty William Private August 10, 1861 Deserted on June 1, 1865. PA 183 G Murray James Private February 5, 1864 Mustered out with company on July 13, 1865. PA 183 G Molony Daniel Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Merkle George Private August 10, 1861 Absent, in arrest, at muster out. PA 183 G Morris John Private January 21, 1864 Captured - died at Andersonville, Georgia on August 30, 1864 - grave, 7,333. PA 183 G M'Cullough Leon's Private June 15, 1864 Mustered out with company on July 13, 1865. PA 183 G M'Nulty Joseph Private January 21, 1864 Absent, sick, at muster out. PA 183 G M'Intosh Charles Private August 10, 1861 Captured - died at Andersonville, Ga. on December 13, 1864 - burial record. December 13, 1864, at Salisbury, N. C. PA 183 G Norton John Private January 21, 1864 Deserted on January 22, 1864. PA 183 G Ottey William T. Private August 10, 1861 Mustered out with company on July 13, 1865. PA 183 G O'Neil Joseph Private January 21, 1864 Discharged on Surgeons certificate on March 20, 1865. PA 183 G O'Diely Cornelius Private January 21, 1864 Deserted on January 25, 1864. PA 183 G Price George W. Private August 10, 1861 Mustered out with company on July 13, 1865. PA 183 G Patterson James Private January 21, 1864 Transferred to Veteran Reserve Corps on May 31, 1865 - discharged on Surgeons certificate on September 13, 1865. PA 183 G Page John H. Private January 21, 1864 Captured - died at Andersonville, Ga. on July 30, 1864 - burial record on June 27, 1864 - grave, 2,566. PA 183 G Queenan Joseph Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Quinn James A. Private January 21, 1864 Discharged by General Order on June 15, 1865. PA 183 G Rodgers Charles Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Riehl Frederick Private February 27, 1865 Mustered out with company on July 13, 1865. PA 183 G Ropple Conrad Private January 21, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - transferred to 16th Company, 2d battalion, Veteran Reserve Corps - discharged by General Order on September 24, 1865. PA 183 G Roussel William Private April 19, 1864 Discharged on Surgeons certificate on December 17, 1864. PA 183 G Roan Rufus B. Private January 21, 1864 Died on July 23, 1864 - burial record on August 1, 1864 - buried at City Point, Va. PA 183 G Sterling Benjamin Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G Shubert Charles Private August 10, 1861 Mustered out with company on July 13, 1865. PA 183 G Saul Franklin Private January 21, 1864 Discharged on Surgeons certificate on April 29, 1865. PA 183 G Statder Jacob Private August 10, 1861 Transferred to Veteran Reserve Corps on May 23, 1865. PA 183 G Smith John Private January 21, 1864 Deserted on January 29, 1864. PA 183 G Smith Andrew Private January 21, 1864 Deserted on July 20, 1864. PA 183 G Taylor John R. Private January 21, 1864 Discharged by General Order on June 12, 1865. PA 183 G Woodward M. C. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 G White Calvin E. Private February 7, 1865 Mustered out with company on July 13, 1865. PA 183 G Wilson Abraham Private January 21, 1864 Absent, sick, at muster out. PA 183 G Watters Valentine Private January 21, 1864 Deserted on February 5, 1864. PA 183 H Digman John Captain January 21, 1864 Captured at Deep Bottom, Va. on August 16, 1864 - died at Danville, Va. on December 21, 1864 - buried in National Cemetery, section B, division 4, grave, 118. PA 183 H M'Lean Robert Captain October 16, 1863 Promoted from 2d to 1st Lt. on December 24, 1864 to Captain on May 12, 1865 - absent, sick, at muster out. PA 183 H Elliott Francis M. 1st Lt. January 12, 1864 Discharged by special order on September 2, 1864 - re-enlisted on February 8, 1865 - promoted from Sergeant Major on June 12, 1865 - mustered out with company on July 13, 1865. PA 183 H Conroy James B. 2d Lt. January 21, 1864 Promoted from 1st Sergeant on December 27, 1864 - discharged on May 18, 1865. PA 183 H Stott Jacob S. 1st Sergeant January 21, 1864 Commissioned 2d Lieut. on July 10, 1865 - not mustered - absent, with leave, at muster out. PA 183 H Moore George W. Sergeant January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Pool William Sergeant January 21, 1864 Promoted from Corporal on April 1, 1865 - discharged by General Order on August 5, 1865. PA 183 H Edwards Charles H. Sergeant January 21, 1864 Promoted from Corporal on April 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Lukowitz Charles Sergeant April 13, 1864 Promoted from Corporal on April 1, 1865 - commissioned 2d Lt. Company E on July 10, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 H Hamilton Albert N. Sergeant September 19, 1862 Discharged by General Order on May 30, 1865. PA 183 H Sheak George A. Corporal January 21, 1864 Promoted to Corporal on April 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Baker George W. Corporal January 21, 1864 Promoted to Corporal on April 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Reiss John Corporal January 21, 1864 Promoted to Corporal on April 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Wills Charles G. Corporal March 14, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Platt Thomas H. Corporal January 21, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 H Myers David Corporal January 21, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 H M'Caigue Samuel Corporal January 21, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 H Smith George W. Corporal January 21, 1864 Captured at Cold Harbor and prisoner from June 3, 1864, to April 29, 1865 - discharged by General Order on June 8, 1865. PA 183 H Banfield William H. Corporal January 21, 1864 Died on August 28, 1864, of wounds received in action. PA 183 H Maitland James Corporal January 21, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 H Young Jacob Corporal January 21, 1864 Deserted on October 11, 1864. PA 183 H O'Brien John Corporal January 21, 1864 Transferred to U. S. Army - date unknown. PA 183 H Straub Joseph Musician January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Fullerton John Musician January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Apt George W. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Alexander John Private January 21, 1864 Died at York, Pa. on August 22, 1864. PA 183 H Burke Henry Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Brown James A. Private January 21, 1864 Discharged by General Order on June 5, 1865. PA 183 H Bride Robert A. Private January 21, 1864 Discharged on Surgeons certificate - date unknown. PA 183 H Belzer John Private January 21, 1864 Transferred to Company G, 7th Regiment, Veteran Reserve Corps - discharged by General Order on July 19, 1865. PA 183 H Brown Hugh Private January 21, 1864 Deserted on January 26, 1864. PA 183 H Campbell Simpson Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Coward Charles W. Private February 20, 1862 Discharged on March 8, 1865 at expiration of term. PA 183 H Carry John Private January 21, 1864 Died at Philadelphia, Pa. on August 28, 1864, of wounds received in action. PA 183 H Callahan Andrew Private January 21, 1864 Died of wounds received at Petersburg, Va. on March 25, 1865. PA 183 H Cawley James Private January 21, 1864 Deserted on February 7, 1864. PA 183 H Doolin Joseph Private January 21, 1864 Discharged by General Order on July 24, 1865. PA 183 H Dungan William G. Private January 21, 1864 Died at Washington, D. C. on August 25, 1864. PA 183 H Ewing George Private January 21, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - transferred to 2d battalion, Veteran Reserve Corps - discharged by General Order on September 12, 1865. PA 183 H Edlen Edward J. Private January 21, 1864 Died on May 18, of wounds received at Spotsylvania Court House, Va. on May 12, 1864. PA 183 H Fritz Charles Private January 21, 1864 Captured and prisoner from May 11, 1864, to May 11, 1865 - mustered out with company on July 13, 1865. PA 183 H Frenaye William G. Private January 21, 1864 Died at Philadelphia, Pa. on June 25, 1865. PA 183 H Gregory Richard Private April 9, 1864 Mustered out with company on July 13, 1865. PA 183 H Glass Andrew Private January 21, 1864 Killed at Totopotomoy, Va. on May 31, 1864 - buried in National Cemetery, Yorktown, sec. A, grave, 331. PA 183 H Hughes John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Hess William B. Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Huhn Abraham Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Hollingsworth William Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Huston Franklin Private January 21, 1864 Absent at muster out. PA 183 H Hocker Charles Private January 21, 1864 Captured and prisoner from May 11, 1864, to February 27, 1865 - discharged by General Order on June 6, 1865. PA 183 H Hacker George W. Private January 21, 1864 Captured on May 19, 1864 - discharged by General Order on June 15, 1865. PA 183 H Hannum Benjamin F. Private October 9, 1862 Discharged by General Order on June 12, 1865. PA 183 H Herman John Private April 12, 1864 Captured - died at Salisbury, N. C. on January 16, 1865. PA 183 H Hollingsworth Rob. Private January 21, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 H Jenkins Albert Private April 15, 1864 Discharged by General Order on May 16, 1865. PA 183 H Jeffries George W. Private September 29, 1862 Discharged by General Order on June 9, 1865. PA 183 H Jones William F. Private January 21, 1864 Discharged by General Order on September 25, 1865. PA 183 H Jacobs Richard Private September 3, 1862 Died on August 15, 1864, of wounds received in action. PA 183 H Johnson Joseph P. Private January 21, 1864 Died at Philadelphia, Pa. on October 2, 1864. PA 183 H Kane Thomas Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Kirkbride Frank H. Private January 21, 1864 Absent, sick, at muster out. PA 183 H Keely Robert G. Private January 21, 1864 Died on June 7, of wounds received at Cold Harbor, Virginia on June 3, 1864. PA 183 H Loder Charles Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Landes Stephen Private January 21, 1864 Deserted - returned - absent at muster out. PA 183 H Loveaire Theodore Private January 21, 1864 Promoted to Sergeant Major on January 21, 1864. PA 183 H Lannon Thomas Private January 21, 1864 Died at Washington, D. C. on August 12, 1864 - buried in Prospect Hill Cemetery, York, Pa. PA 183 H Morrison Charles Private April 12, 1864 Mustered out with company on July 13, 1865. PA 183 H Morrow William Private April 14, 1864 Mustered out with company on July 13, 1865. PA 183 H Melrose Robert F. Private January 21, 1864 Transferred to Veteran Reserve Corps - date unknown - discharged on Surgeons certificate on July 24, 1865. PA 183 H M'Veigh David Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H M'Williams Robert S. Private September 13, 1862 Discharged by General Order on May 25, 1865. PA 183 H M'Gurk Francis Private January 21, 1864 Discharged by General Order on June 25, 1865. PA 183 H Ottendorf Edward Private January 20, 1864 Mustered out with company on July 13, 1865. PA 183 H Ossler Charles C. Private January 21, 1864 Deserted on February 26, 1865. PA 183 H Palmer Albert Private January 21, 1864 Died on June 2, 1864, of wounds received in action. PA 183 H Potts Edward M. Private January 21, 1864 Captured - died at Andersonville, Georgia on August 28, 1864 - grave, 7,118. PA 183 H Pierce James B. Private January 21, 1864 Deserted on January 26, 1864. PA 183 H Robison Joseph Private January 21, 1864 Discharged by General Order on May 30, 1865. PA 183 H Ritterson Charles K. Private January 21, 1864 Died at Philadelphia, Pa. on March 10, 1865. PA 183 H Robison John Private January 21, 1864 Deserted on January 26, 1864. PA 183 H Rowe John Private January 21, 1865 Deserted on January 26, 1864. PA 183 H Smith Albert H. Private January 21, 1865 Mustered out with company on July 13, 1865. PA 183 H Sharkey John Private January 21, 1865 Mustered out with company on July 13, 1865. PA 183 H Snell William Private January 21, 1864 Absent, sick, at muster out. PA 183 H Simpson Robert Private April 16, 1864 Absent at muster out. PA 183 H Shearer Anthony W. Private August 25, 1862 Discharged by General Order on May 30, 1865. PA 183 H Sheetz Philip P. Private January 21, 1864 Discharged by General Order on June 5, 1865. PA 183 H Solomon Joseph Private August 10, 1861 Deserted - returned - discharged by General Order on June 12, 1865. PA 183 H Shute Eli Private Jan 21, 1864 Captured and prisoner from May 11, 1864, to March 31, 1865 - discharged by General Order on June 14, 1865. PA 183 H Steen Edward Private January 21, 1864 Died at Philadelphia, Pa. on February 23, 1864. PA 183 H Spense Robert M. Private January 21, 1864 Died at Chester, Pa. on November 18, 1864. PA 183 H Shearer William D. Private August 25, 1862 Transferred to Veteran Reserve Corps - date unknown. PA 183 H Thompson Charles R. Private April 15, 1864 Mustered out with company on July 13, 1865. PA 183 H Treviller Thomas C. Private August 28, 1862 Transferred to U. S. Navy - date unknown. PA 183 H Thompson Joseph S. Private January 21, 1864 Captured - died at Andersonville, Georgia on July 19, 1864 - grave, 3,571. PA 183 H Tinsley Benjamin F. Private January 21, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 H Vaughan Alonzo Private January 21, 1864 Killed at Petersburg, Va. on March 25, 1865. PA 183 H Winchester William Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Waldman John Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 H Williams Charles W. Private March 30, 1864 Discharged on Surgeons certificate on May 19, 1865. PA 183 H Williams Andrew J. Private January 21, 1864 Discharged by General Order on June 7, 1i865. PA 183 H Weible Frank Private September 11, 1862 Discharged by General Order on May 30, 1865. PA 183 H Wilson Samuel Private January 21, 1864 Deserted on February 12, 1864. PA 183 H Worrick Herman Private January 21, 1864 Deserted on February 4, 1864. PA 183 H Wilson James W. Private January 21, 1864 Deserted on January 26, 1864. PA 183 H Yuker Charles Private January 21, 1864 Mustered out with company on July 13, 1865. PA 183 I Freed James J. Captain March 8, 1864 Resigned on May 16, 1864. PA 183 I Lynch Michael B. 1st Lt. March 8, 1864 Commissioned Captain on May 16, 1864 - not mustered - absent, on detached service, at muster out. PA 183 I Pontzler William P. 2d Lt. March 8, 1864 Promoted from 1st Sergeant on December 31, 1864 - commissioned 1st Lt. on January 5, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 I M'Cullough John 2d Lt. February 8, 1864 Promoted from Sergeant of Company F on July 18, 1864 to Captain of Company F on August 8, 1864. PA 183 I Barr Michael F. 1st Sergeant March 8, 1864 Promoted from Corporal to Sergeant on January 1, 1865 to 1st Sergeant on July 1, 1865 - commissioned 2d Lt. on July 10, 1865 - not mustered - mustered out with company on July 13, 1865. PA 183 I Boutcher Cleme't B. Sergeant March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Francis Richard H. Sergeant March 8, 1864 Promoted from Corporal on March 24, 1865 - mustered out with company on July 13, 1865. PA 183 I O'Neil Patrick Sergeant March 8, 1864 Promoted from Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Young William H. Sergeant March 15, 1864 Promoted from Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Gray John Sergeant September 27, 1862 Discharged on March 1, 1865 at expiration of term. PA 183 I Pedrick Henry Sergeant March 8, 1864 Discharged on Surgeons Certificate on May 15, 1865. PA 183 I Hoot William Sergeant March 8, 1864 Discharged bv General Order on June 15, 1865. PA 183 I M'Gowan Edward L. Sergeant March 8, 1864 Transferred to Company A on January 1, 1865. PA 183 I Fitzpatrick William Corporal March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Williams John A. Corporal March 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Berryman Robert Corporal March 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Harrington John Corporal March 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Guyer Charles Corporal March 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I App George W. Corporal March 8, 1864 Promoted to Corporal on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 I Banner John Corporal March 8, 1864 Wounded at Cold Harbor, Va. on June 3, 1864 - absent at muster out. PA 183 I Arthur William H. Corporal March 8, 1864 Missing in action at Deep Bottom, Va. on August 16, 1864. PA 183 I Jenkins C. W. Corporal March 8, 1864 Killed at North Anna River, Va. on May 24, 1864. PA 183 I Rodgers John C. Corporal March 8, 1864 Killed at Spotsylvania Court House. Va. on May 12, 1864. PA 183 I Rhodes Nathaniel Corporal March 6, 1862 Killed at Deep Bottom, Va. on July 26, 1864. PA 183 I Matlack James Musician March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Schriver Francis R. Musician March 8, 1864 Discharged by special order on November 23, to date July 13, 1865. PA 183 I Austin Edward Private April 30, 1864 Mustered out with company on July 13, 1865. PA 183 I Austin Charles S. Private March 8, 1864 Killed at Reams Station, Va. on August 25, 1864. PA 183 I Browing Francis T. Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Bond Charles A. Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Brown John Private May 5, 1864 Absent, sick, at muster out. PA 183 I Bagshaw William Private March 8, 1864 Wounded at Petersburg, Va. on June 16, 1864 - absent, in hospital, at muster out. PA 183 I Barger William Private February 12, 1864 Absent, sick, at muster out. PA 183 I Brooks Henry Private October 25, 1861 Absent, sick, at muster out. PA 183 I Brady Owen Private October 25, 1861 Discharged on February 13, 1865, to date November 25, 1864 at expiration of term. PA 183 I Burkenshaw William Private March 8, 1864 Discharged by General Order on June 5, 1865. PA 183 I Bowlin Daniel Private March 8, 1864 Captured - died at Andersonville, Ga. on September 7, 1864 - grave, 8,075. PA 183 I Barret James F. Private March 8, 1864 Deserted on March 10, 1864. PA 183 I Conway Charles Private September 19, 1864 Absent, sick, at muster out. PA 183 I Carpenter Edgar Private February 11, 1864 Absent, sick, at muster out. PA 183 I Clair Frederick Private May 6, 1864 Absent, sick, at muster out. PA 183 I Conlon John Private May 6, 1864 Absent, sick, at muster out. PA 183 I Carfrey James W. Private August 10, 1861 Discharged on September 18, 1864 at expiration of term. PA 183 I Conner John Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Daly Daniel Private March 8, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 I Dever John Private March 8, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent, in hospital, at muster out. PA 183 I Durr Henry Private March 8, 1864 Transferred to Veteran Reserve Corps - date unknown. PA 183 I Dunn John Private March 8, 1864 Deserted on March 18, 1864. PA 183 I Duffield Lewis Private March 8, 1864 Deserted on June 30, 1865. PA 183 I Ford James Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Fagan Michael Private March 8, 1864 Discharged by General Order on June 12, 1865. PA 183 I Flynn Charles Private September 27, 1861 Missing in action at Wilderness, Va. on May 6, 1864. PA 183 I Fulce James O. Private March 8, 1864 Deserted on April 1, 1864. PA 183 I Guilfoy Peter Private March 8, 1864 Deserted on March 19, 1864 - returned - mustered out with company on July 13, 1865. PA 183 I Gibbons John Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Holmes Charles L. Private March 8, 1864 Mustered out with company on July 13. 1865. PA 183 I Hall Joseph W. Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Hippert Frederick Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Hughes Bernard J. Private March 8, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 I Hegler Lorenzo D. Private May 5, 1864 Died on August 13, 1864 - buried in Cypress Hill Cemetery, L. I., New York. PA 183 I Hart John Private October 25, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 I Holtz Robert Private March 8, 1864 Discharged on. Surgeons certificate on February 1, 1865. PA 183 I Haslam George W. Private March 8, 1864 Discharged by General Order on June 6, 1865. PA 183 I Holmes Edward F. Private September 9, 1862 Discharged by General Order on June 9, 1865. PA 183 I Hoyle Henry Private March 8, 1864 Transferred to Veteran Reserve Corps on January 16, 1865. PA 183 I Harvey Thomas Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Kroth Henry Private September 21, 1862 Captured - died at Richmond, Va. on January 5, 1864 - buried in National Cemetery. PA 183 I Kunzman Joseph Private March 8, 1864 Deserted on March 18, 1864. PA 183 I Kennedy John Private March 8, 1864 Deserted on March 26, 1864. PA 183 I Leonard William Private March 8, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 I Lamb John Private March 8, 1864 Transferred to 105th Company, 2d battalion, Veteran Reserve Corps on January 18, 1865 - discharged on Surgeons certificate on February 24, 1865. PA 183 I Lynch Lewis P. Private September 27, 1861 Absent, sick, at muster out. PA 183 I Lyons Francis Private March 8, 1864 Discharged by General Order on June 16, 1865. PA 183 I Lynch Anthony Private March 8, 1864 Transferred to 187th Company, 1st battalion, Veteran Reserve Corps - discharged by General Order on July 31, 1865. PA 183 I Lockhart George W. Private March 8, 1864 Transferred to 12th Regiment, Veteran Reserve Corps - discharged by General Order on August 2, 1865. PA 183 I Lewis Jacob Private March 8, 1864 Missing in action at Cold Harbor, Va. on June 3, 1864. PA 183 I Linton James Private March 7, 1864 Not on muster-out roll. PA 183 I Miller Joseph C. Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Mayhofer Jacob Private March 8, 1864 Absent, sick, at muster out. PA 183 I Murphy Thomas Private October 25, 1861 Absent, wounded, at muster out. PA 183 I Mitchell Richard Private dOctober 25, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 I Maguinty Thomas Private October 25, 1861 Missing in action at Wilderness, Va. on May 6, 1864. PA 183 I Maginiss Owen Private March 8, 1864 Drowned near Stevensburg, Va. on April 13, 1864. PA 183 I Marlow James Private March 8, 1864 Deserted on March 10, 1864. PA 183 I Marsden Theodore Private January 24, 1865 Not on muster-out roll. PA 183 I M'Clain Patrick Private April 27, 1864 Mustered out with company on July 13, 1865. PA 183 I M'Laughlin Samuel Private March 8, 1864 Discharged on Surgeons certificate on May 15, 1865. PA 183 I M'Minamin Patrick Private March 8, 1864 Discharged by General Order on June 6, 1865. PA 183 I M'Grath Michael Private April 14, 1864 Missing in action at Reams Station, Va. on August 25, 1864. PA 183 I M'Cann John Private October 25, 1861 Missing in action at Reams Station, Va. on August 25, 1864. PA 183 I M'Dermott Michael Private March 8, 1864 Deserted on March 17, 1864. PA 183 I M'Keever John Private March 8, 1864 Deserted on March 19, 1864. PA 183 I M'Connell Edward Private March 8, 1864 Deserted on May 20, 1864. PA 183 I M'Connell Charles Private AMarch 8, 1864 Deserted on March 20, 1864. PA 183 I Neinberg Albert Private October 25, 1861 Absent, sick, at muster out. PA 183 I Neely James M. Private March 8, 1864 Discharged by General Order on May 30, 1865. PA 183 I O'Dell Thomas Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Pero Augustus Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Peterson Thomas F. Private March 8, 1864 Deserted - returned - mustered out with company on July 13, 1865. PA 183 I Palmer John C. Private August 10, 1861 Absent, in arrest, at muster out. PA 183 I Ryan John Private May 6, 1864 Absent, sick, at muster out. PA 183 I Rizer Henry Private November 1, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 I Rizer Daniel W. Private February 1, 1862 Discharged on January 31, 1865 at expiration of term. PA 183 I Reeves John A. Private March 8, 1864 Died at Davids Island, N. Y. on August 17, 1864 - buried in Cypress Hill Cemetery, L. I., New York. PA 183 I Rowe John Private March 8, 1864 Deserted on March 21, 1864. PA 183 I Strang Edward Private January 31, 1865 Mustered out with company on July 13, 1865. PA 183 I Stewart Andrew J. Private March 8, 1864 Mustered out with company on July 13, 1865. PA 183 I Shields Thomas Private March 8, 1864 Captured at Reams Station, Va. on August 25, 1864 - absent, at Parole Camp, Annapolis, Md., at muster out. PA 183 I Sharp Jacob Private March 8, 1864 Wounded at Spotsylvania Court House, Va. on May 12, 1864 - absent at muster out. PA 183 I Spickey Augustus Private March 8, 1864 Absent, sick, at muster out. PA 183 I Sullivan John Private March 8, 1864 Absent, in arrest, at muster out. PA 183 I Snyder Jacob Private October 25, 1861 Discharged on September 26, 1864 at expiration of term. PA 183 I Shubert Charles Private August 10, 1861 Transferred to Company G on January 14, 1865. PA 183 I Schwartz Simon Private March 8, 1864 Missing in action at Petersburg, Va. on June 23, 1864. PA 183 I Stuart Robert Private March 8, 1864 Died at City Point on July 29, 1864. PA 183 I Sink David Private March 8, 1864 Discharged on September 12, to date July 13, 1865. PA 183 I Thompson George Private March 8, 1864 Killed at North Anna River, Va. on May 24, 1864. PA 183 I Wilson Robert Private April 25, 1864 Discharged on Surgeons certificate on May 16, 1865. PA 183 I Westameyer Abraham Private March 8, 1864 Died at Brattleboro, Vt. on August 2, 1864 - buried in Soldiers Cemetery. PA 183 I Walsh John Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Young Sanmuel Private March 8, 1864 Deserted on March 19, 1864. PA 183 I Young George Private March 8, 1864 Deserted on March 19, 1865. PA 183 I Young John Private February 20, 1864 Deserted on July 6, 1864. PA 183 K Hutt John H. Captain January 5, 1864 Killed at Spotsylvania Court House, Va. on May 12, 1864. PA 183 K Graham George J. Captain January 5, 1864 Promoted from 1st Lt. on December 4, 1864 - mustered out with company on July 13, 1865. PA 183 K M'Gowan Benjamin H. 1st Lt. January 13, 1864 Promoted from 1st Sergeant on February 12, 1865 - mustered out with company on July 13, 1865. PA 183 K Bartram George H. 2d Lt. January 5, 1864 Discharged on November 28, 1864. PA 183 K Peterman William R. 1st Sergeant January 5, 1864 Promoted to 1st Sergeant on July 1, 1865 - mustered out with company on July 13, 1865. PA 183 K Park James 1st Sergeant January 5, 1864 Promoted to Sergeant Major on June 12, 1865. PA 183 K Carpenter James Sergeant August 10, 1861 Promoted from private on December 1. 1864 - mustered out with company on July 13, 1865. PA 183 K Altevogt Herman Sergeant January 5, 1864 Promoted from Corporal on December 12, 1864 - mustered out with company on July 13, 1865. PA 183 K Warnick William Z. Sergeant January 5, 1864 Promoted from private on May 13, 1864 - wounded at North Anna River, Va. on May 23, 1864 - absent, in hospital, at muster out. PA 183 K Graham James M. Sergeant January 5, 1864 Discharged by General Order on August 1, 1865. PA 183 K DeMarbias Thomas E. Sergeant August 10, 1861 Discharged by special order on October 15, 1864. PA 183 K Cox William H. Sergeant January 5, 1864 Killed at Spotsylvania Court House., Va. on May 12, 1864. PA 183 K Larue John Sergeant Killed near Petersburg, Va. on July 16, 1864. PA 183 K Quicksall William Corporal January 5, 1864 Promoted to Corporal on May 1, 1864 - mustered out with company on July 13, 1865. PA 183 K Carpenter Charles F. Corporal August 10, 1861 Mustered out with company on July 13, 1865. PA 183 K Blair William Corporal January 5, 1864 Promoted to Corporal on April 1, 1864 - mustered out with company on July 13, 1865. PA 183 K Henderson Alexander Corporal January 5, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 K Sullivan William Corporal January 5, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 K Brown James Corporal January 5, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 K Brankin John J. Corporal January 5, 1864 Promoted to Corporal on June 1, 1865 - mustered out with company on July 13, 1865. PA 183 K Alsebrook Samuel Corporal April 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Barker Benard J. Corporal January 5, 1864 Discharged by General Order on June 6, 1865. PA 183 K Einwechter William Corporal January 5, 1864 Discharged on Surgeons certificate on April 6, 1865. PA 183 K Kelly Hugh Corporal September 28, 1864 Discharged by General Order on May 30, 1865. PA 183 K Hill Charles F. Corporal August 26, 1862 Captured and prisoner from June 22, 1864, to April 9, 1865 - discharged by General Order on June 16, 1865. PA 183 K Fordham Rich. H. Corporal October 25, 1861 Discharged on September 22, 1864 at expiration of term. PA 183 K Mills Ephraim C. Corporal January 5, 1864 Died of wounds received at North Anna River, Va. on May 24, 1864. PA 183 K Snyder Abram W. Corporal January 5, 1864 Died on April 14, of wounds received at Petersburg, Va. on March 25, 1865. PA 183 K Snyder John H. Musician January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Peterman Benjamin F. Musician January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Hoffman Harry A. Musician January 5, 1864 Promoted to Principal Musician - date unknown. PA 183 K Alexander Frank Private January 5, 1864 Discharged on August 31, to date on July 13, 1865. PA 183 K Allen Andrew Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Ashwood Benjamin W. Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Broadwater William J. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Blackshire Charles E. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Burgess Thomas Private January 5, 1864 Discharged by General Order on May 16, 1865. PA 183 K Barrett Thomas H. Private January 5, 1864 Deserted - returned - discharged by General Order on July 31, 1865. PA 183 K Boyle William Private June 24, 1864 Never joined company. PA 183 K Collins Thomas Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Cullen Edward Private March 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Cooper Robert M. Private January 5, 1864 Discharged on Surgeons certificate on February 5, 1865. PA 183 K Cathcart Aaron Private October 25, 1861 Discharged on September 24, 1864 at expiration of term. PA 183 K Campbell Townsend D. Private January 5, 1864 Promoted to Commissary Sergeant on January 1, 1865. PA 183 K Cresswell Isaac P. Private January 5, 1864 Captured - died on October 1, 1864. PA 183 K Carr Lawrence Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Dimond James A. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Edinger William Private January 5, 1864 Discharged by General Order on June 24, 1865. PA 183 K Eldridge William H. Private October 18, 1861 Discharged on October 6, 1864 at expiration of term. PA 183 K Evans William H. Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Fritzinger Grifflth Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Fay Thomas Private April 3, 1864 Discharged by General Order on July 1, 1865. PA 183 K Fell Thomas Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Fisher Charles Private Deserted - returned - discharged by special order on July 14, 1865. PA 183 K Godshall Samuel Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Goldstein Charles Private January 5, 1864 Died on July 29, of wounds received at Deep Bottom, Va. on July 27, 1864 - buried at City Point. PA 183 K Goodfellow Henry Private January 5, 1864 Captured - died at Salisbury, N. C. on November 8, 1864. PA 183 K Hardy John Private May 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Howe James Private April 7, 1864 Wounded in action in June, 1864 - absent, in hospital, at muster out. PA 183 K Hoover John H. Private January 5, 1864 Killed at Cold Harbor, Va on June 3, 1864. PA 183 K Jackson Henry Private January 5, 1864 Absent, in arrest, at muster out. PA 183 K Kendall William H. Private January 5, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 K Keenan John Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Lawson John Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Larue Levi Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Levering Samuel S. Private January 5, 1864 Discharged by General Order on June 24, 1865. PA 183 K Lane James Private January 5, 1864 Killed at Petersburg, Va. on June 16, 1864 - buried in Poplar Grove National Cemetery, div. D, sec. C, grave, 49. PA 183 K Leidy Adam C. Private January 5, 1864 Died on June 14, 1865. PA 183 K Long John Private January 5, 1864 Died at Philadelphia, Pa. on August 15, 1864. PA 183 K Mitchell Alexander T. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Miller Charles H. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Miller John R. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Morris De Witt C. Private August 10, 1861 Absent, at Parole Camp, at muster out. PA 183 K Mahon Bernard Private October 25, 1861 Captured at Petersburg, Va. on June 22, 1864 - discharged by General Order on June 16, 1865. PA 183 K Mitchell Thomas Private September 3, 1862 Discharged by General Order on May 30, 1865. PA 183 K Morton Elliott J. Private January 5, 1864 Discharged on Surgeons certificate on April 6, 1865. PA 183 K Moore Guy Private January 5, 1864 Died at Portsmouth Grove, Rhode Island on October 14, 1864. PA 183 K Morton Henry J. Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Mackey Thomas Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Moore James Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Muhr Charles B. Private January 5, 1864 Dishonorably discharged by special order on July 15, 1865. PA 183 K M'Intyre George Private August 9, 1862 Discharged by General Order on May 30, 1865. PA 183 K M'Canna Patrick Private January 5, 1864 Discharged by General Order on June 5, 1865. PA 183 K M'Mannemy Joseph Private January 5, 1864 Missing in action at Spotsylvania Court House, Va. on May 12, 1864. PA 183 K M'Knight Michael Private January 5, 1864 Discharged by General Order on July 31, 1865. PA 183 K M'Intyre Duncan Private January 5, 1864 Deserted on February 15, 1864. PA 183 K O'Byrne Edward Private January 5, 1864 Discharged by General Order on June 12, 185. PA 183 K Oliphant Charles Private March 1, 1862 Discharged on February 28, 1865 at expiration of term. PA 183 K Pippet Charles Private October 21, 1861 Discharged on Surgeons certificate on June 6, 1865. PA 183 K Richards John G Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Rest William M. Private March, 1862 Absent at muster out. PA 183 K Rice William C. Private January 5, 1864 Promoted to Hospital Steward on February 28, 1864. PA 183 K Shelly Patrick Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Seary Daniel Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Shutleworth Thomas Private January 5, 1864 Absent, with leave, at muster out. PA 183 K Snyder Benjamin F. Private January 5, 1864 Discharged by General Order on July 1, 1865. PA 183 K Smith William C. Private January 5, 1864 Discharged by General Order on June 14, 1865. PA 183 K Schultz Henry Private August 10, 1861 Deserted - returned - discharged on June 10, 1865 at expiration of term. PA 183 K Stewart James Private January 5, 1864 Discharged on Surgeons certificate on June 9, 1865. PA 183 K Smith John Private January 5, 1864 Discharged on Surgeons certificate on June 9, 1865. PA 183 K Sloan George W. Private March 4, 1862 Promoted to Sergeant Major on January 1, 1865. PA 183 K Smith William B. Private April 3, 1864 Transferred to 17th Company, 2d battalion, Veteran Reserve Corps on January 25, 1865. PA 183 K Smith John A. Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Smith George Private January 5, 1864 Deserted on February 15, 1864. PA 183 K Shelter Andrew Private September 24, 1864 Never joined company. PA 183 K Smith Arnch Private September 24, 1864 Never joined company. PA 183 K Thompson William Private January 5, 1864 Discharged on Surgeons certificate in August, 1864. PA 183 K Talbot Arthur J. Private March 24, 1864 Discharged by General Order on June 12, 1865. PA 183 K Umstead Arnold Private January 5, 1864 Absent, with leave, at muster out. PA 183 K Van Hart George E. Private January 5, 1864 Discharged by General Order on June 9, 1865. PA 183 K White John W. Private January 5, 1864 Mustered out with company on July 13, 1865. PA 183 K Walker Plumer E. Private January 5, 1864 Absent, sick, at muster out. PA 183 K Wood A. S. Private January 5, 1864 Absent, in arrest, at muster out. PA 183 K Worral William Private January 5, 1864 Captured - died at Andersonville, Ga. in October, 1864. PA 183 K Young John Private January 5, 1864 Promoted to Assistant Surgeon on April 16, 1865. PA 183 Unassigned Cook Thomas Private August 12, 1864 Not accounted for. PA 183 Unassigned Daily Harry W. Private January 16, 1864 Not accounted for. PA 183 Unassigned Hays James Private August 12, 1864 Not accounted for. PA 183 Unassigned Horner Isaac F. Private February 9, 1864 Captured and prisoner from July 22, 1864, to April 29, 1865 - discharged by General Order on July 12, 1865. PA 183 Unassigned Stewart John Private August 12, 1864 Not accounted for. PA 183 Unassigned Smith George W. Private February 17, 1864 Not accounted for. PA 183 Unassigned Thompson Edw. F. Private January 27, 1864 Discharged by General Order on July 20, 1865.
2019-04-19T13:26:29Z
http://php.scripts.psu.edu/~sam21/regiment2.php?reg=183&state=PA
It’s amazing what a mere switch-around in the order of two letters can do! Here we look at such a switch which seems to have had the effect of transferring a well-known line of American engines across the Pacific Ocean to a re-birth in Japan! My focus here will be on several little-known Japanese engines which were commercially produced in the early post-war period by a manufacturing concern which subsequently became very well-known and successful but was just starting out at the time in question. The range in question was marketed under the KO brand-name. Many present-day model engine aficionados are aware of the KO diesel models in various displacements which were successfully marketed by the company during the mid 1950’s through into the mid 1960’s. The company’s neat little 0.099 cuin. glow-plug model from the 1950’s is also quite familiar to many folks. Finally, the company remains well-known to present-day model R/C car racing enthusiasts through its highly-respected KO-PROPO range of R/C equipment. What is less well-known is the fact that the involvement of the KO manufacturers in the model trade went much further back in time, to the earliest post-war years in fact. The KO brand was actually among the first modelling trade-names to emerge from the post-WW2 ruins of the Japanese economy during the mid 1940’s. Very few of today’s model engine enthusiasts appear to be aware of the engines which were produced under the KO banner during that early period. This is a pity, because these engines were both very well made and unusually interesting from a design standpoint. This being the case, I felt that it was time that these powerplants finally emerged from the shadows into the full light of published scrutiny. That will be my task in this article. It’s an undeniable fact that several of the early KO designs which laid the foundations of the company’s later success in the model engine field bore a striking resemblance to certain contemporary American products, including the OK engines which bore the same letters in reverse! This situation appears to warrant a closer look! So I'll begin at the beginning by setting the scene. But before doing so, it’s both my duty and my pleasure to acknowledge the considerable assistance rendered to me by my late good mate David Owen of Woolongong, Australia. David was most generous in providing both comments and images of KO models which do not form part of my collection. Thanks, mate! I’d also like to express my heartfelt appreciation of the work put in by my late dear friend Ron Chernich. Despite the life-challenging situation with which he was dealing when this article was in preparation, Ron remained the same cheerful and supportive colleague that he had been all along. An inspiration to all of us - cheers, amigo mio!! In several previous articles about Japanese engines which may be found on Ron Chernich’s “Model Engine News” (MEN) web-site, we have described the early post-war rise of the Japanese model engine industry from the ashes of WW2. It is only necessary here to briefly recapitulate the main points of that story - readers who require more detail are directed to my summary chapter on the Hope range, which may still be accessed on MEN. Unknown to modellers in other countries, a thriving power modelling scene had existed in pre-war Japan, with a number of commercial manufacturers such as O.S. emerging during the 1930’s years to meet the consequent domestic demand for model powerplants. A few of these pre-war engine manufacturers, including Shigeo Ogawa of O.S. fame, resumed model engine manufacturing immediately following the conclusion of WW2, taking advantage of the windfall marketing opportunity represented by the very large and well-funded American forces of occupation which arrived in Japan following that country’s surrender to the Allies in August 1945. It wasn’t long before these pioneering firms were joined by other would-be Japanese engine manufacturers. Consequently, within a few years of the cessation of hostilities an amazing diversity of model engine production was taking place in Japan. In addition to O.S., other names such as Mamiya, TOP, Hope, Haru, Boxer, Fuji and Enya immediately come to mind, and there were others which for the most part are now more or less forgotten. The manufacturing standards to which many of these engines were produced undoubtedly bore comparison with those prevailing elsewhere, a fact which took a remarkably long time to penetrate the somewhat elitist consciousness of the rest of the modelling world. Hence for the most part this early post-war activity went unnoticed and unreported outside of Japan. However, the fact that the KO model engine range actually got its start in the late 1940’s with a line of spark ignition and glow-plug motors seems to be far less widely-known. As far as I’m aware, these early models have never previously been described in the English-language modelling media because their production preceded the time (c. 1954) when the products of the Japanese model engine industry became subject to ongoing scrutiny by contemporary English-language commentators. In addition, they are very rare indeed outside their native Japan, apparently being far from common even there. The KO model engines were manufactured in Tokyo, Japan. The range was the brainchild of the Kondo brothers, one of whom was named Jiro. I have been unable to confirm the name of the other brother. The letters KO apparently stand for Kondo Otoko, an abbreviated Japanese rendition of Kondo Brothers. However, the official company name was registered as Kondo Kagaku Co. Ltd., which translates to Kondo Scientific Co. Ltd. Reports from Japan indicate that Jiro Kondo was the company leader and chief designer of their products. Information obtained from a web search reveals that the Kondo brothers first entered the model industry immediately following the conclusion of WW2 - in fact, they are still viewed in Japan as pioneers of that industry. It’s actually fascinating to note the parallels between their entry into the model market and that of the Electronic Developments (E.D.) company in far-distant England. Like E.D., the KO company arose quite literally out of the ashes of war. Moreover, and again like E.D., their initial focus was on the production of radio control equipment for model aircraft rather than model engines. It appears that Jiro Kondo had been considering the question of radio control for models even while WW2 was still raging - indeed, it seems likely that he had been somehow involved with radio technology during the war, although we don’t know this for sure. However, such an involvement would go far towards explaining the confirmed fact that before the end of 1945 (only four months after the Japanese surrender) he had produced his first commercial R/C set for model aircraft use, thus beating E.D. into production by a considerable period of time. Although the original KO R/C equipment would be considered ultra-crude by today’s standards, it was actually extremely high-tech in the context of its times. Having developed their new state-of-the-art equipment into a commercial form, the Kondo brothers naturally sought a suitable stage upon which to demonstrate their technical capabilities to potential buyers. It was this desire which motivated Jiro Kondo to undertake the necessary promotion and organizational steps to establish the first major hobby show in Japan. The resulting event still continues to this day in the guise of the annual Tokyo Hobby Show. Quite a testament to the energy and far-sightedness of Jiro Kondo! Thanks in part to initiatives such as the Tokyo show, the new company was soon well established as a significant player in the emerging post-war Japanese model industry. Given the fact that their initial success was founded upon their R/C equipment, it’s intriguing to note that the brothers were soon attracted to the then-burgeoning field of control-line model aircraft. This was most likely prompted at least in part by their residence in Tokyo, where suitable open areas for free flight and R/C flying were presumably in short supply. Control line with its greatly reduced space requirements must have appeared as an attractive alternative. The attention of the two brothers quickly became focused on the popular control-line speed events, for which contests and testing sessions were held regularly in a public square fronting the Imperial Palace in downtown Tokyo. They were to go on to become highly successful competitors in this technically-challenging field, establishing a number of Japanese records during the 1950’s. Naturally, the engine is an extremely important element of any control-line speed model. It seems to have been this interest which first led the Kondo brothers to give serious consideration to the engines which they were using. The early post-war Tokyo contests attracted many competitors from among the predominantly American forces of occupation. Consequently, these events must have given the Kondo brothers and their Japanese competitors ample opportunity to examine engines from both domestic and American manufacturers. They appear to have joined other Tokyo manufacturers such as Hope in forming the opinion that they themselves might be able to improve upon some of these designs. The business of Kondo Kagaku Co. Ltd. was well-established as of 1948 when the brothers appear to have decided to enter the field of model engine manufacture. This gave them several significant advantages over many of their emerging competitors in the model engine field - they had already developed a high level of visibility along with a wide range of useful contacts within the industry; they had a thriving business line to fall back on if their model engine venture failed; and they had well-established production facilities along with some accumulated capital upon which to draw to set up their new product line. Given the above background, it should come as no surprise to learn that one of the early KO creations was a 10 cc (.61 cuin.) racing engine which was clearly designed specifically for control line speed flying. Let’s begin by taking a necessarily brief look at this engine………. Fortunately, this image places us in a position to offer a few comments. The KO 61 featured the usual contemporary “racing” mixture of twin ball-races, bolt-on front and rear covers, disc rear rotary valve (RRV) induction and cross-flow loop scavenging, although it was more or less unique among large racing engines in using a blind-bored cylinder with integral cooling fins. If it followed the design of its contemporary companions in the range, as seems likely, it would also have used a lapped cast-iron piston, a feature which was shared by several other Japanese racing engines of the period. It’s apparent from the illustration that the KO 61 used die-cast components throughout. Viewed in a Western context, this would normally be taken to indicate that the engine was intended for series production. However, this is not necessarily the case in a Japanese context. Japanese manufacturers were extremely comfortable with die-casting by this time, having employed the technology quite widely even before WW2. The scale of production was of lesser importance to them - what counted was their perception that die-casting was a logical method of producing high-quality castings, particularly those with some intricacy involved. Hence the technique was widely used by Japanese manufacturers at all scales of production. The use of die-casting thus provides no secure evidence regarding the scale of production of a given Japanese engine. Nonetheless, the scarcity of surviving examples of the KO 61 even in Japan seems to imply that it was never manufactured in significant quantities. It may in fact have been more of a “manufacturer’s statement” than anything else. It must surely have a strong claim to being the Holy Grail for collectors of early post-war Japanese racing engines! The interest of the Kondo brothers was clearly not confined to the racing engine sphere - they intended to join their contemporaries who were trying to develop a viable business out of model engine manufacture. Mass sales of their .61 cuin. racing engine could scarcely have been a realistic expectation - rather, that model was probably intended to do no more than draw attention to their technical capabilities. To establish their new model engine line on a solid economic footing, they would have to offer engines which might be expected to sell in quantity at an economically rational price. This in turn required the development of designs which were tailored to the consumer market as it then existed, both in terms of technical specification and displacement. The Kondo brothers proceeded to do just this, developing general-purpose engines in several of the more popular displacement classes under the KO trade-name. As mentioned earlier, a major factor driving the post-war explosion of Japanese manufacturing both in the model engine and other fields was the very large market represented by the predominantly American forces of occupation. Every American forces base in Japan had its own hobby shop, and these retail outlets were officially encouraged to offer Japanese-made goods to assist in the economic reconstruction of the country. A number of ex-servicemen of my personal acquaintance recalled patronizing these shops and buying Japanese engines and other modelling goods there - an example is illustrated here. I obtained this Enya 29 Red Head from its original owner - an American ex-serviceman who had bought it new while on service in Japan in the early 1950's. A number of strategies were employed to present Japanese products in a way that would commend itself to potential buyers from overseas. One such strategy was the widespread application of Anglicised names to the products in question. Many of the names applied to post-war Japanese engines certainly reflect this trend, as does the more or less universal abandonment of Japanese ciphers on the engines themselves. Another strategy that might logically be expected to have had some attraction was the adoption of American design architecture for Japanese engines in order to give them a comfortable air of “familiarity” to overseas buyers. An important consideration in this regard was doubtless the fact that American goods at the time were (often quite unjustifiably) seen by the Japanese public as somehow superior to their Japanese equivalents. Hence an “American” appearance might be expected to have its attractions for domestic consumers also. However, this particular strategy was rarely pursued by Japanese manufacturers during the early post-war period. The Kondo brothers were noteworthy exceptions to this general statement, clearly seeing some value in pursuing an American-influenced architectural strategy. There’s no question that their early KO engines bore a striking and surely more than coincidental resemblance to several contemporary American designs. To illustrate this point, we can do no better than present the first of the models to be discussed in detail in this article - the KO 29. The somewhat sparse information that is available from Japanese sources indicates that this engine was initially offered for sale in 1948 as a spark-ignition model, being subsequently adapted with little change to glow-plug operation in late 1948 or early 1949 when it had become clear that the future lay with glow-plug ignition. It’s also possible that the spark ignition version was offered for a time concurrently with the glow-plug model as an option. I'm extremely fortunate in being able to describe this engine in detail thanks to having a very fine original example of the glow-plug model on hand. This is actually the only example of this relatively rare engine that I’ve personally ever encountered in the metal. On first seeing this motor at arm’s length, one’s immediate thought is that it must be a hitherto-undocumented or owner-modified version of the well-known OK 29 from America! It’s only when you look closely enough to read the identification on the side of the crankcase that you learn that the letters of its name are reversed and it is in fact a KO product. It would appear logical to assume that the KO 29 was intended to be manufactured in quantity, since all castings were produced by the die-casting process. The creation of the necessary dies would have added considerably to the required start-up investment. As noted earlier, the previous success of the company in other manufacturing fields would have done much to generate the necessary capital. However, it’s important to remember the earlier comment that die-casting was used by Japanese manufacturers at a wide range of production scales. A side-by-side comparison of the KO 29 with a 1950 Mohawk Chief or its almost identical 1948 OK Hothead predecessor from the early post-war period soon clarifies both the points of direct similarity (of which there are many) as well as the differences that give the KO engine its own distinct personality. Although there are a fair number of such differences, they are mostly in the details. Hence an objective comparison leaves one in no doubt that the degree of design similarity between the two cannot be entirely coincidental. This leads us to the chicken-and-egg question of who copied whom?!? Viewing the matter objectively, there can be little question that the original design influence came from OK in America rather than the other way round. The basic design of the OK Hothead (OK’s first glow-plug .29 from 1948) originated in 1946 with OK’s first .29 cuin. model, the original B29 spark ignition engine. There’s no evidence whatsoever that the Kondo brothers were involved with model engine production before that date - as noted earlier, their initial preoccupation was with the production of R/C equipment. When coupled with the apparent absence of any opportunity for OK designer Charles Brebeck Sr. to become familiar with Japanese model engine designs prior to 1946, this makes it appear almost certain that this was a case of the Kondo brothers being influenced by an existing OK design rather than the other way round. As active competitors themselves, they would doubtless have had ample opportunity to examine such engines in the hands of American modellers stationed in Japan. It seems logical to follow up the above statements by listing the points of similarity which give rise to the view that this was a case of direct design influence. Probably the most significant shared feature is the use of a steel cylinder having integrally-turned cooling fins and a blind bore, features which the KO 29 shared with the companion .61 cuin. model described earlier. This cylinder is attached to the crankcase in both KO and OK models by two fasteners located fore and aft at the cylinder base, thus eliminating any hold-down stresses in the working cylinder walls. The two fastening systems are somewhat different (see below), but the basic arrangement is identical. Both engines use a flat-topped lapped cast iron piston with a cut-away milled into the crown on the transfer side in lieu of an upstanding baffle. The transfer port is set further down the cylinder wall to maintain a reasonable blow-down period, allowing the piston cut-away to act in the same manner as an upstanding baffle by directing incoming transfer gas upwards towards the top of the cylinder bore. The resulting combustion chamber shape at top dead centre is less than ideal due to the creation of a pocket of mixture located well away from the centrally-positioned plug. This will tend to delay the full involvement of the fresh charge in the combustion process. However, the use of a blind bore more or less precludes the use of an upstanding baffle of any height because of the difficulty in forming the underside of the head into a suitable shape to accommodate the baffle. In both designs, the exhaust stack is located on the left-hand side of the engine (looking forward in the direction of flight) with the single bypass passage on the opposite (right hand) side. The main bearing housing in both motors is cast integral with the crankcase, being equipped with a bronze bushing. Crankshaft front rotary valve (FRV) induction is employed in both cases, with a relatively tall forward-raked intake venturi having its open end chamfered at a sharp forward angle to catch the slipstream to best advantage. The engine bearers are located with their mounting surfaces on the axial centre line of the crankshaft in both instances. The same basic needle valve design is used on both models, while the three-screw backplates and gold-anodized back tanks are very similar indeed. Even the gold-anodized thimble which covers the timer location f or the spark-ignition versions is more or less identical in both cases. Finally, the prop mounting system is basically the same, with the front of the shaft being drilled and tapped to accept a prop mounting bolt, along with the prop driver being keyed to the shaft using flats milled into the front of the shaft for that purpose. In fact, so far we seem to be describing two very close relatives indeed!! This being the case, it’s worth digressing for a moment to dispel the widely-held fallacy that Japanese model engine designers were merely talented imitators who got off to such a quick start following WW2 by basically copying the designs of others. The truth is that the degree of direct American design influence exhibited in the KO 29 was actually highly unusual among Japanese model engine designers at the time in question. The reader is reminded of our earlier comment regarding the extent to which model engine design and manufacture had progressed in Japan prior to the outbreak of WW2 (in December 1941 as far as Japan was concerned). This movement had developed more or less independently from any significant influence from America or elsewhere, the result being the evolution of an identifiable Japanese “house style” in which the emphasis was very much on function rather than form. Consequently, the majority of Japanese engines from the pre-war and early post-war periods differed quite markedly from their American contemporaries in that they reflected a minimalist design philosophy under which mechanical objects were designed strictly to do their job, with no features included beyond those required to achieve that goal. The resulting engines were quite distinct in character from their American counterparts, which generally incorporated considerations of both function and styling into their designs while also tending to be more heavily engineered. The point here is that the early KO engines stand apart from the general run of Japanese model engines of the period in terms of the degree to which they openly display design influence from across the Pacific Ocean. There seems to be little doubt that this was a conscious decision on the part of the Kondo brothers, the logical conclusion being that they adopted this approach quite deliberately in order to add an “International” cachet to their products, thus notionally increasing their attractiveness to the “imported” American market. The really interesting thing is that they were almost alone in taking this approach, at least at the time in question. In summary, there seems to be little doubt that the design of the KO 29 was strongly influenced by that of the contemporary OK 29 model and that the resulting similarities were adopted quite consciously for the reasons stated above. No doubt the Kondo brothers would have had ample opportunity to examine representative examples of the OK engines in the hands of American modellers, possibly even being able to acquire one themselves through trading or modelling contacts. However, it would be very surprising indeed if they had not evolved some ideas of their own to contribute to the design of their own product. Let’s now look at the differences which confirm that they were indeed thinking independently even while designing what was clearly intended to be an OK look-alike. The most immediately obvious departures are the differing profiles of the cooling fins and exhaust stacks. The fins on the OK are of equal diameter, while those of the KO are progressively reduced in diameter at the top, giving the engine a rather attractive “beehive” look which mirrors the similar profile given to the cooling fins on the KO 61 model noted earlier. The exhaust stack on the OK is more or less rectangular, while that on the KO has a streamlined aerofoil section. Overall, it must be said that the styling of the KO’s cylinder down to port level is considerably more visually elegant than that of the OK. Of course, both of these differences are purely cosmetic. The first real departure in the engineering design of the two motors is to be found in the cylinder hold-down system. As noted previously, the cylinders of both engines are held down on the case by two screws arranged fore and aft and acting upon a flange at the base of the cylinder. This is a good system insofar as it relieves the cylinder walls of any hold-down stresses. However, the manner in which the screws are actually deployed is very different on the two models. In my earlier article on the OK Cub diesels, still to be found on the MEN site, I noted that OK designer Charles Brebeck Sr. was very much concerned with the reduction of shock loadings on the working components arising from ignition of the fuel mixture at (or slightly before) top dead centre. In his original .29 cuin spark ignition and glow-plug designs, he dealt with this concern by arranging for the cylinders to be held down by what amounted to a pair of spring steel clamps which were attached to the crankcase casting by screws in the fore and aft locations. When the screws were tightened, these clamps bore at their inner ends against a flange at the base of the cylinder, thus holding it down. A thick and rather soft gasket was used beneath this flange, building a measure of “give” into the hold-down system. When the mixture fired in the combustion chamber just before top dead centre, the cylinder was free to rise microscopically against the hold-down clamps, thus absorbing some of the developing energy in the system at a time when that energy could not yet be used to drive the piston. This energy was not lost - rather, it was stored in the strained hold-down system as opposed to the more usual fate of being stored through straining of the working components. As the piston commenced its power stroke and the shock loading condition passed, the system returned to its normal state, releasing its absorbed energy back into the power train in the process. Regardless of the reason, the KO 29 featured a far more conventional cylinder hold-down system using two screws acting directly upon the cylinder. The one unusual aspect of the KO set-up was the fact that the two screws were inserted upwards through two holes drilled in a pair of lugs cast fore and aft into the crankcase for that purpose. The two screws mated with threaded holes in the relatively thick lower cylinder flange. It must be admitted that this configuration made getting a screwdriver onto the hold-down screws rather more of a chore than it would otherwise be! However, it is very neat and unobtrusive, contributing to the cleaner and more elegant lines of the KO product by comparison with its OK counterpart. It’s worth noting that the previously-mentioned KO 61 racing engine used four screws deployed from below in a similar manner. In engineering terms, this system achieved one objective of the OK set-up - it eliminated hold-down stresses in the cylinder walls along with the consequent potential for distortion of the bore. However, it incorporated no provision for the absorption of stress generated during the ignition sequence at top dead centre. My own view of the matter is that the Kondo brothers probably understood the thinking behind the Brebeck system perfectly well but did not see any practical advantages in its use. After all, model engines had been built for years without such provisions, and most of them held up perfectly well in service! In my considered opinion, this was almost certainly a case of the designers reverting to the prevailing Japanese design philosophy that if a feature did not contribute materially to the functioning of the engine, it was considered redundant and could therefore be dispensed with. The Kondo brothers clearly recognized this problem, hence adopting a different approach in their own model. This took the form of a relatively thick alloy prop driver with a square central aperture which engaged with a square “box” section of shaft milled into it at the front. This system is far less prone to wear and eventual stripping than the single flat system, since there are four locking surfaces rather than one. The greater depth of the flats also reduces the tendency of the system to wear over time. I would have to rate the KO design as considerably superior to that used by OK. One rather odd point which must be mentioned here is the very coarse thread used for the KO’s prop mounting bolt. I elected to make a new bolt for testing purposes to save wear and tear on the original, which looked a bit “experienced”. After unsuccessfully trying everything I knew in the way of metric measurements, I eventually resorted to Imperial measurements. To my complete surprise, the thread proved to be a very British 3/16-24 Whitworth! There’s no doubt at all about this - a tap of that size fits perfectly in the female thread inside the shaft, and the corresponding die is a very close fit on the bolt. My new bolt made with that die is a perfect match. The use of this very un-Japanese thread is one of the real mysteries associated with this engine. It presumably reflects the fact that both tools and materials were in very short supply in early post-war Japan. Manufacturers were forced to improvise, using whatever tools and materials they could scrounge. Japan had of course been an active ally of Great Britain during WW1, besides which British engineering had played a major role in the development of Japanese transportation infrastructure during the late nineteenth and early twentieth centuries. There had thus been ample opportunity for British-specification tools to find their way into the Japanese workplace. Returning to our KO versus OK comparison, the two engineering design changes discussed so far indicate that although they were definitely “copying” an existing American design, the Kondo brothers were by no means doing so slavishly. Whenever they found a feature that was either redundant (in their view anyway) or failed to meet what they considered to be the required engineering standard, they changed it. It’s actually a tribute to the original design by Charles Brebeck that they found so little to change!! Overall, it would appear that the objective of the Kondo brothers in designing this engine was to produce a unit which retained the OK “look” that might hold out some inducement to many of their potential customers, while dealing with what they saw as a few design redundancies or shortcomings. At the same time, they took some steps to improve the aesthetic appeal of the engine. The balance of the changes to be documented here all fall into the latter category and may be dealt with very quickly. The KO 29 featured a pair of stiffening gussets on the upper surfaces of the mounting lugs, one on each side. These were absent on the OK model. It would appear logical to deduce from this that the KO designers may have suspected a weakness in this area, but in fact the lugs are quite substantial in themselves while the size of the gussets is such that they would contribute little to the structural integrity of the engine. They were probably included for customer reassurance more than anything else! The web which appears on the OK between the intake venturi and the main crankcase is absent on the KO. This omission was forced upon the KO designer by the need to allow access to the front cylinder hold-down screw. The web would in fact contribute to the ability of the intake to withstand a crash impact and would likely have been included if the screw arrangement had permitted this. However, the absence of the web once again represents an asset in terms of the overall visual elegance of the KO design. Apart from the above, virtually the only other visible difference is the fact that the KO fuel tank lacks the filler cap which appears on the OK model. The filler hole size confirms that such a cap was never present. Otherwise, the tanks are essentially identical. So much for what can be seen on the outside. I haven’t ventured to disturb my example of the KO 29 since a tentative probing has revealed that both the seals have become “permanent” with age and use and would have to be broken, likely with damage to the sealing gaskets. In any case, the engine is in perfect running condition and does not appear to require any internal servicing. Dismantling might reveal further departures from the OK design, but for now the above description will have to suffice. These figures provide further evidence of independent thinking on the part of the KO designers. They clearly wanted to improve the torque potential of their engine by lengthening the stroke, reducing the bore as necessary. More significantly, they built their model right up to the 5 cc limit allowed by the Japanese equivalent of Class B (and also in effect in Europe). The OK engine would of course be eligible for that class, but the KO had the very slightly larger displacement and longer stroke which could give it an edge against any OK opposition which might appear in Japanese contests. It’s an entirely rational assumption that making a good showing against American opposition in Japanese contests would be seen at the time by Japanese engine manufacturers as an important goal for a variety of reasons. This observation is extremely illuminating in one other respect. It indicates pretty conclusively that the Kondo brothers were not looking at export sales to the USA, at least at the time in question. They must surely have known that they were producing an engine that would be eligible for Japanese contests but would exceed the American Class B regulations. This would only become an issue if the engine were to be marketed in the USA, the clear inference being that the designers had no such expectations at this early stage of the company’s existence. If export sales had come into the picture at a later date, it would have been a simple matter to reduce the bore from 19.20 mm to 19.05 mm to yield an American-legal displacement of 4.90 cc (0.299 cuin). The net result of all of the above machinations was the production of a somewhat more elegant but still clearly identifiable OK spin-off. If one had to pick the more aesthetically pleasing of the two, most people would undoubtedly pick the KO. Moreover, the quality of construction is first class - despite the fact that the illustrated example has clearly seen a fair bit of use, all fits remain excellent. In terms of quality, the KO will easily withstand comparison with its OK progenitor. Fair enough, but how do the two designs compare in performance terms? That’s a question that I will have to answer at some point in the future when more time becomes available. For now, I can only say that an obejctive review of the functional designs of the two models leads me to expect very similar levels of performance from both, with perhaps the edge going to the KO in terms of torque development. During the period under discussion, the Kondo brothers also manufactured a .19 cuin. model which was briefly produced as a spark ignition model before being converted to glow-plug ignition (or was perhaps offered concurrently in spark ignition form as an option). While this engine bore a certain family resemblance to its larger sibling, it displayed very different design influences as well as some more advanced thinking in engineering terms. Here we must turn our attention away from the OK design which clearly influenced the KO 29 previously described, looking instead to the Ohlsson & Rice (O&R) range for our source of design inspiration. Given the fledgling state of the Kondo brothers’ engine production business at this time as well as the marked design differences between the two models, it seems unlikely that the KO 29 and 19 designs were developed concurrently - resource considerations would appear to argue against that scenario. The evidence to be discussed below suggests that the design of the .19 model was developed immediately following that of the .29 described earlier. There are certainly a number of similarities which keep the styling of the smaller engine within the early post-war KO “family”. However, there is also evidence of some progress in the designers’ understanding of certain aspects of model engine design, especially in relation to the issue of efficient combustion. It is this factor which seems to suggest that the design of the KO 19 was most likely developed after that of the 29 and .61 models, probably in late 1948 or even early 1949. However, I freely acknowledge that this is very far from certain at the present time. What does appear certain is that the designers still wished to create a unit that possessed a certain “International” cachet in design terms which might attract both domestic customers and temporary residents from overseas. In the case of the 29 model, they had taken the popular OK 29 design as their inspiration, but at this time OK did not have a .19 cuin. model on the market for them to emulate. This left them with two choices - they could either produce a scaled-down version of the larger KO model, or they could find a different American .19 cuin. model to take as their starting point. As it happened, just such a model was in existence at the time in question. This was the very popular O&R 19, which had been re-introduced in its pre-war sideport spark ignition form in 1946 and refined into an FRV version in late 1948 in both spark and glow plug versions, having been preceded by an FRV version of the very similar .23 cuin. model in June 1948. The Kondo brothers clearly elected to follow the second of the above options by taking the FRV version of the O&R 19 (or perhaps the slightly earlier 23) as their basic design inspiration. As with the OK 29 model, they would doubtless have had ample opportunity to examine examples of this very popular design in the hands of American service personnel. But it didn’t stop there! As in the case of the .29 cuin. model, the designers were not content merely to imitate. Instead, they re-evaluated the entire O&R design, making changes as they saw fit on the basis of their own evaluation. Moreover, by this time their understanding of certain aspects of model engine design had clearly evolved. The resulting engine displayed obvious evidence of its O&R design origins but nevertheless embodied a considerable measure of independent thinking - far more so than with the KO 29 model. Once again, the apparent intent to engage in quantity production was underscored by the fact that all of the cast alloy components were produced by die-casting. I'm again fortunate in having a fine example of the glow-plug version of this relatively rare engine on hand for study purposes. As with the KO 29 model, it seems best to begin by pointing out the similarities which lead to the inescapable conclusion that the KO 19 was inspired by the design of the O&R engines. These are not hard to spot! To begin with, both engines use steel cylinders with integral cooling fins and an alloy cylinder head. The cylinder is attached at its base in both cases, thereby once more freeing the working cylinder walls from hold-down stresses and potential distortion. Both designs employ two points of cylinder attachment located fore and aft. The exhaust stack is located on the left-hand side (looking forward) in both cases. The crankcases of the two designs are basically similar too, with the sturdy beam mounting lugs being located well above the axial centre line of the shaft, thus placing the thrust line more or less on the centre of the engine bearers in the model. Both crankcases have fins cast into their undersides, presumably to enhance crankcase cooling. The main bearing arrangements are similar as well. Both engines feature a bolt-on front cover which incorporates both the bronze-bushed main bearing and the FRV intake venturi (the O&R did not acquire a roller bearing at the rear of the shaft until mid to late 1949). The front of the cover in both instances is deeply recessed between the stiffening webs and the intake. In both cases too, the front covers are attached to the main casting by three screws. The spraybars are very similar as well. Finally, both designs feature a backplate which is cast integrally with the main casting. So much for the similarities, which are surely too marked to be coincidental. There seems to be little doubt that the Kondo brothers took the O&R 19 (or 23) FRV model as their design inspiration, thereafter setting out to create their own product which projected a comfortable and familiar O&R influence to potential buyers. But as before, they were not content to merely copy - rather, they took a long hard look at the O&R 19, modifying that design wherever they felt the need to do so. Let’s look at the changes which were made to the basic O&R design. The first important change is to be found at the top of the cylinder. The FRV version of the O&R 19 retained the blind bore which had become a trademark feature of the O&R models, with the addition of a swaged-on alloy cylinder head. However, this head was in fact a dummy - the engine would run perfectly well with the head removed. It may have contributed a little to improved cooling, but did little else apart from significantly enhancing the engine’s appearance. Furthermore, the use of a blind bore made it impossible to machine a really efficient combustion chamber shape into the underside of the head. It’s clear that by this time the Kondo brothers had developed an increasing appreciation of the benefits of a more efficient combustion chamber shape than was possible using a blind bore. Accordingly, they eliminated that feature from their own .19 model, converting the cast alloy cylinder head from what amounted to a cosmetic feature on the O&R into a fully functional head on the KO which sealed the open bore and allowed for the formation of a more efficient combustion chamber shape in the underside. This head was secured to the cylinder by 6 screws. It is this feature which most strongly suggests that the KO 19 design was developed somewhat later than the companion 29 model. Certainly, the revised head allowed for the efficient use of a piston with an upstanding baffle, the head being contoured to suit (visible through the plug hole). The O&R also used a low-profile baffle, but the head could not be contoured to match. Accordingly, the combustion chamber of the O&R at top dead centre was more or less divided by the baffle into two separated compartments, the disadvantage being that the centrally-located plug favoured the timely ignition of only one of these two “compartments”. This would considerably delay the full involvement of the charge in the combustion process. Of course, the problem of the creation of separate “pockets” of gas on either side of the piston baffle at top dead centre was not entirely eliminated by the use of a separate contoured head arrangement. To get around this, the plug in the KO was located offset towards the transfer side, more or less directly above the baffle. This would theoretically promote simultaneous ignition of the gas in the pockets on both sides of the baffle, hence promoting more rapid complete combustion. The above arrangements reflect a growing appreciation (in medium and larger bore engines, at least) of the benefits of promoting more rapid involvement of the entire charge in the combustion process. It seems that the Kondo brothers were learning on the job, and learning well! Another significant engineering change was the means of securing the cylinder to the crankcase. The KO designers clearly wished to retain the benefits of the unstressed cylinder walls which resulted from the attachment of the cylinder at its base rather than through the head. However, it’s equally clear that they didn’t like the O&R approach of using a pair of spot welds fore and aft to achieve this objective. The major downside of the O&R system was the fact that if a new crankcase was required as a result of crash damage, one also had to buy a new piston, cylinder and head. The converse was true if the piston/cylinder required replacement - a new case and head then had to be purchased as well. The same spot weld system was used in a slightly modified form in the contemporary Mamiya engines. The Kondo brothers decided to eliminate the welds in favour of a return to the system which had obviously served the purpose well in the case of their .29 cuin model previously described. The cylinder of their .19 model was secured exactly as it had been in the .29 model using two screws fore and aft which were inserted from below through two integrally-cast lugs on the crankcase to mate with threaded holes in the lower cylinder flange. A further engineering change was the means of securing the front housing to the main crankcase. The O&R design utilized three long bolts which passed from the front right through holes drilled longitudinally through the rather thick engine bearers and an extrusion at the bottom of the case. These bolts were secured at the rear with nuts. an arrangement which allowed for radial mounting of the engine. The KO designers clearly did not feel the need to provide for radial mounting. Accordingly, the three screws which retained the front cover in that design simply threaded directly into tapped holes in the material of the crankcase. Finally, the KO 19 utilized the same prop mounting system which had been featured in the KO 29, with a square aperture at the centre of the alloy prop driver keying onto a square “box” section milled into the front of the shaft. The prop mounting system was also carried over from the KO 29. Unlike the O&R, which used a conventional prop-nut, the prop on the KO was secured by a bolt (once again, using the odd-ball 3/16-24 Whitworth thread) which engaged directly with a tapped hole in the centre of the shaft. A gold-anodized alloy cap was fitted over the former timer mounting boss, exactly as it had been on the KO 29. This was considerably more attractive than the plain steel cap used on the O&R. Other departures from the O&R design which were carried over from the larger KO model included the aerofoil-section exhaust stack and the tall forward-raked un-braced intake venturi with its open end chamfered at a sharp forward angle to catch the slipstream. The OK-style needle valve assembly was also carried over from the KO 29. The O&R 19 had no tank, but the KO 19 featured a tank which was of an identical pattern to that used on the KO 29. Overall, there were enough carried-over features to ensure that the KO 19 retained a recognizable family relationship to its larger companion despite the very different fundamental design influences involved in the creation of the two models. As with the 29 model described earlier, the quality of construction is first class - despite the fact that the illustrated example has clearly done a fair bit of running, all fits remain excellent. The result was a well thought-out variation of the basic O&R design which was in some ways more elegant in appearance and which incorporated a theoretically more efficient combustion chamber together with a somewhat more rational assembly. There may well have been internal departures also, but the documentation of these would require that the engine be dismantled, a step which I elected not to take after some tentative probing. The three seals are well and truly baked on, hence being highly likely to be destroyed during the dismantling process. In addition, the engine remains in excellent running order, hence requiring no internal attention. Once again, we see that the KO designers were quite prepared to throw away the book when it came to designing the engine to match their own ideas. The difference in the bore and stroke relationships for these two engines having identical displacements is most striking - it’s clear that the Kondo brothers were true believers in the advantages of a longer stroke. They had lengthened the stroke of their companion .29 cuin model by comparison with the OK “original”, and now they went even further by creating a true long-stroke .19 cuin. design, in dramatic contrast to the drastically short-stroke O&R. This provides clear evidence of a concern with torque development as opposed to mere horsepower or the achievement of high revolutions. Despite the obvious design influence exercised upon the KO 19 by its O&R contemporary, the two were in fact quite distinct designs. Which was the more successful in performance terms? Impossible to say without conducting a series of comparative tests, which the previously noted time constraints did not permit. That said, I would objectively anticipate quite comparable levels of power output from the two models, although I would expect the KO to develop more low-end torque and hence peak at a somewhat lower speed. I have actually bench-run this particular engine, unfortunately without taking any readings. My notes show that it started very easily indeed and ran extremely smoothly, with first-class needle response. For now, that’s all that I can report. If time permits in the future, I will subject the engine to a full test and report the findings in an addition to this article. It’s entirely possible and perhaps even likely that there were other models in the early post-war KO range. If so, I have encountered no evidence for their existence, nor have such models been reported to date by my Japanese contacts. I'd be extremely grateful for any information regarding early KO models of which I'm presently unaware. It appears possible that the models described above were commercial failures, hence simply failing to survive long in production. This could perhaps be explained if the strategy of deliberately giving them a familiar “American” look backfired through the engines being seen (quite unfairly, as the above comments should have shown) as cheap imitations of the real thing - “poor man’s OK’s”, if you like! If this was the way things went, there would likely have been a hiatus in model engine production while the Kondo brothers took advantage of their other more successful product lines to recoup the considerable loss of capital which would have been represented by the dies and tooling for the engines just described if they had failed in the marketplace. What is certain is that by 1953 the above models had all disappeared from view. Instead, the Kondo brothers had turned their attention to the far more modest yet practical goal of producing a simple and inexpensive twin-stack .099 cuin glowplug model. I've noted in other articles that the .099 class seems to have been extremely important in the context of the Asian market, occupying much the same position in that market as the .049 1/2A engines did in the US market during the early and mid 1950’s. Hence the production of a competitive model in this category would make perfect sense to a company attempting to re-establish itself as a significant player in the Japanese model engine manufacturing sector after what may have amounted to a “false start”. This well-made and remarkably compact little engine appears to have been recorded for the first time in the English language in Peter Chinn’s most informative summary of model glow-plug engines for 1954/55 which appeared in the May 1955 issue of “Model Aircraft”. It was the sole KO model listed at that time - the accompanying table of model diesels included no KO models, seemingly confirming that the well-known diesels upon which KO was to depend for its future success in the model engine field had yet to appear. Although a detailed description of this neat little unit is beyond the scope of the present article, one comment which may appear relevant is the fact that it too was a long-stroke engine. It featured bore and stroke dimensions of 12.60 mm and 13.10 mm respectively for a displacement of 1.63 cc (.099 cuin). Clearly the Kondo brothers had retained their belief in the benefits of longer strokes to generate improved torque! The little KO .099 glow-plug motor was undoubtedly a commercial success. Examples of this engine are encountered relatively frequently today - far more so than the earlier KO engines described above. Moreover, additional KO models were not long in appearing, notably the range of diesels for which the company was to become well-known. I have now concluded my examination of some of the early KO designs which represented the company’s initial attempt to become established in the model engine field. For completeness, it remains for me to present a brief summary of the further fortunes of the company. I hope to go into this subject in greater detail in a future article. The KO model engine range continued in production well into the 1960s with a series of well-made diesels in different displacements as well as several additional glow-plug models. The manufacture and further development of the company’s R/C equipment continued throughout this period, with the R/C product line becoming increasingly dominant by comparison with the engines. Following the company’s entry into the proportional R/C field, the trade-name KO PROPO was applied to their R/C products, but the registered company name remained unchanged throughout. Ownership of the company remained within the Kondo family as well. By the mid-1960’s the model engine manufacturing activities of Kondo Kagaku Co. Ltd. had evidently come to constitute a relatively small proportion of the company’s overall business. It was likely for this reason that in 1965 or thereabouts the engine manufacturing operations were separated from the ongoing R/C production through the establishment of a separate company under the name of the Kondo Model Co. Ltd. In all probability, this was an accountant-driven decision since it established the model engine and R/C manufacturing lines as separate profit centres, to stand or fall on their own. Accountants love that sort of thing!! The Kondo Model Company produced the quaintly-named .12 cuin. “Mighty .12” glow-plug motor in both control-line and R/C forms. Early examples of this model actually retained the KO identification cast in relief onto the crankcase, but this was dropped from later products. Even at this late date, the designers were still attached to the long-stroke concept - the “Mighty .12” featured bore and stroke measurements of 13.50 mm and 13.80 mm respectively for a displacement of 1.97 cc (.12 cuin exactly). The engine was a compact and well-made unit having a quite attractive appearance. However, it offered nothing special in the way of features or performance. Consequently, it does not appear to have remained long on the market. Little more was heard of the Kondo model engine range thereafter - indeed, there’s currently no persuasive evidence that engine production continued into the 1970’s. However, the Kondo Kagaku Co. Ltd. went from strength to strength on the basis of its KO PROPO line of R/C equipment, still under the original family ownership. The company was among the first to sense the upsurge of interest in R/C model cars which began in the early 1980’s, resulting in a 1988 decision to concentrate exclusively on the R/C model car field. During the period discussed in this article, the KO PROPO equipment was not readily available outside of the Asian market. However, all of this changed in 2007 with the establishment of an American subsidiary, KO PROPO America, for the purpose of distributing the parent company’s products throughout the North American market. This step ensured that the company would thenceforth be able to compete in the US market on a level footing with other manufacturers of R/C equipment. The company remains a respected participant in the model R/C car business to this day (2018), still under the original family ownership after over 70 years. But all of this constitutes another story to be written by others! For now, I hope that you’ve enjoyed this in-depth look at a few of the less common Japanese glow-plug engines from the early post-war period.
2019-04-25T16:25:59Z
http://adriansmodelaeroengines.com/catalog/main.php?cat_id=22
This application claims the benefit of priority from U.S. Provisional Patent Application No. 60/579,884, filed Jun. 15, 2004; and is a continuation-in-part of application Ser. No. 10/461,786, filed Jun. 12, 2003, which claims priority under 35 U.S.C. §119 to U.S. Provisional Application Ser. No. 60/450,824 filed Feb. 27, 2003 and U. S. Provisional Application Ser. No. 60/388,522, filed Jun. 12, 2002, the disclosures of which are incorporated herein by reference. The disclosure relates generally to light microscopy and fluorescent microscopy and, more particularly, to automated light and fluorescent microscopic methods and an apparatus for detection of objects in a sample. In the field of medical diagnostics and research including oncology, the detection, identification, quantification, and characterization of cells of interest, such as cancer cells, through testing of biological samples is an important aspect of diagnosis and research. Typically, a biological sample such as bone marrow, lymph nodes, peripheral blood, cerebrospinal fluid, urine, effusions, fine needle aspirates, peripheral blood scrapings or other biological materials are prepared by staining a sample to identify cells of interest. This disclosure provides a method for processing a biological sample, comprising (a) contacting a biological sample with a first reagent or combination of reagents that stains the biological sample for objects of interest; (b) acquiring a plurality of images of the biological sample at a plurality of locations/coordinates using a first imaging technique; (c) processing the plurality of images to identify a genus of candidate objects of interest; (d) determining a coordinate for each identified genus candidate objects of interest; (e) storing each of the determined coordinates corresponding to each identified object of interest; (f) contacting the biological sample with a second reagent or combination of reagents, wherein the second reagent or combination of reagents is specific for a marker on a species of the genus candidate objects of interest; (g) acquiring images at each of the identified coordinates using a second imaging technique; and (h) processing the images to identify a species object of interest. The above and other features of the disclosure including various details of construction and combinations of parts will now be more particularly described with reference to the accompanying drawings and pointed out in the claims. It will be understood that the particular apparatus embodying the disclosure is shown by way of illustration only and not as a limitation of the disclosure. The principles and features of this disclosure may be employed in varied and numerous embodiments without departing from the scope of the disclosure. FIG. 1 is a perspective view of an exemplary apparatus for automated cell analysis embodying the disclosure. FIG. 2 is a block diagram of the apparatus shown in FIG. 1. FIG. 3 is a block diagram of the system processor of FIG. 2. FIG. 4 is a plan view of the apparatus of FIG. 1 having the housing removed. FIG. 5 is a side view of a microscope subsystem of the apparatus of FIG. 1. FIG. 6 a is a top view of a slide carrier for use with the apparatus of FIG. 1. FIG. 6 b is a bottom view of the slide carrier of FIG. 6 a. FIG. 7 a is a top view of an automated slide handling subsystem of the apparatus of FIG. 1. FIG. 7 b is a partial cross-sectional view of the automated slide handling subsystem of FIG. 7 a taken on line A-A. FIG. 8 is an end view of the input module of the automated slide handling subsystem. FIGS. 8 a-8 d illustrate the input operation of the automatic slide handling subsystem. FIGS. 9 a-9 d illustrate the output operation of the automated slide handling subsystem. FIG. 10 is a flow diagram of the procedure for automatically determining a scan area. FIG. 11 shows the scan path on a prepared slide in the procedure of FIG. 10. FIG. 12 illustrates an image of a field acquired in the procedure of FIG. 10. FIG. 13A is a flow diagram of a procedure for determining a focal position. FIG. 13B is a flow diagram of a procedure for determining a focal position for neutrophils stained with Fast Red and counterstained-with hematoxylin. FIG. 14 is a flow diagram of a procedure for automatically determining initial focus. FIG. 15 shows an array of slide positions for use in the procedure of FIG. 14. FIG. 16 is a flow diagram of a procedure for automatic focusing at a high magnification. FIG. 17A is a flow diagram of an overview of the preferred process to locate and identify objects of interest in a stained biological sample on a slide. FIG. 17B is a flow diagram of a procedure for color space conversion. FIG. 18 is a flow diagram of a procedure for background suppression via dynamic thresholding. FIG. 19 is a flow diagram of a procedure for morphological processing. FIG. 20 is a flow diagram of a procedure for blob analysis. FIG. 21 is a flow diagram of a procedure for image processing at a high magnification. FIG. 22 illustrates a mosaic of cell images produced by the apparatus. FIG. 23 is a flow diagram of a procedure for estimating the number of nucleated cells in a field. FIGS. 24 a and 24 b illustrate the apparatus functions available in a user interface of the apparatus. FIG. 25 is a perspective view of another embodiment of the disclosure. The biological mechanisms of many diseases have been clarified by microscopic examination of tissue samples. Histopathological examination has also permitted the development of effective medical treatments for a variety of illnesses. In standard anatomical pathology, a diagnosis is made on the basis of cell morphology and staining characteristics. Tumor samples, for example, can be examined to characterize the tumor type and suggest whether the patient will respond to a particular form of chemotherapy. Microscopic examination and classification of tissue samples stained by standard methods (such as hematoxylin and eosin) has improved cancer treatment significantly. Even with these advancements many cancer treatments are ineffective. This is due to the fact that many cancers are the result of changes in cellular machinery that provides the phenotypic changes resulting in aberrant cellular proliferation. Thus, due to the diverse nature of the changes that cause various cancers, a cancer condition caused by one cellular mechanism may be treatable by one therapeutic regimen, while a similar cancer, if caused by a different cellular mechanism requires a different therapeutic regimen. Recent advances in molecular medicine have provided an even greater opportunity to understand the cellular mechanisms of disease, and select appropriate treatments with the greatest likelihood of success. For example, some hormone dependent breast tumor cells have an increased expression of estrogen receptors indicating that the patient from whom the tumor was taken will likely respond to certain anti-estrogen drug treatments. Other diagnostic and prognostic cellular changes include the presence of tumor specific cell surface antigens (as in melanoma), the production of embryonic proteins (such as carcinoembryonic glycoprotein antigen produced by gastrointestinal tumors), and genetic abnormalities (such as activated oncogenes in tumors). A variety of techniques have evolved to detect the presence of these cellular abnormalities, including immunophenotyping with monoclonal antibodies, in situ hybridization using nucleic acid probes, and DNA amplification using-the polymerase chain reaction (PCR). Effective use of such markers in assisting in the diagnosis and identification of an effective therapeutic regimen has been impeded by the inability of current automated analysis systems to utilize and identify the varied markers in a cost efficient, time sensitive, and reproducible manner. Thus, previous techniques and systems have often proven inadequate for the efficient analysis of tissue samples requiring a rapid parallel analysis of a variety of independent microscopic, histologic and/or molecular characteristics. The disclosure provides methods and systems whereby a sample on a slide is treated with at least a first reagent and imaged using a first imaging technique. The slide is then treated with at least one additional reagent and imaged with a second imaging technique. Using such a technique allows for limited use of reagents by treating a sample with a reagent only where justified by examining the sample with a first imaging technique. For example, certain antibodies to cancer markers are expensive and it would be desirable to only use such antibodies in samples where further justification and analysis is needed. By using the methods of the disclosure a sample is treated with a first reagent that characterizes cells in a sample. The first reagent can be any reagent useful in identifying rare events in a sample, but preferably the first reagent is a commonly used stain. An automated analysis system images the sample comprising the first reagent to identify candidate objects of interest or rare events. Processing algorithms and techniques are discussed further hereinbelow. If a candidate object of interest or rare event is identified the image is stored, the location and coordinates of the candidate object of interest are stored, and the slide is indicated for further processing. If no candidate image is identified in the sample comprising the first reagent then no further processing occurs of the slide/sample. Examples of commonly used first reagents include stains such as DAB, New Fuchsin, AEC, which are “reddish” in color. For example, candidate objects of interest (rare events) retain more of the stain and thus appear red while normal cells remain unstained. The sample may also be counterstained with hematoxylin so the nuclei of normal cells or cells not containing an object of interest appear blue. In addition to these objects, dirt and debris can appear as black, gray, or can also be lightly stained red or blue depending on the staining procedures utilized. The residual plasma or other fluids also present on a smear (tissue) may also possess some color. A first imaging technique used with a first reagent can be transmitted light microscopy or fluorescent microscopy. Using common stains such as DAB, New Fuchsin, AEC, hematoxylin, the imaging technique will comprise transmitted light microscopy. Where a candidate rare event has been identified using the first reagent and imaging technique, the slide is further processed with a one or more additional reagents either simultaneously or sequentially. For example, reagents maybe selected from the group consisting of an antibody, a nucleic acid probe, a fluorescent molecule, a chemical, and the like. A slide comprising a candidate object of interest is removed from the image analysis system and treated with the one or more additional reagents. The slide may be processed to remove the residual first reagent before processing with the one or more additional reagents. The slide is treated with the one or more additional reagents as appropriate for the reagent being used, as will be apparent from the disclosure and to those of skill in the art (e.g., hybridization temperature and the like for nucleic acid probes in FISH techniques). Once treated with the one or more additional reagents the slide comprising the previously identified candidate object of interest or rare event is then imaged using a second imaging technique. The slide is automatically oriented to the coordinates of the candidate object of interest or rare event based upon the stored image and stored coordinates obtained during the first imaging technique. Means for orienting a sample on a slide so as to relocate the sample to substantially identical coordinates identified in the processing under the first imaging technique are described further hereinbelow. The first and second imaging techniques can be the same or different depending upon the reagent used. For example, the first and second imaging techniques can both comprise transmitted light microscopy. Alternatively, the first imaging technique can comprise transmitted light microscopy and the second imaging technique can comprise fluorescent imaging microscopy. Similarly, the first imaging technique can comprise fluorescent imaging microscopy and the second imaging technique can comprise transmitted light microscopy. The disclosure provides an automated analysis system that quickly and accurately scans large amounts of biological material on a slide. In addition, the system automates the analysis of samples using one or more reagents quickly and accurately. Accordingly, the disclosure provides useful methods, apparatus, and systems for use in research and patient diagnostics to locate cell objects for analysis having either or both of a non-fluorescent stain and a fluorescent indicator. A biological sample and/or subsample comprises biological materials obtained from or derived from a living organism. Typically a biological sample will comprise proteins, polynucleotides, organic material, cells, tissue, and any combination of the foregoing. Such samples include, but are not limited to, hair, skin, tissue, cultured cells, cultured cell media, and biological fluids. A tissue is a mass of connected cells and/or extracellular matrix material (e.g., CNS tissue, neural tissue, eye tissue, placental tissue, mammary gland tissue, gastrointestinal tissue, musculoskeletal tissue, genitourinary tissue, and the like) derived from, for example, a human or other mammal and includes the connecting material and the liquid material in association with the cells and/or tissues. A biological fluid is a liquid material derived from, for example, a human or other mammal. Such biological fluids include, but are not limited to, blood, plasma, serum, serum derivatives, bile, phlegm, saliva, sweat, amniotic fluid, mammary fluid, and cerebrospinal fluid (CSF), such as lumbar or ventricular CSF. A sample also may be media containing cells or biological material. In one aspect, a biological sample may be divided into two or more additional samples (e.g., subsamples). Typically the biological sample is a tissue, such as a tissue biopsy. Typically, an individual sample used to prepare a subsample is embedded in embedding media such as paraffin or other waxes, gelatin, agar, polyethylene glycols, polyvinyl alcohol, celloidin, nitrocelluloses, methyl and butyl methacrylate resins or epoxy resins, which are polymerized after they infiltrate the specimen. Water-soluble embedding media such as polyvinyl alcohol, carbowax (polyethylene glycols), gelatin, and agar, may be used directly on specimens. Water-insoluble embedding media such as paraffin and nitrocellulose require that specimens be dehydrated in several changes of solvent such as ethyl alcohol, acetone, or isopropyl alcohol and then be immersed in a solvent in which the embedding medium is soluble. In the case where the embedding medium is paraffin, suitable solvents for the paraffin are xylene, toluene, benzene, petroleum, ether, chloroform, carbon tetrachloride, carbon bisulfide, and cedar oil. Typically a tissue sample is immersed in two or three baths of the paraffin solvent after the tissue is dehydrated and before the tissue sample is embedded in paraffin. Embedding medium includes, for examples, any synthetic or natural matrix suitable for embedding a sample in preparation for tissue sectioning. A tissue sample may be a conventionally fixed tissue sample, tissue samples fixed in special fixatives, or may be an unfixed sample (e.g., freeze-dried tissue samples). If a tissue sample is freeze-dried, it should be snap-frozen. Fixation of a tissue sample can be accomplished by cutting the tissue specimens to a thickness that is easily penetrated by fixing fluid. Examples of fixing fluids are aldehyde fixatives such as formaldehyde, formalin or formol, glyoxal, glutaraldehyde, hydroxyadipaldehyde, crotonaldehyde, methacrolein, acetaldehyde, pyruic aldehyde, malonaldehyde, malialdehyde, and succinaldehyde; chloral hydrate; diethylpyrocarbonate; alcohols such as methanol and ethanol; acetone; lead fixatives such as basic lead acetates and lead citrate; mercuric salts such as mercuric chloride; formaldehyde sublimates; sublimate dichromate fluids; chromates and chromic acid; and picric acid. Heat may also be used to fix tissue specimens by boiling the specimens in physiologic sodium chloride solution or distilled water for two to three minutes. Whichever fixation method is ultimately employed, the cellular structures of the tissue sample must be sufficiently hardened before they are embedded in a medium such as paraffin. Using techniques such as those disclosed herein, a biological sample comprising a tissue may be embedded, sectioned, and fixed, whereby a single biopsy can render a plurality of subsamples upon sectioning. As discussed herein, each sample can be examined under different staining or fluorescent conditions. Alternatively, each subsample can be examined under similar staining or fluorescent conditions thereby rendering a wealth of information about the tissue biopsy. In one aspect of the disclosure, an array of tissue samples may be prepared and located on a single slide. The generation of such tissue-microarrays are known in the art. Each tissue sample in the tissue-microarray may be stained and/or treated the same of differently using both automated techniques and manual techniques (see, e.g., Kononen et al. Nature Medicine, 4(7), 1998; and U.S. Pat. No. 6,103,518, the disclosures of which are incorporated herein by reference). In another aspect, a method whereby a single biological sample may be assayed or examined in many different ways is provided. Under such conditions a sample may be stained or labeled with at least one first reagent and examined by light microscopy with transmitted light and/or a combination of light microscopy and fluorescent microscopy. The sample is then stained or labeled with at least one second reagent and examined by light microscopy (e.g., transmitted light) and/or a combination of light microscopy and fluorescent microscopy. The biological sample and/or subsample can be contacted with a variety of reagents useful in determining and analyzing cellular molecules and mechanisms. Such reagents include, for example, polynucleotides, polypeptides, small molecules, and/or antibodies useful in in situ screening assays for detecting molecules that specifically bind to a marker present in a sample. Such assays can be used to detect, prognose, diagnose, or monitor various conditions, diseases, and disorders, or monitor the treatment thereof. A reagent can be detectably labeled such that the reagent is detectable when bound or hybridized to its target marker or ligand. Such means for detectably labeling any of the foregoing reagents include an enzymatic, fluorescent, or radionuclide label. Other reporter means and labels are well known in the art. A marker can be any cell component present in a sample that is identifiable by known microscopic, histologic, or molecular biology techniques. Markers can be used, for example, to distinguish neoplastic tissue from non-neoplastic tissue. Such markers can also be used to identify a molecular basis of a disease or disorder including a neoplastic disease or disorder. Such a marker can be, for example, a molecule present on a cell surface, an overexpressed target protein, a nucleic acid mutation or a morphological characteristic of a cell present in a sample. A reagent useful in the methods of the disclosure can be an antibody. Antibodies useful in the methods of the disclosure include intact polyclonal or monoclonal antibodies, as well as fragments thereof, such as Fab and F(ab′)2 fragments. For example, monoclonal antibodies are made from antigen containing fragments of a protein by methods well known to those skilled in the art (Kohler, et al., Nature, 256:495, 1975). Fluorescent molecules may be bound to an immunoglobulin either directly or indirectly by using an intermediate functional group. A reagent useful in the methods of the disclosure can also be a nucleic acid molecule (e.g., an oligonucleotide or polynucleotide). For example, in situ nucleic acid hybridization techniques are well known in the art and can be used to identify an RNA or DNA marker present in a sample or subsample. Screening procedures that rely on nucleic acid hybridization make it possible to identify a marker from any sample, provided the appropriate oligonucleotide or polynucleotide agent is available. For example, oligonucleotide agents, which can correspond to a part of a sequence encoding a target polypeptide (e.g., a cancer marker comprising a polypeptide), can be synthesized chemically or designed through molecular biology techniques. The polynucleotide encoding the target polypeptide can be deduced from the genetic code, however, the degeneracy of the code must be taken into account. For such screening, hybridization is typically performed under in situ conditions known to those skilled in the art. Referring now to FIGS. 1 and 2, an apparatus for automated cell analysis of biological samples is generally indicated by reference numeral 10 as shown in perspective view in FIG. 1 and in block diagram form in FIG. 2. The apparatus 10 comprises a microscope subsystem 32 housed in a housing 12. The housing 12 includes a slide carrier input hopper 16 and a slide carrier output hopper 18. A door 14 in the housing 12 secures the microscope subsystem from the external environment. A computer subsystem comprises a computer 22 having at least one system processor 23, and a communications modem 29. The computer subsystem further includes a computer/image monitor 27 and other external peripherals including storage device 21, a pointing device, such as a track ball or mouse device 30, a user input device, such as a touch screen, keyboard, or voice recognition unit 28 and color printer 35. An external power supply 24 is also shown for power outage protection. The apparatus 10 further includes an optical sensing array 42, such as, for example, a CCD camera, for acquiring images. Microscope movements are under the control of system processor 23 through a number of microscope-subsystem functions described further in detail. An automatic slide feed mechanism in conjunction with X-Y stage 38 provide automatic slide handling in the apparatus 10. An illumination 48 comprising a bright field transmitted light source projects light onto a sample on the X-Y stage 38, which is subsequently imaged through the microscope subsystem 32 and acquired through optical sensing array 42 for processing by the system processor 23. A Z stage or focus stage 46 under control of the system processor 23 provides displacement of the microscope subsystem in the Z plane for focusing. The microscope subsystem 32 further includes a motorized objective turret 44 for selection of objectives. The apparatus 10 further includes a fluorescent excitation light source 45 and may further include a plurality of fluorescent filters on a turret or wheel 47. Alternatively, a filter wheel may have an electronically tunable filter. In one aspect, fluorescent excitation light from fluorescent excitation light source 45 passes through fluorescent filter 47 and proceeds to contact a sample on the XY stage 38. Fluorescent emission light emitted from a fluorescent agent contained on a sample passes through objective 44 a to optical sensing array 42. The fluorescent emission light forms an image, which is digitized by an optical sensing array 42, and the digitized image is sent to an image processor 25 for subsequent processing. The purpose of the apparatus 10 is for the automatic scanning of prepared microscope slides for the detection of candidate objects of interest or rare events such as normal and abnormal cells, e.g., tumor cells. In one aspect, the apparatus 10 is capable of detecting rare events, e.g., event in which there may be only one candidate object of interest per several hundred thousand objects, e.g., one to five candidate objects of interest per 2 square centimeter area of the slide. The apparatus 10 automatically locates and can count candidate objects of interest noting the coordinates or location of the candidate object of interest on a slide based upon color, size and shape characteristics. A number of stains can be used to stain candidate objects of interest and other objects (e.g., normal cells) different colors so that such cells can be distinguished from each other (as described herein). A biological sample may be prepared with a reagent to obtain a colored insoluble precipitate. As one step in the methods and systems of the disclosure an apparatus 10 is used to detect this precipitate as a candidate object of interest. During operation of the apparatus 10, a pathologist or laboratory technician mounts slides onto slide carriers. Each slide may contain a single sample or a plurality of samples (e.g., a tissue microarray). A slide carrier 60 is illustrated in FIG. 8 and will be described further below. Each slide carrier can be designed to hold a number of slides from about 1-50 or more (e.g., the holder depicted in FIG. 8 holds up to 4 slides). A number of slide carriers are then loaded into input hopper 16 (see FIG. 1). The operator can specify the size, shape and location of the area to be scanned or alternatively, the system can automatically locate an area. The operator then commands the system to begin automated scanning of the slides through a graphical user interface. Unattended scanning begins with the automatic loading of the first carrier and slide onto the precision motorized X-Y stage 38. In one aspect of the disclosure, a bar code label affixed to the slide or slide carrier is read by a bar code reader 33 during this loading operation. Each slide is then scanned a desired magnification, for example, 10×, to identify candidate cells or objects of interest based on their color, size and shape characteristics. The term “coordinate” or “address” is used to mean a particular location on a slide or sample. The coordinate or address can be identified by any number of means including, for example, X-Y coordinates, r-θ coordinates, polar, vector or other coordinate systems known in the art. In one aspect of the disclosure a slide is scanned under a first parameter comprising a desired magnification and using a bright field light source from illumination 48 (see FIG. 2) to identify a candidate cell or object of interest. The methods, systems, and apparatus of the disclosure may obtain a low magnification image of a candidate cell or object of interest and then return to each candidate cell or object of interest based upon the previously stored coordinates to reimage and refocus at a higher magnification such as 40× or to reimage under fluorescent conditions. To avoid missing candidate cells or objects of interest, the system can process low magnification images by reconstructing the image from individual fields of view and then determine objects of interest. In this manner, objects of interest that overlap more than one objective field of view may be identified. The apparatus comprises a storage device 21 that can be used to store an image of a candidate cell or object of interest for later review by a pathologist or to store identified coordinates for later use in processing a sample or a subsample. The storage device 21 can be a removable hard drive, DAT tape, local hard drive, optical disk, or may be an external storage system whereby the data is transmitted to a remote site for review or storage. In one aspect, stored images (from both fluorescent and bright field light) can be overlapped and/or viewed in a mosaic of images for further review (as discussed more fully herein). Apparatus 10 is also used for fluorescent imaging (e.g., in FISH techniques) of prepared microscope slides for the detection of candidate objects of interest such as normal and abnormal cells, e.g., tumor cells. Where a sample is first stained with a first reagent and then subsequently stained with one or more additional reagent, the apparatus 10 can automatically locate the coordinates of previously identified candidate cells or objects of interest based upon the techniques described above. In this aspect, the slide has been contacted with a second reagent, e.g., a fluorescent agent labeled with a fluorescent indicator. The fluorescent agent can be an antibody, polypeptide, oligonucleotide, or polynucleotide labeled with a fluorescent indicator. A number of fluorescent indicators are known in the art and include DAPI, Cy3, Cy3.5, Cy5, Cy5.5, Cy7, umbelliferone, fluorescein, fluorescein isothiocyanate (FITC), rhodamine, dichlorotriazinylamine fluorescein, dansyl chloride or phycoerythrin. In another aspect of the disclosure a luminescent material may be used. Useful luminescent materials include luminol; examples of bioluminescent materials include luciferase, luciferin, and aequorin. Where the biological sample is prepared with a fluorescently labeled agent or luminescently labeled agent to identify molecules of interest within the biological sample. An apparatus of the disclosure is used to detect the fluorescence or luminescence of the molecule when exposed to a wavelength that excites a fluorescent indicator attached to the fluorescent agent or exposed to conditions that allow for luminescence. The automated system of the disclosure scans a biological sample contacted with a fluorescent reagent under conditions such that a fluorescent indicator attached to the reagent fluoresces, or scans a biological sample labeled with a luminescent reagent under conditions that detects light emissions from a luminescent indicator. Examples of conditions include providing a fluorescent excitation light that contacts and excites the fluorescent indicator to fluoresce. As described in more detail herein the apparatus of the disclosure includes a fluorescent excitation light source and can also include a number of fluorescent excitation filters to provide different wavelengths of excitation light. In one aspect of the disclosure, a bar code label affixed to a slide or slide carrier is read by a bar code reader 33 during a loading operation. The bar code provides the system with information including, for example, information about the scanning parameters including the type of light source or the excitation light wavelength to use. Each slide is then scanned at a desired magnification, for example, 10×, to identify candidate cells or objects of interest based on their color, size, and shape characteristics. Where the location of candidate cells or objects of interest have been previously identified, the location, coordinate, or address of the candidate cells or objects of interest (including corrected coordinates) are used to focus the system at those specific locations and obtain fluorescent or bioluminescent images. The methods, system, and apparatus of the disclosure can obtain a first image using a transmitted light source at either a low magnification or high magnification of a candidate cell or object of interest and then return to the coordinates (or corrected coordinates) associated with each candidate cell or object of interest in the same sample or a related subsample using different imgaing techniques based upon different reagents used. For example, the methods, system, and apparatus of the disclosure can obtain a first image of a candidate cell or object of interest using a transmitted light source at either a low magnification or high magnification and then return to the coordinates (or corrected coordinates) associated with each candidate cell or object of interest in the same sample or a related subsample to obtain a fluorescent image. Fluorescent images or luminescent images can be stored on a storage device 21 that can be used to store an image of a candidate cell or object of interest for later review by a pathologist. Where transmitted light microscopy or fluorescent light microscopy are followed sequentially in either order the light sources for both processes must be managed. Such light source management is performed using the system processor 23 through the Fluorescent controller 102 and illumination controller 106 (see, FIG. 3). During processing of images in transmitted light microscopy the fluorescent excitation light source is off or blocked such that excitation light from the fluorescent light source does not contact the sample. When fluorescent images are being obtained the transmitted light source is off or blocked such that the transmitted light does not pass through the sample while the sample is contacted by fluorescent excitation light from fluorescent excitation light source 45. Having described the overall operation of the apparatus 10 from a high level, the further details of the apparatus will now be described. Referring to FIG. 3, the microscope controller 31 is shown in more detail. The microscope controller 31 includes a number of subsystems. The apparatus system processor 23 controls these subsystems. The system processor 23 controls a set of motor—control subsystems 114 through 124, which control the input and output feeder, the motorized turret 44, the X-Y stage 38, and the Z stage 46 (FIG. 2). The system processor 23 further controls a transmitted light illumination controller 106 for control of substage illumination 48 bright field transmitted light source and controls a fluorescent excitation illumination controller 102 for control of fluorescent excitation light source 45 and/or filter turret 47. The transmitted light illumination controller 106 is used in conjunction with camera and image collection adjustments to compensate for the variations in light level in various samples. The light control software samples the output from the camera at intervals (such as between loading of slide carriers), and commands the transmitted light illumination controller 106 to adjust the light or image collection functions to the desired levels. In this way, light control is automatic and transparent to the user and adds no additional time to system operation. Similarly, fluorescent excitation illumination controller 102 is used in conjunction with the camera and image collection adjustments to compensate for the variations in fluorescence in various samples. The light control software samples the output from the camera at intervals (such as between loading of slide carriers and may include sampling during image collection), and commands the fluorescent excitation illumination controller 102 to adjust the fluorescent excitation light or image exposure time to a desired level. In addition, the fluorescent excitation illumination controller 102 may control the filter wheel or wavelength 47. The system processor 23 is a high performance processor of at least 200 MHz, for example, the system processor may comprise dual parallel, Intel, 1 GHZ devices. Advances in processors are being routinely made in the computer industry. Accordingly, the disclosure should not be limited by the type of processor or speed of the processor disclosed herein. Referring now to FIGS. 4 and 5, further detail of the apparatus 10 is shown. FIG. 4 shows a plan view of the apparatus 10 with the housing 12 removed. Shown is slide carrier unloading assembly 34 and unloading platform 36 which in conjunction with slide carrier output hopper 18 function to receive slide carriers which have been analyzed. Vibration isolation mounts 40, shown in further detail in FIG. 5, are provided to isolate the microscope subsystem 32 from mechanical shock and vibration that can occur in a typical laboratory environment. In addition to external sources of vibration, the high-speed operation of the X-Y stage 38 can induce vibration into the microscope subsystem 32. Such sources of vibration can be isolated from the electro-optical subsystems to avoid any undesirable effects on image quality. The isolation mounts 40 comprise a spring 40 a and piston 40 b (see FIG. 5) submerged in a high viscosity silicon gel which is enclosed in an elastomer membrane bonded to a casing to achieve damping factors on the order of about 17 to 20%. Other dampening devices are known in the art and may be substituted or combined with the dampening device provided herein. Occulars 20 are shown in FIGS. 4 and 5, however, their presence is an optional feature. The occulars 20 may be absent without departing from the advantages or functionality of the system. The automatic slide-handling feature of the disclosure will now be described. The automated slide handling subsystem operates the movement and management of a slide carrier. A slide carrier 60 is shown in FIGS. 6 a and 6 b, which provide a top view and a bottom view, respectively. The slide carrier 60 can include a number of slides 70 (e.g., at least four slides but may number from 1-50 or more). The carrier 60 includes ears 64 for hanging the carrier in the output hopper 18. An undercut 66 and pitch rack 68 are formed at the top edge of the slide carrier 60 for mechanical handling of the slide carrier. A keyway cutout 65 is formed in one side of the carrier 60 to facilitate carrier alignment. A prepared slide 72 mounted on the slide carrier 60 includes a sample area 72 a and a bar code label area 72 b. FIG. 7 a provides a top view of the slide handling subsystem, which comprises a slide, input module 15, a slide output module 17 and X-Y stage drive belt 50. FIG. 7 b provides a partial cross-sectional view taken along line A-A of FIG. 7 a. The slide input module 15 comprises a slide carrier input hopper 16, loading platform 52 and slide carrier loading subassembly 54. The input hopper 16 receives a series of slide carriers 60 (FIGS. 6 a and 6 b) in a stack on loading platform 52. A guide key 57 (see FIG. 7 a) protrudes from a side of the input hopper 16 to which the keyway cutout 65 (FIG. 6 a) of the carrier is fit to achieve proper alignment. The input module 15 further includes a revolving indexing cam 56 and a switch 90 (FIG. 7 a) mounted in the loading platform 52, the operation of which is described further below. The carrier loading subassembly 54 comprises an infeed drive belt 59 driven by a motor 86. The infeed drive belt 59 includes a pusher tab 58 for pushing the slide carrier horizontally toward the X-Y stage 38 when the belt is driven. A homing switch 95 senses the pusher tab 58 during a revolution of the belt 59. Referring specifically to FIG. 7 a, the X-Y stage 38 is shown with x position and y position motors 96 and 97, respectively, which are controlled by the system processor 23 (FIG. 3) and are not considered part of the slide handling subsystem. The X-Y stage 38 further includes an aperture 55 for allowing illumination to reach the slide carrier. A switch 91 is mounted adjacent the aperture 55 for sensing contact with the carrier and thereupon activating a motor 87 to drive stage drive belt 50 (FIG. 7 b). The drive belt 50 is a double-sided timing belt having teeth for engaging pitch rack 68 of the carrier 60 (FIG. 6 b). The slide output module 17 includes slide carrier output hopper 18, unloading platform 36 and slide carrier unloading subassembly 34. The unloading subassembly 34 comprises a motor 89 for rotating the unloading platform 36 about shaft 98 during an unloading operation described further below. An outfeed gear 93 driven by motor 88 (FIG. 7 a) rotatably engages the pitch rack 68 of the carrier 60 (FIG. 6 b) to transport the carrier to a rest position against switch 92 (FIG. 7 a). A springloaded hold-down mechanism 94 holds the carrier in place on the unloading platform 36. The slide handling operation will now be described. Referring to FIG. 8, a series of slide carriers 60 are shown stacked in input hopper 16 with the top edges 60 a aligned. As the slide handling operation begins, the indexing cam 56 driven by motor 85 advances one revolution to allow only one slide carrier to drop to the bottom of the hopper 16 and onto the loading platform 52. FIGS. 8 a-8 d show the cam action in more detail. The cam 56 includes a hub 56 a to which are mounted upper and lower leaves 56 b and 56 c, respectively. The leaves 56 b and 56 c are semicircular projections oppositely positioned and spaced apart vertically. In a first position shown in FIG. 8 a, the upper leaf 56 b supports the bottom carrier at the undercut portion 66. At a position of the cam 56 rotated 180°, shown in FIG. 8 b, the upper leaf 56 b no longer supports the carrier and instead the carrier has dropped slightly and is supported by the lower leaf 56 c. FIG. 8 c shows the position of the cam 56 rotated 270° wherein the upper leaf 56 b has rotated sufficiently to begin to engage the undercut 66 of the next slide carrier while the opposite facing lower leaf 56 c still supports the bottom carrier. After a full rotation of 360° as shown in FIG. 8 d, the lower leaf 56 c has rotated opposite the carrier stack and no longer supports the bottom carrier which now rests on the loading platform 52. At the same position, the upper leaf 56 b supports the next carrier for repeating the cycle. Referring again to FIGS. 7 a and 7 b, when the carrier drops to the loading platform 52, the contact closes switch 90, which activates motors 86 and 87. Motor 86 drives the infeed drive belt 59 until the pusher tab 58 makes contact with the carrier and pushes the carrier onto the X-Y stage drive belt 50. The stage drive belt 50 advances the carrier until contact is made with switch 91, the closing of which begins the slide scanning process described further herein. Upon completion of the scanning process, the X-Y stage 38 moves to an unload position and motors 87 and 88 are activated to transport the carrier to the unloading platform 36 using stage drive belt 50. As noted, motor 88 drives outfeed gear 93 to engage the pitch rack 68 of the carrier 60 (FIG. 6 b) until switch 92 is contacted. Closing switch 92 activates motor 89 to rotate the unloading platform 36. The unloading operation is shown in more detail in end views of the output module 17 (FIGS. 9 a-9 d). In FIG. 9 a, the unloading platform 36 is shown in a horizontal position supporting a slide carrier 60. The hold-down mechanism 94 secures the carrier 60 at one end. FIG. 9 b shows the output module 17 after motor 89 has rotated the unloading platform 36 to a vertical position, at which point the spring loaded hold-down mechanism 94 releases the slide carrier 60 into the output hopper 18. The carrier 60 is supported in the output hopper 18 by means of ears 64 (FIGS. 6 a and 6 b). FIG. 9 c shows the unloading platform 36 being rotated back towards the 20 horizontal position. As the platform 36 rotates upward, it contacts the deposited carrier 60 and the upward movement pushes the carrier toward the front of the output hopper 18. FIG. 9 d shows the unloading platform 36 at its original horizontal position after having output a series of slide carriers 60 to the output hopper 18. Having described the overall system and the automated slide handling feature, the aspects of the apparatus 10 relating to scanning, focusing and image processing will now be described in further detail. In some cases, an operator will know ahead of time where the scan area of interest is on a slide comprising a sample. Conventional preparation of slides for examination provides repeatable and known placement of the sample on the slide. The operator can therefore instruct the system to always scan the same area at the same location of every slide, which is prepared in this fashion. But there are other times in which the area of interest is not known, for example, where slides are prepared manually with a smear technique. One feature of the disclosure automatically determines the scan area using a texture or density analysis process. FIG. 10 is a flow diagram that describes the processing associated with the automatic location of a scan area. As shown in this flow diagram, a basic method is to pre-scan the entire slide area under transmitted light to determine texture features that indicate the presence of a smear or tissue and to discriminate these areas from dirt and other artifacts. In addition, one or more distinctive features may be identified and the coordinates determined in order to make corrections to identify objects of interest in a serial subsample as described herein and using techniques known in the art. As a first step the system determines whether a user defined microscope objective has been identified 200. The system then sets the stage comprising the sample to be scanned at a predetermined position, such as the upper left hand corner of a raster search area 202. At each location of a raster scan, an image such as in FIG. 12 is acquired 204 and analyzed for texture/border information 206. Since it is desired to locate the edges of the smear or tissue sample within a given image, texture analyses are conducted over areas called windows 78 (FIG. 12), which are smaller than the entire image as shown in FIG. 12. The process iterates the scan across the slide at steps 208, 210, 212, and 214. The texture analysis process can be performed at a lower magnification, such as at a 4× OR 10× objective, for a rapid analysis. One reason to operate at low magnification is to image the largest slide area at any one time. Since cells do not yet need to be resolved at this stage of the overall image analysis, the 4× magnification works well. Alternatively, a higher magnification scan can be performed, which may take additional time due to the field of view being smaller and requiring additional images to be processed. On a typical slide, as shown in FIG. 11, a portion 72 b of the end of the slide 72 is reserved for labeling with identification information. Excepting this label area, the entire slide or a portion thereof is scanned in a raster scan fashion to yield a number of adjacent images. Texture values for each window include the pixel variance over a window, the difference between the largest and smallest pixel value within a window, and other indicators. The presence of a smear or tissue raises the texture values compared with a blank area. One problem with a smear or tissue, from the standpoint of determining its location, is its non-uniform thickness and texture. For example, the smear or tissue is likely to be relatively thin at the edges and thicker towards the middle due to the nature of the smearing process. To accommodate this non-uniformity, texture analysis provides a texture value for each analyzed area. The texture value tends to gradually rise as the scan proceeds across a smear tissue from a thin area to a thick area, reaches a peak, and then falls off again to a lower value as a thin area at the edge is reached. The problem is then to decide from the series of texture values the beginning and ending, or the edges, of the smear or tissue. The texture values are fit to a square wave waveform since the texture data does not have sharp beginnings and endings. After conducting this scanning and texture evaluation operation, one must determine which areas of elevated texture values represent the desired smear or tissue 74 (see FIG. 11), and which represent undesired artifacts. This is accomplished by fitting a step function, on a line-by-line basis, to the texture values in step 216 (see FIG. 10). This function, which resembles a single square wave beginning at one edge and ending at the other edge and having an amplitude, provides the means for discrimination. The amplitude of the best-fit step function is utilized to determine whether smear (tissue) or dirt is present since relatively high values indicate smear (tissue). If it is decided that smear (tissue) is present, the beginning and ending coordinates of this pattern are noted until all lines have been processed, and the smear (tissue) sample area defined at 218. The first pass scan above can be used to determine a particular orientation of a sample. For example, digital images are comprised of a series of pixels arranged in a matrix, a grayscale value is can be attributed to each pixel to indicate the appearance thereof of the image. “Orientation matching” between two samples (e.g., two serial sections stained with different agents) is then performed by comparing these grayscale values relative to their positions in both the first sample image (i.e., the template) and the second sample image. A match is found when the same or similar pattern is found in the second image when compared to the first image. Such systems are typically implemented in a computer for use in various manufacturing and robotic applications and are applicable to the methods and systems of the disclosure. For example, such systems have been utilized to automate tasks such as semiconductor wafer handling operations, fiducial recognition for pick-and-place printed circuit board (PCB) assembly, machine vision for quantification or system control to assist in location of objects on conveyor belts, pallets, and trays, and automated recognition of printed matter to be inspected, such as alignment marks. The matrix of pixels used to represent such digital images are typically arranged in a Cartesian coordinate system or other arrangement of non-rectangular pixels, such as hexagonal or diamond shaped pixels. Recognition methods usually require scanning the search image scene pixel by pixel in comparison with the template, which is sought. Further, known search techniques allow for transformations such as rotation and scaling of the template image within the second sample image, therefore requiring the recognition method to accommodate for such transformations. Normalized grayscale correlation (NGC) has been used to match digital images reliably and accurately, as is disclosed in U.S. Pat. No. 5,602,937, entitled “Methods and Apparatus for Machine Vision High Accuracy Searching,” assigned to Cognex Corporation. In addition, such software is available commercially through the Matrox Imaging Library version 7.5 (Matrox Electronic Systems Ltd., Canada). After an initial focusing operation described further herein, the scan area of interest is scanned to acquire images for image analysis. In one aspect, a bar code or computer readable label placed at 72 b (see FIG. 11) comprises instructions regarding the processing parameters of a particular slide as well as additional information such as a subject's name/initials or other identification. Depending upon the type of scan to be performed (e.g., fluorescence or transmitted light) a complete scan of the slide at low magnification is made to identify and locate candidate objects of interest, followed by further image analysis of the candidate objects of interest at high magnification in order to confirm the candidate cells or objects of interest. It will be recognized that the results of an image analysis of a slide can be associated with the unique identifier (e.g., a barcode). For example, if a candidate object of interest or rare event is identified during a first imaging of a sample, a database comprising the unique identifier (e.g. barcode) can be updated to indicate that the slide having the certain identifier comprises a candidate object of interest or rare event. The unique identifier information can then be output to a technician or pathologist to indicate a slide for further processing or review. An alternate method of operation is to perform high magnification image analysis of each candidate object of interest immediately after the object has been identified at low magnification. The low magnification scanning then resumes, searching for additional candidate objects of interest. Since it takes on the order of a few seconds to change objectives, this alternate method of operation would take longer to complete. To identify structure in tissue that cannot be captured in a single field of view image or a single staining/labeling technique, the disclosure provides a method for histological reconstruction to analyze many fields of view on potentially many slides simultaneously. The method couples composite images in an automated manner for processing and analysis. A slide on which is mounted a cellular specimen-stained to identify objects of interest is supported on a motorized stage. An image of the cellular specimen is generated, digitized, and stored in memory. As the viewing field of the objective lens is smaller than the entire cellular specimen, a histological reconstruction is made. These stored images of the entire tissue section may then be placed together in an order such that for example, the H/E stained slide is paired with the immunohistochemistry slide, which in turn may be paired with a fluorescently labeled slide so that analysis of the images may be performed simultaneously. An overall detection process for a candidate cell or object of interest includes a combination of decisions made at both a low (e.g., 4× or 10×) and a high magnification (e.g., 40×) level. Decision-making at the low magnification level is broader in scope, e.g., objects that loosely fit the relevant color, size, and shape characteristics are identified at a 10× level. Analysis at the 40× magnification level then proceeds to refine the decision-making and confirm objects as likely cells or candidate objects of interest. For example, at the 40× level it is not uncommon to find that some objects that were identified at 10× are artifacts, which the analysis process will then reject. In addition, closely packed objects of interest appearing at 10× are separated at the 40× level. In a situation where a cell straddles or overlaps adjacent image fields, image analysis of the individual adjacent image fields could result in the cell being rejected or undetected. To avoid missing such cells, the scanning operation compensates by overlapping adjacent image fields in both the x and y directions. An overlap amount greater than half the diameter of an average cell is typical. In one embodiment, the overlap is specified as a percentage of the image field in the x and y directions. Alternatively, a reconstruction method as described above may be used to reconstruct the image from multiple fields of view. The reconstructed image is then analyzed and processed to find objects of interest. The time to complete an image analysis can vary depending upon the size of the scan area and the number of candidate cells or objects of interest identified. For example, in one embodiment, a complete image analysis of a scan area of two square centimeters in which 50 objects of interest are confirmed can be performed in about 12 to 15 minutes. This example includes not only focusing, scanning and image analysis but also the saving of 40× images as a mosaic on hard drive 21 (FIG. 2). However the scan area is defined, an initial focusing operation should be performed on each slide prior to scanning. This is typically performed since slides differ, in general, in their placement in a carrier. These differences include slight variations of tilt of the slide in its carrier. Since each slide must remain in focus during scanning, the degree of tilt of each slide must be determined. This is accomplished with an initial focusing operation that determines the exact degree of tilt, so that focus can be maintained automatically during scanning. The methods may vary from simple to more complex methods involving IR beam reflection and mechanical gauges. The initial focusing operation and other focusing operations to be described later utilize a focusing method based on processing of images acquired by the system. This method results in lower system cost and improved reliability since no additional parts need be included to perform focusing. FIG. 13A provides a flow diagram describing the “focus point” procedure. The basic method relies on the fact that the pixel value variance (or standard deviation) taken about the pixel value mean is maximum at best focus. A “brute-force” method could simply step through focus, using the computer controlled Z, or focus stage, calculate the pixel variance at each step, and return to the focus position providing the maximum variance. Such a method is time consuming. One method includes the determination of pixel variance at a relatively coarse number of focal positions, and then the fitting a curve to the data to provide a faster means of determining optimal focus. This basic process is applied in two steps, coarse and fine. With reference to FIG. 13A, during the coarse step at 220-230, the Z stage is stepped over a user-specified range of focus positions, with step sizes that are also user-specified. It has been found that for coarse focusing, these data are a close fit to a Gaussian function. Therefore, this initial set of variance versus focus position data are least-squares fit to a Gaussian function at 228. The location of the peak of this Gaussian curve determines the initial or coarse estimate of focus position for input to step 232. Following this, a second stepping operation 232-242 is performed utilizing smaller steps over a smaller focus range centered on the coarse focus position. Experience indicates that data taken over this smaller range are generally best fit by a second order polynomial. Once this least squares fit is performed at 240, the peak of the second order curve provides the fine focus position at 244. FIG. 14 illustrates a procedure for how this focusing method is utilized to determine the-orientation of a slide in its carrier. As shown, focus positions are determined, as described above, for a 3×3 grid of points centered on the scan area at 264. Should one or more of these points lie outside the scan area, the method senses this at 266 by virtue of low values of pixel variance. In this case, additional points are selected closer to the center of the scan area. FIG. 15 shows the initial array of points 80 and new point 82 selected closer to the center. Once this array of focus positions is determined at 268, a least squares plane is fit to this data at 270. Focus points lying too far above or below this best-fit plane are discarded at 272 (such as can occur from a dirty cover glass over the scan area), and the data is then refit. This plane at 274 then provides the desired Z position information for maintaining focus during scanning. After determination of the best-fit focus plane, the scan area is scanned in an X raster scan over the scan area as described earlier. During scanning, the X stage is positioned to the starting point of the scan area, the focus (Z) stage is positioned to the best fit focus plane, an image is acquired and processed as described later, and this process is repeated for all points over the scan area. In this way, focus is maintained automatically without the need for time-consuming refocusing at points during scanning. Prior to confirmation of candidate cells or objects of interest at a 40× or 60× level, a refocusing operation is conducted since the use of this higher magnification requires more precise focus than the best-fit plane provides. FIG. 16 provides the flow diagram for this process. As may be seen, this process is similar to the fine focus method described earlier in that the object is to maximize the image pixel variance. This is accomplished by stepping through a range of focus positions with the Z stage at 276 and 278, calculating the image variance at each position at 278, fitting a second order polynomial to these data at 282, and calculating the peak of this curve to yield an estimate of the best focus position at 284 and 286. This final focusing step differs from previous ones in that the focus range and focus step sizes are smaller since this magnification requires focus settings to within 0.5 micron or better. It should be noted that for some combinations of cell staining characteristics, improved focus can be obtained by numerically selecting the focus position that provides the largest variance, as opposed to selecting the peak of the polynomial. In such cases, the polynomial is used to provide an estimate of best focus, and a final step selects the actual Z position giving highest pixel variance. It should also be noted that if at any time during the focusing process at 40×0 or 60× the parameters indicate that the focus position is inadequate, the system automatically reverts to a coarse focusing process as described above with reference to FIG. 13A. This ensures that variations in specimen thickness can be accommodated in an expeditious manner. For some biological samples and stains, the focusing methods discussed above do not provide optimal focused results. For example, certain white blood cells known as neutrophils may be stained with Fast Red, a commonly known stain, to identify alkaline phosphatase in the cytoplasm of the cells. To further identify these cells and the material within them, the specimen may be counterstained with hematoxylin to identify the nucleus of the cells. In cells so treated, the cytoplasm bearing alkaline phosphatase becomes a shade of red proportionate to the amount of alkaline phosphatase in the cytoplasm and the nucleus becomes blue. However, where the cytoplasm and nucleus overlap, the cell appears purple. These color combinations may preclude the finding of a focused Z position using the focus processes discussed above. Where a sample has been labeled with a fluorescent agent the focus plane may be based upon the intensity of a fluorescent signal. For example, as the image scans through a Z-plane of the sample, the intensity of fluorescence will change as the focus plane passes closer to the fluorescence indicator. In an effort to find a best focal position at high magnification, a focus method, such as the one shown in FIG. 13B, may be used. That method begins by selecting a pixel near the center of a candidate object of interest 248 and defining a region of interest centered about the selected pixel 250. Typically, the width of the region of interest is a number of columns, which is a power of 2. This width determination arises from subsequent processing of the region of interest using a one dimensional Fast Fourier Transform (FFT) technique. As is well known in the art, processing columns of pixel values using the FFT technique is facilitated by making the number of columns to be processed a power of two. While the height of the region of interest is also a power of two, it need not be unless a two dimensional FFT technique is used to process the region of interest. After the region of interest is selected, the columns of pixel values are processed using a one dimensional FFT to determine a spectra of frequency components for the region of interest 252. The frequency spectra ranges from DC to some highest frequency component. For each frequency component, a complex magnitude is computed. The complex magnitudes for the frequency components, which range from approximately 25% of the highest component to approximately 75% of the highest component, are squared and summed to determine the total power for the region of interest 254. Alternatively, the region of interest may be processed with a smoothing window, such as a Hanning window, to reduce the spurious high frequency components generated by the FFT processing of the pixel values in the region of interest. Such preprocessing of the region of interest permits complex magnitudes over the complete frequency range to be squared and summed. After the power for a region has been computed and stored 256, a new focal position is selected, focus adjusted 258 and 260, and the process repeated. After each focal position has been evaluated, the one having the greatest power factor is selected as the one best in focus 262. The following describes the image processing methods which are utilized to decide whether a candidate object of interest such as, for example, a stained tumor cell is present in a given image, or field, during the scanning process. Candidate objects of interest, which are detected during scanning, can be reimaged at higher (40× or 60× ) magnification, the decision confirmed, and an image of the object of interest as well as its coordinates saved for later review. Alternatively, the sample can be removed and further processed with one or more additional reagents and then reimaged. In one aspect of the disclosure, objects of interest are first acquired and identified under transmitted light. The image processing includes color space conversion, low pass filtering, background suppression, artifact suppression, morphological processing, and/or blob analysis. One or more of these steps can optionally be eliminated. The operator may optionally configure the system to perform any or all of these steps and whether to perform certain steps more than once or several times in a row. It should also be noted that the sequence of steps may be varied and thereby optimized for specific reagents or reagent combinations; however, a typical sequence is described herein. An overview of the identification process is shown in FIG. 17A. The process for identifying and locating candidate objects of interest in a stained biological sample under transmitted light on a slide begins with an acquisition of images obtained by scanning the slide at low magnification 288. Each image is then converted from a first color space to a second color space 290 and the color converted image is low pass filtered 292. The pixels of the low pass filtered image are then compared to a threshold 294 and those pixels having a value equal to or greater than the threshold are identified as candidate object of interest pixels and those less than the threshold are determined to be artifact or background pixels. The candidate object of interest pixels are then morphologically processed to identify groups of candidate object of interest pixels as candidate objects of interest 296. These candidate objects of interest are then compared to blob analysis parameters 298 to further differentiate candidate objects of interest from objects, which do not conform to the blob analysis parameters and do not warrant further processing. The location of the candidate objects of interest may be stored prior to confirmation at high magnification. Alternatively, the location of the candidate objects of interest are stored and the slide comprising the sample is further processed with one or more additional reagents, then reimaged at the identified locations. The process continues by determining whether the candidate objects of interest have been confirmed 300. If they have not been confirmed, the optical system is set to reprocess the sample at a higher magnification 302 or using a different imaging technique by obtaining images of the slide at the locations corresponding to the candidate objects of interest identified when the low magnification images were acquired 288. These images are then color converted 290, low pass filtered 292, compared to a threshold 294, morphologically processed 296, and compared to blob analysis parameters 298 to confirm which candidate objects of interest located from the low magnification images are objects of interest. The coordinates of the objects of interest are then stored for future reference. In general, the candidate objects of interest, such as tumor cells, are detected based on a combination of characteristics, including size, shape, and color. The chain of decision making based on these characteristics begins with a color space conversion process. The optical sensing array coupled to the microscope subsystem outputs a color image comprising a matrix of pixels. Each pixel comprises red, green, and blue (RGB) signal values. It is desirable to transform the matrix of RGB values to a different color space because the difference between candidate objects of interest and their background, such as tumor and normal cells, may be determined from their respective colors. Samples are generally stained with one or more standard stains (e.g., DAB, New Fuchsin, AEC), which are “reddish” in color. Candidate objects of interest retain more of the stain and thus appear red while normal cells remain unstained. The specimens may also be counterstained with hematoxylin so the nuclei of normal cells or cells not containing an object of interest appear blue. In addition to these objects, dirt and debris can appear as black, gray, or can also be lightly stained red or blue depending on the staining procedures utilized. The residual plasma or other fluids also present on a smear (tissue) may also possess some color. In the color conversion operation, a ratio of two of the RGB signal values is formed to provide a means for discriminating color information. With three signal values for each pixel, nine different ratios can be formed: R/R, R/G, R/B, G/G, G/B, G/R, B/B, B/G, B/R. The optimal ratio to select depends upon the range of color information expected in the slide sample. As noted above, typical stains used in light microscopy for detecting candidate objects of interest such as tumor cells are predominantly red, as opposed to predominantly green or blue. Thus, the pixels of an object of interest that has been stained would contain a red component, which is larger than either the green or blue components. A ratio of red divided by blue (R/B) provides a value which is greater than one for, e.g. tumor cells, but is approximately one for any clear or white areas on the slide. Since other components of the sample, for example, normal cells, typically are stained blue, the R/B ratio for pixels of these other components (e.g., normal cells) yields values of less than one. The R/B ratio is used for separating the color information typical in these applications. FIG. 17B illustrates the flow diagram by which this conversion is performed. In the interest of processing speed, a conversion can be implemented with a look up table. The use of a look up table for color conversion accomplishes three functions: 1) performing a division operation; 2) scaling the result for processing as an image having pixel values ranging from 0 to 255; and 3) defining objects which have low pixel values in each color band (R,G,B) as “black” to avoid infinite ratios (e.g., dividing by zero). These “black” objects are typically staining artifacts or can be edges of bubbles caused by placing a coverglass over the specimen. Once the look up table is built at 304 for the specific color ratio (e.g., choices of tumor and nucleated cell stains), each pixel in the original RGB image is converted at 308 to produce the output. Since it is of interest to separate the red stained tumor cells from blue stained normal ones, the ratio of color values is then scaled by a user specified factor. As an example, for a factor of 128 and the ratio of (red pixel value)/(blue pixel value), clear areas on the slide would have a ratio of 1 scaled by 128 for a final X value of 128. Pixels that lie in red stained tumor cells would have X value greater than 128, while blue stained nuclei of normal cells would have value less than 128. In this way, the desired objects of interest can be numerically discriminated. The resulting pixel matrix, referred to as the X-image, is a gray scale image having values ranging from 0 to 255. Other methods exist for discriminating color information. One classical method converts the RGB color information into another color space, such as HSI (hue, saturation, intensity) space. In such a space, distinctly different hues such as red, blue, green, yellow, may be readily separated. In addition, relatively lightly stained objects may be distinguished from more intensely stained ones by virtue of differing saturations. Methods of converting from RGB space to HSI space are described in U.S. Pat. No. 6,404,916 B1, the entire contents of which are incorporated by reference. In brief, color signal inputs are received by a converter that converts the representation of a pixel's color from red, green, and blue (RGB) signals to hue, saturation, and intensity signals (HSI). The conversion of RGB signals to HSI signals is equivalent to a transformation from the rectilinear RGB coordinate system used in color space to a cylindrical coordinate system in which hue is the polar coordinate, saturation is the radial coordinate, and intensity is the axial coordinate, whose axis lies on a line between black and white in coordinate space. A number of algorithms to perform this conversion are known, and computer chips are available to perform the algorithms. Exemplary methods include a process whereby a signal representative of a pixel color value is converted to a plurality of signals, each signal representative of a component color value including a hue value, a saturation value, and an intensity value. For each component color value, an associated range of values is set. The ranges together define a non-rectangular subvolume in HSI color space. A determination is made whether each of the component values falls within the associated range of values. The signal is then outputting, indicating whether the pixel color value falls within the color range in response to each of the component values falling within the associated range of values. The range of values associated with the hue value comprises a range of values between a high hue value and a low hue value, the range of values associated with the saturation value comprises a range of values above a low saturation value, and the range of values associated with the intensity value comprises a range of values between a high intensity value and a low intensity value. Such methods can be executed on an apparatus that may include a converter to convert a signal representative of a pixel color value to a plurality of signals representative of component color values including a hue value, a saturation value, and an intensity value. The hue comparator determines if the hue value falls within a first range of values. The apparatus may further include a saturation comparator to determine if the saturation value falls within a second range of values, as well as an intensity comparator to determine if the intensity value falls within a third range of values. In addition, a color identifier connected to each of the hue comparator, the saturation comparator, and the intensity comparator, is adapted to output a signal representative of a selected color range in response to the hue value falling within the first range of values, the saturation value falling within the second range of values, and the intensity value falling within the third range of values. The first range of values, the second range of values, and the third range of values define a non-rectangular subvolume in HSI color space, wherein the first range of values comprises a plurality of values between a low hue reference value and a high hue reference value, the second range of values comprises a plurality of values above a low saturation value, and the third range of values comprises a plurality of values between a low intensity value and a high intensity value. In yet another approach, one could obtain color information by taking a single color channel from the optical sensing array. As an example, consider a blue channel, in which objects that are red are relatively dark. Objects which are blue, or white, are relatively light in the blue channel. In principle, one could take a single color channel, and simply set a threshold wherein everything darker than some threshold is categorized as a candidate object of interest, for example, a tumor cell, because it is red and hence dark in the channel being reviewed. However, one problem with the single channel approach occurs where illumination is not uniform. Non-uniformity of illumination results in non-uniformity across the pixel values in any color channel, for example, tending to peak in the middle of the image and dropping off at the edges where the illumination falls off. Performing thresholding on this non-uniform color information runs into problems, as the edges sometimes fall below the threshold, and therefore it becomes more difficult to pick the appropriate threshold level. However, with the ratio technique, if the values of the red channel fall off from center to edge, then the values of the blue channel also fall off center to edge, resulting in a uniform ratio at non-uniform lighting. Thus, the ratio technique is more immune to illumination. As described, the color conversion scheme is relatively insensitive to changes in color balance, e.g., the relative outputs of the red, green, and blue channels. However, some control is necessary to avoid camera saturation, or inadequate exposures in any one of the color bands. This color balancing is performed automatically by utilizing a calibration slide consisting of a clear area, and a “dark” area having a known optical transmission or density. The system obtains images from the clear and “dark” areas, calculates “white” and “black” adjustments for the image-frame grabber or image processor 25, and thereby provides correct color balance. In addition to the color balance control, certain mechanical alignments are automated in this process. The center point in the field of view for the various microscope objectives as measured on the slide can vary by several (or several tens of) microns. This is the result of slight variations in position of the microscope objectives 44 a as determined by the turret 44 (FIGS. 2 and 4), small variations in alignment of the objectives with respect to the system optical axis, and other factors. Since it is desired that each microscope objective be centered at the same point, these mechanical offsets must be measured and automatically compensated. At each pixel location, a 3×3 matrix comprising the pixel of interest and its neighbors is multiplied by the coefficient matrix and summed to yield a single value for the pixel of interest. The output of this spatial convolution process is again a pixel matrix. As an example, consider a case where the center pixel and only the center pixel, has a value of 255 and each of its other neighbors, top left, top, top right and so forth, have values of 0. This singular white pixel case corresponds to a small object. The result of the matrix multiplication and addition using the coefficient matrix is a value of (1/9)*255 or 28.3 for the center pixel, a value which is below the nominal threshold of 128. Now consider another case in which all the pixels have a value of 255 corresponding to a large object. Performing the low pass filtering operation on a 3×3 matrix for this case yields a value of 255 for the center pixel. Thus, large objects retain their values while small objects are reduced in amplitude or eliminated. In one method of operation, the low pass filtering process is performed on the X image twice in succession. In order to separate objects of interest, such as a tumor cell in the x image from other objects and background, a thresholding operation is performed designed to set pixels within candidate cells or objects of interest to a value of 255, and all other areas to 0. Thresholding ideally yields an image in which cells of interest are white and the remainder of the image is black. A problem one faces in thresholding is where to set the threshold level. One cannot simply assume that cells of interest are indicated by any pixel value above the nominal threshold of 128. A typical imaging system may use an incandescent halogen light bulb as a light source. As the bulb ages, the relative amounts of red and blue output can change. The tendency as the bulb ages is for the blue to drop off more than the red and the green. To accommodate for this light source variation over time, a dynamic thresholding process is used whereby the threshold is adjusted dynamically for each acquired image. Thus, for each image, a single threshold value is derived specific to that image. As shown in FIG. 18, the basic method is to calculate, for each field, the mean X value, and the standard deviation about this mean 312. The threshold is then set at 314 to the mean plus an amount defined by the product of a factor (e.g., a user specified factor) and the standard deviation of the color converted pixel values. The standard deviation correlates to the structure and number of objects in the image. Typically, a user specified factor is in the range of approximately 1.5 to 2.5. The factor is selected to be in the lower end of the range for slides in which the stain has primarily remained within cell boundaries and the factor is selected to be in the upper end of the range for slides in which the stain is pervasively present throughout the slide. In this way, as areas are encountered on the slide with greater or lower background intensities, the threshold may be raised or lowered to help reduce background objects. With this method, the threshold changes in step with the aging of the light source such that the effects of the aging are canceled out. The image matrix resulting at 316 from the thresholding step is a binary image of black (0) and white (255) pixels. As is often the case with thresholding operations such as that described above, some undesired areas will lie above the threshold value due to noise, small stained cell fragments, and other artifacts. It is desired and possible to eliminate these artifacts by virtue of their small size compared with legitimate cells of interest. In one aspect, morphological processes are utilized to perform this function. Morphological processing is similar to the low pass filter convolution process described earlier except that it is applied to a binary image. Similar to spatial convolution, the morphological process traverses an input image matrix, pixel by pixel, and places the processed pixels in an output matrix. Rather than calculating a weighted sum of the neighboring pixels as in the low pass convolution process, the morphological process uses set theory operations to combine neighboring pixels in a nonlinear fashion. FIG. 19 illustrates the flow diagram for this process. A single morphological open consists of a single morphological erosion 320 followed by a single morphological dilation 322. Multiple “opens” consist of multiple erosions followed by multiple dilations. In one embodiment, one or two morphological opens are found to be suitable. At this point in the processing chain, the processed image contains thresholded objects of interest, such as tumor cells (if any were present in the original image), and possibly some residual artifacts that were too large to be eliminated by the processes above. FIG. 20 provides a flow diagram illustrating a blob analysis performed to determine the number, size, and location of objects in the thresholded image. A blob is defined as a region of connected pixels having the same “color”, in this case, a value of 255. Processing is performed over the entire image to determine the number of such regions at 324 and to determine the area and coordinates for each detected blob at 326. Comparison of the size of each blob to a known minimum area at 328 for a tumor cell allows a refinement in decisions about which objects are objects of interest, such as tumor cells, and which are artifacts. The location of candidate cells or objects of interest identified in this process are saved for a higher magnification reimaging step described herein. Objects not passing the size test are disregarded as artifacts. The processing chain described herein identifies candidate cells or objects of interest at a scanning magnification. As illustrated in FIG. 21, at the completion of scanning, the system switches to a higher magnification objective (e.g., 40×) at 330, and each candidate cell or object of interest is reimaged to confirm the identification 332. Each 40× image is reprocessed at 334 using the same steps as described above but with test parameters suitably modified for the higher magnification. At 336, a region of interest centered on each confirmed cell is saved to the hard drive for review by the pathologist. Alternatively, the slide is identified for further processing with one or more additional reagents because it compresses a candidate object of interest. The slide in this instance is removed and processed with additional reagent(s) that assist in characterizing the candidate object of interest. The slide, once processed with an additional reagent is reimaged using the imaging algorithms and processed as described herein. Similarly, once imaging has been performed in transmitted light imaging in fluorescent light may be performed using a process described above. For example, as illustrated in FIG. 21, at the completion of scanning and imaging at a higher magnification under transmitted light, the system switches from transmitted light to fluorescent excitation light and obtains images at a desired magnification objective (e.g., 40×) at 330, and each candidate cell or object of interest identified under transmitted light is reimaged under fluorescent light 332. Each fluorescent image is then processed at 334 but with test parameters suitably modified for the fluorescent imaging. At 336, fluorescent image comprising a fluorescently labeled object of interest is saved to storage device for review by a pathologist. As noted earlier, a mosaic of saved images is made available for review by a pathologist. As shown in FIG. 22, a series of images of cells that have been confirmed by the image analysis is presented in the mosaic 150. The pathologist can then visually inspect the images to make a determination whether to accept (152) or reject (153) each cell image. Such a determination can be noted and saved with the mosaic of images for generating a printed report. In addition to saving an image of a candidate cell or object of interest, the coordinates are saved should the pathologist wish to directly view the cell through the oculars or on the image monitor. In this case, the pathologist reloads the slide carrier, selects the slide and cell for review from a mosaic of cell images, and the system automatically positions the cell under the microscope for viewing. It has been found that normal cells whose nuclei have been stained with hematoxylin are often quite numerous, numbering in the thousands per 10× image. Since these cells are so numerous, and since they tend to clump, counting each individual nucleated cell would add an excessive-processing burden, at the expense of speed, and would not necessarily provide an accurate count due to clumping. The apparatus performs an estimation process in which the total area of each field that is stained hematoxylin blue is measured and this area is divided by the average size of a nucleated cell. FIG. 23 outlines this process. In this process, an image is acquired 340, and a single color band (e.g., the red channel provides the best contrast for blue stained nucleated cells) is processed by calculating the average pixel value for each field at 342, thereby establishing two threshold values (high and low) as indicated at 344, 346, and counting the number of pixels between these two values at 348. In the absence of dirt, or other opaque debris, this provides a count of the number of predominantly blue pixels. By dividing this value by the average area for a nucleated cell at 350, and looping over all fields at 352, an approximate cell count is obtained. This process yields an accuracy of +/−15%. It should be noted that for some slide preparation techniques, the size of nucleated cells can be significantly larger than the typical size. The operator can select the appropriate nucleated cell size to compensate for these characteristics. Referring to FIG. 24, the functions available in a user interface of the apparatus 10 are shown. From the user interface, which is presented graphically on computer monitor 26, an operator can select among apparatus functions that include acquisition 402, analysis 404, and configuration 406. At the acquisition level 402, the operator can select between manual 408 and automatic 410. modes of operation. In the manual mode, the operator is presented with manual operations 409. Patient information 414 regarding an assay can be entered at 412. In the analysis level 404, preview 416 and report 418 functions are made available. At the preview level 416, the operator can select a montage function 420. At this montage level, a pathologist can perform diagnostic review functions including visiting an image 422, accept/reject a cell 424, nucleated cell counting 426, accept/reject cell counts 428, and saving of pages 430. The report level 418 allows an operator to generate patient reports 432. In the configuration level 406, the operator can select to configure preferences 434, input operator information436 including Name, affiliation and phone number 437, create a system log 438, and toggle a menu panel 440. The configuration preferences include scan area selection functions 442 and 452; montage specifications 444, bar code handling 446, default cell counting 448, stain selection 450, and scan objective selection 454. An exemplary microscope subsystem 32 for processing fluorescently labeled samples is shown in FIG. 25. A carrier 60 having four slides thereon is shown. The number of slide in different embodiments can be greater than or less than four. An input hopper 16 for carriers with mechanisms to load a carrier 60 onto the stage at the bottom. Precision XY stage 38 with mechanism to hold carriers is shown. A turret 44 with microscope objective lenses 44 a mounted on z axis stage is shown. Carrier outfeed tray 36 with mechanism 34 to drop carriers into slide carrier output hopper 18. The slide carrier output hopper 18 is a receptacle for those slides that have already been scanned. Bright field (transmission) light source 48 and fluorescent excitation light source 45 are also shown. Filter wheels 47 for fluorescent light path are shown, as well as a fold mirror 47 a in the fluorescent light path. A bar code/OCR reader 33 is shown. Also shown are a computer controlled wheel 44 b carrying fluorescent beam splitters (one position is empty for bright field mode) and a camera 42 capable of collecting both bright field (video rate) images and fluorescent (integrated) images. An exemplary operating sequence is provided; however, it should be noted that other operating sequences may eliminate one or more steps and/or include one or more additional steps. 1) The operator enters each slide into a database entering the slide's unique identifying mark (a barcode or OCR string) and, for example, the test that should be performed on the slide. 2) The slides are placed in carriers 60 and loaded into the input hopper 16. 3) The infeed hopper 16 advances a carrier 60 onto the stage 38. 4) The barcode/OCR reader 33 reads the mark and the required test or imaging technique is looked up in a database. 5) The appropriate imaging technique (e.g., bright field or fluorescence) is carried out. For example, the bright field light source 48 is switched on. 6) The entire sample on the slide is scanned at a moderate magnification. Optionally distinctive features may be identified and their coordinates stored for correction of coordinates in serial subsamples. 6a.) Optionally these images are saved and stitched together to form an image of the slide. 7) Image analysis routines are used to determine which regions of the slide or which slides should be recorded and further processed with one or more additional reagents (the methods used to make this determination are described herein, the exact parameters will depend on the test being performed on the slide). 8) The slide is indicated in a database as a candidate for further processing with additional reagent(s) based upon the identification of one or more candidate objects of interest on the slide. i) The slide is contacted with one or more additional regents useful to further characterize the candidate object of interest. ii) The slide is reimaged using an imaging technique appropriate for the one or more additional reagents and based upon the stored location of the candidate object of interest identified in (6) above. 9) The turret 44 is switched to higher power and images are obtained. Alternatively, the turret 44 is switched to a higher power and the bright field transmission light source turned off and the fluorescent excitation light source is turned on. 10) High magnification images of the candidate cells or objects of interest identified in step 8 would be collected. Because the critical regions would be a small fraction of the slide this would take much less time than imaging the entire slide. Alternatively, a serial subsample slides is advanced and processed to identify the coordinates of the distinctive features identified in (6) above. The coordinates of any object of interest are then corrected in the subsample and the X-Y stage moves to the corrected coordinates to obtain fluorescent images. 11) Optionally (depending on the test) multiple images at a series of focus planes would be collected at each critical location. These would be used in tests that require a volumetric reconstruction of the nuclei of a cell. 12) All the images collected from the slide would be written to the database optionally with compression. 13) Anytime after the slides have been read and the images recorded into the database, a pathologist could review the images at a review station (e.g., a computer and monitor attached to the database but without a microscope). 14) The user could manually count fluorescent signals in the cells of interest or invoke image analysis software to score the fluorescent images by indicating regions of interest with a pointing device such as a mouse. If multiple focus planes have been collected the user could simulate focusing up and down in a live image by sweeping through a range of images at different focus levels. 15) Based on the calculated score, a diagnostic report can be generated. Alternatively, the image analysis could be performed on the entirety of all regions for which fluorescent images were collected. In this case, the analysis could be performed off line between the time the image was collected and the time the user reviewed the image. When reviewing the images, the user could indicate regions whose scores should be included or excluded in creating the final report. The automated detection of fluorescent specimens may be performed using a single slide or multiple slides. In using a single slide, the initial scan, under lower power and transmitted light, can be performed on the same slide as the one from which the fluorescent images will be made or vice versa. In this case, the slide is removed and processed between imaging techniques with a reagent that can more accurately identify the candidate object of interest. Alternatively, the initial scan can be performed on a slide, and the data collected therefrom, and the subsequent processing (e.g., with one or more additional reagents) can be collected from another slide having an adjacent serial section to the one that was initially scanned. In this case, the coordinates of any identified candidate objects of interest need to be corrected based upon the coordinates of any distinctive features in the serial samples. Fluorescent images may also be collected from multiple serial sections. For example, in situations where more than one fluorescent study is desired for a particular tissue, different studies can be carried out on adjacent sections placed on different slides. The slides of the different studies can be analyzed at high resolution and/or fluorescence from data collected from the initial scan of the first slide. In using adjacent tissue sections on multiple slides, however, it is desirable to orient the sections so that the specimens will correlate from one section to the other(s). This can be done by using landmarks, such as at least two unique identifiers or distinctive features, or outlining the tissue. Algorithms are known that can be used to calculate a location on the second or additional slides that can be mapped to any given location of the first slide. Examples of such algorithms are provided herein and include techniques as disclosed in U.S. Pat. Nos. 5,602,937 and 6,272,247, the disclosures of which are incorporated herein by reference in their entirety. In addition, such computer algorithms are commercially available from Matrox Electronic Systems Ltd. (Matrox Imagining Library (MIL) release 7.5). Regardless of whether a single slide or multiple slides are used in the analysis, methods of selecting relevant regions of the slide for analysis are needed. It is desirable that the-method be sufficiently selective so that time will not be wasted collecting images that the user never scores or includes in the report. However, it is also desirable that the method not be too selective, as the user may see a region that seems important in the bright field image and find that there is no high power fluorescent image in that region. Examples of methods for selecting the regions of the slide for fluorescing and/or high power magnification are provided. In some methods, there will be criteria known a priori, that can be evaluated by image analysis. For instance, in testing for Her2 gene amplification, the IHC stain for the gene product can be used. This will mark any region of the tissue overexpressing the gene product (the protein Her2) a brown color. The image processing functions of densitometry or color thresholding can be used to convert the image to a map of the concentration of the protein. Once a map of relevant regions is available, the system could collect high magnification fluorescent images of either all regions that meet a criteria or a random sample of the relevant regions. Another example would be the use of the blue stain H&E to find regions of containing tumor cells. In this case, color thresholding for regions of darker blue will tend to find regions of containing tumor cells. In other methods of selecting regions, one could use statistical methods that do not require a-priori knowledge to map the tissue sample into some number of zones that share some measurable characteristic. The system could then collect fluorescent images of samples of each zone. When the user reviews the bright field image of the entire tissue and selected regions in which to examine the fluorescent high magnification images, the system could offer an image of another region in the same zone with similar characteristics. There are a number of known algorithms that could be used for dividing the tissue into zones. For instance, if the tissue were divided into a grid and the average color of each grid element were measured, these could be plotted in color space and cluster analysis used to group them into a limited number of zones with similar color. There are also texture analysis algorithms that will partition an image into a number of zones each with similar texture. In still other methods, it may occur that on review of the bright field image, the user may find a region in which she may want to see a fluorescent image and, for whatever reason, the algorithm did not make a fluorescent image that is usable. In this case, the system could be programmed to write the location of the region the user wanted back into the database so that, if the slide is reloaded into the microscope, the system can collect a fluorescent high magnification image at the exact location desired. This mode of operation could either be a fallback for the methods of selecting regions described above or a separate mode of operation in tests in which only the observer's judgment is suitable for deciding which regions are important to examine as fluorescent images. The HER2/neu marker, for example, may be detected though the use of an anti-HER2/neu staining system, such as a commercially available kit, like that provided by DAKO (Carpinteria, Calif.). A typical immunohistochemistry protocol includes: (1) prepare wash buffer solution; (2) deparaffinize and rehydrate sample or subsample; (3) perform epitope retrieval. Incubate 40 min in a 95° C. water bath. Cool slides for 20 min at room temperature; (4) apply peroxidase blocking reagent. Incubate 5 min; (5) apply primary antibody or negative control reagent. Incubate 30 min+/−1 min at room temperature. Rinse in wash solution. Place in wash solution bath; (6) apply peroxidase labeled polymer. Incubate 30 min+/−1 min at room temperature. Rinse in wash solution. Place in wash solution bath; (7) prepare DAB substrate chromagen solution; (8) apply substrate chromogen solution (DAB). Incubate 5-10 min. Rinse with distilled water; (9) counterstain; (10) mount coverslips. The slide includes a cover-slip medium to protect the sample and to introduce optical correction consistent with microscope objective requirements. A coverslip typically covers the entire prepared specimen. Mounting the coverslip does not introduce air bubbles obscuring the stained specimen. This coverslip could potentially be a mounted 1-½ thickness coverslip with DAKO Ultramount medium; (11) a set of staining control slides are run with every worklist. The set includes a positive and negative control. The positive control is stained with the anti-HER2 antibody and the negative is stained with another antibody. Both slides are identified with a unique barcode. Upon reading the barcode, the instrument recognizes the slide as part of a control set, and runs the appropriate application. There may be one or two applications for the stain controls; (12) a set of instrument calibration slides includes the slides used for focus and color balance calibration; (13) a dedicated carrier is used for one-touch calibration. Upon successful completion of this calibration procedure, the instrument reports itself to be calibrated. Upon successful completion of running the standard slides, the user is able to determine whether the instrument is within standards and whether the inter-instrument and intra-instrument repeatability of test results. A hematoxylin/eosin (H/E) slide is prepared with a standard H/E protocol. Standard solutions include the following: (1) Gills hematoxylin (hematoxylin 6.0 g; aluminum sulphate 4.2 g; citric acid 1.4 g; sodium iodate 0.6 g; ethylene glycol 269 ml; distilled water 680 ml); (2) eosin (eosin yellowish 1.0 g; distilled water 100 ml); (3) lithium carbonate 1% (lithium carbonate 1 g; distilled water 100 g); (4) acid alcohol 1% 70% (alcohol 99 ml conc.; hydrochloric acid 1 ml); and (5) Scott's tap water. In a beaker containing 1 L distilled water, add 20 g sodium bicarbonate and 3.5 g magnesium sulphate. Add a magnetic stirrer and mix thoroughly to dissolve the salts. Using a filter funnel, pour the solution into a labeled bottle. The staining procedure is as follows: (1) bring the sections to water; (2) place sections in hematoxylin for 5 min; (3) wash in tap water; (4) ‘blue’ the sections in lithium carbonate or Scott's tap water; (5) wash in tap water; (6) place sections in 1% acid alcohol for a few seconds; (7) wash in tap water; (8) place sections in eosin for 5 min; (9) wash in tap water; and (10) dehydrate, clear mount sections. The results of the H/E staining provide cells with nuclei stained blue-black, cytoplasm stained varying shades of pink; muscle fibers stained deep pinky red; fibrin stained deep pink; and red blood cells stained orange-red. In another aspect, the disclosure provides automated methods for analysis of estrogen receptor and progesterone receptor. The estrogen and progesterone receptors, like other steroid hormone receptors, play a role in developmental processes and maintenance of hormone responsiveness in cells. Estrogen and progesterone receptor interaction with target genes is of importance in maintenance of normal cell function and is also involved in regulation of mammary tumor cell function. The expression of progesterone receptor and estrogen receptor in breast tumors is a useful indicator for subsequent hormone therapy. An anti-estrogen receptor antibody labels epithelial cells of breast carcinomas which express estrogen receptor. An immunohistochemical assay of the estrogen receptor is performed using an anti-estrogen receptor antibody, for example the well-characterized 1D5 clone, and the methods of Pertchuk, et al. (Cancer 77: 2514-2519, 1996) or a commercially available immunohistochemistry system such as that provided by DAKO (Carpenteria Calif.; DAKO LSAB2 Immunostaining System). Accordingly, the disclosure provides a method whereby tumor cells are identified using a first agent and normal light microscopy and then further characterized using antibodies to a progesterone and/or estrogen receptor, wherein the antibodies are tagged with a fluorescent agent. For example, the labeling of progesterone receptor has been demonstrated in the nuclei of cells from various histologic subtypes. An anti-progesterone receptor antibody labels epithelial cells of breast carcinomas which express progesterone receptor. An immunohistochemical assay of the progesterone receptor is performed using an anti-estrogen receptor antibody, for example the well-characterized 1A6 clone and methods similar to those of Pertchuk, et al. (Cancer 77: 2514-2519, 1996). Micrometastases/metastatic recurring disease (MM/MRD). Metastasis is the biological process whereby a cancer spreads to a distant part of the body from its original site. A micrometastases is the presence of a small number of tumor cells, particularly in the lymph nodes and bone marrow. A metastatic recurring disease is similar to micrometastasis, but is detected after cancer therapy rather than before therapy. An immunohistochemical assay for MM/MRD is performed using a monoclonal antibody that reacts with an antigen (a metastatic-specific mucin) found in bladder, prostate and breast cancers. An MM/MRD can be identified by first staining cells to identify nucleic and cellular organelles or alternatively by staining cells to differentiate between bladder and other prostate cells. The sample or subsample can then be stained with antibody to a mucin protein, wherein the antibody is detectably labeled with a fluorescent molecule. In this way, a first subsample is prescreened to identify objects of interest including a particular cell type and then screened with a specific antibody to a molecule of interest associated with the object of interest. The first screening step allows for an automated system to identify the coordinates in a sample having the object of interest whereby the coordinates are then used to focus and obtaining additional images in a sample treated with one or more additional reagents at the same coordinates. Another example of the application of the disclosure includes the use of MIB-1. MIB-1 is an antibody that detects the antigen Ki-67. The clinical stage at first presentation is related to the proliferative index measured with Ki-67. High index values of Ki-67 are positively correlated with metastasis, death from neoplasia, low disease-free survival rates, and low overall survival rates. For example, a first agent (e.g., a staining agent) is used to identify an object of interest such as a marker for cancer cells. A diagnosis or prognosis of a subject may then be performed by further analyzing any object of interest for the presence of Ki-67 using an antibody that is detectably labeled with a fluorescent agent. The coordinates of any such object of interest (e.g., a suspected cancer cell) are then used to focus and obtain a fluorescent image of a sample or subsample contacted with a fluorescently labeled MIB-1. The presence of a fluorescent signal at such coordinates is indicative of a correlation of the cancer cell with metastasis and/or survival rates. In another aspect, microvessel density analysis can be performed and a determination of any cytokines, angiogenic agents, and the like, which are suspected of playing a role in the angiogenic activity identified. Angiogenesis is a characteristic of growing tumors. By identifying an angiogenic agent that is expressed or produced aberrantly compared to normal tissue, a therapeutic regimen can be identified that targets and modulates (e.g., increases or decreases) the angiogenic molecule or combination of molecules. For example, endothelial cell proliferation and migration are characteristic of angiogenesis and vasculogenesis. Endothelial cells can be identified by markers on the surface of such endothelial cells using a first agent that labels endothelial cells. An automated microscope system (such as that produced by ChromaVision Medical Systems, Inc., California) scans the sample for objects of interest (e.g., endothelial cells) stained with the first reagent. The automated system then determines the coordinates of an object of interest and uses these coordinates to focus in on the sample or a subsample that has been contacted with a second fluorescently labeled reagent. In one aspect, a second agent (e.g., an antibody, polypeptide, and/or oligonucleotide) that is labeled with a fluorescent indicator is then used to detect the specific expression or presence of any number of angiogenic agents. Overexpression of the p53 oncogene has been implicated as the most common genetic alteration in the development of human malignancies. Investigations of a variety of malignancies, including neoplasms of breast, colon, ovary, lung, liver, mesenchyme, bladder and myeloid, have suggested a contributing role of p53 mutation in the development of malignancy. The highest frequency of expression has been demonstrated in tumors of the breast, colon, and ovary. A wide variety of normal cells do express a wildtype form of p53 but generally in restricted amounts. Overexpression and mutation of p53 have not been recognized in benign tumors or in normal tissue. In addition, p53 has also be implicated as a cocontributor to tumors. For example, BRCA-1 has been used as marker for ovarian cancer, however p53 has also been implicated as playing a role in BRCA-1 ovarian cancers (Rose and Buller, Minerva Ginecol. 54(3):201-9, 2002). Using the methods of the disclosure a sample is stained for BRCA-1 with a first reagent and objects of interest are identified using light microscopy. The same sample or a subsample, having substantially identical coordinates with respect to an object of interest, is then contacted with a second reagent comprising a fluorescent label that interacts with a p53 nucleic acid or polypeptide. The sample or subsample is then analyzed via fluorescent microscopy to identify any fluorescent signals at the coordinates associated with the object of interest to determine the presence or absence of p53 nucleic acids or polypeptides. An anti-p53 antibody useful in this embodiment includes, for example, the well-characterized DO-7 clone. An example of an object of interest includes nucleoli, an organelle in a cell nucleus. Uses of nucleoli as objects of interest are apparent when determining cervical dysplasia. In cervical dysplasia normal or metaplastic epithelium is replaced with atypical epithelial cells that have cytologic features that are pre-malignant (nuclear hyperchromatism, nuclear enlargement and irregular outlines, increased nuclear-to-cytoplasmic ratio, increased prominence of nucleoli) and chromosomal abnormalities. The changes seen in dysplastic cells are of the same kind but of a lesser degree than those of frankly malignant cells. In addition, there are degrees of dysplasia (mild, moderate, severe). In yet another aspect, object of interest may be the p24 antigen of Human immunodeficiency virus (HIV). Anti-p24 antibodies are used to detect the p24 antigen to determine the presence of the HIV virus. Further assays can then be performed using FISH to determine the genetic composition of the HIV virus using fluorescently labeled oligonucleotide probes and the like. One method of sample preparation is to react a sample or subsample with a reagent that specifically interacts with a molecule in the sample. Examples of such reagents include a monoclonal antibody, a polyclonal antiserum, or an oligonucleotide or polynucleotide. Interaction of the reagent with its cognate or binding partner can be detected using an enzymatic reaction, such as alkaline phosphatase or glucose oxidase or peroxidase to convert a soluble colorless substrate linked to the agent to a colored insoluble precipitate, or by directly conjugating a dye or a fluorescent molecule to the probe. In one aspect of the disclosure a first reagent is labeled with a non-fluorescent label (e.g., a substrate that gives rise to a precipitate) and a second reagent is labeled with a fluorescent label. If the same sample is to be used for both non-fluorescent detection and fluorescent detection, the non-fluorescent label preferably does not interfere with the fluorescent emissions from the fluorescent label. Examples of non-fluorescent labels include enzymes that convert a soluble colorless substrate to a colored insoluble precipitate (e.g., alkaline phosphatase, glucose oxidase, or peroxidase). Other non-fluorescent reagents include small molecule reagents that change color upon interaction with a particular chemical structure. In one aspect of Fluorescent in Situ Hybridization (FISH), a fluorescently labeled oligonucleotide (e.g., a DNA, a RNA, and a DNA-RNA molecule) is used as a reagent. The fluorescently labeled oligonucleotide is contacted with a sample (e.g., a tissue sample) on a microscope slide. If the labeled oligonucleotide is complementary to a target nucleotide sequence in the sample on the slide, a bright spot will be seen when visualized on a microscope system comprising a fluorescent excitation light source. The intensity of the fluorescence will depend on a number of factors, such as the type of label, reaction conditions, amount of target in the sample, amount of oligonucleotide agent, and amount of label on the oligonucleotide agent. There are a number of methods, known in the art, that can be used to increase the amount of label attached to a reagent in order to make the detection easier. FISH has an advantage that individual cells containing a target nucleotide sequences of interest can be visualized in the context of the sample or tissue sample. As mentioned above, this can be important in testing for types of diseases and disorders including cancer in which a cancer cell might penetrate-normal tissues. A given fluorescent molecule is characterized by an excitation spectrum (sometimes referred to as an absorption spectrum) and an emission spectrum. When a fluorescent molecule is irradiated with light at a wavelength within the excitation spectrum, the molecule fluoresces, emitting light at wavelengths in the emission spectrum for that particular molecule. Thus when a sample is irradiated with excitation light at a wavelength that excites a certain fluorescent molecule, the sample containing the fluorescent molecule fluoresces. In some instances the light emanating from the sample and surrounding area may be filtered to reject light outside a given fluorescent agent's emission spectrum. Thus an image acquired from a sample contacted with an agent comprising a fluorescent label shows only objects of interest in the sample that bind or interact with the fluorescently labeled agent. (h) processing the images to identify a species object of interest. 2. The method of claim 1, wherein the biological sample is a tissue sample. 3. The method of claim 2, wherein the tissue sample is suspected of comprising cells having a cell proliferative disorder. 4. The method of claim 3, wherein the cell proliferative disorder is a neoplasm. 5. The method of claim 4, wherein the cell proliferative disorder is breast cancer. 6. The method of claim 1, wherein the first reagent is a stain selected from the group consisting of DAB, New Fuchsin, AEC, and hematoxalin. 7. The method of claim 6, wherein the object of interest is a cell. 8. The method of claim 6, wherein the object of interest is a nucleus of a cell. 9. The method of claim 1, wherein the first reagent is an antibody. 10. The method of claim 9, wherein the antibody specifically interacts with a cancer marker comprising a protein or polypeptide. 11. The method of claim 9, wherein the antibody is selected from the group consisting of an anti-HER2/neu antibody, anti-estrogen receptor antibody, anti-progesterone receptor antibody, anti-p53 antibody, and anti-cyclin D1 antibody. 12. The method of claim 9, wherein the antibody is enzymatically labeled. 13. The method of claim 1, wherein the plurality of images are acquired at a low or a high magnification. 14. The method of claim 1, wherein the second imaging technique comprises fluorescence imaging and the images are a fluorescent image. 15. The method of claim 14, wherein the fluorescent image is acquired at a low or a high magnification. 16. The method of claim 1, wherein the method is automated. 17. The method of claim 1, wherein the first and second imaging techniques are the same. 18. The method of claim 1, wherein the first and second imaging techniques are different.
2019-04-25T14:45:40Z
https://patents.google.com/patent/US20050037406A1/en
702? are active on the Distribute site. There are 39 bouncing. Yahoo adjusted their count. When I have time I'll figure out what the right number is. As of 3/26, the Jasper Jottings site had 270 page views yesterday. Total page views this month: 10582!?! Local NFP organizations and public service agencies available for interviews for open positions. Come join fellow Jaspers at the Museum of Natural History for a fun filled, educational day with your children! The National Alumni Council invites you to attend its annual meeting. If your graduating year ends in a 5 or a 0, you are celebrating an anniversary. Reunion is a time when the anniversary classes get together to make a gift to the College. This year’s classes are ’35, ’40, ’45, ’50, ’55, ’60, ’65, ’70, ’75, ’80, ’85, ’90, ’95, ’00. If you are interested in your anniversary class gift, anniversary programs, call: (718) 862-7838 or E-mail: annualgiving --- at ---manhattan.edu. Meet at Brannigan's Pub in Red Bank, NJ after the race. We now know the answer to the question; does an inflatable woman have to pay full bus fare? The answer is no. And not only that, RTD will help reunite her with her owner if she gets left behind. Just ask Laurie Masten, one of the Regional Transportation District employees who oversee the transit agency's lost-and-found room. Masten, one of the RTD information and sales representatives at Civic Center, takes delight in getting owners and items back together. In some cases, people who have lost things don't know where it happened, so they never even check with RTD. In fact, some items turn out to have been stolen and left behind on a bus or train by the thief, so the owners are very surprised that their property was found by RTD. Some are so happy to get their items back that they can't contain themselves, Masten said. "We call it the lost and found happy dance," she said. Sue Kaulaity, of Denver, recently had a chance to dance. She showed up to retrieve her husband's portfolio, which had been left on the Route 21 bus at the Evans Station a few days earlier. She and her husband had gone back and forth over whose fault it was. She said that since she was making the trip downtown to get it, she would declare it his fault. This isn't her first visit, either. "They did a real good job every time I lost my purse," she said. Andrew Arnett got off a Route 40 bus recently without a document mailer that contained some of his job materials. It hit him almost immediately that he had left it behind, he said, as he signed the slip to get it back. Masten said bus drivers and light-rail operators are supposed to walk through their vehicles at the end of their runs to look for items that have been left behind. If passengers act fast, they sometimes can arrange through RTD dispatchers to meet the same bus on a return trip and pick up the item. At the end of their shifts, when drivers return to their garages, the found items are turned in to be cataloged. Every item is tagged with an identification number and sent downtown, or to Boulder if it's in the Boulder RTD division. The honesty of RTD drivers is evident. In the lost-money drawer are several $1 bills, tagged with the information as to which bus, route and time of day they were left. A contender for the Most Unusual Item Left on a Bus title has to be an inflatable Jane Doe - still fresh in its box. Fortunately for inflatable Jane, her owner claimed her. But we still don't know the answer to the question: What would a charity do with an inflatable woman? I am always amazed when lost “stuff” gets returned. Maybe it my NYC upbringing. Or finders keepers losers weepers. But I guess more people than I expect are basically honest. I am always worried when I find stuff that I might be tempted to keep it. I hope all my tests are little ones. Anything more than a month’s pay would be hard to return. While I am sure that all my fellow alums don’t have this moral failing, I will hope that all our findings are small. I’m not good with temptation. RIVERDALE, N.Y. – James J. Fyfe, Ph.D., deputy commissioner of training at the New York City Police Department, will deliver the keynote address at the College’s 163rd Spring (Graduate) Commencement on Wednesday, May 25. During the ceremony, Fyfe will receive an honorary Doctor of Laws degree. The ceremony will be held at 4:30 p.m. in the College’s Chapel of De La Salle and His Brothers. The College will award more than 200 degrees in the graduate programs of education and engineering as well as undergraduate degrees in organizational management through its adult degree completion program. Fyfe was appointed a patrolman in the New York City Police Department (NYPD) in 1963. He served on patrol and in training assignments for 16 years, earning seven citations before retiring as a lieutenant in 1979. On May 20, 2002, he returned to the NYPD as the deputy commissioner of training. He holds a bachelor’s degree and an honorary doctorate of laws degree from CUNY/John Jay College of Criminal Justice. He completed his master’s degree and doctorate in criminal justice from SUNY/Albany. Fyfe has won several awards for his scholarship and research and the effects they’ve had on police policy and practice. These include the 2002 American Society of Criminology’s August Vollmer Award, which recognizes a criminologist whose research has contributed to justice or to the treatment or prevention of criminal or delinquent behavior. During his hiatus from the police force, Fyfe was a professor at American University and Temple University and a senior fellow of the Police Foundation. He also was commissioner of the Commission on Accreditation for Law Enforcement Agencies and a visiting professor at the School of Police Studies at Charles Sturt University in Australia. He is currently on leave from his position as distinguished professor of law at John Jay College of Criminal Justice. Fyfe has published several books and more than 100 articles and book chapters on the subject of criminal justice and police policies. He served as the editor of Justice Quarterly, the journal of the Academy of Criminal Justice Sciences, and also served on the editorial boards of four other professional journals. He is completing a National Institute of Justice study of officers dismissed or forced to resign from the NYPD. Fyfe, who has been involved in a series of high-profile cases such as the Rodney King trial and the Jeffrey Dahmer serial murders, has consulted with law enforcement agencies and civil and human rights organizations globally. He has testified as a police practices expert in the U.S. Senate and Congress and in federal and state courts in the District of Columbia, 38 states and Canada. Mullery-Bernard J. On April 2, 2005. Beloved husband of Eileen. Cherished father of Christie, Brian and Beth. Devoted brother of Jack, Stephen, Mary Ann and the late Thomas, Michael and Joseph. Bernard was a longtime member of Local 14 Operating Engineers. The family will receive friends Monday and Tuesday, 2 - 4 and 7 - 9 pm at Williams Funeral Home, 5628 Broadway at West 232nd St. Bronx, NY. Mass of the Resurrection Wednesday, 10 AM, Annunciation R.C. Church, Crestwood, NY. Internment Gate of Heaven Cemetery." Bernard was a member of the Class of 1972 and was the Brother of Steve, '65 who has been very active in Alumni affairs over the years. Bernard was just 55 years of age. Bernard was also the son of the famous "Doc" Mullery who tried to teach many of us Public Speaking at Manhattan. "Doc" also served as monitor/ judge for the NYC Police and Fire Department Physical's that were held at that time down in Van Courtland Park. When I was taking one of the tests and ran into, rather than over, the 8 foot wall he was kind and did not laugh that much. There are many other members of the extended Mullery family that are Jaspers as well. P.S.: I neglected to include in my reporting on Bernard's Obituary, that his widow Eileen received her Master's Degree from Manhattan and that "Doc" Mullery was a member of the Class of 1939. Power, Pierce J. (1950) Esq. DALLAS, April 4 /PRNewswire/ -- Thomas C. Leppert, chairman and chief executive officer, The Turner Corporation, and Peter J. Davoren, president, Turner Construction Company, announced the following promotions and executive changes at Turner's offices around the country, effective immediately. Richard C. Bach was promoted to senior vice president in charge of the San Diego, Orange County, Phoenix and Las Vegas offices. Bach most recently served as vice president and general manager of the San Diego office. He holds a bachelor's degree in civil engineering from Manhattan College in Riverdale, N.Y. Turner is the leading general builder in the U.S., ranking first or second in the major segments of the building construction field. During 2003, Turner completed $6.1 billion of construction. Turner is the only builder offering clients a network of 46 offices across the U.S. Founded in 1902, the firm is a subsidiary of HOCHTIEF, one of the world's leading international construction companies. For more information, visit Turner's website at http://www.turnerconstruction.com/ . Over the past 35 years Dan Kiestlinger helped christen two brand new high schools, developed two scholastic athletic programs and, on two separate occasions, simultaneously coached two basketball teams at separate schools. The 1970 Manhattan College graduate started his teaching and coaching career at the junior level before becoming Londonderry High School's first boys' basketball coach when it opened its doors in 1978. Eventually, he assumed the athletic director's position while coaching the Lancers until 1997. While still teaching at Londonderry, Kiestlinger served as an assistant coach at Pinkerton of Derry for four seasons before accepting a coaching/teaching post at Campbell of Litchfield when it opened in 2000. Shortly thereafter he became the school's athletic director. Inducted in the NHIAA Coaches Hall of Fame in 1994, the 1988 Class L and 2003 Class M Coach of the Year recently decided to retire from coaching. The Last Shall Be First: Kiestlinger told the team of his coaching retirement inside the locker room immediately after Campbell's one-point loss to Hopkinton in last month's Class M tournament. "After my 696th game, the door has finally come to be closed," he told the team. "My goal as a high school coach was to leave the floor winning more games than we lost. You were the first team to do it, to put me over the top." The inexperienced Campbell team went 11-10 on the season, boosting Kiestlinger's all-time high school record to 253-252. Still teary-eyed about losing, the team stood and applauded. The squad boarded the bus home owning a sense of accomplishment. Kiestlinger's final squad epitomized his notion of team, an overachieving, hard working and loyal bunch dedicated to teamwork, defense and each other. "Over the years I've been told time and again that my teams might not have been the most talented, but they were the hardest working team around," he said. The First Shall Be Last: Considering his inauspicious start, achieving a .500 coaching record was no easy feat. Londonderry won just one game in its inaugural season, dropping about 100 games before qualifying for the tournament in 1983 and reaching the Final Four in 1987. Five players from that semifinal-round squad went on to play college basketball. A winning tradition started early at Campbell. The squad, playing a junior varsity schedule dominated its inaugural campaign and made the 2002 tournament in its first varsity season. The next season the Cougars lost the Class M championship game, 40-39, when a potential game-winning shot rolled in and out of the basket. The 2004 team went 20-4, advancing to the Class M Final Four. In the Beginning: He played the trumpet in the band, played four years of basketball and acted in the school play his senior year at Bishop Bradley High School. An Eagle Scout, Kiestlinger aspired to work full time for the Boy Scouts of America Association until his parents arranged an informational meeting with a professional scout inside their Merrimack home. "I was crushed after the meeting," said Kiestlinger. "He didn't spend any time working with actual scouts. Suddenly I didn't know what I wanted to do." His Bradley guidance counselor suggested a career as a physical education teacher. "I had no idea what he was talking about. Our high school didn't have a PE program," said Kiestlinger. "The counselor told me it was all about teaching kids how to play games. I was all for that." He played basketball at Manhattan College on the freshmen team and served as the team manager in his sophomore season. "Six foot, four inches is pretty tall in New Hampshire, but reality set in once I went to college in New York," said Kiestlinger. He decided to coach rather than play, making the transition as a volunteer CYO coach in Scarsdale, N.Y. The team went 1-11. Next season, most everyone returned and the team rebounded to go 11-1. It's a Small World: Eight years ago, a New Hampshire basketball official introduced himself to Kiestlinger as a former member of that CYO team. Kiestlinger coached a Goffstown junior high and high school team in which present-day Central coach Dave "Doc" Wheeler was the starting center. Kiestlinger was a coach on the New Hampshire Explorers team that competed at the 1978 National Explorer Olympics at Colorado State University. The Granite State's handball team won the tournament. Alvirne of Hudson athletic director Karen Bonney was on the team. He bicycled across the United States in 1986, raising money for multiple sclerosis. By 1999 his bike odometer read 30,000 miles. Twice as Nice: Kiestlinger simultaneously coached a junior high basketball team in Londonderry and Alvirne's junior varsity team in 1975. "I'd coach the junior high team in the afternoon before driving to Tyngsborough, where the Alvirne team practiced at night," he said. "You'd think I would have learned my lesson. But in 2000 when I got the Campbell job I was already committed to Pinkerton for the season. So I'd coach at Campbell after school and head over to Derry at night, stopping at home in between to change my clothes and get a bite to eat." Personal Matters: He and his wife, Marcia, were married on Nov. 13, 1970, but waited 25-years for a honeymoon. That fall Kiestlinger arrived one month late to his first teaching job. He was finishing a hitch with the National Guard where he played trumpet in the company band. They celebrated their 25th wedding anniversary with a honeymoon cruise. TRADITION takes time, but don't knock Rebel Relays meet director Kevin Dee for trying to rush the process. While Howell will host the season-opening relay meet today for just the third year, Dee has big plans for its growth, plans that are already taking shape. Friday night the Rebel Relays kicked off with its first Frosh/Soph Nite Opener. Ninth- and 10th-graders competed in five relay events to lead into today's full varsity schedule. "I want a carnival atmosphere," said Dee, who was the head coach for the Rebels for 13 years. "We've got three divisions, we go six-deep in medals, and we are giving watches to the best relay team. We're just trying to make it a friendly atmosphere." Dee's carnival weekend got started on Thursday night when the Howell boys and girls track teams along with their parents were treated to a pasta dinner at the high school. Speaking at the event were Olympic racewalker and retired Asbury Park Press sportswriter Elliott Denman and Ed Gorman, a former coach at Ohio State University, Arizona State University and Manhattan College. Denman spoke of his lifetime of experiences in the sport, focusing on the joy of seeing athletes he covered locally exceling on the larger stage, including Howell graduate Lindsey Gallo, now an All-American at the University of Michigan. Gorman asked the athletes to appreciate the sacrifices of the coaches and the parents. "When I was at North Bergen we used to plan dinners for the night before meets," said Dee. "This was mainly for the Howell coaches. I really treat them poorly all the time leading up to the meet. It's also a thank you to the parents for getting out there and selling hot dogs and T-shirts." When Kara Cokeley watched her younger sister leave for travel-team softball practice, there was longing in her eyes. She felt like she should also be bringing her bat and glove out of the house on those chilly January mornings. But she didn't this year. Instead, her afternoons were spent recovering from basketball, giving her body a rest it hadn't had since she was starting seventh grade. That's the summer when Cokeley, this week's The Journal News Rockland Scholar-Athlete of the Week, started playing travel softball. But this year, with college just around the corner, she decided she needed a break. "It's my last summer (this year)," Cokeley said. "And I'm unsure if I want to play in college or not." Cokeley is planning to study engineering at Manhattan College, and even if the Jaspers won't have Cokeley on their field, Pearl River still will for one more season. "She's the type of athlete you want," softball coach Mike Carlacci said. "She'll bat second or fifth if I ask her to. She'll play third base or first base. She's not a selfish person." And she would never take all the credit for the team's success. Though titles and banners are important to most players, Cokeley can put it in perspective. In the winter, the basketball team lost in the sectional semifinals, and though she was disappointing, it wasn't devastating. "We all worked really hard, so I was satisfied," Cokeley said. "I wanted to go further, but it wasn't something I regretted at all." That will provide fuel, however, to make it further in softball. The team has made it to every sectional final since Cokeley joined the team as a freshman year, with a record of 72-11 during her career. Last year, the team made it to the regional final. "Our biggest goal is to get to states," Cokeley said. "We want to get to the final four. But we have to do the little things first. We have to win leagues, sections, regionals, and then get to the final four." Athletics aren't the only place Cokeley shows her dedication. She brings that to the classroom as well, something Carlacci knows well. Not only is he her coach, he's been her math teacher the last two years. "She's a great kid who's the type of kid all the other players on the team respect and like," he said. "She's always there to try to help them and the team morale. She's like that in class, too. She's a hard worker and liked by everyone." Cokeley has always excelled in math. She has been in accelerated math and science classes since seventh grade, and this year is taking advanced-placement classes in both. "Math and science had always come really easy to me," she said. "I can go into a class and learn something." Cokeley has a 95 weighted academic average and is ranked 11 in a class of 166. "She's just a great all-around kid," Carlacci said. "She's a nice kid. There's not a bad bone in her body." The Journal News Rockland Scholar-Athlete of the Week program honors students for their academic, athletic and community achievements. Each week a winner is selected from the nominees submitted by athletic directors. Only seniors can be nominated and the award can be won only once. Nominations must be received by 5 p.m. Monday for consideration that week. SCRANTON - University of Scranton Provost and Vice President of Academic Affairs Dr. Beth Barnett, Ed.D., will leave the university June 1, according to a memo issued by university president Fr. Scott R. Pilarz, S.J. "We're greatful for what she's been able to accomplish," said Pilarz in a statement. There is no word if Barnett has a new job lined up. Dr. Harold Baillie, who has been serving as interim associate provost since that position was vacated, will serve as interim provost and vice president of academic affairs for the 2005-2006 school year, said university spokesperson Stan Zygmunt. The university will conduct search for new provost and plans to have a new person in place for the 2006-2007 academic year. In the dual roles of provost and vice president of academic affairs, Barnett is responsible for providing the best curriculum for students as well as making certain the funding is there to support such a curriculum. She also oversees general education programs, which account for about half of the school's curriculum, but also needs to ensure preprofessional programs such as physical therapy, education and nursing meet state mandated requirements. Barnett came to the university in 2001, becoming the first woman provost in the university's history. Barnett obtained her undergraduate degree at Slippery Rock State University. She also holds two master's degrees and a doctorate of education from Columbia University. Prior to coming to the university, she taught at Manhattan College for 13 years. Under her tenure, the university focused heavily on expanding its diversity efforts, hiring its first Equity and Diversity officer and opening the International Center in November 2002. The university also increased its rankings in the U.S.News & World Report college guide, reaching the level of fourth for master's degrees in the northern area of the country. Google Alert for: "manhattan college" -"marymount manhattan college" -"borough of manhattan college" DALLAS, TX, April 5, 2005 -- The Ciba Specialty Chemicals Foundation honored the best of the best at the National Science Teachers Association's 53rd National Convention in Dallas, TX this past weekend. Through its Foundation, Ciba singled out elementary, middle and high school science teachers and principals who are finding new ways to capture their students' imaginations, and lighting the way to exciting careers in the sciences. The Ciba Foundation awards are part of a strong partnership between the Company and the NSTA; the partnership is rooted in dedication to lifelong learning. The Ciba awards single out the following individuals, each one representing a compelling story of service to young people and to education in this country. The foundation signature programs include the Ciba High School Chemistry Institute, High School Science Awards, National Science Teachers Association (NSTA) Exemplary Elementary/Middle/High School Teacher and Principal Awards, and the Ciba Environmental Engineering Scholarship at Manhattan College in Riverdale, N.Y. These programs are points of pride for Ciba employees, and help to raise our profile in the communities in which we operate and enhance our reputation as a national leader in education. Ciba Specialty Chemicals (www.cibasc.com) is a global company adding performance, protection, color and strength to textiles, plastics, paper, automobiles, buildings, home and personal care products and much more. It's active in more than 120 countries and generated sales of US$5.7 billion in 2004 and invested US$232 million in R&D. Manhattan College will be experiencing another change in the look of campus soon, as the final steps towards groundbreaking on the new Broadway parking lot come to completion. In an article written by John Bekisz, Jr., the Manhattan College Quadrangle covered a story regarding the construction of a new parking lot where both Paulian Hall and the Broadway parking lot now reside. Mr. John Daly, Vice President of Finance, stated that the initial stages of hearings, local governmental application, and other early facets of construction have passed, and Manhattan College is braced to start construction on the 15-year old project by the end of 2005. If you do go support "our" teams, I'd appreciate any reports or photos. What else do us old alums have to do? Baltimore, MD (April 9, 2005)-The men's tennis team traveled to Baltimore, MD today and beat Loyola, 5-1. Manhattan took five of the six singles points winning the match before the doubles matches were played. The Jaspers improve to a 10-4 overall record and 5-0 MAAC record. Upper Saucon Township, PA (April 8, 2005)- Manhattan posted a round one tally of 336 in the opening round of the Fourth Annual Lafayette Invitational, played at the par-72, 6,916-yard Center Valley Golf Club. Poughkeepsie, NY (April 7, 2005)- The Manhattan men's tennis squad defeated Marist 6-1 Thursday afternoon in Poughkeepsie on the strength of three three-set singles victories, while earning the doubles point in a tightly contested affair. Manhattan improved to 9-4 overall and 4-0 in the MAAC with the win, while Marist dropped to 12-2 overall and 4-1 in league play. New York, NY (April 7, 2005)- Jill Medea threw a four-hit, complete-game shutout to lead Manhattan to a 1-0 win over Columbia in the first game of a double header this afternoon at the Columbia Softball Complex. The Lady Jaspers fell, 4-0, in the nightcap. Riverdale, NY (April 7, 2005)– The Lady Jaspers captured their first win of the season today at Gaelic Park beating Central Connecticut 14-3. Senior Victoria Carman (Freeport, NY) and junior Molly Pheterson (Rochester, NY) led the team scoring three goals and an assist. The Jaspers improve to a 1-5-0 overall record while the Blue Devils drop to 2-8-0 record. New Haven, CT-The Yale men's tennis team defeated Manhattan College today by a score of 4-3. Although Manhattan put up fierce competition on the singles court, the Bulldogs swiftly swept doubles and won three singles matches to claim victory. Today's win puts the Eli's record at 4-9. Brandon Wai, who is currently ranked No. 92 in the nation, and Ryan Murphy, led the Bulldogs to success by combining to win at the No. 1 doubles position 9-8. Wai and Murphy then bolstered the Bulldog's score by winning each of their singles matches. Wai turned in a stellar performance to win the No. 1 singles spot, dominating over Manhattan's Zoltan Bus 6-2, 6-0. In the No. 2 singles spot, Murphy beat Diego Alvarado 7-5, 6-1. No. 4 singles Rowan Reynolds also had an excellent day, defeating Manhattan's Erez Cohen in straight sets 6-1, 7-5. The dynamic duo of Reynolds and Chris Lawler also made an impact on the doubles court, winning the No. 2 doubles spot 8-5. Milosz Gudzowski and Rory Green helped secure the doubles point for Yale by defeating the duo of Diego and David Alvarado 8-6. The Bulldogs will face Pennsylvania on Fri., Apr. 8 at 12:30 pm at home in New Haven. ... The Blue Devils will take to the road for their next game. They will play a non-conference contest at Manhattan College on Thursday at 3:30 in the afternoon. New Britain, CT - The Central Connecticut women's lacrosse team snapped a five game losing skid with a 17-6 victory over visiting Iona in a non-conference match-up on Tuesday night. The Blue Devils were led by freshman Abbey Capobianco who finished with a season-high six goals including a three-goal stretch spanning 1:08 of the first half. The Blue Devils are now 2-7 on the season while Iona drops to 3-5 overall. Iona scored two of the first three goals of the game, one from Kelly Butler and one from Kelly Hughes to take its only lead of the game with 29:23 to play in the first half. Central returned with a four-goal stretch including three-straight from Capobianco. The run opened the Central Connecticut lead to three, 5-2, with 15:29 to play. Iona brought the lead within reach with two-straight goals. The Blue Devils opened the lead back up with three goals before the break including two in the final 39 seconds of the first half to take an 8-4 advantage into the locker room. Central came out hot in the second half outscoring the visiting Gales 9-2 in the second period. Central finished the game with four players scoring multiple goals led by Capobianco's six. Fellow freshman Meghan MacPherson and sophomore Abigail Hayes each scored three goals while Danielle Adams added a pair of scores. Kathryn Hughes and Kristyna Patsey each added a goal while senior captain Kate Backman scored her first collegiate goal with 6:40 to play in the second half. The Blue Devils took nine more shots than the Gales posting a 30-21 advantage in the shot department. Central keeper Amanda Zabel, who allowed only two second half goals recorded a total of 11 saves, with six in the second half. Roxanne Monte recorded 12 saves in net for the Gales. The Blue Devils finished one goal shy of tying the team record for goals in a game, originally set in 2000 and matched two season's later. The Gales were led by Jaclyn O'Leary who finished with three goals. Three other players each scored one goal a piece. The Blue Devils will take to the road for their next game. They will play a non-conference contest at Manhattan College on Thursday at 3:30 in the afternoon. Please extend an invitation to receive Jottings to William T. Marshall, Esq. '67. His e-mail address is: <privacy invoked> Bill is a past president of the Alumni Society and a great Jasper. I hope that I guessed correctly! Hi, welcome home. Glad to see you back and of course you've been approved. Very surprised to see my speech in Jasper Jottings, thanks to great friend Pete McDermott's (Cl of '67) interest and diligence. I don't think any of us ever show quite enough gratitude for what Manhattan's meant to us throughout our lives but your Jasper Jottings "labor of love" seems to be allowing for more and more of that gratitude to get expressed. I think and hope it's contagious! Thanks for your labor. Keep up the great work. Hi. If this reaches you, and you are the addressee above, hello and please skip the next paragraph. If not, please let me know that I guessed wrong, thanks in advance, you can ignore the rest of this message. You registered your address on the MC Alumni site but it may have had a typo. When I sent you an email, to invite you to receive Jasper Jottings, that invitation email bounced. When it "bounced" back to me, it showed the attempted delivery address. Then, I took a guess at your correct email address. If you're reading this, I'm a good guesser. No big trick. If not, oh well I tried. Here's my original message, sort of. Some unidentified Jaspers — April, Louis, Lauren, Fran, Ash — mblogged (Picture take and put in a mobile camera picture venue with some identifying information and "Manhattan College". Sigh, girls at the College. Pretty ones at that. Good thing that didn't happen when I was there, or I'd have flunked out for sure. As an inet-nut, these few shots are a study in culture. No last names. No reassurance that it is "our" Manhattan College. Raw steamy talent. Having taken more than a few shots, both pictures and drinks, the shooters missed some and caught some essential snippets of beauty, timelessness, and the American culture. Anybody recognize anyone? See that is the real hoot of people doing this stuff. They don't realize that they are on the net, caught in a way that was never possible before. Shown to a grazillion people. Forever caught in timeless space. Primitive people are reported to believe that taking their picture captures their soul. I have never met one of these primitive people, hence the word reported, but I'd tell them "yup you're right!" I would have like to know more about "before April got attacked by the taxi driver and security guards!". Hope April is OK. Do they live happily ever after? Does the beauty and joy of youth fade like it did with us old fuddy duddies? Sigh, sadly offered for your consideration. My father transferred here from Manhattan College. (Interesting trivia, Manhattan is a Catholic College run almost entirely by friars [monks] of the LaSallian order. The monk that gave his name to the nickname of their sports teams, Brother Jasper, is credited with inventing the Seventh Inning Stretch.) He was there as a political science major, and didn't enjoy the program at all. Felt it was very weak. The school's gone downhill since then. He transferred here where he created his own co-op at least once, and organized his schedule, when not on co-op, so that he could work an internship at the same time. New York is quite the city, and I'm having a wonderful time. Tonight I went to see a comedy show at Manhattan College and that was fricken tight. On the way, something happened that changed my life. 1) Most forms of cancer are terminal diseases. This means eventually he will die. He can't afford the life saving operation in the first place. 2) Even if he could afford the operation, he would have to stay in the hospital for a certain amount of time to recuperate, and I'm not including the rehabilitation that would almost certainly be necessary. Anyways, if he stayed in the hospital, the government would stop financing his place to live...So if he gets the operation, and recuperates and is atleast some degree of "healthy", he will be homeless, which is deadly in itself. This is a disgrace. This is a blatant injustice, and it makes me ill. How is it the most powerful nation in the world can allow this to happen? When will we realize that some people simply cannot help themselves, and as human beings, deserve to be helped? A- Universal healthcare. As in the people in this nation (they are a sizeable minority) who can't afford healthcare, are taken care of. This would be beneficial to the nation as a whole in two definate ways- Life expectancy would rise to the credit of our health system, ensuring our system as a continuing prescence among the best and finest. Secondly, quality of living would rise, making our nation even greater. B- Put more money into homeless shelters, and perhaps even finance a viable living wage. We could do all this by closing corporate tax loopholes which are being exploited at the expense of the middle and working classes. In California alone, this would lead to an estimated 7 billion more dollars worth of revenue. Now proportion that out to about 228 million people in every other state besides California (California has 32 million people, totallying a very conservative estimate of approximately 290 million US citizens). Imagine the impact that could have! Imagine the wonderful things we could accomplish! People could really be helped. Our country and eventually the world, could be really great. If only we would lead by example. Jose was a genuinely good man, and in that 9 or so minutes we talked, he taught me more about the realities of life than you can learn in 9 years of class study. IN other news, even though I doubt anyone save Maria (and even that's a stretch) has read this far, I've reached a conclusion concerning the opposite gender. A girl here by the name of Megan reminded me of someone at home. That someone is amazingly awesome and amazingly out of reach, but to me, the perfect girl. Until I find someone that can make her the second best girl in the world, I don't see much point in continuing to date. That girl from here, Meg, is a lot like her. It was super crazy. For whoever reads that last part, take that at face value...I don't have any deeper meaning and the top paragraphs were a lot more important anyway. It was once said that "anyone who was not a liberal when young had no heart; anyone who was not a conservative when old had no brain." I happened across your entry because it mentioned Manhattan College. I am a 1968 alum of MC and "collect & publish" an ezine for about a 1,000 of my fellow alums. Normally, I would have just passed along. But your entry struck me and seemed to call out for some one to defend the "system". That and the remedies you propose are fatally flawed and counter productive. Now when someone asks me for money, panhandles for food, as a Christian, I am obligated to follow his teachings, so I offer to feed them. In all the years, I have only had one person take me up on that. We went to a nearby New York deli, he ordered a bunch of stuff, I gave the counter man a twenty and told him to keep the change. I tell you that not as an exemplar of my bona fides, but as an example of how many frauds there are out there. When one writes of compassion, I always cite http://www.acton.org/ppolicy/compassion/ as the roadmap to an effective program. And specifically, http://www.acton.org/publicat/books/transformwelfare/olasky.html which itemizes lessons our forefathers knew and followed. (1) Government is force. When you spend funds from the public treasury, you are essentially taking those dollars by force from your fellow citizens and saying to them I know better than you how to spend your money. When a penny is taken from the marginal taxpayer to help your acquaintance, you may be creating another homeless person. True effective charity must be voluntary. Government "assistance" is loaded with unintended consequences. (2) We all eventually die of something. When you demand medial care for your acquaintance paid by the public treasury, you by definition, deny care to someone else. Money is one of the factors in triage or prioritization. It is in itself and interesting concept. Rich people earn money by doing something for others that is deemed valuable. When they spend that they are in fact redeeming their past services for some current benefit. So in a strange sort of calculus, your acquaintance has not made enough contributions in the past to merit consideration of his future needs. Interesting concept? The fact that our society does things for him thru both public and personal charity just demonstrates that while the system maybe flawed it does have some interesting redundancies to prevent tragedies. (3) Universal heathcare is a fraud. Look at the past Communist countries with their version, the political connected got the best, everyone else got poor, and your acquaintance would have gotten none. Look at England, where the middle class flies to India for what we in the US would call routine. Look at Canada, where the borders are regularly crossed by cancer patients who have been told their too old. Dialysis is denied to old folks, that I know personally of an 87 year old gets it here with no question. UHC, bah. The "greedy" heathcare people service anyone who pays. MRI machine in hospitals run nearly round the clock. Technicians earn a premium for working that graveyard shift. Money makes the world move quickly and efficiently. When you think of Universal Heathcare, just think do I want the Post Office or FedEx? For my part, I'll take FedEx. (4) Put more money in homeless shelters and living wage. Drivel. Take a gun, I'll loan you mine, and go each person in your dorm, apartment house, hometown street, and demand they support your idea. It's the same concept. I would urge you to consider that freedom and liberty are better solutions. Homelessness IMHO is rooted in the failed drug war. Like Prohibition in the 20's, the politicians are convinces that a human being -- the most adaptable and arguably the most intelligent life form on the planet -- can be prevented from eating, drinking, or injecting anything they darn well please into their own body. Hence we have druggies who have to steal to do it and we have gang wars over the best sales locations and everything goes to hell. When was the last time you saw the Bud guy and the Miller guy shooting it out over a bar tap. Sigh, we have to realize that political decisions that don't reflect reality are doomed from the start. I have citation here somewhere about when the LA state legislature voted to repeal the Law of Gravity. The felt that only the politician can make 'laws". Hence LA state skool kids should be taught the "theory" of gravity. Way cool, lets jump out the window and discuss the "theory" on the way down. I'll take the first floor one please. Although at my age I don't jump too well. Any way I did read to the bottom. Twice. And considered it very carefully, deciding whether to respond or not. If you are a serious youth, as you sound like you are, here's some serious feedback. If ignorance were bliss, I suspect Joseph G. Siclari and his disciples would be king! King Joseph of Levittown could then ban all those undesirables, such as myself, whom he claims use their "...sarcastic and condescending tone..." to belittle his lack of education. Off with their heads! King Joseph could set up checkpoints, at both ends of Hempstead Turnpike, to screen out those undesirables who dared enter his kingdom. Levittown residents would probably be cowering in their homes, lest they offend King Joseph, and businesses along Hempstead Turnpike would be shuttered due to lack of patronage. Sounds silly! Yet, in my humble opinion, that is exactly what Siclari's venomous letters are spewing. Whatever creditable issues he may have raised about a handful of Progress House clients, a New York State Department of Mental Health outpatient funded-facility, were lost in his diatribes against William F. Reilly, PhD and Donald Lee Warner. Dr. Reilly and my fellow parishioners from St. Bernard's Church should be complimented, rather than castigated, for taking the initiative to open a long delayed dialogue with the staff and clients of Progress House. It also took a great deal of courage, I'm sure, for Donald Lee Warner to publicly write of his own bout with alcoholism and mental health. The fact that he has been able to turn his life around, earn a college degree and obtain full-time employment is a credit to his own perseverance and that of the Progress House staff. It is a classic example of our tax monies being well spent. I've had the privilege of knowing Bill Reilly since the 1950s, when he returned to his Manhattan College alma mater as Associate Professor of Philosophy. Bill was already a Levittown resident in 1955, when he introduced a bunch of Bronx "knuckleheads," like myself, into a greater understanding of the influences pre-Socratic philosophers, such as Plato and Aristotle had on St. Thomas Aquinas and his writings, particularly Summa Theologica. It wasn't until the mid 1970s, however, when I joined Bill as a member of St. Bernard's Parish Council, that I fully appreciated the depth of his intelligence and commitment to the social teachings of the church. Bill, for example, was already involved in the Rockville Centre Diocese's mission of fostering a greater degree of understanding and dialogue between the Catholic and Jewish communities. Bill, a daily communicant, has been in the forefront of numerous social issues confronting our community and it is understandable that he raised an awareness of Progress House to our conscientiousness. Tom Curry, heads up the New York Rowing Association (NYRA) and the Peter Jay Sharp Rowing Club. He is planning a Summer 2005 Development Camp to be coached by World Champion Christian Dahlke of Germany. His other goals include bringing NYC public schools to the competitive rowing scene, getting his current batch high school rowers up to racing speed and raising funds so they have the same opportunities as their competition on and off the water. When does the development camp start and can you tell us more about it? It starts on June 11th and runs through August 8th. Christian Dahlke, former German national Team member and 2003 World Champion in the Men’s Lightweight Eight, will be the camp’s Head Coach. Before I took charge of the New York Rowing Association, I had brought him in to coach a development camp at Nereid Boat Club which I also ran in 2002. We brought in Christian as a technical coach for both sweep and sculling, and he did a great job. He was our technician for that season, and really taught the kids great technique, getting them up to speed and teaching them to pick the boat along, whether in sweep or sculling boats; the kids learned how to move a boat. What distinguishes Christian as a coach? He is both a sweep rower and sculler and he goes out in the boat a lot to row with the kids. He really gets a feel for what the kids are doing and picks up on the finer points while rowing with the crews. He is a professional and has a very controlled approach to coaching. He believes in miles at a steady state speed with low ratings to build technique and endurance. In this way rowers learn to work together and pick up essential technique which is carried through as the rating goes up. Speed work is done in controlled, measured doses, in order to achieve the maximum benefit. The kids really excelled during the last camp.His technical expertise and all-round approach were key. Instead of focusing just on power, they benefitted from superior technical skills he taught them. His rowers develop not only power but effective application of technique. It definitely gives them a long-term advantage. Let’s talk about the high school programs you are running. We have programs for both private and public high school kids. The private school rowing programs are self funding. The public high schools are a different story. The public school kids fall under Title 1. The kids do get free breakfast and lunch at school but after-school programs are not funded. This change came in the last few months due to New York City budget shortages. At our club, we have worked to organize swim lessons for these kids on weekends, we have the rowing program and we also have nutritional classes for them that started in March. Will Christian be coaching kids in your program too? Christian will be coaching this group as well as the college kids who are coming in for the program. We plan on integrating the kids and building on the teamwork concept. They will race this summer as the Peter Jay Sharp Rowing Club. We are also making plans for assistant coaches who will work under him. Christian will divide the rowers into senior and junior boats. The faster boats will go to Independence Day Regatta in Philadephia, to Nationals in Indianapolis, and finish up at Canadian Henley in St. Catherines in Canada. How do the public schools fund their rowing programs? New York City public schools are free and we fund the program through private donations as well as grant requests which are sent out to foundations and corporations to get funding to sponsor this program. As I mentioned, in recent months a lot of the funding for the after school programs has been cut due to budget shortages. The kids have no place to go after school. This is an opportunity for them to get into a sport which traditionally has been unavailable to them because of its high operating expenses. Start up costs are high and include equipment and boathouse costs. Running and maintaining a boathouse as well as providing coaching is expensive. That is why we are looking for broad support to fund the programs for these kids so they can also participate and compete. I hear you have a fundraiser coming up. We are working on a fundraiser to be held at the New York Athletic Club in New York City on April 28. We are looking to raise money through the fundraiser and will also have a silent auction. Proceeds will go to the public high school rowing program. We also have an advisory board working with us to reach out to the community to build support for our program. So the New York Restoration Project donated the boathouse, but it is up to you to get the funds needed to keep the public school rowing program going. So you need funds coming in as soon as possible. Exactly, the boathouse has been donated, but we have to manage it, man it, provide and service equipment and coach the kids. We want them to have the same opportunities as other high school teams who will be out there during the upcoming seasons racing boats against us. Will the fundraising you are doing also be aimed at putting the kids through the summer development camp? Yes: the camp costs money and the kids don’t have the wherewithall to do this. We have been lucky enough to have Nike Apparel as one of our sponsors. They were great and donated us clothes for the kids to train in. The kids sometimes show up to practice in t-shirts and it’s 36 degrees outside. It was really cold on the river this winter but thanks to Nike we can make sure they stay warm enough to train. With the benefit you are looking to provide the kids in your public school program funds raised will be put to excellent use, especially since the public schools themselves cannot contribute. Yes that is why we are focused on fund raising. We have experienced coaches that are motivated to work with the kids and we have kids with great spirit who want to be involved and to train to their utmost potential. They’d like to go on and row later in college too. The April 28th fundraiser is an important step for us to provide further means to develop our program up for the New York City public school rowing programs. What is the response from the kids? The kids love it and are having a blast. They are ready to hit the water, as they spent the winter on the ergs. The parents are really excited too, because they see it is a great opportunity for the kids. They see Columbia, Fordham and Manhattan College out there rowing and we are providing an opportunity for the kids to be a part of the sport. We have some great athletes who need an opportunity. Our goal is to provide the coaching, oars, and boats. The kids need to show up and give their 200% which they are ready to give. They are hungry. Are the kids excited about having a World Champion to coach the development camp? Absolutely. They realize what a chance they have to learn from someone with excellent sweep and sculling techniqes who has raced and won at the World Championships. Germany has a great reputation for producing good technicians in both the sculling and sweep arenas and these kids are excited that they have a chance to be coached at this level in our program. We are lucky to have Christian. He is a great professional, who has a real talent at coaching. We have kids who were in the previous program who will be coming back to the program this summer specifically to have a chance to be coached by Christian. FORT LEE - Their stories held none of the glamour or fun that surrounds the celebrity poker tournaments so popular on TV nowadays. Two 15-year-olds from Bergen County who sought help for gambling addictions just a few weeks ago. Three 19-year-old college students from Hudson, Passaic and Bergen counties whose lives are on hold because of gambling. Two were kicked out of school for gambling, the third was pulled from an Ivy League school by his parents because of it. And the Princeton high school student who maxed out a friend's credit card, racking up $9,000 in debt on Internet gambling. They are examples of how gambling - and specifically, in many cases, the poker craze that has swept the nation - can affect young lives, Assemblywoman Joan Voss, D-Fort Lee, school officials, and others said Wednesday. Voss wants to see the cable channels that have profited from and helped feed poker fever ante up. On Wednesday, she announced that she is proposing a bill that would require cable networks that show poker shows to pay a fee. The money would go toward educating youths about the perils of gambling. "This is a wake-up call to the stations, and I'm hoping they will heed it," said Voss, standing in front of Fort Lee High School, where she taught for 41 years. "They seem to think it's not a problem and it is." Acting Fort Lee Superintendent Alan Sugarman talked about the irony that in Atlantic City, every casino employs guards to ensure underage guests can't enter, while every night, televisions bring poker directly into millions of homes. Ed Looney, executive director of the Council on Compulsive Gambling of New Jersey, who provided the examples of young people who became trapped by gambling, said that one-fourth of card players who answered an online survey in 2003 were under 18. Last year, nearly half the card players were underage. "There's no question it's because of the effect of 'Texas Hold 'Em' TV shows that have been put on television," Looney said. "There's an unawareness that it's a problem, even by educators." Like Looney, Leonard Brazer, a Rockaway therapist who specializes in money disorders and gambling, has also seen a dramatic increase in the number of clients struggling with poker problems. Brazer said that for most of his career, he never had a client come in saying they had a problem with Texas Hold 'Em. But in the last nine months, Brazer said, virtually every person he has seen came in because of the game. "We're advertising poker or Texas Hold 'Em as a socially acceptable entity" compared with drugs or alcohol, Brazer said. In reality, Looney said, about 15 percent of gamblers develop some problems, and 5 percent become addicted. Among youths, the number of problem gamblers is even higher, Looney said. Kelly Peterson, a senior at Manhattan College, said that in her study of 461 high school students from Pennsylvania, New Jersey and Ohio, 55 percent reported playing poker, the majority for money. Of those who play poker, 82 percent also watch the game on TV and nearly half said they had never been taught about the dangers of gambling. Voss said casinos in Atlantic City pay about $600,000 a year toward anti-compulsive gambling programs in New Jersey, saying that the cable networks that air such shows as "Celebrity Poker" and "World Series of Poker" should also pitch in. "If New Jersey's casinos can do their part to provide funding to combat problem gambling, then these huge cable stations can do their part too," Voss said. I had occasion to write this in an inet forum. Money hides a form of taxation. The government usually controls the money supply. They declare by fiat what the unit is. See Smithsonian for their exhibit of French gold francs of the reigns of the various French Kings. The original franc was a thick and hefty coin that looked like more than an ounce. The last franc was the size of a shirt button and as thin as a sheet of paper. Both were francs, but they weren't equal. The debasement of the currency was the hidden tax. It is the same in the here and now of the US of A. My grandfather had some $20 gold coins that were seized by Roosevelt. He had value. My father had a twenty dollar bill. Same denomination. Different value. I have a slightly different twenty dollar bill. Same denomination. Different value. What will your children have? Are we so dumb as to not see what is happening?
2019-04-20T02:47:20Z
http://www.jasperjottings.com/2005/jasperjottings20050410.htm
It is well established that the formation of memories for life's experiences—episodic memory—is influenced by how we attend to those experiences, yet the neural mechanisms by which attention shapes episodic encoding are still unclear. We investigated how top-down and bottom-up attention contribute to memory encoding of visual objects in humans by manipulating both types of attention during fMRI of episodic memory formation. We show that dorsal parietal cortex—specifically, intraparietal sulcus (IPS)—was engaged during top-down attention and was also recruited during the successful formation of episodic memories. By contrast, bottom-up attention engaged ventral parietal cortex—specifically, temporoparietal junction (TPJ)—and was also more active during encoding failure. Functional connectivity analyses revealed further dissociations in how top-down and bottom-up attention influenced encoding: while both IPS and TPJ influenced activity in perceptual cortices thought to represent the information being encoded (fusiform/lateral occipital cortex), they each exerted opposite effects on memory encoding. Specifically, during a preparatory period preceding stimulus presentation, a stronger drive from IPS was associated with a higher likelihood that the subsequently attended stimulus would be encoded. By contrast, during stimulus processing, stronger connectivity with TPJ was associated with a lower likelihood the stimulus would be successfully encoded. These findings suggest that during encoding of visual objects into episodic memory, top-down and bottom-up attention can have opposite influences on perceptual areas that subserve visual object representation, suggesting that one manner in which attention modulates memory is by altering the perceptual processing of to-be-encoded stimuli. The creation of new memories for life's experiences is intimately linked to how we attend (Craik and Lockhart, 1972). During an event, we may willfully direct attention to information relevant to ongoing goals (“top-down” attention) or our attention may be captured by salient information (“bottom-up” attention) (Kastner and Ungerleider, 2000; Corbetta and Shulman, 2002). How such attentive acts shape event encoding is unclear. The neurobiology of top-down and bottom-up attention is posited to consist of separable yet interacting frontoparietal networks (Corbetta and Shulman, 2002), and recent work has begun to consider how the parietal components of these networks are engaged during event encoding (Uncapher and Wagner, 2009). During attention paradigms, functional imaging data indicate that dorsal posterior parietal cortex (dPPC) activity tracks demands on top-down attention, and ventral posterior parietal cortex (vPPC) activity tracks recruitment of bottom-up attention (for review, see Corbetta et al., 2008). During event encoding, the fMRI signal in frontal and parietal regions frequently predicts whether the event will be subsequently remembered or forgotten (“subsequent memory effects”) (for review, see Paller and Wagner, 2002; Rugg et al., 2002; Blumenfeld and Ranganath, 2006; Uncapher and Wagner, 2009). A recent across-study analysis of the encoding literature raised the possibility that PPC subsequent memory effects anatomically overlap with PPC correlates of attention (Uncapher and Wagner, 2009). Moreover, the majority of PPC foci demonstrating enhanced activity for events later remembered versus forgotten (“positive” subsequent memory effects) localized to dPPC, whereas foci demonstrating enhanced activity for events later forgotten versus remembered (“negative” subsequent memory effects) localized exclusively to vPPC. These data motivated the “dual-attention encoding hypothesis,” which posits that top-down and bottom-up attention may differentially foster encoding success and failure, respectively (Uncapher and Wagner, 2009). This hypothesis builds on evidence that top-down attention enhances cortical representations of attended information (Corbetta et al., 1990; Noudoost et al., 2010) (for review, see Beck and Kastner, 2009) and thus may increase the probability that attended information ultimately projects to the medial temporal lobe (MTL) for encoding (e.g., Moscovitch and Umilta, 1990; Uncapher and Rugg, 2009). From this perspective, positive subsequent memory effects emerge when dPPC-mediated top-down attention is directed toward information that will be relevant to later remembering. By contrast, engagement of vPPC-mediated bottom-up attention may lead to later memory failure when attention is captured by information not relevant or helpful to later remembering (Otten and Rugg, 2001a; Wagner and Davachi, 2001; Cabeza et al., 2008; Uncapher and Wagner, 2009). Because consideration of PPC attention mechanisms on event encoding has largely come from across-study comparisons, it remains unclear whether parietal fluctuations that predict the mnemonic fate of events reflect the influence of top-down and bottom-up attention on episodic encoding. Here we implemented a paradigm that provides independent assays of attention and encoding, within subjects, to determine (1) whether dPPC and vPPC show attention-sensitive activity that is also predictive of subsequent memory success or failure, and (2) whether the manner in which these attention-sensitive regions dynamically interact with the rest of the brain predicts the mnemonic fate of an event. Data are reported from 18 right-handed, native English-speaking volunteers (9 female; age range: 18–27 years; mean age: 20.4 years; SD: 2.9 years), each of whom gave written informed consent in accordance with procedures approved by the Institutional Review Board of Stanford University. All participants were recruited from the Stanford University community, reported no history of neurological trauma or disease, and were remunerated at a rate of $20/h. Data from two additional participants were acquired but excluded from analyses, due to their failure to exhibit a behavioral reorienting effect (see Behavioral task, below). Stimuli consisted of 660 black-and-white line drawings of common objects and 80 artificial “greeble” objects (Gauthier and Tarr, 1997). Common objects were drawn from the International Picture Naming Project (Szekely et al., 2004) and from a set previously used by Uncapher and Rugg (2009). Greebles and common objects were transformed into black-and-white line drawings in Photoshop CS, version 8.0 (Adobe Systems). For the purpose of counterbalancing, common objects were divided into 33 sets of 20 objects each, and greebles into 5 sets of 16 objects each. Object sets were rotated across study and test lists across subjects, and greebles were rotated across study lists. For each subject, 10 study lists were created from these sets, each containing 40 objects and 16 greebles. In each study list, 46 stimuli were presented in the cued location (“valid” trials, see Behavioral task, below; 32 objects and 14 greebles), and the remaining 10 stimuli were presented in the noncued location (“invalid” trials; 8 objects and 2 greebles), yielding an 18% probability that a stimulus would be invalidly cued. Of the 400 common objects encountered during the study phase, 350 were carried forward into the test phase (to minimize test list length). Thus, in each of 10 sessions, 35 common objects served as the critical study items (27 valid and 8 invalid). In the later memory test, 180 common objects served as foils. A separate set of 10 common objects and 3 greebles was used to create a practice study list. Within the present task context, “top-down attention” refers to the goal-directed allocation and maintenance of visuospatial attention evoked by a preparatory cue (described below), and “bottom-up attention” refers to a shift of visuospatial attention evoked by an object occurring outside the focus of attention. We are agnostic as to whether bottom-up shifts of attention occur by means of automatic, involuntary, or “exogenous” processes versus goal-directed, voluntary, or “endogenous” processes (for review, see Corbetta et al., 2008; Posner and Cohen, 1984; Downar et al., 2001; de Fockert et al., 2004; Kincade et al., 2005; Serences et al., 2005; Indovina and Macaluso, 2007; Burrows and Moore, 2009). The experiment consisted of 10 scanned incidental study sessions followed by one nonscanned memory test. Each study session lasted ∼6.5 min, and the memory test lasted ∼40 min. The interval between the end of the study phase and the start of test phase was ∼10–15 min. Participants received instructions and practiced the study task before entering the scan suite; study task performance was analyzed during this training session to ensure that participants understood and complied with the task instructions (see below). Moreover, eye movements were visually monitored by two investigators, and feedback was given to the participant to ensure that participants could perform the study task while maintaining fixation; participants were trained to ceiling level, continuing until no visually detectable saccades occurred at any point during the training session. We acknowledge that this training does not ensure that eye movements did not occur during scanning. However, given recent studies of overt versus covert attentional shifts that demonstrate that the same frontoparietal regions are engaged when eye movements occur and when they do not (Ikkai and Curtis, 2008), we believe the possible presence of eye movements in the present study does not alter the interpretation of the findings. We also note that eye movements were not recorded during scanning in many prior studies of Posner attention cueing, including the study to which we compare our attention-related effects (Corbetta et al., 2000). During each study session, participants viewed a black screen containing two white boxes (subtending 5° horizontal and vertical angles) appearing to the right and left of a white central fixation crosshair (Fig. 1). The nearest edges of the boxes subtended a 1° horizontal angle from central fixation. The beginning of each trial was indicated by the appearance of a green arrow cue, which replaced the central fixation for 1 s. The arrow pointed to the left or right, cuing subjects to covertly shift their attention (without moving their eyes) to the corresponding box. After a variable cue-to-stimulus interval (CSI)—1, 3, or 5 s—an object appeared for 500 ms in one of the two boxes. On 82% of trials, the object appeared in the cued box (valid trials), while on the remaining trials it appeared in the noncued box (invalid trials). Upon appearance of the object, participants were to indicate whether the stimulus represented a real object or belonged to the artificial object class of greebles (index and middle finger key press, respectively); the response hand was counterbalanced across subjects. Speed and accuracy were given equal emphasis in the task instructions. A variable intertrial interval (ITI) of 1.5, 3.5, or 5.5 s separated the offset of the object stimulus from the onset of the following cue. The variable CSIs and ITIs were pseudorandomly distributed across trials such that the regressors in the general linear model (GLM) (see fMRI data analysis) that estimated the neural responses to cues and objects were minimally correlated (<0.13), thus allowing activity elicited by each phase in the trial (cue and object) to be independently assessed. Stimuli were presented in pseudorandom order, with no more than three trials of one item type (objects/greebles) occurring consecutively. Stimuli were projected onto a mirror mounted on the MRI headcoil. Experimental design. Left, During the study phase, subjects were scanned while incidentally encoding a series of visually presented objects and greebles in a variant of the Posner cueing paradigm. Items were preceded by an arrow cue, pointing to a box on the left or right side of the screen. Subjects were to covertly shift attention to the cued box, in anticipation of an upcoming item. Items appeared after a variable duration (see Materials and Methods, Behavioral task) in either the cued location (validly cued trial) or the uncued location (invalidly cued trial). Subjects made a button press to indicate they had identified a real object or a greeble, regardless of whether the item appeared in the validly or invalidly cued location. Right, Following the study phase, subjects were administered a surprise memory test for the real objects. Subjects made one of four memory responses indicating whether they recognized the item from the previous study phase (old) or whether the object was unstudied (new), as well as their level of confidence in their decision (sure or unsure). If an old response was given, subjects were cued to make a source judgment for the location in which the item was studied (left or right). Immediately following the final study session, participants were transferred from the scanner to a neighboring testing suite and received instructions for the surprise memory test. The test list comprised 350 studied (old) and 180 unstudied (new) common objects, centrally presented, individually, in pseudorandom order. For each test object, participants were to indicate whether or not they had encountered the item in any of the study sessions, and to indicate their level of confidence. One of four responses (sure old, unsure old, unsure new, sure new) was made with the index or middle fingers of each hand. Old and new responses were made using separate hands, with high and low confidence indicated by middle and index fingers, respectively. The mapping of hands to old or new responses was counterbalanced across participants. Each test trial began when the white fixation crosshair changed to red for 500 ms (Fig. 1), after which the test object was presented and remained onscreen until a response was made or until 4 s elapsed (if no response was made). If the object was judged to be new, the test advanced to the next trial. If the object was judged to be old, it remained onscreen for up to 4 more seconds, during which time participants attempted to recollect the location at which the object had appeared during the study (cued with the appearance of a “Left?”, “Right?” prompt) (Fig. 1). Participants made a left or right index finger button press to indicate memory for the object appearing on the left or right side of the screen, respectively, and made their best guess when uncertain. A 1.5 s ITI (displaying a white fixation crosshair) separated test trials. To mitigate fatigue, participants were given a self-paced break after each third of the test. Whole-brain imaging was performed on a 3 T Signa MR scanner (GE Medical Systems). Anatomical images were collected using a high-resolution T1-weighted spoiled gradient recalled (SPGR) pulse sequence (130 slices; 1.5 mm thick; 256 × 256 matrix; 0.86 mm2 in-plane resolution). Functional images were obtained from 30 4-mm-thick axial slices, aligned to the anterior commissure–posterior commissure plane and positioned to give full coverage of the cerebrum and most of the cerebellum, using a T2*-weighted, two-dimensional gradient-echo spiral-in/out pulse sequence (TR = 2 s; TE = 30 ms; flip angle = 75°; 64 × 64 matrix; 3.44 mm2 in-plane resolution). Data were acquired in 10 sessions, comprised of 190 volumes each. Volumes within sessions were acquired continuously in a descending sequential order. The first four volumes were discarded to allow tissue magnetization to achieve a steady state. Data preprocessing and statistical analyses were performed with Statistical Parametric Mapping (SPM5, Wellcome Department of Cognitive Neurology, London, UK: http://www.fil.ion.ucl.ac.uk/spm/software/spm5/), implemented in MATLAB 7.7 (Mathworks). For each participant, all volumes were realigned spatially to the first volume, and then to the across-run mean volume. All volumes were corrected for differences in acquisition times between slices (temporally realigned to the acquisition of the middle slice). The anatomical volume was coregistered to the mean functional volume, and then a unified segmentation procedure (Ashburner and Friston, 2005) was applied to segment the anatomical volume into gray matter, white matter, and CSF. The segmented images were deformed to probabilistic maps of each tissue type in Montreal Neurological Institute (MNI) space, and the resulting deformation parameters were applied to the functional images for normalization. Functional images were resampled into 3 mm3 voxels using nonlinear basis functions (Ashburner and Friston, 1999). Functional images were concatenated across sessions. Normalized functional images were smoothed with an isotropic 8 mm full-width at half-maximum (FWHM) Gaussian kernel. Statistical analyses were performed in two stages of a mixed-effects model. In the first stage, neural activity was modeled by a delta function (impulse event) at the onset of each cue and each stimulus. These functions were convolved with a canonical hemodynamic response function (HRF) and its temporal and dispersion derivatives (Friston et al., 1998) to yield regressors in a GLM that modeled the BOLD response to each event type. The two derivatives modeled variance in latency and duration, respectively. Analyses of the parameter estimates pertaining to the dispersion derivative of cue-related effects are reported below (parameter estimates pertaining to the derivatives of other items contributed no theoretically meaningful information beyond that contributed by the canonical HRF, and thus are not reported). The time series were high-pass filtered to 1/128 Hz to remove low-frequency noise and scaled to a grand mean of 100 across both voxels and scans. As described below, parameter estimates for events of interest were estimated using one of two GLMs. Nonsphericity of the error covariance was accommodated by an AR(1) model, in which the temporal autocorrelation was estimated by pooling over suprathreshold voxels (Friston et al., 2002). The parameters for each covariate and the hyperparameters governing the error covariance were estimated using restricted maximum likelihood. Effects of interest were tested using linear contrasts of the parameter estimates. These contrasts were carried forward to a second stage in which subjects were treated as a random effect. Unless otherwise specified, whole-brain analyses were used when no strong regional a priori hypothesis was possible; in these cases, only effects surviving an uncorrected threshold of p < 0.001 and including four or more contiguous voxels were interpreted. When we held an a priori hypothesis about the localization of a predicted effect, we corrected for multiple comparisons by using a small-volume correction employing an FWE rate based on the theory of random Gaussian fields (Worsley et al., 1996). The peak voxels of clusters exhibiting reliable effects are reported in MNI coordinates. Regions of overlap between the outcomes of two contrasts were identified by inclusively (or “conjunctively”) masking the relevant SPMs. When two contrasts are independent, the statistical significance of the resulting SPM can be computed using Fisher's method of estimating the conjoint significance of independent tests (Fisher, 1950; Lazar et al., 2002). For each inclusive masking procedure, the constituent contrasts were determined to be independent with tests of orthogonality for linear contrasts. This test concludes that two linear contrasts are statistically independent if the sum of the products of the coefficients is equal to zero (i.e., for contrasts A and B: if a1b1 + a2b2 + a3b3 + a4b4 = 0, then contrasts are orthogonal). The goal of inclusive masking in the present study was to search within regions that exhibited one pattern of activity to identify whether any voxels also showed a second pattern. As such, we maintained the original threshold of the contrast identifying the first pattern (p < 0.001), using a threshold of p < 0.05 for the masking contrast, to give a conjoint significance of p < 0.0005. Exclusive (or “disjunctive”) masking was used to identify voxels where effects were not shared between two contrasts. The SPM constituting the exclusive mask was thresholded at p < 0.10, whereas the contrast to be masked was thresholded at p < 0.001. Note that the more liberal the threshold of an exclusive mask, the more conservative is the masking procedure. To identify the relationship between attention effects and encoding effects, we orthogonalized the factors in our design: (1) top-down attention effects were identified by interrogating cue-related activity for all items, collapsing over subsequent memory status, and bottom-up attention effects were identified by comparing validly cued versus invalidly cued items; and (2) positive and negative subsequent memory effects were identified by comparing subsequently remembered versus forgotten items. To accommodate these analyses, two GLMs were estimated. The first was optimized to model stimulus-related effects (i.e., subsequent memory effects and bottom-up attention effects). Study trials were segregated according to subsequent memory [high confidence hits (HCHs), low confidence hits, and misses (Ms)] and cue validity (valid, invalid), resulting in six object-related regressors. Two additional regressors modeled greebles (validly and invalidly cued). Objects for which memory was not later tested were modeled as events of no interest, as were objects for which a response was omitted at test. Nine additional regressors modeled the cue-related activity associated with each of the aforementioned stimulus types. Finally, six regressors modeled movement-related variance (three rigid-body translations and three rotations determined from the realignment stage), and session-specific constant terms modeled the mean over scans in each session. The second GLM implemented a parametric modulation analysis designed to detect top-down attention effects. Previous Posner cueing studies (Corbetta et al., 2000) identified top-down attention effects by isolating activity elicited by cues to shift covert attention. To separately estimate neural responses associated with cues versus stimuli, prior studies used “catch trials” in which no stimulus appeared postcue (Corbetta et al., 2000). Here we opted to decorrelate cue- and stimulus-related activity by parametrically varying the CSI (1, 3, or 5 s). Furthermore, because cue-related activity could reflect not only top-down attention effects but also low-level visual responses to the cue itself, we used a parametric modulation analysis to distinguish activity transiently responding to the cue from that responding across the duration the variable CSIs. In other words, by isolating BOLD responses that were elicited by the cue to shift attention and that were also sustained throughout the variable interval over which attention was to be maintained, we could rule out the possibility that any cue-related effects were simply a reflection of low-level visual responses. To accomplish this, we included an orthogonal variable in the GLM to isolate top-down effects, identifying cue-related activity that increased with increasing CSI duration. It should be noted that because the HRF effectively integrates the total activity over a period of a few seconds, parametric modulators identify activity that is modulated in duration or magnitude (or both). As we discuss below, the obtained data suggest that the parametric modulator captured variance in duration of the cue-related HRF. In sum, for this second GLM, one regressor modeled all cue-related activity, and a second regressor parametrically modulated the first according to the CSI following each cue. Thus, the second regressor for each subject in this GLM was of equal length to the first regressor and comprised a vector of values where each value represented the duration of the CSI for the corresponding cue. This regressor identified voxels in which cue-related activity varied as a linear function of the duration over which attention was to be maintained. To accommodate the remainder of the known variance, a third regressor modeled all stimulus-related activity (not segregated according to subsequent memory or validity), and movement and session effects were modeled as described above. An alternative method of interrogating sustained BOLD responses across the CSI is to analyze effects associated with the dispersion derivative of the cue-related HRF. In the present design, cue-related attention effects (but not cue-related visual effects) might show a more sustained response, which would be captured by significant loading on the dispersion derivative. Accordingly, below we report the cue-related dispersion derivative outcome, which confirmed the parametric modulator outcome. However, we note that a dispersion derivative analysis is less optimal than a parametric modulation analysis for our design for two reasons. First, a dispersion derivative analysis can only accommodate variance in the duration of the HRF up to ∼1 s, and here the CSI varied from 1, 3, or 5 s. Second, the differing durations of the CSI are suboptimally modeled by a dispersion derivative, which is fit across all trial types (i.e., 1, 3, and 5 s CSIs). This trial-by-trial variability is better modeled by a parametric modulation analysis (Henson, 2007). Response profiles of regions of interest (ROIs) identified in mapwise analyses were investigated using the deconvolution algorithm implemented in MarsBar (marsbar.sourceforge.net). This algorithm deconvolves the BOLD signal in the ROI using a finite impulse response function, which assumes no shape for the hemodynamic response. From these analyses, the clusterwise integrated percentage signal change was extracted for further characterization of the functional response (see Results for details). The second main goal of the present study was to determine whether the functional dynamics of the putative dorsal and ventral attention networks changed when an event memory was effectively formed relative to when one was not. An understanding of how these attention networks dynamically interact with other neural structures during the encoding of event information may inform how episodic memories are created. We therefore sought to determine whether neural components of the dorsal and ventral attention networks showed connectivity profiles that predicted later memory success or failure. Multivariate connectivity analyses were conducted by submitting seed regions—ROIs identified in the univariate analyses as exhibiting top-down or bottom-up attention effects (see next paragraph)—to psychophysiological interaction (PPI) analyses to determine whether they showed memory-related functional connectivity with other regions in the brain (Friston et al., 1997). In this manner, we investigated whether the connectivity between attention-related regions and other brain regions differed as a function of encoding success or failure. Seed regions were components of PPC that exhibited relevant attention effects: a left dPPC [medial intraparietal sulcus (mIPS), extending into superior parietal lobule (SPL)] region that displayed top-down attention effects, and bilateral vPPC (TPJ) regions that displayed bottom-up attention effects (for details, see Results, Neural correlates of top-down and bottom-up attention subsection). Using standard PPI analysis techniques, seed clusters were individually defined for each subject on the basis of the random-effects group analyses. For each subject, the data for each seed region was the principal eigenvariate of all significant (p < 0.05) voxels within a 4 mm sphere, centered on the local peak maximum that fell within 2× FWHM of the smoothing kernel (i.e., 16 mm) and was within the anatomical region of interest, identified from each subject's normalized structural scan. These subject-specific timeseries represented the physiological component of the PPI. All but one of the 18 subjects met all criteria for every seed region; PPI analyses were performed on these 17 subjects. The timeseries were adjusted for variance associated with effects of no interest, and then a deconvolution with the hemodynamic responses was performed. The resultant vector was weighted by a contrast vector representing the relevant psychological factor (in this case, a subsequent memory contrast: HCH vs M), and then reconvolved with the hemodynamic responses. The outcome of this process formed the “psychophysiological interaction,” or PPI regressor. This regressor models the between-condition difference in regression slopes between each voxel in the brain and the seed region. This PPI regressor was entered into a GLM, along with regressors modeling the main effects of the psychological and physiological factors (i.e., the condition contrast vector and the timeseries, respectively). In line with the univariate GLMs, we additionally modeled movement-related effects as well as session-specific constant terms. Because PPI analyses are inherently less powered than their univariate counterparts (as only the unshared variance among the three regressors is attributed to the interaction term, or the PPI regressor), we adopted a whole-brain uncorrected threshold of p < 0.005, four voxel extent. Voxels that surpassed threshold in these PPI analyses can be interpreted as showing a significant difference in connectivity with the attention-related seed region as a function of later memory outcome. Participants performed at ceiling on the object/greeble discrimination task for items that were cued validly and invalidly (0.98, SE = 0.0002/0.99, SE = 0.0002, respectively). All but two of 20 participants showed evidence of attentional reorienting, as indexed by longer response times (RTs) to items appearing in the invalidly cued relative to the validly cued location; as noted above, data from the two subjects failing to show this behavioral reorienting effect were omitted from all analyses. Data from the 18 participants submitted to analysis revealed that the reorienting effect (all items: F(1,17) = 21.00, p < 0.001) (Table 1) was significant for both common objects (t(17) = 5.97, p < 0.001) and greebles (t(17) = 2.91, p < 0.01). The CSI between the orienting cue and the onset of the object did not impact the reorienting effect, as evidenced by the absence of an interaction between CSI and validity (F < 1). Recognition memory was estimated by calculating the difference in the probabilities of an old response to an old vs a new item [discrimination measure, Pr = (pOld | Old) − (pOld | New)]. Recognition memory performance was superior when participants were highly confident in their old/new decision (Prhi conf = 0.30, SE = 0.03) relative to when a low-confidence response was given (Prlow conf = 0.07, SE = 0.01) (Prhi conf vs Prlow conf, t(17) = 5.75, p < 0.001). Analyses of d′, excluding three participants who had zero high-confidence false alarms, resulted in the same pattern as the Pr analyses: high-confidence d′ = 1.25, SE = 0.11 vs low-confidence d′ = 0.29, SE = 0.08. For studied items that were confidently endorsed as old, participants were well above chance (0.5) when indicating the location in which the object was studied (“source memory” accuracy: mean = 0.71, SE = 0.03; t(17) = 6.54, p < 0.001). This was not the case, however, when low-confidence judgments were given (mean = 0.52, SE = 0.02; t(17) < 1). Thus, because both recognition and source memory performance were poor for low-confidence responses, the fMRI subsequent memory analyses focused on comparison of HCHs versus Ms. Valid versus invalid memory performance. The need to reorient attention to invalidly cued objects at study negatively impacted subsequent memory for those objects (Table 2). Specifically, invalidly cued objects were later confidently recognized less often than were validly cued objects (t(17) = 5.18, p < 0.0005). However, when invalidly cued objects were subsequently recognized with high confidence, source memory performance was equivalent to that for validly cued objects (t(17) < 1). This finding suggests that the following neuroimaging comparisons of valid and invalid subsequent memory effects (HCH vs M) were not biased in favor of conditions associated with superior source memory. Such a bias would be introduced, however, if subsequent memory analyses were expanded to include all recognized items (rather than restricted to HCHs), as source memory was better for all hits in the valid versus invalid conditions (t(17) = 1.9, p < 0.04). This finding of biased source memory for all hits, but unbiased source memory for high-confidence hits, reinforces the restriction of subsequent memory analyses to high-confidence hits. Finally, study task RTs conditionalized as a function of later memory performance revealed that study RTs did not differ as a function of subsequent memory (Table 1) (valid HCH vs M: t(17) < 1; invalid HCH vs M: t(17) < 1). This finding rules out the possibility that the neural subsequent memory effects were simply a consequence of the amount of time spent initially processing study items (i.e., differential “duty cycles”). The present experiment was designed to directly assess the degree to which top-down and bottom-up attention mechanisms contribute to the formation of event memories. Our analysis strategy first considered the factors of attention and encoding separately, and then examined the relationship between them by (1) investigating regional overlap between attention and encoding effects, and (2) investigating connectivity effects. We first examined whether our attention paradigm gave rise to patterns of activity similar to those observed in prior Posner cueing studies (which primarily used detection tasks with repeated simple shapes, whereas our paradigm included a discrimination task and trial-unique meaningful objects). Based on prior studies, top-down attention effects were predicted (1) to be elicited by the arrow cues to shift attention and (2) to vary in duration according to the interval over which attention was maintained (the variable CSI) (see Experimental procedures). Supporting these predictions, a parametric modulation analysis revealed that cue-related activity (cue > fixation) varied positively according to CSI in the frontal eye fields (FEFs), the left mIPS, extending into SPL (Fig. 2; Table 3). These findings are consistent with an extensive literature suggesting that these frontoparietal regions form a dorsal attention network (Corbetta et al., 1993; Nobre et al., 1997; Kastner et al., 1999; Hopfinger et al., 2000; Sylvester et al., 2007; for review, see Corbetta et al., 2008). Top-down and bottom-up attention effects. Top, Regions that exhibit cue-related activity that was modulated according to the duration over which attention was to be maintained (green; top-down attention effects); regions that exhibit greater activity in response to objects that appeared in an unexpected versus expected location (red; bottom-up attention effects). Regional overlap of the two effects appears in yellow. Effects are thresholded at p < 0.001 on a standardized brain (PALS-B12 atlas using Caret5: http://brainvis.wustl.edu/wiki/index.php/Caret:About). Bottom, The observed hemodynamic responses are plotted for relevant clusters (data pooled across activated voxels falling within a 6-mm-radius sphere centered on the peak voxel in the cluster; note that top-down attention effects were elicited by cues, and bottom-up attention effects by objects). L IPS/SPL, Left IPS/SPL; L TPJ, left TPJ; R TPJ, right TPJ. Confirming the outcome of the parametric modulation analysis, analysis of nonmodulated cue effects (i.e., the canonical cue-related HRF) revealed the same set of regions (bilateral FEF and left mIPS/SPL). Notably, this contrast also identified an additional set of regions in visual cortex (bilateral visual cortex, centered on [12, −99, 6] and [−18, −93, 6]; z = 4.17), consistent with the idea that the nonmodulated effects reflect a combination of low-level visual and high-level attention-related processes. Finally, to determine which nonmodulated effects exhibited a sustained response, we inclusively masked the nonmodulated effects (p < 0.001) with the dispersion derivative contrast (p < 0.05). The outcome of this procedure revealed 34 voxels in mIPS/SPL (centered on [−24, −57, 54]; z = 3.66) that showed a more sustained response than the canonical cue-related HRF, further confirming the findings from the parametric modulation analysis. To identify neural correlates of bottom-up attention, objects appearing in unexpected locations were contrasted with those appearing in expected locations (i.e., invalidly > validly cued objects). Multiple regions were more active when the object was invalidly cued, including bilateral TPJ (Fig. 2; Table 3). This pattern is consistent with the proposal that TPJ is a key component of a “ventral attention network” that mediates stimulus-driven reorienting of attention (Corbetta et al., 2008). Additional regions revealed in this contrast included FEF and IPS (Fig. 2; Table 3), a finding consistent with the hypothesis that stimulus-driven reorienting of attention triggers recruitment of the dorsal attention network (Corbetta et al., 2002, 2008; Giessing et al., 2006; Shulman et al., 2009). That is, effects revealed by this contrast may reflect the consequences of a stimulus-driven salience calculation (mediated in part by TPJ), which in turn serves to drive shifts in the locus of visuospatial attention (partially mediated by an FEF-IPS/SPL network) (Burrows and Moore, 2009; Shulman et al., 2009). It is notable that these “validity effects” appear to overlap with the CSI-varying cue-related effects in medial—but not lateral—IPS (Fig. 2, yellow). This apparent dissociation would extend recent evidence suggesting that lateral and medial IPS functionally differ (Nelson et al., 2010), with mIPS differentially tracking demands on top-down attention (Hutchinson et al., 2009; Sestieri et al., 2010; Uncapher et al., 2010). Here, mIPS was engaged during the components of the Posner task that are thought to recruit top-down attention (most directly evidenced by the parametrically modulated cue-related contrast, and indirectly evidenced by the validity contrast, for reasons described in the previous paragraph). Interestingly, this mIPS/SPL region appears to anatomically overlap with that revealed in a recent meta-analysis of the top-down attention literature (compare Fig. 2, present mIPS/SPL top-down effects, yellow + green, Uncapher et al., 2010, their Fig. 1, top-down attention Activation Likelihood Estimation map). Importantly, the apparent selectivity of the present top-down effects to mIPS/SPL, not including lateral IPS, was confirmed by a disjunction analysis (i.e., identification of regions that exhibit significant effects in one contrast but not in the other). To identify regions that exhibited validity effects but not CSI-varying cue-related activity, we masked the validity contrast (p < 0.001) with the parametrically modulated cue-related contrast (thresholded at a lenient level, p < 0.10, to create a stringent mask). Importantly, left lateral IPS survived this disjunction analysis, indicating that it exhibited validity effects but no evidence of cue-related activity. We also performed the reverse disjunction analysis, masking the cue-related contrast (p < 0.001) with the validity contrast (thresholded at a lenient level, p < 0.10). This procedure did not reveal a disjunction in left mIPS/SPL (nor in FEF), suggesting that medial (and not lateral) parietal subregions are engaged during both the cue-related and validity contrasts (again, this finding is compatible with the view that top-down attention mechanisms can be triggered by stimulus-driven salience that drives the reorienting of attention). Together, these findings support the hypothesis that lateral and medial IPS functionally differ, with mIPS/SPL differentially tracking demands on top-down attention. Subsequent memory effects. Left, Greater activity in response to validly cued objects that were later confidently remembered relative to forgotten (positive subsequent memory effects; warm colors) was observed in bilateral hippocampus, left VLPFC, right posterior IPS, and bilateral LO/fusiform. By contrast, right TPJ exhibited greater activity in response to validly cued objects that were later forgotten relative to confidently remembered (negative subsequent memory effects; cool colors). Hippocampal effects are displayed on mean across-subject anatomical images; all other effects are surface rendered on a standardized brain. Display thresholds are p < 0.001. Right, Observed hemodynamic responses to objects are plotted for relevant clusters (data pooled across all voxels in the cluster). L Hip, Left hippocampus; R Hip, right hippocampus; R pIPS, right posterior IPS; R TPJ, right TPJ; R LO/Fus, right lateral occipital and fusiform cortex; L VLPFC, left ventrolateral prefrontal cortex; L LO/Fus, left lateral occipital and fusiform cortex. Positive subsequent memory effects are often accompanied by negative subsequent memory effects, or regions that show an enhanced response to items later forgotten relative to items later remembered. Consistent with prior reports (Otten and Rugg, 2001a; Wagner and Davachi, 2001; Daselaar et al., 2004; Gonsalves et al., 2004; Reynolds et al., 2004; Turk-Browne et al., 2006; Chua et al., 2007; Otten, 2007; Park and Rugg, 2008), negative subsequent memory effects (M > HCH) were observed in right vPPC, including TPJ, and in medial aspects of parietal and prefrontal cortex (Fig. 3; Table 4). These negative subsequent memory effects, as well as the preceding positive subsequent memory effects, were associated with object-related activity (analogous analyses of cue-related activity did not reveal significant correlates of subsequent memory at standard statistical thresholds) (Otten et al., 2006). Overlap of attention and encoding effects. Top, Regions exhibiting both top-down attention and positive subsequent memory effects for validly cued objects are displayed in green, and those showing both bottom-up attention and negative subsequent memory effects are displayed in blue. Data displayed at conjoint thresholds of p < 0.0005. Bottom, Observed hemodynamic responses are plotted for PPC clusters, according to subsequent memory, and validity condition at study (data pooled across all voxels in each cluster). L mIPS/SPL, Left mIPS/SPL; L TPJ, left TPJ; R TPJ, right TPJ; SME, subsequent memory effect; HCH valid, validly cued HCHs; M valid, validly cued Ms; HCH invalid, invalidly cued HCHs; M invalid, invalidly cued Ms. Negative subsequent memory effects in TPJ have been posited to reflect the disruptive consequences of the bottom-up capture of attention during encoding, perhaps marking the diversion of attention by irrelevant event information (Otten and Rugg, 2001a; Wagner and Davachi, 2001; Uncapher and Wagner, 2009). Here, we explicitly tested this account by examining the relationship between the parietal structures engaged during the bottom-up capture of attention (i.e., greater activation to invalidly cued relative to validly cued objects) and those demonstrating negative subsequent memory effects for validly cued objects. Importantly, inclusive masking of the contrast identifying bottom-up attention effects (thresholded at p < 0.001) with that revealing negative subsequent memory effects (thresholded at p < 0.05) revealed overlap in bilateral TPJ (Fig. 4, blue; Table 3, denoted in final column). This pattern suggests that, at least for validly cued objects, greater TPJ activation may reflect the capture of bottom-up attention by irrelevant event features. Qualitative inspection of the observed hemodynamic responses in bilateral TPJ (Fig. 4) further indicated that TPJ responded maximally to items that appeared outside the current focus of attention (invalidly cued objects) and were later forgotten, and the least to items that appeared where expected (validly cued objects) and were later remembered. This observation of a negative subsequent memory effect in TPJ on invalidly cued trials—wherein bottom-up attention was presumably captured by the to-be-encoded object—was unexpected, as the capture of bottom-up attention by such objects was predicted a priori to foster their encoding. Accordingly, we next explored the subsequent memory effects on invalid trials in greater detail. To complement the preceding subsequent memory analysis for validly cued objects, we first identified positive and negative subsequent memory effects for invalidly cued objects [i.e., (HCH > M)invalid and (M > HCH)invalid]. A positive subsequent memory effect for invalidly cued objects was observed in right fusiform (Fig. 5A; Table 4); the absence of other positive correlates of encoding at the standard statistical threshold (p < 0.001) is likely due to low power. A follow-up statistically independent analysis of the percentage signal change for this cluster further revealed a modest, but significant, positive subsequent memory effect for validly cued objects (t(17) = 2.34; p < 0.02). Strikingly, the negative subsequent memory analysis revealed unexpected effects in dPPC, including in right IPS and SPL (Fig. 5B; Table 4) (similar effects were observed in left IPS/SPL when the statistical threshold was relaxed to p < 0.005). This was surprising given the finding from a recent meta-analysis that all prior negative subsequent memory effects in parietal cortex have been reported in vPPC, with none in dPPC (Uncapher and Wagner, 2009). Even in the few studies that have directly manipulated goal-directed attention in a subsequent memory paradigm (Kensinger et al., 2003; Uncapher and Rugg, 2005, 2008, 2009), there was no dPPC activity reported to be associated with subsequent forgetting. Subsequent memory effects for items outside the current focus of attention (invalid trials). A, A positive subsequent memory effect for invalidly cued items was observed in right fusiform. B, Negative subsequent memory effects for invalidly cued items (blue) were observed in ventral parietal regions, but also—strikingly—in dorsal parietal regions (see text). Regions that demonstrated a greater subsequent memory effect for objects appearing inside versus outside the focus of attention (valid vs invalid) are displayed in red. A subset of regions demonstrating this interaction also showed a negative subsequent memory effect for invalid items: right IPS and SPL (purple). C, To illustrate the nature of the interaction in right IPS and SPL, subsequent memory effects for valid and invalid conditions are plotted for each region (clusterwise mean parameter estimates and SEs shown for clusters identified from the interaction contrast). All display thresholds are p < 0.001. R Fus, Right fusiform cortex; R IPS, right IPS; R SPL, right SPL; L SPL, left SPL; SME, subsequent memory effect. We next sought to identify regions where subsequent memory effects differed according to whether objects appeared in expected, relative to unexpected, locations. Voxel-level interaction analyses [i.e., (HCH > M)invalid > (HCH > M)valid, and vice versa] revealed that, while no regions showed positive encoding-related activity that was greater for invalid than valid trials (even when the threshold of the interaction was dropped to p < 0.01), several regions—including the right IPS and SPL regions previously identified—exhibited the opposite pattern (valid > invalid subsequent memory effects) (Fig. 5B; Table 5), including the left LO/fusiform region that showed a positive subsequent memory effect when processing validly cued objects (Fig. 3). Thus, stronger preparatory coupling between mIPS/SPL regions that mediate top-down attention and LO/fusiform regions that represent visual object form appears to facilitate encoding of subsequently encountered objects. Consistent with this interpretation, an across-subject regression revealed that subjects who showed stronger subsequent memory connectivity between mIPS/SPL and LO/fusiform (during the cue period) tended to demonstrate superior recognition memory at test (i.e., exhibited higher Pr for high-confidence judgments) relative to subjects who showed weaker connectivity effects (r(15) = 0.414, p < 0.05) (Fig. 6A). In addition to connectivity increases during the preparatory period that tracked later memory outcome, mIPS/SPL also exhibited connectivity decreases with other regions (i.e., showed weaker connectivity during trials where the object was later remembered vs forgotten). These regions included a large cluster in right angular gyrus (AnG) (Fig. 6A; Table 6). AnG is regarded as a key parietal component in the default-mode network, which is thought to be involved in internally oriented or self-related cognition (for review, see Buckner et al., 2008, Bressler and Menon, 2010). Thus, one interpretation of this greater mIPS/SPL–AnG connectivity during trials where objects are later forgotten versus remembered is that directing attention internally before the external presentation of a stimulus may be detrimental to the encoding of that information. Parietal attention seeds show connectivity that differs according to encoding success or failure. A, Regions whose connectivity with left mIPS/SPL (green sphere, peak mIPS/SPL coordinates of the top-down attention contrast are illustrated in Fig. 2) was stronger during preparatory periods of trials resulting in objects being remembered versus forgotten (positive subsequent connectivity effects; warm colors); regions showing the opposite effect, or stronger connectivity with left mIPS/SPL during preparatory periods leading to forgotten versus remembered objects (negative subsequent connectivity effects) are displayed in cool colors [note that the small cluster in dorsal AnG (coordinates 39, − 57, 33) is in fact spatially contiguous with the large ventral AnG cluster that has been surface rendered dorsally (for details, see Table 6)]. Scatter plot illustrates that individual differences in the strength of the positive subsequent connectivity effect in LO/fusiform during encoding correlates with across-subject differences in later memory performance, such that the stronger the mIPS/SPL–LO/fusiform connectivity, the superior the later memory performance. B, Regions whose connectivity with left or right TPJ (Fig. 2, red spheres; peak TPJ coordinates from the bottom-up attention contrast illustrated) was stronger during the presentation of objects that were later remembered versus forgotten, and vice versa (positive and negative subsequent connectivity effects). The coloring scheme is the same as that used in A. L mIPS/SPL, Left mIPS/SPL; L TPJ, left TPJ; R TPJ, right TPJ; L LO/Fus; left LO/fusiform; R LO/Fus, right LO/fusiform; R AnG, right AnG. We next investigated whether the bilateral TPJ regions exhibiting bottom-up attention effects (during the stimulus-processing period) showed connectivity that differed according to later memory. We therefore looked for subsequent memory connectivity effects using the right and left TPJ regions as seeds. We found no regions that showed positive subsequent memory connectivity effects with the right TPJ seed and only a few that did so with the left TPJ seed (Table 6). By contrast, the TPJ seeds showed robust negative subsequent memory connectivity effects with a broad set of regions (Table 6). Strikingly, the LO/fusiform region that showed positive connectivity effects with the mIPS/SPL seed showed the opposite pattern of connectivity with TPJ (Fig. 6B). The TPJ seeds also showed negative subsequent memory connectivity effects with bilateral regions encompassing parahippocampal and fusiform cortices (Fig. 6B); parahippocampal cortex has been associated with the spatial encoding of objects (for review, see Eichenbaum and Lipton, 2008). Thus, successful object encoding appears to be associated with reduced coupling between TPJ regions (implicated in reflexive orienting) and LO/fusiform regions (implicated in visual object representation), as well as with parahippocampal regions (implicated in the encoding of objects in space). Eye movements were not monitored in the scanner, raising the possibility that the observed subsequent memory effects could, in theory, reflect differential BOLD responses associated with eye movement patterns (e.g., objects fixated might be associated with more effective encoding and thus a higher likelihood of being subsequently remembered). While the absence of eye-tracking data precludes a definitive assessment of this possibility, we believe it unlikely for a number of reasons. First, it is unlikely that extensive eye movements occurred during scanning, because participants were able to maintain accurate fixation during the behavioral training session, and an extensive literature suggests that participants tend not to saccade when trained to covertly orient (Posner and Cohen, 1980). Second, if eye movements did occur, to the extent that differences in fixating the to-be-remembered object account for differences in subsequent memory outcome, one might predict that RTs during the object discrimination task would be faster for objects in fixation relative to those peripherally viewed. However, RTs were comparable during the encoding of later remembered and later forgotten stimuli (see Behavioral performance) (Table 1). Third, subsequent memory effects have been consistently observed in IPS across studies in which all stimuli fall at the center of the visual field (for review, see Uncapher and Wagner, 2009). Under such conditions, subjects learn that the center of the visual field is task/goal-relevant, and it is to their advantage to fixate this region to effectively perceive and make decisions about presented stimuli. Fourth, even under conditions where stimuli are presented rapidly in the center of the visual field, making eye movements suboptimal and therefore unlikely, subsequent memory effects are observed in IPS. For instance, Otten and Rugg (2001b) identified subsequent memory effects in IPS/SPL for items presented for 300 ms, with no RT differences between items that were later remembered versus forgotten. Finally, we note that studies that have systematically mapped the effects of eye movements or overt shifts of attention have consistently identified bilateral parietal activity, corresponding to saccades to contralateral visual hemifields (for review, see Silver and Kastner, 2009). Our critical analysis (overlap of top-down attention effects and subsequent memory effects) identified unilateral activity in left IPS (Fig. 4). This lateralization of effects was not due to thresholding, as the effects remained left lateralized when the threshold of the attention effects was reduced from p < 0.001 to a liberal value of 0.01. Given that the items were presented with equal probability to the two sides of the screen, it seems unlikely that fluctuations in the magnitude of the unilateral IPS effects reflect eye movements to both sides of the screen. We would note that this pattern of left-lateralized IPS top-down attention effects has also been found in prior Posner studies, where eye movements were monitored during scanning and found to be negligible (Doricchi et al., 2010). The univariate data demonstrated a relationship between neural correlates of attention and episodic encoding of objects: top-down attention effects and encoding success effects overlapped in dPPC (mIPS/SPL), and bottom-up attention effects and encoding failure effects overlapped in vPPC (TPJ). The deployment of top-down attention interacted with stimulus location to either promote memory (if the stimulus appeared in the cued location) or hinder memory (if it appeared in the noncued location). The multivariate connectivity findings suggest that episodic encoding of objects is influenced by parietal interactions with regions representing visual object information (LO/fusiform), with a positive influence from top-down attention-related regions (mIPS/SPL) and a negative influence from bottom-up attention-related regions (TPJ). Based on prior observations of encoding success effects localized predominantly to dPPC and encoding failure effects localized exclusively to vPPC, we previously speculated that top-down and bottom-up attention may have distinct influences on event encoding (Uncapher and Wagner, 2009). The present study directly tested this dual-attention encoding hypothesis by manipulating top-down and bottom-up attention during an incidental encoding paradigm. Three main findings advance understanding of how attention regulates memory formation. First, for objects appearing in expected locations, dPPC regions engaged during the controlled allocation of visuospatial attention were positively correlated with episodic memory formation, whereas vPPC regions engaged during stimulus-driven attentional capture were negatively correlated with memory formation. Second, we provide novel evidence that the deployment of top-down attention is not always beneficial for encoding, as the dorsal attention network was also associated with encoding failure when objects appeared outside the focus of attention. Finally, connectivity analyses revealed that, during the formation of memories for objects, top-down and bottom-up attention appear to have opposite influences on perceptual cortical areas that subserve visual object representation, suggesting that one manner in which attention modulates memory is by altering the perceptual processing of to-be-encoded stimuli. We propose that the observed overlap between neural correlates of top-down attention and encoding success in dPPC is indicative of the extent to which the deployment of top-down attention supports memory encoding. In other words, the overlap of effects may reflect engagement of top-down attention mechanisms during the study task, which in turn increases the probability that attended information will progress through the cortical hierarchy to converge on MTL mechanisms for encoding into memory. Top-down attention can enhance the firing rate of neurons representing goal-relevant elements of an experience (Desimone and Duncan, 1995; McAdams and Maunsell, 1999; Treue and Martinez-Trujillo, 1999; Boynton, 2005) (for review, see Treue, 2001), and attention is thought to influence between-region communication by altering oscillatory coupling (Saalmann et al., 2007; Gregoriou et al., 2009a), preparing regions to receive input at the most excitable phase of their oscillatory activity (Gregoriou et al., 2009b). The hippocampus, by virtue of its apical position in the neural processing hierarchy (Felleman and Van Essen, 1991), is proposed to be the recipient of cortically processed event features (for review, see Eichenbaum et al., 2007), and cortical–hippocampal coupling is associated with successful episodic encoding (Fell et al., 2001). By facilitating the cortical representations of goal-relevant stimuli, top-down attention—partially subserved by an FEF–mIPS/SPL network—could foster the propagation of higher-fidelity representations to the hippocampus, resulting in a higher probability of stimulus encoding into memory (“biased input hypothesis”) (Uncapher and Rugg, 2009). The present data lend support for this perspective. First, activation in mIPS/SPL exhibited a top-down attention effect during the preparatory period and predicted later memory success during the object processing period. Second, activity in this mIPS/SPL region predicted response profiles in object-sensitive regions of ventral temporo-occipital cortex, namely LO and fusiform. Importantly, this functional coupling was stronger during preparatory periods of trials for which the subsequently presented object was later remembered versus later forgotten, and the strength of this mIPS/SPL–LO/fusiform coupling difference correlated with across-subject differences in later memory performance. Finally, activity in bilateral fusiform, LO, and hippocampus was greater during the viewing of objects that would be later remembered versus forgotten. Collectively, these findings are consistent with a role of top-down attention in promoting encoding by (1) preparing object representation processes in LO/fusiform for incoming information, with a stronger drive promoting better encoding, and (2) fostering effective propagation of these putatively higher-fidelity visual representations to the hippocampus. Future studies using intracranial electrocorticography (Jacobs and Kahana, 2010), with independent electrodes in LO/fusiform and in hippocampus, will provide a means to test the role of attention-mediated oscillatory coupling in visual object encoding into episodic memory. The dual-attention encoding hypothesis posits that memory failure can result when attention is captured by event information that is not the target of a subsequent retrieval attempt. That is, if attention is shifted away from information that will be the target of subsequent retrieval, encoding will be hindered for this information. Here, the overlap between bottom-up attention and negative subsequent memory effects for validly cued objects in bilateral TPJ lends support for the proposal that attention capture can hinder event encoding. Factors that engage the ventral attention network are debated, but at least include an unexpected or salience dimension (Posner and Cohen, 1984; Jonides and Yantis, 1988). One possibility is that attention was captured by nonexperimental variables (e.g., unexpected change in scanner noise, urge to move, or internally oriented cognition) or stimulus-related variables (e.g., oddly shaped or shaded object), consistent with data indicating that TPJ is engaged by not only spatial but also nonspatial (feature-based) information (Linden et al., 1999; Marois et al., 2000; Braver et al., 2001; Kiehl et al., 2001; Serences et al., 2005). Thus, while future studies are needed to gain leverage on the nature of the attention-capturing information leading to subsequent forgetting of target objects, the present data provide evidence that a reorienting mechanism in TPJ is directly associated with later forgetting. Intuitively, it is easy to understand that attentional capture of extrastimulus information would draw processing resources from the target stimulus, leading to poorer memory for the stimulus. What is less clear is what happens when the attention-capturing information is stimulus related. Recent studies reveal an equivocal pattern: while items that are distinctive in some way (and therefore attention capturing) often enjoy a mnemonic advantage (von Restorff, 1933), this is not always the case. Strange et al. (2000) reported an interaction of the “von Restorff effect” and depth of processing. Perceptually distinctive items were better remembered only if studied under “shallow” encoding conditions (where superficial aspects of the items were emphasized) (Fabiani et al., 1990), whereas emotionally distinctive items were always remembered better. Importantly, semantically distinctive items were remembered worse when attention was paid to that dimension during study. Summerfield and Mangels (2006) additionally showed that items appearing at unpredictable times (distinctive in the temporal dimension) were more poorly remembered than predictable items. Here we examined the consequences on memory when items appeared in an unexpected location. Like the semantic and temporal dimensions, items that appeared in an unexpected location suffered a mnemonic disadvantage. As in previous studies, this may be due to an interaction between our encoding task and the attention-capturing dimension. If attention to the unexpected spatial location occurred at the expense of some other memory-promoting dimension, such as semantic elaboration, memory for the objects would suffer. Another explanatory factor may be the degree to which attention-capturing information is used as a retrieval cue. To the degree that spatial information is a poor retrieval cue, attention being captured by the spatial dimension at study may hinder later memory performance. The present findings also advance understanding of how memories are formed for objects appearing outside the current focus of attention (i.e., invalidly cued objects). Our data revealed that, rather than recruiting a new set of mechanisms, the mechanisms associated with encoding objects outside attentional focus—in fusiform cortex—are a subset of those engaged when objects are within attentional focus. Strikingly, presenting objects outside attentional focus also revealed a novel negative subsequent memory effect in the dorsal attention network (SPL). To date, activation in this top-down network has been exclusively associated with subsequent memory success, rather than failure (Uncapher and Wagner, 2009). This negative effect reversed to a positive effect when objects appeared in the expected location, suggesting that top-down biasing of attention interacts with expectation to either promote or hinder memory formation. Thus, previous findings that the top-down attention network exclusively promotes memory encoding may be due to a lack of expectation violations in prior studies. Collectively, the present findings highlight the role of perceptual cortices in visual object encoding, and the modulatory influence that attention has on activity in these regions. The present data provide strong evidence that top-down and bottom-up attention mechanisms in parietal cortex influence episodic encoding, with mIPS/SPL-mediated top-down attention generally serving to promote memory formation, and TPJ-mediated bottom-up attention serving to hinder memory formation (at least within the present experimental context). Here we offer a mechanistic explanation for how to reconcile effects of attention that may appear inconsistent across the literature (Uncapher and Wagner, 2009); namely, that the presence of positive or negative subsequent memory effects in dorsal or ventral PPC can be predicted based on whether one exerts experimental control over the focus of attention. These findings of direct overlap between attention and episodic encoding appear to stand in contrast to the pattern observed during episodic retrieval, where the overlap between parietal attention and memory effects is a topic of current debate (Cabeza et al., 2008; Ciaramelli et al., 2008; Hutchinson et al., 2009; Uncapher et al., 2010). As such, the present data highlight the importance of attention during event processing for later remembering (Craik et al., 1996). This research was supported by National Institute of Mental Health Grants 5R01-MH080309 and F32-MH084475. (1999) Nonlinear spatial normalization using basis functions. Hum Brain Mapp 7:254–266. (2005) Unified segmentation. Neuroimage 26:839–851. (2001) Neural correlates of verbal memory encoding during semantic and structural processing tasks. Neuroreport 12:1251–1256. (2009) Top-down and bottom-up mechanisms in biasing competition in the human brain. Vis Res 49:1154–1165. (2006) Dorsolateral prefrontal cortex promotes long-term memory formation through its role in working memory organization. J Neurosci 26:916–925. (2005) Attention and visual perception. Curr Opin Neurobiol 15:465–469. (2001) Anterior cingulate cortex and response conflict: effects of frequency, inhibition and errors. Cereb Cortex 11:825–836. (2010) Large-scale brain networks in cognition: emerging methods and principles. Trends Cogn Sci 14:277–290. (2008) The brain's default network: anatomy, function, and relevance to disease. Ann N Y Acad Sci 1124:1–38. (2009) Influence and limitations of popout in the selection of salient visual stimuli by area V4 neurons. J Neurosci 29:15169–15177. (2008) The parietal cortex and episodic memory: an attentional account. Nat Rev Neurosci 9:613–625. (2002) Brain activity underlying encoding and retrieval of source memory. Cereb Cortex 12:1048–1056. (2007) Evidence for a specific role of the anterior hippocampal region in successful associative encoding. Hippocampus 17:1071–1080. (2008) Top-down and bottom-up attention to memory: a hypothesis (AtoM) on the role of the posterior parietal cortex in memory retrieval. Neuropsychologia 46:1828–1851. (2003) Assembling and encoding word representations: fMRI subsequent memory effects implicate a role for phonological control. Neuropsychologia 41:304–317. (1990) Attentional modulation of neural processing of shape, color, and velocity in humans. Science 248:1556–1559. (1993) A PET study of visuospatial attention. J Neurosci 13:1202–1226. (2000) Voluntary orienting is dissociated from target detection in human posterior parietal cortex. Nat Neurosci 3:292–297. (2002) Neural systems for visual orienting and their relationships to spatial working memory. J Cogn Neurosci 14:508–523. (2008) The reorienting system of the human brain: from environment to theory of mind. Neuron 58:306–324. (1972) Levels of processing: a framework for memory research. J Verbal Learn Verbal Behav 11:671–684. (1996) The effects of divided attention on encoding and retrieval processes in human memory. J Exp Psychol Gen 125:159–180. (2004) When less means more: deactivations during encoding that predict subsequent memory. Neuroimage 23:921–927. (2006) Item, context and relational episodic encoding in humans. Curr Opin Neurobiol 16:693–700. (2001) When keeping in mind supports later bringing to mind: neural markers of phonological rehearsal predict subsequent remembering. J Cogn Neurosci 13:1059–1070. (2004) Neural correlates of attentional capture in visual search. J Cogn Neurosci 16:751–759. (2010) Neural correlates of the spatial and expectancy components of endogenous and stimulus-driven orienting of attention in the Posner task. Cereb Cortex 20:1574–1585. (2001) The effect of task relevance on the cortical response to changes in visual and auditory stimuli: an event-related fMRI study. Neuroimage 14:1256–1267. (2008) Towards a functional organization of the medial temporal lobe memory system: role of the parahippocampal and medial entorhinal cortical areas. Hippocampus 18:1314–1324. (2007) The medial temporal lobe and recognition memory. Annu Rev Neurosci 30:123–152. (1990) Effects of mnemonic strategy manipulation in a Von Restorff paradigm. Electroencephalogr Clin Neurophysiol 75:22–35. (2001) Human memory formation is accompanied by rhinal-hippocampal coupling and decoupling. Nat Neurosci 4:1259–1264. (1950) Statistical methods for research workers (Oliver and Boyd, London). (1997) Psychophysiological and modulatory interactions in neuroimaging. Neuroimage 6:218–229. (1998) Event-related fMRI: characterizing differential responses. Neuroimage 7:30–40. (2002) Classical and Bayesian inference in neuroimaging: applications. Neuroimage 16:484–512. (1997) Becoming a “Greeble” expert: exploring mechanisms for face recognition. Vis Res 37:1673–1682. (2004) Neural evidence that vivid imagining can lead to false remembering. Psychol Sci 15:655–660. (2009a) High-frequency, long-range coupling between prefrontal and visual cortex during attention. Science 324:1207–1210. (2009b) Long-range neural coupling through synchronization with attention. Prog Brain Res 176:35–45. (2004) The human visual cortex. Annu Rev Neurosci 27:649–677. (2001) The lateral occipital complex and its role in object recognition. Vis Res 41:1409–1422. (2007) in Statistical parametric mapping: the analysis of brain images, Efficient experimental design for fMRI, eds Friston K, Ashburner J, Kiebel S, Nichols T, Penny W (London, Elsevier), pp 193–210. (1999) Recollection and familiarity in recognition memory: an event-related functional magnetic resonance imaging study. J Neurosci 19:3962–3972. (2000) The neural mechanisms of top-down attentional control. Nat Neurosci 3:284–291. (2009) Posterior parietal cortex and episodic retrieval: convergent and divergent effects of attention and memory. Learn Mem 16:343–356. (2008) Cortical activity time locked to the shift and maintenance of spatial attention. Cereb Cortex 18:1384–1394. (2007) Dissociation of stimulus relevance and saliency factors during shifts of visuospatial attention. Cereb Cortex 17:1701–1711. (2010) Direct brain recordings fuel advances in cognitive electrophysiology. Trends Cogn Sci 14:162–171. (1988) Uniqueness of abrupt visual onset in capturing attention. Percept Psychophys 43:346–354. (1999) Increased activity in human visual cortex during directed attention in the absence of visual stimulation. Neuron 22:751–761. (2003) What neural correlates underlie successful encoding and retrieval? A functional magnetic resonance imaging study using a divided attention paradigm. J Neurosci 23:2407–2415. (2001) Neural sources involved in auditory target detection and novelty processing: an event-related fMRI study. Psychophysiology 38:133–142. (2005) An event-related functional magnetic resonance imaging study of voluntary and stimulus-driven orienting of attention. J Neurosci 25:4593–4604. (2002) Combining brains: a survey of methods for statistical pooling of information. Neuroimage 16:538–550. (1999) The functional neuroanatomy of target detection: an fMRI study of visual and auditory oddball tasks. Cereb Cortex 9:815–823. (1995) Object-related activity revealed by functional magnetic resonance imaging in human occipital cortex. Proc Natl Acad Sci U S A 92:8135–8139. (2000) A stimulus-driven approach to object identity and location processing in the human brain. Neuron 25:717–728. (1999) Effects of attention on orientation-tuning functions of single neurons in macaque cortical area V4. J Neurosci 19:431–441. (1990) in Modular deficits in Alzheimer's disease, Modularity and neuropsychology: modules and central processes in attention and memory, ed Schwartz MF (MIT/Bradford, Cambridge, MA), pp 1–59. (2010) A parcellation scheme for human left lateral parietal cortex. Neuron 67:156–170. (1997) Functional localization of the system for visuospatial attention using positron emission tomography. Brain 120:515–533. (2010) Top-down control of visual attention. Curr Opin Neurobiol 20:183–190. (2007) Fragments of a larger whole: retrieval cues constrain observed neural correlates of memory encoding. Cereb Cortex 17:2030–2038. (2001a) When more means less: neural activity related to unsuccessful memory encoding. Curr Biol 11:1528–1530. (2001b) Task-dependency of the neural correlates of episodic encoding as measured by fMRI. Cereb Cortex 11:1150–1160. (2006) Brain activity before an event predicts later recollection. Nat Neurosci 9:489–491. (2002) Observing the transformation of experience into memory. Trends Cogn Sci 6:93–102. (2008) The relationship between study processing and the effects of cue congruency at retrieval: fMRI support for transfer appropriate processing. Cereb Cortex 18:868–875. (1980) in Tutorials in motor behavior, Attention and the control of movements, eds Stelmach GE, Requin J (North-Holland, New York), pp 243–258. (1984) in Attention and performance X, Components of visual orienting, eds Bouma H, Bowhuis D (Erlbaum, Hillsdale, NJ), pp 531–556. (2004) Item- and task-level processes in the left inferior prefrontal cortex: positive and negative correlates of encoding. Neuroimage 21:1472–1483. (2002) The neural basis of episodic memory: evidence from functional neuroimaging. Philos Trans R Soc Lond B Biol Sci 357:1097–1110. (2007) Neural mechanisms of visual attention: how top-down feedback highlights relevant locations. Science 316:1612–1615. (2005) Coordination of voluntary and stimulus-driven attentional control in human cortex. Psychol Sci 16:114–122. (2010) Attention to memory and the environment: functional specialization and dynamic competition in human posterior parietal cortex. J Neurosci 30:8445–8456. (2009) Interaction of stimulus-driven reorienting and expectation in ventral and dorsal frontoparietal and basal ganglia-cortical networks. J Neurosci 29:4392–4407. (2009) Topographic maps in human frontal and parietal cortex. Trends Cogn Sci 13:488–495. (2005a) Dissociable contributions within the medial temporal lobe to encoding of object-location associations. Learn Mem 12:343–351. (2005b) Contributions of occipital parietal and parahippocampal cortex to encoding of object-location associations. Neuropsychologia 43:732–743. (2009) Event-related fMRI studies of episodic encoding and retrieval: meta-analyses using activation likelihood estimation. Neuropsychologia 47:1765–1779. (2000) Brain mechanisms for detecting perceptual semantic and emotional deviance. Neuroimage 12:425–433. (2006) Dissociable neural mechanisms for encoding predictable and unpredictable events. J Cogn Neurosci 18:1120–1132. (2004) A new on-line resource for psycholinguistic studies. J Mem Lang 51:247–250. (1999) Feature-based attention influences motion processing gain in macaque visual cortex. Nature 399:575–579. (2005) Effects of divided attention on fMRI correlates of memory encoding. J Cogn Neurosci 17:1923–1935. (2008) Fractionation of the component processes underlying successful episodic encoding: a combined fMRI and divided-attention study. J Cogn Neurosci 20:240–254. (2009) Selecting for memory? The influence of selective attention on the mnemonic binding of contextual information. J Neurosci 29:8270–8279. (2009) Posterior parietal cortex and episodic encoding: insights from fMRI subsequent memory effects and dual-attention theory. Neurobiol Learn Mem 91:139–154. (2006) Episodic encoding is more than the sum of its parts: an fMRI investigation of multifeatural contextual encoding. Neuron 52:547–556. (2010) A roadmap to brain mapping: toward a functional map of human parietal cortex. Neuron 67:5–8. (1933) Über die wirkung von bereichsbildungen im spurenfeld. Psychol Res 18:299–342. (2006) Cue validity modulates the neural correlates of covert endogenous orienting of attention in parietal and frontal cortex. Neuroimage 32:1257–1264. (2001) Cognitive neuroscience: forgetting of things past. Curr Biol 11:R964–R967. (1999) When encoding yields remembering: insights from event-related neuroimaging. Philos Trans R Soc Lond B Biol Sci 354:1307–1324. (1996) A unified statistical approach for determining significant signals in images of cerebral activation. Hum Brain Mapp 4:58–73.
2019-04-20T10:40:17Z
http://www.jneurosci.org/content/31/35/12613