pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
57
1.01M
source
stringlengths
39
45
__label__wiki
0.931929
0.931929
music video, New Video, noise rock, post punk, punk rock, thrash punk, Video, Video Review Video by William Ruben Helms July 22, 202021:55 July 22, 2020 New Video: JOVM Mainstays METZ Releases an Explosive Meditation on Life. Loneliness, Delusion, and Death Throughout the bulk of this site’s 10 year history, I’ve spilled quite a bit of virtual ink covering Toronto-based punk trio and JOVM mainstays METZ. With the release of their third album, 2017’s Strange Peace, the trio — Alex Eadkins (vocals, guitar), Chris Slorach (bass) and Hayden Menzies (drums) — pushed their songwriting in a new direction, as they crafted some of their most personal and politically charged work with the material capturing the anxiety, uncertainty, fear and outrage of the 2016 election cycle. Last year, the JOVM mainstays released Automat, a collection of METZ’s non-album singles, B-sides and rarities dating back to 2009 on vinyl for the first time — including, the band’s long out-of-print (pre-Sub Pop) recordings. Essentially, the album was designed as chronological trip of the acclaimed Canadian act’s lesser-known material that included a bonus 7 inch single, which featured three covers: a cover of Sparklehorse’s “Pig” off a very limited 2012 Record Store Day split single, originally released by Toronto-based record store, Sonic Boom; a cover of The Urinals‘ “I’m a Bug” originally released on YouTube in 2014; and lastly, a previously unreleased, explosive cover of Gary Numan’s “M.E.” The JOVM mainstays fourth album Atlas Vending is slated for an October 9, 2020 release through their longtime label home Sub Pop Records. Their previously released material found the band thriving on an abrasive relentlessness but before they set to work on Atlas Vending‘s material, the Canadian punk trio set a goal for themselves and for the album — that they were going to make a much more patient and honest album, an album that invited repeated listens rather than a few exhilarating mosh-pit friendly bludgeonings. Co-produced by Uniform’s Ben Greennberg and mastered by Seth Manchester at Pawtucket’s Machines with Magnets, the album finds the band crafting music for the long haul, with the hopes that their work could serve as a constant as they navigated life’s trials and tribulations. The end result is an album that reportedly retains the massive sound that has won them attention and hearts across the world — but while arguably being their most articulate, earnest and dynamic of their growing catalog. Thematically, the album covers disparate yet very adult themes: paternity, crushing social anxiety, addiction, isolation, media-induced paranoia and the restless urge to just say “Fuck this!” and leave it all behind. Much like its predecessor, Altas Vending offers a snapshot of the the modern condition as they see it; however, each of the album’s ten songs were written to form a musical and narrative whole with the album’s song sequencing following a cradle-to-grave trajectory. And as a result, the album’s material runs through the gamut of emotions — from the most rudimentary and simple of childhood to the increasingly nuanced and turbulent peaks and valleys of adulthood. So in some way, the album find the band tackling what’s inevitable for all of us — getting older, especially in an industry seemingly suspended in youth. “Change is inevitable if you’re lucky,” METZ’s Alex Eadkins says of the band’s fourth album Atlas Vending. “Our goal is to remain in flux, to grow in a natural and gradual way. We’ve always been wary to not overthink or intellectualize the music we love but also not satisfied until we’ve accomplished something that pushes us forward.” Interestingly, Atlas Vending closing track “A Boat to Drown In” is the album’s first single and while continuing the band’s long-held reputation for crafting enormous, aural assaults centered around layers of distortion fueled powered chords, thunderous drumming, a mosh pit friendly hook and Eadkins urgent and howled vocals. But unlike their previously released material, “A Boat to Drown In” finds the band moving away from their grunge influences with their most expansive track to date, a track that finds them at their most oceanic. According to Eadkins, “A Boat to Drown in.” is “. . . about leaving a bad situation behind. About overcoming obstacles that once held you back, rising above and looking to a better future. The title refers to immersing yourself fully into what you love and using it as a sanctuary from negativity and a catalyst for change.” Directed by Tony Wolski, the incredibly cinematic visual for “A Boat to Drown In” follows a painfully lonely and isolated young woman’s slow-burning descent into delusion, — including a passionate affair with an enormous (and frisky) teddy bear that we discover never existed. Eventually we pull out and see this woman turn from being emotionally broken to numb and devoid of feeling,. “The song has a beautiful, crushing numbness to it that we wanted to mirror in the visual,” Tony Wolski explains. “So we chose to romanticize our main character’s descent into her delusions of love and togetherness. At a time when everyone’s simultaneously coping with some sort of isolation, a story about loneliness—and the mania that comes with it—seems appropriate to tell.” Tagged with: A Boat to Drown In Gary Numan Gary Numan M.E. Metz METZ A Boat to Drown In METZ Atlas Vending METZ Automat METZ I'm a Bug METZ M.E. METZ Pig METZ Strange Peace music music video New Video New Video: JOVM Mainstays METZ Releases an Explosive Meditation on Life Loneliness Delusion and Death noise rock punk rock Record Store Day Sonic Boom Records Sparklehorse Sparklehorse Pig Sub Pop Records The Joy of Violent Movement: New Video: JOVM Mainstays METZ Releases an Explosive Meditation on Life Loneliness Delusion and Death The Urinals The Urinals I'm a Bug thrash punk Toronto ON video Video Review Video Review: A Boat to Drown In Video Review: METZ A Boat to Drown In YouTube
cc/2021-04/en_middle_0086.json.gz/line10062
__label__wiki
0.662772
0.662772
"" You are looking for this expression. NOT The following term must not appear in document. AND Both terms must be in document. OR Either term must be in document. NEAR/X Both terms must be less than X words apart. Use NEAR alone for X = 30 words. Exact search Exclude grammatical variations of your search terms. Wiki Notes Conflict Checker IBA Partnership Save to folder Find out all Jus Mundi tutorial videos in : https://tutorial.jusmundi.com​ In less than 3 minutes you'll find everything you need to know about Jus Mundi and how to take full advantage of our search engine.​ Backlash in Investment Arbitration Ms Vanina Sucharitkul International Arbitrator - University of Paris Descartes Hide all references Access the Wiki tree I. Definition III. Denunciation of the ICSID Convention IV. Termination of BITs V. Exclusion of ISDS in Investment Agreements VI. Replacement of ISDS with Investment Court System The backlash against investment arbitration refers to the discontent and disenchantment by States with the investor-State dispute settlement (“ISDS”) system, leading them to retreat or reject the investment arbitration mechanism by various means.1 The backlash phenomenon started at the end of the first decade of the 21st century when Latin American States faced the highest number of claims.2 Forms of backlashes include, inter alia, the denunciation of the ICSID Convention, the termination of Bilateral Investment Treaties (BITs), the exclusion of ISDS in investment treaties, the recalibration of treaty practice to increase State protection and limit foreign investors’ recourse to investment arbitration or the replacement of ISDS with other forms of dispute resolution such as the Investment Court System (“ICS”), including EU's Multilateral Court System, but also multijurisdictional challenges of arbitral awards by recalcitrant States, refusal to make payment of awards against the State, the enactment of domestic legislation to impede enforcement of awards against the State, the ban of arbitration in cases involving the State or State entities or particular sectors, and the launch of inter-State arbitration in an attempt to annul a jurisdictional award in favor of the investor.3 The core of the backlash lies in the perception of unfairness, one-sidedness of the system and negative experiences of respondent States that have faced high-profile or numerous claims, prompting them to oppose investment arbitration, particularly when it pertains to the State policy space and the State’s right to regulate.4 The justifications for the backlash have varied, ranging from, inter alia, inconsistency in arbitral decisions, encroachment on the right to regulate, lack of transparency, investment arbitration cost and high amount of damages awarded to investors, the ad hoc nature of investment arbitration not being suitable for public controversies, and conflict of interest or perceived bias of arbitrators in favour of investors.5 Some of these rationales and criticisms have been addressed by academics and arbitration practitioners.6 In Latin America, the birthplace of the backlash, some States have encountered the largest number of claims by foreign investors.7 Three Latin American States denounced the ICSID Convention: Bolivia in 2007, Ecuador in 2009 and Venezuela in 2012,8 and have terminated a number of BITs and adopted domestic legislations to limit investors’ rights.9 However, it should not be overlooked that since Bolivia’s denunciation in 2007 and until 12 April 2019 fourteen States have ratified the Convention (Serbia (2007), Kosovo (2009), Haiti (2009), Qatar (2010), Moldova (2011), South Sudan (2012), Montenegro (2013), Sao Tome and Principe (2013), Canada (2013), San Marino (2015), Iraq (2015), Nauru (2016), Mexico (2018) and Djibouti (2020).10 A number of States that faced ISDS claims began to terminate some or all of their BITs,11 including South Africa, India, Indonesia, Bolivia, Venezuela and Ecuador.12 Certain States have reviewed their treaty practice and enhanced State’s protection in light of pending claims, as well as restricted access to ISDS. For example, South Africa enacted legislation to exclude ISDS13 and India introduced a model BIT in 2015, which scales back on the scope of investment protection.14 The Member States of the European Union agreed to terminate all their intra-EU BITs after the judgment of the Court of Justice of the European Union in the Achmea case.15 After a tobacco producer, Philip Morris, commenced arbitration to challenge Australia’s tobacco plain packaging,16 the Australian Government declared on 12 April 2011 that it would no longer include ISDS provision in its future investment treaties or trade agreements.17 South Africa followed suit in 2012.18 As European countries started to become parties to ISDS claims, most notably in the Vattenfall case19, anti-ISDS and anti-trade groups started campaigning against ISDS provisions in the Transatlantic Trade and Investment Partnership (“TTIP”) agreement negotiations between the EU and the U.S.20 Although the EU initially instructed the negotiations to include ISDS,21 the EU Parliament eventually voted to replace ISDS with an investment court system, comprising a two-tiered court with permanent pre-selected tenured judges and an appellate mechanism (see Multilateral Investment Court).22 The investment court system has found its way in recently concluded agreements, namely the Comprehensive Economic and Trade Agreement with Canada (“CETA”), the EU-Vietnam Investment Partnership Agreement (“EVIPA”), the EU-Singapore Investment Protection Agreement (“EU-Singapore IPA”), the EU-Mexico Agreement in Principle.23 Request the original PDF The original PDFs of the commercial arbitration awards are the only documents that are not available by default on jusmundi.com. Unlike the other documents on Jus Mundi, these arbitral awards were rendered between two private parties and were initially confidential. Jus Mundi's algorithms and legal experts scan the web and the national litigation around the world in order to identify those awards that have been made public, in most cases through a municipal annulment or enforcement procedure. The HTML version of these documents remains fully available to all. Nevertheless, access to the original PDF is reserved to clients of the Jus Mundi - Arbitration Research offer. No account ? Create a Jus Mundi account. This Wiki Note has not been submitted yet. We continuously identify new themes to add to the existing Wiki Notes as well as Contributors to author new Notes. Become a Contributor, submit your candidacy to author this Wiki Note. The writing of this Wiki Note is in progress. This feature requires Premium access Start your free trial to access comprehensive references to case law, treaties and academic works included in all of Jus Mundi's Wiki Notes Already registered ? Sign In. Select a key word : Instantly access the most relevant case law, treaties and doctrine. Please describe here your feedback (data, content, missing information, other). Thank you for helping us improve our search engine! The Search Engine for International Law & Arbitration IBA x Jus Mundi Partnership Directory of Arbitrators Jus Mundi Tutorials Privacy Charter contact@jusmundi.com © 2020 Jus Mundi The reference has been copied. An error just occurred, please try again By continuing your visit on this site, you accept the use of cookies for purposes of audience measurement and service improvement.
cc/2021-04/en_middle_0086.json.gz/line10065
__label__wiki
0.808441
0.808441
06.13.16 June 13, 2016 Sympathy for the Spoon-Collector in The Witcher 3: Blood and Wine by Gareth Damian Martin @jumpovertheage “I like rusty spoons” whispers Salad Fingers, in his bizarre quavering voice, those ovular eyes pointed in precisely the opposite direction from each other. “I must find the perfect spoon.” Pleasingly creepy and unhinged, David Firth’s crudely-made web series appears, at this distance of a decade, as a fairly distinctive generational marker. That’s why it seems an unlikely coincidence when, in The Witcher 3: Blood and Wine, we find a creature with exactly the same desire. Holed away in a overgrown house is the Spoon Collector, a skeletal horror wracked by a supernatural curse that has it searching for the “perfect spoon” to sate its hunger. It is typical Witcher territory; a derelict home carefully populated with clues, journals and letters, leading to an inevitable encounter with a dangerous monster. The fact that among these clues are more than a few rusty spoons feels like it cements the Salad Fingers reference in place. But while this would seem to condemn the Spoon Collector to being little more than a joke, a silly reference in an expansion with a fair share of weird and frankly crappy jokes—including a character whose initials are “D.L.C.” and another whose name is “Barnabas-Basil Foulty”—this is a creature far more slippery than that. As a spotted-wight, an emaciated, distorted breed of creature so terrifying that we are told they were hunted to extinction by the witchers long past, the Spoon Collector makes for an unpleasant sight. Tucked away in a wardrobe in a corner of its lair, Geralt watches as it stumbles around with an unpredictable gait, tending to its noxious cauldron. It’s a scene with some wonderfully old-fashioned horror-movie tension; the half glimpsed monstrosity watched as it goes about its dark deeds. But as the Spoon Collector approaches Geralt’s hiding place with madly roving eyes, the scene transforms. Here, we are given the chance to attack, or to try to lift the creature’s curse. Both choices lead to wonderfully bizarre events. Choose to attack and you’ll trigger a battle where the Spoon Collector swims through a pool of spoons like a cutlery-obsessed Scrooge McDuck. But attempt to lift the curse instead and Geralt has to sit down to dinner with the damn thing. Suddenly, the creature transforms from sinister to slapstick, as the Witcher tentatively guides the creature into sitting with him, like teaching a child to eat through imitation alone. Its also an oddly affectionate scene—not just between Geralt and the creature, but between developer CD Projekt RED and their subject matter. The Spoon Collector’s careful animations and expressions, its wobbling gait and comic timing all pointing to a loving level of craft and attention expended on the Spoon Collector, one that delights in the grotesque and fantastic potential of man-eating monsters. This is a creature far more slippery than that The Witcher 3: Wild Hunt’s (2015) base game is filled to the brim with peasants. Stand still in one of its muddy, godforsaken villages and you can watch them mill around, gabbling on about the weather or their ailments, spouting aphorisms for the downtrodden: “Nothing hurts so much as life,” observes an abused servant. “Even the gods weep for our misfortune,” grumbles a rain-sodden farmer. “No such things as bad ships or bad weather,” croaks a wizened Skelliger, before adding: “only worthless fucking sailors.” It’s an atmosphere that falls somewhere between the silly humor of Monty Python and the Holy Grail (1975) and the deranged, mud-caked mutterings of Alexei German’s Hard to be a God (2014). Like German’s masterpiece it’s also hard to place these interjections on a scale that stretches from perverse to profound. This is what gives the game much of its rich character, especially in side quests and witcher contracts that have Geralt rubbing elbows with the underclass. Even the games more notable questline, the much-praised Bloody Baron, hinges on this atmosphere of medieval grubbiness. That’s why, when The Witcher 3: Blood and Wine takes us off to a fairytale kingdom of knights and nobles, complete with a Disney Cinderella Castle at its center, something feels missing. Unsurprisingly, the knights turn out to be asinine and vapid characters, their appearances usually involve them acting as likely foils to Geralt’s now well-worn snarky comments. Unfortunately, these exercises in gentle fun-poking have none of the grit and charm of Geralt’s dealings with bloody-minded peasant folk, and in the end, the expansion’s humans end up fading into the background. However, rather than losing its identity through this shift, Blood and Wine takes this opportunity to let its monsters take more of the spotlight. The Spoon Collector is just one among many of these monsters. From the very start, Blood and Wine throws wonderful monster after wonderful monster at you in a run of tricky battles, including the Dark Souls-like giant Golyat and the ancient geological structures of the Shaelmaar. Each is elegantly animated, distinctively designed and carefully back-storied. Together they are a strong reminder that monsters are the true heart of the Witcher series. However, while these beasts are fearsome enemies and strong works of design, their memorable nature stems from CD Projekt RED’s pursuit of sympathy for these creatures. The gigantic Golyat, according to a legend found in the game world, is actually Luis Alberni, a knight punished for his vanity by the Lady of the Lake by being transformed into a misshapen giant. Meanwhile the Shaelmaar, a rare and powerful creature from deep within the earth, is simply being used for entertainment in the Duchess’s tournament ring, its sensitive hearing tormented by the roar of the crowd. Again and again the player is given reasons to be sympathetic towards these creatures, to find explanations for their actions, pity for their fates. In short, the monsters of The Witcher 3: Blood and Wine are not beasts, but characters, even if they might not speak a word. This attitude is part of a long tradition of finding the human in monsters, perhaps most recently and compellingly pursued by director Guillermo del Toro. From the ghosts of The Devil’s Backbone (2001) and the faun of Pan’s Labyrinth (2006), to the ensemble cast of freaks and creatures in the Hellboy films, Del Toro finds his strongest characters in the supernatural, the lost and the monstrous. Combined with his precise eye for strong design and love of practical effects (perhaps best evidenced in Hellboy 2’s wonderful Troll Market) Del Toro’s monsters are built for more than just mass slaughter or jump scares—they are explorations of his own sense of identity, his own love of the macabre. Del Toro has often said that his vision of Hellboy, a character much like the witcher Geralt, trapped between the worlds of monsters and men, is his most personal work. That might seem strange for a such a pulp film series, but Del Toro sees Hellboy as “a monument to human vulnerability.” And perhaps it is this vulnerability that makes his monsters so compelling, even when they are simultaneously terrifying. In a comprehensive interview in 2011 with the New York Times, Del Toro said “I’m not just Hellboy—I’m the Pale Man, too.” The Pale Man, the eyeless child-murder of Pan’s Labyrinth, and one of contemporary cinema’s greatest monsters, is not the first creature you would think of as relatable. But for Del Toro this creature was an image of pure and primitive greed, stemming from his own struggle with his weight. The Pale Man, in Del Toro’s eyes, was not just another cool idea for a freakish beast, but an expression of something undeniably, even unpleasantly, human. Blood and Wine takes this opportunity to let its monsters take more of the spotlight I don’t want to spoil the fate of the Spoon Collector, but there is something of the Pale Man in its nature. This creature too is formed of a very human failing, and finds its cure in the most positive human aspect of Geralt, his compassion. This compassion is something that, if the player chooses, they can show to many of the creatures of Blood and Wine. In fact, while there are irredeemable horrors in its bestiary—corpse-eaters and child-killers, creatures from nightmares and fever-dreams—Blood and Wine finds its strongest moments in its discussions of humanity through the lens of monsters. Emiel Regis Rohellec Terzieff-Godefroy, or Regis for short, plays a large part in these discussions. A higher vampire who no longer drinks the blood of the living, and an old friend of Geralt, Regis’ softly-spoken manner and composed attitude betray a fierce intelligence. Voiced in what is a rare understated performance by Mark Nobel, Regis brings discussions of the value of humanity to the fore, his immortal nature and powerful abilities making him unable to fully comprehend the short and ugly lives of humans. He is compassionate to a fault, loyal and intelligent, and yet he is by definition a monster. His presence among the oversaturated colors and more luridly bizarre quests of Blood and Wine is a pleasant one, shifting the expansion’s focus towards Geralt’s distance from the humans he seeks to protect, and his similarities to the beasts he slays. This concern of The Witcher 3: Blood and Wine creates an interesting relationship to the themes and strengths of the base game. It suggests that the strength of the Witcher series neither lies in its fantastic monsters nor its richly drawn peasants, but somewhere between. It finds the monstrous, the ugly, and the grotesque in humans, and the redeemable, expressive elements of monsters, and in doing so it bridges the gap between them. However, rather than using this idea to damn both sides, it finds sympathy for its subjects. That sympathy can just as easily be for the terrifying Spoon Collector and its victims or the Bloody Baron and his abusive acts as both a father and husband. And it is that sympathy that opens us to the strongest message of The Witcher 3 games, that like it or not, humans and monsters are closer than we could ever imagine. Gareth Damian Martin Gareth Damian Martin is a writer and artist. His obsessions include: architecture (virtual), literature (procedural) and memory (fictional). Blood and WineCD Projekt REDfeatureSalad Fingersthe witcher 3 ← At E3, FIFA 17 concedes that soccer is boring A man and his mecha fall in love in Titanfall 2 →
cc/2021-04/en_middle_0086.json.gz/line10068
__label__wiki
0.98781
0.98781
Mickey Guyton Performs ‘What Are You Gonna Tell Her?’ With Keith Urban at the 2020 ACM Awards [Watch] Kevin Mazur, Getty Images Mickey Guyton performed her commanding Bridges single "What Are You Gonna Tell Her?" — backed by show host Keith Urban on the piano — during the 2020 ACM Awards on Wednesday (Sept. 16). The thrilling production of the empowering anthem aired live from Nashville's Grand Ole Opry. The joint performance got a passionate introduction from fellow country star Tim McGraw, who had just played a tune from Music City's Bluebird Cafe as part of the three-venue, audience-less ceremony comprising the 55th Academy of Country Music Awards this year. "As a son, a husband, and a proud father of three daughters — as a human being — I am enlightened and inspired by women every single day," McGraw said. "Their strength changes me for the better, and every opportunity in life should be available to women." Speaking to the message behind Guyton's stirring song, McGraw continued, "This next song speaks to the questions we face while we're trying to create the change that allows our daughters to be whoever they want to be." "She thinks life is fair and / God hears every prayer / And everyone gets their ever after," the song's lyrics begin. "She thinks love is love and if / You work hard, that's enough / Skin's just skin and it doesn't matter / And that her friend's older brother's gonna keep his hands to himself." See the Best Pictures from the 2020 ACM Awards Women's empowerment was a significant part of the 2020 ACM Awards. Earlier in the CBS broadcast, Carrie Underwood saluted country music's influential female artists with a commanding medley of songs. The Guyton performance was also a history-making endeavor: According to Yahoo!, it marked the first-ever time that a Black woman had performed her own material at the ACM Awards. See the Best of the Best Dressed at the ACM Awards: Source: Mickey Guyton Performs ‘What Are You Gonna Tell Her?’ With Keith Urban at the 2020 ACM Awards [Watch] Filed Under: Mickey Guyton
cc/2021-04/en_middle_0086.json.gz/line10070
__label__wiki
0.59207
0.59207
A Brand Reborn: KLH Audio Posted by Hans Wetzel on Mar 1st 2019 Henry Kloss (1929-2002) was one of the pioneers of North American hi-fi. He studied physics at the Massachusetts Institute of Technology (MIT) before dropping out to embark on a career in which he founded several storied audio brands, including Acoustic Research, Advent Corporation, Cambridge Soundworks, and Tivoli Audio. Along with patent-holder Edgar Villchur, Kloss helped design the first commercially available sealed-box loudspeaker, the Acoustic Research AR-1. Kloss is probably best remembered for KLH Research and Development Corporation, which he cofounded, with Malcolm Low and J. Anton Hofmann, in 1957 in Cambridge, Massachusetts. KLH -- the name was formed from the initial letters of the founders’ last names -- produced several innovative electrostatic loudspeaker designs and electronic components, but by 1967 Kloss had moved on. KLH thereafter changed hands several times, and quickly fell off the hi-fi map. David Kelley, a longtime Klipsch executive whose final position there was as the brand’s president of global sales, left Klipsch in 2017 and shortly thereafter acquired KLH. The company has since been renamed KLH Audio, and since the brand’s official rollout in 2018, Kelley and his Indiana-based team have rolled out no fewer than 35 SKUs distributed in 22 countries. Drawing on his own extensive experience as well as that of his lieutenants, who’ve worked at such brands as Carver, Paradigm, and Sonance, Kelley has introduced full ranges of loudspeakers and in-wall speakers, headphones and in-ear monitors, a voice-enabled amplified keypad, a digital radio in homage to the original KLH Model Eight, and a flagship electrostatic loudspeaker, the Model Nine. KLH Audio owner and president David Kelley with his pride and joy, the Kendall floorstander On February 19, 2019, KLH hosted a promotional event for its speaker line at World Wide Stereo, in Montgomeryville, Pennsylvania, not far from my home in South Philadelphia. WWS has teamed up with KLH to distribute the speakers through Amazon. For the evening’s large crowd KLH had set up four listening experiences at WWS, loosely organized like a modern home, including two two-channel systems, a 2.1-channel system, and a surround-sound system. KLH’s new speakers are named for streets in and around Cambridge, Massachusetts. While the historical nod is certainly appreciated, KLH’s newest creations are pitched more like model homes than loudspeakers. Consider the range-topping Kendall floorstander ($1299.98 USD/pair), which provides the ultimate expression of power and luxury, and will no doubt make you the envy of your cul-de-sac. If you need something more livable, perhaps the smaller Quincy ($999.98/pair) or Cambridge ($799.98/pair) towers will strike your fancy. Want something for a bedroom or living-room nook? The Albany ($478.99/pair) and Ames ($378.99/pair) bookshelf models may be just the ticket. Rounding out the line are three more speaker models: the Beacon surround ($498.99/pair), the Broadway elevation ($498.99/pair), and the Story center ($398.99 each). Four subwoofers are available: the sealed-box Stratton 10 ($648.99) and Stratton 12 ($798.99), and the ported Windsor 10 ($448.99) and Windsor 12 ($598.99). All speaker models are available in real-wood veneers of Black Oak or American Walnut -- except for the Ames (Black Satin, White Satin) and the subs (Black Oak). The KLH Quincy in Black Oak (center), and the Cambridge in American Walnut (right) KLH seems dead serious about making rapid headway in the crowded market of speakers costing under $1500/pair. As Kelley explained during the demo of the flagship Kendall, KLH wants to be aggressive with what consumers might expect in terms of sound quality and fit’n’finish. The demo units were finished in American Walnut and looked fantastic, and their cabinets of 3/4”-thick MDF felt substantial. The same 1” anodized-aluminum dome tweeter is used in all of the non-subwoofer models, and was purpose-built by KLH. The 5.25” midrange driver and two 6.5” woven-Kevlar woofers looked rather upscale, each surrounded by a brushed-aluminum ring that matches the plate surrounding the tweeter. While I would have loved to have seen their driver-mounting screws hidden from view, as so many manufacturers now do, the Kendall towers still looked handsome, and their magnetically attached grilles do hide it all. KLH’s 1” dome tweeter of anodized aluminum used in every speaker model (except the subwoofers) I wasn’t lucky enough to grab the money seat during Kelley’s presentation, but the Kendalls sounded great driven by more than $10,000 worth of McIntosh Laboratory electronics: squeaky clean, plenty of soundstage depth, and dashes of body and warmth. The sound reminded me a lot of Monitor Audio’s Silver 300 speakers ($2000/pair), which I reviewed in early 2018 -- quite promising. Kelley told us that all of KLH’s passive speakers come with a ten-year warranty for parts and labor. Given the industry norm of three to five years, a full decade of coverage is a serious statement, and my eyebrows rose -- only to quickly furrow as Kelley went on to explain that the Kendall is a 96dB-sensitive design with output down to 25Hz, ±3dB. Color me dubious. As impressive as the sound was -- and this bass-reflex design did hit pretty hard in the bass -- I doubt the Kendall will get anywhere near those figures, even measured in-room. The KLH Albany mini monitor in Black Oak (right), next to a Bowers & Wilkins 706 S2 (left) I also heard a demo of the three-way Quincy floorstander, which has a smaller cabinet and only one 6.5” woofer. It sounded largely identical to the Kendall. I was more interested in the Albany, the bigger of KLH’s two mini monitors. At 13”H x 6.5”W x 9.5”D, it’s tall, narrow, and, in a somewhat unusual move, a sealed design, with a specified -3dB point of 35Hz and a sensitivity of 92dB. This should mean that the Albany has greater bass extension, thanks to a shallower rolloff, but less upper-bass punch given its absence of a port. It made sense that KLH paired the Albany with one of its subwoofers, crossed over at 80Hz -- it was impossible to hear what the little guy could do down low. Still, its handling of the dynamics of a John Mayer cut recorded live and outdoors was impressive, its tweeter exhibiting plenty of sparkle and spaciousness, while Mayer’s electric guitar had plenty of presence and drive. I left the KLH event with a pair of Kendalls in my back seat. As ever, the proof will be in the listening, and we’ll be sure to measure the Kendalls in the anechoic chamber of Canada’s National Research Council. Despite my skepticism about some of KLH’s specs for the Kendall and Albany, I was very impressed with the revitalized company’s rollout, and told David Kelley as much before I departed. Their new speakers look and feel fantastic, with an attention to detail and maturity that belie the fact that the company name rose from the ashes only two years ago and is still, effectively, a recent startup. And the overall approach is a strong one: the speakers sound super dynamic, look the part, and are backed by a generous warranty. It’s a propitious start -- I wouldn’t be surprised if we see and hear a lot more from KLH going forward. Two KLH Kendalls in American Walnut flank some pricy electronics from McIntosh Laboratory I still have a lot of listening to do, but I can tell you that in my first few hours with the Kendalls installed in my reference system, I’ve heard a great deal in their sound to admire. Meanwhile, check out Brent Butterworth’s review of the KLH Ultimate One headphones on our sister siteSoundStage! Solo. Welcome back, KLH. . . . Hans Wetzel hansw@soundstagenetwork.com
cc/2021-04/en_middle_0086.json.gz/line10071
__label__cc
0.53546
0.46454
Mon, 8 June 2020 | Written By: Helen Thomas Helen is CEO of BlondeMoney, a consultancy that analyses the mispriced risks in financial markets, from politics to liquidity and beyond. US Presidential Election 2020: The Coronavirus Election The outcome of the US Election depends on who swing state voters perceive to be the candidate best placed to fight the twin health and economic crises. President Donald Trump has the advantage of incumbency and healthy campaign coffers, but Democrat Joe Biden polls well in swing states. This is Donald’s to lose, and Joe will be hoping to pick up the pieces. President Trump’s management of the coronavirus crisis has highlighted the advantages of incumbency: he is the one that can actually do something. A recent poll showed that 44% of respondents thought Trump was the best person to manage the coronavirus, and only 36% responded Joe Biden. The latter has been kept out of the spotlight leading to a recent pitiful poll result that 42% of respondents were either “unaware” or “did not have an opinion” of his proposals for the pandemic. Will Covid-19 damage Trump’s chances of re-election? Trump’s approval rating is back to the highs of his Presidency, even as polling over his handling of the crisis remains in net negative “disapprove” territory. The way that voters weigh up their concerns over the health crisis versus the economic crisis will be of critical importance in swing states. Here the polling looks less positive for Trump. 59% of respondents in Michigan qualified his pandemic response as “too slow”, as did 55% in Florida. As a result, general election polls have given Biden a decisive advantage, with 8-point advantages in Michigan and Pennsylvania, and a slimmer 3-point lead in Florida. This swing-state edge has consequently been reflected in national polls, in which he leads on average by 6 points. However, these numbers must be read with caution: Biden’s lead is half what Hillary Clinton’s was in 2016 at this point, and his own shaky numbers over the handling of coronavirus will be put under strain once he goes through the scrutiny of an election campaign. Despite these key swing-state leads, Biden has been unable to build the momentum necessary to make that lead more convincing. A credible sexual assault allegation has gained a lot of attention, and he has thus far failed to fully lock up the progressive left of the party, despite receiving endorsements from Sanders and Warren, which has translated in weak polling numbers with young voters. Biden presidential bid faces pitfalls over running mate and campaign financing Biden has the opportunity to boost his campaign by choice of running mate, but even that is laced with potholes. Klobuchar and Harris are too centrist for the Sanders voters and they blame brother Bernie’s woes on Warren staying in the race too long. Biden already does well with minorities and the Midwest so the impact of Klobuchar/Harris would be minimal among those groups whilst confirming to the left that Biden will run a centrist campaign. In short, the process of selecting the VP will only re-open the deep divisions that exist within the Democratic Party. Biden faces an uphill struggle given the financial constraints his campaign faces. As of the start of April, the Biden campaign had a cash deficit of $187m on the Trump campaign, which will be even more difficult to make up virtually and in the context of an impending recession. This hasn’t stopped the Biden campaign from investing heavily in swing states: they have spent more than the Trump campaign in digital advertising in Wisconsin, Michigan, and Pennsylvania; despite this, they are being outspent in North Carolina and Arizona. These weaknesses could potentially be major roadblocks should they not be resolved, with virtual eyeballs ever more important now that so many people are just kicking their heels at home. Will vote-by-mail expansion swing US Presidential Election for Biden? In addition to the role the economy and Joe Biden’s momentum will play in the election, the conditions of the election itself will be incredibly important. Firstly, Justin Amash’s Libertarian bid for President, amidst questions of how third-parties can collect the signatures necessary to appear on the ballot, will likely play in Biden’s favour, especially in the key state of Michigan, which Amash, a former Republican, represents in Congress. How voters will be able to vote in the context of the pandemic will play a crucial role too: some blue states have made vote-by-mail universal, while the measure has received resistance from Republicans. This is likely because recent electoral results have indicated that expanding vote-by-mail favours Democrats, as the easy access to the ballot has increased turnout in their favour. This will be important amidst the many ongoing legal and political (both in statehouses and in Congress) battles over how to secure the vote in November. Will Trump win over voters with renewed attacks on China? The coronavirus has also brought new issues to the fore. Now that Trump is unable to run on the strength of the economy, he has pivoted to the issue of China. He is painting Biden as complacent with China, who he has repeatedly blamed for the coronavirus pandemic. The heightened tensions between China and the USA will likely endanger their relationship, and push Joe Biden to adopt more aggressive rhetoric towards China. The diplomatic consequences could endanger their cooperation in the future, and push them into a neo-Cold War-esque rivalry. Latest Markets.com News Can WTI reach above $53 again? Is natural gas ready for a bullish storm? Stocks nudge higher, HSBC rises on dividend hopes Cryptocurrency update: Polkadot jumps while Bitcoin stalls Should you follow Baillie Gifford into Moderna shares? Blonde Money: Britain After Brexit Sluggish start for stocks Week ahead: ECB press conference, Joe Biden enters White House and earnings season rolls on Can Netflix shares rebound on earnings update? Stocks retreat in wake of Biden's stimulus, Babcock tumbles on audit concerns
cc/2021-04/en_middle_0086.json.gz/line10072
__label__wiki
0.854647
0.854647
This Digital Edition requires Flash 9.0.115 or above to activate some rich media components. Please click the following link to download and install: When you are finished installing, please return to this window and PRESS F5 to view this edition. Description: SP's Military Yearbook 2016-2017 - Glimpse SP s s i n Mod organisational Structures and Contacts of major asian countries NEW additioN Yearbook c e 1 9 6 5 Military 2016 4 4 th 2017 i s sue Guardian PERSISTENT MARITIME DOMAIN AWARENESS 40 hour endurance provides superior mission area coverage Powerful 360 maritime search radar with Inverse Synthetic Aperture Radar (ISAR) All weather day night high definition full motion video and imagery Enhanced situational awareness via teaming with manned air surface assets Tailored to fulfill the maritime security needs of India s Navy www.ga-asi.com 2017 General Atomics Aeronautical Systems Inc. Leading the Situational Awareness Revolution jayant baranwal editor-in-chief THE OTHER SWISS MOVEMENTS Swiss timepieces are renowned for their inherent quality exquisite detail and careful craftsmanship. Like the PC-12 NG which is one of the most popular turbine-powered business aircraft on the market today. Or our training systems Thousands of military pilots all round the world have earned their wings with one of our proven aircraft. Pilatus Aircraft Ltd Switzerland Phone 41 41 619 61 11 www.pilatus-aircraft.com thalesgroup.com Defence solutions Wherever safety and security matter we deliver PRECISION STRIKE Deliver precision effects within the battlespace while avoiding collateral damage THREAT DETECTION Provide early detection prioritisation and faster reaction to threats CYBER DEFENCE Provide active defence of cyberspace SITUATIONAL AWARENESS Increase operational tempo through shared intelligence NETWORKED COMMUNICATIONS Enable the rapid escalation of decision making in the heat of the battle MISSION OPTIMISATION Reduce crew workload during complex tasks to shorten reaction time POWER PROJECTION Supply logistical solutions for the deployment and direction of forces Millions of critical decisions are made every day in defence to protect people infrastructure and nations. Thales is at the heart of this. We serve all branches of the armed forces for air land naval space and joint operations as well as urban security and cyberspace. Our integrated smart technologies provide end-to-end solutions giving decision makers the information equipment control and services they need to make more effective responses in critical environments. Every moment of every day wherever safety and security are critical Thales delivers. Search Thalesgroup jayant baranwal editor-in-chief Copyright 2017 SP Guide PubliCationS all rights reserved. the information published herein is for the personal use of the reader and may not be used for any other activity. no part of this book may be reproduced stored in a retrieval system or transmitted in any form by any means digital electronic mechanical photocopy recording or otherwise without the prior written approval of the editor-in-Chief. For copyright permissions please contact The Editor-in-Chief SP s Military Yearbook a-133 arjun nagar opposite defence Colony new delhi 110003 india. E-mail editor spsmilitaryyearbook.com the publisher shall not be liable in the event of incidental or consequential damages in connection with or arising out of the furnishing or use of the information associated instructions claims of productivity gains. Founded by Shri SUKhDEO PrASAD BArANWAL in 1965 Corporate Office SP Guide PubliCationS PVt ltd a-133 arjun nagar opposite defence Colony new delhi 110003 india. tel 91 (11) 24644693 24644763 24620130 24658322 Fax 91 (11) 24647093 Published by JAyANT BArANWAL SP Guide PubliCationS new delhi india Designed by SP Guide Publications team iSSn 0076-8782 iSbn 978-93-5174-302-6 Registered with Rni no. (P.) F.2 (S 11) Press 93 E-mail info spsmilitaryyearbook.com Order order spsmilitaryyearbook.com Printed in India at Pragati offset Hyderabad Websites www.spguidepublications.com www.spsmilitaryyearbook.com Excellence at your side OUR COMMITMENT TO YOU MBDA has set excellence as its benchmark as this is what our global customers expect. In India MBDA is achieving this through partnerships with local companies and people who share the same vision and very high standards as us. With our partners in India we can indeed offer excellence to the Indian Armed Forces. AIR DOMINANCE AIR DEFENCE MARITIME SUPERIORITY BATTLEFIELD ENGAGEMENT www.mbda-systems.com Readers Comments.... the Guide Publications of new delhi have brought out the Military Yearbook. it is useful to have suitably compiled information in one volume. i commend the efforts of the Publishers. Shri Lal Bahadur Shastri Former Prime Minister of India it (Military Yearbook) is a valuable book. Dr. Sarvepalli Radhakrishnan Former President of India it was good of you to send me a complimentary copy of Military Yearbook (1970)...i have gone through... and found its general get up good and contents useful. Field Marshal S.H.F.J. Manekshaw Former Chief of the Army Staff Indian Army Military Yearbook is indeed a very interesting and useful document and would be of considerable assistance to all the Services personnel whose profession is the science of war. Admiral O.S. Dawson Former Chief of the Naval Staff Indian Navy SP Guide Publications has played an instrumental role in promoting public awareness about the indian armed forces through a vast array of well researched and insightful publications. SP s Aviation and the SP s Military Yearbook in particular are known for their credible and authentic reportage and this has helped SP Guide Publications to carve a special niche for itself amongst the other publication houses. Air Chief Marshal Arup raha Former Chief of the Air Staff indian Air Force March 24 2014 Many thanks for the 43rd issue of SP s Military Yearbook 2015-2016 sent to me. the book is well researched and is surely great reading. Please accept my heartiest congratulations on the excellent effort. Lt General rajan Bakhshi General Officer Commanding-in-Chief Central Command indian Army October 23 2015 of information. My gratitude to you for forwarding a complimentary copy to me. Lt General Praveen Bakshi General Officer Commanding-in-Chief Eastern Command indian Army October 24 2015 thank you very much for sending the SP s Military Yearbook 2015-2016. it is indeed a well compiled work and my best compliments to you and the editorial team for the outstanding work. Lt General D.S. hooda General Officer Commanding-in-Chief Northern Command & Colonel 4 Gorkha rifles indian Army October 27 2015 thank you very much for sending me a copy of book SP s Military Yearbook 2015-2016. the book has covered a vast collection of thought provoking articles and viewpoints on geo political equations various strategic issues dynamics of security external and internal and technological evolutions. My compliments to you and your editorial team for their diligent work. Lt General P.M. hariz General Officer Commanding-in-Chief Army Training Command indian Army October 24 2015 SP s Military Yearbook 2015-16 is well laid out in a most lucid and vivid format and indeed a storehouse 20168 SP s Military yearbook 2017 44th Issue thank you very much for the copy of SP s Military Yearbook 2015-2016 covering a wide spectrum of issues of national and strategic importance which www.spsmIlItaryyearbook.com Readers Comments.... indeed made very interesting read. i am particularly pleased to go through a series of informative contents and reference data which i am sanguine would further add to the reader s taste. My compliments to you and your entire team for the extremely high quality material to the public forum. Lt General C.A. Krishnan Deputy Chief of the Army Staff (P&S) indian Army October 15 2015 Lt General r.P. rai Directorate General of Supplies & Transport Senior Colonel Commandant indian Army October 13 2015 thank you very much for a copy of SP s Military Yearbook 2015-2016. the quality and content of the publication is of the highest standards. Vice Admiral Karambir Singh Deputy Chief of the Naval Staff indian Navy November 12 2015 i extend my sincere thanks to you for sending me copy of SP s Military Yearbook 2015-2016. the publication is very comprehensive and informative. the views expressed on various aspects of armed forces geopolitical issues and strategic perspectives are very insightful. Please convey my compliments to your editorial team. Major General A.K. Das Additional Director General Public information indian Army October 20 2015 the contents of the latest edition of SP s Military Yearbook 2015-2016 are indeed very informative and thought provoking. the book covers a wide array of professional subjects ranging right from global perspective military technology modernisation and homeland security. the edition has been compiled diligently with very relevant articles encompassing the entire military spectrum. Please convey my compliments to your team of SP Guide Publications for producing a brilliant work which is a readers delight. Lt General rajiv Batia Director General Army Air Defence & Colonel Commandant indian Army October 26 2015 Many thanks for sending me the SP s Military Yearbook 2015-2016 which as you have mentioned is a reader s delight . Air Vice Marshal Amit Tiwari Assistant Chief of the Air Staff (Training) indian Air Force October 7 2015 i extend my sincere thanks to you for forwarding a complimentary copy of SP s Military Yearbook 20152016 for our reference. the Yearbook displays an excellent blend of professionalism and viewpoints. as always the contents of the book are thought provoking and indeed a treasure home of information. Please convey my sincere and heartfelt compliments to your editorial team for excellent and exhaustive information for the uniformed fraternity. Air Vice Marshal Praveen Kumar Assistant Chief of the Air Staff (Weapons) indian Air Force October 15 2015 thank you for sending me a copy of the SP s Military Yearbook 2015-2016. it makes educative reading. Your publication has set of benchmark and is looked at as an authoritative compilation of correct defence data and incisive articles. Lt General G.J. Katoch Director General of Perspective Planning indian Army October 13 2015 thank you very much for sending me a copy of SP s Military Yearbook 2015-2016. i have gone through the magazine and find to be extremely informative and really well compiled. Please do convey my compliments to the editorial team for such fine work. 201610 SP s Military yearbook 2017 44th Issue thank you for the copy of SP s Military Yearbook 2015-2016. it is indeed a comprehensive reference book for all matters military. the new features topics and easy-to-read layout have added to the utility of the Yearbook. Please accept my compliments for what promises to be a great reference book. Air Vice Marshal V.r. Chaudhari Assistant Chief of the Air Staff Operations (Air Defence) indian Air Force October 9 2015 www.spsmIlItaryyearbook.com ELECTRONICS & DEFENSE TURN YOUR ARTILLERY INTO PINPOINT WEAPONS Puck et associ s - Photo Getty Images - Flicfr Safran Electronics & Defense Artillery Solutions Safran gives your artillery systems the latest sensor to shooter capabilities from optronic target designation to fire control and inertial navigation systems. Our solutions turn your artillery into precision weapons combining high e ciency quick operation and ease of use. More than twenty armies have already opted for these solutions as either original equipment or upgrades. When you choose Safran s specialized solutions you maximize your firepower. safran-electronics-defense.com SafranElecDef Readers Comments.... SP s Military Yearbook 2015-2016 is a treasure house of information and veritably a collector s item for the uniformed fraternity. My compliments to you and the editorial team for an excellent compilation. Major General ranbir Singh Additional Director General of Military Operations (A) indian Army October 14 2015 military enthusiasts not only from the armed forces but across the spectrum. Please convey my sincere appreciation to the SP s team for an excellent compilation. Air Cmde Ashok Shiragannavar Principal Director Operations (information & Electronic Warfare) indian Air Force October 15 2015 thank you for the SP s Military Yearbook 2015-2016. i must compliment you for the exhaustive data compiled and excellent selection of thought provoking articles in it. Veritably a collector s item for the uniformed fraternity. Major General r. Narayanan Additional Director General of Military Operations (B) indian Army October 13 2015 thank you very much for sending me the complimentary copy of SP s Military Yearbook 2015-2016. it was a delight to see a comprehensive compilation of articles and information on national security aspects. i am sure that it would attract the it is my pleasure to receive the book SP s Military Yearbook 2015-2016 published by you. the book is very impressive and knowledgeable which have valuable additions on various aspects such as geopolitical equations various strategic issues dynamics of security-external and internal and technological evolutions by eminent thinkers and subject matter experts from various important organisations. ranbir Singh Joint Secretary & Addl Financial Advisor Ministry of Defence india October 7 2015 201612 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com The beauty of innovation and partnership IAI. Over 25 years of teaming with our Indian partners for defense and growth With an unrivalled record of proven cooperation with India s defense forces and industry IAI has become synonymous with innovation reliability and trustworthiness. Together with our Indian partners we share the Make in India vision in space air land and sea. We are committed to continue our long-term strategic cooperation with India for a brighter and safer future. www.iai.co.il corpmkg iai.co.il authorS ProfileS Abhijit Singh Abhijit Singh is Senior Fellow and Head of Maritime Policy Initiative at the Observer Research Foundation (ORF) in New Delhi. A former Indian naval officer he has edited two books on maritime security -- Indian Ocean Challenges A Quest for Cooperative Solutions (2013) and Geopolitics of the Indo-Pacific (2014) and written extensively on India s growing maritime reach security of sea lines of communication Indian Ocean governance issues and maritime infrastructure in the Asian littorals. n ARtIcle ON PAge 25 Lt General Davinder Kumar (Retd) lt general Davinder Kumar is the former Signal Officer-in-chief of the Indian Army and the ceO & Managing Director of tata Advanced Systems limited. He has been on the Board of Directors of both public and private sector companies. He is an internationally acclaimed expert in communication network electronic warfare cryptology network-centric information and cyber warfare. He has over 400 papers to his credit and has been invited to speak at various international fora. n ARtIcle ON PAge 51 Admiral Arun Prakash (Retd) Admiral Arun Prakash retired as Naval chief and chairman chiefs of Staff committee in 2006. He commanded the Indian Navy s eastern Fleet the National Defence Academy the Andaman & Nicobar Joint command and the Western Naval command. He is currently a member of India s National Security Advisory Board and chairman of the National Maritime Foundation. n ARtIcle ON PAge 31 Major General Dhruv C. Katoch (Retd) An alumnus of Sherwood college Nainital the National Defence Academy Khadakwasla and the National Defence college New Delhi Major general Dhruv c. Katoch was commissioned in the Dogra Regiment on March 31 1972. Besides the National Defence college the general is a graduate of the Defence Services Staff college Wellington and the Higher command course Mhow. He was the Director centre for land Warfare Studies (clAWS) New Delhi which is the Indian Army s premier think tank on land warfare. n ARtIcle ON PAge 21 Air Marshal B.K. Pandey (Retd) Air Marshal B.K. Pandey retired from the Indian Air Force (IAF) after serving the organisation for nearly 40 years. During his career he held a number of important command and staff appointments the last being that of AOc-in-c training command of the IAF. currently he is an editor with SP guide Publications and is a resident of Bengaluru n ARtIcle ON PAge 113 223 233 283 309 Dr Harinder Sekhon Dr (Mrs) Harinder Sekhon is well known strategic analyst whose work has focused on research consultancy and policy advocacy on various aspects of US-India strategic relations India s defence and aerospace industry India s security challenges and risk analysis. With over 30 years experience in academia government and public policy think tanks Harinder s research and outreach is both incisive and effective. She is currently a Senior Fellow with the Vivekanand International Foundation. n ARtIcle ON PAge 5 Lt General B.S. Pawar (Retd) lt general B.S. Pawar was Major general of Artillery Western command during Operation Parakram. He also headed the Army Aviation corps and was instrumental in the operationalisation of the advanced light helicopter during his tenure. He has over 4 000 hours of flying to his credit and has flown five different types of aircraft. He is recipient of PVSM and AVSM. n ARtIcle ON PAge 43 Brigadier Gurmeet Kanwal (Retd) Brigadier gurmeet Kanwal is a well-known military and strategic analyst who commanded an Infantry Brigade on the loc with Pakistan. He has been a Military Observer in the United Nations Mission UNtAg in Namibia. He has authored several books and was till recently the Director centre for land Warfare Studies (clAWS) New Delhi. n ARtIcle ON PAge 55 105 201614 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com Unique. Ahead of the Art. of the Art. Unique. Ahead of the Art. Unique. Ahead Flat No. 1010 1011 and 1012 10th Floor Narain Manzil 23 Barakhamba Road New Delhi 110001 URL http www.shinmaywa.co.jp E-mail air.sales shinmaywa.co.jp ShinMaywa Industries India Private Ltd. l authors profiles l Dr Monika Chansoria Dr Monika chansoria is currently a Senior Fellow in France and is a Visiting Professor and Associate Director of Studies (Directeur d tudes associ ) at the Fondation Maison des Sciences de l Homme Paris. In addition she is a Research Fellow at the centre for land Warfare Studies (clAWS) New Delhi. n ARtIcle ON PAge 13 Group Captain Joseph Noronha (Retd) group captain Joseph Noronha is an experienced fighter pilot and a Qualified Flying Instructor (QFI A2). commissioned in the fighter stream of the Indian Air Force in December 1974 he later commanded a Mig21M squadron and served as Directing Staff at the Defence Services Staff college Wellington Nilgiris. He also served twice on the staff of the Flying Instructors School tambaram chennai. Post retirement he continues to keep in close touch with aviation issues and is a prolific writer for a variety of aviation periodicals and journals. n ARtIcle ON PAge 97 Major General Mrinal Suman (Retd) Major general Suman heads the Defence technical Assessment and Advisory Service (DtAAS) of the confederation of Indian Industry (cII). As the first technical Manager (land Systems) he was closely associated with the evolution and promulgation of the new defence procurement mechanism in which his expertise is well known. n ARtIcle ON PAge 123 127 131 Vice Admiral K.R. Nair (Retd) Vice Admiral K.R. Nair is an alumnus of the Naval college of engineering INS Shivaji and did electrical specialisation from INS Valsura Jamnagar. He has been the Fleet electrical Officer of the Western Fleet and the Flotilla electrical Officer of the local Flotilla in Mumbai. He was Assistant Naval Advisor (Weapons) at the High commission of India london. On promotion to the rank of Vice Admiral he was the controller Warship Production and Acquisition and headed the technical Branch of the Indian Navy as the chief of Materiel prior to his retirement. n ARtIcle ON PAge 93 Lt General Naresh Chand (Retd) He is a former Director general Army Air Defence member of Integrated guided Missile Development Programme and Member Secretary of the first National Radar council. He has served with the Defence Research and Development Organisation (DRDO) and was also a consultant with the Bharat electronics limited. He was also involved in writing the history of the Regiment of Artillery and history of the corps of Army Air Defence. At present he is the technical group editor with SP guide Publications. n ARtIcle ON PAge 77 341 Commodore Lalit Kapur (Retd) commodore lalit Kapur is a specialist in navigation and aircraft direction. He was Defence Advisor embassy of India Muscat with concurrent accreditation to the UAe Qatar and Bahrain. Other experience includes being part of the founding team of India s Defence Intelligence Agency heading its Protocol and Foreign liaison Division heading the Systems and Sea Vector Branches in the Strategic Forces command and heading the Operations Division at Headquarters Offshore Defence Advisory group Mumbai. commodore lalit Kapur has a number of articles published to his credit on international relations military history and maritime issues. n ARtIcle ON PAge 109 Lt General P.C. Katoch (Retd) lt general P.c. Katoch superannuated as Director general Information Systems of the Indian Army. A third generation army officer he commanded the Strike corps in the South Western theatre. He has served as Defence Attach in Japan with accreditation to Republic of Korea. n ARtIcle ON PAge 35 39 73 345 Dr Laxman Kumar Behera He is a master s in applied and analytical economics and Ph.D from the School of International Studies Jawaharlal Nehru University New Delhi. He is a Research Fellow with the Indian Defence Studies and Analyses (IDSA). As a member of IDSA s Defence economics and Industry centre Dr Behera undertakes policy relevant research pertaining to various economic aspects of Indian defence. He was closely associated with two high-level committees set up by the Indian Ministry of Defence on Defence Acquisition Reforms and Defence expenditure Review. n ARtIcle ON PAge 119 Vice Admiral Pradeep Chauhan (Retd) Vice Admiral Pradeep chauhan is an alumnus of the National Defence Academy Defence Services Staff college Naval War college and the National Defence college. He retired on November 30 2013 after a distinguished career spanning over four decades. He has held four seagoing commands of IN ships Amar Khanjar Brahmaputra and Viraat. He has held important command and staff assignments in the Indian Navy. His last assignment was the command of the Indian Naval Academy ezhimala Kerala. He is an author a leadershipmentor a powerful motivator and a formidable orator. n ARtIcle ON PAge 59 201616 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com l authors profiles l Ranjit Gupta Ranjit gupta is a retired Indian Foreign Service officer. He had been India s Ambassador to Yemen (North) Venezuela Oman thailand and Spain and finally head of the non-official office in taiwan. He is currently a member of the National Security Advisory Board and is leading a Joint Research Project with the gulf Research centre Dubai and on India gcc Relations on behalf of the Ministry of external Affairs. n ARtIcle ON PAge 17 Major General P.K. Chakravorty (Retd) An alumnus of National Defence Academy who was Major general Artillery of an operational command commandant of Selection centre South in Bengaluru and Additional Director general Artillery at Army Headquarters. the officer retired on December 31 2010. He has also served as the Defence Attach to Vietnam and is a prolific writer on strategic subjects. the officer is a M.Phil from Madras University and is a defence analyst. n ARtIcle ON PAge 69 Air Chief Marshal P.V. Naik (Retd) Air chief Marshal P.V. Naik is a former chief of the Air Staff. He retired on July 31 2011. During his illustrious career in the IAF Naik held many prestigious command and staff appointments such as AOc-in-c central Air command Allahabad and Vice chief of Air Staff at Air Headquarters New Delhi. n ARtIcle ON PAge 65 Rear Admiral Dr S. Kulshrestha (Retd) Rear Admiral Dr S. Kulshrestha is a post-graduate from Jodhpur University who joined Indian Navy in the year 1975 and was awarded the Sword of Honour in 1976 for being the best Naval Officer during initial training. He specialised in Quality Assurance of Naval Armament and adorned various key appointments in the Navy DRDO establishments ordnance factories and finally rose to become the Director general of Naval Armament Inspection (DgNAI) at the Integrated Headquarters of the Ministry of Defence (Navy). As DgNAI he was directly responsible for timely availability of reliable and safe naval armament to the operational fleet of the Indian Navy. n ARtIcle ON PAge 85 101 Lt General Rajesh Pant (Retd) lt general Rajesh Pant is an internationally renowned techno-Scholar-Warrior-Mentor. the officer served the Indian Army Signals for more than 41 years with an unblemished service profile. He also participated in many military operations. He is a triple post-graduate with M.tech from IIt Kharagpur M.Phil from Madras University and Master of Management Studies from Osmania University. In June 2014 the officer has also obtained his Ph.D in the important field of Information Security. He is presently the chairman of Precision electronics limited a governing council member of Iete and an International consultant on Information Security. n ARtIcle ON PAge 81 Ambassador P. Stobdan Ambassador P. Stobdan is a distinguished academician diplomat author and foreign policy expert. He has been India s Ambassador extraordinary and plenipotentiary to the Republic of Kyrgyzstan until recently. He has earlier served in the National Security council Secretariat (NScS). He also served as Director of the centre for Strategic Studies in Jammu & Kashmir. He is the Founding President of the ladakh International centre leh. He is currently with the Institute for Defence Studies and Analyses New Delhi. He is a Distinguished Fellow at the United Services Institution (USI). n ARtIcle ON PAge 9 Brigadier Rahul Bhonsle (Retd) Brigadier Rahul Bhonsle has three decades of experience in counter-insurgency and counter-terrorism in India and abroad. He had hands-on experience in military modernisation and training during his service period heading a number of tactical and technical innovation projects at the operational level. Post retirement since 2006 he has combined his military expertise with extensive study of future trends and coordinated a number of projects for the Directorate of Net Assessment Integrated Defence Staff centre for the Joint Warfare Studies and centre for land Warfare Studies. He is at present Director of Security Risks a South Asian security risk and knowledge management consultancy. n ARtIcle ON PAge 135 509 Rear Admiral Sushil Ramsay (Retd) Rear Admiral Sushil Ramsay retired after serving in the Indian Navy for 38 years. He provided extensive strategic directions and operational expertise towards capacity-building in logistics defence expenditure administrative reforms and restructuring of Services Headquarters. He has been Naval Attach in the embassy of India in Moscow. He is currently Senior editorial Advisor of SP s Naval Forces and technical editor of SP s Military Yearbook. n ARtIcle ON PAge 193 205 201618 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com l authors profiles l Brigadier Vinod Anand (Retd) Brigadier Vinod Anand was Brigadier general Staff Joint Operations at Army training command in his last assignment. He is a post-graduate in defence and strategic studies. He was a Senior Fellow at the Institute for Defence Studies and Analyses and is currently a Senior Fellow with the Vivekananda International Foundation. n ARtIcle ON PAge 161 Major General Umong Sethi (Retd) Umong Sethi is an army veteran who has had considerable experience of command in operationally active areas and exposure at the strategic level of planning operations procurement equipment management processes and managing disasters. He is a prolific writer and a military analyst. He contributes to the discourse on National Security Smart & Safe cities Smart Borders and Skill Development. n ARtIcle ON PAge 331 Lt General V.K. Kapoor (Retd) lt general V.K. Kapoor was commissioned on February 9 1964. He is a specialist in armoured and mechanised warfare and in the art of war-gaming. Prior to superannuating he was the commandant of the Army War college at Mhow. He has written more than 120 articles for magazines and journals on strategic and military issues. He is currently the editor of SP s Land Forces and editor of SP s Military Yearbook. n ARtIcle ON PAge 169 186 317 Lt General Vijay Oberoi (Retd) commissioned in 1961 he is an International Fellow at the Army War college US. He was gOc-in-c of Army training command and Western command at chandimandir. Despite losing one leg in 1965 war he retired as the VcOAS in 2001. He was Founder Director of the centre for land Warfare Studies (clAWS). n ARtIcle ON PAge 1 Dr Vijay Sakhuja Dr Vijay Sakhuja is Director National Maritime Foundation New Delhi and Visiting Senior Research Fellow at ISeAS in Singapore. He is author of Asian Maritime Power in the 21st Century Strategic Transactions -- China India Southeast Asia Confidence Building from the Sea An Indian Initiative and co-author of Climate Change and the Bay of Bengal Evolving Geographies of Fear and Hope. He has edited and co-edited more than 30 volumes on various geopolitical and geostrategic issues and maritime history. n ARtIcle ON PAge 47 Lt General Dr V.K. Saxena (Retd) lt general V.K. Saxena is an alumnus of Defence Services Staff college college of Defence Management and the coveted National Defence college. He is a silver-gunner and the first ever winner of the Director general of Artillery trophy for standing first on the long gunnery Staff course. He has had a wide exposure to varied command and staff assignments. He was the Director general of the Army Air Defence at the Army Headquarters prior to superannuation. n ARtIcle ON PAge 89 General V.P. Malik (Retd) general V.P. Malik was chief of the Army Staff of the Indian Army from October 1 1997 to September 30 2000 and the chairman cOSc from January 1 1999 to September 30 2000. He planned coordinated and oversaw execution of the Operation Vijay to successfully defeat Pakistan s attempted intrusion in the Kargil sector in 1999. After retirement he was a member of the National Security Advisory Board for two years. He writes frequently for newspapers and magazines. n ARtIcle ON PAge 29 201620 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com www.spsmIlItaryyearbook.com 2016 SP s Military yearbook 2017 44th Issue 21 Telangana Major Indian Armed Forces Headquarters 1 2 3 4 5 6 7 8 9 10 11 12 New Delhi (Integrated HQ of MoD (Army) New Delhi (Integrated HQ of MoD (Navy) New Delhi (Integrated HQ of MoD (IAF) Pune (HQ Southern Command) Army Kolkata (HQ Eastern Command) Army Chandimandir (HQ Western Command) Army Lucknow (HQ Central Command) Army Udhampur (HQ Northern Command) Army Shimla (HQ Training Command) Army Jaipur (HQ South-Western Command) Army Vishakhapatnam (HQ Eastern Naval Command) Navy Mumbai (HQ Western Naval Command) Navy 13 14 15 16 17 18 19 20 21 22 23 Kochi (HQ Southern Naval Command) Navy New Delhi (HQ Western Air Command) IAF Shillong (HQ Eastern Air Command) IAF Allahabad (HQ Central Air Command) IAF Bengaluru (HQ Training Command) IAF Gandhinagar (HQ South-Western Air Command) IAF Thiruvananthapuram (HQ Southern Air Command) IAF Nagpur (HQ Maintenance Command) IAF New Delhi (HQ Strategic Forces Command) Port Blair (HQ Andaman & Nicobar Command) New Delhi (HQ Integrated Defence Staff) 201622 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com www.spsmIlItaryyearbook.com 2016 SP s Military yearbook 2017 44th Issue 23 1 17 20 5 16 18 9 10 7 4 11 2 12 13 3 15 14 19 8 6 22 21 DRDO and DPSU Headquarters 1 2 3 4 5 6 7 8 9 10 11 Defence Research and Development Organisation (DRDO) New Delhi Hindustan Aeronautics Ltd Bengaluru Bharat Electronics Ltd Bengaluru Bharat Earth Movers Ltd Bengaluru Mazagon Dock Ltd Mumbai Garden Reach Shipbuilders & Engineers Ltd Kolkata Goa Shipyard Ltd Goa Hindustan Shipyard Ltd Visakhapatnam Bharat Dynamics Ltd Hyderabad Mishra Dhatu Nigam Ltd Hyderabad Aeronautical Development Agency Bengaluru 12 13 14 15 16 17 18 19 20 21 22 Indian Space Research Organisation Bengaluru Aeronautical Development Establishment Bengaluru Centre for Airborne Systems Bengaluru Combat Vehicles Research & Development Establishment Chennai Defence Electronics Research Lab. Hyderabad Defence Research and Development Est. Gwalior Defence Research and Development Lab. Hyderabad Naval Science & Technological Laboratory Visakhapatnam Integrated Test Range Balasore Odisha Cochin Shipyard Ltd Kochi Kerala Ordnance Factories Board Kolkata 201624 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com Contents BUSINESS TECHNOLOGY CONTENTS REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES COL OUR PAGES ReadeRs Comments authoRs PRofiles 8 10 12 14 16 18 20 CONCEPTS & PERSPECTIVES REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY maPs major indian armed forces headquarters dRdo and dPsu headquarters editoRial 22 24 35 WeaPons equiPment & VehiCles adVeRtiseR index 41-63 64 Partnering India to Make in India As an OEM of Advanced Weapon Systems BAE Systems SWS Defence has a long-term relation with still ongoing support towards the Indian Armed Forces. Our commitment continues into the future in cooperation with local Partners providing indigenous design and development to support the Make In India initiative. We are proud to continue to offer support and technology to the Indian Armed Forces in it s peacekeeping ambitions. www.baesystems.com www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 25 WEAPONS EQUIPMENT VEHICLES Cont e n t s CONTENTS Contents 1 ConCePts & PeRsPeCtiVes EMPOWERING THE NATION S BL ACK & WHITE PAGES 1 DEFENCE FORCES Bharat Electronics Ltd (BEL) India s leading Defence electronics company has set its mission to enable the country s armed forces by creating a wide range of products that assist the soldiers in their decisive missions. A multi-product multi-Unit company BEL specialises in providing end-to-end customised solutions with its high precision products maintaining world-class quality in all its processes. 1. Concerns and Challenges impacting on Global Peace and security Lt General Vijay Oberoi (Retd) 1 5 9 2. 3. 4. the modi-obama Vision and indo-us Relations Dr Harinder Sekhon modi and indo-Russian Relations Ambassador P. Stobdan China s military Command and Control a Root and Branch overhaul Dr Monika Chansoria 13 5. the Current situation in West asia and its implications Ranjit Gupta 17 6. Pakistan a fragile Polity and a dysfunctional state Major General Dhruv C. Katoch (Retd) 21 7. the un tribunal s south China sea Verdict -- implications for Regional security Abhijit Singh 25 29 8. 9. Reducing flab in india s defence organisation General V.P. Malik (Retd) maritime Capacity Building and india s imperatives Admiral Arun Prakash (Retd) 31 35 A Navratna Defence PSU Bharat Electronics Limited Outer Ring Road Nagavara Bengaluru - 560045 India TOLL FREE 1800 4250 433 CIN L32309KA1954 GOI 000787 For more details visit www.bel-india.com (A Government of India Enterprise) 10. special forces Lt General P.C. Katoch (Retd) 11. asymmetric and unconventional Warfare on the subcontinent Lt General P.C. Katoch (Retd) 39 201626 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com B LA CK & WHITE PAGES 43 12. army aviation turns 30 -- a Reality Check Lt General B.S. Pawar (Retd) 17. the iaf -- a strategic air force Air Chief Marshal P.V. Naik (Retd) 65 47 51 55 69 Dr Vijay Sakhuja Major General P.K. Chakravorty (Retd) 14. Cyber Warfare in future Conflicts Lt General Davinder Kumar (Retd) 15. defence Reforms Brigadier Gurmeet Kanwal (Retd) 2 teChnoloGY 1. future soldier and developments in the indian army Lt General P.C. Katoch (Retd) 73 TECHNOLOGY REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS 16. foundational Pillars of india s strategy to Protect offshore assets Vice Admiral Pradeep Chauhan (Retd) 59 73 Sin t tulo-1 1 06 03 2014 12 44 50 2016 SP s Military yearbook 2017 44th issue 27 www.spsmilitaryyearbook.com CONCEPTS & PERSPECTIVES 13. Blue economy and China economic Wealth and strategic advantages 18. trends in land-Based firepower in the future WEAPONS EQUIPMENT VEHICLES Cont e nt s CONTENTS Cont e nt s B LA CK & WHITE PAGES 2. Revolution in military affairs -- Past Present and future Lt General Naresh Chand (Retd) 77 81 85 89 3. 4. 5. 6. Cyber Warfare technologies Lt General Rajesh Pant (Retd) Green energy initiatives by defence forces Rear Admiral Dr S. Kulshrestha (Retd) future Radar technologies Lt General Dr V.K. Saxena (Retd) Crystal Gazing -- Weapons and sensors for indian naval Platforms Vice Admiral K.R. Nair (Retd) 93 7. Can military machines be moral the tangled ethics of Robotic Warfare Group Captain Joseph Noronha (Retd) 97 8. the Challenge of military artificial intelligence Rear Admiral Dr S. Kulshrestha (Retd) 101 3 Business 1. army modernisation moving forward at a slow Pace Brigadier Gurmeet Kanwal (Retd) 105 105 109 113 119 2. 3. 4. india s oceanic aspirations Commodore Lalit Kapur (Retd) modernisation of the indian air force Air Marshal B.K. Pandey (Retd) india s defence Budget 2016-17 Dr Laxman Kumar Behera 201628 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com B LA CK & WHITE PAGES 123 127 5. 6. 7. defence offsets in dPP 2016 Major General Mrinal Suman (Retd) 4 indian defenCe 1. 2. 3. 4. integrated defence staff Brigadier Vinod Anand (Retd) 161 161 169 193 223 251 261 283 Major General Mrinal Suman (Retd) new defence Procurement Procedure -- synergy with make in india Major General Mrinal Suman (Retd) 131 the indian army the indian navy the indian air force indian Coast Guard Who s Who in indian defence indian defence industry 135 145 5. 6. 7. Brigadier Rahul Bhonsle (Retd) Global Contracts The artillery system of the 21st century Photo credits ECPAD France A.Roine The Caesar artillery system in Mali NexterCaesarMali_180x112_VA.indd 1 www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 29 25 11 16 12 30 REGIONAL BALANCE CREATING NEW REFERENCES IN DEFENCE I WWW.NEXTER-GROUP.COM ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY 8. india s strategic and Business environment CONCEPTS & PERSPECTIVES make Procedure in dPP 2016 WEAPONS EQUIPMENT VEHICLES Cont e nt s CONTENTS Cont e n t s B LA CK & WHITE PAGES 8. defence Research and development 309 homeland seCuRitY 1. the ministry of home affairs & Central armed Police forces Lt General V.K. Kapoor (Retd) 317 331 341 345 348 2. 3. 4. indias internal security Challenges Major General Umong Sethi (Retd) india s Coastal security Lt General Naresh Chand (Retd) the maoist insurgency Lt General P.C. Katoch (Retd) Who s Who indian home ministry 5 asian Who s Who Afghanistan Algeria Australia Bahrain Bangladesh Bhutan Brunei Cambodia People s Republic of China Egypt Indonesia Iran Iraq Israel 201630 SP s Military yearbook 2017 44th issue 349 349 349 349 349 350 350 350 350 350 350 351 351 351 351 www.spsmilitaryyearbook.com B LA CK & WHITE PAGES 351 351 352 352 352 352 352 352 352 352 353 Japan Jordan Kazakhstan Kuwait Kyrgyzstan Laos Lebanon Libya Malaysia Myanmar Nepal North Korea (Democratic People s Republic of Korea) Sultanate of Oman Pakistan The Philippines Qatar Saudi Arabia Singapore South Korea (Republic of Korea) Sri Lanka Syria Taiwan Tajikistan 353 353 353 353 354 354 354 354 354 355 355 354 www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 31 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Cont e nt s CONTENTS Cont e nt s B LA CK & WHITE PAGES 355 355 355 355 356 356 356 Thailand Turkey Turkmenistan United Arab Emirates Uzbekistan Vietnam Republic of Yemen Indonesia MoD Organisational Structure Japan MoD Organisational Structure Malaysia MoD Contact Details Malaysia MoD Organisational Structure Myanmar MoD Organisational Structure The Philippines MoD Contact Details Singapore MoD Contact Details Singapore MoD Organisational Structure 357 358 359 361 362 363 South Korea (Republic) MoD Organisation Structure Sri Lanka MoD Contact Details Sri Lanka MoD Organisational Structure Thailand MoD Organisational Structure 363 364 365 367 368 369 371 372 373 374 374 375 The Philippines MoD Organisational Structure 370 mod oRGanisations & ContaCts of asian CountRies Australia MoD Contact Details Australia MoD Organisational Structure Bangladesh MoD Contact Details Brunei MoD Contact Details Brunei MoD Organisational Structure Indonesia MoD Organisational Structure Vietnam Defence Organisational Structure 376 6 ReGional BalanCe 1. 2. GdP & military expenditure Central & south asia 377 381 386 388 390 392 394 396 397 400 India Nepal Pakistan Sri Lanka 3. east asia Pacific Rim & australia Australia Brunei Cambodia China Indonesia Kazakhstan Kyrgyzstan Tajikistan Turkmenistan Uzbekistan Afghanistan Bangladesh Bhutan 201632 SP s Military yearbook 2017 44th issue 377 402 407 409 412 415 419 422 423 425 430 www.spsmilitaryyearbook.com B LA CK & WHITE PAGES 433 439 442 444 447 449 451 454 457 460 4. Japan South Korea (Republic of Korea) Laos Malaysia Myanmar The Philippines Singapore Taiwan Thailand Vietnam West asia and north africa 463 467 469 472 474 476 479 481 487 489 491 484 North Korea (Democratic People s Republic of Korea) 436 Algeria Egypt Libya Bahrain Iran Iraq Israel Jordan Kuwait Lebanon Sultanate of Oman AP4C-V AP4C-F Proengin 1 rue de i ildustrie 78210 Saint-cyr i ecole FrAnCe Tel (33) 1 30 58 47 34 Fax (33) 1 30 58 93 51 e-mail contact proengin.com Proengin india 11-Qutab road ram nagar new Delhi 110055 Phone 011 23513136 Fax 91 2352 7286 email vivek proengin.in MAB AP4C www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 33 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Cont e nt s CONTENTS Cont e nt s B LA CK & WHITE PAGES 493 495 498 500 504 507 509 6. Qatar Saudi Arabia Syria Turkey United Arab Emirates Republic of Yemen 5. asia-Pacific environment Brigadier Rahul Bhonsle (Retd) equipment & hardware specifications -- an overview 517 517 545 566 Army Equipment Naval Equipment Air Equipment aBBReViations 577 diaGRams GRaPhs China s Nine-dash Line Maritime Claim Line UNCLOS Maritime and Airspace Zones Distribution of MoD s Total Allocation minus Defence Pension Share of Pay and Allowances (P&A) of the Armed Forces in Defence Expenditure Organisation of the Integrated Defence Staff The Outline Structure of the Indian National Defence University Diagrammatic Layout of the Army s Chain of Command Organisation of the Indian Army Headquarters Organisation of the Indian Navy Headquarters Organisation of the Indian Air Force Headquarters Indian Coast Guard Locations Indian Coast Guard SAR Organisation Department of Defence Organisation of the Department of Defence Production (DDP) Organisation Structure of OFB External Functional Linkages (OFB comes under Department of Defence Production) 27 61 120 122 163 165 171 174 196 226 DRDO Ministry of Defence Organisational Structure of DRDO Organisation of the Ministry of Home Affairs Organisational Command and Control of the Central Armed Police Forces Overall Risk Percentage Overall Risk Ranking -- Year-wise Trends Human Trafficking in India over the past 10 years Trafficking in India 2014 NCRB - IT Crimes (2012-14) Types of sites on the dark web Jan-Mar 2015 Australia MoD Organisational Structure Brunei MoD Organisational Structure Indonesia MoD Organisational Structure Japan MoD Organisational Structure Malaysia MoD Organisational Structure Myanmar MoD Organisational structure The Philippines MoD Organisational Structure Singapore MoD Organisational Structure Sri Lanka MoD Organisational Structure Thailand MoD Organisational Structure 285 Vietnam Defence Organisational Structure 310 311 319 330 332 332 336 336 339 339 358 362 363 364 367 368 370 372 374 375 376 Organisation of the Indian Coast Guard Headquarters 253 253 254 255 264 284 285 South Korea (Republic) MoD Organisation Structure 373 201634 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com l editorial l Ministry of Defence organisation charts anD contacts of 13 Major arMs buyers in asia JAPAN SOUTH KOREA MYANMAR VIETNAM INDIA BANGLADESH THAILAND MALAYSIA SRI LANKA SINGAPORE INDONESIA THE PHILIPPINES BRUNEI AUSTRALIA www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 35 l editorial l Editorial sP guide Publications SP Guide Publications was founded in 1964 by its Founder Editor and Publisher Shri Sukhdeo Prasad Baranwal who was a visionary. A year later in 1965 SP s Military Yearbook the flagship product of the company was launched. This innovative effort by the founder was singularly appreciated by the then Prime Minister Lal Bahadur Shastri and replicated enthusiastically by the military fraternity. SP Guide Publications has since grown from strength to strength and has completed 50 years in 2014. SP s Military Yearbook 2016-2017 now offers its readers a wide range of information and knowledge regarding the military and the defence industry in India and strategic analysis of the geopolitical situation including defence and security-related issues in the Asia-Pacific region. It is thus a comprehensive reference manual an annual barometer of matters concerning conceptual technological and international security issues at the strategic and operational levels military and defence industry-related issues organisational issues and contact details of major countries in the Asia-Pacific region and homeland security issues. Over the last 52 years SP Guide Publications has been at the forefront of publishing defence and security-related journals and is the only publisher offering dedicated journals to the three defence forces in India namely SP s Land Forces SP s Naval Forces and SP s Aviation to the Indian Army the Navy and the Air Force respectively. We have since 2008 also commenced the publication of SP s AirBuz a journal for commercial aviation. We added five years ago the SP s M.A.I. (Military Aerospace and Internal Security) to the total list of our publications. It is a fortnightly magazine which covers the latest happenings in the global military-industrial regime. In yet another first in the realm of defence and aerospace publishing in India SP Guide Publications has introduced BizAvIndia a quarterly magazine in partnership with Business Aircraft Operators Association (BAOA) with the objective of keeping business aviation industry in India duly informed and connected. international security scenario Since the end of the Cold War the global security environment has seen major changes. On the one hand the world has witnessed a spurt of globalisation and deepening economic interdependence which has enhanced the growth of countries like India China Brazil and South Africa. On the other hand large parts of the world continue to be affected by conflict and violence. The tendency towards multipolarity has developed further both globally and regionally in the political economic and other fields as various regions are experiencing new splits and realignments. The relations among the major powers are undergoing significant and profound readjustments and various kinds of partnerships are gradually developing with each country focusing on its long-term national interests. The aim of all alignments by developing countries The cover of Military Yearbook 1965 201636 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com l editorial l seems to be to ensure economic development acquire military security and strength while retaining their independence and freedom. The global and regional balances of power are also impacted by national interests of individual nations which take precedence even when the issues are collectively highly adverse. A case in point is the war on terrorism which seems to have lost its impetus because it affects different countries and even regions differently resulting in inaction by some nations and only marginal involvement by others. It is unfortunately not realised that collective action today will save lives money and resources in future. It is because of this self-centred approach of nations that globalisation is under severe strain the energy scenario is rapidly changing climate and global warming that transcend borders is threatening to get out of control and of course the state of world economy. It is in the interest of all nations that collectively they should so manage international and regional concerns and challenges that peace and prosperity prevail amongst all the peoples and countries of the world. The concept of nationality and nationalism is being questioned by emergence of entities as Islamic State of Iraq and Levant (ISIL) also known ISIS and Daesh Youth from across the . globe are joining this venal conglomerate physically or ideologically to conduct some of the most inhuman acts of terror against the innocent. Ideologues aligned to the ISIS are able to use new media -- Facebook Twitter and mobile applications as Instagram to indoctrinate youth and instigate them to violence against their own societies. There is not only uncertainty in the international security environment but also in the paradigm in which these developments can fit in. This flux is on account of challenges both direct as well as indirect and these arise from various factors which include economic social cultural cyber energy trade and commerce technology and financial aspects. Emergence of powerful non-state actors such as the Al Qaeda and ISIS are an outcome of diffusion of power and disaggregation of the global and regional order leading to anarchy where governments are weak and unstable. Absence of unified global leadership to bring diverse and disparate forces -- state and non-state actors -- together into the mainstream is also evident with the United States increasingly shying away from larger commitments. This trend of the US may get even more exacerbated in the Donald Trump era. There is a degree of consensus for America retracting into a shell of isolation of sorts while desiring that national governments and regional alliances take on a larger role in managing their security affairs. This has created its own dynamics in the Asia-Pacific where the rise of China is challenging stability in an otherwise secure region. The continuing economic crisis in the West has been a major cause of worry for the global economy and has had consequent effects on the economies of other regions. China weathered the global economic crisis better than most other countries. In November 2008 the State Council unveiled a CNY 4.0 trillion ( 585 billion) stimulus package in an attempt to shield the country from the worst effects of the financial crisis. The massive stimulus programme fuelled economic growth mostly through massive investment projects which triggered concerns that the country could have been building up asset bubbles overinvestment PROTECTING INDIA S HERITAGE. and excess capacity in some industries. The global downturn and the subsequent slowdown in demand did however severely affect the external sector and the current account surplus has continuously diminished since the financial crisis. All eyes are on the Central Economic Work Conference (CEWC) which will set the tone of the economy and policy for next year. The CEWC will also establish the economic targets for 2017 though they will not be disclosed until the National People s Congress in March 2017. The growth target is expected to be maintained at the current range of between 6.5 per cent and 7.0 per cent while monetary and fiscal policies will likely remain accommodative. In the political arena China s authorities stated that they are seriously concerned after President-elect Donald Trump questioned the OneChina policy which has been the cornerstone of China-US relations since the 1970s. India s growth story has been affected due to demonetisation as brought out by the World Bank in its latest report put out on January 11 2017. The World Bank has cut India s GDP growth for 2016-17 fiscal to 7 per cent from its previous estimate of 7.6 per cent citing the impact of demonetisation but forecast that the country would regain momentum in the following years with a growth of 7.6 per cent and 7.8 per cent due to reform initiatives. It has been our duty to strengthen a country that has a strong history. And we have consistently done so for the past 6 decades using cutting edge technology and class of service. Needless to say our response has always been prompt. Through our dedication and support we ve helped secure the heritage of billions in India with peaceful grounds and safer skies. SP s s i n MoD Organisational Structures and Contacts of major Asian countries NEW ADDITION Yearbook Military PURSUING EXCELLENCE OVER FIVE DECADES SINCE 1964 SP s Military 2016 Yearbook c e 1 9 6 5 44TH 2017 I S S UE 2017 [SP s 53 [ 4 4 TH IS S UE 2016 Guardian Courtesy Department of Archaeology and Museums. Government of Maharashtra PERSISTENT MARITIME DOMAIN AWARENESS 40 hour endurance provides superior mission area coverage Powerful 360 maritime search radar with Inverse Synthetic Aperture Radar (ISAR) All weather day night high definition full motion video and imagery Enhanced situational awareness via teaming with manned air surface assets Tailored to fulfill the maritime security needs of India s Navy 60 YEARS. 5 AIRCRAFT TYPES. 1 NATION. www.rafale.co.in www.ga-asi.com 2017 General Atomics Aeronautical Systems Inc. Leading the Situational Awareness Revolution Price 0000000 TOOFANI l MYSTERE IV l ALIZE l JAGUAR l MIRAGE 2000 JAYANT BARANWAL EDITOR-IN-CHIEF SP s MYB Cover 2016-2017 Final.indd 1 Dassault_DGI_heritage_220x275.indd 1 11 07 16 18 08 31 12 16 The cover of the current edition of SP s Military Yearbook 2016-2017 www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 37 l editorial l line of control (LoC) on the night of September 28 29 2016 have led to a breakdown in India-Pakistan relations which remained largely unresolved as of December 31 2016. The hostility between these two nuclear armed nations is cause for anxiety in the region and among the international community. The present Constitution of Nepal promulgated on September 20 2015 with almost 90 per cent approval is the first Constitution in the history of Nepal. However it failed to satisfy the Madhesi groups and led to a huge polarisation the Nepal Government decided to amend it to make it more inclusive. The amendment process however did not include the main demand of the Madhesis for the creation of two separate Madhesi provinces on the plains of Nepal. The change of government in Sri Lanka in early 2015 was also accompanied by a realignment of Sri Lanka s foreign relations continuing economic links with China Russia and Iran are now complemented by greater reliance on India and the West. Under the new President there seems to be a greater openness to dialogue but the extent to which this will play out is not yet clear. The recent terror attack in Bangladesh on July 1 2016 at the Holey Artisan Bakery by home-grown terrorists suggests that Bangladesh s militant networks are internationalising a key concern as the United States seeks to contain the growth of the Islamic State. Bangladesh s 160 million people are almost all Sunni Muslims including a demographic bulge under the age of 25. This makes it valuable as a recruiting ground for the Islamic State now under pressure in its core territory of Iraq and Syria. Bangladesh is now taking a serious stock of the overall threat. East Asia and Pacific Rim East Asia and the Pacific Rim cover all the Asian countries east of Myanmar. Australia though not strictly a part of the region has been included because of its strategic location astride the Indian and Pacific Oceans. The three important powers in the region are the United States China and Japan. China is the largest country in this region and a major concern for the other countries of the region who wish to cope with its growing economic and military might. China while being apprehensive of the US hegemony and assertiveness is also aware that the latter s presence in the area prevents an independent military role for Japan its historical antagonist who under Prime Minister Shinzo Abe is evolving a new security posture. Major issues which are impacting the security environment in East Asia are Japan s defence policy and China s military strategy Korean Peninsula Taiwan US reposturing its naval forces and ASEAN activities. These issues have been covered in the chapter on Regional Balance . Asia-Pacific Region The strategic rivalry between the United States and China in the AsiaPacific is also causing concern with some even naming this as emergence of a New Cold War As both countries continue to strengthen . their position vis- -vis the other it is feared that the vitality of the region may get mired into a conflict that may not see a shot being fired but consume huge amount of political diplomatic and economic capital. This has caused concerns in China because the Regional Comprehensive Economic Partnership (RCEP) as a counter to the TPP has failed to gather momentum. China has also initiated One Belt One Road regional security scenes West Asia Portends of instability are marked across the globe with West Asia -- the main source of oil and gas to fuel economies of the Asia-Pacific mired in a number of parallel civil wars in Syria Iraq and Yemen. The vertical cleavage between Iran and Saudi Arabia has rekindled traditional source of rivalry while the coup in Turkey in July 2016 marked the internal challenges that are faced by regimes in this region. Territorial expansion of non-state actors such as the ISIS has been contained for now but the potential to carry out terrorist attacks globally has emerged as a key threat in Europe South East Asia and South Asia which were relatively unscathed by global terrorism so far. The impact of volatility is evident with a flow of refugees from Syria North Africa and Afghanistan causing concerns in Europe -- the main recipient of thousands of migrants from conflict zones. The periphery of West Asia Afghanistan and Pakistan continue to be hobbled by active militancy with mass casualties becoming a major concern. This has led the United States to extend stay in Afghanistan keeping 8 400 troops through the year 2016. Thus from Europe to West and South West Asia disruptive fragmentation -- political economic and security -- is evident. Central Asia The war in Afghanistan has been both a boon and curse for neighbouring Central Asia. The conflict placed this sparsely populated region long disconnected from the globalisation taking place around its borders on the front lines of the international community s 15-year effort to stabilise Afghanistan. Central Asia became a staging point for coalition military forces a transit corridor a donor as well as a recipient of aid and at times a pawn in a larger strategic competition playing out between the United States and Russia. The region also found itself on the receiving end of Afghanistan s noxious exports extremism drugs and crime. With the war in Afghanistan -- or at least the international community s direct participation in it -- having wound down Central Asia s leaders worry more and more about the prospect of instability both at home and next door in Afghanistan. Though the five Central Asian states are politically diverse the region s authoritarian regimes are responding to the threat by becoming more insular feeding a vicious circle. South Asia The region spanning Pakistan and Afghanistan in South Asia has been the focus of the global war on terrorism since the catastrophic events of 9 11. International terrorism has come to occupy a prominent position on the security agenda of virtually every state. Additionally Pakistan-occupied Kashmir (PoK) continues to foment terrorism in Jammu and Kashmir since 1989 and now Pakistan s Inter-Services Intelligence (ISI)-inspired terrorist activity has spread across India establishing their cells within home-grown groups bedevilling relationship between the two countries. The series of terrorist attacks in 2015-16 emanating from Pakistan territory followed by surgical strikes by the Special Forces of the Indian Army targeting seven terror launch pads in PoK across the 201638 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com l editorial l this edition of SP s Military Yearbook is unique in its content. We have introduced mission critical information for the military fraternity like a whole new chapter added with full Ministry of Defence organisation charts and contacts of 13 prominent countries in asia that are also major arms buyers which would interest the business community. an exclusive and exhaustive interview with secretary Defence Production india giving away interesting inputs for all those interested in working with the indian armed forces. interviews of the current and newly appointed chiefs of the indian army the indian navy and the indian air force. Perspectives from three former service chiefs general V.P. Malik admiral arun Prakash and air chief Marshal P.V. naik. (OBOR) Initiative which has a continental and a maritime dimension in the form of the Silk Road Economic Belt and 21st Century Maritime Silk Road (MSR). This in turn has created concerns in India which sees in the MSR as a String of Pearls implying Chinese ring of ports in the Indian Ocean region (IOR) mainly for trade but with potential to convert as military logistics-cum-naval bases in the future. These developments have for the first time led many to question the vision and prospects of the Asian Century This aspect has been discussed . separately in the essay on Asia-Pacific Environment which has been included in the chapter on Regional Balance . the Make Procedure 2016 to address the issues of self-reliance have been detailed extensively apart from the articles on modernisation of army navy and the air force. The essay on Strategic and Business Environment skillfully analyses the subject by a highly experienced military and business analyst. In the chapter on Technology future technologies covering cyber warfare future soldiers artificial intelligence military radars future of revolution in military affairs have been included among others. We wish our readers a Joyous and a Prosperous New Year 2017. Clarifications Most countries are reluctant to part with information relating to the size and strength of their armed forces and equipment specifications. Sincere efforts have been made to garner information from the most authentic sources for the SP s Military Yearbook 2016-2017. Despite this it is quite possible variations may crop up in some cases. rticles in this volume contain the personal opinions A of the contributors and do not reflect the views of the publishers or the Indian Government including the Ministry of Defence. Suggestions for improvements will be appreciated and carried out to the extent possible and practically viable. the content this year SP s Military Yearbook 2016-2017 carries an exceptional range and significantly greater number of interesting articles on highly topical subjects by well-known authors. These articles are included in the chapters on Concepts and Perspectives Business and Technology The . chapter on Concepts and Perspectives includes well analysed articles of military and strategic value on subjects which range from the global to the regional perspectives articles pertaining to land air and maritime domains and those which cover a wide area of strategic interest to India s defence planners and industry honchos. In the Business section the new guidelines on Defence Procurement Procedure 2016 Defence Offsets promulgated in 2016 and acknowledgements Several distinguished columnists and industry experts on the Editorial Board worked in unison to make the SP s Military Yearbook 2016-2017 a quality product. It is my pleasure to name SP s team of experts Lt General V.K. Kapoor (Retd) Lt General Naresh Chand (Retd) Lt General P.C. Katoch (Retd) Air Marshal B.K. Pandey (Retd) Rear Admiral S.K. Ramsay (Retd) Jayant Baranwal Editor-in-Chief 2016 SP s Military yearbook 2017 44th issue 39 www.spsmilitaryyearbook.com FOR YOU. FOR EVERYTHING. FOR EVERYWHERE. An experienced partner you can rely on for all industrial cleaning tasks. Production can only run smoothly when every part interlocks perfectly. The same applies to cleaning processes efficient cleaning can only be achieved if all solutions harmonise with one another. This is why K rcher as a system provider in all sectors offers effective safe strong and customised cleaning solutions and for decontamination purpose. Enquiry 1800 1234 180 I www.kaercher.com in I email info in.kaercher.com makes a difference Head Office & Marketing Office Karcher Cleaning Systems Private Limited D-120 Sector 63 Noida - 201 307 Uttar Pradesh India. Branch Offices A h m e d a b a d B e n g a l u r u C h e n n a i C o c h i n I n d o r e K o l k a t a M u m b a i N o i d a P a n c h k u l a S e c u n d e r a b a d V a d o d a r a 201640 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com special colour feature Weapons Equipment & Vehicles BUSINESS TECHNOLOGY REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Copyright 2017 SP Guide Publications All rights reserved. The information published herein is for the personal use of the reader and may not be used for any other activity. No part of this book may be reproduced stored in a retrieval system or transmitted in any form by any means digital electronic mechanical photocopy recording or otherwise without the prior written approval of the Editor-in-Chief. The publisher shall not be liable in the event of incidental or consequential damages in connection with or arising out of the furnishing or use of the information associated instructions claims of productivity gains. Concept TECHNOLOGY REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS Jayant Baranwal Editor-in-Chief & Publisher SP Guide Publications Pvt Ltd New Delhi India Credits Publishers extend special thanks to the companies who have provided the contents and respective photographs for this feature. Also gladly acknowledge their extensive support and co-operation in formulating this feature with maximum possible up-to-date and lively contents. Printed in India at Pragati Offset Hyderabad W e a P o N S e Q U i P M e N t & VeHiCleS C on t en t s Alpha Design Technologies ....................................................................................... 42 Ashok Leyland .............................................................................................................. 43 Bharat Electronics ....................................................................................................... 44 FFV Ordnance ............................................................................................................... 45 Garden Reach Shipbuilders & Engineers ................................................................ 47 IAI ................................................................................................................................... 49 MBDA............................................................................................................................. 51 Navantia ........................................................................................................................ 52 Nexter ............................................................................................................................ 54 Proengin ........................................................................................................................ 55 Rosoboronexport.......................................................................................................... 57 UAC................................................................................................................................. 59 Yulista ............................................................................................................................. 61 SP GUIDE PUBLICATIONS PVT LTD Corporate Office A-133 Arjun Nagar Opposite Defence Colony New Delhi 110003 India. Phones 91 11 24644693 24644763 24620130 24658322 Fax 91 11 24647093 E-mail info spsmilitaryyearbook.com Order order spsmilitaryyearbook.com Websites www.spguidepublications.com www.spsmilitaryyearbook.com www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 41 CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS alPHa DeSiGN teCHNoloGieS A lpha Design Technologies Pvt. Ltd (ALPHA) is making significant strides in R&D and manufacturing of Defence Electronics and Avionics equipment and Systems. The Company specializes in Research & Development manufacturing quality assurance evaluation and system integration for various defence products such as Fighter aircraft helicopters UAVs Avionics equipment including Missile Launch Detection System (MILDS) IFF Optronics LRF Based Products Laser Target Detectors Thermal Imagers & Fire Control Systems Navigation Tactical Communication Software Defined Radios Image Conversion Data & Image Fusion Radar RF Seekers C3I Systems EW Simulators Microwave Components & RF Units for Indian and International markets. Out of 527 R&D engineers of ALPHA more than 50 R&D engineers are working on development of SDR Waveforms at its R&D Centre at Bangalore. SDR Waveform for Naval and Ground versions have been developed including for WESEE and for other Organisations. ADTL will be playing a major role in development manufacture and supply of SDRs for Army (including AFV version) Navy and IAF. These will be show-cased during Aero India 2017 from February 14-18 2017 at Bangalore. ADTL is also developing High Capacity Radio Relay for Army. Other R&D initiatives include indigenously development of RF Seekers for Missiles IFF (Interrogator Transponder CIT) for Army Navy and IAF and newer versions of TI Sights. The Company is establishing state-of-the-art facilities for Assembly Integration & Testing of RF Seekers Col. H.S. Shankar VSM (Retd) CMD Alpha Design Technologies Bangalore being presented with Life Time Achievement Award-2016 by Chairman ISRO A.S. Kiran Kumar during Silver Jubilee Celebrations of Society of Indian Aerospace Technologies and Industries (SIATI) at Bangalore on December 2 2016. Get yoUr CoPy to reaD iN CoMPlete for MRSAM Missiles at its Hyderabad Centre. ADTL has also bagged orders for developing S&L Band TransReceive Units from DRDO (CABS) for their AESA Radar manufacture & supply of Thermal Imager based Fire Control System for Tanks Rear Fuselage and 8 Nos Under Wing Pylons for LCA and 16 sets of Front Fuselage for Dornier DO-228 for which new Orders have been received and which are of great significance. The Company has taken new initiatives in establishing production facilities for CNR-900M AFV Radios from M s. Elbit Systems Israel at its Bangalore Factory. ADTL will be manufacturing 3000 Nos Radios for Exports to Elbit Systems during 2017-2018 period. One of the major initiative taken by ADTL is its foray into Space sector. It has bagged the prestigious Contract from ISRO for Assembly Integration & Testing (AIT) of two numbers of IRNSS Satellites in 18 months time (in co-operation with ISRO). This is the first time a Private Sector Industry has entered into this segment in a major way. The Company expects to obtain additional orders for Satellite AIT in the years to come. 201642 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com aSHok leyLAND The driving force for the Armed Forces A www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 43 REGIONAL BALANCE shok Leyland the flagship company of the Hinduja Group and Technology leaders in the Indian commercial vehicle industry is a pioneer in the design development and manufacture of special vehicles for the armed forces for over four decades. The development of the futuristic Stallion 4x4 has greatly contributed to the modernization of the logistics of the Indian army. Following this Ashok Leyland s Stallion 4x4 has grown to a 75 000 strong fleet and this has become the veritable backbone of logistics operations making Ashok Leyland the largest supplier of logistics vehicles to the Indian army. In 2010 the Indian defence market for high mobility vehicles was opened to private sector and Ashok Leyland took this opportunity in developing Super Stallion 6x6 8x8 10x10 and 12x12 configurations. These vehicles have been successfully inducted into the army after extensive evaluation. These vehicles are now widely considered for Radars BCP Missile launcher carrier. Ashok Leyland through its associate company Ashok Leyland Defence Systems Ltd has made foray into the armoured vehicles business segment with introduction of its state of the art Medium Bullet Proof Vehicles (MBPV 4x4) Mine Protected Vehicle (MPV 4x4) and Personnel Protected Vehicle (PPC 4x4). Ashok Leyland is in the forefront in perceiving challenging and demanding Army s needs and rendering viable solutions. In the last five years Ashok Leyland has added hMV 8x8 Field artillery Tractor (FaT) 6x6 (As Common Gun Tower) on Super Stallion platform Air conditioned ambulance 4x4 & ambulance 4x2 on Stallion platform. This is in addition to existing products like recovery Vehicle insulated Water Bowser refrigerated Lorry aTF refueller & Truck Driving Simulator etc. The Defence Exports portfolio grew with left hand L-R Super Stallion Ambulance MBPV and MPV drive Stallion vehicles powered by 230 hp BS III driveline in 4x4 & 6x6 configurations Fully Built Vehicles and 165 kW MPV Kits. Ashok Leyland vehicles entered United Nations Peace Keeping Force fleets at Mali and South Sudan. Ashok Leyland has contracts with UN OPS Tanzania Kenya and Nigeria. Ashok Leyland HMV vehicles have also been integrated by Global players for BAMSE Short Range Surface to Air Missile (SRSAM) and for the Mounted Gun System for Indian Army considering their capabilities in all weather & terrain conditions. Going forward the Company has on the anvil a family of modern reliable war-worthy vehicles with high commonality of parts. For more information visit our website www.ashokleyland.com Chennai No.1 Sardar Patel Road Guindy Chennai 600 032 Contact Person amandeep Singh Email Amandeep.singh ashokleyland.com Tel 91 44 22206000 Fax 91 44 22206001 GurGaon 5th floor Plot No. 76 Institutional Area Sector 32 Gurgaon 122001 Haryana Contact Person atul andley Email atul.andley ashokleyland.com Tel 91 124 4264969 Fax 91 124 4264970 Ashok Leyland s office Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS bharat electronicS Empowering India s armed forces E stablished in Bangalore in 1954 Bharat Electronics Limited (BEL) has come a long way. From a humble beginning BEL is now a Navratna public sector undertaking and India s foremost defence electronics company. BEL is a multi-product multi-technology multi-unit conglomerate boasting of over 350 products in the areas of Radars Missile Systems Military Communications Naval Systems Electronic Warfare & Avionics C4I Systems Electro Optics Tank Electronics & Gun Weapon System Upgrades Solar Photovoltaic Systems Electronic Components and civilian products such as solar traffic signals and Electronic Voting Machines (EVMs). It also provides turnkey systems solutions. Defence contributes nearly 85 per cent of its revenue. BEL spends 8 per cent of its turnover on Research & Development maintaining leadership position in defence electronics. BEL s manufacturing network is spread over nine units in the country. Upgraded SCHILKA Weapon System Major Orders Executed Some of the significant orders executed during 2015-16 include supply of Akash Weapon System 3-D Tactical Control Radar Schilka Upgrade Passive Night Vision Devices Low Level Light Weight Radar Fire Control System Integrated Sonar Suite Ship Data Network and New Generation Sonars for the armed forces and L Band Surveillance Radar to Myanmar. Make In India Initiatives BEL is focusing more on core areas and R&D even as all non-core areas are being outsourced to Indian industries including MSMEs. A long-term Outsourcing & Indigenisation Policy has been released. Annually around 800 new indigenous vendors are added. Outlook For The Future BEL has laid the foundation stone for a new Defence Systems Integration Complex at Anantapur district to expand the Missile Systems business and another stateof-the-art Advanced Night Vision Products Factory at Nimmaluru village in Krishna District of Andhra Pradesh. Radars Missile Systems Communication & Network Centric Systems Tank Electronics Gun Upgrades Electro-Optic Systems and Electronic Warfare & Avionics Systems will continue to drive BEL s growth. It is pursuing business opportunities in solar energy homeland security smart cards and telecom. Strategies and action plans are in place to face competition maintain technological edge and retain leadership position in strategic electronics. Highlights of 2015-16 BEL registered a growth of 12 per cent in 2015-16 with a sales turnover of Rs. 7 522 crore in 2015-16 as compared to Rs. 6 695 crore in 2014-15. The profit after tax was Rs.1 358 crore (2015-16) as against Rs 1 167 crore (2014-15). Exports registered a growth of 47 per cent as the turnover increased from US 58 Million in 2014-15 to US 85 million in 2015-16. BEL has an order book value of Rs.32 022 crore as on April 1 2016. The induction of the Akash missile system into the armed forces was a milestone of 2016. Get yoUr coPy to reaD in coMPlete 201644 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com FFV ordnance F Combat in Built-up Areas FFV Ordnance now has more than 30 years of experience with man-portable weapons intended for use by units engaged in urban warfare. The AT4CS HEAT system has a warhead with increased behind-armour effect which is sought after primarily for engagement of light-armoured vehicles. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 45 REGIONAL BALANCE Get yoUr coPy to read Further Developments for Future Needs in coMPlete FFV Ordnance is continuously working to make ASIAN WHO S WHO FV Ordnance part of the global defence and security company Saab has been for decades one of the world s leading suppliers of man-portable support weapons. The shoulder-fired weapon system Carl-Gustaf is the flagship of FFV Ordnance s product family. The system has a long and successful history and is today in use in more than 40 countries worldwide. This includes India where it is in use with the Indian Army. The system offers the soldier various types of ammunition ranging from armour penetration and anti-personnel to ammunition for built-up areas as well as special features like smoke and illumination. Through its wide variety of ammunition available Carl-Gustaf is a weapon system capable of handling multiple tactical situations bridging the gap between full scale operations and low intensity conflicts and providing the modern warfighter with unprecedented flexibility and capability on the battlefield. The well-proven Carl-Gustaf M3 meets all the basic requirements of being a multi-role robust light weapon that is easy to use in both day and night operations. Brand New Ammunition The HEAT 655 CS launched in December 2013 is the first Carl-Gustaf ammunition that is fully optimized for firing from confined spaces i.e. from inside a building. This is an important requirement in modern urban conflicts. The HEAT 655 CS adds to the large existing inventory of ammunition that is already available for every kind of operation making the Carl-Gustaf the true multi-mission land combat system. Other new capabilities include the ASM (AntiStructure Munition) 509 and the MT (Multi-Target) 756. INDIAN DEFENCE Carl-Gustaf M4 manportable shoulderlaunched multi-role weapon system The Four Areas of Ammunition Carl-Gustaf ammunition can be divided into the following four areas Anti-armour Anti-structure SoftTargets Support BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS G arden Reach Shipbuilders & Engineers Ltd (GRSE) is a Mini-Ratna Central Public Sector Enterprise under the Ministry of Defence in India. Started in 1884 as River Steam Workshop and incorporated in 1934 as Garden Reach Workshop a small company in the ship-repair business it was acquired by the Government of India in 1960. PRODUCT RANGE GRSE has developed capabilities to design and build most modern warships having built Frigates ASW Corvettes Missile Corvettes Fleet Tankers Large Landing Ship Tanks Landing Craft Utility Survey Vessels Offshore Patrol Vessels Fast Attack Crafts In-shore Patrol Vessels and Hovercrafts besides Commercial Vessels including Bulk Carriers Research Vessels Fire Floats Dredgers Ro-Ro Vessels Tugs Fishing Trawlers and Passenger Ferries. GRSE is the only defence shipyard in the country with its own engineering division with three units - PreFabricated Steel Bridges Unit Deck Machinery Unit & Engine Unit. It has built approximately 5 000 bridges for the Indian Army and the State Governments. A GRSE-manufactured modular steel bridge has been installed at 5 600 m and is in the Guinness Book of World Records. The Deck Machinery Unit manufactures everything from Boat Davits to Anchor Capstan and Mooring Capstan. It also makes the Rail-Less Helicopter Traversing System for installation on warships. Its engine unit at Ranchi assembles tests and overhauls diesel engines. Integrated Shipbuilding Facility www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 47 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete In recognition of GRSE s performance the company has been awarded the Defence Minister s Best Performing Defence Shipyard Trophy for last four consecutive years. ASIAN WHO S WHO The company delivered the first indigenous warship INS Ajay to the Indian Navy in 1961. Since then it has delivered 98 warships to the Indian Navy the Indian Coast Guard and the Mauritius Coast Guard. Today it is pursuing a dynamic growth strategy to meet the defence needs of the country. It has a modern shipyard capable of building quality ships in a reduced time frame with modular construction technology. The state-of-the-art integrated Shipbuilding Facility includes Dry Dock of 10 000 T capacity (Length 180 m) Inclined Berth 4 500 T (Length 180 m) Goliath Crane (250 T capacity) Module Hall for construction of ship blocks up to 250 Tonne and a Paint Shop. INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES GarDeN reaCH SHiPbUilDerS & eNGiNeerS WEAPONS EQUIPMENT VEHICLES CONTENTS iai Israel Aerospace Industries Ltd. (IAI) is a world leader in the delivery of state-of-the-art ground air sea space and cyber technologies and systems for defense commercial and homeland security applications. Joseph Weiss President & CEO Established 1953 IAI develops ISR solutions in space air land and sea delivering real-time electronic information I AI s backlog as of December 2015 reached 8.5 billion. IAI s2015netprofit 9million. Core Areas of Activity Line of Business Defense and Commercial Products & Services Development Manufacture Overhaul Upgrading Repair and Maintenance of Aircraft and Aerospace Equipment Electronic Systems Avionics Suites Advanced Radars Tactical Weaponry & Law Enforcement Systems Cyber Interception and Collection Unmanned Air and Ground Vehicles Training and Simulation Systems Communication and Observation Satellites Network and Situation Awareness Systems Financial Figures I AI s2015totalsales 3.7billion 80%ofthesesales areforexport. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 49 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete Space Positioned as Israel s leading integrator for space technology IAI has a proud legacy of dozens of satellites deployed in space. IAI develops and produces a wide range of cutting-edge satellites and satellite equipment including observation and communication satellites scientific research satellite systems ground control stations mission centers and launchers. With the latest members of OPTSAT-3000 an electrical optical imaging satellite product line TECSAR (Synthetic Aperture Radar) an observation satellite line and the AMOS communications satellite product line IAI provides top performance and cost effective solutions for national securityandcommercialapplications. Theater Defense IAI develops and manufactures advanced air defense systems including the Barak ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS MbDa M www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 51 REGIONAL BALANCE BDA is unique in the guided missile sector in its ability to meet the missile system requirements of all three operational domains air land and sea. This offers benefits to customers keen to maximise supply and servicing logistics as well as missile system modularity. MBDA weapons such as MICA and Meteor combined with precision ground strike weapons such as the multi-target Brimstone and the long range SCALP Storm Shadow are capable of ensuring air dominance long into the future. The IAF s Mirage 2000 fleet is being upgraded and will feature MBDA s MICA missile with its IR and RF seeker variants to deal with short to beyond visual range air combat. India s Jaguar bombers also stand to have their battle capability significantly enhanced by MBDA s ASRAAM missiles. With 36 Rafale now contracted MBDA will be playing a major role in maximizing the combat capability of this new generation aircraft. The threat of air attack is increasing. Low cost cruise missiles manned and un-manned aircraft and the appearance of new ranges of ballistic missiles are threats that MBDA is best qualified to counter. Here the Company leads with its range of ground and naval based air defence systems using Mistral MICA and Aster missiles. MBDA s Aster recently achieved Europe s first successful ballistic missile target intercept further proof of the Company s unmatched skills. Mistral with its unmatched success rate of over 96% during all firings has been selected by forces around the world and has been offered to the Indian armed MICA multi-mission air-to-air missile system on Rafale fighter Get yoUr CoPy to reaD iN CoMPlete forces to meet their VSHORAD requirement. Coastal and blue water operations require an effective anti-ship capability. MBDA is already supplying the Indian Navy s new Scorpene submarines with its Exocet SM39 missile system. Similarly other versions of the world-famous Exocet family are being proposed along with Marte for a number of Indian maritime aircraft requirements (both fixed and rotary wing). The concept of partnership with Indian industry is key to MBDA s strategy. In fact MBDA s links with Indian industry go back some 40 years thanks to its partnership with BDL currently manufacturing the MILAN missile under license for the Indian Army. Discussions are also under way for the potential co-development of a 5th generation anti-tank missile based on the MMP that has recently been ordered by France. Working with HAL integration of the Mistral ATAM system on the Dhruv helicopter is well advanced. As well as working with the DRDO MBDA is actively constructing ties at all levels within the country. ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS NavaNtia N avantia the Spanish shipbuilder 100% owned by the Spanish Government is a world reference in the design construction and integration of stateof-the-art war ships as well as civil ships offshore structures ship repairs & modernizations. It is also engaged in the design and manufacture of Integrated Platform Management Systems Fire Control Systems Command and Control systems Propulsion Plants and through life support for all its products. Even though its main line of activity is in the naval field Navantia designs and manufactures systems for the Army. Navantia has enough experience in building the most technologically advanced ships like frigates amphibious ships patrol vessels and submarines. In the last years it has supplied ships for different navies Norway Australia Spain Chile Malaysia India and Venezuela. It has also been contracted in Turkey for the Crist bal Col n Get yoUr CoPy to reaD iN CoMPlete design and technical assistance of the LPD program based on the Spanish Navy LHD Juan Carlos I and is has been shortlisted in Canada for the frigates program. This experience together with a continuous commitment to innovation the use of the latest technologies and with a highly qualified work force makes Navantia one of the most competitive companies in the world Navantia is a reference in surface warships having been able to integrate the AEGIS LM system in a much smaller platform. It has designed and built the F-100 Alvaro de Baz n class frigates (5 units) for the Spanish Navy and the F-310 Fridtjof Nansen class (5 units) in service at the Royal Norwegian Navy. The Australian Warfare Destroyer currently under construction is another Navantia design also based in Navantia F-100 frigate. The F-310 class frigates are considered one of the 201652 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com Nexter Creating new references in defense N exter a KNDS company (Nexter KMW Defense Systems) is one of the world s leading land defense systems group with a large range of products and services. Nexter expertise includes armored vehicles (VBCI TITUS ) artillery systems (105LG1 TRAJAN CAESAR family) but also land naval and aeronautic weapon systems. Since delivering its first artillery gun in 1764 Nexter has acquired extensive know-how in artillery. Systems developed by the company have always set the standard and this remains the case with CAESAR . Those two centuries of experience have established Nexter as a leader in artillery systems enabling the company to offer a full range of products from guns and ammunition to ballistic computers. Nexter s range of solutions also covers integrated training maintenance support services and the complete operational logistics environment of an artillery battalion. The range of Nexter artillery guns which are in service in several armies and combat proven includes CAESAR truck-mounted artillery system equipped with a 155mm 52 calibre gun. Enjoying extraordinary mobility superior firepower and shoot and scoot capability CAESAR is currently in production and in service in 4 armies. The CAESAR is now available on a 6x6 or 8x8 chassis. The TRAJAN towed artillery system incorporates CAESAR s combat-proven 155mm 52 caliber gun with a towed gun chassis providing all the flexibility of towed systems. CAESAR Artillery system of the 21st century Get yoUr CoPy to reaD iN CoMPlete In India Nexter has teamed up with Larsen & Toubro and Ashok Leyland Defence to propose an Indian version of the CAESAR to soldiers of the Indian Army for the MGS (Mounted Gun System) program. Based on the 6x6 Super Stallion chassis from Ashok Leyland with higher payload which improves the modularity of the Indian CAESAR to fulfill specific requirements of the Indian Army. The two companies have signed another Consortium Agreement to create a Nexter Systems partnership for 155 mm Towed Gun System (TGS) program for Indian Army. The two partners plan to organize extensive technology transfer in India early in the programmes. This cooperation capitalizes on the reknown know-how of Larsen &Toubro in the field of engineering manufacturing and system integration but also on the high expertise in artillery exceptional operational capabilities and cost-effectiveness of the artillery systems (TRAJAN and CAESAR ) from Nexter. 201654 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com UNiQUe teCHNoloGy PROENGIN Biological and Chemical detection for the field (and real life) P ROENGIN has developed Biological and Chemical Warfare Agents field detectors using Flame spectrophotometry technology. The well-known and widely used AP2C has proven the capacity of this technology to be the most reliable in the field with the lowest false alarm rate and the simplest ease of use. AP4C handheld CWA Detector HANDHELD CWA DETECTOR AP4C New developments such as the AP4C (handheld CWA detector) have extended the capacity of the FPD technology to include chemical warfare agents and toxic industrial materials in a simultaneous mode. There is no limitation in the number of agents detected by the AP4C. All Nerve agents All Blister agents and All Blood agents can be detected by AP4C within the NATO recommended response time and sensitivity. The AP4C has extended the range of chemicals that can be detected by PROENGIN chemical detectors. All dangerous compounds containing Sulfur Phosphorous Arsenic and or HNO chemical bond can be detected simultaneously. Much like the AP2C the AP4C also has the capacity to work in severe environmental conditions (explosive areas) and the measurements are unaffected by high humidity levels or by the presence of other organic chemical compounds such as paint. The AP4C technology allows the simultaneous detection of an unlimited number of agents and the identification of the chemical elements that constitute these chemicals. It is therefore possible to detect impure agents or chemical compounds manufactured by terrorists that would not fit into traditional libraries of IMS detectors. Moreover AP4C is capable of detecting New Agents that will be developed in the future as well as agents that are still not precisely known Novichok agents (or Non Traditional Agents). The response time of the detector is among the shortest in the market but what makes the AP4C unique is the recovery time after a positive detection. The AP4C therefore offers the highest level of performance on the field. AP4C has also been derived on other detectors dedicated to the following uses seonreconnaissancevehiclesandbattletanks u seaboardnavalships u se for critical strategic buildings and areas u protection www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 55 REGIONAL BALANCE AP4C-V FOR USE ON RECONNAISSANCE Get yoUr CoPy to reaD VEHICLES AND BATTLE TANKS Based on the same detection technology and the same iN CoMPlete internal design the unique air sampling unit has been ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS i www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 57 REGIONAL BALANCE think the main result of the past 16 years is that despite the difficult economic conditions and fierce often unfair competition in the global arms market we have managed not only to multiple our sales but also significantly enlarge our footprint in the traditional and new arms markets. Through integrated marketing strategies we have ensured that Rosoboronexport s order book today exceeds US 45 billion said Rosoboronexport CEO Anatoly Isaykin. The special exporter makes painstaking efforts on a daily basis to increase Russian arms exports resulting in more than a thousand contract documents signed with foreign customers every year. Over the period of its operation in the international market Rosoboronexport has delivered hundreds of thousands of units of military equipment and weapons worth more than US 120 billion to 115 countries. Rosoboronexport pays great attention to both major billion dollar contracts and small deals. The company seeks to operate flexibly and efficiently by using modern and advanced marketing and customer settlement methods. The special exporter cooperates with more than 700 Russian defense-industrial enterprises and organizations which enables it to offer partner countries the comprehensive and cost-effective Get yoUr coPy to reaD in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS Anatoly Isaykin Rosoboronexport CEO TECHNOLOGY On November 4 JSC Rosoboronexport (part of the Rostec State Corporation) marks its 16th anniversary. The sole Russian state intermediary agency which is responsible for import export of the full range of defense and dual-use end products technologies and services was set up by the RF President s Decree in 2000. This is a 100% state-owned company. CONCEPTS & PERSPECTIVES roSoboronexPort 16 yearS of excellence WEAPONS EQUIPMENT VEHICLES CONTENTS T www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 59 REGIONAL BALANCE he United Aircraft Corporation (PJSC UAC ) was established in 2006 to consolidate Russia s main assets in aircraft design and production. The Russian Federation is its main shareholder with more than 85% of shares. UAC is formed by the following design bureaus and manufacturing plants Sukhoi Company Irkut Corporation UAC Transport Aircraft Ilyushin Tupolev Ilyushin Finance Company Aviastar-SP Voronezh Aircraft Company Russian Aircraft Corporation MiG Myasishchev Design Bureau Beriev Design Bureau Aerocomposite and Gromov Flight Research Institute. The Corporation s mission is to develop manufacture and service military transport and civil aircraft with a priority to Russian state customers to reach and to sustain long-term competitiveness on the global market. Key aim of the Corporation is to become the world s third largest aviation center with a stable position and share in the global market. Russian T-50 the base for FGFA development Deliveries and Income UAC is constantly growing increasing its volumes year on year for more than 6 years. The Corporation has delivered 156 aircraft in 2015 while UAC s income slightly increased to more than US 6 billion. According to UAC s long term development strategy the Corporation s revenues should quadruple by 2025 with profit margin not less than 10%. During the next decade UAC plans for faster growth in the civil segment Main figures 102 000 people Total UAC workforce Get yoUr CoPydelivered to customers 156 Aircraft to read in 2015 in CoMPlete RUR 352 billion 2015 revenue ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES UaC to SUPPort Make in india WEAPONS EQUIPMENT VEHICLES CONTENTS Y www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 61 REGIONAL BALANCE ulista understands that military and civil aviation are essential elements of both the present and future battlefield. In supporting this mission our aviation roots run deep providing a reputation of responsiveness and customer focus. We provide rapid response solutions to our military and civil customers globally. Over the past 12 years Yulista has experienced continuous growth of experience with all aircraft platforms and the nature and complexities of Yulista s ASPI kit on the Apache helicopter increases aircraft and crew safety and survivability Get yoUr CoPy to reaD iN CoMPlete modifications to every type of military and civil aviation asset. Our maintenance teams deploy globally to modify repair and install Modification Work Orders on military and civil aircraft often in combat zones. Yulista s competencies encompass all aspects of the product realization process from requirements definition to integration onto rotary and fixed wing aviation assets as well as ground missile maritime and unmanned systems. These efforts entail improving com- ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES yUliSta iNNoVatiVe SolUtioNS WitH oeM CaPabilitieS WEAPONS EQUIPMENT VEHICLES CONTENTS Advertiser index CompAny AlphA design teChnologies Ashok leylAnd bAe systems sWs deFenCe bhArAt eleCtroniCs dAssAult AviAtion FFv ordnAnCe FinCAntieri gArden reACh shipbuilders & engineers generAl AtomiCs AeronAutiCAl systems goA shipyArd isrAel AerospACe industries k rCher l-3 WesCAm mAzAgon doCk shipbuilders mbdA nAvAntiA nexter pilAtus proengin rosoboronexport sAFrAn sAFrAn eleCtroniCs & deFense (sAgem) shinmAyWA thAles thyssenkrupp mArine systems united AirCrAFt CorporAtion viking yulistA Website www.adtl.co.in www.ashokleyland.com www.baesystems.com www.bel-india.com www.rafale.co.in www.saab.com cgm4 www.fincantieri.com www.grse.nic.in www.ga-asi.com www.goashipyard.co.in www.iai.co.il www.kaercher.com in www.wescam.com www.mazagondock.gov.in www.mbda-systems.com www.navantia.es www.nexter-group.com www.pilatus-aircraft.com www.proengin.com www.roe.ru www.safran-group.com www.safran-electronics-defense.com www.shinmaywa.co.jp www.thalesgroup.com www.thyssenkrupp-marinesystems.com www.uacrussia.ru www.vikingair.com www.yulista.com pAge no. 23 21 25 26 Back Cover 9 17 19 Front Cover 28 13 40 Bookmark 30 7 27 29 2 33 Bookmark Facing Inside Front Cover 11 15 4 Bookmark Bookmark 31 1 201664 SP s Military yearbook 2017 44th Issue www.spsmIlItaryyearbook.com Contents Concerns and challenges impacting on global peace and security The Modi-Obama Vision and Indo-US Relations Modi and Indo-Russian Relations China s Military Command and Control A Root and Branch Overhaul The Current Situation in West Asia and its Implications Pakistan A Fragile Polity and a Dysfunctional State The UN Tribunal s South China Sea Verdict -- Implications for Regional Security Eight Reducing Flab in India s Defence Organisation Nine Maritime Capacity Building and India s Imperatives Ten Special Forces Eleven Asymmetric and Unconventional Warfare on the Subcontinent Twelve Army Aviation Turns 30 A Reality Check Thirteen Blue Economy and China Economic Wealth and Strategic Advantages Fourteen Cyber Warfare in Future Conflicts Fifteen Defence Reforms Sixteen Foundational Pillars of India s Strategy to Protect Offshore Assets Seventeen The IAF A Strategic Air Force Eighteen Trends in Land-based Firepower in the Future One Two Three Four Five Six Seven 1 5 9 13 17 21 25 29 31 35 39 43 47 51 55 59 65 69 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Concepts & Perspectives CONCEPTS & PERSPECTIVES section one 1 WEAPONS EQUIPMENT VEHICLES CONTENTS 1 CoNCerNS aND CHalleNGeS iMPaCtiNG oN Global PeaCe aND SeCUrity The global and regional balances of power are also impacted by national interests of individual nations which take precedence even when the issues are collectively highly adverse. A case in point is the war on terrorism which seems to have lost its impetus because it affects different countries and even regions differently resulting in inaction by some nations and only marginal involvement by others. Abbreviations at the end of the yearbook Fraying Globalisation www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 1 REGIONAL BALANCE It was after the end of the Cold War that globalisation became a buzzword in international dialogue and soon gained considerable traction and speed. Nations began understanding the benefits of globalisation and slowly commenced being part of the process. Globalisation has changed the thinking that a rising power threatens the world order Today s rising power (China) is in . reality the poster child for globalisation It is fully invested in the global system is economically intertwined with the world to a great extent and hence unlikely to radically shake up the existing order. Diminishing Power of United States After the end of the Cold War the United States emerged as the only global superpower. However in most regions today it is actually in second or third place. Brazil dominates South America. Russia seeks to restore its control over its near abroad China pursues . regional hegemony and India has economic and demographic capabilities that are the envy of any power. In the next tier South Africa Turkey Iran and some other countries manoeuvre and compete for regional advantage and Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he international security On the other hand a declining power is Lt GeneraL Vijay OberOi (retD) situation is always in a flux more likely to dilute globalisation as it on account of not only direct may feel that it has nothing to lose even security issues but also because of other aspects that if the world order changes include economic social cultural cyber energy trade Economics is obviously the catalyst for this. China is constantly and commerce and financial aspects. Some challenges buying into the globalised system. At another plane China the largare recent but others are long-term strategic issues. est customer of West Asian oil has not even demanded a military The global and regional balances of power are also impacted seat at the Middle East table China has a huge reserve of funds and by national interests of individual nations which take precedence knows that whoever is in power needs to sell to them even when the issues are collectively highly adverse. A case in Globalisation was spectacularly successful in enabling millions point is the war on terrorism which seems to have lost its impetus of people to move out of poverty. However according to the US it because it affects different countries and even regions differently had three major adverse fallouts which were terrorism politically resulting in inaction by some nations and only marginal involve- coerced immigration and global warming Though the last one is ment by others. It is unfortunately not realised that collective action difficult to understand the US is convinced that there is a direct today will save lives money and resources in future. linkage between the three. The argument is that climate change is Good examples are globalisation that is under severe strain the root cause of government instability which leads to widespread the rapidly changing energy scenario the changes in climate and migration damaged infrastructure and spread of disease and global warming that transcend borders and of course the state of extremist ideologies prosper in such an environment and that in world economy. turn results in fostering terrorism. While one may not agree with It should be the endeavour of all nations of the world to so man- this somewhat convoluted argument all three issues are of great age international and regional concerns and challenges that peace concern globally regionally and nationally and prosperity prevails amongst all the peoples and countries of Another important aspect that most will agree with is that glothe world. balisation has diluted borders between countries and changed the concept of sovereignty. TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 2 tHe MoDi-obaMa viSioN aND iNDo-US relatioNS India does figure high in US strategic calculus and according to Nicholas Burns In strategic terms there are few countries more important to Washington than India the dominant power in the Indian Ocean region and with Japan the most important US partner in Asia seeking to limit Chinese assertiveness in the region . Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 5 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i ndo-us relations have seen remarkUnited States. Prime Minister Modi packed Dr HarinDer SekHOn able progress over the past two years with in a wide range of activities into a fast-paced the two leaders Indian Prime Minister schedule both in New York and Washington Narendra Modi and US President Barack Obama having had DC displaying great energy oratorical skill and a remarkable flair eight official bilateral meetings -- an unprecedented record by for diplomacy that helped establish a strong connect with all the any estimate. The importance of both countries to each other major stakeholders -- the Indian-American community busiand more especially as partners for peace and stability in Asia and ness leaders and the US Congress. Whether it was his event at the the Indo-Pacific safeguarding global commons through deepening Madison Square Garden or his stroll around the Martin Luther cooperation on counter-terrorism radicalism and cyber security is King Memorial in Washington DC with President Barack Obama not lost on either India or the United States. This is amply reflected all had a positive impact and there is optimism that under Modi s in the US-India Joint Strategic Vision for Asia-Pacific and the Indian decisive and pragmatic leadership backed by a strong political Ocean regions. Besides this bilateral issues like defence trade and mandate India-US relations will move to a higher trajectory when commerce are important areas of cooperation and have made a new US administration assumes office in January 2017. The joint remarkable progress during the past two years. vision statement lays out a clear road map for bringing matters to Beginning with the newly elected Modi s first extraordinarily fruition over the long term and in the past two years various bilatsuccessful visit to the United States in September 2014 that re- eral meetings have been held between stakeholders to revitalise energised the strategic partnership between the two countries the existing partnership and find new areas for collaboration and and set the stage for a re-set of Indo-US relations there has been mutual benefit. no looking back. During that Summit meeting the two leaders Defence and Dtti endorsed the first Vision Statement for the Strategic Partnership as a guide to strengthen and deepen cooperation in every sector Defence relations have made impressive gains with the US emergfor the benefit of global stability and people s livelihoods over the ing as India s largest weapons supplier overtaking Russia Israel and next ten years. They also reiterated their commitment to move France. This has so far been mainly through the US foreign military forward together through a new mantra Chalein Saath Saath sales route but both countries are committed to move from a traditional buyer-seller relationship to co-production co-development Forward Together We Go. India does figure high in US strategic calculus and accord- and freer exchange of technology through the Defence Trade and ing to Nicholas Burns In strategic terms there are few countries Technology Initiative (DTTI) first proposed in 2012 by Secretary more important to Washington than India the dominant power in of Defense Leon Panetta who at that time directed his Deputy the Indian Ocean region and with Japan the most important US Secretary of Defense the current Defence Secretary Dr. Ashton partner in Asia seeking to limit Chinese assertiveness in the region. Carter to undertake an initiative to provide increased US senior Economically too Indian and US interests are finding increasing con- level oversight and engagement with India. The aim was clear. vergence between the US search for investment opportunities and To look for ways that would eventually include collaboration in India s need for foreign investments to meet its developmental goals. defence technology transfer trade research co-development and This mutual dependence turned Modi s 2014 visit into one co-production for defence articles and services including the most of the most remarkable visits by an Indian Prime Minister to the advanced and sophisticated technology. TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 3 MoDi aND iNDo-rUSSiaN relatioNS Under the previous government nuclear and defence deals with Russia were only on paper but Putin and Modi have tried to get things back on track by not only agreeing to straighten the loose ends of existing projects but also bring new big items on the table. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 9 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i ndia under Prime Minister summit level meetings with the United aMbaSSaDOr P. StObDan Narendra Modi has found new States France Germany Israel United ways to reboot India s long-standKingdom and most recently Japan at ing friendship with Russia to make it more relevant to chang- each of which defence and security aspects received robust attening times. Bilateral relations with Russia have traditionally tion. This along with Modi s drumming up of foreign investments remained the most critical component of India s strategic calcu- for his Make in India initiative would have made the Russians lus since the Soviet era. The equation remains relevant even today worried about actually losing an established market. due to India s heavy dependence on weapons supplies from Russia While Russia though suffering Western economic sanctions even though the spirit of old bonds has undergone a rapid change and lower oil prices is showing remarkable resilience bombing in more ways than one. ISIS in Syria and standing firm in disputes with Turkey standing up A year ago Indo-Russian relations were bit frosty the Russians to the West and rebounding on the world stage. complaining that the United States had become India s main arms Modi has so far eschewed from siding with the West over any supplier ending the arms blockade to Pakistan in return while the crisis involving be it Ukraine or Syria. This ambiguous stand underIndians were frustrated by Russia s failure to meet delivery sched- lines Russia s significance in India s geostrategic calculus a position ules raising costs and failure to transfer technology and spares. that no other power can replace and a circumstance that is not Under Manmohan Singh nuclear and defence deals with likely to be altered any time soon. Russia were only on paper but President Vladimir Putin and Modi India has escaped the ramifications of its policy however have tried get things back on track by not only agreeing to straighten Russia s pivot to Asia has so far only boosted China. Similarly in the loose ends of existing projects but also bring new big items on the face of Western sanctions Putin could turn to the old-trusted the table. friend India as a fast-growing outlet for exports benefiting from Modi s Make in India drive to regain market share even as the rebuilding Confidence United States pushes several big-ticket items for co-production and During the 16th Annual India-Russia Summit held in Moscow on co-development in India. December 23-24 2015 Modi and Putin displayed full confidence Last year Modi hinted that Russia had been unable to respond to take the partnership to a higher level and concluded 16 pacts to the Make in India call. Now Moscow is diversifying its economy which included those on building additional nuclear reactors and and seeking high-value-added products markets with more posmanufacturing military hardware in India with the involvement of sibilities in food production agriculture metals chemical and Indian firms. In fact Modi has put his flagship Make in India ini- textile products. tiative at the centre-stage of India-Russia strategic relationship. In Overhauling Military-technical Cooperation many ways the deals signed could well bring back Russia as India s Military-technical cooperation remains the lynchpin of the partnertop military hardware supplier. Significantly Prime Minister Modi rejected any slide in India- ship but this relationship had lately become only transactional. As Russia relationship and told President Vladimir Putin that India other vendors join the Indian arms market global competitiveness increasingly had threatened even the buyer-seller relationship. sees the country as a reliable friend . Moreover for Modi the negotiations with the West to advance Significantly Modi visited Moscow after concluding a string of TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 4 CHiNa S Military CoMMaND aND CoNtrol a root aND braNCH overHaUl The PLA has been focusing on strengthening the study of command theories training of command skills and situation-handling drills to enhance actual command capabilities. Wikipedia t Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 13 REGIONAL BALANCE he refurbishment of China s milDr MOnika itary strategy to meet the missions and strategic tasks of the Chinese armed forces extends to its existing command and control system which remains firmly under the authority residing with the Chairman of the Central Military Commission (CMC). During his visit to Chinese military s new Joint Battle Command Centre in April 2016 in the Beijing facility of real-time operational data Xi Jinping was repeatedly referred to as the People s Liberation Army s (PLA) commander-in-chief of joint operations -- a title last used between 1949-54 by Zhu De the radical general under Chairman Mao Zedong who served largely in honorary roles including being Vice Chairman of the National Defence Council and the Central People s Government Council (1949-54). Interestingly even Mao was not addressed as commander-in-chief A retired PLA Major General Xu Guangyu . states that the title of commander-in-chief has a different function from his post as CMC Chairman in that ...the CMC is responsible for the PLA s management and defence building while the joint battle command centre focuses on combat and relevant strategies. The inauguration of this joint command centre showcased the sophisticated technology with commanders from the newly regrouped Eastern Theatre Command Southern Theatre Command Western Theatre Command Northern Theatre Command and Central Theatre Command in February 2016 giving reports about their combat forces to Xi Jinping via video links. Xi urged that the joint battle command centres both at the CMC and theatre command levels must focus on their core function of operation command to build an integrated and effective command system stressing that ...the current situation requires battle command to be highly strategic coordinated timely professional and accurate. The PLA has been focusing on strengthening the study of command theories training of command skills and situationhandling drills to enhance actual command capabilities. Besides also being highlighted is the dominance of the ground forces in the PLA coming to an end with the elevation of the profile and role of the PLA Navy Air Force and Strategic Rocket Force as they gear up CHanSOria to prepare and fight the 21st century battles. Formerly controlled by the Army-dominated General Staff Department the PLA s Army Air Force Navy and Strategic Rocket Force now report directly to the CMC -- signalling centralised decision-making under CMC Chairman Xi Jinping. China has an extensive network of hardened underground shelters and command and control (C2) facilities for both its military and civilian leadership. China undertook significant efforts to modernise and improve its command control communications computers and intelligence (C4I) infrastructure ever since C4I modernisation and automation became a top Chinese priority since the nation unleashed major military reforms in 1979. Resultantly a command automation data network that was capable of rapidly passing operational orders down the chain of command and moving information to national and theatre level decision makers was put in place. That said the command automation data network cannot be termed as fully capable of controlling or directing military forces in a sophisticated complex joint operating environment as per western standards that meet the demands of the modern battlefield -- something that has become a priority area to be addressed for the PLA. According to many sources including reports on China s military developments by the US Pentagon the command automation data network is capable of supporting PLA peacetime operations within China s borders along with supporting limited pre-planned conventional attack options along China s immediate periphery. The PLA is making progress in modernising its C4I systems completing an automated command and control system developing a new type of general field communications system and disseminating new general signal regulations with an emphasis on modernisation of the command automation systems which previously were reportedly used for divisional and regimental training. A group army conducting battlefield exercises in the current context can use an advanced-level automation system that integrates field command operational simulation and computer plotting. As per the new system the group army is capable to transmit documents Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 5 tHe CUrreNt SitUatioN iN WeSt aSia aND itS iMPliCatioNS The wars in Syria and Yemen are essentially proxy wars between Saudi Arabia and Iran for regional supremacy. The consequent rise of extremist radical militant Islam typified by the spectacular emergence of the Islamic State in June 2014 is spreading mayhem even outside West Asia. UN Photo www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 17 REGIONAL BALANCE The war against the Assad regime had nothing to do with democracy which all Arab rulers deny their subjects or even political reform and everything to do with regional power politics and balance of power. An internal North Atlantic Treaty Organisation (NATO) draft report entitled Regional and Global Implications of the Syrian Civil War What Role for NATO (August 2014) had characterised the war thus The struggle for the future of the Middle East is being played out in Syria. The Syrian conflict has transformed over the last four years from a local to a regional to a global conflict. It was only briefly a civil war because as the report says It is believed that there are as many as 1 200 armed opposition groups in Syria with well over 1 00 000 fighters....The considerable influx of foreign fighters has significantly altered the character of the rebel forces.... The report acknowledges that these fighters are being armed funded and trained by foreign countries in particular Qatar Saudi Arabia and Turkey as well as by the United States and its Western allies. The only truly substantive reason for this blatant intervention was that Syria under President Hafez Al Assad had forged a steadily strengthening alliance with Iran after the Islamic Revolution Abbreviations at the end of the yearbook Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE the War in Syria BUSINESS S ince the wave of revolutionary fervour ranjit and popular demonstrations against autocratic regimes swept through the Arab world from the winter of 2010-11 the situation in West Asia has steadily deteriorated and the region is today undergoing its worst ever period in its long conflict-infused blood-soaked history. Foreign interventions have been a principal contributory factor growing sectarian feuding is ripping apart the already highly delicate social fabrics. The Saudi-Iran stand-off has never been as bitter and hostile as today. The wars in Syria and Yemen are essentially proxy wars between Saudi Arabia and Iran for regional supremacy. The consequent rise of extremist radical militant Islam typified by the spectacular emergence of the Islamic State in June 2014 is spreading mayhem even outside West Asia. GUPta in 1979 and thereafter under current President Bashar Al Assad his son and successor strengthened it further and also continued the strategic alliance forged with Russia during the Soviet era. Assad s biggest crime is that Syria became the main conduit of the ingress and spread of Iranian presence and influence in Lebanon through their joint creation of Hezbollah and great support to and influence over Hamas. Therefore Assad had to be removed and replaced by Sunni Islamist rule since 75 per cent of Syria s population is Sunni. Under the Assad s regime Syria has been ruled as a secular state. By the end of 2014 Assad s hold was restricted to the western third of Syria mainly in and around Damascus Hama Homs Latakia and the coastal region. It is possible to conjecture that the war in Syria could have led to Assad being overthrown had the United States intervened directly. President Barack Obama had declared in 2012 that if the redline of using chemical weapons was crossed the US would intervene militarily this happened on August 21 2013 but after some very robust rhetoric Obama referred the question of intervention to the Congress which declined to endorse the idea with national opinion polls also being overwhelmingly against the US entering another war in a Muslim Arab country with the UK Parliament also declining there was no Western military response. A Russian diplomatic initiative thereafter resulted in the peaceful dismantling of Syria s chemical weapons programme -- a clear indicator that supposedly difficult and intractable problems can be resolved peacefully as even more spectacularly demonstrated by the subsequent nuclear deal between the P5 1 and Iran. Inevitably Iran got militarily involved to protect the Assad regime initially with supply of weapons military advisors oil and funds once it was clear that there would be no US intervention Iranian involvement increased exponentially with Hezbollah fighters from Lebanon and Shia militias from Iraq openly participating in increasingly large numbers Iran s supporting role has been vital. Finally in end September 2015 Russia got heavily militarily involved in Syria the first ever direct Russian combat involvement in West TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 6 PakiStaN a FraGile Polity aND a DySFUNCtioNal State In Pakistan s chequered history during the brief interregnums from military rule while elected governments were allowed to function and had adequate leeway to run the affairs of the state on key foreign policy and internal security issues the military has never brooked interference. Pakistan s policy towards India is dictated by the military the budget the military seeks for itself is non-negotiable and it exercises total control over Pakistan s nuclear arsenal. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 21 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS a n analysis of politiingly riven by terror strikes which MajOr GeneraL DHrUV C. katOCH (retD) cal developments included attacks on high profile in Pakistan since military targets such as the August the beginning of this year point to increasing schisms 2008 attack on main arms factory in Wah near Islamabad and the between Pakistan s ruling party and its military. The attack on PNS Mehran in 2011. Also in May 2011 Osama bin Laden dominance of the military in the affairs of Pakistan has was killed in Abbottabad by a team of US Navy Seals which led to a been the new normal for decades despite brief attempts by the tremendous loss of face for the Pakistan military establishment. It elected governments as and when elections were held to assert was under such an environment that Pakistan s civil society and its their authority. The 2007 Adiya Bachao Tehreek (Save the Judiciary political establishment made a push for greater space in running Movement) which started as a pushback against President Pervez the affairs of state. The Army however struck back at the governMusharraf when he suspended the Chief Justice of Pakistan was ment through the Memo-gate Affair Barely a week after the killing . an inflection point in Pakistan s history. The movement metamor- of Osama bin Laden Pakistan s Ambassador to the US Hussain phosed into the Lawyers Movement with protests erupting all over Haqqani was accused of sending a message to the US establishment the country. This was a particularly bad time for the military as it at the behest of President Zardari informing them that the Pakistan also had to deal with a fundamentalist backlash post the storming military intended to stage a coup to wash off the embarrassment of the Lal Masjid in July 2007. President Musharraf was forced to caused by the successful US raid in Abbottabad to eliminate bin reinstate the Chief Justice but the Lawyers Movement continued Laden. The memo also spoke of a unique window of opportunity unabated forcing Musharraf to call for general elections. With the for the civilian government in Pakistan to gain the upper hand due Pakistan People s Party (PPP) winning the 2008 elections under the to the military s complicity in the bin Laden affair. While Haqqani leadership of Benazir Bhutto s husband Asif Ali Zardari civilian rule denied the memo and promptly resigned President Zardari was in a was once again restored in Pakistan. Or was it tight spot with charges of treason hanging in the air. His government Zardari was cautious in dealing with the military being fully cog- thereafter remained a lame duck affair till the completion of its term nisant of where the real centre of power lay. In Pakistan s chequered in May 2013. Did the Pakistani deep state have a hand in the whole history during the brief interregnums from military rule while murky affair One wonders elected governments were allowed to function and had adequate The elections held thereafter marked another turning point in leeway to run the affairs of the state on key foreign policy and Pakistan s political history. Nawaz Sharif s Pakistan Muslim League internal security issues the military has never brooked interference. (PML)(N) won the elections which marked the first civilian transfer Pakistan s policy towards India is dictated by the military the budget of power following the successful completion of a five-year term by the military seeks for itself is non-negotiable and it exercises total a democratically elected government. Many commentators thought control over Pakistan s nuclear arsenal. In this backdrop President that this represented a shift in Pakistan s politics and henceforth the Zardari maintained a fine balance keeping the military in good elected governments would become increasingly assertive and the humour. However post the Lawyers Movement there was for the sphere of influence of the military would consequently reduce. Such first time popular discontent against the army which was seen as views were however fanciful and not based on hard ground realities. ineffective in handling internal security issues. Pakistan was increas- The military was prepared to cede some ground to the civil govern- TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 7 UN Photo Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 25 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS o n July 12 2016 a tribunal at the United abHijit Nations Permanent Court of Arbitration (PCA) passed a verdict that could have a critical impact on the emerging maritime order in Asia. Adjudicating on a case brought by the Philippines the judges ruled that China s historic claims within the Nine-dash Line in the South China Sea (SCS) were invalid and that its maritime agencies had violated Philippines lawful rights to exploit resources in the exclusive economic zone (EEZ). Taken aback by the severity of the judgement China s political establishment lashed out at the Tribunal rejecting its findings as null and void with no binding force The Chinese Foreign Ministry . promptly issued a statement that Beijing neither accepted nor recognised the ruling of a Tribunal which was set-up at the behest of the Philippines. Chinese leaders should have known better. In the run-up to the verdict it was evident that the Tribunal was going to rule in Manila s favour. Having challenged China s maritime claims to most of the contested waterways in 2013 Philippines had fought a smart courtroom battle. Manila realised early on that it needed to be careful in invoking the provisions of the United Nations Convention on the Law of the Sea (UNCLOS) that allows for compulsory arbitration but forbids the settling of territorial disputes. The Philippines legal team therefore dressed up its complaint in a way that it did not seem like a territorial dispute at all. As it questioned the legal validity of China s Nine-dash Line in the South China Sea Manila framed its petition to seek a clarification from the court if a state s rights and obligations in the waters seabed and maritime features of the SCS could be demarcated by something as arbitrary as a hand-drawn line on a chart. Simply put Manila asserted that China s maritime map of the SCS was of dubious provenance and claims arising from it were an outright violation of the law. But Philippines was careful not to raise any territorial issues in its submissions. In many meetings before the actual hearings began the Philippines legal team convinced the SinGH Court that it was well within its right to adjudicate on the matter. The reason however why most people expected Philippines to emerge on the winning side was China s refusal to participate in the legal proceedings. Beijing s first reaction had been to not take cognisance of the matter at all -- as if not acknowledging the case would effectively delegitimise it. Given the high level of international interest in the affair however China was forced to come out with a position paper in December 2014 clarifying its official stance on the issue. Unfortunately for Beijing its contention that Manila had violated the UNCLOS by filing a petition on a matter of territoriality was found to be devoid of merit. In its arguments Beijing made a number of errors of judgement that hurt its cause. Firstly China s stand that it was beyond the Tribunal s mandate to interpret the application of the convention failed to make an impact. Unimpressed by Beijing s arguments at a hearing in July 2015 the judges pointed out that Philippines claim related not to territorial sovereignty but physical geography of the South China Sea. Since Manila was only seeking a clarification on the legal status of disputed features in the SCS as islands rocks or low tide elevations the issue at stake was not their ownership but the interpretation and application of UNCLOS s Article 121(3) in determining the entitlement of territorial waters or EEZ which seemed well within the court s remit. Beijing also tried to link the case with its invocation of Article 298 in 2006 when Beijing voluntarily opted out of compulsory arbitration under the UNCLOS. This betrayed desperation on the part of Chinese lawyers to defend a seemingly indefensible position. The opt-out clause as detailed in Article 298 applies only to certain categories of disputes -- those involving a disagreement over maritime boundaries (as described in Articles 15 74 and 83) and on matters of military activity in EEZs. The Philippines submission concerned neither subset. Yet few anticipated a ruling as definitive and one-sided as it ultimately came to be. The Tribunal ruled in favour of the TECHNOLOGY As it questioned the legal validity of China s Nine-dash Line in the South China Sea (SCS) Manila framed its petition to seek a clarification from the court if a state s rights and obligations in the waters seabed and maritime features of the SCS could be demarcated by something as arbitrary as a hand-drawn line on a chart. CONCEPTS & PERSPECTIVES tHe UN tribUNal S SoUtH CHiNa Sea verDiCt -- iMPliCatioNS For reGioNal SeCUrity WEAPONS EQUIPMENT VEHICLES CONTENTS 8 reDUCiNG Flab iN iNDia S DeFeNCe orGaNiSatioN In one of the best (and rare) articulation of global regional and national strategic environment and politicomilitary advice the Prime Minister exhorted the Defence Minister and military commanders to promote jointness across every level shorten the tooth-to-tail ratio and re-examine assumptions that keep massive funds locked up in defence organisations and inventories . budgetary Constraints There is no doubt that budgetary constraints are the primary reason for ordering this Committee. As a percentage of the GDP the defence budget has been decreasing over the last decade. This year there was an increase of 1.16 per cent on the basis of budget estimate of FY 2015-16. But when calculated against the revised estimates ( 18 295 crore was surrendered by the Ministry of Defence) it works to an increase of 9 per cent. This allocation does not cover inflation rate fall in the value of the rupee against dollar and sharply increasing cost of weapons and equipment all over the world. Due to One Rank One Pension scheme the pension bill hereafter will increase substantially. With the implementation of the Seventh Pay Commission recommendations salaries allowances and establishment charges of all civil and military personnel paid from the defence budget will also shoot up. Recently Defence Secretary G. Mohan Kumar admitted to the Standing Committee of the Parliament on Defence that India s military spending for FY 2016-17 is not as per the requirements of the services. Unless the government hikes the defence budget which seems very unlikely these days the Ministry of Defence will face a serious resource crunch to make up its huge deficiencies of weapons equipment and ammunition. Any force modernisation will thus remain only a dream. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 29 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS a few months ago India s Defence GeneraL V.P. Minister Manohar Parrikar set up a 12-member committee headed by Lt General D.B. Shekatkar (Retd) to suggest structural changes in the Army IAF and the Navy on cutting down of flab and reducing revenue [maintenance] expenditure. Its recommendations are to entail doing away with posts that may have become redundant due to technology and to ensure that addition of new equipment [modernisation] does not mean a corresponding rise in the personnel strength of the forces. Manohar Parrikar has two important reasons in ordering this study. One the ever increasing revenue expenditure on manpower which leaves less than 20 per cent of the defence budget for the modernisation of weapons and equipment required by the armed forces. Two Prime Minister Narendra Modi in his address at the Combined Commanders Conference in December 2015 had conveyed At a time when major powers are reducing their forces and rely more on technology we are still constantly seeking to expand the size of our forces. Modernisation and expansion of forces at the same time is a difficult and unnecessary goal. In one of the best (and rare) articulation of global regional and national strategic environment and politico-military advice the Prime Minister exhorted the Defence Minister and military commanders to promote jointness across every level shorten the tooth to-tail ratio and re-examine assumptions that keep massive funds locked up in defence organisations and inventories He observed . correctly that downsizing of the Ministry of Defence including every organisation under it will save considerable resources. The Prime Minister was justified in raising the flab issue in the presence of the Defence Minister and military commanders. But this audience was only a part of the full audience which has to be involved to obtain fully productive results in this exercise. All organisations which are paid from the defence budget should be included in the flab reduction exercise because it is incumbent MaLik (retD) on the defence authorities to ensure that the allocated defence budget is utilised prudently and every military as well as non-military effort is made to affect savings. As the stated terms of reference to the Shekatkar Committee did not clarify this aspect I made this point (regarding inclusion of nonmilitary organisations in the flab reduction exercise) in a private conversation to Lt General Shekatkar before he started doing this work. He informed me that he had already discussed this aspect with the Defence Minister and that he will be doing this exercise not only within the armed forces but for all organisations in the Ministry of Defence. TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 9 MaritiMe CaPaCity bUilDiNG aND iNDia S iMPerativeS An aircraft carrier is under construction in Kochi and Indian shipyards are said to be executing orders for 50 odd warships and submarines. Possibly there are few countries in the world today with such an ambitious warshipbuilding programme. Indian Navy india s Maritime Past Today when an Indian looks seawards he sees his country as a huge peninsula jutting a thousand kilometres into an ocean named after it. With a long coastline containing 200 major and minor ports ten million gross registered tonnage (GRT) of merchant shipping a huge exclusive economic zone (EEZ) and a seafaring community whose number exceeds the total population of many European nations he sees maritime growth as imperative for securing his country s vital interests. Also a historical fact that rankles in his mind is that invaders who came across the Himalayan passes stayed on to be assimilated into our culture and society but those who arrived on our shores by sea came to conquer plunder and exploit. A maritime tradition can only survive on a sound shipbuilding industry and here we need to remind ourselves that we are the proud inheritors of the world s oldest dry-dock built during the Abbreviations at the end of the yearbook Constituents of the Maritime Domain Very few historians or strategists including Admiral Mahan have attempted a precise definition of sea power preferring to provide historical examples and commentaries instead. Surprisingly it is Soviet Admiral Sergei Gorshkov who provides a good umbrella definition when he says that Sea power emerges as one of the most important factors for accelerating the nation s technical and industrial development and consolidating the economy. He spells out www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 31 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i n the 1890s it took the persuaaDMiraL arUn sion of Admiral Alfred Thayer Mahan s powerful writings to convince his countrymen that the United States was actually a sea power. A hundred years later a similar transformation has been brought about in India by the equally powerful phenomenon of globalisation because international trade at the heart of globalisation is carried overwhelmingly by sea and so is energy the lifeblood of industry. This realisation has brought India s maritime domain into sharp focus. The financial commitments made by the Government of India to the navy s acquisition programmes are a clear acknowledgment of the importance accorded to maritime power. A nuclear attack submarine was inducted a few months ago while a ballisticmissile boat awaits commissioning with more to follow. An aircraft carrier is under construction in Kochi and Indian shipyards are said to be executing orders for 50 odd warships and submarines. Possibly there are few countries in the world today with such an ambitious warship-building programme. PrakaSH (retD) Harappan period circa 2400 BC in Lothal Gujarat. While the ancient indigenous dhow-building tradition of our west coast ensured that Indian hulls were ubiquitous in eastern waters seven generations of the Wadia family of mastershipbuilders constructed superb merchant ships for the East India Company and warships for the Royal Navy with stout Malabar teak. In independent India the seeds of a self-reliant blue water navy were laid almost half a century ago when the government was persuaded by the navy to pursue indigenous warship production. In the face of great skepticism both at home and abroad Mazagon Dock delivered the first Leander class frigate INS Nilgiri in 1972. Our ingenious naval architects took over from there and went on to stretch broaden re-design and re-arm this hull-form and to give us 11 more ships ending with the unique Brahmaputra class. We have come a long way since then and today when an Indian warship sails into a foreign port it is seen with admiration not unmixed with surprise that Indian industry is capable of such sophistication. Here we were fortunate in having a far-sighted naval leadership because no nation has ever become a maritime power by importing naval hardware from abroad. Competent warship-building shipyards are the sine qua non for achieving ascendancy at sea. Encouraging the shipbuilding industry is a matter of vital national interest because it can not only deliver warships submarines and merchantmen but also have a hugely beneficial impact on the country s manufacturing sector and industrial outlook. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 10 SPeCial ForCeS Special Forces are being used strategically world over to further national interests of their countries. Their employment is actually extension of foreign policy of the concerned country. Wikipedia t Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 35 REGIONAL BALANCE he surgical strike by the Lt GeneraL P.C. Indian Special Forces in the Pakistan-occupied Kashmir (PoK) on September 28 2016 once again brought the subject of Special Forces into focus. Media s love for Special Forces shoots up after every major terror attack or incidents like the US raid to kill Osama bin Laden or say our last raid along the Myanmar border. So this time also the very same sets of questions were brought up by many channels including whether our boys can execute the Abbottabad-type of raid These issues are brought up because people do not understand the requirement acquisition and buildup of intelligence and the time it takes mechanics of a raid and suppression of the opponents air defences etc. The more enterprising channels wanted to know details of all types of weaponry and equipment our Special Forces hold. Some having heard Special Forces had been employed talked of paradropping combat free-fall and even helicopters landing across the line of control (LoC) albeit these surgical strikes were just about three kilometres across the LoC and being on foot could have been executed by regular infantry as well. Pakistan denied any strikes had taken place and Indian opposition parties too cried hoarse for photographic proof to be produced but the Superintendent of Police of Mirpur in Pakistan when contacted by a media house on telephone posing as his IG revealed that multiple surgical strikes by India indeed had taken place and in his location alone five Pakistani army men and number of terrorists had been killed and while he did not know how many terrorists were killed and injured some 12 bodies were taken away in vehicles. Special Forces are being used strategically world over to further national interests of their countries. Their employment is actually extension of foreign policy of the concerned country. Leading nations employing Special Forces proactively trans-frontiers are perhaps the United States Russia UK and Israel. US Special Forces (USSF) are operating in over 100 countries. This is in addition to almost all diplomatic missions in foreign countries having USSF presence. Since China has already positioned PLA troops in her development projects globally including Pakistan PoK katOCH (retD) Nepal Myanmar Bangladesh Sri Lanka Seychelles and other countries in garb of workers and technicians of the projects we can safely assume that a sizeable numbers may be Chinese Special Forces. Pakistan has employed the Special Services Group (SSG) actively in Afghanistan J&K Nepal and Bangladesh and is forging links with extremist terrorist organisations in India. india-China-Pakistan Strategic asymmetry The four broad divisions in the spectrum of conflict comprise the nuclear conventional subconventional and cyberspace. China has advanced capabilities in all four divisions. As for cyberspace India and Pakistan are still taking initial steps. But what should be of serious concern to us is that while both China and Pakistan are employing proactive subconventional capabilities we are drastically lagging behind in this sphere. Hybrid warfare which blends conventional warfare irregular warfare cyber warfare and electronic warfare is the order of the day and will continue to be the form in the foreseeable future. While hybrid war will see multi-domain conflict in the aerospace land sea electromagnetic and cyber domains asymmetric wars will be routine affairs and states will continue to employ high-tech irregular forces. China s unrestricted warfare is advanced example of hybrid war employing one military means encompassing the atomic conventional biochemical ecological space electronic guerrilla and terrorism two trans-military means encompassing the diplomatic networks intelligence psychological smuggling drugs and virtual and three non-military means encompassing financial trade resources economic aid regulatory sanctions media and ideological. We have been talking of China-Pakistan dual threat since the last decade. But the China-Pakistan subconventional nexus dates back to the 1960s when Chou En-lai suggested to Ayub Khan that Get yoUr CoPy to reaD iN CoMPlete China-Pakistan Subconventional nexus ASIAN WHO S WHO INDIAN DEFENCE War in 21st Century BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 11 aSyMMetriC aND UNCoNveNtioNal WarFare oN tHe SUbCoNtiNeNt Asymmetric war relates to the asymmetry between two opposing forces while unconventional warfare is a subset of asymmetric war. What we are witnessing today is use of irregular forces whose strategic importance is overshadowing conventional and even nuclear forces. Indian Army Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 39 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS a symmetric and unconvenLt GeneraL P.C. tional wars have been raging in the subcontinent over the past three decades with China and Pakistan aligned against India to destabilise us and stem our economic growth. Pakistan being the nerve centre of global and subcontinental terrorism is encouraged by China while US makes perfunctory noises. The Pakistani military-Inter-Services Intelligence (ISI) holds their country to ransom with foreign and defence policies scripted and executed by their army chief. All this while Pakistan s industry of exporting terror runs unabated institutionalised by her military. A sample of all this was on display in the subcontinent during June-July 2016. While Pakistan sponsored terrorist attacks continued in Jammu and Kashmir (J&K) and a Central Reserve Police Force (CRPF) convoy was targeted at Pampore China s cyber group attacked Indian Government and commercial organisations defence establishments being the main targets through China s Advanced Persistent Threat (APT) group Suckfly. In another incident some 250 People s Liberation Army (PLA) soldiers entered Yangste East Kameng district of Arunachal Pradesh on June 9 and engaged in a mild scuffle with Indian troops. In July seven Bangladeshi terrorists attacked the Holey Artisan Bakery-cum-caf close to the diplomatic enclave of Dhaka taking hostages and killing two police officers. Bangladesh s army commandos stormed the scene next morning killing six terrorists capturing one terrorist alive and rescuing 13 hostages. Overall 28 people were killed -- six terrorists four Bangladeshis and 18 foreigners including one Indian. Some 50 others were also reported injured -- mostly police personnel. The terrorists who had been missing from Bangladesh for the past few months are suspected to have been trained in Pakistan. Their radicalisation is also attributed to the speeches of Muslim cleric from India namely Zakir Naik whose NGO in Mumbai has now been banned in India. Bangladesh asked India to probe Zakir Naik and threatened to take Pakistan to the UN once ISI links were fully established. Significantly Afghanistan too katOCH (retD) gave a call recently to take Pakistan to the UN for terrorist acts. asymmetric and Unconventional War Asymmetric war relates to the asymmetry between two opposing forces. Since broad divisions of the conflict spectrum are the nuclear conventional subconventional and cyberspace this asymmetry can be in terms of technology (weapon systems information dominance cyber prowess mastery of space and electromagnetic domain etc) and concurrently transcending into strategies and tactics of unconventional warfare that manifests in guerrilla warfare insurgency terrorism proxy warfare etc. Unconventional warfare is actually a subset of asymmetric war. What we are witnessing today is use of irregular forces whose strategic importance is overshadowing conventional and even nuclear forces. The last war between two conventional forces was fought in 2008 between Russia and Georgia after which we have seen even US and NATO (North Atlantic Treaty Organisation) battling irregular forces. During the Cold War the two superpowers (US and USSR) indulged in serious arms race fearing asymmetry in weapon systems but eventually balanced out with weapons of mass destruction (WMDs) that spelt mutually assured destruction. Because of the India-Pakistan conventional asymmetry being in India s favour right from her CENTO (Central Treaty Organisation) membership days Pakistan was advised by the US not to wage war against India but more significant was Chinese advice to Pakistan in the early 1960s described in the book From a Head through a Head to a Head -- The Secret Channel between US and China through Pakistan authored by F.S. Aijazuddin that said Chou En-lai suggested to Ayub Khan that Pakistan should prepare for prolonged conflict with India instead of short-term wars. He advised Pakistan to raise a militia force to act behind enemy (India) lines That was . the very basis for Pakistan to raise jihadi forces against India and subject India to continuous terror. A deliberate terror network was built pan India apparent from the book Open Secrets -- India s TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 12 arMy aviatioN tUrNS 30 -- a reality CHeCk The Cheetah Chetak replacement programme continues to flounder despite the government-to-government agreement between India and Russia for the supply of 200 Kamov Ka-226T light helicopters under the Make in India policy. Rostec.ru Abbreviations at the end of the yearbook Cheetah Chetak replacement Programme The Cheetah Chetak replacement programme continues to flounder despite the government-to-government agreement between India and Russia for the supply of 200 Kamov 226T light helicopters under the Make in India policy. Presently there is no clarity on as to how this project will move forward and both sides seem to be struggling to meet the challenging requirement of building 50 per cent of the helicopters in India. While the HAL has been designated as the nodal agency for this critical programme along www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 43 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS o n November 1 2016 the Lt GeneraL b.S. Army Aviation Corps will complete 30 years of its existence since its formation on November 1 1986. However at the end of these 30 years it continues to fly the outdated and vintage fleet of Cheetah Chetak helicopters is faced with a muddled and confused government policy on ownership of attack helicopters and has seen no progress on the acquisition plans for the tactical battle support helicopters (10 12-tonne class) to enhance tactical lift capability and for special operations. On the plus side it has inducted the largest number of the Hindustan Aeronautics Limited (HAL)-built advanced light helicopters (ALH Dhruv) -- approximately 70 Dhruvs are operational with the Army Aviation and two units of the armed version of the Dhruv called the Rudra are presently under various stages of raising. However the critical issue of the Cheetah Chetak helicopters replacement is still a far cry notwithstanding the hype of the government-to-government deal with Russia with regards to the Ka-226T helicopter which at best would be available in a time frame of three to four years provided everything proceeds as planned. The non-availability of this crucial platform in adequate numbers in the next three to four years is going to seriously impact on the army s high altitude operations and has very serious consequences for national security -- this affect is already being felt as the Cheetah helicopters are the lifeline of troops deployed on the Siachen Glacier. PaWar (retD) with Russian Helicopters (part of stateowned technology cooperation Rostec) there are a number of complex issues involved which need to be addressed in order to move ahead. The recent statement of the Russian Helicopters about their working with HAL to iron out the various contentious issues and that the signing of the contract is likely by year end is a positive development but its manifestation into realty seems a distant dream at present. The complexities involved in this project are far too many and one will have to wait and watch as to how these will be addressed and resolved eventually. Given the track record of other such crucial government-to-government deals like the Indian Army s M777 howitzer programme and the Indian Air Force s medium multi-role combat aircraft (MMRCA) Rafale project which took a period of a few years to be concluded the prospect of concluding a contract for the Ka-226T project by end of the year does not inspire much confidence. The Ka-226T helicopter however is a suitable platform for replacement of the Cheetah Chetak fleet and has been put through the complete trial process in India along with Airbus Helicopter s Fennec AS550 C3 in 2013-14. Both helicopters had met all the desired operational parameters. The main issue in the Ka-226T deal is the overall composition of the helicopter in terms of various components and systems. Russian Helicopters which has developed the Kamov 226T has sourced its twin engines (Arrius 2G1 which constitutes almost onethird of the chopper s cost) from the French company Turbomeca (Safran Helicopter Engines). Other key systems and avionics have been sourced from some other companies in the global market. As per reports the Russian Government has accepted responsibility only for indigenising Russian components a step which would result in a shortfall of the indigenisation levels required as per the Make in India policy. This also means that HAL as the nodal agency on behalf of the Indian Government will have to negotiate separately with third country vendors for indigenising their components and systems especially the engines. There has however TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 13 blUe eCoNoMy aND CHiNa eCoNoMiC WealtH aND StrateGiC aDvaNtaGeS China is drawing enormous advantages through development of Blue Economy and exploring strategic vistas in the Indian Ocean. FOCAC o Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 47 REGIONAL BALANCE ceans have shaped international Dr Vijay relations and figured prominently in statecraft through a variety of geopolitical geostrategic geo-economic engagements with other nations. Also since ancient times maritime commerce has had a fair share of competition and rivalries driven by a number of factors such as control over commodities and protection of trading routes which resulted in struggle for economic and strategic maritime supremacy. This led to trade-related wars and build up of navies was a significant manifestation to protect national interests but also to counter piracy. At another level the use of the oceans has diversified from the classic medium of transport to as an important source for resources. The economic richness of the oceans is represented by the variety of living (fish and marine vegetation provide human protein requirements) and non-living resources (hydrocarbons and renewable sources such as wind wave tidal thermal and biomass) that it offers for exploitation. This has led to the development of a number of industries such as fishery shipbuilding shipping ports tourism energy pharmaceuticals etc. Further nearly 60 per cent of the global population lives within 100 kilometres of the coastline and draw their livelihoods from these industries. In the 21st century the above maritime discourse has expanded and a number of issues including environment and ecology have found reference. In 2015 the global community announced its commitment to Sustainable Development Goals 2030 and Goal 14 relates to sustainable development of the ocean resources. Simultaneously several states particularly the maritime states have endorsed the concept of Blue Economy which is currently resonating in the United Nations multilateral institutions and national policy articulations. In this context this paper attempts to introduce Blue Economy. The paper highlights that China is drawing enormous advantages through development of Blue Economy and exploring strategic vistas in the Indian Ocean. SakHUja blue economy narrative Gunter Pauli an entrepreneur and an innovator authored a book The Blue Economy 10 Years 100 Innovations 100 Million Jobs aimed at stimulating entrepreneurship based on sustainability and health of the environment. He argued that humans should judiciously use the resources keeping in mind the social and environmental consequences and any waste should be converted into a resource. Further the focus should shift from identifying the problems to finding solutions. In 2012 during the United Nations Conference on Sustainable Development (UNCSD) in Rio de Janeiro (also called as Rio 20 ) the concept of Green Economy for sustainable development and poverty eradication was promoted but the island states questioned the relevance and applicability of Green Economy to them and argued that the world s Oceans and Seas require more in-depth attention and coordinated action. Soon thereafter a number of UN initiatives led by the UN Department of Economic and Social Affairs (DESA) expert group meeting on Oceans Seas and Sustainable Development the Global Ocean Commission the Global Partnership for Oceans and the UN five-year Action Agenda 2012-16 provided the necessary impetus to the concept of Blue Economy. The UN also expanded the mandate of the 1982 United Nations Convention on the Law of the Sea (UNCLOS) and began to address sea spaces beyond national jurisdiction and called for an inter-governmental conference aimed at drafting a legally binding treaty to conserve marine life and govern the mostly lawless high seas beyond national jurisdiction. Blue Economy is currently resonating among a number of countries across the world and finding reference in the action plans for the sustainable development of resources climate change and environment discourses and national plans for enhancing wellbeing and poverty alleviation among the people through job creation have been endorsed. Several countries have announced initiatives and action plans to promote Blue Economy. For instance the European Union Blue Growth strategy aims for sustainable development of marine and maritime sectors to contribute to the Europe 2020 strat- Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 14 Cyber WarFare iN FUtUre CoNFliCtS Just as each country has a unique political system history and culture state-sponsored cyber attacks also have distinctive characteristics which include everything from motivation to target to type of attack. Lockheed Martin C Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 51 REGIONAL BALANCE yberspace has become a (ICTs) in every facet from C4ISTAR Lt GeneraL DaVinDer kUMar (retD) full blown war zone as govinformation management weapon ernments across the globe systems in all domains viz ground clash for Digital Supremacy in a new mostly invisible the- air sea outerspace and cyberspace down to the individual soldier. atre of operations. Once limited to opportunistic criminals A Digitised Battlefield encompasses the whole nation has made cyber attacks are becoming a key weapon for governments national borders irrelevant and where operations are conducted at seeking to defend national sovereignty and project national power. the speed of light. From strategic cyber espionage campaigns such as Moonlight Maze Typically a Digitised Battlefield will be shaped in accordance and Titan Rain to the destructive such as military cyber strikes on with the national doctrine and would remain a work in progress Georgia and Iran human and international conflicts are entering a due to the rapid march of technology and consequent impact on new phase in their long histories. In this shadowy battlefield victories conduct of warfare. It will consist of are fought with bits instead of bullets malware instead of militias and nA well-defined command and control structure with supporting organisation for joint planning and execution. botnets instead of bombs. These covert assaults are largely unseen by the public. Unlike the wars of yesteryear this cyberwar produces no nTechnology Systems Human Resource and Organisation for Surveillance and Reconnaissance. dramatic images of exploding warheads crumbled buildings or fleeing civilians. But the list of casualties -- which already includes some nCommunication networks for secure efficient and fail safe information flow. of the biggest names in technology financial services defence and n Data storage processing management and analysis capability. government -- is growing larger by the day. A cyber attack is best understood not as an end in itself but nInformation Assurance Cryptography and Language expertise. as a potentially powerful means to a wide variety of political nSystem Integration and Large System Integration and military and economic goals. Serious cyber attacks are unlikely nA viable Defence Industrial and R&D base. Digitised Battlefield is central to the concept of Information to be motiveless said Martin Libicki Senior Scientist at RAND Corporation. Countries carry them out to achieve certain ends Warfare (IW) which is the super set of cyber warfare. It demands which tend to reflect their broader strategic goals. The relationship full integration and synthesis of different organs of governance between the means chosen and their goals will look rational and like the armed forces paramilitary forces intelligence agencies transport health media disaster management energy reasonable to them if not necessarily to us. Just as each country has a unique political system history and and so on. Digitisation massive deployment of Information and culture state-sponsored cyber attacks also have distinctive char- Communication Technologies (ICTs) organisation transformation acteristics which include everything from motivation to target to large-scale system integration and human skill development centred around the national doctrine are the essential prerequisites to type of attack. develop capabilities for IW in a digitised battlefield environment. Digitised battlefield of 21st Century These capabilities include C4ISTAR systems digital weapon platIn order to understand the application of cyber warfare in future forms and information management. conflicts it is necessary to understand the battlefield environment Digitised battlefield depends on the degree of integration of the and extrapolate the vulnerabilities which can then be exploited technical components such as through cyber warfare. The 21st century battlefield has large scale nComputer processing data storage and retrieval. deployment of Information and Communication Technologies nAdvance software and hardware. Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 15 DeFeNCe reForMS Urgent restructuring is necessary for cohesive defence planning and efficient national security decision making. ndia is confronted with mulnIn order to integrate defence briGaDier GUrMeet kanWaL (retD) tifarious threats and challenges. planning within the overall ecoDespite the prolonged exposure nomic planning effort defence and that the security establishment has had in dealing with multifari- economic development plans were made coterminus. ous challenges defence planning has been marked by knee-jerk nThe Committee for Defence Planning (CDP) was established under the Cabinet Secretary. reactions to emerging situations and haphazard single-service growth. The absence of a clearly enunciated national security strat- nThe Joint Intelligence Committee (JIC) was constituted in the Cabinet Secretariat to provide external and internal threat egy poor civil-military relations the failure to commit funds for assessments. modernisation on a long-term basis and suboptimal inter-service prioritisation have handicapped defence planning. With projected nPlanning Units were also established in the Department of Defence Production and Defence Research and Development expenditure of 100 billion on military modernisation over the next Organisation (DRDO). 10 years it is now being realised that integrated tri-Service force structures must be configured to meet future threats and challenges. nA Planning and Coordination Cell was created in the MoD to coordinate and compile various plans into a comprehensive early efforts towards Defence reforms Defence Plan for Cabinet approval. However generalist civilFor many years after independence the higher defence organisaian bureaucrats in the MoD lacked the necessary expertise to tion (HDO) handed down by Lord Mountbatten and Lord Ismay arbitrate between the Services and only succeeded in appendhad remained almost completely unchanged. The Sino-Indian ing together the different requirements of individual Services conflict in 1962 had aroused a new defence consciousness in the without any analysis. country after years of neglect and efforts to formalise defence plan- nIn the Services HQ Perspective Planning directorates were established in the late 1970s. ning began in 1964. Various organisational changes were tried out nDefence requirements were assessed on a five-year basis and nIn 1986 the Directorate General of Defence Planning Staff (DG the First Defence Plan (1964-69) was drawn up. DPS) comprising officers from the three Services DRDO MoD nA Planning Cell was established in 1965 in the Ministry of and the Ministry of External Affairs was constituted to coordiDefence (MoD). nate and harmonise defence planning under the Chiefs of Staff nThe Second Defence Plan (1969-74) was instituted on a roll-on Committee (COSC). basis. After a year was completed an additional year was tagged at the other end so that the armed forces would always have a Weaknesses revised and updated five-year plan. This method was found to While efforts have been made to improve defence planning and be impractical. suitable structural changes have been instituted within the MoD nIn 1974 an Apex Group under the Union Minister for Planning implementation of the process continues to be tardy. suggested that a steady long-term defence effort would be more n Guidance. The Cabinet Committee on Security (CCS) chaired by the Prime Minister meets as often as necessary to review emergcost-effective and economical than fluctuating allocations on ing situations with adverse impact on national security so as to account of periodic economic and security crises. issue suitable policy directives. However the National Security Structures for Defence Planning Council (NSC) also chaired by the Prime Minister whose charter Most of the defence planning machinery and planning methodolit is to evolve an integrated national security strategy and provide ogy were developed in the decade 1964-74 guidance for long-term defence planning seldom meets. DRDO i Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 55 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 16 FoUNDatioNal PillarS oF iNDia S StrateGy to ProteCt oFFSHore aSSetS India is using the broad tenets of international law to strengthen its legal framework in protecting its offshore assets. However the paucity of police officials lawyers and judges who are well versed in international maritime law is a major national infirmity that our contemporary strategy must actively address. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 59 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he term offshore Andhra Pradesh and comprise ViCe aDMiraL PraDeeP CHaUHan (retD) assets as used within the PY-1 PY-3 Ravva and KG D-6 the context of the explofields. Future ODAs are likely in ration and production of energy (as opposed to say a the Mahanadi Basin off the coast of Odisha and the Andaman & financial context) incorporates some or all of the follow- Nicobar Islands. However India s strategy for the protection of ing components -- provided they are located-in or are in offshore assets seems to be restricted to hydrocarbon production operation seaward of the coastline alone -- rather than addressing at least those components mennOil and gas facilities including inter alia various types of oil tioned in the opening paragraph. This is a conceptual infirmity that rigs production platforms drilling rigs wellheads underwater is likely to prove costly. pipelines Single Point Moorings (SPMs) and a large variety of India s strategy to protect her offshore assets rests upon three ships craft of varying cost and sophistication. main foundational pillars nMining mineral-extraction facilities. nA legal framework in respect of offshore assets and in particunOcean Thermal Energy Conversion (OTEC) such as wave tidal lar the security of these assets. nAn organisational framework that conceptualises analyses and current energy facilities. nOffshore wind energy conversion facilities. advises and superintends all aspects -- static and dynamic -- of nFacilities for the production of energy from natural artificial offshore security. nAn operational mechanism with requisite capacity as well as offshore biofuel farms. nFacilities for deep-water captive fish-farming. capability so as to plan and execute dissuasive deterrent prenOffshore aids to navigation. ventive curative and punitive security measures. nOffshore industrial installations. nOffshore nuclear power plants. Legal Framework There are two common unifying features of all these variants. The legal framework is underpinned by international treaty law The first is of course the fact that they are assets -- expensive nation- that has been duly signed and ratified by India and several pieces al resources -- that are critical to the nation s economic development of national legislation that are (or ought to be) in conformity with in general and its energy security in particular. The second is that such international treaties and conventions as have been ratified. they are located in one of three main maritime zones of a coastal state The basic international law that underpins the entire gamut of that have been defined by the 1982 UN Convention on the Law of the national legislation pertaining to offshore assets is the UNCLOS. Sea (UNCLOS) -- viz. its territorial sea or its contiguous zone or its India signed UNCLOS on December 10 1982 and Parliament ratified it on June 29 1995. exclusive economic zone (including the continental shelf). There are significant infirmities in India s legal framework that India has two offshore hydrocarbon-producing areas i.e. Offshore Development Areas (ODAs). The western ODA lies off militate against the execution of a coherent maritime strategy to the coasts of Gujarat and Maharashtra and comprises the Mumbai protect our offshore assets. To appreciate these it is essential to High Bassein Panna Mukta Heera Neelam Laxmi Gauri and be clear about two facets of the relationship between national law Tapti oil and gas fields. The eastern ODA lies in the Cauvery and the and international treaty law (duly ratified). The first is that once a Krishna-Godavari basins located off the coasts of Tamil Nadu and nation-state has ratified an international convention or treaty it TECHNOLOGY CONCEPTS & PERSPECTIVES ICG WEAPONS EQUIPMENT VEHICLES CONTENTS 17 tHe iaF -- a StrateGiC air ForCe A modern strategic air force should basically be able to meet the strategic aspirations of the country and hence should be sufficiently enabled to adopt and exploit all the various technologies of the future that the country is likely to embrace. SP Guide Pubns Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 65 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t actics and Strategy air through the multi-role aircraft. air CHieF MarSHaL P.V. naik (retD) two words that have conToday a Predator unmanned combat fused me ever since I aerial vehicle (UCAV) fires a Hellfire joined the Indian Air Force (IAF). Tactics and Air Combat tactical missile to kill a terrorist after a strategic reconnaissance. Development Establishment (TACDE) a unit for training Things have become pretty mixed up. The easiest way is to remempilots in combat flying had just been formed and every ber that Tactics deals with forces in the battlefield and strategy fighter pilot who did a barrel reversal (sic) in a 2 v 1 was talking deals with getting them there. The same applies to whether an air Tactics. Once in a while one heard the word Strategy spoken in force is tactical or strategic. whispers by seniors. Everyone else just nodded knowingly. I did Process of evolution consult one of our seniors in the squadron as also read one of the articles he showed me and felt I was quite clear about the difference Like almost all other air forces the IAF too began as a tactical between Tactics and Strategy. The moment I a bit superciliously air force with a flight of just four aircraft on April 1 1933. Its tried to explain the same to one of my colleagues I realised I had main role was to support the Army in battle. This continued till no clue. Some say strategy identifies clear goals that advance the independence. During this period air forces all over the world organisation and organise resources while tactics utilise specific were slowly realising their potential and the peculiar nature resources to achieve objectives that support the overall goals. Some of air power propounded by the trio of Douhet Mitchell and say strategy is that above the shoulder while tactics is that below Trenchard. By World War (WW) II the world had appreciated the shoulder. Military strategy is also defined as the art and sci- two unique characteristics of air power. The first was its inherence of planning directing and orchestrating military campaigns ent flexibility. Flexibility to switch roles as well as theatres of to achieve national security objectives. Tactics sometimes called operations. The second was the ability to strike directly at the Battlefield Strategy on the other hand are the art and science of heartland or the centres of power or the centres of gravity of employing forces on the battlefield to achieve national objectives. the enemy bypassing intervening obstacles. The air forces were Tactics are concerned with doing the job right while strategy deals slowly emerging from being a support element to an independent entity. Breaking Army shackles was not easy. Understanding the with doing the right job. third dimension takes a lifetime of study. The Army top brass did influence of technology not wholly appreciate the advantages of autonomous air power. Over a period of time new technologies have made a significant To some extent the army still believes that Under Command impact on the methods of war-fighting. Long range sensors operations are the best. During WW II the strategic bomber long range weapons and delivery platforms emerged on the emerged as a potent weapon. Air forces had to have the strategic scene. Satellite Communication (SATCOM) global positioning bomber to be recognised as a strategic force. After WW II during system (GPS) AWACS air-to-air refuelling (AAR) extended the the Cold War the term Strategic referred to things nuclear be it zones of influence and battlefields dimensions expanded. Forces bombers or missiles. Technology continued to advance changing thousands of kilometres away were in contact with each other. definitions and at times driving doctrines and strategy rather Commanders realised it was possible to effect a strategic out- than the other way around. Satellites communications precision come by use of tactical forces and vice versa especially in the guided munitions (PGMs) beyond visual range (BVR) missiles TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 18 treNDS iN laND-baSeD FirePoWer iN tHe FUtUre Victorious warriors win first and then go to war while defeated warriors go to war and then seek to win. --Sun Tzu Raytheon W Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 69 REGIONAL BALANCE arfare quintesMajOr GeneraL P.k. sentially comprises two ingredients Firepower and Manoeuvre. Both complement each other and synergise to defeat the enemy. Manoeuvre entails moving to positions of advantage with dexterity to outwit the enemy. The two Gulf Wars enabled skilful use of manoeuvre and firepower to defeat the enemy. However future conventional conflicts would be influenced by the nuclear backdrop resulting in constraints in time and space. Further future conflicts are visualised in the mountainous regions which lack space for manoeuvre. Accordingly firepower will play an important role in all conflicts of the current century. Modernisation of global weaponry has compelled all countries to restructure their armed forces and transform their strategic thinking. All armed forces are speedily moving towards network-centric warfare. This essentially links the sensor command elements and shooter to engage targets in real time. Accordingly the current focus is on precision stand-off strikes in real time. Firepower is currently undertaken from land sea air and submerged surfaces of the sea. Outer space is currently being used for surveillance. It is likely to become an area for deployment of weapons in the near future. Technologically it would be practical to consider deployment of anti-satellite (ASAT) and direct energy weapons (DEWs) in this region with developments taking place in the field. We will confine ourselves to land-based firepower (LBF). The process of employing firepower entails the need for surveillance which would lead us to reconnaissance of selected areas thereby leading to acquisition of targets. These targets based on their importance would be degraded or destroyed. This would be ascertained by undertaking post-strike damage assessment (PSDA). Based on the importance of the target the same is degraded or destroyed. The process is undertaken through the application of command control communications computers information intelligence surveillance and reconnaissance (C4I2SR). In mountainous terrain firepower becomes important due to limited space for manoeuvre. The article enumerates the CHakraVOrty (retD) constituents of LBF and analyses the future trends. Constituents The constituents of LBF are platforms which can deliver firepower from land. These are small arms guns mortars land-based rockets tanks armoured personnel carriers (APCs) attack helicopters unmanned combat aerial vehicles (UCAVs) and surface-to-surface missiles (SSM). The ammunition which is the payload is the most important constituent of firepower. The various types of ammunition which constitute the conventional series are high explosive smoke illuminating armour piercing high explosive squash head fuel air explosive cluster precision sensor fused incendiary and propaganda. Apart from these there is the strategic variety comprising chemical biological radiological and nuclear (CBRN) ammunition. A combination of platforms with different types of ammunition results in devastating firepower which is expected to unnerve the enemy. These constituents of firepower enable us to undertake all types of operations in a full spectrum conflict. thrust of Modernisation All armies undertake modernisation to keep their forces operationally prepared. The aim is to develop prioritised capabilities through induction of high technology weapons and acquisition of force multipliers with a focus on creation of a lethal agile and networked force to meet the futuristic security challenges. This entails induction of critical technologies. Currently the capabilities are being enhanced to meet challenges across the spectrum to include the following nBattlefield Transparency. nBattlefield Management Systems. nNight Fighting Capability. nEnhanced Firepower. nPrecision Guided Weapons. nIntegrated Manoeuvre Capability. nCombat Aviation Support. nNetwork Centricity. Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Contents One Two Three Four Five Six Seven Eight Future Soldier and Developments in the Indian Army Revolution in Military Affairs -- Past Present and Future Cyber Warfare Technologies Green Energy Initiatives by Defence Forces Future Radar Technologies Crystal Gazing -- Weapons and Sensors for Indian Naval Platforms Can Military Machines Be Moral The Tangled Ethics of Robotic Warfare The Challenge of Military Artificial Intelligence 73 77 81 85 89 93 97 101 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Technology CONCEPTS & PERSPECTIVES section two 2 WEAPONS EQUIPMENT VEHICLES CONTENTS 1 Future Soldier and develoPMentS in the indian arMy Our infantry must be equipped to cope with expanding terrorism asymmetric and fourth-generation wars simultaneous to short intense high-tech wars. Indian Army t Abbreviations at the end of the yearbook hree years into the invasion Lt GeneraL P.C. of Afghanistan the US Army realised that while enormous investments were being made on big-ticket weapon systems the foot soldier was largely neglected. These were findings of an in-house study and corrective measures were initiated on war-footing. In our case the state of equipping soldiers at the cutting-edge is best described as atrocious. The army as on date is short of over 3 50 000 bulletproof jackets and is holding a 20-year-old assault rifle (5.56 INSAS) which is nowhere amongst the state-of-the-art top 10 rifles in the world and a replacement will likely take another decade or so. These are just two examples despite the foot soldier continuously contending with proxy wars counterinsurgency and counter-terrorism operations past three decades. Ironically defence budget 2016-17 leaves only 12 000 crore (about 1.8 billion) for modernisation from the 78 587 crore (about 12.1 billion) capital expenditure rest being for committed liabilities. So what comes to the foot soldier will likely be meagre if at all. An essential basic for equipping the foot soldier is to take into account levels of sophistication terrorists and insurgents have achieved and likely to achieve in future. Today Pakistani terrorists are equipped with GPS (global positioning system) devices but in our case even Special Forces units are deficient of an item like the GPS. It is not realised that lackadaisical approach to equipping infantryman has direct bearing on overall combat efficiency and this also results in avoidable loss of lives. Our infantry must be equipped to cope with expanding terrorism asymmetric and fourth-generation wars simultaneous to short intense high-tech wars. The clich talked about three decades back that if six tanks could be imported less the infantry soldier can be armed to the teeth still holds good. Ironically products of the Ordnance Factory Board (OFB) too are of poor quality and imports for infantry it seems are the last priority. KatoCh (retd) Foreign Future Soldier Programmes The United States The Brigade Combat Team (BCT) Modernization was the US Army s main modernisation programme implemented in 2009-10. The BCT programme was the successor to army s Future Combat Systems (FCS) programme under which modernisation was undertaken from 2003 to early 2009. The BCT programme aimed to build 21st Century Soldier The modern soldier needs a combination of technologies to combat 21st-century threats. Similar to our experience of fighting insurgency www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 73 REGIONAL BALANCE Get your CoPy to read in CoMPlete ASIAN WHO S WHO and terrorism for decades the US and NATO have had their own share of similar combat including ongoing conflict in Afghanistan in recent years. Indications exist that the western intervention in Syria in near future and in a later time frame even in Iran may well be on the cards. To achieve superiority over the enemy the soldiers need integrated set of high-technology uniforms and equipment linked to an array of real-time and archived battlefield information resources. Soldiers will require not only upgraded and more sophisticated versions of existing weapons and equipment but also new types of weapons and equipment that are likely to become possible as new types and combinations of technologies become viable for battlefield deployment. Soldier modernisation may be segmented under five heads command control communications computers and intelligence (C4I) lethality mobility survivability and sustainability. The global soldier modernisation market that came into prominence during the 1990s was estimated to value 6.4 billion and increase at compound annual growth rate (CAGR) of 3.07 per cent during the forecast period to reach its peak of 8.7 billion by 2022. It has witnessed exponential growth with India China and Russia also having joined the race and contributing to 12 major national markets. Raging conflict in the Middle East and future conflicts in South Asia and the Asia-Pacific region will increase demands further. Future soldier exhibitions are being held annually world over focusing on research new technologies and materials concepts and opportunities for international cooperation in the implementation of the integrated system for the soldier of the future and for securing interoperability of individual components in operations. INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 2 revolution in Military aFFairS -- PaSt PreSent and Future RMA is linked with transformation and total systems integration of the military war machine. Wikipedia t Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 77 REGIONAL BALANCE he Revolution in Military attack on the World Trade Centre in Lt GeneraL nareSh Chand (retd) Affairs (RMA) became the New York in 2001 and development holy grail for conducting of IEDs are some such examples. In future wars by the United States. The genesis of the RMA a way it is the reverse of Cold War in the development of technolocan be traced to Russia during the 1970s and 1980s when gies. During the Cold War US and Russia tried to outdo each other Soviet Marshal Nikolai Ogarkov the former Soviet Chief by developing more and more powerful weapons. But during postof Staff wrote about a military technical revolution that would Operation Iraqi Freedom and Enduring Freedom all the jihadi dramatically improve the lethality and capabilities of conventional groups attempted to develop counter RMA technologies which weapons. The United States became interested in it through Andrew were cheap and involved low technology. Marshall the head of the Office of Net Assessment a Department of The definition of system of systems is one of the most popular Defense think tank. US called it RMA which could loosely be defined aspects of the RMA and by and large widely accepted in all modern as a composite doctrine which includes evolution of weapons tech- militaries specially in the US. O Hanlon describes it as a comprenology information technology military organisation and military hensive hierarchy of command structures and technologies across doctrine. It was more like a hypothesis (in science it is an idea or an all services and including civilian command authorities as well as explanation that can be tested through study and experimentation) an integration of force delivery systems on all platforms and among which gave out the shape of future wars and how to fight it success- all military units. In other words the system of systems school of fully. RMA became the basis of military doctrines of many countries thought is the skeleton and muscles of jointness or the integration including India United Kingdom Russia Germany Sweden and a of all military forces and command a goal to which the US military few other countries. It was an entirely different matter whether these has been working for over two decades. The organisational reforms countries had the budget or technologies to implement RMA. Some leading to this goal have been accompanied by dramatic progress in examples of technologies developed during the Operation Iraqi the technologies of situational awareness and command and control. Freedom to match the enemy tactics were counter improvised explorma as Key Instruments of a nation s Power sive device (IED) better command and control systems and many more. However all these technologies were already being evolved It is generally accepted that the RMA has three key instruments of then fructified and tested in battle. RMA is thus linked with trans- national power. The first is the system of systems which attempts formation and total systems integration of the military war machine. to synergise battle space awareness command and control by presenting a central operational picture and forces means for premultiple views of rma -- Glimpses cision attack for neutralising the target. The second is information Michael O Hanlon s Four Schools of Thought. Michael O Hanlon in dominance achieved by integrating all the means available. The his book Technological Change and the Future of Warfare gave out third is an outcome of information dominance leading to informafour schools of thought within the RMA philosophy in the United tion warfare which is generally defined as the capability to disrupt States which are the system of systems the dominant battle space or override enemy information systems while defending one s own. dominance the global reach global power paradigm and the The US military expands the information warfare in offensive and vulnerability Vulnerability implies that the technologies which defensive role to include electronic warfare cyber warfare infor. are monopolised by advance military powers will at some stage mation assurance and computer network operations. US has the spill over to their adversaries. However if the adversaries cannot technologies to implement all these aspects and US Air Force has match the technologies then they will develop counter technologies been carrying out information warfare in some form or the other and tactics as seen in the Middle East by the non-state actors. The much before the advent of RMA. Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 3 Cyber WarFare teChnoloGieS In cyber warfare every day is a D-Day. In July 2016 nearly half the social media responses to a terrorist commander s killing in India came from unknown sources setting off alarm bells across the establishment. ncreasing lapses of cyber secucase of whether you have been hacked Lt GeneraL rajeSh Pant (retd) rity in both critical and non-critor not it is whether you know it or not ical infrastructure systems and a Cyber World is Layered growing threat of embedded malware and cyber attacks from inimical elements and nations from anywhere in the globe has The interflow of information in a networked system is divided into . bought to fore the immense importance of cyber warfare in layers While each layer basically operates autonomously of the ensuring national security. Simultaneously the proliferation of net- other it is important to ensure that the data being transmitted from works to a large population as part of digital India and other such the host to destination has not been tampered with or is not being megaglobal projects has increased network accessibility for a large prevented from reaching its destination. The basic principles of section of hackers and thieves to abuse. Such advanced persistent confidentiality integrity and availability must be maintained. The threats are presently being addressed by stronger security methods erstwhile seven layered open systems interconnection (OSI) model such as advanced encryption algorithms efficient authentication has now been replaced with the four-layered Transmission Control process and defence in depth approach. While every cyber secu- Protocol Internet Protocol (TCP IP) model. However I will deal rity administrator endeavours to ensure building adequate security with the technologies for cyber warfare in basically four layers viz measures at all levels of his network it is the People factor that Media Network Transport and Application layers. often gets neglected as compared to the process and technology media Layer technologies issues. There is therefore a requirement for all of us to understand the technologies used by hackers so that we can take suitable pre- Media here refers to the erstwhile physical layer of the OSI model and the new Ethernet layer of the Internet model. The vulnercautions against them. A typical modus operandi of the cyber attack involves the stages abilities which can occur in this layer include loss of power loss of of scanning entry lateral spread control of victim device exploita- environmental control physical theft of data and hardware physition and exfiltration. The software code devised for entry through a cal damage or destruction of data and hardware unauthorised vulnerability is termed as an exploit and the attack path is termed changes to the functional environment (data connections remov as attack vector A zero day attack is one for which the preventive able media and adding removing resources) disconnection of . physical data links undetectable interception of data keystroke & patch has not been implemented. other input logging. Why Cyber network Knowledge is Important A major security concern at this layer is tapping of the physical How much time do we all spend daily with our smartphones and medium be it wireless or optical fibre or any other network cable. laptops And how much do we know of the technologies behind This allows an attacker to copy or even corrupt the data stream. The this cyber world The answer to these two questions is the security physical layer could suggest some type of physical action like causgap we all face. In fact some financial institutions have lost millions ing a denial of service by disrupting a power source changing of of dollars due to cyber crime but have not reported it due to loss interface pins or the cutting of cables. The security issues become of reputation. Even the SWIFT system of financial transaction has more pronounced when the network is based on a wireless media. been breached. Many people have been victims of Ransomware but A comparatively powerful transmission at same frequency can easdo not report. In fact in India with a mobile phone base of 1 billion ily affect the quality of service if not fully deny the service to the and an Internet user base of 40 million people only 9 500 cases of user. The chances of passive attacks on wireless media are more as cyber crime have been reported in the last one year. Now it is not a it is more susceptible to interception. SP Guide Pubns i Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 81 REGIONAL BALANCE Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 4 Green enerGy initiativeS by deFenCe ForCeS Unleashing war-fighters from the tether of fuel and reducing our military installations dependence on a costly and potentially fragile power grid will not simply enhance the environment it will significantly improve our mission effectiveness. --Dorothy Robyn former Deputy Undersecretary of Defense in testimony before the Senate Energy and Natural Resources Committee May 20 2010 US Navy M Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 85 REGIONAL BALANCE ilitary fuel conrear admIraL dr S. sumption studies have highlighted various issues afflicting an assured supply of fuel to forces during extended operations especially in regions far away from the country of origin. Fuel is procured from agencies near to the operational areas to reduce the logistic supply chain. This is however subject to prevailing prices and fluctuations from time to time. It makes it difficult to make budgetary provisions for this essential commodity. In addition to the cost of transportation attacks on the convoys carrying fuel are also a common feature in areas like Afghanistan and Iraq which leads to loss of essential fuel supplies as well as combat manpower. These problems have a cascading effect on mobility of heavy military equipment as well as battle command stations so much so that the logistic chain has to be put in place prior to the move to ensure operability of the equipment. NATO has brought out that the fact that its forces consumed up to 4 gallons (about 15 litres) for transporting each gallon (about 3.8 litres) of fuel to Afghanistan about 3 000 US soldiers were killed wounded from 2003 to 2007 in attacks on fuel and water convoys in Iraq and Afghanistan and that there is one casualty for every 24 fuel re-supply convoys to Afghanistan. In a military camp about 60 to 70 per cent of fuel is used to produce electricity to heat cool water or air. Further a conventional diesel generator is able to convert only one-third of its input energy into electricity with the remaining being lost as heat. The US military had begun to reduce its dependence upon fossil fuels proactively by 2010. It commenced development evaluation and deployment of renewable energy sources to decrease its carbon footprint. The US Secretary of Defense delivered the review of the Department of Defense (DOD) strategy and priorities to Congress KuLShreStha (retd) on March 4 2014 vide the 2014 Quadrennial Defense Review (QDR). This included the affect of rebalance to Asia upon force structure weapons systems platforms and operations. The highlights were Positioning additional forward-deployed naval forces to achieve faster response times at a lower recurring cost Deploying new combinations of ships aviation assets and crisis response forces that allow for more flexible and tailored support to the regional Combatant Command Developing concepts posture and presence options and supporting infrastructure to exploit the Department s investment in advanced capabilities and Pursuing access agreements that provide additional strategic and operational flexibility in case of crisis . It was evident that the shift would imply requirement of additional logistic arrangements in the fuel provisioning chain. It has been estimated that the Asia-Pacific shift would entail an 11 per cent additional operational fuel demand on the US DOD. The European Defence Agency has launched the Military Green initiative. It has been established by six countries namely Austria Cyprus Czech Republic Greece Germany and Luxembourg. The project visualises access rights to rooftops and land in military premises being offered to the market for electricity production using photovoltaic technology. The electricity produced would supply the defence locations as well as feed the surplus green energy to the local grid. NATO constituted a Smart Energy Team which examined national and NATO documents and visited defence agencies to identify energy efficient solutions for incorporation into NATO s standards and best practices. The team concluded that Reducing fuel consumption in the military is an operational imperative. Smart Energy solutions cannot only save money when less fuel is used but can also save soldier s lives and help improve the mobil- Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 5 Northrop Grumman Future radar teChnoloGieS The nearly first signs in technological upgradation were seen when the air defence weapon systems defeated first-generation stealth technology (F-117 etc.) with mono-static radars by reflecting the radar energy away from the transmitter s line of sight. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 89 REGIONAL BALANCE Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS o ut of the three bastions ed back from modern- day stealthy Lt GeneraL dr v.K. Saxena (retd) namely the sensors the threat platforms as a result the curshooters and the battle rent day counter-stealth radars gradmanagement systems that together hold the body edi- uated in a phased manner to the technology of passive coherent fice of the air defence (AD) arsenal probably it is location (PCL) detection where the aim was to locate the threat the first quoted which has shown the highest pace of based on its reflection of electromagnetic signals present in the technological enrichment over the years. This work briefly flags the environment such as FM (frequency modulated) digital audio state-of-the-art technologies that have emerged over the years in broadcasting (DAB) and digital video broadcasting-terrestrial the sensor domain of ground-based AD weapon systems. (DVB-T) Bands. The counter stealth muscle of such radars lay in the multi-band fusion operating in low frequencies beatanti-stealth radar technologies ing stealthy targets which are generally coated to be opaque against higher frequencies. Also since there is likely to be a large The Ever Expanding Challenge proliferation of usage of FM DAB and DVB-T Bands in the enviThe radars have faced a growing challenge of detecting the pro- ronment the inputs to such radars are resplendent and multiverbial needle in the haystack due to the challenge of detecting directional. Accordingly there is no criticality in the need to stealth platforms that have minimalistic radar cross-section locationally adjust to the peculiar reflection of radar energy from (RCS) achieved through a host of technologies that can almost target aircraft. The radars in this category are 3D have normally totally absorb deflect diffuse waylay incident radar energy high detection rate in the range of 0.3-0.5 sec and feature robust (nano-paints and composite materials plasma coating stealthy track continuity during high speed manoeuvring. The beauty is outer structure shaping hidden weapon bays with canted tra- that the radar being passive is itself stealthy and hence opaque to peze and more). anti-radiation threat. Lockheed Martin s Silent Sentry and EADS passive radar system are PCL radars. With the range bracket Early Shift in Technology of around 200 km and locational accuracy of 500 metres these The nearly first signs in technological upgradation were seen when radars are effective counter-stealth sensors. the AD weapon systems defeated first-generation stealth technology (F-117 etc.) with mono-static radars by reflecting the radar Ongoing Research in Passive Multi-Static Domain energy away from the transmitter s line of sight. This resulted in a Research is in progress where experts are trying to integrate autogradual shift to bi-static and then multi-static radars. Initially these matic target classifiers in the PCL radars which aim to process radars operated mostly in X or L Bands achieving an optimal com- the raw data from TV and FM radio transmissions to extract an promise between ranges and resolution. As technology developed estimate of the RCS during each integrative period. Since RCS is a single dual band active radars emitters gave way to multi-band function of the target s aspect with respect to both the illuminator usage that also in passive domain. and the receiver it varies with the frequency and polarisation of the incident wave. RCS values of many different aspect angles at The Emergence of Passive Detection each sample instant are stored in the template library to arrive at As stealth grew less and less incident radar energy got reflect- an auto target recognition solution based on closest fit. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 6 CryStal GazinG -- WeaPonS and SenSorS For indian naval PlatForMS In the arena of weapons and sensors indigenous development remains relatively weak. Although the navy possesses adequate design capabilities and production base performance enhancements are required in the field of sonar command and control and IT-based systems as their critical subsystems and components are of imported origin. Indian Navy Surveillance -- modern radar Systems With their conventional all-weather long-range capabilities for detection and tracking radars will remain the centrepiece of new surveillance and naval defence systems. Innovations in integrated electronics and computational power have enabled evolution of radar systems beyond the classic mono-static radars. Modern developments are focused in the fields of receiver sensitivity real-time digital signal processing and adaptive antenna arrays with unprecedented computing power. The conventional parabolic reflector for 2D radars is paving way for high precision 3D radars possible through phased array technology. Advent of high power solid state electronics has enabled replacement of conventional Travelling Wave Tubes while smart and effective Digital Signal Processor (DSP) functions have enhanced their performance in environment with intense clutter interference and jamming. Development of customised algorithms for the detections of ultra-low Radar Cross-Section (RCS) targets for systems that are using the classical mono-static configuration or multi-static configuration have ensured improvisation with little investment in transmitter upgrades. Further revolution in data networking technologies have facilitated integration radar sensors into secure wireless networks using Tactical Data Links to enhance the operational awareness of the forces at sea. The continuum of quantum changes in radar design and architectures will simplify system design while enhancing performance capabilities and reliability. Major novel architectures and technol- Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 93 REGIONAL BALANCE Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i n earlier days navies were meant vICe admIraL only to provide adequate defence to a country s coastline. Today it is an accepted fact that navies operate in international waters well beyond the territorial limits of the nations. As the saying goes today the world is united (not separated) by Oceans . In keeping with this fact the roles of the Indian Navy would continue to extend from peace-keeping through the low-intensity segment to high-intensity conventional hostilities including nuclear conflict. Navies are technology intensive services and clearly technological superiority will be the decisive factor in future battles. The Indian Navy was fully aware of the need for self-reliance right from the beginning and thus ensured that it was always at the forefront of indigenisation. The commencement of the indigenous shipbuilding in the 1970s has been sustained and built up. Today the Indian Navy builds all the ships within the country including the Arihant class submarines and the aircraft carrier Vikrant. Consequently the Indian Navy has acquired adequate expertise in the hull design and construction of various types of warships. In the fields of propulsion systems (barring marine gas turbines) and related auxiliary machineries adequate expertise and production capabilities are available in the country more so because of their similarities with the civilian sector. Thus the Indian Navy has also become self-reliant in power generation and distribution systems communication systems and support services systems like air-conditioning and refrigeration etc. However in the arena of weapons and sensors indigenous development remains relatively weak. Although the Navy possesses adequate design capabilities and production base performance enhancements are required in the field of sonars command and control and IT-based systems as their critical subsystems and components are of imported origin. The fact that defence requirements are limited and volumes are inevitable low has aggravated the problem even further. K.r. naIr (retd) Crystal gazing by its very nature is a risky proposition. The emergence of state-of-the-art technologies will lead to conceptualise and design new systems which would detect the enemy earlier destroy the enemy faster more effectively and farther away and prevent the enemy from detecting own ships. There are many emerging technologies however a few salient ones are covered in this article. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 7 Can Military MaChineS be Moral the tanGled ethiCS oF robotiC WarFare Stephen Hawking one of the greatest scientists said that efforts to create thinking machines pose a threat to our very existence. He said The development of full artificial intelligence could spell the end of the human race. magine a self-driven car BBC Professor Stephen Hawking GrouP CaPtaIn joSePh noronha (retd) travelling at high speed when one of Britain s greatest scientists a distracted pedestrian wansaid that efforts to create thinkders into its path. Should the robotic car swerve perhaps ing machines pose a threat to our very existence. He said The endangering its occupants and other vehicles Now think of development of full artificial intelligence could spell the end of an autonomous unmanned combat air vehicle (UCAV) that is the human race. Deliberations on robotic warfare have been in about to launch a lethal weapon against a dreaded terrorist when its progress for about five years under the UN Convention on Certain camera detects the man lifting a small child into his arms. Should it Conventional Weapons in Geneva Switzerland. These discussions continue the attack Such questions are increasingly being asked in could potentially agree to prohibit or at least limit autonomous the nascent field of machine ethics However is it even possible to weapons and avert yet another global arms race. There are prec. teach a machine to tell right from wrong when humans themselves edents like the banning of chemical and biological weapons and as often seem to lack the ability recently as 1995 of blinding lasers. The highly successful campaign Artificial Intelligence (AI) as well as humanoid robotic soldiers against anti-personnel landmines also shows that it is possible for that think and behave pretty much like real people have long been the global community to control certain types of weapons considstaples of science fiction. But automated weapons are already ered reprehensible. everywhere. Over 30 nations have advanced air defence systems Organisations like the Human Rights Watch (HRW) too demand that need only cursory supervision. Once activated these systems a pre-emptive ban on killer robots on ethical grounds. However can select and engage incoming rockets missiles or manned air- the International Committee of the Red Cross (ICRC) has a more craft without human involvement. nuanced stance. It simply wants limits placed on autonomous Autonomous weapon systems are a further advancement. Their weapon systems so that they function in accordance with IHL the number and capability is likely to grow in tandem with driverless principles of humanity and public conscience. vehicles intelligent industrial machines and domestic robots that Leading the race are already in use as domestic help nurse for the elderly and nannies for children. Indeed robotic warfare is being called the next In truth a race to develop robotic weapons has begun and it may revolution in military technology after gunpowder and nuclear prove impossible to stop. The world urgently needs to consider various issues that future widespread use of such autonomous weapons. Is this an accurate assessment or mere hype weapons if not all-out robotic warfare entails. The US Department Growing disquiet of Defense (DOD) is funding scores of projects to provide its forces The International Committee for Robot Arms Control (ICRAC) an with next-generation intelligent weapons vehicles and surveillance organisation founded in 2009 by experts in robotics technology systems that may render the human combatant practically jobless. robot ethics international security International Humanitarian Analysts believe that by 2030 the US military could replace a quarLaw (IHL) and human rights law is clearly worried. It has some ter of its combat troops with robots aiming to become a smaller dire predictions for the future including that nations could arm more lethal deployable and agile force. Even in a purely civilian robots with nuclear weapons that despots could send scores of setting in July 2016 police in Dallas Texas sent a bomb-bearing intelligent killing machines to terrorise their own restive regions or robot to kill a deadly sniper -- a first in US history. It was akin to undertake ethnic cleansing and that there could be uncontrolled an artificial suicide bomber which will surely give ideas to terror unmanned wars in space. In a December 2014 interview with the groups worldwide. USAF i Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 97 REGIONAL BALANCE Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 8 the ChallenGe oF Military artiFiCial intelliGenCe Artificial Intelligence technology has reached a point where the deployment of such systems is -- practically if not legally -- feasible within years not decades and the stakes are high autonomous weapons have been described as the third revolution in warfare after gunpowder and nuclear arms . --Open letter in 2015 by scientists and technologists including Elon Musk Stephen Hawking and Steve Wozniak asking for a ban on lethal weapons controlled by AI US DoD i Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 101 REGIONAL BALANCE ntelligent machines rear admIraL dr S. were the focus of research work at many institutes after World War II. In 1950 Alan Turing argued that if the machine could successfully pretend to be human to a knowledgeable observer then one certainly should consider it intelligent. The credit of coining the phrase Artificial Intelligence goes to John McCarthy in 1955. A number of scientists have defined Artificial Intelligence (AI) in varying manners however there appears to be no single definition which has been universally accepted. All the definitions of AI are connected with human intelligence in some way some of which are n The study of mental faculties through the use of computational models . n The art of creating machines that perform functions requiring intelligence when performed by people . n A field of study that seeks to explain and emulate intelligent behaviour in terms of computational processes . n The study of how to make computers do things at which at the moment people are better . n The study of the computations that make it possible to perceive reason and act . n The branch of computer science that is concerned with the automation of intelligent behaviour . Strong AI has been defined as that moment when humankind is in the presence of an intelligence greater than its own and as strong AI is reached once the computer regarded as such is conscious of its abilities . AI imbibes knowledge from different fields like computer science mathematics engineering cognitive science philosophy and psychology. AI embodies a wide range of intelligent search methods techniques for obtaining clarity where uncertainties exist KuLShreStha (retd) in data and knowledge and various types of machines learning and representation schemes of knowledge. Its various applications include speech recognition natural language processing expert systems neural networks intelligent robotics gaming and 3D vision. There is a need to define machine learning and deep learning before moving on to the military applications of AI. machine Learning It has evolved from the study of computational learning theory pattern recognition and AI. It is a subfield of computer science. It has been defined in 1959 by Arthur Samuel as a Field of study that gives computers the ability to learn without being explicitly programmed Machine learning relies upon utilising algorithm con. structions to perform predictive analysis on data. Machine learning tasks fall into three basic categories namely Supervised Learning. It is in which the computer is presented with example inputs and their desired outputs and the goal is to learn a general rule that maps inputs to outputs. Unsupervised Learning. It is where no labels are given to the learning algorithm leaving it on its own to find structure in its input. Reinforcement Learning. It is where a computer programme interacts with a dynamic environment in which it must perform a certain goal. deep Learning Le Deng and Dong Yu of Microsoft have provided the following definitions for Deep Learning nA class of machine learning techniques that exploit many layers of non-linear information processing for supervised or unsu- Get your CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Contents One Two Three Four Five Six Seven Eight Army Modernisation Moving Forward at a Slow Pace India s Oceanic Aspirations Modernisation of the Indian Air Force India s Defence Budget 2016-17 Defence Offsets in DPP 2016 Make Procedure in DPP 2016 New Defence Procurement Procedure -- Synergy with Make in India India s Strategic and Business Environment Global Contracts 105 109 113 119 123 127 131 135 145 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Business CONCEPTS & PERSPECTIVES section three 3 WEAPONS EQUIPMENT VEHICLES CONTENTS 1 arMy ModerniSation MovinG Forward at a Slow Pace After a decade of neglect under the two UPA regimes military modernisation is gradually picking up pace under the NDA Government. G Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 105 REGIONAL BALANCE eneral Dalbir Singh Another 23 contracts worth around BrigadiEr gurMEEt Kanwal (rEtd) Suhag the Chief of Army 12 000 crore are in the pipeline. Staff (COAS) said in an The important ones include the over interview in January 2016 that making up of the criti- 2 000 crore deal for 15 000 3UBK Invar missiles for T-90S tanks and cal deficiencies in weapons and equipment is on fast the 1 200 crore deal for two additional troops of the Israeli Heron track. He identified towed artillery reconnaissance and spy drones. The really critical projects are still stuck in the longsurveillance helicopters third-generation missiles air defence winded procurement process. These include those for the infantry weapons systems mechanised forces and assault rifles as the key bullet-proof jackets ballistic helmets new-generation assault rifles areas requiring immediate attention and said the government was with interchangeable barrels close-quarter battle carbines and giving full support. light machine guns have all been hanging fire for several years. A After a decade of neglect under the two UPA regimes mili- project with an outlay of approximately 10 000 crore for the inductary modernisation is gradually picking up pace under the NDA tion of 1 78 000 new-generation assault rifles was initiated but has Government. The Defence Acquisition Council (DAC) has accord- not yet reached the stage where a contract may be signed. ed AON (acceptance of necessity) approval to modernisation Enhancing the Combat Punch projects worth over 1 50 000 crore. In keeping with Prime Minister of the Mechanised Forces Narendra Modi s policy to Make in India most of the newly approved weapons systems will be procured with transfer of tech- While Pakistan had acquired 320 T-80 UD tanks and is on course nology (ToT) and manufactured in India or where feasible com- to add Al Khalid tanks that it has co-developed with China to its pletely indigenously designed developed and manufactured. In armour fleet vintage T-55 tanks continue in the Indian Army s an interview with the author in December 2015 Manohar Parrikar inventory despite their obsolescence. Even though the indigenousthe Defence Minister said that contracts worth 90 000 crore had ly developed Arjun Mk II main battle tank (MBT) has not fully met been signed and of these 70 per cent are Buy and Make (Indian) the army s expectations due to recurring technological problems and cost overruns the tank has entered service with two regiments or Make in India . One year before the NDA Government assumed office it had of Arjun Mk I tanks. Consequently 310 T-90S MBTs had to be been reported that the army is finally cranking up its moderni- imported from Russia. In December 2007 a contract was signed for sation drive with around 680 procurement projects worth over an additional 347 T-90 tanks to be assembled in India. Meanwhile 2 00 000 crore for the Twelfth Five Year Plan (2012-17) period to a programme has been launched to modernise the T-72 M1 Ajeya plug operational gaps as well as ensure capability development MBTs that have been the mainstay of the army s Strike Corps and along both the western and eastern fronts. General Bikram Singh their armoured divisions since the 1980s. The programme seeks General Dalbir Singh s predecessor had identified 31 of these 680 to upgrade the night fighting capabilities and fire control system pending modernisation projects as Priority-1. These included of the tank among other modifications. Approximately 1 700 T-72 assault rifles howitzers bulletproof jackets tank and artillery M1s have been manufactured under licence at the Heavy Vehicle Factory (HVF) Avadi. ammunition and missiles. The BMP-1 and the BMP-2 infantry combat vehicles which According to a recent news report 17 new contracts worth 2 820 crore were signed for the Army in 2011-12. The figure have been the mainstay of the mechanised infantry battalions for jumped to 29 contracts worth 7 222 crore in 2012-13. The tally long are now ageing and replacements need to be found soon. stands at 17 contracts worth 11 777 crore in the ongoing fiscal. The replacement vehicles must be capable of being deployed for Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES DPR WEAPONS EQUIPMENT VEHICLES CONTENTS 2 india S oceanic aSPirationS The growing importance of the Indian Ocean in its strategic outlook has apparently seen India recognising the need to strengthen its Navy. Indian Navy J Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 109 REGIONAL BALANCE awaharlal Nehru India s nations coupled with low levels of CoMModorE lalit KaPur (rEtd) first Prime Minister said To development. It contains seven of the be secure on land we must world s top ten most fragile states as be supreme at sea Notwithstanding this oft quoted state. well as many others engaged in domestic and international ment he actually paid little attention towards development conflict. It is also a key venue for international piracy and of the Indian Navy (IN) after India gained independence. the locus of some 70 per cent of the world s natural disasters. His government s focus was on territorial threats emanating from National and regional mechanisms to tackle these challenges our western and northern borders. However a flawed strategic are virtually non-existent forcing extra-regional powers to perspective which banked on the aid from the western countries maintain the force levels to counter the threats. if China attacked India coupled with reliance on bluff and bluster nThe littoral contains the recognised hub of international terrorism in the Af-Pak region and is close to another hub the of the Forward Policy instead of muscle led to the disaster and Levant where the global war on terror is being fought. The national humiliation of 1962. Indian Ocean provides unrestricted access to hot spots for the The growing importance of the Indian Ocean in its strategic extra-regional military powers to be engaged in this war withoutlook has apparently seen India recognising the need to strengthout the need for host nation s approval. en its Navy. Commentators often cite orders for as many as 50 warships having been placed on Indian shipyards as proof of the Indian nThe regional strategic environment is thus volatile and dangerous with unregulated strategic competition involving extraNavy s growth. The highest authorities in the country including regional powers jockeying for influence. These include China the Prime Minister have publicly articulated India s desire to be a and its influence-building projects such as the China-Pakistan Net Security Provider in the Indian Ocean But is the perception . Economic Corridor the Maritime Silk Route and the ports of that the Indian Navy s star is on the ascendancy justified Or is Gwadar and Djibouti as well as established powers such as the the Indian Government still relying on bluff and bluster instead of United States France the EU Japan and Australia. steady development of muscle Geography has blessed India with a commanding position Among the key reasons for the Indian Ocean s increased imporastride the trade routes that criss-cross the Indian Ocean. Moreover tance in world affairs are nIts littoral contains 40 per cent of global hydrocarbon deposIndia s economic survival hinges on unfettered use of the seas its and rich reserves of numerous other resources vital for around it as well as security of the coastal belt. The following four the global economy including fish labour iron aluminium key factors underlie this statement copper rubber uranium gold diamonds etc. Industrialised nFirst India s enormous dependence on imported energy vital for its economy. Nearly 3.5 million barrels of crude oil per nations that consume these resources are located outside the day amounting to more than 80 per cent of the nation s crude littoral. Consequently the resources must be transported to requirement is imported via the seas while another 11 per them and this can only be done through the Indian Ocean. cent comes from offshore sources in India s EEZ. The EEZ also The Indian Ocean is moreover the shortest route from manuaccounts for over 80 per cent of India s domestic natural gas profacturing economies of Asia s Pacific coast to export markets in duction which fulfils about 60 per cent of the domestic requireEurope and America s Atlantic coast. The Indian Ocean is thus ment the rest being imported. In 2015 India imported 226 mila crucial highway for international trade. nBarring few exceptions the Indian Ocean Region (IOR) is lion tonnes of coal surpassing China as the world s largest coal characterised by high levels of poverty and mistrust between importer sourcing from Indonesia South Africa and Australia. Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 3 ModerniSation oF the indian air Force The IAF is currently engaged in an unprecedented phase of modernisation and capability enhancement which can be witnessed across the capability spectrum. --Air Chief Marshal N.A.K. Browne (Retd) Dassault Aviation Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 113 REGIONAL BALANCE Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i n the wake of a rapidly growing must have combat aircraft with adeair MarsHal B.K. PandEy (rEtd) economy India has undoubtedly quate reach lethal firepower through emerged as a regional power and modern stand-off precision-guided hopefully with the new enlightened political leadership sup- munitions (PGMs) and stealth characteristics. It must have strateported by committed military and bureaucratic establishments gic airlift aircraft with the capability to move and deploy large forces the nation will succeed in fulfilling its aspirations to emerge as by air over long distances tactical transport aircraft to operate over a leader with credibility in the comity of nations and in due course shorter distances and support surface forces in battle as well as a aspire to be a superpower. fleet of helicopters to provide mobility and lethal firepower in the The growing status of the nation however is accompanied by tactical battle area. Two things follow from this one being that the enhanced responsibilities. As a regional power the nation must nation must possess multi-layered air defence system to protect its possess the capability of speedy and decisive military intervention offensive operations capability and the other that development of to safeguard her national security interests in areas that transcend aerospace power must not only cater to perceived threats but more our geographical boundaries extending from the Persian Gulf to the importantly must be capability-based to respond to a wide variety Strait of Malacca. As a superpower in the future India may be called of threats existing likely to arise in the future or unforeseen. upon to meet with commitments in distant lands outside the region transformation of the iaF wherein the Indian armed forces may be required to provide speedy response to man-made or natural calamities and provide humanitar- The IAF is currently embarked on comprehensive capital-intensive ian assistance employ military forces to restore order to ensure peace modernisation drive that is focused on all-round development of capability as opposed to re-equipping the force based merely on and stability or to project national power if the situation so demands. While economic strength is the main pillar of national power perceived threats. In the words of Air Chief Marshal N.A.K. Browne the military capability of a nation must grow in tandem to secure former Chief of the Air Staff The IAF is currently engaged in an its economic status and provide the environment for its further unprecedented phase of modernisation and capability enhancegrowth. This philosophy was echoed in October 2007 by Air Chief ment which can be witnessed across the capability spectrum. The Marshal Fali H. Major the then Chief of the Air Staff Indian Air effort by the IAF at modernisation has essentially been at transforForce (IAF) on the occasion of its platinum jubilee celebrations mation from a subcontinental tactical air force to an intercontinenwhen he said The emerging geopolitical and security scenario tal strategic aerospace power to cope with the vastly enhanced roles requires our nation to possess comprehensive military capability and responsibilities and to fulfill national aspirations as well as to characterised by flexibility and speed of response mobility and be prepared to take on the challenges of the evolving geopolitical transportability of all forms of national power long reach preci- and security scenarios. In the pursuit of these noble but challengsion targeting minimum collateral damage and reduced visibility. ing objectives the IAF has drawn up a comprehensive Long-Term Aerospace power fits the bill perfectly. The 21st century belongs to Perspective Plan (LTPP) to cover the period up to the year 2027 for aerospace power and given India s aspirations the need for a strong modernisation of its assets across the board. The modernisation plan of the IAF encompasses the entire range of hardware includand comprehensive aerospace capability is inescapable. Stated in simple terms the nation s air force must possess the ing its combat fleet transport aircraft rotary-wing fleet basic and capability to project power effectively in the region for which it advanced trainers as well as a variety of force multipliers. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 4 india S deFence bUdGet 2016-17 With the implementation of One Rank One Pension (OROP) and Seventh Central Pay Commission recommendations from 2016-17 there will be further increase in salary and pension. This in turn raises the question of desirability of manpower-led increase in defence budget from the pure military angle and the longterm sustainability of modernisation expenditure. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 119 REGIONAL BALANCE The long-used format for defence resource allocation has undergone a change in the budget of 2016-17. As per the new format MoD s total allocation is distributed into four demands in comparison to eight in earlier format (Table 1). It seems the intent is to rationalise the budget-making process and show the allocations provided to the three armed forces separately from the allocations made to other organisations under the MoD. As a result some of the organisations -- such as the Ordnance Factories (OFs) Defence Research and Development Organisation (DRDO) Director General Quality Assurance (DGQA) Rashtriya Rifles (RR) National Cadet Corps (NCC) Military Firms (MF) and Ex-Servicemen Contributory defence Budget vital statistics The change in budget format has brought in an element of incompatibility for the purpose of comparing the new budget with the previous budget. An attempt is made here to reconcile the new budgetary figures with the format used earlier. The reconciled figures are presented in Tables 2 and 3. As can be seen from Table 2 compared to the preceding year in 2016-17 the defence budget has witnessed a negligible growth of less than 1 per cent. However compared to the revised estimate (RE) of 2015-16 the growth in the new budget amounts to 11 per cent. The higher growth on the base of the RE means a downward revision of the original alloca- Get yoUr coPy to read in coMPlete ASIAN WHO S WHO Change in Format INDIAN DEFENCE BUSINESS t he Union Budget 2016-17 Health Scheme (ECHS) -- which earlier dr laxMan KuMar BEHEra presented to the Parliament shared their budget with the armed forces in February 2016 set aside budget are now made part of the Demand 3 40 921.98 crore ( 52.2 billion) for the Ministry of No. 20 of the new format. It is however to be noted that although Defence (MoD). In allocating the resources the union the new format brings certain clarity it at the same time poses a budget also made a key change in the long-established fundamental question regarding the components of India s defence format of resource allocation among the three defence forces budget. As per the earlier format the last six Demands (Nos. 22 to (army navy and air force) and other establishments under the 27) constituted what is commonly referred to as India s defence MoD. The change in format has however not changed the skewed budget (Demand Nos. 20 and 21 were part of the Defence [Civil nature of growth of MoD s allocation which has been dominated Estimates] and kept outside the defence budget). With the merger by the increases in manpower cost since the implementation of of the some of the organisations with the new Demand No. 20 it the Sixth Central Pay Commission (CPC) recommendations in seems logical to include the merged demand for the purpose of 2008-09. In fact the new budget has gone a step further in accom- estimating India s defence budget. This then would leave defence modating the increases in pay and pension at the cost of capital pension as the only demand to stay outside the defence budget. expenditure most of which is spent on modernisation. With the However keeping the defence pension outside the defence budget implementation of One Rank One Pension (OROP) and Seventh has not served any purpose. Rather bringing it to the purview of Central Pay Commission recommendations from 2016-17 there defence budget would provide the true picture of defence burden will be further increase in salary and pension. This in turn raises and subject it to the same degree of scrutiny as other elements of the question of desirability of manpower-led increase in defence the defence budget. Suffice to mention that pension was part of the budget from the pure military angle and the long-term sustain- defence budget till 1985-86 when it was taken out and put under ability of modernisation expenditure. the Defence (Civil Estimates) apparently due to the pressure from the international financial institutions. TECHNOLOGY CONCEPTS & PERSPECTIVES IAF WEAPONS EQUIPMENT VEHICLES CONTENTS 5 deFence oFFSetS in dPP 2016 India has already signed offset contracts worth 5 billion and offset deals worth 12 billion are in the pipeline. Thus the total offset inflow into India may amount to 17 billion. USAF a Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 123 REGIONAL BALANCE lthough defence As hitherto fore the policy will MaJor gEnEral Mrinal suMan (rEtd) offsets were introapply to all capital acquisitions duced in 2005 the categorised as Buy (Global) or objective was limited to promoting exports from the pub- Buy and Make However the offset threshold has been raised to . lic sector. Therefore the initial policy was totally loaded 2 000 crore. For determining application of offset provisions the in favour of the public sector to the extent that even the estimated cost of the acquisition proposal on the date of grant task of monitoring implementation of offsets was assigned to it. of acceptance of necessity (AoN) will be considered. Under Buy However under pressure from the private sector the Ministry of (Global) procurements the policy will apply to Indian firms or Defence (MoD) widened the scope of the policy in 2006 to include their joint ventures. any private defence industry manufacturing these products or avenues for discharge of offset obligations components under an industrial licence granted for such manufacture. It also allowed foreign direct investment (FDI) in Indian Foreign vendors can choose their Indian partners and discharge their offset obligations through any one or a combination of defence industry and defence R&D. It was a cosmetic change as no significant manufacturing activity the six specified methods. They include (a) direct purchase of was taking place in the private sector under licence. Industry associa- or executing export orders for eligible products manufactured tions continued their protests. Bowing to the pressure MoD removed by or services provided by Indian enterprises (b) FDI in joint the mandatory requirement of an industrial licence for private com- ventures with Indian enterprises (equity investment) for the panies in 2008. The policy has since been further refined in 2009 manufacture and or maintenance of eligible products and the 2012 and recently in 2016. Thus Indian policy is a product of evolu- provision of eligible services (c) investment in kind in terms of transfer of technology (ToT) to Indian enterprises for the manution and does not owe its origin to a well thought-through strategy. India has already signed offset contracts worth 5 billion and facture and or maintenance of eligible products and provision offset deals worth 12 billion are in the pipeline. Thus the total off- of eligible services (d) investment in kind in Indian enterprises in terms of provision of equipment through the non-equity route set inflow into India may amount to 17 billion. for the manufacture and or maintenance of eligible products salient aspects of the new offset Policy and provision of eligible services (e) provision of equipment The latest version of the offset policy appears in Defence and or ToT to government entities engaged in the manufacture Procurement Procedure 2016. Salient aspects of the new policy and or maintenance of eligible products and provision of eligihave been highlighted in the succeeding paragraphs. ble services including the Defence Research and Development Organisation (DRDO) and (f ) technology acquisition by DRDO objective in areas of high technology. There is no change in the objective of the defence offset policy. It A minimum 70 per cent of the offset obligation must be discontinues to leverage the capital acquisitions to develop Indian charged by any one or a combination of (a) (b) (c) and (d) above. defence industry by fostering development of internationally com- Where the discharge of offset obligations is proposed in terms of petitive enterprises augmenting capacity for research design and (d) the vendor will be required to buyback a minimum 40 per cent development related to defence products and services and encour- of the eligible product and or service (by value) within the peraging development of synergistic sectors like civil aerospace and missible period for discharge of offset obligations. The concept of internal security. value addition will apply only for direct purchase export of eligible Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 6 Make ProcedUre in dPP 2016 Forming a part of DPP 2016 the new Make procedure seeks to address the multiple objectives of self-reliance wider participation of Indian industry impetus for MSME sector sound implementation transparent execution and timely induction of equipment. SP Guide Pubns Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 127 REGIONAL BALANCE Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS P rior to the issuance of cent. The balance 20 per cent was MaJor gEnEral Mrinal suMan (rEtd) Defence Procurement to be contributed by the developProcedure 2006 (DPP ment agencies (DA). 2006) all proposals categorised by the Defence Acquisition As regards FICV the proposal was approved in 2008. The estiCouncil (DAC) as Make cases were handled by Defence mated cost was 1 00 000 crore for the total envisaged requirement R&D Board (Def R&D Bd). The Kelkar Committee exam- of 2 800 numbers. An expression of interest (EoI) was issued in ined the complete gamut of indigenous research design and 2010 to four vendors. However it was cancelled in 2012 because the development of defence equipment and recommended that the Ministry of Defence (MoD) could not decide on the parameters for Defence Research and Development Organisation (DRDO) should shortlisting of DA. A fresh EoI was issued in July 2015 to ten firms. concentrate only on projects requiring sophisticated technology of Reportedly Ordnance Factory Board has already been nominated strategic complex and security sensitive nature. It also suggested as a DA but the other nomination is awaited. Considering it to be outsourcing of R&D work of high technology to the private sector an unfair step the private companies are demanding an open and should be on the lines of parallel development on cost-sharing transparent competition. basis and a minimum order quantity to sustain the financial viabilThe estimated project cost of TCS was 2 billion ( 13 000 ity of development within the time schedule should be spelt out to crore). Two DA were shortlisted -- BEL and a consortium of L&T encourage private sector participation. Tata Power SED and HCL. The project has been facing a number of Consequent to the acceptance of the report of the Kelkar impediments. Most importantly the private sector wants tax conCommittee the government introduced the new procedure for pro- cessions at par with BEL and ownership of the intellectual property curements through indigenous development in DPP 2006. All indig- rights. It stands stalled. enous R&D projects are now required to be categorised as follows As both the above projects have made little progress MoD nStrategic Complex and Security Sensitive Systems. Projects realised the need to look at the Make procedure afresh. To start involving development of critical and security sensitive tech- with extra responsibilities had been assigned to a number of existnologies leading to next-generation weapon systems and plat- ing agencies and they were expected to fulfil them in addition to forms should be undertaken by DRDO. their normal charter of duties. As many functionaries tended to nHigh Technology Complex Systems. Projects under this cattreat Make duties as an add-on encumbrance it lost focus. Worse egory are identified as Make and should be based on proven most functionaries lacked technical expertise to handle developor matured technologies where fundamental research is not mental projects. required These projects should be undertaken by Indian indusEvery Make case had to pass through several agencies. try (both in public and private sectors) on a level playing field. Feasibility studies were prepared by the Headquarters Integrated This procedure should also be adopted for all upgrades catego- Defence Staff (HQ IDS) and approved by DAC. Acquisition Wing rised as Make . constituted Integrated Project Management Teams (IPMT) Under the Make category of DPP 2008 two major proj- but names of suitable companies for EoI were provided by the ects i.e. Futuristic Infantry Combat Vehicle (FICV) and Tactical Department of Defence Production (DDP) after their empanelCommunication System (TCS) were initiated for Indian entities. ment. IPMT shortlisted agencies after studying their responses but Both were to get government funding support to the extent of 80 per it was the Defence Production Board (DPrB) that selected two agen- TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 7 new deFence ProcUreMent ProcedUre -- SynerGy with Make in india During the last 13 years India has not been able to sign a single major defence contract in an open competitive environment under the provisions of the much trumpeted Defence Procurement Procedure. ndia adopted the current DPP 2016 focuses on institutionalMaJor gEnEral Mrinal suMan (rEtd) dispensation of defence acquiising streamlining and simplifying sition organisation structures defence procurement procedure and procedures in 2002. The stated aim was to ensure expedi- to give a boost to Make in India initiative by promoting indigtious procurement of the approved requirements of the armed enous design development and manufacturing of defence equipforces in terms of capabilities sought and time frame prescribed ment platforms systems and subsystems. by optimally utilising the allocated budgetary resources dem Make procedure has also been refined to ensure increased onstrate the highest degree of probity and public accountability participation of the Indian industry. Enhancing the role of micro transparency in operations free competition and impartiality and small and medium enterprises (MSMEs) in defence sector cutting to keep the goal of achieving self-reliance in defence equipment in down permissible time frames for various procurement activities mind. The objective remains unchanged to date. and institutionalising probity norms have also been given due During the last 13 years India has not been able to sign a importance. Some salient aspects of DPP 2016 have been highsingle major defence contract in an open competitive environment lighted hereunder. under the provisions of the much trumpeted Defence Procurement Categorisation of acquisition Proposals Procedure (DPP). Worse India has acquired the dubious distinction of being the largest importer of conventional weapons in the world. Capital acquisition schemes will be classified as Buy Buy and . In other words the present dispensation has been a total failure Make and Make Buy scheme refers to an outright purchase of both in managing acquisitions and in stimulating the indigenous equipment. It has three subcategories -- Buy (Indian-IDDM) Buy . defence industry. Despite the fact that DPP has been subjected to (Indian) and Buy (Global) Buy (Indian-IDDM) is a newly introduced category and relates six major reviews revisions no improvement has been discernible. An expert committee under Dhirendra Singh was constituted to the procurement of products designed developed and manufacon May 1 2015. The committee was tasked to evolve a policy tured in India with a minimum of 40 per cent Indigenous Content framework to facilitate Make in India in defence manufacturing (IC) on cost basis of the total contract value. Products which may and align the policy evolved with DPP 2013 and to suggest the req- not have been designed and developed indigenously also fall in this uisite amendments in DPP 2013 to remove the bottlenecks in the category provided they have 60 per cent IC. Buy (Indian) category refers to procurement of products from procurement process and also simplify rationalise various aspects of the defence procurement. DPP 2016 has been formulated with an Indian vendor having a minimum of 40 per cent IC on cost basis the experience gained by the government in the defence procure- of the total contract value. Buy (Global) category implies outright ment process and the recommendations of the Dhirendra Singh purchase of equipment from foreign or Indian vendors. In case of procurement through foreign vendors government-to-government Committee. It came into effect from April 2016. route may be adopted for equipment meeting strategic long-term salient aspects of the new Procedure requirements. DPP 2016 claims to strive to strike a balance between competing Buy and Make scheme means initial procurement of limited requirements such as expeditious procurement high quality stan- quantity in fully formed state followed by indigenous production dards and appropriate costs while maintaining highest standards through transfer of technology (ToT). Under this scheme the proof transparency probity and public accountability. With a view to curements are subcategorised as Buy and Make (Indian) and Buy achieve self-reliance in design development and manufacturing and Make . DRDO i Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 131 REGIONAL BALANCE Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 8 india S StrateGic and bUSineSS environMent The Ministry of Finance (MoF) Macro-Economic Framework Statement 2016-17 presented along with the budget on February 29 2016 states the Indian economy has emerged as a bright spot in the world economy becoming one of the fastest growing large economies in the world. US DoD Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 135 REGIONAL BALANCE Get yoUr coPy to read India China relations have been reasonably stable over the years in coMPlete india-China relations -- differences Emerge ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i ndia s strategic neighbourBrigadiEr raHul hood has represented a state of flux for many decades. The situation in the North and North West has further deteriorated as the China and Pakistan collusion infringes on the territorial sovereignty of India with the China-Pakistan Economic Corridor (CPEC) blatantly passing through Gilgit Baltistan a part of the Indian state of Jammu and Kashmir. Reports of presence of People s Liberation Army (PLA) in Gilgit-Baltistan have added to complexity of the regional security dynamics. This comes even as the violence in Afghanistan has seen an unprecedented increase in the past two years after the International Security Assistance Forces (ISAF) formally handed over responsibility to the Afghan Government in December 2014. Pakistan which had launched Operation Zarb-eAzb in June 2014 and celebrated success of the same many times since continues to face major terror attacks at increasing frequency. Political situation in Nepal remains tenuous as post Constitution transition to a federal structure has remained elusive with protests leading to major blockade in the South in the beginning of 2016. Myanmar is navigating the process of changeover from a junta-controlled democracy to a full-fledged electoral one and there is some way to go. Bangladesh has suffered from rising violent extremism in the recent past with a major terrorist attack which was inspired by the Islamic State of Iraq and the Levant (ISIL) in Holey Artisan Bakery in the Gulshan diplomatic zone in Dhaka on July 1 resulting in 20 hostages killed which included 18 foreigners. While Sri Lanka is gradually progressing on ethnic reconciliation China continues attempts for a comeback in Colombo posing challenges of regional balancing to the Sirisena Government in the country. Maldives is going through a political turmoil which leaves Bhutan as the only island of peace and stability in India s neighbourhood. Given these diverse political and security challenges India has continued with the policy of Neighbourhood First as a part of the overall India First pitch in diplomacy. Protection of strategic interests and mustering resources for greater prosperity BHonslE (rEtd) and development at home remains the principal foreign policy objectives. Regional and international partnerships are being used to advance domestic flagship programmes like Make in India Digital India Skill India or Smart Cities. The Neighbourhood First policy stresses on cooperation connectivity and greater people to people contacts. This has assumed importance in the highly uncertain political and security environment in the neighbourhood where India is expected to provide a degree of stability. To achieve the same instruments employed remain the traditional diplomatic tools -- high level visits strategic dialogues diplomatic parleys trade linkages development aid and assistance and defence and security cooperation. Counter terrorism has remained the main security focus diplomatically as the threat of cross border terrorism from Pakistan was once again underlined by the attack on the airbase in Pathankot in the night of January 1 2 2016 . At the international level India has been actively pursuing the objective of early conclusion of a Comprehensive Convention on International Terrorism in the United Nations. The government is determined to continue to support peace and stability in the region howsoever challenging through various political diplomatic and security tools. Be it encouraging connectivity through agreements such as the Bangladesh Bhutan India Nepal (BBIN) Transport network development and military assistance to Afghanistan opening connectivity linkages with Myanmar and through to South East Asia or conduct of maritime security patrols and establishing a surveillance network in the Indian Ocean. Success will be determined in managing the key challenges emanating from a rising and aggressive China and the political economic and security collusion with Pakistan. Manifestations of these trends in the strategic environment are being discussed as per succeeding paragraphs. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Global ContraCtS (From July 2015-September 2016) Contract Value 150 million Smart Vests 135 July 2 2015 Five-year period Product Project Quantity Date of Contract Date of Delivery Remarks Smart Vest programme includes wearable and protective systems for the soldier command and control systems specialised displays and C4I capabilities as well as support systems integrated in combat vehicles. This modification provides for the manufacture and delivery of five MV-22 tiltrotor aircraft pursuant to the variation in quantity clause in support of the Government of Japan. The contract is to support the US Navy s maritime MCM efforts. Recipient Supplier www.spsmilitaryyearbook.com 33 24 68 665 MV-22 tiltrotor aircraft 5 July 14 2015 June 2018 228 million Support the US Navy s maritime mine countermeasures (MCM) efforts F-35 Lightning II Joint Strike Fighter Medium Altitude Long Endurance (MALE) drones SOCOM-Wide Mission Support (SWMS) Joint Light Tactical Vehicle (JLTV) P-8A Poseidon Aircraft 13 17 000 August 18 2015 4 August 8 2015 2017 -- August 4 2015 December 2018 -- August 3 2015 -- 43 13 22 997 Lot IX F-35 Lightning II Joint Strike Fighter advance acquisition contract for the procurement of production non-recurring items. The contract includes four aircraft and two ground control stations -- one fixed and one deployable overseas. Five years The multiple award is an indefinite deliveryindefinite quantity vehicle. 2024 Oshkosh JLTV is 30 per cent lighter than the M-ATV while offering similar level of protection. 187 million 900 million 6.7 billion August 26 2015 1.49 billion August 28 2015 -- The order includes nine aircraft for the US Navy and four Poseidon aircraft for the Royal Australian Air Force (RAAF) a long-time partner to the US Navy on P-8A development. 2 293 10 August 31 2015 September 15 2015 November 30 2019 -- Foreign military sales contract (Afghanistan) for 2 293 medium tactical vehicles. The contract includes the first order of GMLRS alternative warhead production. 36 89 32 767 227 million Medium tactical vehicles Guided multiple launch rocket system (GMLRS) Unitary Support New Technologies for Ground Vehicles 634 million -- September 23 2015 -- The company is required to assist the army in researching and developing new technologies to ensure military ground systems can perform at optimum levels and address emerging threats. 1 Dutch Ministry of Defense Elbit Systems 2 US Navy Bell-Boeing Joint Project Office 3 US Navy Harris Corporation 4 US Navy Lockheed Martin Corp 5 Spanish Air Force General Atomics 6 US Special Operations Command Raytheon 7 US Army and US Marine Corps Oshkosh Defense company 8 US Navy Boeing 9 Afghanistan (US Army) Navistar Defense 10 US Army Lockheed Martin 2016 SP s Military yearbook 2017 44th issue 145 11 US Army Alion Science and Technology REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS www.spguidepublications.com Recipient 30 54 57 460 -- October 13 2015 Joint Air-toSurface Standoff Missile production Manufacture inspect and test Phalanx Close-in Weapon Systems (CIWS). Lot 38 full-rate production EA-18G aircraft Long Range Discrimination Radar (LRDR) -- October 27 2015 Nine years 15 October 26 2015 January 2018 -- October 23 2015 August 2018 The contract includes support equipment for the Phalanx and SeaRAM Weapon Systems Block 1B radar upgrades and kits for reliability maintainability and availability. June 30 2018 Contractor will provide Joint Air-to-Surface Stand-off Missile production system upgrades integration sustainment management and logistical support. Supplier Contract Value Product Project Quantity Date of Contract Date of Delivery Remarks buSineSS 12 US Air Force Lockheed Martin 13 US Navy Raytheon 159.9 million 2016146 SP s Military yearbook 2017 44th issue 14 US Navy Boeing 89 75 30 175 The contract is for the procurement of 15 Lot 38 full-rate production EA-18G aircraft and associated airborne electronic attack kits. The contract will see the team develop build and test the LRDR which will support a layered defence strategy to protect the US from ballistic missile attacks. Contract from the US Air Force for sustainment of the Kingdom of Saudi Arabia s F-15 sensor suite. The sensor suite includes Sniper advanced targeting pods (ATP) LANTIRN extended range (ER) navigation pods and infrared search and track (IRST) systems. 15 US Missile Defense Agency (MDA) 262 million F-15 sensor suite -- November 9 2015 -- Lockheed Martin 784 million 16 Saudi Arabia Lockheed Martin 17 United Arab Emirates Saab 1.27 billion Swing Role Surveillance System (SRSS) -- November 10 2015 -- The new SRSS for the UAE uses the Global 6000 aircraft from Bombardier as a platform. The SRSS is capable of simultaneous detection and tracking of multiple targets in the air on land and at sea. November 19 2015 2020 The full contract covers the design and remaining build test and commissioning activities on Anson the fifth of seven technologicallyadvanced submarines in the class. 18 UK Ministry of Defence BAE Systems 1.3 billion Astute Class submarine -- 19 China Russia 2 billion Su-35 fighter jets 24 November 19 2015 -- December 1 2015 -- Contract included the AL-41F-1S engine that powers the Su-35. Global ContraCts -- Modernises primary defence radar for navy carriers large deck amphibious assault ships advances capabilities against emerging threats reduces navy s cost of ownership. www.spsmilitaryyearbook.com 113 million To upgrade the Navy s primary longrange threedimensional defence radar 20 US Navy Harris Corporation Recipient 1 billion Engineering programme and systems services Standard Missile-3 (SM-3) Block IIA 17 December 9 2015 2018 The SM-3 Block IIA interceptor will dramatically expand the range and capability from the current SM-3 Block IA and IB interceptors enabling more mission flexibility on both Japanese and US Aegis ships. Lockheed Martin-led Team 21 to train the nextgeneration of Australian Defence Force pilots. The current order includes options to cover the additional 150 vehicles that could be acquired in a follow-on phase. The new Piranhas will replace the 450 M-113s currently in service. The deal stipulates that the company will supply the army with 77 POPRAD systems and will upgrade two others that had been delivered earlier. Contract for the advance procurement of long lead time materials parts components and effort to maintain the planned production schedule for F-35 low rate initial production lot 11 aircraft. 2020 Department of Defense announced the award of more than 1 billion in funding for the first 32 aircraft of the multi-year contract. -- The new interceptors will support a growing number of US Army THAAD units. January 4 2016 -- Contract to procure mission system equipment for the future USS Lyndon B. Johnson (DDG 1002). -- January 4 2016 January 3 2026 12 January 6 2016 -- Contract for T-38C avionics component integration and contractor logistics support. The Su-34 will continue to be improved based on combat experience and its capabilities will be expanded. These modifications could include additional electronic warfare (EW) intelligence surveillance and reconnaissance (ISR) and other capabilities added via external pods. -- December 1 2015 The deal also includes integrated logistics support contractor manpower reporting packaging handling storage and transportation as well as advance procurement funding services. Supplier Contract Value Product Project Quantity Date of Contract Date of Delivery Remarks Global ContraCts 21 US Department of Defense 543 million Sikorsky Aircraft www.spsmilitaryyearbook.com AU 1.2 billion AIR 5428 Pilot Training System Piranha 5 armoured personnel carriers (APCs) POPRAD Surface-to-Air Missile Systems F-35A aircraft 80 December 21 2015 December 2019 79 December 18 2015 -- 309 December 11 2015 2023 -- December 9 2015 Seven years 662 million PLN 1.08 billion ( 273 million) 1 17 12 06 489 1 billion C-130J Super Hercules THAAD system -- 32 December 30 2015 January 4 2016 528 million 255 million Mission system equipment T-38C aircraft -- 855 million Part of a 7.5 billion AlgerianRussian arms deal Su-34 22 US Missile Defense Agency (MDA) Raytheon 23 Australian Department of Defence Lockheed Martin 24 Danish military General Dynamics Land Systems Europe 25 Polish Army PIT-RADWAR 26 US Navy Lockheed Martin 27 US Department of Defense Lockheed Martin 28 US Missile Defense Agency Lockheed Martin 29 US Navy Raytheon 30 US Air Force Boeing Get your CoPy to reaD in CoMPlete INDIAN DEFENCE BUSINESS 2016 SP s Military yearbook 2017 44th issue 147 31 Algeria Russia REGIONAL BALANCE ASIAN WHO S WHO TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Contents One Two Three Four Five Six Seven Eight Integrated Defence Staff The Indian Army The Indian Navy The Indian Air Force Indian Coast Guard Who s Who in Indian Defence Indian Defence Industry Defence Research and Development 161 169 193 223 251 261 283 309 REGIONAL BALANCE Homeland Security One The Ministry of Home Affairs & Central Armed Police Forces Two India s Internal Security Challenges Three India s Coastal Security Four The Maoist Insurgency Who s Who Indian Home Ministry 317 331 341 345 348 ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Indian Defence CONCEPTS & PERSPECTIVES section four 4 WEAPONS EQUIPMENT VEHICLES CONTENTS 1 integrated defence Staff The Integrated Defence Staff (IDS) came into being in October 2001 with the merging of the Military Wing which was established at the time of independence and had functioned under the Cabinet Secretariat for a number of years till it came under the Chiefs of Staff Committee (COSC) with the Defence Planning Staff (DPS) the forerunner of the IDS. Part I OrganIsatIOnal DetaIls SP Guide Pubns S Abbreviations at the end of the yearbook BrIgaDIer VInOD ananD (retD) www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 161 REGIONAL BALANCE trengthening our military capabilities and internal security efforts are intricately linked with our broader political and economic objectives. If India has to survive as a modern and progressive nation that wishes to achieve its long-cherished goal of strategic autonomy defence and security reforms have to be ushered in at a faster pace than hitherto before. The Defence Planning Staff (DPS) was established in 1986 under the Chiefs of Staff Committee (COSC) when it became clear that future wars would be fought jointly by the three Services and that the time had come for jointmanship Working under the . COSC Chairman and headed by the Director General Defence Planning Staff (DGDPS) the DPS had under it directorates covering policy and plans international and regional security affairs weapons and equipment and financial planning. It also operated as a think tank for the COSC. The DPS was the forerunner to the Integrated Defence Staff (IDS) or what is called in some countries as Joint Staff. The IDS came into being in October 2001 with the merging of the Military Wing which was established at the time of independence and had functioned under the Cabinet Secretariat for a number of years till it came under the COSC with the DPS. After the Kargil War in 1999 the report of the Kargil Review Committee (KRC) headed by K. Subrahmanyam was examined by a Group of Ministers (GoM). They recommended the formation of the four task forces to review the national security system nManagement of Defence. nInternal Security. nBorder Management. nIntelligence Systems and Apparatus. The task force on the management of defence headed by Arun Singh recommended among other things the appointment of a Chief of Defence Staff (CDS) and the setting up of Headquarters Integrated Defence Staff (HQ IDS). Key goM recommendations After considering the report of the task force on the management of defence the GoM made the following key recommendations nIntegration of the Armed Forces Headquarters with the Ministry of Defence (MoD). nCreation of the posts of Chief of Defence Staff and Vice Chief of Defence Staff (VCDS). nSetting up of IDS to support the CDS. nEstablishing a Defence Intelligence Agency (DIA). nOrganising an Andaman and Nicobar Command (ANC). nCreation of a Strategic Forces Command (SFC). nEstablishing a Defence Procurement Board (DPB). nSetting up of an Indian National Defence University (INDU). nA number of other long-term recommendations on aspects concerning air space and maritime management budgetary reforms including performance budgeting private sector participation in defence production improvement in service conditions media handling and cost-effectiveness. All the recommendations except the one on the appointment of the CDS were accepted by the Cabinet Committee on Security (CCS) on May 11 2001. The decision about appointing a CDS was kept in abeyance pending consultations with other political parties. structure of Integrated Defence staff The CDS The responsibilities of the CDS who would be the permanent Chairman of the COSC were as follows nProvide single-point military advice to the Indian Government. get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 2 the indian arMy India s security environment encompasses a complex matrix of regional and global issues and challenges. India s strategic location and its growing global interactions require engagement on a range of issues that impact on national security with a view to securing vital national interests. Indian Army the regional security environment India s security environment encompasses a complex matrix of regional and global issues and challenges. India s strategic location and its growing global interactions require engagement on a range of issues that impact on national security with a view to securing vital national interests. The need to enhance preparedness to address consequences of instability and volatility in parts of the immediate and extended neighbourhood remains a key priority. At the same time there are renewed and successful efforts to build stronger defence partnerships with a wide range of friendly foreign countries to enhance international peace and stability. The security situation in India s immediate South Asian neighbourhood presents a mixed picture. While there was an improvement in the security and political situation in some countries political developments caused a worsening of the internal security situation in others. Terrorism insurgency and sectarian conflict increasingly threaten the stability of the region. Amidst ongoing efforts to impart fresh dynamism to strengthening relations with neighbours in a comprehensive manner cooperative security approaches are of immediate relevance to the region. India is committed to build security cooperation with all partners in the neighbourhood on the basis of equality mutual benefit and mutual respect. The Indian Ocean region (IOR) is central to India s growth and security. By virtue of its geophysical configuration as well as its strategic and economic imperatives India looks to the seas and oceans surrounding it. India s peninsular projection into the Indian Ocean region astride the vital sea lanes of the Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 169 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he Indian Army remains the last bastion that inspires confidence in all Indians. As a result Indian Army s role has gone far beyond national defence to also substantially address nation building. The Indian Army has to constantly prepare itself for multifaceted diverse challenges. The Indian Army is the largest standing volunteer army in the world. Its apolitical stance is at variance with armies of most of its neighbours in the subcontinent that has witnessed these armies often imposing their will on their people by eliminating legitimate democratic dispensations. India s land mass covers an area of 3.3 million square kilometres and is strategically located in continental Asia and in the Indian Ocean. Land borders extending more than 15 500 kilometres and a coastline totalling over 7 500 km make India a continental or maritime neighbour of 11 countries of Asia. India s maritime boundaries overlook three major shipping lanes. It is a home to over a billion people with varying ethnic linguistic religious and cultural background. The topography of India is diverse ranging from the snow-clad Himalayas with peaks over 28 000 feet in the north to deserts and vast fertile plains in the west high ranges and dense tropical forests in the east and maritime borders in the Bay of Bengal Arabian Sea and the Indian Ocean. To the south there are ranges close to the sea inland plateaus interspersed with river valleys coastal plains and far-flung island territories such as the Lakshadweep to the west and the Andaman and Nicobar Islands to the east. India is not only centrally located in South Asia but also abuts West Asia and South East Asia. India s location at the base of continental Asia and at the top of Indian Ocean provides it vantage point with respect to both Central Asia and the Indian Ocean region. The Andaman and Nicobar Islands located 1 300 km away from the nearest point on our East Coast assume strategic predominance with respect to the entrance to the Strait of Malacca through which more than 60 000 shipping vessels transit every year. In the Arabian Sea the Lakshadweep and Minicoy Islands situated on the sea lines of communication running eastwards from the Persian Gulf and the Red Sea are 450 km away from the nearest point on the West Coast. The island territories along with a long coastline extend India s territorial waters to more than 1 60 000 square km and the exclusive economic zone to more than two million square km. India is thus a maritime as well as a continental entity. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 183 REGIONAL BALANCE SP Guide Publications (SP s) Having taken over the reins of our illustrious Indian Army at the start of the new year 2017 and with a fairly reasonable tenure of three years you are in a position to make substantial changes within the force and in maintaining a cordial civil-military relationship. What will be your key result areas that you may have chalked out for yourself Chief of the Army Staff (COAS) The vision statement and thrust areas have been enunciated by my predecessor. I find these are all encompassing well defined and we need to continue with our efforts in realising these. An abrupt change would only cause confusion amongst the rank and file of the Army. These are reiterated as under nVision. Ensure capability enhancement and operational effectiveness of the Army to meet all contemporary and emerging challenges. nKey Result Areas Ensure the highest standard of operational preparedness to meet present and emerging challenges. Ensure force modernisation incorporating relevant contemporary technologies. Make up critical deficiency of weapons and equipment at the earliest. Develop requisite capacities and infrastructure with special emphasis on our northern and north-eastern borders. Enhance inter-Services jointmanship at all levels in letter and spirit. Ensure the highest level of security consciousness amongst our rank and file. Optimally enhance human resource development to fully exploit the inherent strength of the Indian Army. Improve the quality of life and living conditions of all ranks with special emphasis on the soldier. Foster an organisational climate based on mutual respect and camaraderie amongst all ranks. Ensure requisite welfare measures for ex-servicemen and Veer Naris. SP s The external threats and challenges to India s sovereignty are evolving at a rapid rate and the nature of wars has changed. As you have seen these developments taking place in your service in the Army what do you think should be done to arrest the decline and to restore the Army s modernisation status In your view which are the priority areas for modernisation COAS Army is doing its best to expedite the procurement and maximise operational readiness. We have set achievable targets and we are making steady progress. In-house measures have been initiated to reduce procurement timelines. These include strengthening of the procurement organisations ensuring concurrent procurement activities faster decision making and establishment of a robust monitoring mechanism. With concerted focus and special impetus on indigenisation as reflected in the Defence Procurement Procedure (DPP) 2016 the situation will improve in the coming years. Government has implemented several policy initiates such as liberalisation of FDI policy and industrial licensing policy simplification of export procedures creating level playing field for Indian private and public enterprises streamlining of offset implementation process and providing preference to Buy (Indian) Buy and Make (Indian) categories of capital acquistion over Buy (Global) category in DPP to make the country self-reliant in defence production. The Indian Army has identified 24 priority proposals which are critically required the procurement for the same is being pursued on fast-track basis with support from the government. Broadly these schemes address modernisation of our mechanised fleet night enablement replacement of aviation assets and empowerment of the soldier by improving battlefield transparency and facilitating decision making process. I am quite satisfied with the progress. With much coordinated effort we have been able to ink the contract for procurement of 145 ULHs (ultra light howitzers). We have also initiated a large number of cases which are at trial or GS evaluation stage. Overall I think we are moving well. Minor glitches will always be there and those have to be overcome. Abbreviations at the end of the yearbook get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY general Bipin rawat took over as the new Chief of the Army Staff on January 1 2017. He gave his candid views on a wide range of subjects and the major challenges confronting the Indian Army and how these are being tackled institutionally. CONCEPTS & PERSPECTIVES interview chief of the arMy Staff Indian Army WEAPONS EQUIPMENT VEHICLES CONTENTS indian defence eqUiPMent catalogUe indian arMy Insas 5.56mm assault rifle (the serial production was started in 1994) Characteristics Calibre (mm) 5.56 Muzzle velocity (m s) 900 Length of rifle (mm) without bayonet 960 With bayonet 1 110 Weight of rifle without magazine & bayonet 4.15 Effective range (m) 400 Range for grenade (m) Multi-mode 200 M 36 150 Magazine capacity (rounds) 20 Cyclic rate (rounds min) 600 to 650 Trigger pull 2.10 to 4.00 Recoil energy (joules) 4.43 Rifling 6 grooves R.H 1 in 200mm. Sight Fore sight Post Type Rear sight Aperture type Type of fire Single 3 Round Burst excalibur rifle Under testing and may be used as an interim measure The Excalibur is a fully automatic rifle which fires 5.56mm ammunition and is an upgraded version of the current INSAS (Indian National Small Arms System) which was inducted in the mid-1900s but had a troubled history all along. The Rifle Factory Ishapore has produced 15 prototypes with modifications based on user feedback on reliability weight length compatibility with international sights aesthetics etc. and has been evaluated by users at the Army s Infantry School at Mhow Ordnance Factory Board (OFB) officials said. The army has been attempting to procure a new standard issue assault rifle for a decade. Recently the overambitious tender for rifles with interchangeable barrels was cancelled after a fouryear process as no vendor could meet the requirements. After that the army decided to go for 7.62mm calibre and new Staff Quality Requirements are being drawn up. Army officials said that due to this decision Excalibur is unlikely to be adopted as the standard issue in the current form but stated that its user trials and the process for a new rifle would continue simultaneously. There are a large number of INSAS rifles which need replacement and repairs. They need to be maintained till the new process is completed. So Excalibur can be certified and used to replace the INSAS till the new rifles are procured a senior officer observed. MBts t-90s third generation russian battle tank entered service in 1993 Characteristics Crew 3 Cbt weight 46.5 tonne Width over tracks 3.37 m Height (over turret) Roof 2.23 m Engine V-84MS four-stroke 12-cylinder multifuel diesel engine developing 840 hp Road range 550 km Armament and Ammunition Main 1 x 125mm SBG which fires an ATGM as well as conventional ammunition. Has a laser range finder and thermal imaging night sight [43 (22 - in autoloader) rounds] Coaxial 1 x 7.62mm MG (2 000 rounds) AA 1 x 12.7mm MG (300 rounds) Main gun rate of fire 8 rounds min Cbt Improved t-72M-1 (ajeya) is an improvement of second generation main battle tank t 72 which enterd service in 1971 Characteristics Crew 3 Cbt weight 43.5 tonne Height (turret roof ) 2.19 m Engine Up rated V46-6 engine a 12-cylinder 4-stroke V 60 turbocharged watercooled multi-fuel direct injection engine developing 1 000 hp at 2 000 rpm. Power to weight ratio 22.98 hp tonne Max speed (on road) 60 kmph Max speed (Cross country) 35 to 45 kmph Gradient ability 60 Vertical obstacle 850mm Trench crossing 2.6 to 2.8 m Shallow fording 1.2 m Armament Main 1 x 125mm SBG coaxial 1 x 7.62mm MG AD 1 x 12.7mm MG Elevation depression 16 to -6 Traverse 360 Max range 3 km Main gun rate of fire 8 rounds min Ammunition loading Auto Ammunition stowage 44 projectiles charges Note Other improvements include explosive reactive armour www.spguidepublications.com 2016186 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com eqUIPMent CatalOgUe InDIan arMy integrated fire detection and suppression system and GPS. t-55 (Up gunned) (Inducted in the army in 1970 it played a key role in 1971 war with Pakistan) Characteristics Crew 3 Cbt weight 43 000 kg Height 2.26 m Armament Main 1 x 105mm rifled bore gun Coaxial 1 x 7.62mm PKT MG (2 000 rounds) AA 1 x 12.7mm NSV M (2 800 rounds) Main gun ammunition 43 rounds x APDSFS HEAT HESH Engine V-2-55 V-12 diesel rated at 600 bhp Speed 50 kmph (max) Range 500 km Armour 140mm arjun third generation main battle tank designed by DrDO entered service in 2004 Characteristics Crew 4 Cbt weight 58.5 tonne Overall length 10.638 m (with gun forward) Overall height 3.03 m (with AD gun mount) Overall width 3.864 m Ground pressure 0.85 kg cm Armament Main 1 x 120mm Rifled gun AA 1 x 12.7mm MG Coaxial 1 x 7.62mm MG Main gun ammunition 39 rounds (HESH FSAPDS) Main gun rate of fire 6-8 rounds minute Fire control Director type & electro-hydraulic system & gun control Night vision Thermal imaging Ballistic computer Digital Engine MTU 838 Ka 501 10-cylinder liquid cooled diesel developing 1 400 hp at 2 500 rpm Transmission 4 Fwd 2 rev Torque converter Mech. Lockup clutch & hydrodynamic retarder Steering Double radii Mechanical steering with neutral turn Suspension Hydro-gas Fuel Renk transmission DHPP (A) Track Diehl L-German Max speed Road 70 kmph Cross country 40 kmph Shallow fording 1.4 m Vertical obstacle 0.914 m Trench crossing 2.43 m Gradient 35 arjun Mk II an order for 124 additional arjun Mk II was placed on august 9 2010 These tanks will have substantially upgraded capabilities of firepower mobility and protection. The Mk II variant is supposed to have nearly 89 improved features over the previous version Infantry fighting Vehicles (IfVs) recce Vehs BMP-1 2 Characteristics Crew Weight Length Width Height Armament ATGW Engine Speed BrDM-2 Characteristics Crew Weight Armament Engine Speed Range Armour artillery 4 7 000 kg 6 x AT-3 [ATGM]1 x 14.5mm KPVT HMG (500 rounds) 1 x 7.62mm PKT MG coaxial (2 000 rounds) GAZ-41 V-8 water-cooled petrol developing 140 hp at 3 400 rpm Land 100 kmph Water 10 kmph 750 km 14mm www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 187 REGIONAL BALANCE 130mm M-46 Med gun Characteristics Crew Calibre Weight (travelling position) Elevation depression Traverse Projectile weight MV 8 130mm 8 450 kg 45 to 2.5 50 (total) 33.4 kg 930 m sec get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS Range Armour BMP-1 3 8 BMP-2 3 7 BMP-1 12 500 kg BMP-2 14 300 kg BMP-1 6.74 m BMP-2 6.735 m BMP-1 2.94 m BMP2 3.15 m BMP-1 2.18 m BMP2 2.45 m Main gun BMP-1 1 x 73mm SBG (40 rounds) BMP-2 1 x 30mm Auto Cannon (500 rounds) Coaxial (Both) 1 x 7.62mm PKT MG (1 000 rounds) BMP-1 AT-3 BMP-2 AT-5 V-16 in line water-cooled diesel rated at 300 bhp BMP-1 Land 65 kmph Water 7 kmph BMP-2 Land 65 kmph Water 7 kmph 550-600 km (both) 20mm TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES including more than 15 major technology upgrades. The development of Arjun Mark II has commenced and limited technical trials incorporating the improvements have been carried out. The project has been delayed and production is likely to take another few years. Firing anti-tank missile from the tank has not proved successful and is a major reason for delay. CONTENTS 3 the indian navy As India advances technologically the Indian Navy is conscious of the need for greater focus on modernisation of electronic and cyber warfare capabilities satellite communication systems and establishing the architecture for network-centric operations including an effective intelligence surveillance and reconnaissance capability for ensuring effective maritime domain awareness in its primary area for interest. Indian Navy Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 193 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS a s India advances technologically the Indian Navy is conscious of the need for greater focus on modernisation of electronic and cyber warfare capabilities satellite communication systems and establishing the architecture for network-centric operations including an effective intelligence surveillance and reconnaissance capability for ensuring effective maritime domain awareness in its primary area for interest. Historically the roles of navies worldwide can be said to comprise the military constabulary diplomatic and benign. The military role encompasses deterrence against war or intervention obtaining a decisive military victory in case war does take place security of India s territorial integrity citizens and offshore assets from seaborne threat (these could be from non-state actors also) influencing affairs on land safeguarding India s mercantile marine and maritime trade and safeguarding India s national interests and maritime security. The constabulary role shared in part with the Coast Guard includes all aspects of coastal defence exclusive economic zone (EEZ) security and maintaining good order at sea. The diplomatic role encompasses strengthening political relations and goodwill strengthening defence relations with friendly states portraying a credible defence posture and capability strengthening maritime security in the Indian Ocean region and promoting regional and global stability. The benign role encompasses promoting civil safety and security and projecting national soft power. The Indian Navy s responsibilities encompass all the roles described above. The Indian Navy is responsible for safeguarding of a wide spectrum of the country s maritime interests comprising a coastline of 7 516.6 kilometres and an EEZ of over 2 million square kilometres which is expected to increase to over 3.2 million sq km after the inclusion of the extended continental shelf for which India s claim is pending resolution at the UN Convention on the Law of the Seas. In its EEZ the country has sovereign rights to explore and exploit economic assets without encroachment or hindrance from others. The country s overseas trade is more than 513.5 million tonnes over 95 per cent of which by volume and 77 per cent by value moves through the medium of the sea to and from 13 major ports and dozens of smaller ones on either coast. India has islands on both seaboards. To the east more than 1 040 kilometres from the Indian mainland are the Andaman and Nicobar Islands stretching 720 kilometres from north to south. The southern-most of these islands is only 145 kilometres from the western tip of the Indonesian archipelago while in the north Myanmar (Coco Islands) lies only 35 kilometres away. To the west about 200 kilometres from the mainland are the Lakshadweep group of islands occupying a strategic location astride vital international shipping lanes. Other maritime interests include offshore oil and gas production sites on both the West and the East Coasts fishing and its regulation the ocean mining site of 75 000 square kilometres in the Central Indian Ocean Basin and interests in Antarctica. India s merchant marine is close to 10.5 million tonnes gross registered tonnage (GRT) comprising over 1 150 ships. The country shares maritime boundaries with seven Indian Ocean littoral states. Another example of the importance of the sea is India s current oil consumption which was 3.1 million barrels per day (bbl d) in 2010 and is likely to rise to 5.3 million bbl d by 2025. Domestic production was 0.75 million barrels per day and is projected to increase marginally. This will mean a substantial increase in oil imports touching 80 per cent of total consumption. Most of this will come by the sea route. Any stoppages or even interruptions will inevitably have a crippling effect on the economy. Thus India is truly a maritime nation and the sea is critical to its survival and prosperity. It is the role of the Indian Navy to ensure that these interests are adequately safeguarded in peace and in war. The Navy will hopefully in the very near future provide the third leg of the nuclear triad which India seeks to TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 201 REGIONAL BALANCE SP Guide Publications (SP s) Heartiest congratulations on taking over the helm of the Indian Navy. What is your vision on taking Indian Navy further forward on higher growth trajectory and capability augmentation to emerge as one of the biggest and reckonable naval forces in the world Chief of the Naval Staff (CNS) India is a maritime nation and history is replete with examples that unhindered use of the seas is critical for national prosperity. Over the years the Indian Navy s endeavour has been towards creating and sustaining a combat ready technology enabled and networked force capable of safeguarding our maritime interests and projecting appropriate maritime power in our areas of interest. In line with our vision today the Indian Navy is a Blue Water Navy deploying a balanced force of modern assets in all the three dimensions capable of progressing operations in the Indian Ocean Region and beyond. To protect our offshore and coastal assets the Navy has a variety of Offshore Patrol Vessels (OPVs) and other smaller craft such as the Fast Attack Craft (FAC) Immediate Support Vessels (ISVs) and Fast Interceptor Craft (FIC) that operate in close coordination with various Central and State agencies to strengthen this critical area. Our Navy s asset induction projects are being progressed as per our perspective plan and a number of ships submarines and aircraft would be inducted over the next few years and would significantly boost our capabilities. These include the first Indigenous Aircraft Carrier (Vikrant) destroyers frigates landing platform dock corvettes offshore patrol vessels and cadet training ships to name a few. The years ahead would also see the growth of submarine fleet with induction of the Scorpene class submarines. The Indian Navy also plans to induct aircraft including additional P-8I long-range maritime reconnaissance aircraft Dornier medium-range maritime reconnaissance aircraft medium-range helicopters naval utility helicopters and advanced light helicopters to bolster its Naval Air Arm. The Indian Navy would also continue to operate a variety of remotely piloted aircraft. In tandem with induction of our assets we are augmenting our infrastructure for support maintenance and training. We have given particular attention towards enhancing awareness amongst the youth with regard to the Navy as a career option and this is bearing desired results. After all it is the men and women behind the machine which make Indian Navy one of the finest services. SP s Being a naval thoroughbred groomed over 38 years you have emerged as a forthright and most competent naval commander. As the Chief of the Naval Staff what would be your message to All Hands in the Navy on their conduct and the roles and responsibilities that the nation has assigned to the Indian Navy as a whole CNS It is indeed a singular honour to take over the helm of our very fine service. Today Indian Navy is the prime manifestation of maritime power of our great nation. The seas and oceans around us are not only the lifelines for domestic and international trade but also render themselves as a rich source of natural resources. Our economic growth development and energy requirements are very largely dependent on the oceans. There is a growing realisation of the importance of the seas and therefore it is no surprise that there is a resurgence of maritime interests in our country. Maritime security is accordingly high on our national security agenda. The Indian Navy remains fully aware of the responsibilities that are bestowed upon it by the nation and is maintaining a steady watch. Our processes are aimed at being operationally ready at all times capable for deployment across all spectrums of tasks. We are providing contemporary training to our personnel so that they retain their operational edge. Our maintenance philosophy ensures that we have optimum availability of assets. Finally our support mechanisms and welfare measures are implemented in a manner so that our personnel can stay fully focused on their professional roles. I have implicit faith in the abilities of our personnel who are our greatest strength and enablers. Our personnel are well trained highly capable motivated and thorough professionals to shoulder the responsibility of safeguarding the nation s maritime frontiers and our national interests in the Indian Ocean and beyond. Our Abbreviations at the end of the yearbook get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY admiral sunil lanba the Chief of the Naval Staff holistically addressed a wide range of contemporary maritime and security related issues in an exclusive interview with SP Guide Publications team. Details of the interaction are as follows CONCEPTS & PERSPECTIVES interview chief of the naval Staff Indian Navy WEAPONS EQUIPMENT VEHICLES CONTENTS eqUiPMent catalogUe indian navy submarines shishumar Class type hDW type 209 1500 Indian Designation Shishumar Class Total No. in Service 4 Names Shishumar Shankush Shalki Shankul Specifications Displacement (tonnes) Full Load 1 700 Dived 1 850 Dimensions length overall (metres) 65 Beam 8 Propulsion Diesel-electric 4MTU 12V 493 AZ80 GA31L diesels 4 Siemens alternators 1 Siemens motor 1 shaft Speed (knots) 22 Range (miles) 8 000 Snorting at 8 knots 13 000 Surfaced at 10 knots Complement 36 (8 officers) Torpedoes 8 Nos. 21 inch (533mm) tubes. S m carries 14 AEG SUT Mod 1 wire-guided active passive torpedoes homing to 28 km at 23 knots 12 km at 35 knots warhead 250 kg. Mines External strap-on type for 24 mines Countermeasures Decoys C303 acoustic decoys ESM Argo Phenix II AR 700 or Koll Morgen Sea Sentry radar warning ESM-DR 3000 Weapon Control Singer Librascope MKI CCS 90-1 ISUS Radars Surface Search Thomson-CSF Calypso I-Band KH 1007 2007 Sonars Atlas Elektronik CSU 83 active passive search and attack Thomson Sintra DUUV-5 passive ranging and intercept CSU 90-14 Programme HDW concluded an agreement with Indian Navy on December 11 1981. The first two submarines were built in West Germany and commissioned in 1986. The next two were built at the Mazagon Dock Limited (MDL) Mumbai with supply of material package from HDW and commissioned in 1992 and 1994 respectively. The submarines form the 10th Submarine Squadron based at Mumbai. Midlife refit-cum-modernisation of the class has been undertaken in a progressive manner starting with Shishumar in 1999. sindhughosh (Kilo) Class (Project 877 eKM 8773) Indian Designation Sindhughosh Class Total No. in Service 10 Names Sindhughosh Sindhudhwaj Sindhuraj Sindhuvir Sindhuratna Sindhukesari Sindhukirti Sindhuvijay Sindhurakshak Sindhushastra Displacement (tonnes) 2 300 surfaced 3 100 dived Dimensions (metres) 73.0 x 10.0 x 6.6 Propulsion 2 Model 4-2AA-42M diesels 2 generators 1 motor 1 shaft 2 MT-168 auxiliary motors 1 economic speed motor Speed (knots) 17 Range (miles) 6 000 at 7 kt snorting 400 at 3 kt dived Complement 68 (7 officers) Torpedoes 6-21 in (533mm) tubes combination of Type 53-65 passive wake homing to 19 km (10.3 n miles) at 45 kt TEST 71 ME anti-submarine active passive homing to 15 km (8.1 n miles) at 40 kt or 20 km (10.08 n miles) at 25 kt warhead 220 kg. Total of 18 weapons. Wireguided torpedo on two tubes. Other Weapons Mines 24 DM-1 in lieu of torpedoes some submarines carry shoulder held SA-N-10 Igla SAM launcher placed in fin for use on surface. Countermeasures ESM squid head radar warning Porpoise (Indigenous) Weapon Control Uzwl MVU-119EM TFCS Radars Navigation Snoop Tray MRP-25 I-Band Sonars MGK-400 and MGK-400 E hull mounted active passive search and attack medium frequency. MG-519 hull mounted active search high frequency. Being replaced by Sonar USHUS manufactured by BEL Bengaluru fitted as five EKM and in a progressive manner on submarines. Programmes The Kilo class was launched in the former Soviet Navy in 1979 and India www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 205 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS indian defence was the first country to acquire these between 1993 and 2000. Indian Navy procured 10 submarines of this class from Russia. This class of submarine has since been supplied to Algeria Poland Romania Iran and China. First four form the Eleventh Submarine Squadron based at Visakhapatnam and the remaining six comprise the Twelfth Submarine Squadron based at Mumbai. The submarines have progressively undergone midlife modernisation refits commencing 1997 which includes installation of the Klub cruise missile and the associated Lama fire control system new sonars electronic warfare systems machinery control systems and an automated information and control system for the weapon package. Sindhuvir was the first to go through this refit at Severodvinsk from 1997-99 followed by Sindhuraj and Sindhukesari at Admiralty Shipyard St Petersburg from 19992001. Sindhuratna Sindhughosh Sindhuvijay and Sindhurakshak have been refitted at Severodvinsk from 2001-03 2002-05 2005-07 and 2010-12 respectively. Sindhukirti has recently completed extensive refit to the same standard at the Hindustan Shipyard Limited (HSL) Visakhapatnam. The last two submarines are expected to be refitted at Visakhapatnam. One submarine is expected to be fitted out with BrahMos cruise missiles the surface version of this Indo-Russian 290-km-range supersonic missile. eqUIPMent CatalOgUe InDIan naVy Operational late 2005. The contract envisages construction at MDL with transfer of technology from DCN France. The first submarine is expected to be delivered by early 2017 and thereafter one boat every year to complete delivery by 2021. Design consideration provides special attention to stealth features with the hull forms the sail and the appendages specifically designed to produce minimum hydrodynamic noise. Armed with Exocet SM 39 anti-ship missile the Scorpene also offers advanced capabilities for mine warfare intelligence gathering and special operations. arihant Class (ssBn) Dimensions Length 112 m (367 ft) Beam 15 m (49 ft) Draft 10 m (33 ft) Displacement (tonnes) 6 000 Propulsion PWR using 40 per cent enriched uranium fuel (80 MWe) one turbine (1 11 000 hp 83 MW) one shaft one 7-bladed high-skew propeller (estimated) Range Unlimited except by food supplies Speed 12-15 knots surface 24 knots dived Test Depth 300 m (980 ft) (estimated) Complement 95 Sensors and Processing Systems BEL USHUS Integrated Sonar Indigenous Sonar and tactical weapons control system with active passive ranging surveillance and intercept sonars and underwater communication system. Armament 6 x 533mm torpedoes 12 x K-15 Sagarika SLBM (range 750 km 8 MIRV each) or 4 x K-4 Shaurya SLBM (range up to 3 500 km) Launched July 26 2009 Status Undergoing sea trials Programme Arihant s reactor turned critical in mid-August 2013 and the extensive sea trials phase is currently on. Arihant is expected to be commissioned during 2017. The second submarine of the class reportedly named INS Aridhaman has been launched. Two more submarines of this class are expected to follow. Chakra (ssn) Indian Designation Chakra Class Name Chakra Displacement (tonnes) 8 140 surfaced scorpene Class (Project 75) Displacement (tonnes) 1 668 dived Dimensions (feet metres) 217.8 x 20.3 x 19 (66.4 x 6.2 x 5.8) Main machinery Diesel-electric 4 MTU 16 V 396 SE84 diesels 1 Jeumont (metres) Schneider motor 1 shaft Speed (knots) 20 dived 12 surfaced Range (miles) 550 at 5 kt dived 6 500 at 8 kt surfaced Diving Depth More than 300 m (984 ft) Complement 31 (6 officers) Torpedoes 6-21 in (533mm) tubes Countermeasures ESM Weapons Control UDS International SUBTICS Radars Navigation Sagem I-Band Sonars Hull mounted passive and attack medium frequency Programme Project 75 negotiations for construction of six submarines in India were completed and contract concluded in www.spguidepublications.com 2016206 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com eqUIPMent CatalOgUe InDIan naVy Dimensions (metres) Main machinery Speed (knots) Complement Missiles Torpedoes Countermeasures Radars Sonars Missiles Sensors www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 207 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO Centaur Class Indian Designation Total No. in Service Specifications Displacement (tonnes) Dimensions (metres) Armament Viraat 1 Standard 23 900 28 700 (full load) 226.9 x 48.8 x 8.8 Up to 30 aircraft including Sea Harriers FRS 51 Helos Sea Kings 42B 42C Chetak Ka-31 Ka-28 SAM 16 cell Barak VLS Guns 2 x Bofors 40mm Air Search RAWL-2 Air Surface Search RAWS-8 Navigation 2 x BEL Rashmi FCS EL M 2221 STGR for Barak SAM INDIAN DEFENCE aircraft Carriers BUSINESS TECHNOLOGY SAM 113.3 x 13.6 x 9.7 1 OK 650B OK 650M nuclear PWR 190 MW one OK-7 steam turbine 43 000 hp(m) 2 OK 300 retractable electric propulsors for low speed and quiet manoeuvr ing 750 hp(m) (552 kW) 1 shaft 28-35 dived 10 surfaced 90 (23 officers) SLCM SSM Klub S 3S 54E (antiship) 3S 14 E (Land attack) NATO SS-N-27 fired from 21 in (533mm) torpedo tubes. The anti-ship version is a sea-skimmer with 200 kg warhead 200 km range flight altitude of 15 ft and supersonic terminal speed (2.9 Mach) in the final stage. The land-attack missile is inertially guided subsonic (0.8 Mach) has a range of 275 km and a 400 kg warhead. SA-N-10 Igla M launcher on sail. 18 missiles A S Type 40 torpedo. Novator SS-N-16 Stallion fired from 650mm tubes inertial flight to 100 km (54 n miles) 8 x 21 in (533mm) tubes. Total of 40 weapons. ESM Rim Hat intercept. Surface search Snoop Pair or Snoop Half with back-to-back aerials on same mast as ESM. Shark Gill (Skat MGK 503) hullmounted passive active search and attack low medium frequency. Mouse roar hull-mounted active attack high frequency. Skat 3 towed array passive very low frequency. FCS Plessey Type 904 for guns 1 x FT-13 Tacan EW C Pearl system Ex Israel BEL Ajanta ESM Indigenous Kavach system Main machinery Engines 2 Vickers Armstrong Turbine 2 shafts 76 000 shp Boilers 4 Admiralty drum type Speed (knots) 24 Range 6 500 miles Complement (crew) 1 350 (43 officers) Note The ship has a 12 ski jump for the Sea Harrier and can carry 750 troops in a commando carrier role. She has four LCVPs to land them. Originally commissioned as HMS Hermes in 1959 she was acquired by India in 1986 extensively refitted at Davenport Dockyard in UK and commissioned into the Indian Navy in 1987. She has since been given numerous refits to extend her life but is cxpected to be decommissioned in 2017. Sea Harriers FRS51 have since been decommissioned. Kiev Class (Project 11430) Class Modified Kiev Class (Ex Admiral Gorshkov) Name Vikramaditya Displacement (tonnes) 45 400 full load Dimensions (metres) 283.1 x 51 x 10.2 Propulsion 8 KWG 4 boilers 4 GTZA674 turbines 4 shafts 1 40 000 hp Speed (knots) 32 Range (nautical miles) 13 500 at 18 kt Complement 2 000 including aircrew Missiles Barak or modified Barak SAM System sensor package likely Guns 8 CADS-N-1 Kashtan CIWS firing 10 000 rounds per gun range 500 to 4 000 metres. Countermeasures Decoys 2 Pk 2 chaff launcher. 2 towed torpedo decoys ESM ECM Intercepts and Jammers Combat data system Lesorub 11434 Fixed-wing aircraft up to 24 MiG-29K Helicopters 6x Westland Sea King 42A 42B or 10 x Ka-28ASW Ka-31 AEW or HAL Dhruv Programme Originally built as Baku the carrier commissioned in the Soviet Union Navy in 1987 and served till 1996. Purchased by India in January 2004 and extensively refitted at Sevmash Shipyard involving stripping away weapons and missiles from the fore deck and converting the ship from a hybrid carrier cruiser to a pure STOBAR carrier with a 14.3 ski jump and three arrestor wires. The ship was commissioned in November 2013. Modernisation New propulsion power and air-conditioning system retrofitted. All original CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 4 Dassault Aviation the indian air force Over the years the Indian Air Force has grown from a tactical to a strategic force capable of protecting national security interests that extend from the Gulf to the Strait of Malacca. t Abbreviations at the end of the yearbook early history The IAF was formally established on October 8 1932 the date on which the first batch of officers was commissioned. On April 1 1933 A Flight of No. 1 Squadron was raised at Drigh Road Karachi now in Pakistan with four Westland Wapiti aircraft and was manned by six officers and 19 airmen. The fledgling IAF saw action for the first time in 1937 during operations in the North West Frontier Province. By June 1938 the Squadron was built up to full strength with three flights of three aircraft each 16 officers and 662 airmen. During World War II in response to the Japanese pre-emptive strike on Pearl Harbour and Malaya No. 1 Squadron with 12 Westland Lysander aircraft was moved to Burma on February 1 1942. When Rangoon fell to the Japanese in April 1942 the Squadron was relocated at Risalpur and converted to Hawker Hurricane fighters. The IAF expanded rapidly growing to nine squadrons by the end of 1944. Redeployed in Burma the IAF played a major role in the Arakan offensive which began in December 1944. In March 1945 recognition of their outstanding performance the IAF was renamed as Royal Indian Air Force (RIAF). In 1946 RIAF squadrons began to convert to the Hawker Tempest II which has been called the IAF s first true fighter bomber The first RIAF transport unit No. 12 Squadron was also . formed with Douglas C-47 Dakotas. When India attained independence on August 15 1947 some RIAF units were transferred to Pakistan. The RIAF was left with www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 223 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS he Indian Air Force (IAF) the fourth largest in the world today is the primary instrument available to the nation for the projection of air power. While in peacetime the IAF is responsible for the security and integrity of the national air space with the capability of providing swift and decisive response it plays a central and critical role in war. The potential of air power to influence the outcome of war has been amply demonstrated in the Middle East and Afghanistan. In the Indian context the IAF played a critical role in the conflict with Pakistan in 1999 over Kargil. Nos. 3 4 7 8 and 10 Squadrons equipped with Tempests No. 2 Squadron with Spitfires and No. 12 Squadron with Dakotas. Post-independence on October 27 1947 the RIAF undertook an emergency task with Dakotas to airlift Indian forces into Jammu & Kashmir (J&K) to thwart attempts by Pakistani-sponsored invaders to wrest control of the valley from India. Tempests and Spitfires joined the action successfully halting their advance. The operations in J&K ended on December 31 1948 under a United Nations-sponsored ceasefire. On January 26 1950 when India became a Republic the prefix Royal was dropped. The 1950s witnessed rapid expansion and modernisation of the IAF both in terms of capital assets and infrastructure. The modernisation process began in 1948 with the induction of the Vampire the first combat jet of the IAF. This was followed by the induction of the Ouragan (Toofani) Mystere Canberra Hunter and Gnat in the 1950s. Closer strategic and military cooperation with the USSR resulted in the IAF acquiring three MiG-21 supersonic aircraft in 1963 which paved the way for subsequent induction of other combat aircraft and weapon systems of Soviet origin. From this point onwards the IAF inventory acquired a distinct Soviet orientation which also influenced the evolution of the aerospace industry in India. The Indo-Pak conflict of 1965 witnessed the IAF aggressively using the redoubtable Gnat demolishing the myth of the F-86 Sabre being the best combat aircraft of that time. The Gnat again played a significant role in the 1971 conflict scoring a number of kills in the air. In the decade of the 1980s the IAF played a key role during the operations in Sri Lanka involving the Indian Peacekeeping Force and the military intervention in the Maldives effectively demonstrating its strategic reach by way of airlift capability for out-of-area operations. The second phase of modernisation commenced in 1979 with the induction of the British Jaguar deep penetration strike aircraft and subsequently the MiG-27 Mirage 2000 and MiG-29 aircraft. Induction of the Su-30MKI long-range multi-role aircraft since the year 2000 has been the latest addition to the IAF s inventory. This new weapon system marked a quantum jump in the operational capability of the IAF. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Abbreviations at the end of the yearbook SP Guide Publications (SP s) What is your vision for the Indian Air Force (IAF) vis- -vis the emerging regional power status of the nation What steps need to be taken in broad terms to enable the IAF to match the aspirations of the nation Chief of the Air Staff (CAS) With the growing regional power status of the nation comes increased economic and energy needs and ever expanding geopolitical space of interest. The Indian Air Force should be in a position to ensure that these interests are safeguarded. A larger expanse presents with it greater number and types of threats for which the Indian Air Force will have to build its capabilities. The vision of the Indian Air Force includes growing to be a multispectral strategic force capable of addressing both the current and anticipated future challenges. Aerospace power is likely to be both the first responder to a crisis and the lead agency to prosecute war and hence the Indian Air Force needs to be strong and ever adaptable to a changing environment at all times. Our capability development plans are continuously revised to factor in these realities. Our current force levels are below the desired state but we have optimised our force application plans with available resources to protect our national interest. With implementation of our acquisition plans this capability will significantly improve. SP s Recent wars have shown that air power is the most predominant tool in war-fighting and it is also becoming the weapon of first choice In your view is the IAF receiving adequate funding . to meet its requirements for building the requisite capability CAS Air power needs to be in a position to dominate the entire spectrum of conflict in an expanded area of interest. However these aspirations need to be prioritised given budgetary constraints that are bound to arise for the nation for the next many years. Though there has been a declining trend in percentage of GDP being allocated for the defence forces the IAF through its proper planning and prioritisation has ensured that capac- SP s What are your views on the establishment of a Space Command Should this organisation remain with the IAF or acquire a Tri-Service character CAS The Ministry of Defence (MoD) has conveyed that creation of Space Command would be considered only after 2020. As an interim measure a Defence Space Agency (DSA) has been formed to address the issues related to the Services. The DSA would exercise control over space-related joint defence assets and units. The IAF will be the main contributor to the DSA with its inherent expertise but to achieve an all-encompassing defence oriented capability and exploitation a Tri-Service structure would be essential. SP s Despite the huge investments in efforts at indigenisation of the Indian defence industry the nation continues to be heavily dependent of foreign sources even for basic equipment. What new steps are needed to strengthen indigenous capability CAS The Indian Air Force is very keen on building capabilities at home and is contributing towards strengthening the indigenous defence production base. The Defence Procurement Procedure 2016 (DPP 2016) includes a number of provisions to encourage local research and development and enhance indigenous content in all our defence procurements. As part of indigenisation and the drive to obtain key technologies efforts have been made to include private sector in the production of defence equipment. Indigenously-built advanced light helicopter light combat helicopter light utility helicopter and ground-based systems are planned for induction in the future. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 231 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS ity building is not adversely affected and our operational edge is maintained while limiting the expenditure to within the boundaries of the allocations made in the annual defence budget for the IAF. The government has assured the IAF that the necessary funds will be made available to ensure credible deterrent capabilities at all times and against all adversaries. TECHNOLOGY air Chief Marshal Birender singh Dhanoa took over as the 25th Chief of the Air Staff (CAS) on January 1 2017. In a brief interaction with SP Guide Publications soon after taking over as the CAS the Air Chief Marshal shared his vision for the Indian Air Force the daunting challenges confronting the organisation and elaborated on some of the measures in hand to deal with these. CONCEPTS & PERSPECTIVES interview chief of the air Staff PIB WEAPONS EQUIPMENT VEHICLES CONTENTS eqUiPMent catalogUe indian air force Combat aircraft Mikoyan Mig-21Mf Bis Bison NATO reporting names Fishbed and Mongol (trainer version) Country of origin USSR. Manufactured under licence In India by the HAL Type Single-seat multi-role fighter Number in Service All variants 192 Year of Induction 1964 Construction Wings Delta plan form with a 2 anhedral and 57 sweepback with small boundary layer fences at tips. Large blown plain trailing edge flaps. Fuselage Circular section all metal semi-tail unit monocoque structure. Ram air intake in nose with floating centre body controlled by air speed and alpha angle. Large dorsal spine for avionics and fuel tanks. Air brakes under the leading edge of wing roots. Second air brake forward of the ventral fin. Tail unit of all moving surface type mass balanced at tips. Conventional fin with large inset rudder. Power Plant One Tumansky R-13 turbojet rated at 9 400 lb dry and 14 000 lb reheat. Internal fuel capacity 2 750 litres Provision for drop tanks under fuselage and inboard wing pylons. The MiG-21Bis & Bison are powered by a Tumansky R-25-300 turbojet rated at 15 000 lb static thrust with reheat. Cockpit K-13 ejection seat with 0-130 kmph capability. Avionics and Equipment ALMAZ search and track radar with a 30-km lock on range. ARK radio compass IFF and Gyro gun sight Armament One twin-barrel 23mm GSh-23 2 cannon with 250 rounds carried internally & up to 2 500 lb of ordnance on four wing pylons. Typical loads include 2 1 000 lb RVV-AE R-73 R-60 AAMs S-24 and UB80 UB 57 rocket pods. Dimensions Wingspan 7.15 m Length 16.10 m including pilot boom Height 4.5 m Wing area 23.45 m Weights Take-off (combat) 8 750 kg Max take-off 10 500 kg Performance Max speed Above 10 000 m Mach 2.23 At sea level Mach 1.1 Combat radius (lo-lo-lo) 390 km Max rate of climb 6 500 m min G Limits 7 1.5 Note 1 While the FL version of MiG-21 was finally retired from service in December 2013 a fleet of 96 MiG-21Bison aircraft with adequate residual airframe life have undergone an avionics and armament upgrade programme which comprises the following itmentofKOPYOmulti-moderadarinthenoseconein F place of the original ALMAZ radar which in combination with the active homing RVV-AE beyond visual range (BVR) air-to-air missile in place of the R-60 has given the aircraft a fire-and-forget capability. Coupled with a new Russian-madeMissionComputer theKOPYOradarhasalso enhanced the aircraft s overall air-to-surface capability. heaircrafthasbeenfittedwithaThalesmonolithringlaser T gyro-based INS with integral GPS and GLONASS card. The INS has a drift of 0.5 nm per hour which is automatically updated by the integral GPS giving it a highly reliable navigation system. heaircrafthasbeengivenasemi-glasscockpitwiththefitT ment of a Russian-made liquid crystal multi-function display and a head-up display. dditionalavionicsincludeaHAL-madeINCOMjam A resistant communications equipment and Tarang RWR equipment. nIsraelivideorecordingsystemhasbeenfittedinthe A cockpit which captures HUD as well as visual parameters during air-to-ground strikes for better post-strike debriefs. Note 2 The MiG-21 MF fleet of 80 aircraft is being phased out and the 96 MiG-21Bison aircraft are to remain in service till 2019. Mikoyan Mig-27M NATO reporting name Country of origin Type Number in Service www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 233 REGIONAL BALANCE Flogger-J USSR Single-seat variable geometry strike fighter. 90. Planned to be retired from service by 2017 ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS indian defence Year of Induction Construction Wings 1985 eqUIPMent CatalOgUe InDIan aIr fOrCe Shoulder wing mono-plane with variable sweep angles at 16 45 and 72 . Full span hydraulically actuated trailing edge flaps in three sections. No ailerons. Instead two-section upper surface spoilers lift dumpers operate differentially in conjunction with horizontal tail surfaces to provide aileron functions Fuselage Conventional semi-monocoque structure with lateral air intakes. Four forward hinged air brakes above and below horizontal tail planes. All moving horizontal surfaces of the tail unit act differentially and symmetrically to provide aileron and elevator functions. Conventional fin houses a large inset rudder. Cockpit KM-21 0-130 kmph ejection seat in a pressurised and air-conditioned cockpit. Bulletproof wind screen and small rearward looking mirror on top of canopy. Kevlar plating around cockpit to withstand hits up to 23mm calibre shells. Power Plant One Tumansky R-29 17 500 lb st dry 25 35 lb st reheat turbojet with variable geometry nozzle. Six fuel tanks with a total capacity of 6 700 litres. Avionics and Systems KLEN Laser marker and ranger in nose cone VHF UHF IFF equipment. Doppler nav attack system and radar altimeter. Gyro gun sight accurate up to 7.5 g loads. Duck nose houses Laser ranging targeting equipment. Doppler nav attack system with radar altimeter. Some aircraft being retrofitted with new nav attack systems and air data computers. Most aircraft fitted with deception broadband ECM equipment and Flare chaff dispensers. Armament One GSh-23 6 Gattling type cannon with 350 rounds underbelly. Seven external pylons capable of carrying up to 5 000 kg of ordnance. Options include Durandal Beluga FAB 500 750 FAE weapons and various types of rockets and gunpods. X-29L T ASMs are also available. Dimensions Wingspan 16 14.30 m 72 8.21 m Length overall 18.15 m Height overall 5.55 m Wing area 27.45 m2 Weights Empty 8 200 kg Clean 15 780 kg Max take-off 20 250 kg Performance Max level speed At 30 000 ft Mach 1.9 At sea level Mach 1.3 Combat radius (lo-lo-lo) 600 km Turn rate Max 20 sec sustained 14 sec G Limits Normal 7.5 -1.5 Ultimate 10 -3 Note About 50 MiG-27 aircraft have been given midlife upgrade at the HAL Nasik Division. Mikoyan Mig-29a B NATO reporting name Country of origin Type Number in Service Year of Induction Construction Wings Fulcrum USSR Single-seat air superiority fighter 54 1986 Fuselage Tail Unit Power Plant Cockpit Avionics Low-wing monoplane. Leading edge swept back at 42 with large ogival wing roots. Leading and trailing edge flaps without tabs. Semi-monocoque all-metal structure sharply tapered and downswept aft of flatsided cockpit area with ogival dielectric nose cone. Twin vertical fins swept back at 40 and canted outward at 7 with inset rudders. All moving horizontal tailplanes mounted on slim booms along engine nacelles. Rudder & horizontal tailplanes honeycomb filled. Vortex generators mounted on either side and below cockpit. Almost 15 per cent of construction is believed to be of carbon-boron composite materials. Two Tumansky RD-33 turbojets each rated at 11 250 lb dry and 18 500 lb reheat. FOD doors in each air intake duct actuated automatically with raising lowering of nose-wheel on take-off landing run. Total internal fuel capacity of 4 000 litres with a provision for a single 750-litre drop tank to be carried between engines underbelly. Later versions can carry wing drop tanks. K-36D zero-zero ejection seat in a pressurised and air-conditioned cockpit. Cockpit is high set and features a twopiece blister design. NO-19 Sapfir-29 (NATO Slot Back ) coherent pulse Doppler radar with a 100-km detection and 70-km track range with full look up down shoot down and multi-tracking capability. Limited look up down shoot down IRST on nose on star-board side. Navattack computers HUD helmetmounted sights operable up to 40 off the axis. Advanced 360 passive RWR of unknown type. Comprehensive VHF UHF communication systems. AoA indicator radar altimeter 3-axis auto www.spguidepublications.com 2016234 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com eqUIPMent CatalOgUe InDIan aIr fOrCe Armament www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 235 REGIONAL BALANCE Dassault aviation Mirage 2000h Country of origin France Type Single-seat multi-role fighter Number in Service 49 Year of Induction 1985 Construction Wings Low wing delta monoplane with leading edge sweepback of 58 . Full span twin segment leading edge flaps. Two section trailing edge elevons of full length with carbon-fibre skin and light alloy honeycomb core. Air brakes above and below each wing. Fuselage Conventional structure waisted tail unit according to the area rule. Small fixed strakes over each air intake. Cantilever vertical fin with inset rudder only comprises the tail unit. Rudder actuated by fly-by-wire system. Sweepback on fin leading edge 45 . Power Plant One Snecma M-53 P-2 Turbofan rated thrust at 14 462 lb dry and 21 385 lb reheat. Internal fuel capacity of 3 980 litres with provision for drop tanks and inboard wing pylons. Detachable inflight refuelling probe forward of cockpit on starboard side. Avionics Quadruple redundant fly-by-wire system. Invertors transformers and battery units. Thomson-CSF RDM multimode radar. Sager Uliss-52 inertial platform ESD Type 2 984 central digital computer and digibus. Comprehensive Year of Induction Construction Wings UK France 102 Type Single-seat deep strike and maritime strike aircraft 1979 Cantilever shoulder wing monoplane with 3 anhedral and 40 sweepback. Outer panels are fitted with slats. No ailerons lateral control is through two section spoilers outside of flaps used in conjunction with tailplanes differentially. All metal structure in three sections makes up fuselage with honeycomb panels around cockpit and engines. Fixed box type lateral air intakes. Two door type air brakes immediately aft of main wheel bays. Fuselage get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE sepecat Jaguar Country of origin Number in Service BUSINESS TECHNOLOGY Dimensions Wingspan 11.40 m Length overall 17.34 m Height overall 4.75 m Wing area 35.35 m Weights Empty 8 340 kg Normal Interceptor role 15 750 kg Max take-off 20 000 kg Performance Max level speed At 30 000 ft Mach 2.35 At sea level Mach 1.06 Max combat radius 650 km G Limits 9.0 -3 Note Midlife upgrade of the fleet has been completed and the upgraded aircraft are likely to remain in service till 2025. Dimensions Wingspan 9.13 m Length 14.36 m Height 5.03 m Wing area 41 m Weights Empty 7 500 kg Combat 11 000 kg Max take-off 15 000 kg Performance Max speed At 30 000 ft Mach 2.2 At sea level Mach 1.2 Max climb rate 56 000 ft min Service ceiling 53 000 ft Combat radius (hi-lo-hi) 750 km G Limits 9 -3 Note Mirage fleet of the IAF is undergoing midlife upgrade 2000-05 Mk II standard at an approximate cost of 2.1 billion ( 13 650 crore). Four aircraft upgraded in France have already been delivered. The remaining aircraft will be upgraded in India at HAL with ToT from French OEMs. Upgrade of the Mirage 2000 fleet is expected to be completed by 2021 after which it is expected to remain in service till 2040. CONCEPTS & PERSPECTIVES Accommodation WEAPONS EQUIPMENT VEHICLES stabilisation system auto pilot deception jammer in wing root. 1 GSh-301 30mm cannon in port wing root with 150 rounds. Up to six AAMs including R-73 R-27R R-27T Alternate loads of ground attack weapons with a total weight of 3 500 kg on six external hard points. Armament ECM active passive suite. VHF UHF communications suite HUD Navattack computer etc. Patric Litening pods. Two underbelly 30mm DEFA cannons with 125 rounds each. The aircraft can carry up to 13 890 lb of ordnance on nine external hard points. Options include various AAMs including R-73 Magic II & R-530D. Alternatively various types of ground attack weaponry including laser-guided bombs can be carried. F-10Q zero-zero ejection seat in a pressurised and air-conditioned cockpit. CONTENTS 5 indian coaSt gUard The various types of units envisaged for induction include Offshore Patrol Vessels Pollution Control Vessels Fast Patrol Vessels Interceptor Boats and shallow water craft. In addition aircraft such as multi-mission maritime aircraft coastal surveillance aircraft and twin-engine heavy and light helicopters are also envisaged in these plans. roles and responsibilities The role of ICG is defined in the Coast Guard Act of 1978 and is as follows nTo protect the maritime and other national interests in the maritime zones of India. nEnsuring the safety and protection of artificial islands offshore terminals installations and other structures and devices in any maritime zone. nProviding protection to fishermen including assistance to them at sea while in distress. nTo preserve and protect the maritime environment and to prevent and control marine pollution. nAssisting the customs and other authorities in anti-smuggling operations. nNecessary measures for the safety of life and property at sea. nUndertake collection of scientific data. Abbreviations at the end of the yearbook Organisation The Coast Guard Headquarters is located at New Delhi. The field functions are executed by a Coast Guard Commander Western Seaboard situated in Mumbai and by the five Regional Headquarters located at Gandhinagar Mumbai Chennai Kolkata and Port Blair. Under these Regional Headquarters there are 14 District Headquarters located along the coastal states and Union territories of India. There are 17 co-located stations and 25 independent Coast additional responsibilities Since its inception the ICG has been given many additional responsibilities. Besides the duties and functions provided in the ICG Act the ICG supports other ministries as provided by the www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 251 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he Indian Coast Guard (ICG) was constituted as an armed force of the Union by an Act of Parliament on August 18 1978 predominantly to undertake the peacetime tasks of ensuring the security of the maritime zones of India with a view to protect maritime and other national interests in such zones and matters connected therewith. The ICG functions under the Ministry of Defence primarily for nonmilitary maritime security functions. It has a military function during a war scenario when it conjoins with military forces in national defence under the Indian Navy. The Coast Guard began patrolling in earnest with two old frigates seconded from the Indian Navy and five patrol vessels seconded from the Central Board of Excise and Customs. legislation enacted by the Government of India. The support roles undertaken are as follows nEnforcement of anti-poaching measures monitoring and surveillance of deep sea fishing vessels. nSearch and rescue for merchant ships. nMarine oil pollution response measures. nLead intelligence agency for coastal and sea borders. nProtection of sensitive marine flora and endangered marine species. nAuthority responsible for coastal security in territorial waters. In pursuance of its missions the Director General Indian Coast Guard (DGICG) has also been designated as nChairman National Maritime Search and Rescue Board (NMSARB). nChairman National Oil Spill Disaster Contingency Plan Committee (NOSDCP). nChairman Offshore Security Coordination Committee (OSCC). nIndian Governor to Regional Cooperation Agreement to Combat Piracy and Armed Robbery (ReCAAP) against ships in Asia. These duties are carried out by the ICG over an Exclusive Economic Zone (EEZ) measuring 2.01 million square kilometres. It is entrusted with the responsibility of ensuring the safety and security of a peninsular nation that harbours 12 major ports and 187 minor ports. Some of the significant achievements of the Indian Coast Guard in pursuit of its vast charter of duties can be seen at Appendix A. TECHNOLOGY CONCEPTS & PERSPECTIVES ICG WEAPONS EQUIPMENT VEHICLES CONTENTS indian defence eqUiPMent catalogUe indian coaSt gUard surface Platforms Offshore Patrol Vessels (OPVs) samar Class Total No. in Service 4 Specifications Make Indian built Displacement (in tonnes) Light 1 604 Deep 2 000 Dimensions (LOAxBxD) 102 x 11.5 x 3.64 m Flight Deck Integral Helo Main Machinery 2 Diesels 4 710 kW each (SEMT PIELSTICK 16 PA6V280) Speed (knots) 22 Range (n miles) 6 000 at 15 Kn Complement (crew) 128 (including 15 officers) Offshore Patrol Vessels (OPVs) sankalp Class Total No. in Service 2 Specifications Make Indian built Displacement (in tonnes) Light 1 740 Deep 2 230 Dimensions (LOAxBxD) 105 x 12.9 x 3.64 m Flight Deck Integral Helo Main Machinery 2 Diesels 7 710 kW each (SEMT PIELSTICK 20 PA6BSTC) Speed (knots) 23.5 Range (n miles) 6 500 at 12 Kn Complement (crew) 128 (including 15 officers) Offshore Patrol Vessels (OPVs) Vikram Class Total No. in Service 4 Specifications Make Indian built Displacement (in tonnes) Light 992 Deep 1 180 Dimensions (LOAxBxD) 74 x 11.4 x 3.2 m Flight deck Integral Helo Main Machinery 2 Diesels 4 710 kW each (SEMT PIELSTICK 16PA6V280) Speed (knots) 22 Range (n miles) 8 500 at 11 Kn Complement (crew) 108 (including 10 officers) Offshore Patrol Vessels (OPVs) Vishwast Class Total No. in Service 3 Specifications Make Displacement (in tonnes) Dimensions (LOAxBxD) Flight deck Main Machinery Indian built Light 1 500 Deep 1 840 94 x 12.2 x 3.6 m Integral Helo 2 Diesels 9 000 kW each (MTU 20 V 8000 M90) Speed (knots) 26 Range (n miles) 4 500 at 14 Kn Complement (crew) 110 (including 10 officers) Offshore Patrol Vessels (OPVs) samarth Class Total No. in Service 2 Specifications Make Indian built (M s GSL) Displacement (in tonnes) 2350 (approx) at full load displacement Dimensions (LOAxBxD) 105m x 13.60m x 3.65 m Flight Deck Integral Helo Main Machinery 2 Diesels 9100 KW each (MTU 20V 8000 M90) Speed (knots) 23 Range (n miles) 6 000 at cruising speed (12-14 knots) Complement (crew) 112 (including 14 officers) Pollution Control Vessels (PCVs) samudra Prahari Class Total No. in Service 3 Specifications Make Indian built Displacement (in tonnes) Light 3 196 Deep 3 946 Dimensions (LOAxBxD) 94 x 15.5 x 4.5 m Flight deck Integral Helo Main Machinery 2 Diesels 3 000 kW each (Bergen B32 40 L6P) & 883 kW Ulstein Aquamaster bow thruster Speed (knots) 20 (Ship is capable of cruising at 0.2 knots speed during oil skimming mode with bow thruster) Range (n miles) 6 000 at 14 knots Complement (crew) 112 (including 12 officers) fast Patrol Vessels (fPV) Priyadarshini Class Total No. in Service 4 www.spguidepublications.com 2016258 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com eqUIPMent CatalOgUe InDIan COast gUarD 46 x 7.5 x 2 m 2 Diesels 1 480 kW each (MTU 12V 538 TB 82) Speed (knots) 23 Range (n miles) 2 400 at 14 knots Complement (crew) 34 (including 6 officers) fast Patrol Vessels (fPV) sarojini naidu Class Total No. in Service 7 Specifications Make Indian built Displacement (in tonnes) Light 235 Deep 259 Dimensions (LOAxBxD) 48 x 7.5 x 2 m Main Machinery 3 Diesels 2 720 kW each (MTU 16V 4000 M90) Speed (knots) 35 Range (n miles) 1 500 at 12 knots Complement (crew) 35 (including 6 officers) fast Patrol Vessels (fPVs) rani abbakka Class Total No. in Service 3 Specifications Make Indian built Displacement (in tonnes) Light 269 Deep 349 Dimensions (LOAxBxD) 51 x 8.36 x 2.1 m Main Machinery 3 Diesels 2 720 kW each (MTU 16V 4000 M 90) Speed (knots) 34 Range (n miles) 1 500 at 16 knots Complement (crew) 35 (including 6 officers) fast Patrol Vessels (fPVs) rajshree Class Total No. in Service 8 Specifications Make Indian built Displacement (in tonnes) Light 244 Deep 303 Dimensions (LOAxBxD) 48.9 x 7.5 x 2.1 m Main Machinery 3 Diesels 2 720 kW each (MTU 16V 4000 M90) Speed (knots) 34 Range (n miles) 1 500 at 16 knots Complement (crew) 35 (including 6 officers) fast Patrol Vessels (fPVs) aadesh Class Total No. in Service 18 Specifications Make Indian built Displacement (in tonnes) Light 209.75 Deep 270 Interceptor Boats (IBs) C-131 Class Total No. in Service 2 Specifications Make Indian built Displacement (in tonnes) Light 31.5 Deep 40.208 Dimensions (LOAxBxT) 21.45 x 8.2 x 1.63 m Main Machinery 3 Diesels 2 x 823 kW (MWM 234 TBD V12) & 1 x 410 kW (MWM 234 TBD V08) Speed (knots) 25 Range (n miles) 489 at 12-14 knots Complement (crew) 8 (including 2 officers) Interceptor Boats (IBs) C-141 Class Total No. in Service 13 Specifications Make Indian built Displacement (in tonnes) Light 62 Deep 81 Dimensions (LOAxBxT) 26 x 6.6 x 1.7 m Main Machinery 2 Diesels 2720 kW each (MTU 16V 4000 M90) Speed (knots) 45 Range (n miles) 500 at 25 knots Complement (crew) 10 (including 02 officers) Interceptor Boats (IBs) C-154 Class Total No. in Service 4 Specifications Make Indian built Displacement (in tonnes) Light 54 Deep 68.93 Dimensions (LOAxBxT) 28.75 x 6.20 x 3.43 m Main Machinery 2 Diesels 1 630 kW each (MTU 16V 2000 M 92) Speed (knots) 35 Range (n miles) 500 at 20 knots Complement (crew) 10 (including 2 officers) Interceptor Boats (IBs) C-401 Class Total No. in Service 27 Specifications Make Indian built Displacement (in tonnes) Light 82 Deep 103 Dimensions (LOAxBxT) 27.8 x 6.4 x 1.27 m Main Machinery 2 Diesels 2 525 kW each (Caterpillar 3516C) www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 259 REGIONAL BALANCE get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Specifications Make Displacement (in tonnes) Dimensions (LOAxBxD) Main Machinery Indian built Light 165 Deep 215 Dimensions (LOAxBxD) Main Machinery 50.0 x 8.2 x 1.63 m 3 Diesels 2 720 kW each (MTU 16V 4000 M90) Speed (knots) 33 Range (n miles) 1 500 at 12 knots Complement (crew) 35 (including 6 officers) CONTENTS 6 Who S Who in indian defence Compiled by SP Guide Publications team (as on January 13 2017) President & Supreme Commander of the Armed Forces ................................................................... Pranab Mukherjee Vice President ......................................................................................................................................... Mohammad Hamid Ansari Union Government Prime Minister ........................................................................................................................................ Narendra Modi Minister of Defence ................................................................................................................................ Manohar Parrikar Minister of State for Defence ................................................................................................................. Subhash Ramrao Bhamre ministry of Defence Department Defence Secretary .................................................................................................................................. G. Mohan Kumar Director General (Acquisition) ............................................................................................................. Smita Nagraj Joint Secretary (Public Grievances & Coordination)........................................................................... M. Subbarayan Joint Secretary (Air Ceremonial & Border Roads) .............................................................................. Bharat Khera Joint Secretary (Planning and International Cooperation) ................................................................ Shambhu S. Kumaran Joint Secretary (Army Ordnance QMG) ............................................................................................. Jiwesh Nandan Joint Secretary (Navy Medical Training) ............................................................................................ Devika Raghuvanshi Joint Secretary (Works & Lands) & CVO............................................................................................... Manish Thakur Joint Secretary (Establishment CAO) .................................................................................................. V. Anandarajan Joint Secretary & Acquisition Manager (Land Systems) ..................................................................... Deepak Anurag Joint Secretary & Acquisition Manager (Maritime & Systems) .......................................................... Jayant Sinha Joint Secretary & Acquisition Manager (Air) ....................................................................................... Rajeev Verma Technical Manager (Land Systems) ..................................................................................................... Major General S.S. Hasabnis Technical Manager (Maritime & Systems ............................................................................................ Rear Admiral I.P.S. Bali Technical Manager (Air) ........................................................................................................................ Air Vice Marshal G. Raveendranath Department of Defence Production Secretary (Defence Production) ........................................................................................................... Ashok Kumar Gupta Additional Secretary (Defence Production)......................................................................................... Surina Rajan Joint Secretary (Land Systems) ............................................................................................................. Sanjay Prasad In-Charge Joint Secretary (Aerospace) ................................................................................................. Rajib Kumar Sen Joint Secretary (Naval Systems) ............................................................................................................ Vijayendra Joint Secretary (Personnel and Coordination) .................................................................................... Kusum Singh Joint Secretary (Defence Industrial Promotion) .................................................................................. Sanjay Garg Advisor (Cost) ......................................................................................................................................... L.M. Kaushal Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 261 REGIONAL BALANCE Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS WHo s WHo in inDiAn Defence Pranab Mukherjee President of India & Supreme Commander of Armed Forces A man of unparalleled experience in governance with the rare distinction of having served at different times as Foreign Defence Commerce and Finance Minister Pranab Mukherjee assumed office as the 13th President of India on July 25 2012. After his post-graduation in history and political science and a degree in law from the University of Calcutta he embarked on his professional life as a college teacher and journalist. In 1969 he plunged into full-time public life following his election to the Upper House of the Parliament (Rajya Sabha). Mukherjee was elected to the Rajya Sabha five times and twice to the Lower House of the Parliament (Lok Sabha). He was a member of the Congress Working Committee the highest policy-making body of the party for 23 years. During the period 2004-12 Mukherjee was instrumental in spearheading critical decisions of the government on a range of issues such as administrative reforms right to information right to employment food security energy security information technology and telecommunication setting up of the Unique Identification Authority of India (UIDAI) Metro Rail Corporation etc through chairmanship of over 95 Groups of Ministers (GoMs) constituted for the purpose. In the 1970s and 1980s he was instrumental in setting up the Regional Rural Banks (1975) and the EXIM Bank of India as well as National Bank for Agriculture and Rural Development (1981-82). An eloquent orator and scholar Mukherjee s intellectual and political prowess as well as remarkable knowledge of international relations financial affairs and parliamentary process are widely admired. Narendra Modi Prime Minister of India On May 26 2014 Narendra Modi took oath as the Prime Minister of India becoming the first ever Prime Minister to be born after India attained Independence. Dynamic dedicated and determined Narendra Modi reflects the aspiration and hope of over a billion Indians. Ever since he assumed office in May 2014 Prime Minister Modi has embarked on a journey of all-round and inclusive development where every Indian can realise her his hopes and aspirations. He remains deeply inspired by the principle of Antyodaya of serving the last person in the queue. He has launched the Pradhan Mantri Jan-Dhan Yojana marking a paradigm shift in ensuring that every citizen is included in the financial system of the nation. His clarion call for Make in India complimented by a focus on making business easy has stimulated unprecedented vigour and enterprise among investors and entrepreneurs. Labour reforms and dignity of labour under the Shrameva Jayate initiative has empowered several workers of small and medium industries also providing a boost to our skilled youth. On October 2 2014 Mahatma Gandhi s Birth Anniversary the Prime Minister launched Swachh Bharat Mission a mass movement for cleanliness across the nation. His foreign policy initiatives have realised the true potential and role of world s largest democracy India on the world stage. Born on September 17 1950 in a small town in Gujarat he grew up in a poor but loving family without a spare rupee The initial hardships of life not only taught the . value of hard work but also exposed him to the avoidable sufferings of the common people. This inspired him from a very young age to immerse himself in the service of people and the nation. In the year 2001 he became the Chief Minister of his home state Gujarat and went on to serve a record four terms as Chief Minister. He transformed Gujarat into a growth engine that makes a strong contribution to India s development. Narendra Modi is a People s Leader dedicated to solving their problems and improving their well-being. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 267 REGIONAL BALANCE Get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS indian defence General Bipin Rawat Chief of the Army Staff General Bipin Rawat took over as the 27th Chief of the Army Staff on January 1 2017. He was commissioned in the 5th Battalion of the 11 Gorkha Rifles in December 1978 from IMA Dehradun where he was awarded the Sword of Honour The officer has vast experi. ence in high altitude warfare and counter-insurgency operations and has considerable staff and instructional experience. His important command assignments include an Infantry battalion along the line of actual control (LAC) in the Eastern Sector a Rashtriya Rifles Sector an Infantry Division in the Kashmir Valley and a Corps in the North East. The officer also commanded a Multinational Brigade in a Chapter VII mission in the Democratic Republic of Congo (MOUNSCO). As an Army Cdr he was the GOC-in-C of Southern WHo s WHo in inDiAn Defence Command before taking over as the Vice Chief of the Army Staff in Delhi. General Rawat s staff and instructional assignments include an instructional tenure at IMA Dehradun General Staff Officer at the Military Operations Directorate Logistics Staff Officer of a Division in Central India Deputy Military Secretary in the Military Secretary s Branch and Senior Instructor Junior Command Wing. He has been Major General General Staff of the Eastern Theatre. He is a graduate of the Defence Services Staff College Wellington the Higher Command and National Defence College courses and has attended the US Army Command and General Staff College course at Fort Leavenworth Kansas. He is recipient of UYSM AVSM YSM SM VSM awards. Admiral Sunil Lanba Chief of the Naval Staff Admiral Sunil Lanba was promoted as the 23rd Chief of the Naval Staff (CNS) on May 31 2016. He is an alumnus of the National Defence Academy Khadakwasla Defence Services Staff College Wellington College of Defence Management Secunderabad and Royal College of Defence Studies London. He is a navigation and direction specialist who has served as the navigation and operations officer onboard numerous ships in both the Eastern and Western Fleet. His sea tenures include command of Indian Navy ship Kakinada a specialised mine countermeasure vessel Himgiri Ranvijay a Kashin class destroyer and Mumbai the indigenous Delhi class destroyer. He has also been the Executive Officer of INS Viraat and the Fleet Operations Officer of the Western Fleet. On elevation to the Flag rank he has held several significant assignments including the Chief of Staff Southern Naval Command and the Flag Officer Sea Training before he took over as the Flag Officer Commanding Maharashtra and Gujarat Naval Area. On promotion to Vice Admiral he was the Chief of Staff Eastern Naval Command Commandant of National Defence College and the Vice Chief of Naval Staff. Prior to taking over as CNS he was the Flag Officer Commanding-in-Chief Southern and Western Naval Commands. He is recipient of PVSM and AVSM awards. On January 1 2017 Admiral Sunil Lanba has taken over as the Chairman Chiefs of Staff Committee. Air Chief Marshal B.S. Dhanoa Chief of the Air Staff Air Chief Marshal Birender Singh Dhanoa took over as the 25th Chief of the Air Staff on January 1 2017. Commissioned into the Flying Branch of the IAF as a fighter pilot in June 1978 Air Chief Marshal Dhanoa is a Cat A Qualified Flying Instructor and has over 3 000 hours of flying on a variety of fighter aircraft with an impeccable flight safety record. He is an alumnus of Rashtriya Indian Military College the National Defence Academy and the Defence Services Staff College Wellington. The Air Chief Marshal has several laurels to his credit. As Commanding Officer of a front line ground attack fighter squadron equipped with MiG-21 aircraft he led the IAF during the limited war against Pakistan in 1999 to evict the enemy from the icy heights of Kargil. He has held a number of command and staff appointments at operational commands Joint Training Establishments and Air Headquarters. He has been Director Targeting Cell and Director Fighter Operations Assistant Chief of Air Staff (Intelligence) at Air Headquarters Senior Air Staff Officer at Eastern and Western Air Commands as also the Air Officer Commanding-in-Chief at South Western Air Command. For his experience and professional excellence he was handpicked to establish an IAF Training Team abroad. Before taking over as the Chief of the Air Staff he was the Vice Chief of the Air Staff since June 1 2015. In recognition of his meritorious services he has been conferred the awards of PVSM AVSM YSM and VM by the President of India. www.spguidepublications.com Get yoUr coPy to read in coMPlete 2016270 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com indian defence Who S Who in indian defence PUblic Sector UndertakinGS T. Suvarna Raju Chairman and Managing Director Hindustan Aeronautics Limited T. Suvarna Raju is an engineering graduate with an MBA (Marketing) M.Phil in Defence Strategies Studies and post-graduate diploma in intellectual property rights laws from the National Law School of India University. He is also an alumnus of National Defence College. Raju joined the Hindustan Aeronautics Limited (HAL) on June 26 1980 as management trainee and has worked in different capacities at HAL Aircraft Division Overhaul Division before taking over as Director Design & Development on February 1 2012. He is a firm believer that Best of technology can never be bought it can only be developed With this vision to transform the . company into a technology powerhouse he has been instrumental in taking various path-breaking measures to make R&D set up of HAL more competitive. He has the experience in various facets of aerospace business and is currently steering a lot of futuristic projects such as UAVs FGFA MTA civil aircraft development programme etc. He has had an illustrious career at HAL and has contributed towards success of Jaguar production and overhaul facilities establishment at HAL. He was instrumental in transfer of technology of Hawk Mk 132 aircraft. He has been a member of various studies constituted by Indian defence services be it for life extension of existing fleets or investigations into accidents and has received commendations for his professional involvement and contributions. He is considered an authority on performance based logistics (PBL) and has pioneered the concept in the country. He is a highly professional and competent executive. The Aeronautical Society of India has conferred him with Dr Biren Roy Trust Award for the year 2002 for his unstinted efforts in planning and establishment of new technologies at HAL. M.V. Gowtama Chairman and Managing Director Bharat Electronics Limited M.V. Gowtama has taken charge as the Chairman and Managing Director of the Bharat Electronics Limited on November 8 2016. He completed his B.Tech in electronics and communications from Sri Venkateswara University College of Engineering in Tirupati in 1983 and joined BEL Ghaziabad unit in the same year as a probationary engineer. He was initially posted to the D&E-Radar Division where he contributed to the development of receiver subsystem of cyclone warning radar which won the R&D award. He was transferred to the Hyderabad unit in May 1986 where he worked in the D&E testing system integration installation & commissioning groups of Ajanta project till 1998. He completed M.Tech in advanced electronics from Jawaharlal Nehru Technological University Hyderabad while in service. From 1998 to 2006 he worked on the Sangraha programme of the Indian Navy and with his team developed different ESM systems for submarines helicopters medium and long-range aircraft. Gowtama took over as GM (Technology Planning) at BEL Corporate Office on February 1 2010. Later he served as GM (Milcom) at BEL in Bengaluru and was Executive Director (Missile Systems) at BEL in Bengaluru till his elevation as Chairman and Managing Director of BEL. www.spguidepublications.com D.K. Hota Chairman and Managing Director Bharat Earth Movers Limited D.K. Hota has assumed charge as Chairman and Managing Director with effect from July 1 2016. He joined the Board of BEML Limited on July 1 2013 as Director (Human Resources). Hota has graduated in economics honours from St. Stephen s College in Delhi and post-graduation in HR from XLRI. He has over three decades of professional experience in HR and business and served in various capacities in the Hindustan Petroleum Corporation Limited (HPCL) including CEO of HPCL Biofuels. Prior to joining BEML he was heading the Natural Gas Division of HPCL in Mumbai. Get yoUr coPy to read in coMPlete 2016280 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com 7 iNDiaN DeFeNCe iNDUStry The Indian defence industry is now poised for a quantum leap as the NDA Government has permitted 100 per cent foreign direct investment (FDI) making it easier to obtain sanction for large and capital-intensive projects. Coupled with the Make in India campaign the NDA Government aims to build a credible military industrial complex that can propel India to emerge as an exporter of military hardware. Indian Navy Participation by the Private Sector With the strategic objective of achieving self-reliance in defence production the DDP has been making continuous effort to indigenise defence manufacturing wherever technologically feasible and economically viable. In May 2001 the defence industry sector which was hitherto reserved for the PSUs was opened for 100 per cent participation by the Indian private sector with foreign direct investment (FDI) limit at 26 per cent both subject to licensing. The Department of Industrial Policy and Promotion (DIPP) issued detailed guidelines for the licensing of the production of arms and ammunition. In July 2013 the government decided to increase FDI in the defence industry from 26 to 49 per cent. However FDI beyond 26 per cent and up to 49 per cent was restricted to high-end technologies and was to be considered on a case-to-case basis after clearance from the Cabinet Committee on Security (CCS). The Indian defence industry held under leash for long because of a conservative approach that had restricted investment in this segment by the private sector effectively to 26 per cent. However participation by the private sector in the Indian defence industry is now poised for a quantum leap as the NDA Government has permitted 100 per cent FDI making it easier to obtain sanction for large and capital-intensive projects. The situation is expected to change dramatically in the coming years as the government has implemented the new Defence Procurement Procedure (DPP) 2016 under which procedures for the procurement of military hardware has been simplified. Coupled with the Make in India campaign the NDA Government aims to build a credible military industrial complex that can propel India to emerge as an exporter of military hardware. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 283 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS e stablished in November 1962 the Department of Defence Production (DDP) was mandated to develop a comprehensive industrial infrastructure to achieve selfreliance in defence production. Over the years the department has established wide ranging facilities for the production of a variety of defence equipment by Ordnance Factories (OF) and defence public sector undertakings (DPSUs). Products include arms and ammunition tanks armoured vehicles heavy vehicles earth-moving equipment combat aircraft helicopters warships submarines missiles electronic equipment special alloys and special purpose steel. The DDP has the following organisations under it nOrdnance Factory Board (OFB) nHindustan Aeronautics Limited (HAL) nBharat Electronics Limited (BEL) nBharat Dynamics Limited (BDL) nBharat Earth Movers Limited (BEML) nMazagon Dock Shipbuilders Limited (MDL) nGoa Shipyard Limited (GSL) nGarden Reach Shipbuilders and Engineers Limited (GRSE) nHindustan Shipyard Limited (HSL) nMishra Dhatu Nigam Limited (MIDHANI) nDirectorate General of Quality Assurance (DGQA) nDirectorate General of Aeronautical Quality Assurance (DGAQA) nDirectorate of Standardisation (DOS) nDefence Exhibition Organisation (DEO) nDirectorate of Planning and Coordination (Dte of P&C) nNational Institute for Research and Development in Defence Shipbuilding (NIRDESH) The OFs and the DPSUs have been on a constant drive to modernise upgrade the capabilities and expand the range of products. They have developed a number of products indigenously and have acquired capabilities in various fields through transfer of technology. Production and turnover of OFs and the DPSUs have been increasing steadily to meet the increasing requirements of the armed forces. The website of the department http www. ddpmod.gov.in has been functional since January 1 2013. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS SP Guide Publications (SP s) What is your vision for India s domestic defence industry in terms of defence production Secretary Defence Production (Secretary) As India is transforming from a regional power to a global power the defence sector is increasingly occupying a bigger space in the country s long-term strategic planning. A confident and resurgent Indian defence industry is making forays into almost all the sectors of manufacturing. Lately the huge opportunities for growth within the domestic and global defence and aerospace industries have attracted the attention of Indian industry. It is pertinent to mention here that the Defence Production Policy promulgated by the government aims at achieving substantive self-reliance in the design development and production of equipment weapon systems platforms required for defence in as early a time frame as possible creating conditions conducive for private industry to play an active role in this endeavour enhancing potential of small and medium-sized enterprises (SMEs) in indigenisation and broadening the defence R&D base of the country. Pursuant to the above policy and Make in India initiative the government aims to make the country self-reliant in defence production through various initiatives. Several policy initiatives have already been implemented by the government such as liberalisation of FDI (foreign direct investment) policy and industrial licensing policy simplification of export procedures creating level playing field for Indian private and public sector companies streamlining of offset implementation process providing preference to Buy (Indian Designed Developed and Manufactured) (Indian-IDDM) Buy (Indian) Buy and Make (Indian) categories of capital acquisition over Buy (Global) category in Defence Procurement Procedure. SP s The new DPP 2016 is being referred to as game changer for the sector. How do you see it altering the Indian defence growth story Secretary The new Defence Procurement Procedure (DPP) 2016 has come into effect from April 1 2016. It focuses on achieving the Make in India vision by according priority to Buy (Indian IDDM) and Buy (Indian) categories. It also mandates increased indigenous content. The Make procedure has been simplified with provisions for funding of 90 per cent of development cost by the government to Indian industry and earmarking projects not exceeding development cost of 10 crore (government funded) and 3 crore (industry funded) for the micro small and medium enterprises (MSMEs). This would create an ecosystem in defence manufacturing by harnessing the capabilities of Indian private sector specially MSMEs and inculcate the R&D culture in the sector. SP s In your opinion what are the new key points of DPP 2016 for a foreign OEM looking at Indian market Secretary India is in the midst of modernising its armed forces and it is estimated that 250 billion will be spent on capital procurement in the next 10 years. In the new Defence Procurement Procedure 2016 Buy (Indian-IDDM) Buy (Indian) Buy & Make (Indian) are the most preferred categories which means that increasingly request for proposals (RFP) will be issued to the domestic industry. The only way for the foreign OEMs to leverage domestic demand is to tie up with domestic companies either for collaborative R&D followed by production or through transfer of technology for production through joint ventures or they can set up their own manufacturing base. In addition a numbers of potential Make projects have been identified by the department which are likely to follow Make procedure for development-cum-procurement. The foreign OEMs can collaborate with the Indian vendor the prime contractor for development for defence equipment. Provisions have also been introduced to allow foreign OEM to select Indian production agency of its choice for transfer of technology for maintenance infrastructure. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 289 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY In a rare media interaction with SP Guide Publications Ashok Kumar Gupta Secretary Defence Production outlined his vision for defence manufacturing in India and addressed a wide range of subjects including Make in India DPP 2016 defence offsets role of DPSUs investment in R&D delays in procurement decisions blacklisting and other related issues. CONCEPTS & PERSPECTIVES iNterview SeCretary (DeFeNCe ProDUCtioN) PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 8 DeFeNCe reSearCH aND DeveloPMeNt DRDO is steadfast in achieving self-sufficiency in defence requirement of the Indian armed forces. It has proven its competence to produce state-of-the-art strategic and tactical military hardware and related technologies in diverse disciplines such as aeronautics armaments combat vehicles combat engineering electronics missiles life sciences advanced materials composites and naval systems. SP Guide Pubns Organisational Structure With its headquarters at New Delhi DRDO is headed by the Director General who is also the Secretary Department of Defence Research & Development (DDR&D) Government of India. In September 2013 DRDO commenced implementation of the recommendation of the Rama Rao Committee that included decentralisation of the DRDO into seven technology clusters each headed by an empowered Director General (DG). At present the DG DRDO is assisted by seven DGs (Clusters) and five Chief Controllers R&D (CCR&D). The seven DGs (Clusters) are DG Armament and Combat Engineering Systems (ACE) Pune DG Aeronautical Systems (Aero) Bengaluru DG Missiles and Strategic Systems (MSS) Hyderabad DG Naval Systems & Materials (NS&M) Visakhapatnam DG Electronics and Communication Systems (ECS) Bengaluru DG Microelectronics Devices & Computational Systems (MED&CoS) Delhi and DG Life Sciences (LS) Delhi. However during May 2015 DRDO was reorganised and the office of scientific advisor to the Defence Minister was separated from the Secretary DRDO-cum-DG DRDO. In addition DDR&D has one autonomous body viz. Aeronautical Development Agency one joint venture viz BrahMos Aerospace four human resource institutions i.e. Centre for Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 309 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he Defence Research and Development Organisation (DRDO) has emerged as one of the premier scientific and technological organisations in the country and has played a significant role in the development of stateof-the-art platforms sensors and weapon systems. The organisation provides scientific and technological advice to the Ministry of Defence (MoD) functions as evaluator of defence equipment for operational requirements of the military and generates technological knowledge for the indigenous development of weapon systems. DRDO was formed on January 1 1958 by merging the Defence Science Organisation the units of the Technical Development Establishments of the Indian Army and the Directorate of Technical Development and Production. DRDO was then a fledgling research establishment with just ten laboratories. In 1980 the DRDO became a department under the Central Government and today it is one of its largest science and technology departments with a network of 52 laboratories and establishments spread all over the country. With a vision to empower India with cuttingedge technologies and to equip the services with internationally competitive systems DRDO has proven its competence to produce state-of-the-art strategic and tactical military hardware and related technologies in diverse disciplines such as aeronautics armaments combat vehicles combat engineering electronics missiles life sciences advanced materials composites and naval systems. DRDO has expertise in system design system integration testing evaluation and project management built over the last five decades which has enabled it to develop indigenous capabilities in weapons and delivery systems. Today DRDO has transformed into a highly professional and mature organisation with strong technology base and management systems to undertake indigenous development of state-of-the-art defence systems including design development integration and production. DRDO has achieved technological self-reliance in criti- cal areas including ammunition armoured systems missiles radar avionics and electronic warfare systems sensors nuclear biological chemical (NBC) defence low-intensity conflict technologies and advanced computing. DRDO plays a significant role in providing scientific and technological advice to MoD in support of defence policy as evaluator of defence equipment for the operational requirements of the military and generating new technological knowledge to be transferred for indigenous development of stateof-the-art weapon systems. It also advises the government on technical assessment of international security threats and military capabilities of both current and potential adversaries. TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS iNDiaN DeFeNCe Indian Defence R&D Establishments AERONAUTICAL DEvELOPMENT ESTABLISHMENT (ADE) Director M.V.K.V. Prasad New Thippasandra Post Bengaluru -- 560 075 Tel 080-25283404 25057005 25057007 Fax 080-25283188 E-mail director ade.drdo.in CENTRE FOR AIRBORNE SYSTEMS (CABS) Director M.S. Easwaran Ministry of Defence DRDO Belur Yemlur Post Bengaluru -- 560037 Tel 080-25225121 26572638 Fax 080-25222326 E-mail director cabs.drdo.in ADvANCED NUMERICAL RESEARCH & ANALYSIS GROUP (ANURAG) Director C.V.S. Sastry DRDO Kanchanbagh PO Hyderabad -- 500058 Tel 040-24347630 Fax 040-24347679 E-mail director anurag.drdo.in CENTRE FOR PERSONNEL TALENT MANAGEMENT (CEPTAM) Director Dr Vijaya Singh Metcalfe House Delhi-110 054 Tel 011- 23882300 Fax 011- 23810287 23882306 e-mail director ceptam.drdo.in AERIAL DELIvERY RESEARCH & DEvELOPMENT ESTABLISHMENT (ADRDE) Director Debasish Chakraborti Post Box No. 51 Station Road Agra Cantt Agra -- 282 001 Tel 0562-2260023 2258200 Fax 0562-2251677 E-mail director adrde.drdo.in COMBAT vEHICLES RESEARCH & DEvELOPMENT ESTABLISHMENT (CvRDE) Director Dr P. Sivakumar Avadi Chennai -- 600054 Tel 044-26383722 26364001 Fax 044-26383661 26385112 E-mail director cvrde.drdo.in combatvehicles cvrde.drdo.in ARMAMENT RESEARCH & DEvELOPMENT ESTABLISHMENT (ARDE) Director Dr K.M. Rajan Dr Homi Bhabha Road Armament Post Pashan Pune -- 411021 Tel 020- 25893274 25885007 Fax 020-25893102 E-mail director arde.drdo.in DEFENCE AvIONICS RESEARCH ESTABLISHMENT (DARE) Director Dr K. Maheswara Reddy Post Box No. 9366 C.V. Raman Nagar Bengaluru -- 560093 Tel 080-25347704 25347707 Fax 080-25347717 E-mail director dare.drdo.in CENTRE FOR ARTIFICIAL INTELLIGENCE & ROBOTICS (CAIR) Director Sanjay Burman DRDO Complex C.V. Raman Nagar Bengaluru -- 560093 Tel 080-25342646 25244298 Fax 080-25244298 E-mail director cair.drdo.in DEFENCE BIO-ENGINEERING AND ELECTRO MEDICAL LABORATORY (DEBEL) Director Dr V.C. Padaki Post Box No. 9326 C.V. Raman Nagar Bengaluru -- 560093 Tel 080-25280692 25058425 Fax 080-25282011 E-mail dirdebel debel.drdo.in CENTRE FOR FIRE EXPLOSIvE & ENvIRONMENT SAFETY (CFEES) Director Dr Chitra Rajagopal Ministry of Defence Brig. S.K. Mazumdar Road Timarpur Delhi -- 110054 Tel 011-23813239 23907102 Fax 011-2381 9547 E-mail director cfees.drdo.in www.spguidepublications.com DEFENCE ELECTRONICS APPLICATION LABORATORY (DEAL) Director Dr R.S. Pundir Post Box No. 54 Raipur Road Dehradun -- 248001 Uttarakhand Tel 0135- 2787084 2787086 Fax 0135-2787265 2787290 E-mail director deal.drdo.in CENTRE FOR MILITARY AIRwORTHINESS & CERTIFICATION (CEMILAC) Chief Executive P. Jayapal Ministry of Defence Defence Research and Development Organisation Marthahalli Colony Post Bengaluru -- 560037 Tel 080-25230680 28517272 Fax 080-25230856 25234781 E-mail director cemilac.drdo.in DEFENCE ELECTRONICS RESEARCH LABORATORY (DLRL) Director Dr C.G. Balaji Chandrayangutta Lines Hyderabad -- 500005 Tel 040-24440061 24530264 Fax 040-2787161 2787128 E-mail director dlrl.drdo.in 2016314 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com INDIAN DEFENCE R&D ESTABLISHMENTS DEFENCE FOOD RESEARCH LABORATORY (DFRL) Director Dr Rakesh Kumar Sharma Siddarth Nagar Mysore -- 570011 Tel 0821-2473783 Fax 0821-2473468 E-mail director dfrl.drdo.in DEFENCE SCIENTIFIC INFORMATION & DOCUMENTATION CENTRE (DESIDOC) DEFENCE METALLURGICAL RESEARCH LABORATORY (DMRL) Director Dr Samir V. Kamat Kanchanbagh PO Hyderabad -- 500058 Tel 040-24340681 24340233 24340155 24345116 Fax 040-24340683 24341439 E-mail director dmrl.drdo.in DEFENCE INSTITUTE OF PSYCHOLOGICAL RESEARCH (DIPR) Director Dr K. Ramachandran DRDO Ministry of Defence Lucknow Road Timarpur Delhi -- 110054 Tel 011-23923560 Fax 011-23916980 E-mail director dipr.drdo.in DEFENCE INSTITUTE OF ADvANCED TECHNOLOGY (DIAT) Vice Chancellor Dr Surendra Pal Simhagad Road Girinagar Pune -- 411025 Tel 020- 24389428 24389426 24389427 Fax 020-24389411 24389509 E-mail director diat.drdo.in DEFENCE TERRAIN RESEARCH LABORATORY (DTRL) Director Dr M.R. Bhutiyani Metcalfe House Delhi --110054 Tel 011-23811599 24648566 Fax 011-23812494 E-mail director dtrl.drdo.in DEFENCE RESEARCH & DEvELOPMENT ESTABLISHMENT (DRDE) Director Dr Lokendra Singh Jhansi Road Gwalior -- 474002 Tel 0751-2341550 2340730 Fax 0751-2341148 E-mail director.drde gmail.com DEFENCE INSTITUTE OF BIOENERGY RESEARCH (DIBER) Director Dr Bhuvnesh Kumar Goraparao PO Arjunpur Haldwani -- 263139 Uttarakhand Tel 05946-232532 232040 Fax 05946-232719 E-mail director diber.drdo.in Director Dr S.R. Vadera Ratanada Palace Jodhpur -- 342011 Tel 0291-2510275 2511057 Fax 0291-2511191 2510260 E-mail director dlj.drdo.in ELECTRONICS AND RADAR DEvELOPMENT ESTABLISHMENTS (LRDE) Director S.S. Nagaraj C.V. Raman Nagar Bengaluru -- 560093 Tel 080-25243873 25243816 Fax 080-25242916 E-mail director lrde.drdo.in DEFENCE RESEARCH & DEvELOPMENT LABORATORY (DRDL) Director M.S.R. Prasad Chandrayangutta Lines Hyderabad -- 500005 Tel 040-24583000 24340511 24340546 24583010 Fax 040-24340109 E-mail director drdl.drdo.in DEFENCE MATERIAL & STORE RESEARCH & DEvELOPMENT ESTABLISHMENT (DMSRDE) Director Dr Namburi Eswara Prasad DMSRDE Post Office G.T. Road Kanpur -- 208013 Tel 0512-2450695 2453597 (Extn 103) Fax 0512-2450404 2404774 E-mail director dmsrde.drdo.in Director M.Z. Siddique Post Box No. 9302 C.V. Raman Nagar Bengaluru -- 560093 Tel 080-25240698 25241892 Fax 080-25241507 E-mail director gtre.drdo.in DEFENCE INSTITUTE OF HIGH ALTITUDE RESEARCH (DIHAR) Director Dr Bhuvnesh Kumar PIN -- 901205 C O 56 APO Tel 01982-252096 252224 Fax 01982-252096 E-mail dihardrdo gmail.com DEFENCE RESEARCH LABORATORY (DRL) Director Dr P. Srinivas Raju Post Box No. 2 Tezpur -- 784 001 Assam Tel 03712-258508 258836 Fax 03712-258534 E-mail director_drl yahoo.com HIGH ENERGY MATERIALS RESEARCH LABORATORY (HEMRL) DEFENCE INSTITUTE OF PSYCHOLOGY & ALLIED SCIENCES (DIPAS) Director Dr K. Ramachandran Lucknow Road Timarpur Delhi -- 110054 Tel 011-23946257 25079601 Fax 011-23932869 23914790 23983149 E-mail director dipas.drdo.in MICROwAvE TUBE R&D CENTRE (MTRDC) Director Dr Sudhir Kamath Defence Research and Development Organisation Bharat Electronics Complex Jalahalli Bengaluru -- 560013 Tel 080-28386801 23450099 Fax 080-28381750 28386809 28386804 E-mail director mtrdc.drdo.in www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 315 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO Director K.P.S. Murthy Sutarwadi Pune -- 411021 Tel 020-25869303 Fax 020-25869316 E-mail director hemrl.drdo.in INDIAN DEFENCE GAS TURBINE RESEARCH ESTABLISHMENT (GTRE) BUSINESS TECHNOLOGY DEFENCE LABORATORY JODHPUR (DLJ) CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Director Gopal Bhushan Metcalfe House New Delhi -- 110054 Tel 011-23902403 23812252 Fax 011-23819151 E-mail director desidoc.drdo.in CONTENTS 1 the MiniStry of hoMe affairS & Central arMed PoliCe forCeS Internal security has been defined as the act of keeping peace within the borders of a sovereign state or other self-governing territories generally by upholding the national law and defending against internal security threats. ndia s Homeland Security (interLT GENERAL V.K. nal security) and its security structure is the responsibility of the Ministry of Home Affairs (MHA) Government of India. In the Indian context in the era immediately after independence threats to India were mainly external -- from hostile nations. Despite the recommendations of various committees instituted by the government of the day the internal security threats were never so acute as to seriously induce the political leadership to reform the internal security apparatus. However as the challenges and threats to the internal security of India grew the government felt compelled to focus on this dimension of national security. Today s definition of security acknowledges political economic environmental social and human thread among other strands that impact the concept of security. Today it is the concern for security of the lowest common denominator of every society namely the human being which has resulted in the development of the concept of human security with focus on the individual and the people. Therefore the definition of security is related to the ability of the state to perform the function of protecting the well-being of its people. India s internal security challenges have varied roots -- from across the border hostilities permeating as insurgency in Kashmir and the North East to sections of community opting for military solutions to their issues as seen in various secessionist and rebel movements in the North East and Eastern regions to direct acts of terrorism driven by global outfits as was seen in the 26 11 terror strikes at Mumbai and finally the societal schisms in a multi-polar populace that at times breed breakaway thinking. In the recent past a growing number of incidents have led to increased visibility of this matter. The government s response in some cases was aggressive and timely. It almost seemed from these incidents as if the government was indicating changes in India s approach to its internal security strategy. However this hope was belied following the attack on Pathankot Air Force Base on January 2 2016 when the government response did not have the same aggressive touch as it had in the dastardly Chandel attack on 6 Dogra convoy in June 2015 by NSCN-K emanating from neighbouring Myanmar. i Abbreviations at the end of the yearbook KApooR (RETD) www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 317 REGIONAL BALANCE The government responded with an audacious raid by the Indian paracommandos (Special Forces) who pursued and eliminated insurgents rebels in neighbouring Myanmar. This was the first explicitly and openly declared case of hot pursuit signalling a pre-emptive aggressive and disproportionate response to provocation. Another indication of maturity of understanding was in early August 2015 with the government signing a draft of the Naga peace accord with the National Socialist Council of Nagaland. Thus bringing to culmination an effort of several decades and several Prime Ministers indicating a willingness to look at such issues not just as a law and order matter. Similarly in September 2015 Prime Minister Narendra Modi during his US visit directed global attention to the matter of terrorism and urged the UN to arrive at a common definition of terrorism and thus allow identification of countries and groups fomenting such events. In the same visit he also pushed for UN reforms and India having a seat on the Security Council. Both moves signaled India s more visible inclusive and assertive stand on driving global attention alignment and momentum to tackle the issue of terrorism. The above incidents were followed by the terror attack at Gurdaspur district of Punjab on July 27 2015 by Pakistan-based terrorists wherein seven persons were killed and 19 persons were injured but this did not elicit any greater response from the Central Government. The three terrorists responsible for the terror attack were killed during exchange of fire with the security forces. However the next indication of active diplomacy was in October 2015 when we politically negotiated return of two wanted persons to India -- gangster Chotta Rajan from Indonesia and Anup Chetia of the ULFA from Bangladesh. The Gurdaspur attack was followed up by the attack on Pathankot Airbase by Pakistan-based heavily armed terrorists on January 2 2016. They attacked the Pathankot Air Force Station part of the Western Air Command of the Indian Air Force. The operation resulted in the killing of five terrorists and six soldiers. The operation continued till January 4 and a fifth attacker was confirmed killed Get yoUr CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 2 indiaS internal SeCUrity ChallenGeS Keeping India safe is humungous task that ranges from traditional to non-traditional threats. The overlapping responsibilities between Centre and states add to its complexities. ndeavour to keep India is ranked next big threat. Crime is MAjoR GENERAL uMoNG sEThi (RETD) internally safe and secure at third position. Crime figures of aims at maintaining cohethe National Crime Records Bureau sion of the society and preserving democratic way of life by (NCRB) show a rising trend over the last few years and are indicaensuring sustained peace public order and rule of law. It is tive of rising civic disorder. Crimes against women adversely shape a comprehensive enterprise of the state its agencies private the country s image abroad. Terrorism & Insurgency is at No. 4. individuals society at large and the corporate sector. It even beckons Naxal terror and other insurgencies in various parts of India have a international cooperation in a few contingencies. The key intended debilitating effect on businesses. outcomes include disruption free society from all forms of catastroImprovement in India s global ratings on corruption and ease phe where public health safety and economic vigour is guaranteed of doing business indices have contributed to the decline in the and continuity of normal life assured. Disruptions result in harmful ranking of the risk of Corruption Bribery & Corporate Frauds over losses and damage to country s image. the last survey. Yet this along with political governance continues to The internal security challenges may be broadly categorised as rate high among risks. Theft or infringement of Intellectual Property traditional and non-traditional In combating traditional threats Rights (IPR) business espionage and accidents are some other risks . militaristic element plays a pivotal role in response. Battling that have been highlighted. insurgency terrorism Naxalism guarding borders and critical infraoverall Risk Rating 2016 structure come under this category. Non-traditional threats include larger question of border management human arms and drug traf- The cost of attrition to human and other resources in terms of value ficking terror financing dealing with unrest disaster and pandemic and time lost due to accidents is huge. To illustrate the point road management dealing with challenges emanating from proliferation accidents are the single largest cause of unnatural deaths in the of technology and its rapid obsolescence and the like. Countering country. Over 1 37 000 people were killed in road accidents in 2013 vast reach of social media Internet and white collar crime in cyber- alone that is more than the number of people killed in all our wars put together. There is one death every four minutes due to a road space are major challenges for the security establishment. accident in India. Corporate perspective A glimpse of changing perceptions over the past few years is The Federation of Indian Chambers of Commerce and Industry reflected in the following chart. (FICCI)-Pinkerton annual study India Risk Survey is an exercise Traditional Threats that showcases perceptions of business leaders policy makers experts and professionals spread across various sectors and differ- World witnessed terror attacks in Europe Africa West Asia ent parts of India. It brings to the fore perceived risks to the business Afghanistan Pakistan Bangladesh and Thailand in the past few months. India has been a persistent target of Pakistan-sponsored establishments. India Risk Survey 2016 is insightful. Strikes Closures & Unrest terrorism for over two decades. Internally Naxal groups have has been graded as the foremost concern affecting the Indian econ- mounted a few successful terror strikes primarily against the secuomy as the year gone by has seen major unrests in the form of the rity forces (SF). Globally India has been always ranked among the Jat and Patel demand for reservations. Labour unrest strikes and top ten countries that suffered terrorism since 2000. In 2015 India demonstrations protesting reforms land acquisition and indus- ranked sixth on the Institute of Economics and Peace s Global trial projects have seen a spike. Information & Cyber Insecurity Terrorism Index (GTI) for 2015. Wikipedia e Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 331 REGIONAL BALANCE Get yoUr CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 3 india S CoaStal SeCUrity Our vast coastline of 7 500 km offers vast investment opportunities . --Prime Minister Narendra Modi at Maritime India Summit April 14 2016 PRO Defence Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 341 REGIONAL BALANCE Get yoUr CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS i ndia has a coastline of 7 516.6 km industrialisation and last to develop LT GENERAL NAREsh ChAND (RETD) bordering the mainland and the skills of fishermen and other coastal islands which include nine states and island communities. A beginning i.e. Gujarat Maharashtra Goa Karnataka Kerala Tamil Nadu has been made with the allotment of 38 crore (about 5.8 milAndhra Pradesh Odisha and West Bengal and four union ter- lion) for three rail port connectivity projects. It is expected that ritories i.e. Daman and Diu Lakshadweep Puducherry and Sagarmala could push India s merchandise exports to 110 billion Andaman and Nicobar Islands. Out of the states Gujarat has the by 2025 and create an estimated 10 million direct and indirect new longest coastline of 1 214.7 km and Goa has the smallest coastline jobs. Sagarmala looks promising when you compare with a similar of 101 km. Out of the union territories Andaman and Nicobar project at Shenzhen in China. Since 1978 it has helped create an Islands have the longest coastline of 1 962 km and Daman and Diu estimated seven million jobs and the city s GDP grew 50 times to has the shortest coastline of 42.5 km. 180 billion after the development of ports. If Indian port develMajor and Minor Ports. The nine coastal Indian states are home opment takes off similarly local and foreign funds would flow in to all major and minor ports of India. There are 12 major Indian and coastal regions may become good bets for real estate too as ports which are under the Government of India and can handle a they will see industry and job growth. Logistic costs savings of over large volume of cargo and container traffic. Kamarajar Port (for- 35 000 crore (about 5.38 billion) per year can also help the Centre merly called Ennore Port Limited) is the 13th port and the first port spend on development and possibly reduce taxes. Sagarmala once which is a public company. Located on the Coromandel Coast it is developed will need additional security as any threat to it will comthe only corporatised major port which is registered as a company. promise India s economy security. Apart from these there are about 200 minor ports. Maritime Trade Project Sagarmala. It is a series of projects to develop coastal India and also link the inland waterways to reduce cost and time As per UNCTAD s (United Nations Conference on Trade and for transporting goods to benefit the industry and export import Development) report Review of Maritime Transport -- 2015 India trade. In India the cost of transportation is 18 per cent of GDP as owns 849 ships with a combined DWT (deadweight tonnage) of compared to China where it is less than 10 per cent. It was originally 2 18 15 155 as compared to China which has 4 966 ships with a planned by the Vajpayee Government in 2003 but did not make any combined DWT of 15 75 57 210 Denmark has 930 ships with a headway. The present NDA Government launched the project in combined DWT of 3 61 79 664 and Greece has 4 017 ships with a July 2015 and its National Perspective Plan was launched during combined DWT of 27 94 29 790. India holds 1.26 per cent of the April 2016 which when implemented will transform the Indian world s fleet as compared to China which holds 9.08 per cent. ports and coastal regions. The project is very ambitious has 150 During 2014 India has exported 3.07 million TEUs (Twenty Foot initiatives at a total outlay of 4 00 000 crore (about 61.5 billion). Equivalent Unit is the unit of the capacity of a container ship) and Sagarmala covers four broad segments to include modernisation imported 2.39 million TEUs. These capacities are bound to increase off port infrastructure add six new ports and enhance capacity because India is one of the fastest growing major economies in the improve port connectivity through rail corridors freight-friendly world with an expected GDP growth rate of 7.5 per cent. UNCTAD expressways and inland waterways create 14 coastal economic had declared India as the fourth most attractive FDI destination zones (CEZs) and a special economic zone at Jawaharlal Nehru Port in the world during 2015-16. Over the last decade seaborne trade Trust in Mumbai with manufacturing clusters to enable port-led has grown at twice the global growth rate of 3.3 per cent. Maritime TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 4 the MaoiSt inSUrGenCy The states need to counter the Maoist insurgency in synergised fashion simultaneously at the socio-political moral and physical planes population being the centre of gravity and military operations only being part of the response. Abbreviations at the end of the yearbook Maoists The Maoist document titled Strategy and Tactics for the Indian Revolution scripted as late as 2004 states The central task of the Indian revolution is the seizure of political power. To accomplish this the Indian people will have to be organised in the People s Army and will have to wipe out the armed forces of the counter revolutionary Indian state and establish in its place their own state. It further goes on to say As a considerable part of the enemy s armed forces will inevitably be engaged against the growing tide of struggle by various nationalities it will be difficult for the Indian ruling classes to mobilise all their armed forces against our revolutionary war. Another document titled Urban Perspective Our Work in Urban Areas (UPUA) says At present the revolutionary movement is www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 345 REGIONAL BALANCE Get yoUr CoPy to read in CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS a sked during a media interLT GENERAL p.C. view on completion of twoyear NDA rule on May 27 2016 what was the most important issue on the Home Minister s table Rajnath Singh replied The era of violence must end. Be it Maoist terrorism or any other violence. A month earlier on April 16 chairing a high-level meeting of Chhattisgarh Police and paramilitary officials in presence of Chhattisgarh Chief Minister Raman Singh Rajnath Singh had said Naxalism is a serious challenge to the democracy. To root out the Maoist menace the Centre is committed to extend every possible support to Naxal-hit states including Chhattisgarh. He appreciated several schemes and development activities of the Bharatiya Janata Party (BJP) government in Chhattisgarh for improving education health and employment adding that the morale of the forces deployed in the left-wing extremism (LWE)-affected areas is high while reviewing counter-insurgency operations and strategies and development activities in the insurgency-hit areas. The Home Minister s statements reflect the ground reality that the Maoists insurgency is alive and kicking. The Central Reserve Police Force (CRPF) being the prime anti-insurgency force in the country it is significant to note that then CRPF Director General (DG) Prakash Mishra said on February 19 2016 that while the focus of anti-Naxal operations continues to be the worst Maoist violence-hit states of Chhattisgarh and Jharkhand areas around the Andhra PradeshOdisha border (AOB) and those within Odisha need more attention. In actual terms this is an indictment of the Centre s anti-Naxal policy because the DG CRPF surely was hinting at a required course correction. According to him Naxal activity in the state was coming back in the Narayanpatna area of Koraput district which borders Andhra Pradesh. As for Maoists activities this year on April 20 Maoists triggered bomb blasts at an under-construction Constable Training Centre beside a CRPF camp under Jadugora police station limits in Jharkhand. Though KAToCh (RETD) no casualties were reported 11 lowintensity bombs were placed on the under-constructed boundary wall of the training centre but six of them exploded. Subsequently with a woman Naxal killed in an encounter in the Gatta area of Pendhri in Gadchiroli on July 21 (first day of the Naxal martyrs week) the number of Naxalites killed in encounters this year has gone up to 11 six of them women. It may be recalled that Maoist attack in Sukma in April 2015 killing seven personnel of the Chhattisgarh Special Task Force (STF) and injuring 10. The very next day Maoists had burned 17 vehicles of road construction and in the third consecutive incident five policemen were killed and seven injured in a landmine blast. More recently the anti-terror squad (ATS) of Uttar Pradesh Police recovered huge quantities of ammonium nitrate gelatin sticks and detonators from Kanpur and Jhansi on August 25 2016 (92 sacks of ammonium nitrate and 4 000 gelatin rods from Jhansi and 20 000 gelatin rods six quintals of ammonium nitrate and 30 000 detonators were recovered from Kanpur). The two recoveries are linked to a previous haul in Kanpur in July 2016 when three sacks of detonators were found. TECHNOLOGY CONCEPTS & PERSPECTIVES CRPF WEAPONS EQUIPMENT VEHICLES CONTENTS hoMeland SeCUrity Who S Who indian hoMe MiniStry Rajnath singh Minister of Home Affairs Rajnath Singh entered politics in 1974 and in 1977 he was elected as an MLA in the Uttar Pradesh Assembly. He was elected MLC for Uttar Pradesh Legislative Council in 1988 and became Education Minister in 1991. During his tenure as Education Minister in UP he established some landmark decisions by introducing the AntiCopying Act and Vedic Mathematics in the syllabus. He became a member of the Rajya Sabha in 1994. On November 22 1999 he became Union Surface Transport Minister. During this period he got the opportunity to initiate the NHDP (National Highway Development Programme) a dream project of Prime Minister Atal Bihari Vajpayee. On October 28 2000 he became Chief Minister of Uttar Pradesh and was twice elected as MLA from Haidargarh constituency in Barabanki.On May 24 2003 he became Union Minister of Agriculture and subsequently for Food Processing. During this period he initiated a few epochmaking projects like Kisan Call Centre and Farm Income Insurance Scheme. He became the BJP National President on December 31 2005 a post he held till December 19 2009. In May 2009 he was elected Member of Parliament from Ghaziabad and in 2014 from Lucknow parliamentary constituency. On May 26 2014 Rajnath Singh took over as the Union Minister for Home Affairs. Kiren Rijiju Minister of State for Home Affairs Born in Nafra Arunachal Pradesh on November 19 1971 Kiren Rijiju s life is an embodiment of national integration. After doing his schooling from Arunachal he did his BA (Hons) from the prestigious Hansraj College of Delhi University and followed it up with a law degree from the Faculty of Law Delhi University. He is married to Joram Rina Rijiju an Assistant Professor of History with three children. In 2004 he was elected to the 14th Lok Sabha from West Arunachal Pradesh constituency which is one of the largest in the country. As MP Rijiju quickly earned the respect of his more seasoned colleagues by his active participation in parliamentary work both inside and outside the House and he was duly adjudged as the Best Young Parliamentarian by the media. Despite growing up in one of the most remote and underdeveloped regions of the country he has embraced the opportunities life has offered him and today is widely recognised as the voice of the North East both within the Government of India and in the public eye. Rijiju was elected to the 16th Lok Sabha on May 16 2014. In recognition of his work he was inducted by Prime Minister Narendra Modi into the Council of Ministers as a Minister of State in the Ministry of Home Affairs on May 26 2014. hansraj Gangaram Ahir Minister of State for Home Affairs Hansraj Gangaram Ahir was born on November 11 1954 at Nanded Maharashtra. He did his schooling from Chandrapur. He is married to Smt. Lata Ahir and has three children. He has been a Member of Maharashtra Legislature Council in 1994-96 and was elected to Lok Sabha in 1996 and re-elected in 2004 and was a member of Standing Committee on Coal & Steel Committee on Food Management in Parliament House Complex and Standing Committee on Agriculture. He was also a member of the Joint Parliamentary Committee on WAKF. He has been a member of Business Advisory Committee and Chairperson of Committee on Coal & Steel. In recognition of his work he was inducted as Union Minister of State for Chemicals & Fertilisers since November 9 2014 and he held this post till he took over as the Minister of State in the Ministry of Home Affairs. Rajiv Mehrishi www.spguidepublications.com Home Secretary Rajiv Mehrishi was born on August 8 1955 in Rajasthan has taken over as Union Home Secretary w.e.f. August 31 2015. He is a 1978-batch Indian Administrative Service (IAS) officer of Rajasthan cadre. Mehrishi is an alumnus of St. Xaviers School in Jaipur and got a master s degree from Delhi s St. Stephen s College. He holds a degree in management from the United Get yoUr CoPy to read in CoMPlete Kingdom. He was Finance Secretary to the Government of India from October 29 2014 to August 31 2015. In his earlier assignments he has worked in the Ministries of Petroleum Corporate Affairs Overseas Indian Affairs and Fertilisers. He has also worked in the President Secretariat and in Cabinet Secretariat. He was Chief Secretary of Rajasthan in 2013-14. 2016348 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com Contents Afghanistan Algeria Australia Bahrain Bangladesh Bhutan Brunei Cambodia People s Republic of China Egypt Indonesia Iran Iraq Israel Japan Jordan Kazakhstan Kuwait Kyrgyzstan Laos Lebanon Libya 349 349 349 349 350 350 350 350 350 350 351 351 351 351 351 351 352 352 352 352 352 352 Malaysia Myanmar Nepal North Korea Sultanate of Oman Pakistan The Philippines Qatar Saudi Arabia Singapore South Korea Sri Lanka Syria Taiwan Tajikistan Thailand Turkey Turkmenistan United Arab Emirates Uzbekistan Vietnam Republic of Yemen 352 352 353 353 353 353 353 354 354 354 354 354 354 355 355 355 355 355 355 356 356 356 NEW MoD Organisations & Contacts of Asian Countries Australia 357 Bangladesh 359 Brunei 361 Indonesia 363 Japan 364 Malaysia 365 Mynamar 368 The Philippines 369 Singapore 371 South Korea 373 Sri Lanka 374 Thailand 375 Vietnam 376 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Asian Who s Who CONCEPTS & PERSPECTIVES section five 5 WEAPONS EQUIPMENT VEHICLES CONTENTS Who S Who in aSian defence forceS Compiled by SP Guide Publications team (as on December 13 2016) Head of State and Government (President) Dr Ashraf Ghani Ahmadzai First Vice President Abdul Rashid Dostum Second Vice President Sarwar Danish Defence Minister Lt Gen Abdullah Khan Habibi Foreign Minister Salahuddin Rabbani Interior Minister Taj Muhammad Jahed Chief of General Staff of the Armed Forces General Qadam Shah Shahim Commander of the Air Force Major General Abdul Wahab Wardak Ministry of Defence Opposite Presidential Palace Kabul Afghanistan Tel 93 20 2300331 2100452 2100458 Commander of the Air Forces Major General Lounes Abdelkader Commander of the Gendarmerie Major General Menad Nouba Ministry of Defence B.P. 184 Alger Gare Alger Algeria Tel 213 21 711515 National People s Army HQ Ministry of National Defence Avenue Ali Khoudja Algiers Algeria q BAhrAin BUSINESS REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE Head of State King Hamad Bin Isa Al Khalifa Prime Minister Shaikh Khalifa bin Salman Al Khalifa Crown Prince and Defense Force Commander-in-Chief and First Deputy Prime Minister Salman bin Hamad bin Isa Al Khalifa Minister of Interior Lt General Sheikh Rashed bin Abdulla Al Khalifa Deputy Prime Minister Shaikh Mohammed bin Mubarak Al Khalifa Deputy Prime Minister Shaikh Ali bin Khalifa Al Khalifa Deputy Prime Minister Jawad bin Salem Al Arrayed Deputy Prime Minister Shaikh Khalid bin Abdulla Al Khalifa Minister for Defence Affairs Major General Yusuf bin Ahmed bin Hussain Al Jalahma q AustrAliA Head of State Queen Elizabeth II (since February 6 1952) Governor General Peter John Cosgrove Prime Minister Malcolm Turnbull Defence Minister Marise Payne Chief of the Defence Force Air Chief Marshal Mark Binskin Chief of Army Lt General Angus J. Campbell Chief of Navy Vice Admiral Tim Barrett Chief of Air Force Air Marshal Leo Davies Abbreviations at the end of the yearbook q AlgeriA Head of State (President) Abdelaziz Bouteflika Prime Minister Abdelmalek Sellal Chief of General Staff and Vice Minister of National Defence General Ahmed Salah Gaida Commander of the Land Forces Major General Ahcene Tafer Chief of Joint Operations Vice Admiral David Lance Johnston Get yoUr coPy to read in coMPlete 2016 SP s Military yearbook 2017 44th issue 349 Ministry of Defence Post Box 245 West Rifa a Bahrain Tel 973 17653333 Fax 973 17663923 www.spsmilitaryyearbook.com TECHNOLOGY q AfghAnistAn Commander of the Naval Forces Major General Mohammed-Larbi Haouli Department of Defence Campbell Park Offices Post Box 7911 Canberra BC ACT 2610 Australia Tel 61 2 61449190 CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS Compiled by SP Guide Publications team (as on December 13 2016) Note from the Editor-in-Chief With effect from this issue we have added a new chapter within Who s Who in Asian Defence Forces in which we are including considerably extensive information on the Ministries of Defence in major Asian countries providing our readers with critical facts like organisational structure and contact details. We hope that this new section will especially enable the stakeholders from the industry in doing business and collabrate more expeditiously. Countries being covered in this new subsection are nAustralia MoD contact details and organisational structure nBangladesh MoD contact details nBrunei MoD contact details and organisational structure nIndonesia MoD organisational structure nJapan MoD organisation structure nMalaysia MoD contact details and organisational structure nMyanmar MoD organisational structure nPhilippines MoD contact details and organisational structure nSingapore MoD contact details and organisational structure nSouth Korea (Republic) MoD organisational structure nSri Lanka MoD contact details and organisational structure nThailand MoD organisational structure nVietnam MoD organisational structure AustrAliA moD contact Details Name Designation Location 2-12 Macquarie Street Parramatta NSW 2150 429 Magill Road St Morris SA 5068 190 Gray St Hamilton Victoria 3300 73 Kepler Street Warrnambool Victoria 3280 R1-5-CDF Suite Russell Drive Russell ACT 2601 R1-5-B025 Russell Drive Russell ACT 2601 PO Box 7900 Canberra BC ACT 2610 PO Box 7902 Canberra Bc ACT 2610 Postal Address Telephone Fax 61-2-96878466 61-8-84312288 E-mail senator.payne aph. gov.au C.Pyne.MP aph. gov.au Senator the Hon Minister for Marise Payne Defence PO Box 1420 61-2-96878755 Parramatta NSW 2150 61-8-84312277 Abbreviations at the end of the yearbook The Hon Christopher Pyne MP The Hon Daniel Tehan MP Minister for Defence Industry Minister for Defence Personnel 61-2-62774393 61-2-62778538 ACM Mark Binskin AC Vice Admiral Ray Griggs AO Chief of the Defence Force Vice Chief of the Defence Force 61-21300333362 www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 357 REGIONAL BALANCE Get yoUr coPy to read in coMPlete 61-21300333362 ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES Mod orGaniSationS & contactS of aSian coUntrieS WEAPONS EQUIPMENT VEHICLES CONTENTS Contents One Two Three Four Five Six GDP & Military Expenditure Central & South Asia East Asia Pacific Rim & Australia West Asia nd North Africa Asia-Pacific Environment Equipment & Hardware Specifications An Overview 377 381 415 463 509 517 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Regional Balance CONCEPTS & PERSPECTIVES section six 6 WEAPONS EQUIPMENT VEHICLES CONTENTS 1 GDP & Military exPenDiture Total estimated gross domestic product All figures in USD billions Sr. No. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Country Afghanistan Algeria Australia Bahrain Bangladesh Bhutan Brunei Cambodia China Democratic People s Republic of Korea Egypt India Indonesia Iran Iraq Israel Japan Jordan Kazakhstan Kuwait Kyrgyzstan Laos Lebanon Libya 2016 17.275 165.974 1200.778 30.079 226.257 2.475 9.097 19.476 11383.033 NA NA 2288.715 936.955 386.12 148.411 306.194 4412.603 39.795 116.151 106.212 6.03 13.359 52.797 39.315 2017 17.449 173.856 1262.336 31.959 246.73 2.759 10.103 21.015 12263.429 NA NA 2487.937 1024.001 409.297 164.418 316.77 4513.754 42.299 135.133 119.904 6.403 14.235 54.063 47.788 2018 18.468 179.588 1330.245 33.549 269.491 3.146 11.482 22.835 13338.231 NA NA 2724.756 1109.961 440.047 177.245 328.461 4562.206 45.091 149.976 131.276 7.023 15.28 Estimated per capita GDP. Figures in US 2015 599.994 4318.135 50961.865 23509.981 1286.868 2843.402 28236.64 1168.036 7989.72 NA 3740.249 1617.309 3362.357 4877.069 4819.487 35343.336 32485.545 5513.009 9795.629 29363.027 1112.81 1778.713 Population (Thousands) 32 527 39 667 23 781 1 377 160 996 423 15 578 1 371 220 25 155 91 508 257 564 79 109 36 423 8 380 126 958 7 595 17 544 3 892 5 957 6 802 5 851 Abbreviations at the end of the yearbook 16 17 18 19 20 21 22 23 24 56.218 53.206 www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 377 REGIONAL BALANCE Get your CoPy to reaD in CoMPlete 11236.793 6058.671 6 278 ASIAN WHO S WHO INDIAN DEFENCE 1 311 051 BUSINESS 775 TECHNOLOGY 2015 CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 2 Central & South aSia Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 381 REGIONAL BALANCE Central Asia Central Asia central region of Asia extending from the Caspian Sea in the west to the border of western China in the east it is bounded on the north by Russia and on the south by Iran Afghanistan and China. The region consists of five former Soviet republics of Kazakhstan Uzbekistan Tajikistan Kyrgyzstan and Turkmenistan. It is a region that once used to be called the Centre of the World . ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY C entral and South Asia together account for about one-quarter of the world s population. Both the regions have countries that are mostly underdeveloped and poor. Central Asia lies at the crossroad of Europe and Asia and together with South Asia constitutes one of the most unstable regions of the 21st century. It encompasses the world s largest landmass (39 95 800 sq km) and has vast natural resources including significant reserves of oil and gas. Historically it has acted as a crossroad for the movement of people goods and ideas between Europe West Asia South Asia and East Asia. On the other hand South Asia is strategically important because it lies astride the main sea routes from West Asia to the Far East. Further India s economic growth and dynamism had made South Asia an attractive destination for foreign investment. India s economy since its slowdown in 2012 has now picked up and India expects its economy to grow at 7-7.5 per cent in the fiscal year to March 2017. The Economic Survey the basis for the Finance Minister s Annual Budget in February 2016 has projected India to grow 8 per cent in the next couple of years. India has overtaken China as the fastest growing major economy in the world expanding to 7.3 per cent and cementing its position as one of the sole bright spots in a flailing global economy. Economic growth is now expected to hit the high of 7.6 per cent in 2016 according to Delhi s Central Statistics Office higher than the 7.2 per cent reached in 2014. However the government s demonetisation move on November 8 2016 could dampen the GDP growth this year and next year. The exact impact has still to be worked out. The International Monetary Fund (IMF) expects India to grow at 6.6 per cent for the current year and 7.2 per cent next year. The Indian Government on June 20 2016 announced what it termed a radical liberalisation of the foreign direct investment (FDI) regime by easing norms for a host of important sectors including defence civil aviation and pharmaceuticals opening them up for complete foreign ownership. Given its abundant energy resources and by virtue of its geographical location it has consistently been in the limelight. In the 19th century it was the theatre of the classic great game which was played out between the Russian and the British empires. Later it became a prized possession of the Soviet Union. The collapse of the Soviet Union led to the independence of the Central Asian states. The 9 11 terrorist attacks in the United States brought further global attention to this region reiterating its geostrategic relevance. Along with this the presence of hydrocarbons has again made this region important. The key players in this region are the United States Russia and China. Central Asia s landscape can be divided into the vast grassy steppes of Kazakhstan in the north and the Aral Sea drainage basin in the south. About 60 per cent of the region consists of desert land the principal deserts being the Karakum occupying most of Turkmenistan and the Kyzyl-Kum covering much of western Uzbekistan. Most of the desert areas are unsuitable for agricultural use except along the margins of the Amu Darya and Syr Darya river systems which wind their way north-westward through Kyrgyzstan Tajikistan and eastern Uzbekistan and Turkmenistan after rising in mountain ranges to the south and east. Those two major rivers drain into the Aral Sea and provide most of the region s water resources though northern Kazakhstan is drained by rivers flowing north into Russia. On the east and south Central Asia is bounded by the western Altai and other high mountain ranges extending into Iran Afghanistan and western China. Central Asia experiences very dry climatic conditions and inadequate precipitation has led to heavy dependence on the Syr Darya and Amu Darya for irrigation. The region as a whole experiences hot summers and cool winters with much sunshine and very little precipitation. The scarcity of water has led to a very uneven population distribution with most people living along the fertile banks of the rivers or in fertile mountain foothills in the south-east comparatively few live in the vast arid expanses of central and western Kazakhstan and western Uzbekistan and Turkmenistan. The Fergana Valley is the best suited land in Central Asia for hosting a large population. Soviet leader Josef Stalin split the valley up between the Soviet republics that would become the countries of Central Asia to ensure the region remained divided however Uzbekistan controls most of the basin itself Tajikistan controls the most accessible entrance to the valley from the west and Kyrgyzstan controls the high ground around the val- CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balanCe ley. Uzbekistan also controls several exclaves within Kyrgyzstan s portion of the valley affording the Uzbek Government and Uzbek citizens (including militants) access fairly deep into Kyrgyz territory. These complex geographic and political divisions ensure that no one country can dominate Central Asia s core and hence Central Asia itself. Central Asia is referred to as the backyard of Russia and China. It has emerged as the focal point of rivalry between the United States on the one side and Moscow and Beijing on the other side. Post-9 11 Central Asia also emerged as the epicentre of geopolitical changes on a global scale. The United States became the main economic donor and assumed security responsibility enabling it to establish military presence in the region and set up military bases in four out of the five Central Asian states. Due to intensely competitive ties among countries of the region as well as the key players namely the United States Russia and China the American presence now has reduced. The war in Afghanistan has been both a boon and curse for neighbouring Central Asia. The conflict placed this sparsely populated region long disconnected from the globalisation taking place around its borders on the front lines of the international community s 15-year effort to stabilise Afghanistan. Central Asia became a staging point for coalition military forces a transit corridor a donor as well as a recipient of aid and at times a pawn in a larger strategic competition playing out between the United States and Russia. The region also found itself on the receiving end of Afghanistan s noxious exports extremism drugs and crime. With the war in Afghanistan -- or at least the international community s direct participation in it -- having wound down Central Asia s leaders worry more and more about the prospect of instability both at home and next door in Afghanistan. While extremism has long simmered beneath the surface in parts of Central Asia the changing political landscape in Afghanistan -- and Pakistan -- coupled with the rise of the so-called Islamic State in the Middle East is stoking fears of renewed unrest. Though the five Central Asian states are politically diverse the region s authoritarian regimes are responding to the threat by becoming more insular feeding a vicious circle. It is interesting to note that while each major player tries to accomplish its national interests through their grand strategies. the countries of Central Asia are using their own strategies to balance the relationships which seem threatening. Three different strategies have been employed to balance out the major players including strategic partnership. non-alignment and a multi-vectored approach. The key to what became known as Kazakhstan s multivectored approach is to build strategic partnerships with all three powers. Today this policy has eroded somewhat under pressure from Russia s Eurasec Gazprom and the Shanghai Cooperation Organisation (SCO) but it nonetheless remains in place. The major attraction for key players as also countries like India Japan and the European Union is the vast energy reserves of the Caspian basin. Russia which already enjoys military presence in the region has in conjunction with China sought to counterbalance Washington s influence in the region through SCO. Russia is also further increasing its troop deployment in the region. It is also reported that the Islamic State (IS) is attracting Central Asians to Syria and fostering new links among radicals within the region. Unless the five Central Asian governments develop a credible coordinated counter-action plan including improved security measures but also social political and economic reforms growing radicalism will eventually pose a serious threat to their stability. CentrAl & south AsiA Pakistan-Afghanistan region The region spanning Pakistan and Afghanistan in South Asia has been the focus of the global war on terrorism since the catastrophic events of 9 11. International terrorism has come to occupy a prominent position on the security agenda of virtually every state. Additionally Pakistan-occupied Kashmir (PoK) continues to foment terrorism in Jammu and Kashmir since 1989 and now Pakistan s Inter-Services Intelligence (ISI)-inspired terrorist activity has spread across India establishing their cells within home-grown groups bedevilling relationship between the two countries. Mumbai terrorist attacks on November 26 2008 which emanated from Pakistan created an impasse in their relationship. However much water has flowed since then and despite a new civilian government under Prime Minister Nawaz Sharif the performance of the government has been poor and military control has not diminished. The nation has not progressed. In its neighbourhood in India Prime Minister Narendra Modi s nationalist party the Bharatiya Janata Party has taken over the reins of the government in May 2014 and has promised to deliver good governance. After an initial bonhomie with Pakistan the ceasefire violations on the line of control (LoC) and international border and infiltration of terrorists from PoK into Jammu & Kashmir have continued. Pakistan sponsored terror groups carried out five major attacks during the 2015-16. First attack took place in Gurdaspur district of Punjab on July 27 2015 wherein seven persons were killed and 19 injured. Three terrorists were also killed. The second attack was on January 2 2016 by a heavily armed group attacking Pathankot Air Force Station. Six attackers and six security forces personnel were killed during the operations. This was followed by another terrorist attack in Pampore in which a bus carrying over 40 CRPF (Central Reserve Police Force) officers killing eight officers and injuring over 20 others critically. In the ensuing gun battle two of the militants were killed. The fourth major incident took place in the early hours of September 18 2016 when four terrorists from Pakistan struck a brigade headquarters administrative base at Uri and killed 17 unarmed and unsuspecting soldiers in their tents in Jammu and Kashmir. The nation s anger at this dastardly act was visible and perceptible. The riposte from Indian Army came 10 days later and on the night of September 28 29 Indian Army s Special Forces struck at seven launch pads of the terrorists across the LoC along a frontage of about 200 km in two different Corps Zones of the army thus achieving complete surprise over the Pakistani military establishment and inflicted considerable casualties on the terrorists. This action by itself proved to be a manifestation of the new overall strategy of the Government of India to deal with the proxy war waged by Pakistan against India since 1989. On November 29 2016 once again a group of three terrorists from Pakistan breached the army base in Nagrota near Jammu in police uniforms and attacked the Indian Army s 166 Field Regiment unit. It was two young majors in their early 30s that fought them -- and ultimately died in the line of duty. Majors Gosavi Kunal Mannadir and Akshay Girish Kumar led Quick Response Teams each with about 15 men to counter the terrorists of whom three were killed after a five-hour gun battle. Five soldiers and two officers of the army died in this operation. Following the terror strikes a range of themes highlighting issues of strategic handling of such situations types of forces to be employed and their command and control border guarding perimeter defences use of technology ability of local police to follow up the specific intelligence inputs to intercept the terror- www.spguidepublications.com 2016382 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com CentrAl & south AsiA Central & South aSia www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 383 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balanCe ists before the strike and the lack of community involvement were widely debated in the media and among the security experts. Summer of 2016 also saw an unprecedented unrest in Kashmir. A series of violent protests in the Kashmir Valley erupted aided and supported by Pakistan and consequent action by police and CAPFs (Central Armed Police Forces) resulting in many deaths and injuries. Situation turned ugly following killing in an encounter of Burhan Wani a terrorist commander of Hizbul Mujahideen on July 8 2016. Protests started in all ten districts of the Kashmir Valley. The protests lasted more than 120 days and were halted when the demonetisation of the currency was announced on November 8 indicating once again that the unrest was being fuelled by money being pumped in from across the border in Pakistan to pay the stone-pelters involved in the unrest. The four major uncertainties in post-2014 Afghanistan (security reconciliation trade and regional cooperation) all have external routes. While the United States will in all probability continue to manage the situation from the background in line with its own national interests continued instability in Afghanistan will have adverse consequences for all its neighbours including Pakistan Iran and Central Asian Republics India and China. Pakistan will need to restrain its proxies. The regional countries need to collectively contribute to the stability of Afghanistan and help in the country s reconstruction. The security situation in Afghanistan continues to be dominated by a resilient insurgency but the Afghan Government remains in control of all major population centres and key lines of communication and the Afghan security forces continue to deny the Taliban strategic ground throughout the country. Although the Taliban maintained a higher than usual operational tempo over the winter. On May 21 2016 the US Department of Defense (DOD) conducted an airstrike that targeted and killed Taliban leader Mullah Mohammad Mansour in a remote area of the AfghanistanPakistan border region. Mansour had been actively involved with planning attacks against facilities in Kabul and across Afghanistan presenting a threat to US personnel coalition partners and Afghan civilians and security forces. On May 25 2016 the Taliban announced that one of Mansour s deputies Mullah Haybatullah Akhundzada would replace Mansour as the new leader of the Taliban. The Taliban also named Mullah Muhammad Yaqub and Sirajuddin Haqqani as Akhundzada s deputies. The continued development of an Al Qaeda affiliate in the region Al Qaeda in the Indian Subcontinent (AQIS) highlights the dynamic nature of the terrorist and militant landscape in the region. The United States continues to support the re-invigorated efforts of the Quadrilateral Coordination Group which includes the Afghan Pakistani and Chinese governments to set conditions for an eventual Afghan-led Afghan-owned peace process with the Taliban and other militant groups. south Asia The South Asian scene has been marred by hostility between the nuclear-armed India and Pakistan and even more by internal unrest in most of the countries of this region. India is battling terrorism in Jammu and Kashmir in its north-eastern states and in the rest of the country. Left-wing extremism (LWE) has affected a large number of states. In terms of geographical spread the worst affected states are Chhattisgarh Jharkhand Odisha and Bihar. However pockets also exist in Maharashtra West Bengal Andhra Pradesh Madhya Pradesh Telangana and Uttar Pradesh. www.spguidepublications.com CentrAl & south AsiA LWE remains an area of concern for internal security of the country. While 106 districts in 10 states are affected by LWE in varying degrees 35 districts in 7 states are the most affected districts. LWE violence reached its peak in 2010. It started declining from 2011 and this trend continues in the current year as well. In 2015 1 088 incidents of LWE violence took place resulting in 226 deaths as compared to 1 091 incidents with 310 resultant deaths in 2014. nepal Nepal saw revenge politics and paranoia by the government of Prime Minister K.P. Oli who resigned from his post on July 24 2016 just minutes before facing a no-confidence vote he was expected to lose. CPN (Maoist-Centre) Chairman Pushpa Kamal Dahal has played deft kingmaker carving out a political space for himself between the Nepali Congress Party (NC) and the Unified MarxistLeninist Party (UML) and mending bridges with New Delhi. But Dahal s time is limited as he must step down in nine months to make way for the NC s Sher Bahadur Deuba. Nepal s urgent problems a year after an earthquake killed nearly 9 000 people is rehabilitation but the government has been struggling to find firm footing since the end of a decade-long insurgency in 2006 and the tumultuous process of adopting a new Constitution last September. Some 7 70 000 Nepalese households are still waiting for help to rebuild homes destroyed in the earthquake. Little of the 4.1-billion in foreign grants and soft loans pledged last year for reconstruction have not been properly disbursed because of Nepal s political squabbling. The Constitution adopted by Nepal in September 2015 was amended on January 24 2016. The amendments supported by 461 of the 601 members of the Nepali Parliament covered Article 42 to ensure more inclusive social justice Article 84 to create House of Representatives and Article 286 which will create a new process of constituency delimitation helping the Madhesi groups. All the three elements of the amendment were part of a deal between the Nepal Government and its mainstream political parties and the rebel Madhesi political formation of the United Madhesi Democratic Front (UMDF) which has been agitating for the changes in the Constitution. The amendment process however did not include the main demand of the Madhesis for the creation of two separate Madhesi provinces on the plains of Nepal. Now more than a year under a dysfunctional statute the present political equation in the Parliament may finally favour the ruling Communist Party of Nepal (Maoist Centre) and the Nepali Congress to table an amendment proposal and bring the protesting constituencies into an agreement. The relations between Kathmandu and New Delhi soured after the supply of fuel and essential commodities to Nepal were choked off by the Madhesi parties to mount pressure on the government to address the demands raised by them. During his state visit to India early in 2016 Prime Minister K.P. Oli said the relations between the two countries have normalised But that claim seemed hol. low when Nepal abruptly cancelled President Bidya Bhandari s India visit and recalled its ambassador to India Deep Narayan Upadhayay. The distrust continues. The first meeting of the Eminent Persons Group (EPG) jointly formed by Nepal and India to review the bilateral relations between the two countries kicked off in Kathmandu on July 4 2016. Inaugurating the meeting Foreign Affairs Minister Kamal Thapa expressed his hope that the meeting will help strengthen NepalIndia relations which political analysts believe reached a nadir 2016384 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com CentrAl & south AsiA in the wake of last year s Indian blockade against the landlocked Himalayan country. The dismal picture of political democracy that Sri Lanka presented in 2014 has improved substantially with the defeat of the authoritarian Rajapaksha regime. The new government of Maithripala Sirisena or also referred to as Maithri is a Sri Lankan politician who is the seventh and current President of Sri Lanka since 2015. He has taken initial steps to restrict executive power and to address some of the factors that had pushed many Tamils into the arms of the separatist movement although there is no clear policy of national reconciliation as yet. In the north and east of the country effort is required to rebuild infrastructure and restore welfare services. The change of government in early 2015 was also accompanied by a realignment of Sri Lanka s foreign relations continuing economic links with China Russia and Iran are now complemented by greater reliance on India and the West. Under the new President there seems to be a greater openness to dialogue but the extent to which this will play out is not yet clear. Central & south Asia nKazakhstan nKyrgyzstan nTajikistan nTurkmenistan nUzbekistan nAfghanistan nBangladesh nBhutan nIndia nNepal nPakistan nSri Lanka In January 2014 the incumbent Awami League (AL) in Bangladesh won the national election by an overwhelming majority after the Bangladesh Nationalist Party (BNP) boycotted extending Sheikh Hasina s term as Prime Minister. With the help of international development assistance Bangladesh has reduced the poverty rate from over half of the population to less than a third achieved Millennium Development Goals for maternal and child health and made great progress in food security since independence. The economy has grown at an annual average of about 6 per cent www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 385 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Bangladesh CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES sri lanka over the last two decades and the country reached the World Bank lower-middle income status in 2015. The terror attack in Bangladesh on July 1 2016 at the Holey Artisan Bakery by home-grown terrorists suggests that Bangladesh s militant networks are internationalising a key concern as the United States seeks to contain the growth of the Islamic State. Bangladesh s 160 million people are almost all Sunni Muslims including a demographic bulge under the age of 25. This makes it valuable as a recruiting ground for the Islamic State now under pressure in its core territory of Iraq and Syria. Western intelligence officials have been watching the organisation pivot to missions elsewhere in the world launching attacks on far-flung civilian targets that are difficult to deter with traditional military campaigns. Bangladesh now feels that they need to take a serious stock of the overall threat. Details pertaining to economic review security environment and the armed forces of the countries of this region are as follows CONTENTS regional balanCe KaZaKhStan General information CentrAl & south AsiA KAzAKhstAn Area Capita Coastline Population Ethnic Divisions Religions Languages Literacy Government Suffrage Administrative Divisions www.spguidepublications.com 27 24 900 sq km Astana 0 km (landlocked) 1 75 44 000 (2015 est) Kazakh 51 per cent Russian 32 per cent Ukrainian 5 per cent German 2 per cent Tatar 2 per cent Uzbek 13 per cent Muslim 70.2 per cent Christian 26.2 per cent (Russian Orthodox 23.9 per cent other Christian 2.3 per cent) Buddhist 0.1 per cent others 0.2 per cent atheist 2.8 per cent unspecified 0.5 per cent (2009 census) Kazakh (Qazaq state language) 64.4 per cent Russian (official used in everyday business designated the language of inter-ethnic communication ) 95 per cent (2001 est.) 99.7 per cent Republic authoritarian presidential rule with little power outside the executive branch 18 years of age universal geted sectors like transport pharmaceuticals telecommunications petrochemicals and food processing. Kazakhstan s vast hydrocarbon and mineral reserves form the backbone of its economy. Kazakhstan is landlocked and depends on Russia to export its oil to Europe. In 2010 Kazakhstan joined Russia and Belarus to establish a Customs Union in an effort to boost foreign investment and improve trade. The Customs Union evolved into a Single Economic Space in 2012 and the Eurasian Economic Union (EEU) in January 2015. The economic downturns of its EEU partner Russia and the decline in global commodity prices have contributed to an economic slowdown in Kazakhstan which is experiencing its slowest economic growth since the financial crises of 2008-09. Kazakhstan devalued its currency tenge by 19 per cent in February 2014 and in November 2014 the government announced a stimulus package to cope with its economic challenges. In spring 2015 Kazakhstan embarked on an ambitious reform agenda to modernise its economy and improve its institutions. In the face of further decline in the ruble oil prices and the regional economic slowdown Kazakhstan announced in August 2015 that it would cancel its currency band in favour of a floating exchange rate that sparked further devaluation of the tenge. In 2015 Kazakhstan s President signed into law a new Entrepreneurial Code and a new Labour Code both aimed at improving the business environment. Despite some positive institutional and legislative changes investors remain concerned about corruption bureaucracy and arbitrary law enforcement especially at the regional and municipal levels. The Asian Development Bank (ADB) outlook says growth is forecast to remain subdued at 0.7 per cent in 2016 and 1.0 per cent in 2017. Higher countercyclical expenditure the Expo 2017 in Astana and the anticipated entry into production of the long-delayed Kashagan oilfield mitigate the prospective drop in private consumption. With commodity prices expected to show little improvement however growth could be lower than forecast if oil prices fall further or expansion in regional trading partners disappoints. Defence Total Armed Forces Active 39 000 (Army 20 000 Air 12 000 Navy 3 000 MoD 4 000) Terms of Service 12 months Paramilitary Forces 31 500 Presidential Guard 2 000 Internal Security Troops 20 000 est State Border Protection Force 9 000 est Government Guard 500 security environment Kazakhstan has one of the longest borders in the region and fraying ethnic tensions and increasing instability in neighbouring countries (particularly Afghanistan) have pushed Kazakhstan to reform border security to better conform to European norms. International drug trafficking in neighbouring states presents a secondary threat to Kazakh society as it can serve as a destabilising force and undermine the centralisation of the state if left unchecked. Stronger border controls informed by European standards can thus reinforce internal stability. Furthermore Kazakh diplomacy has seen a shift in the past 15 years towards better relations with the EU and the West. In 2006 Kazakhstan signed an Individual Partnership Action Plan with NATO to inform defence and domestic security reforms and in 2010 Kazakhstan became the chair of the Organisation for Security and Cooperation in Europe (OSCE). In 2014 Nursultan Nazarbayev completed negotiations over a new Partnership and 14 provinces and 3 cities overview of the economy Kazakhstan geographically the largest of the former Soviet republics excluding Russia possesses substantial fossil fuel reserves and other minerals and metals such as uranium copper and zinc. It also has a large agricultural sector featuring livestock and grain. The government realises that its economy suffers from an over reliance on oil and extractive industries and has embarked on an ambitious diversification programme aimed at developing tar- get your CoPy to reaD in CoMPlete 2016386 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com 3 eaSt aSia Pacific riM & auStralia Japanese Nationalism and Defence Policy On July 1 2014 Japanese Prime Minister Shinzo Abe announced a decision to reinterpret the Japanese constitution allowing Tokyo to militarily support partners that are under attack. This change in Japanese defence policy is thus both remarkable and routine. It is remarkable to see Japan embracing what had been politically unthinkable. Yet the decision is routine in that it marks one of many such milestones in the country s evolving security posture. Japan s adoption of new roles and capabilities has been neither automatic nor straightforward. But as the Japanese perceive growing menace from Chinese capabilities and behaviour this milestone in Japan s security evolution will not be the last. The ruling Liberal Democratic Party (LDP)-led coalition strengthened its position in parliament considerably following a House of Councillors (upper house) election in July this year. For the first time in decades a sitting Prime Minister has met two of the three conditions for constitutional change a two-thirds majority in both the lower and the upper houses. The final hurdle is a referendum. The Prime Minister Shinzo Abe has made clear his long-held desire to revise the pacifist constitution but achieving this goal is far from assured. A national debate over the issue will begin in the months ahead but analysts feel that this may take years and radical change will be avoided. India s Act East policy and Prime Minister Narendra Modi s Make in India drive coincide with the shifts in the Japanese postwar security policy and the April 2014 easing of the self-imposed arms export ban. The agreement concerning transfer of Defence Equipment and Technology Cooperation signed during the latest visit of Prime Minister Shinzo Abe on December 12 2015 unveils a new chapter in India-Japan defence cooperation by making available defence equipment and technology needed to carry out joint research development and or production projects. India s defence modernisation give enormous opportunities for the Japanese defence industry which until recently concentrated exclusively on the domestic market in order to demonstrate Japan s commitment to peace. Now there is tremendous scope for redefining the contours of the bilateral defence cooperation by way of transfer of and collaboration on projects related to defence equipment and technology. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 415 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY e ast Asia and Pacific Rim (EAPR) remains one of the main growth drivers of the world economy accounting for nearly two-fifths of global economic growth. Overall the region has grown 6.5 per cent in 2015 moderating slightly from 6.8 per cent in 2014. Growth in the developing economies of EAPR is expected to ease from 6.8 per cent in 2014 to 6.5 per cent in 2015 and 6.3 per cent over 2016-17. This reflects mainly a moderate slowdown in China. Aggregate growth in the Association of Southeast Asian Nations (ASEAN) economies will be roughly stable at 4.3 per cent in 2015 rising to 4.9 per cent by 2017 with increasing support from global growth and export demand particularly from high-income economies. Extreme poverty in the EAP region as measured using the new 2011 purchasing power parity (PPP) prices and a revised global extreme poverty line of PPP1.90 a day has decreased sharply from 29.1 per cent in 2002 to 7.2 per cent in 2012 with projections indicating the poverty rate fell further to 4.8 per cent in 2014. The new estimates indicate that the number of people in developing East Asia living on less than PPP1.90 a day decreased from 551 million in 2002 to 147 million in 2012 and further to an estimated 97 million by 2014. The region has huge infrastructure needs on account of rapid urbanisation. As many as 142 million people have no access to power and 600 million lack adequate sanitation. Rapid migration to cities is putting pressure on service delivery and leading to large urban slums pollution and environmental degradation. In the world s most disaster-stricken region concentrating 70 per cent of natural disasters urbanisation challenges can be aggravated by a changing climate. East Asia and the Pacific Rim cover all the Asian countries east of Myanmar. Australia though not strictly a part of the region has been included because of its strategic location astride the Indian and Pacific Oceans. The three important powers in the region are the United States China and Japan. China is the largest country in this region and a major concern for the other countries of the region who wish to cope with its growing economic and military might. China while being apprehensive of the US hegemony and assertiveness is also aware that the latter s presence in the area prevents an independent military role for Japan its historical antagonist who under Prime Minister Shinzo Abe is evolving a new security posture. Major issues which are impacting the security environment in East Asia are Japan s Defence Policy and China s Military Strategy Korean Peninsula Taiwan US Reposturing its Naval Forces and ASEAN activities. CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balance chinese military strategy In May 2015 China published its latest defence white paper. Unlike its eight predecessors this document was the first time that China publicly unveiled parts of its military strategy. Even the paper s title was changed from China s National Defense to China s Military Strategy. Rather than the opaque and retrospective generalities found in earlier versions the new white paper offered details about China s strategic intentions and the future development of its military. It has been suggested that the greater transparency of the new white paper was a sign of a more confident China. That said many of the revelations contained in the document were hardly novel. It profiled China s decades-old active defence strategy which maintains that China would always remain strategically defensive -- though perhaps not so at the operational or tactical levels. It also detailed the Chinese military s primary aim to prepare itself to fight local wars under conditions of informationisation -- in other words regional conflicts in which command control communications computers intelligence surveillance and reconnaissance (C4ISR) would play major roles. That too was already known. But other revelations in the white paper were more illuminating. It showed that China intends to focus its force development in four domains cyberspace (it will boost its cyber warfare capabilities) outer space (it will take steps to defend its interests there even though it is opposed to the militarisation of that domain) nuclear forces (it will build a reliable second-strike capability) and finally the oceans. That last domain is what currently worries China s neighbours the most given Chinese assertiveness in the East and South China Seas. Indeed the white paper highlighted Beijing s intentions to further expand the Chinese Navy and extend the range of its operations -- shifting from offshore waters defence to open ocean protection. The white paper argued that China s growing overseas interests have changed the country s focus from being a continental land power to a maritime power. That has led China to prioritise its navy in its military modernisation plans. Interestingly the white paper declares that the traditional mentality that land outweighs sea must be abandoned. That means that in the future China would not only defend its coastline from attack but also its sea lanes of communications through international shipping routes including those from the Middle East through which over half of China s oil flows. That in turn means countries like India will have to get used to seeing more of the Chinese Navy in the Indian Ocean. By the same token Japan and the United States should expect more Chinese naval and air patrols in the Pacific Ocean and maybe one or two more Chinese aircraft carriers. The white paper also listed China s strategic concerns. Chief among them was America s rebalance towards Asia under which the United States has increased its military presence and strengthened its alliances in the region. The white paper also noted Japan s push to revise its military and security policies characterising them as sparing no effort to dodge the post-war mechanism. China s offshore neighbours warranted mention too for their provocative actions [to] reinforce their military presence on China s reefs and islands that they have illegally occupied no doubt referring to the Philippines and Vietnam in the Spratly Islands. The Permanent Court of Arbitration (PCA) has issued a sweeping verdict in favour of the Philippines in its case against China s territorial claims in the South China Sea. The judgement represents a serious blow to China s efforts to win legitimacy for its claims in the region. It is expected that after an initial period of relative calm while the decision is digested across the region and diplomatic discussions East asia Pacific Rim & austRalia are opened the long term irreconcilable differences between the various claimants are likely to bring about renewed tensions. Noth Korea s Nuclear ambitions After years of trying to separate fact from propaganda about North Korea s nuclear programme American and South Korean intelligence officials say they have concluded that the country can now mount a small nuclear warhead on short- and medium-range missiles capable of hitting much of Japan and South Korea. The United States and its allies have sought for nearly a decade to prevent the North from gaining such capabilities ever since it detonated its first atomic device a decade ago. Their failure is likely to raise new questions about the effectiveness of the policy towards North Korea while ushering the long-simmering nuclear stand-off with the North into a more perilous phase under its combative young leader Kim Jong-un. The assessment of the North s new capabilities is not based on direct evidence from inside its nuclear programme but draws on intelligence gleaned from high-level defectors analysis of propaganda images and data collected from North Korean missile and nuclear tests which have accelerated over the past six months. While some intelligence agencies suggested as early as 2013 that the North had learned enough about rocket engineering and the miniaturisation of nuclear warheads to mount one on a shorter-range missile there is a new consensus and greater confidence in that view in both Washington and Seoul the officials said. Given the years of research North Korea has devoted to the programme experts do not consider the conclusion particularly surprising. But the politics of the assessment which means the North can target American bases in South Korea and Japan are delicate both in the region and in the United States. Experts say North Korea is years away from deploying an intercontinental ballistic missile capable of striking the mainland United States with a nuclear payload and even then no one sees the backward nation taking the enormous strides needed to build a much more destructive hydrogen warhead capable of leveling cities. Still the North s new capabilities have prompted a rethinking of American military strategy in Asia. We know they have nuclear weapons and the means to deliver them General Robert B. Neller commandant of the Marine Corps said recently at the Council on Foreign Relations in New York. If that s where they are going that changes the calculus. taiwan Since President Tsai Ing-wen s landslide election in January 2016 China has employed a range of tactics to show Taiwan what the future might look like if it refuses to embrace the idea of one country In . March China scrapped a diplomatic truce with former President Ma Ying-jeou and established relations with the tiny West African nation of Gambia one of a handful of states that still recognised Taiwan. In April 2016 a Taiwanese delegation to Brussels was barred from joining a meeting of OECD (Organisation for Economic Co-operation and Development) steel officials because of Chinese objections when no such objection had arisen in 10 years the Taipei-based United Evening News reported. Taiwan s new President defied Beijing in her inaugural address on May 20 2016 by resisting pressure to adopt the one-China principle drawing a relatively tepid reaction from China. Pledging to seek peace with China Tsai Ing-wen 60 Taiwan s first female President said the understanding reached at historic talks in 1992 where the two sides agreed to seek common ground should form one foundation of future ties. She added that Taiwan s 1946 constitution which still claims mainland China as part of its territory should form another. www.spguidepublications.com 2016416 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com East asia Pacific Rim & austRalia East Asia Pacific Rim & Australia N. Korea S. Korea China Taiwan Myanmar Laos Thailand Vietnam Philippines Cambodia Brunei Singapore I n d o n e s i a Australia www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 417 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balance With the Democratic Progressive Party assuming control of both the executive and legislative branches for the first time Tsai pledged to implement key structural reforms to Taiwan s economy to help it better integrate with the rest of Asia. Dragged down by slower demand for its products from China and elsewhere in the world Taiwan has posted three straight quarters of economic contraction. Her inauguration was attended by dignitaries from 59 nations including Taiwan s 22 remaining diplomatic allies and a US delegation led by former US Trade Representative Ron Kirk. At the end of her remarks Tsai made reference to having pride in Taiwan s democratic achievements Today tomorrow and on every day to come we shall all vow to be a Taiwanese who safeguards democracy freedom and this country. Liu Guoshen Director of Xiamen University s Taiwan Research Institute praised Tsai s address as a mild and practical speech. You can see Tsai was making a real effort to stabilise the cross-strait ties. She s trying in her speech to strike a balance in addressing various audience her own party Beijing and the United States Liu said. East asia Pacific Rim & austRalia us Reposturing its Naval forces The US interest in the Asia-Pacific region is becoming deeper. This can be seen by the fact that it is reposturing its naval forces in the Asia-Pacific region. The US Defense Secretary Leon Panetta told Asian officials at a conference in Singapore in June 2012 that by 2020 the Navy will reposture its forces from today s roughly 50 50 split between the Pacific and the Atlantic to about a 60 40 split between those oceans. This will include six aircraft carriers in this region a majority of their cruisers destroyers combat ships and submarines. It is being done in a steady deliberate and sustainable way -- the United States military is rebalancing and brings enhanced capabilities to this vital region. The strategic pivot or rebalancing launched four years ago is premised on the recognition that the lion s share of the political and economic history of the 21st century will be written in the Asia-Pacific region. To benefit from this shift in global geopolitical dynamism and sustainably grow its economy the United States is building extensive diplomatic economic development people to people and security ties with the region. The new US policy is also based on the need -- widely felt throughout most of the Asia-Pacific region -- for strategic reassurance in the face of a rising and increasingly assertive China. The rebalance is also driven by a desire to reassure US allies friends and other countries in the region that the United States has not been exhausted after a decade of war that it has not been weakened by economic and political problems at home and that it is not going to disengage from Asia-Pacific affairs. The fundamental goals of the new US policy are to broaden areas of cooperation beneficial to the United States with regional states and institutions strengthen relations with American allies and partners including great powers such as China and India as well as important regional powers such as Indonesia and develop regional norms and rules compatible with the international security economic and political order long supported by the United States. www.spguidepublications.com asEaN Economic community The establishment of the ASEAN Economic Community (AEC) in 2015 is a major milestone in the regional economic integration agenda in ASEAN offering opportunities in the form of a huge market of 2.6 trillion and over 622 million people. In 2014 AEC was collectively the third largest economy in Asia and the seventh largest in the world. The AEC Blueprint 2025 adopted by the ASEAN leaders at the 27th ASEAN Summit on November 22 2015 in Kuala Lumpur Malaysia provides broad directions through strategic measures for the AEC from 2016 to 2025. Along with the ASEAN Community Vision 2025 and the ASEAN Political-Security Community (APSC) Blueprint 2025 and the ASEAN Socio-Cultural Community (ASCC) Blueprint 2025 the AEC Blueprint 2025 forms part of ASEAN 2025 Forging Ahead Together. It succeeded the AEC Blueprint (2008-15) which was adopted in 2007. The AEC Blueprint 2025 is aimed towards achieving the vision of having an AEC by 2025 that is highly integrated and cohesive competitive innovative and dynamic with enhanced connectivity and sectoral cooperation and a more resilient inclusive and people-oriented people-centred community integrated with the global economy. The AEC Blueprint 2025 consists of five interrelated and mutually reinforcing characteristics namely (i) A Highly Integrated and Cohesive Economy (ii) A Competitive Innovative and Dynamic ASEAN (iii) Enhanced Connectivity and Sectoral Cooperation (iv) A Resilient Inclusive People-Oriented and People-Centred ASEAN and (v) A Global ASEAN. These characteristics support the vision for the AEC as envisaged in the ASEAN Community Vision 2025. The AEC Blueprint 2025 sets out the strategic measures under each of the five characteristics of AEC 2025. To operationalise the Blueprint s implementation these strategic measures will be further elaborated in and implemented through the work plans of various sectoral bodies in ASEAN. The sectoral work plans will be reviewed and updated periodically to ensure their relevance and effectiveness. The AEC Blueprint 2025 will lead towards an ASEAN that is more proactive having had in place the structure and frameworks to operate as an economic community cultivating its collective identity and strength to engage with the world responding to new developments and seizing new opportunities. The new Blueprint will not only ensure that the 10 ASEAN Member States are economically integrated but are also sustainably and gainfully integrated in the global economy thus contributing to the goal of shared prosperity. Details pertaining to economic review security environment and the armed forces of the countries of this region are as follows nAustralia nBrunei nCambodia nPeople s Republic of China nIndonesia nJapan nNorth Korea (Democratic People s Republic of Korea) nSouth Korea (Republic of Korea) nLaos nMalaysia nMyanmar (formerly Burma) nThe Philippines nSingapore nTaiwan nThailand nVietnam 2016418 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com East asia Pacific Rim & austRalia austRalia AUSTRALIA General information Overview of the Economy Following two decades of continuous growth low unemployment contained inflation very low public debt and a strong and stable financial system Australia enters 2016 facing a range of growth constraints principally driven by a sharp fall in global prices of key export commodities. Demand for resources and energy from Asia and especially China has stalled and sharp drops in current prices have impacted growth. The services sector is the largest part of the Australian economy accounting for about 70 per cent of GDP and 75 per cent of jobs. Australia was comparatively unaffected by the global financial crisis as the banking system has remained strong and inflation is under control. Australia benefited from a dramatic surge in its terms of trade in recent years although this trend has reversed due to falling global commodity prices. Australia is a significant exporter of natural resources energy and food. Australia s abundant and diverse natural resources attract high levels of foreign investment and include extensive reserves of coal iron copper gold natural gas uranium and renewable energy sources. A series of major investments such as the US 40 billion Gorgon Liquid Natural Gas project will significantly expand the resources sector. Australia is an open market with minimal restrictions on imports of goods and services. The process of opening up has increased productivity stimulated growth and made the economy more flexible and dynamic. Australia plays an active role in the World Trade Organisation APEC the G-20 and other trade forums. Australia s free trade agreement (FTA) with China entered into force in 2015 adding to existing FTAs with the Republic of Korea Japan Chile Malaysia New Zealand Singapore Thailand and the US and a regional FTA with ASEAN and New Zealand. Australia continues to negotiate bilateral agreements with India and Indonesia as well as larger agreements with its Pacific neighbours and the Gulf Cooperation Council countries and an Asia-wide Regional Comprehensive Economic Partnership that includes the ten ASEAN countries and China Japan Korea New Zealand and India. Australia is also working on the Trans-Pacific Partnership Agreement with Brunei Canada Chile Japan Malaysia Mexico New Zealand Peru Singapore the US and Vietnam. Area Capital Coastline Maritime Claims Territorial sea Contiguous zone Exclusive economic zone Continental shelf Population Ethnic Divisions 12 nm 24 nm www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 419 REGIONAL BALANCE 200 nm 200 nm or to the edge of the continental margin 2 37 81 000 (2015 est) White 92 per cent Asian 7 per cent aboriginal and others 1 per cent Religions Protestant 28.8 per cent (Anglican 17.1 per cent Uniting Church 5.0 per cent Presbyterian and Reformed 2.8 per cent Baptist 1.6 per cent Lutheran 1.2 per cent Pentecostal 1.1 per cent) Catholic 25.3 per cent Eastern Orthodox 2.6 per cent other Christian 4.5 per cent Buddhist 2.5 per cent Muslim 2.2 per cent Hindu 1.3 per cent others 8.5 per cent unspecified 2.2 per cent none 22.3 per cent Note Percentages add up to more than 100 per cent due to rounding (2006 Census) Languages English 76.8 per cent Mandarin 1.6 per cent Italian 1.4 per cent Arabic 1.3 per cent Greek 1.2 per cent Cantonese 1.2 per cent Vietnamese 1.1 per cent others 10.4 per cent unspecified 5 per cent (2011 est) Literacy 99 per cent Government Federal parliamentary democracy and a Commonwealth realm Suffrage 18 years of age universal and compulsory Administrative Divisions Six states and two territories Defence Total Armed Forces Active 56 750 (Army 29 000 Navy 13 550 Air 14 200) Reserve 23 100 (Army 14 100 Navy 4 700 Air 4 300) Foreign Forces US Pacific Command 180 New Zealand Army 9 Singapore Air Force 230 security Environment Australia s strategic environment is most influenced by three factors the status of the US-China relationship America s willingness to defend the rules-based global order in Asia and the stability of the Asian region. The 2016 Defence White Paper directly and indirectly gives the answers to these challenges. The 2016 Defence White Paper released on February 25 2016 delivers on the government s commitment to the safety of the Australian people and to defend territory and national interests. The Defence White Paper sets out a comprehensive responsible long-term plan for Australia s defence. The government is investing in defence to ensure that they have the armed forces they need to protect Australia and to secure their interests in the coming get your coPy to reaD in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS 77 41 220 sq km Canberra 25 760 km TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 4 WeSt aSia and north africa www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 463 REGIONAL BALANCE The current situation in Iraq is essentially the consequence of the US policies towards Iraq since 1990-91 but particularly of the US invasion of Iraq in 2003 and its subsequent military occupation marked by thoroughly inept governance till 2011 when US troops finally withdrew leaving behind a broken country wracked by sectarian strife and internal insurgencies. The immediate trigger is the unfortunate reality that during the eight years of the US installed Prime Minister Nouri al-Maliki s increasingly blatantly partisan rule the Sunnis were steadily and continuously sidelined and have been completely alienated the relationship between the Shia and Sunni communities has never been as poisonous as it is today. A Sunni backlash was inevitable. This is what was witnessed in Iraq and it manifested in particular by the lightening takeover of the Sunni dominated provinces of Iraq and the establishment of the Islamic Caliphate on June 30 2014 by the Islamic State of Iraq and Syria the ISIS an extremist militant group even more radical and brutal than Al Qaeda. After outstanding successes initially the so-called Islamic State (IS) is losing ground in Iraq. The recapture of its stronghold Ramadi Abbreviations at the end of the yearbook ASIAN WHO S WHO INDIAN DEFENCE Iraq BUSINESS TECHNOLOGY W est Asia is an area of unique historical importance. Huge oil deposits which were discovered in the early 20th century have further augmented its strategic importance as the economies of a number of developed countries are critically dependent on its oil. Saudi Arabia is geographically the biggest country in West Asia. It is also the richest as it has the largest oil reserves. Iran Iraq and some of the smaller countries like Kuwait and United Arab Emirates (UAE) also have huge oil deposits. The concept of West Asia is in limited use as it significantly overlaps with the Middle East. The term is sometimes used for the purposes of grouping countries in statistics. It describes the geographical position in relation to Western Europe rather than location within Asia. Due to this perceived Eurocentrism international organisations such as the United Nations have replaced Middle East with the term Western Asia. Except for Israel a Jewish country all other states of West Asia and North Africa are Muslim countries. Ethnically most of the Muslim states are Arab and predominantly Sunni. The exceptions are Iraq which is largely dominated by Shias and Iran which has both non-Arab and Shia populace. This region is the birthplace of three of the world s most widespread religions-- Judaism Christianity and Islam. Politically most of the states are monarchies sheikhdoms or single-party dictatorships and enjoy very little democratic freedom. The essence of the socio-political tumult sweeping the region has been such that the people at large have overcome their fear of the existing regimes and called for drastic and fundamental political transformations including regime changes. This has led to dramatic changes in domestic political environments in most of the countries of the region. Though the West Asian region is exposed to a completely new set of challenges threats and an uncertain future but it is clear that the new political dispensation will not be forced to follow for long the Accepted Order laid down by the West. However the newly formed regimes most of them Islamists would be quite difficult to deal with. The emerging political order in West Asia is also marked by considerable shifts within individual countries as well as at the regional level. The Islamist parties are on the rise across the region whereas the economic concerns have also risen to the forefront. Five years after the Arab Spring West Asia is witnessing two major military conflicts in Syria and Yemen. Several states are deeply polarised and at the edge of breakdown and there is pro- liferation of jihadis across the region engaged in extraordinary brutality against enemy states and heretic communities. The violence the fear of jihadi contagion and the possible breakdown of state order across West Asia have pulled in international powers into the region s conflicts. Though the ongoing conflicts and competitions are the result of recent developments in the West Asian state systems the battle lines have been deliberately shaped on the basis of primeval sectarian cleavages and animosities that have been resurrected and imbued with a contemporary resonance to serve modern-day political interests. The sectarian divide or the division between the Sunni and Shia communities of Islam is now the principal basis for mobilisation of support against the existential threat perceived mainly by Sunni leaders from the Shias primarily on account of what they see as an increasing Iranian influence in West Asia and its interference in their domestic politics by encouraging Shia aspirations and agitations. This nascent sectarian cleavage soon became part of a larger political competition between the region s Islamic powers Iran and Saudi Arabia as they sought to assert claims for leadership of the Islamic world and assiduously attempted to broaden their support bases across West Asia North Africa and other parts of Asia. CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balance by US-backed Iraqi forces on December 28 2015 was a significant setback for the militant group. Its defeat was secured through a successful military strategy that combined the Iraqi national army tribal forces and the Popular Mobilisation Forces (an umbrella organisation composed of mostly Shi ite militias). Despite victory for this alliance in Ramadi there are still four serious challenges old and new that Iraq needs to overcome in order to stabilise the country and end the plight of millions of people. These are nTo defeat IS similarly lengthy operations would have to be carried out in other important cities such as Mosul. Retaking Mosul is more challenging. IS has been in the city for more than 18 months. During this time they have become well acquainted with the city fortifying it with elaborate defences including mines and booby traps. nSectarian tensions have created fertile soil for extremist organisations like IS to exploit tapping feelings of exclusion and injustice to gain new recruits. This is especially acute in areas where communities share a history of competition over land or leadership. Tensions between various communities often prevent local populations from moving freely which can deny them access to safe areas. These restrictions reinforce tensions and pull apart Iraq s fragile social fabric. nThe unity of the country is another challenge that the central government faces. Iraq s territorial integrity is indeed threatened by both the separatist aspiration of the semi-autonomous region of Kurdistan and by the destruction of law and order resulting from war. The President of Kurdistan called out recently to the international community urging it to pave the way for the creation of a Kurdish state. nThere are significant economic challenges in Iraq. The costs of humanitarian work and reconstruction efforts in the face of ongoing tumult are huge and they will present serious obstacles in the future. Furthermore the Iraqi economy is vulnerable. Oil constitutes 90 per cent of the state s revenues. This means that the price of oil has a serious impact on the economic situation in Iraq. In light of declining oil prices Iraq s resources are stretched ever thinner between acute humanitarian needs and the demands of the war on IS. West AsIA And north AfrIcA America s regional security alliances today the country s power and influence is greatly diminished. Given the new threats posed by sub-state groups to the security of the Egyptian public and homeland the annual US transfers of 1.5 billion to Egypt s military seem woefully anachronistic. Israeli-egyptian-Palestinian Peace summit Palestinian leaders have presented several preconditions for participating in a trilateral Israeli-Egyptian-Palestinian peace summit in Cairo including a freeze on Israeli settlement construction. Prime Minister Benjamin Netanyahu has reportedly told Egyptian Foreign Minister Sameh Shoukry on July 10 2016 that he would be willing to meet with Palestinian Authority President Mahmoud Abbas in Cairo for talks hosted by President Abdel Fattah el-Sisi. Palestinian officials say that President Abbas of Palestine has conditioned his participation on Israel agreeing to stop settlement construction and accepting a set timeline for negotiations. Israel would also have to acquiesce to negotiations based on the pre-1967 lines and pledge ahead of time to implement any agreements reached in the talks. Egypt is seeking a formula for renewal of negotiation that would be accepted by both sides. The official said it might be too early to invite both sides to a summit since the sides did not yet agree about the goals of the talks. President Sisi of Egypt reportedly offered to host direct talks between the sides as part of Cairo s initiative to kickstart the moribund peace process. On January 15 2017 70 plus nations participated in Middle East peace conference supporting both sides in advancing the two state solution through negotiations. They welcome international efforts and adoption of UN Security Council Resolution 2334 of December 23 2016. syrian civil War -- the situation today Five years since the conflict began more than 2 50 000 Syrians have been killed in the fighting and almost 11 million Syrians -- half the country s pre-war population -- have been displaced from their homes. The Assad Government in Syria currently controls the capital Damascus parts of southern Syria portions of Aleppo and Deir Az Zor much of the area near the Syrian-Lebanese border and the north-western coastal region. Rebel groups ISIL and Kurdish forces control the rest of the country. Rebel groups continue to jockey against one another for power and frequently fight each other. The Free Syrian Army has weakened as the war has progressed while explicitly Islamist groups such as the al-Nusra Front which has pledged allegiance to Al Qaeda and the Saudi-backed Islamic Front have gained in strength. In 2013 ISIL emerged in northern and eastern Syria after overrunning large portions of Iraq. The group quickly gained international notoriety for its brutal executions its ultra-strict interpretation of Islamic law and its energetic use of social media. Meanwhile Kurdish groups in northern Syria are seeking self-rule in areas under their control. This has alarmed Turkey s government which fears its large native Kurdish population may grow more restive and demand greater autonomy as a result. In response to attacks within Turkey the Turkish Government has bombed Kurdish targets in Syria. Kurdish groups have also clashed with alNusra Front and ISIL. The Syrian war is creating profound effects far beyond the country s borders. Lebanon Turkey and Jordan are hosting large and growing numbers of Syrian refugees many of whom have attempted to journey onwards to Europe in search of better conditions. Fighting has occasionally spilled over from Syria into Lebanon contributing to the country s political polarisation. Several rounds of egypt Egypt s political transition culminated in the election of a president and a parliament. The new assembly is largely supportive of the policies introduced by the President Abdel Fattah el-Sisi. However economic recovery will be undermined by security challenges facing tourism and negative publicity around incidents such as the disappearance of an outbound Egypt Air flight from Paris in late May 2016. Economic growth is likely to average below recent peaks at 3.2 per cent annually in 2016-20. Five years since the uprisings in Tahrir Square Egypt has seemingly come full circle. With the Muslim Brotherhood crushed the non-Islamist opposition shattered civic groups demoralised and a new military regime that enjoys significant popular support President Abdel Fattah el-Sisi s rule appears secure. But how secure is Egypt Beneath the facade of stability lies a far more challenging reality. With a population of over 90 million the country is facing systemic political and economic problems. Frustrations are growing with the government s lack of vision while the Islamic State and other radical groups are actively seeking to exploit social and political tensions. Meanwhile the US assessment of Egypt s strategic importance is starting to change. Once a key pillar of www.spguidepublications.com 2016464 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com West AsIA And north AfrIcA West Asia & North Africa WEAPONS EQUIPMENT VEHICLES Turkey www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 465 REGIONAL BALANCE ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES CONTENTS regional balance peace talks have failed to stop the fighting. UN-sponsored Geneva III talks in 2016 failed to produce a resolution of the conflict. Unrest continues in Syria and according to an April 2016 UN estimate the death toll among Syrian Government forces opposition forces and civilians had reached 4 00 000. As of December 2016 approximately 13.5 million people were in need of humanitarian assistance in Syria with 6.3 million people displaced internally and an additional 4.8 million Syrian refugees making the Syrian situation the largest humanitarian crisis worldwide. With much of the country in ruins millions of Syrians having fled abroad and a population deeply traumatised by war one thing is certain Rebuilding Syria after the war ends will be a lengthy extremely difficult process. West AsIA And north AfrIcA Iran The implementation of a July 2015 Joint Comprehensive Plan of Action (JCPOA) nuclear agreement between Iran and six negotiating powers has lessened although not eliminated US concerns about Iran s nuclear programme. Since 2010 the United States orchestrated broad international economic pressure on Iran to persuade it to agree to strict limits on the programme. It is assessed that the international pressure might have contributed to the June 2013 election of the relatively moderate Hassan Rouhani as President of Iran whose government subsequently negotiated a November 2013 interim nuclear agreement and the JCPOA. The JCPOA which began formal implementation on January 16 2016 exchanged broad sanctions relief for nuclear programme limits that give the international community confidence that it would take Iran at least a year to produce a nuclear weapon. President Barack Obama has asserted that the JCPOA has the potential to produce the added benefit of improving US-Iran relations. Domestically Rouhani and the JCPOA appear to have broad support but many Iranians say they also want greater freedoms of expression and assembly. Rouhani s public support was demonstrated by the strong showing of moderate conservative candidates in the February 26 elections for the parliament and a key clerical body. However it is not clear that the election results will enable Rouhani to limit the hardliner control of the judiciary or the security forces that are the main instruments to curb dissent and free expression. On numerous occasions Donald Trump the new US President had called the nuclear agreement a really really bad deal and has said that he many want to renegotiate its terms after he is sworn in as the 45th President of the United States on January 20. His pick for Defense Secreatry James N. Mattis a retired Marine Corps General who has also been critical of Iran and the deal contradicted Trump during his confirmation hearing in Washington. He said the incoming administration should respect the nuclear agreement. Iran s President said going back on the deal was impossible as it was not a bilateral agreement between Iran and the United States but a multilateral one also signed by Britain China France Germany and Russia. Details pertaining to economic review security environment and the armed forces of the countries of this region are as follows nAlgeria nEgypt nLibya nBahrain nIran nIraq nIsrael nJordan nKuwait nLebanon nSultanate of Oman nQatar nSaudi Arabia nSyria nTurkey nUnited Arab Emirates nRepublic of Yemen www.spguidepublications.com 2016466 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com West AsIA And north AfrIcA AlGerIA ALGERIA General Information Area Capital Coastline Maritime Claims Territorial sea Exclusive fishing zone Population Ethnic Divisions Religions Languages Literacy Government Suffrage Administrative Divisions 23 81 741 sq km Algiers 998 km 12 nm 32-52 nm 3 96 67 000 (2015 est) Arab-Berbers 99 per cent European less than 1 per cent Sunni Muslim (state religion) 99 per cent Christian and Jewish 1 per cent Arabic (official) French Berber dialects 72.6 per cent Republic 18 years of age universal 48 provinces exports have enabled Algeria to maintain macroeconomic stability and amass large foreign currency reserves and a large budget stabilisation fund available for tapping. In addition Algeria s external debt is extremely low at about 2 per cent of GDP. However Algeria has struggled to develop non-hydrocarbon industries because of heavy regulation and an emphasis on state-driven growth. The government s efforts have done little to reduce high youth unemployment rates or to address housing shortages. A wave of economic protests in February and March 2011 prompted the Algerian Government to offer more than 23 billion in public grants and retroactive salary and benefit increases moves which continue to weigh on public finances. Since late 2014 declining oil prices forced the government to spend down its reserves at a high rate in order to sustain social spending on salaries and subsidies particularly since the government has been unable to boost exports of hydrocarbons or significantly grow its non-oil sector. In 2015 the Algerian Government imposed further restrictions on imports in an effort to reduce withdrawals from its foreign exchange reserves. The government also increased the value-added tax on electricity and fuel but said it would address subsidies at a later date. Long-term economic challenges include diversifying the economy away from its reliance on hydrocarbon exports bolstering the private sector attracting foreign investment and providing adequate jobs for younger Algerians. The economy will remain dependent on energy production and oil prices it is likely to grow by an average of just 2.3 per cent a year in 2016-20 as per predictions of the Economist. Subdued oil prices will weigh heavily on economic performance in the early part of the forecast period. defence Total Armed Forces Active 1 30 000 (Army 1 10 000 Navy 6 000 Air Force 14 000) Reserve 1 50 000 Terms of Service Conscription 18 months Paramilitary Forces 1 87 200 est Gendarmerie 20 000 National Security Forces 16 000 Republican Guard 1 200 Legitimate Defence Groups 1 50 000 est overview of the economy Algeria s economy remains dominated by the state a legacy of the country s socialist post-independence development model. In recent years the Algerian Government has halted the privatisation of state-owned industries and imposed restrictions on imports and foreign involvement in its economy. Hydrocarbons have long been the backbone of the economy accounting for roughly 60 per cent of budget revenues 30 per cent of GDP and over 95 per cent of export earnings. Algeria has the tenth largest reserves of natural gas in the world and is the sixth largest gas exporter. It ranks 16th in oil reserves. Hydrocarbon www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 467 REGIONAL BALANCE Many used to say that unlike other countries that have an army Algeria is an army that has a country. As 2016 begins President Abdelaziz Bouteflika -- no mere client of the army -- has consolidated his authority and empowered his allies in Africa s largest nation. However questions about Algeria s political and economic stability loom large in the new year. Bouteflika surpassed the expectations of observers by craftily manipulating the presidencyarmy-intelligence balance to his advantage. In September 2015 he removed intelligence service chief Mohamed Mediene and put one of Mediene s top aides in jail in November despite Mediene s plaintive complaints to the national media. Bouteflika s patronage of the Army s Chief of Staff Gaid Salah is one key to the President s ability to strengthen his power. His assertion of control over the National Liberation Front (FLN) and the National Rally for Democracy (RND) gives his partisans great scope over economic and social policy. It is expected that Abdelaziz Bouteflika and his allies are likely to remain in power throughout 2016-20 although uncertainty over Bouteflika s health will weigh on political stability. The risk of ter- get yoUr coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE security environment BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS 5 aSia-PaCiFiC eNViroNMeNt Central to the idea of the Asian century was the rise of China and India as economic giants. This vision has been only partly realised given the slowdown if not recession in the Chinese economy. India s inability to rise to global expectations due to structural challenges is another dampener. Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 509 REGIONAL BALANCE Get yoUr CoPy to reaD iN CoMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS t he geostrategic enviBRIGADIER RAhul ronment in the AsiaPacific remains dynamic. This is an age-old characteristic that flows out of the maxim Change is the only constant Moving from the . Cold War to a unipolar and a multipolar world order today the geopolitical framework is categorised quite pithily as loose multipolarity Countries and even regional groupings are . engaging with each other based on mutual self-interest looking beyond traditional partnerships and principles. The phenomenon of G-Zero World flagged by noted geopolitical analyst Ian Bremmer in his book published in 2012 Every Nation for Itself Winners and Losers in a G-Zero World seems increasingly evident today. The exit of United Kingdom (UK) from the European Union (EU) popularly known as Brexit has seen resurgence of nationalism. On the other hand ASEAN (Association of South East Asian Nations) members are showing greater solidarity. The concept of nationality and nationalism is being questioned by emergence of entities as Islamic State of Iraq and the al Shams or ISIS also known as ISIL and Daesh. Youth from across the globe are joining this venal conglomerate physically or ideologically to conduct some of the most inhuman acts of terror against the innocent. Ideologues aligned to the ISIS are able to use new media -- Facebook Twitter and mobile applications as Instagram to indoctrinate youth and instigate them to violence against their own societies. There is not only uncertainty in the international security environment but also in the paradigm in which these developments can fit in. Thus lack of an identifiable diachronic framework is creating a challenge. Many are even recalling the nostalgia of stability of the Cold War which was what now seems to be neatly divided in blocs. Devoid of these blocs it appears that there is no firm anchor to which countries can moor leading to constant flux. Portends of instability are marked across the globe with West Asia -- the main source of oil and gas to fuel economies of BhonslE (RETD) the Asia-Pacific mired in a number of parallel civil wars in Syria Iraq and Yemen. The vertical cleavage between Iran and Saudi Arabia has rekindled traditional source of rivalry while the coup in Turkey in July 2016 marked the internal challenges that are faced by regimes in this region. Territorial expansion of non-state actors such as the ISIS has been contained for now but the potential to carry out terrorist attacks globally has emerged as a key threat in Europe South East Asia and South Asia which were relatively unscathed by global terr orism so far. The impact of volatility is evident with a flow of refugees from Syria North Africa and Afghanistan causing concerns in Europe -- the main recipient of thousands of migrants from conflict zones. The periphery of West Asia Afghanistan and Pakistan continue to be hobbled by active militancy with mass casualties becoming a major concern. This has led the United States to extend stay in Afghanistan keeping 8 400 troops through the year 2016. Thus from Europe to West and South West Asia disruptive fragmentation -- political economic and security is evident. This is seen as an outcome of diffusion of power and disaggregation of the global and regional order leading to anarchy where governments are weak and instability in other areas. Absence of unified global leadership to bring diverse and disparate forces -- state and non-state actors is also evident with the United States increasingly shying away from larger commitments. This trend may get even more exacerbated post presidential elections in the United States in November this year. There is a degree of consensus for America retracting into a shell of isolation of sorts while desiring that national governments and regional alliances take on a larger role in managing their security affairs. This has created own dynamics in the Asia-Pacific where the rise of China is challenging stability in an otherwise secure South East Asia. China s economic rise in the early 21st century proved to be a boon to the Asia-Pacific with many peripheral economies in East and South East Asia benefiting through manufacturing and mar- TECHNOLOGY CONCEPTS & PERSPECTIVES PIB WEAPONS EQUIPMENT VEHICLES CONTENTS 6 equiPMent & Hardware SPecificationS -- an overview ARMY EQUIPMENT Army equipment is listed below by Country China Main battle tanks (MBTs) Howitzer Multiple Rocket Launchers (MRLs) Type-59-1 130mm Fd Gun Type-66 152mm Gun How Type-90 122mm (40 round) MR System WS-1B Multiple-Launch Rocket System Abbreviations at the end of the yearbook www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 517 REGIONAL BALANCE Light tanks (Lt Tks) Armoured Personnel Carriers Infantry Combat Vehicles (APCs) (ICVs) Type-90 ZBD-04 IFV ZBD (Type-97) Norinco VP1 Type-89 (YW 534) Type85 (531H) Type WZ 501 Type-77 Norinco YW 531 APC Self-Propelled Guns and Howitzers Type-83 152mm PLZ45 155mm How Enhanced PLZ45 systems Norinco Type-85 122mm How 155mm (SP) System -SH1 Towed Anti-tank (A Tk) Guns Guns and Type-98 Type-99 Type-99G Type90-II North Industries Corporation (Norinco) Type-85-III Type-62 Type-63 Type-63A Czech Slovak Republics APCs ICVs BRDM-2 OT-64 C (SKOT-2A) BMP-1 & OT90 APC France MBTs Lt Tks APCs ICVs Leclerc AMX-30 AMX-13 Giat AMX-10P Nexter Systems AMX10P Marines AMX VCI (ICV) Improved ASIAN WHO S WHO SP Anti-Aircraft Guns and SAMs Type-80 Twin 57mm SP AA Gun System PL-9C Almaz S-300 -- Offensive Air Defence China s SD-10A Air Defence System Low Altitude (Alt) SAM System Towed AA Guns Chinese Type-56 14.5mm Gun Norinco 37mm Type-74 INDIAN DEFENCE BUSINESS TECHNOLOGY t his chapter contains specifications of some important military hardware being employed in the Asian region. Equipment having greater commonality within the region and those of comparatively recent origin have been chosen and presented for each wing of the armed forces namely Army Navy and Air Force separately. Salient details are as under nThe chapter begins with a summary of equipment of each manufacturing country followed by more detailed characteristics of each type of equipment of that country. nWhile the equipment mentioned is in use in the Asian region each type of hardware is listed under its country of origin (manufacturer) like Russia UK and the US. nThe development of weapon systems being a long-term process a composite unit like a tank ship or an aircraft passes through various phases stages of development and appears in different variants with new fitments based on new technologies to cater for new operational parameters. Thus the equipment may seem old but in fact may have undergone numerous upgrades to modernise it for current and future conflicts. nSome such variants of equipment have been included based upon information in the public domain and collated from various sources including other publications. For greater details refer to other relevant media. nSpecifications have been listed in general terms and common features spelt out. Details of sensors weapon control systems and other such subsystems have been omitted as they may vary from craft to craft even within the same class or category. nThe equipment held (types and numbers) in various countries of Asia along with other details is given in our chapter on Regional Balance. CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional balance ARMY EQUIPMENT contd. VAB 4 x 4 version (Wheeled) Panhard PVP Panhard M3 SP Guns and Hows GIAT Mk. F3 155mm SP Gun GIAT 155mm GCT SP Gun SP AA Guns and SAMs Panhard M3 VDA Twin 20mm SP AA Gun System Crotale Low Alt SAM System Shahine Low Alt SAM System AMX-30 twin 30mm SP AA Gun System Germany MBTs APCs ICVs Krauss-Maffei Wegmann Leopard 2A7 Leopard 2A6 Krauss-Maffei Wegmann Leopard 2 MBT Neuer Schutzenpanzer PUMA AIFV Condor Fuchs Rheinmetall Landsystem Marder 1A3 ICV T-90 Arjun IFG Mk.2 105mm Pinaka MR System Merkava Mk3 Merkava 4 Sabra MBT RAM family of light AFVs Soltam L-33 155mm Soltam M-71 155mm Gun How APCs ICVs EQUIPMENT & hARdwARE sPEcIfIcATIoNs ARMY SP Guns and Hows Towed A Tk Guns Guns and Hows BMP-1 BMP-2 BMP-3 BMD-1 ACV BTR-50 BTR-80A MT-LB BTR-152VI M 1973 (2S3) 152mm M 1974 (2S1) 122mm (MSTA-S) 152mm SelfPropelled Artillery System 2S19 India MBTs Towed A Tk Guns Guns and Hows MRLs Israel MBTs Reconnaissance Vehicles SP Guns and Hows Towed A Tk Guns Guns and Hows D-30 122mm Fd Gun M-46 130mm Fd Gun 155mm Gun How D-20 MRLs Splav 300mm BM 9A52 (12 round) Smerch MR System BM-21 122mm (40 round) MR System SP AA Guns and SAMs ZSU-23-4 Quad 23mm SP AA Gun System ZSU-57-2 Twin 57mm SP AA Gun System 2S6M Tunguska System SA-6 Gainful Low-to-Med alt SAM System SA-8 Gecko Low Alt SAM System SA-8B SAM System SA-9 Gaskin SAM SA-13 Gopher SAM System Towed AA Guns ZU-23-2 Twin 23mm Automatic (Auto) AA Gun S-60 57mm Auto AA Gun 100mm anti-aircraft gun KS-19 Singapore SP Guns and Hows South Africa APCs ICVs South Korea MBTs Towed A Tk Guns Guns and Howitzer Spain APCs ICVs Sweden Towed A Tk Guns Guns and Howitzer Towed AA Guns Switzerland APCs ICVs Towed AA Guns SSPH-1 Primus Casspir Mk. III Ratel 90 K1 Hyundai Rotem K2 MBT 155mm KH179 How BMR-600 Italy SP Guns and Howitzer Oto Palmaria 155mm Oto Melara 155mm M109L [SP] Howitzer Towed A Tk Guns Guns and Howitzer Oto Melara Model 56 105mm Pack How Japan MBTs Recce Vehs APCs ICVs Type SU 60 SP Guns and Hows MRLs Pakistan MBTs www.spguidepublications.com Bofors FH-77 B 155mm Bofors L-40 -70 40mm Auto AA Gun Mowag Piranha Oerlikon-Contraves GDF-002 and 005 Twin 35mm Auto AA Guns Oerlikon Contraves 20mm GAI-B01 Auto AA Guns Chieftain Mk 5 Centurion Mk 13 Challenger 2 Khalid Vickers MBT Mk 3 Alvis Scorpion Alvis Saladin Daimler Ferret Mk 2 3 Stormer GKN Def Desert Warrior FV432 AS90 (Braveheart) 155mm SP Gun 105mm Lt Gun (L 118) 155mm Lightweight How (M 777) Type-74 Type-90 Mitsubishi TK X MBT Type-87 Type-73 Type-89 Mitsubishi Type-75 155mm Type-99 155mm Type-75 130mm (30 round) MR System Type MBT 2000 (Al Khalid) Type Al Zarrar Type Saad Type Talha Type M113A2 Black Eagle Development Tank T-95 T-54 T-55 T-55 (Upgraded) T-62 T-64B T-72 T-80U T-90S PT-76B BRDM-2 PRP-4 United Kingdom MBTs Lt Tks Recce Vehs APCs ICVs SP Guns and Hows Towed A Tk Guns Guns and Hows APC Russia MBTs Lt Tks Recce Vehs 2016518 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com EQUIPMENT & hARdwARE sPEcIfIcATIoNs ARMY ARMY EQUIPMENT contd. United States of America MBTs M-1 Abrams M-48 series M 60 A3 Lt Tks M-41 Sting Ray APCs ICVs M-113 A3 SP Guns and Hows 15mm 52-calibre International Howitzer M-107 175mm SP Gun M109 Series of 155mm SP How M-110 Series of 203mm SP How (8 inch) Towed A Tk Guns Guns and Hows M-198 155mm How SP AA Guns and SAMs M-42 Twin 40mm SP AA Gun System M-163 Vulcan 20mm SP AA Gun System M-48 A1 Chaparral Low Alt SP SAM System Patriot Msl (many versions) single stage low to high altitude SAM system Hawk Single Stage low to medium altitude SAM System Towed AA Guns M-167 Vulcan 20mm AA Gun chINA Main Battle Tanks (MBTs) 1. Main Battle Tank 3000 Type Main battle tank Production History Designer and Manufacturer Norinco Produced 2014- present Specifications Weight 52 tonnes Length 10.10 m Width 3.40 m Height 2.30 m Crew 3 (commander driver gunner) Armour Classified Main armament 125mm (4.9 in) smooth-bore Secondary armament 1 x RWS 12.7mm (0.50 in) AA MG 1 7.62mm (0.300 in) coaxial MG Engine Turbocharged diesel engine 1 300 hp (969 kW) Power weight 25 hp tonne Suspension torsion bar Operational range 500 km (310 mi) Speed 68 kmph (42 mph) Pakistan plans to licence and manufacture MBT 3000 as Al-Hyder tank. 2. Type-98 Specifications Crew Weight Power-to-weight ratio Length gun forward Width Height Engine 1 x 125mm SBG 1 x 7.62mm MG 1 x 12.7mm MG 42 x 125mm 2 000 x 7.62mm 300 x 12.7mm Armament Coaxial 1 x 7.62mm AA 1 x 12.7mm It is in service with People s Liberation Army (PLA). 3. Type-90-II Specifications Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 443. Type 99 G A more potent variant of the Chinese Type-99 main battle tank began circulating shortly after Xinhua News Agency released photos of what looked like a new and improved version of that armoured vehicle in early 2008. The visual differences indicate that the Type-99G has a new Active Protection System (APS) and an independent thermal imaging system for the tank commander. The tank also seems to sport a new electro-optical countermeasures package and a new laser designator warning system. Collectively these improvements in the sensors and electronics mean the Type-99G is better able to find targets more aware of when it is being targeted by an enemy and better able to use small missiles to deflect or destroy incoming attacks. The Type-99G main battle tank is also rumoured to have a new diesel engine developing 2 100 hp. This represents an increase of 600 hp over the engine used in previous versions of the tank. MBT-3000 VT-4 The MBT-3000 is a recent Chinese main battle tank developed specially for export. It is also referred as VT-4. It is being marketed by Norinco. It is an improved version of VT-1A. The MBT3000 is similar to the Type-99G which is currently in service with the PLA but has downgraded capabilities such as sights propulsion and gun. A model of this MBT was publicly presented in 2012. First pictures of this new tank appeared in 2013. It seems that the MBT-3000 was proposed for Pakistan as an Al Khalid Mk.2. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 519 REGIONAL BALANCE 3 50 000 kg 24 hp tonne 10.92 m 3.372 m 2.805 m Model WD396 V-8 turbocharged get your coPy to read in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY 3. Type 99 99A2 Specifications Type Crew Length Width Height Type-99G Type-99A2 Maximum speed (Road) Cruising range Tracked armoured 3 11 m 3.4 m 2.2 m 54 t 58 t 80 kmph 400 km or 600 km with external fuel tanks CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Max road speed Max range Armament Main Coaxial AA Amn diesel developing 1 200 hp 65 kmph 500-650 km CONTENTS equipment & hardware specifications navy navaL equipment Navy equipment is listed below by Country CHINA Strategic Missile Submarines Aircraft Carriers Patrol Submarines Destroyers Frigates Corvettes INDIA Submarines Jin Class XIA Class Han Class Shang Class Liaoning (Admiral Kuznetsov Class) Song Class Yuan Class Kilo Class Ming Class Luzhou Class Sovremenny Class Luyang Class Luyang II Class Luyang III Class Luda Class Luhai Class Luhu Class Luda Class Jiangkai Class Jiangkai II Class Jiangwei Class Jiangwei II Class Jianghu 1 II V Class Jiangdao Class Arihant Class Chakra Class Shishumar Class Kilo Class Scorpene Class Centaur Class Kiev Class (Ex Admiral Gorshkov) Delhi Class Kashin Class Kolkata Class Godavari Class Brahmaputra Class Talwar Class Shivalik Class Dolphin Class Gal Class T Class S Class Eilat (SAAR 5) Class Hetz (SAAR 4.5) Class Reshef Class Super Dvora Class Sinpo Class Romeo Class Sang-O Class Destroyers Frigates SOUTH KOREA Submarines Aircraft Carriers Destroyers Frigates Chang Bogo Class Son Wonil Class Dolgorae Class Amphibious Assault Dokdo Class LPH Go Jun Bong Class LST Destroyers KDX1 2 & 3 Class Frigates Incheon Class Ulsan Class Corvettes P O Hang Class For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section. THAILAND Aircraft Carriers Amphibious Forces Frigates Chakri Naruebet Class Endurance Class Nomed PS 700 Class Naresuan Class Gwanggaeto Class Oliver Hazard Perry Class Knox Class Jianghu II Class Tapi Class Khamronsin Class Ratnakosin Class ISRAEL Submarines Corvettes Patrol Forces Corvettes NORTH KOREA Submarines www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 545 REGIONAL BALANCE UNITED KINGDOM For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section. Frigates Leander Class Salisbury Class ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY Corvettes CONCEPTS & PERSPECTIVES RUSSIA Aircraft Carrier Battle Cruiser Patrol Submarines Kuznetsov Class Kirov Class Kilo Class Lada Class Kashin Class Udayloy I & II Class Sovermennyy Class Krivak Class Admiral Gorshkov Class Admiral Grigorovich Class Neystrashimyy Class Gepard Class Buyan Class Steregushchy Class Nanuchka Class Tarantul Class Bora Class Parchim Class WEAPONS EQUIPMENT VEHICLES Yono Class Yugo Class Whiskey Class Frigates Najin Class Krivak Class For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section. Soho Class CONTENTS regional balance navaL equipment contd. Alvand (Vosper Mk. 5) Class Lekiu Class Dhofar (Province) Class Qahir Class equipment & hardware specifications navy Missile Craft Corvettes UNITED STATES OF AMERICA For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section. Guided Missile Destroyers Arleigh Burke Class Zumwalt Class Gearing Class Frigates Adelaide Class Oliver Hazard Perry Class Amphibious Forces Austin Class WEST EUROPEAN COUNTRIES For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section. Submarines Agosta Class (France Spain) Daphne Class (France) HDW Class (Germany) Frigates Al Riyadh Class (France) Madina Class (France) La Fayette Class (France) Descubierta Class (Spain) Fast Attack Missile Craft Combattante Class (France) Ratcharit Class (Italy) Aircraft Carriers Principe De Asturias Class (Spain) china Strategic Missile Submarines 5 1 Jin Class (Type 094) (SSBN) Displacement tonnes 8 000 surfaced 11 000 dived Dimensions feet (metres) 449.5 38.7 7.5 (137.0 11.8 2.3) Main machinery Nuclear 2 PWR 150 MW 2 turbines 1 shaft Speed knots 20 Complement 140 Missiles SLBM 12 JL-2 (CSS-NX-5) 2-stage solid-fuel rocket Inertial guidance with stellar update to over 8 600 km 12 000 km or 14 000 km depending on the variant single nuclear warhead of 1 MT or 3-8 MIRV of smaller yield. CEP 300 m approximate. Torpedoes 6-21 in (533mm tubes) Countermeasures Decoys ESM. Radars Surface search navigation Type-359 I-Band Sonars Hull mounted passive active flank and towed arrays. Structure Likely to be based on the Type-093 SSN design which in turn is believed to be derived from the Russian Victor III design. XIA Class (Type 092) (SSBN) Displacement tonnes 6 500 surfaced 7 000 dived Dimensions feet (metres) 393.6 33 26.2 (120 10 8) Main machinery Nuclear turbo-electric 1 PWR 58 MW 1 shaft Speed knots 22 dived Complement 100 Missiles SLBM 12 JL-1 (CSS-N-3) inertial guidance to 2 150 km (1 160 nm) warhead single nuclear 250 kT. Torpedoes 6-21 in (533mm) bow tubes. Yu-3 (SET65E) active passive homing to 15 km (8.1 nm) at 40 kt warhead 205 kg. Countermeasures ESM Type 921-A radar warning. Radars Surface search Snoop Tray I-Band. Sonars SQZ-3 hull-mounted active passive search and attack medium frequency. Structure Diving depth 300 m (985 ft). The Xia is a derivative of the Han Class SSNs with an extended hull to accommodate 12 ballistic missile tubes. Nuclear Propelled Attack Submarines (SSGN) Han Class (Type 091) Displacement tonnes 5 000 dived Dimensions feet (metres) 385 x 33 x 24 (98 x 10 x 7.4) Main machinery 1 nuclear pressurised water reactor 1 shaft Speed knots 25 dived 12 surfaced Complement 75 Weapons 6 x 533mm torpedo tubes for CET 65E and Type 53-51 torpedoes up to 20 torpedoes or 36 mines Tube launched C-801 anti-ship missiles. Programme & Structure The first nuclear powered submarines deployed by the PLA (Navy). Five boats of the class were built and commissioned between 1974 and 1990. The first two are reported to have been decommissioned. They are known for a noisy reactor and poor radiation shielding and are inhibited in their ability to launch missiles while submerged. The submarines are equipped with SQZ-262 sonar made in China. All boats deployed with the North Sea Fleet and based at Qingdao. Shang Class (Type 093) Displacement tonnes 6 500 dived Dimensions feet (metres) 372 x 37.2 x 33.6 (110 x 11 x 10) Main machinery 1 nuclear pressurised water reactor 1 shaft Speed knots 30 dived Complement 100 Weapons 6 x 533mm or 650mm torpedo tubes for a range of wire acoustic and wake homing torpedoes and the submarine launched version of YJ-83 cruise missile. Programme & Structure The Type 093G is reported to be an upgraded version of Type 093 China s second-generation nuclear-powered attack submarine which entered active ser- www.spguidepublications.com 2016546 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com equipment & hardware specifications navy navaL equipment contd. vice several years ago. With a teardrop hull the submarine is longer than its predecessor and has a vertical launching system. Patrol Submarines 13 Song Class (Type 039 039G) (SSG) Displacement tonnes 1 700 surfaced 2 250 dived Dimensions feet (metres) 246 24.6 17.5 (74.9 8.4 5.3) Main machinery Diesel-electric 4 MTU 16V 396 SE 6 092 hp (m) (4.48 MW) diesels 4 alternators 1 motor 1 shaft. An AIP system has been reported Speed knots 15 surfaced 22 dived Complement 60 (10 officers) Missiles SSM C-801A radar active homing to 80 km (44 nm) at 0.9 Mach warhead 165 kg. Torpedoes 6-21 in (533mm) tubes. Combination of Yu-4 (SAET-50) passive homing to 15 km (8.1 nm) at 30 kt warhead 309 kg and Yu-3 (SET-65E) active passive homing to 15 km (8.1 nm) at 40 kt warhead 205 kg. Yu-6 wake-homing torpedoes may also be fitted. Mines In lieu of torpedoes Countermeasures ESM Type 921-A radar warning Radars Surface search I-Band Sonars Bow-mounted Chinese derivative of French Thomson CSF TSM 2233 passive active search and attack medium frequency. Flank array Chinese derivative of Thomson CSF 2255 passive search low frequency Operational Basing North (315 316 327 328) East (314 321 322 323 324 325) South (320 326 329) 7 1 Yuan Class (Type 041) (SSG) Displacement tonnes 4 000 dived Dimensions feet (metres) 236.2 x 27.5 (72.0 x 8.4) Main machinery Diesel-electric 4 diesels 1 motor Chinese developed AIP system 1 shaft. Missiles SSM C-80X inertial cruise active radar homing to 80-120 km (44-66 nm) at 0.9 Mach warhead 165 kg. Torpedoes 6-21 in (533mm) bow tubes. Combination of Yu-4 (SAET-50) active passive homing to 15 km (8.1 nm) at 30 kt warhead 309 kg and Yu-3 (SET-65E) active passive homing to 15 km (8.1 nm) at 40 kt warhead 205 kg. Yu-6 wakehoming torpedoes may also be fitted. Sonars Bow-mounted active passive search and attack medium medium frequency. Flank array passive search low frequency. Complement 58 Comment Teardrop hull and use of anechoic rubber tiles suggest strong influence of Kilo class in design. Yuan class is equipped with indigenously developed shock absorber system to reduce noise by over 35 dB. It is intended to replace the obsolescent Romeo and Ming class submarines. The second 039A version reported to have more modern fin and has the stepped conning tower removed making it similar to French Agosta-90B in external appearance. It might have been fitted with an AIP system believed to have been tested onboard a Ming class SS. Kilo Class (Project 877EKM 636) (SSG) Displacement tonnes 2 325 surfaced 3 076 dived Dimensions feet (metres) 238.2 242.1 (Project 636) 32.5 21.7 (72.6 73.8 9.9 6.6) Main machinery Diesel-electric 2 diesels 3 650 hp(m) (2.68 MW) 2 generators 1 motor 5 900 hp(m) (4.34 MW) 1 shaft 2 auxiliary motors 204 hp(m) 150 kW) 1 economic speed motor 130 hp(m) (95 kW). Speed knots 17 dived 10 surfaced Complement 52 (13 officers) Missiles SLCM Novator Alfa Klub SS-N-27 (3M54E1) active radar homing to 180 km (97.2 nm) at 0.7 Mach (cruise) and 2.5 Mach (attack) warhead 450 kg. Torpedoes 6-21 in (533mm) tubes. 18 torpedoes. Combination of TEST 71 96 wire-guided active passive homing to 15 km (8.1 nm) at 40 kt warhead 205 kg and 53-65 passive wake homing to 19 km (10.3 nm) at 45 kt warhead 300 kg. Mines 24 in lieu of torpedoes Countermeasures ESM Squid Head or Brick Pulp radar warning Weapons control MVU-119 EM Murena TFCS. Radars Surface search Snoop Tray I-Band. Sonars Shark Teeth hull-mounted passive active search and attack medium frequency Mouse Roar hull-mounted active attack high frequency. Modernisation The first four submarines were refitted in the Shipyards at Russia. Upgrade package is likely to have included installation of the Klub (3M54) (SS-N-27) anti-ship missile system. China has ordered eight Type 636s armed with the new Club-S series (3M54E range 300 km at Mach 0.8) SLCMs from Russia in May 2002 a move considered as China s response to Taiwan s order of eight diesel submarines from United States. This acquisition reflects PLAN s urgency to build a credible submarine force against potential threats from US and Japanese naval forces. Operational The first eight (364-371) based at Xiangshan in the East Sea Fleet and the remainder (372-375) based in the South Sea Fleet. www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 547 REGIONAL BALANCE get yoUr coPy to reaD in coMPlete ASIAN WHO S WHO INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS regional Balance air equipment Air equipment is listed below by platforms aeriaL pLatforms combat aircraft China Xian H-6A H M Strategic Bomber Chinese version of Tu-16 Shenyang J8B J8F & J8H Third-Gen Interceptor Xian JH-7 & 7A Multi-role Fighter Bomber Chengdu J-7 J-7E &J-7G -- Under replacement Chengdu J-10A J-10B & J-10S -- Fourth-Gen Multi-role Fighter Nanchang Q-5 Fantan-Q-5C Q-5D & Q-5E -- Strike Aircraft FC-1 Xiaolong JF-17 Thunder-Multirole Combat Aircraft Chengdu J-20 -- Fifth-Gen Stealth Aircraft under development Shenyang J-11A 11B & 11BH -- Chinese version of Su-27 Shenyang J-16 -- Multi-role Fighter Shenyang J-31 Fifth-Gen Stealth Aircraft -- under development Eurofighter Typhoon Tranche 1 2 & 3A Dassault Mirage 2000H Dassault Mirage F1 Dassault Mirage 5 Dassault Rafale LCA Tejas Mk I and Mk IA IAI Kfir -- Multi-role Combat Aircraft IAI Nammer -- Updated version of the Kfir. IAI Nesher (Israeli version of Dassault Mirage 5) Mikoyan MiG-25R Mikoyan MiG-29M Fourth Gen multirole air superiority fighter Mikoyan MiG-29M Carrier version Mikoyan MiG-31 MiG-31BM -- FourthGen Fighter Mikoyan MiG-35 Fourth Gen Multirole Combat Aircraft Sukhoi Su-24 M M2 MR Sukhoi Su-25SM Sukhoi Su-27 Sukhoi Su-30M M2 Sukhoi Su-33 Carrier Borne Fighter Sukhoi Su-34 Strike Aircraft Sukhoi Su-35BM Fourth Gen Combat Aircraft Sukhoi T-50 PAK FA under development Saab JAS-39 Gripen E Panavia Tornado BAE Systems Hawk 200 Series Boeing F-15C D Eagle equipment & hardware specifications air force Boeing F-15E Strike Eagle Boeing F A-18A B C D Hornet Boeing F A-18E F Super Hornet Lockheed Martin F-16C D Fighting Falcon Northrop F-5F N Tiger II F-22A Raptor Fifth-Gen Stealth Fighter F-35A F-35B Lightening II Joint Strike Fighter -- Fifth-Gen McDonnell Douglas T-45 Goshawk Carrier-capable aircraft Europe France India Israel Russia transport aircraft Germany Transall C-160 -- Developed jointly with France Dornier Do 228 Russia Ilyushin IL-76 Ilyushin IL-96 Tupolev Tu-134 Tupolev Tu-214 Spain Airbus Defence and Space C212 Airbus Defence and Space CN235M Airbus Defence and Space C295 Airbus Defence and Space A400M Atlas Ukraine Antonov An-12 Antonov An-22 Antonov An-26 Antonov An-32 Antonov An-124 Antonov An-72 Antonov An-74 Antonov An-70 under development Antonov An-178 Medium-lift Aircraft under development United States of America Lockheed Martin C-5A Galaxy Boeing C-17 Globemaster III Lockheed Martin C-130J-30 Super Hercules Brazil Embraer EMB 110 Bandeirante -- Utility Embraer Legacy 600 VIP Transport Embraer 190 VIP Transport Embraer 120 Brasila -- Utility VIP Transport Embraer 145 Utility VIP Transport Embraer 121 Xingu -- Derivative of EMB 110 Bandeirante Embraer R 99 AEW Elint Embraer KC-390 -- Under development heLicopters France Airbus Helicopters H-215 & H-215M Airbus Helicopters AS 350 Ecureuil AS 550 Fennec AS 555 Fennec 2 Airbus Helicopters SA 365 Dauphin Airbus Helicopters AS 565 Panther Airbus Helicopters SA 316 319 Alouette III Airbus Helicopters SA 332 Super Puma Airbus Helicopters SA 341 342 Gazelle www.spguidepublications.com Sweden United Kingdom United States of America 2016566 SP s Military yearBook 2017 44th Issue www.spsmIlItaryyearbook.com equipment & hardware specifications air force air equipment contd. Germany India Airbus Helicopters Bo-105 Advanced Light Helicopter (ALH) Dhruv ALH WSI (Armed Version) Rudra Light Combat Helicopter (LCH) -- under Development at HAL Light Utility Helicopter under development at HAL AgustaWestland AW101 VIP Communication AgustaWestland AW139 VIP Communication SAR Kamov Ka-50 Black Shark Attack Helicopter Kamov Ka-52 Alligator Attack Helicopter Kamov Ka-226 Light Utility Helicopter Kazan Ansat Light Mult-purpose Helicopter Mil Mi-8 Medium-lift Helicopter Mil Mi-17V5 Medium-lift Helicopter Mil Mi-24 Attack Helicopter Mil Mi-25 35 Attack Helicopter Mil Mi-26 Heavy-lift Helicopter Mil Mi-28 Attack Helicopter Mil Mil-38 Medium-lift Helicopter Bell 407 Bell AH-1 Cobra Super Cobra Bell AH-1Z Viper Attack Helicopter Boeing AH-64 Apache Boeing CH-47 Chinook Sikorsky UH-60 HH-60 S-70 Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 499. Italy Russia United States of America traininG Brazil India United Kingdom China Pakistan combat aircraft China Xiang H 6 Western designation B-6 User China www.spsmIlItaryyearbook.com 2016 SP s Military yearBook 2017 44th Issue 567 REGIONAL BALANCE Qiang 5 NATO reporting name Fantan Western designation A-5 Users Bangladesh (A-5C) China (Q-5) ASIAN WHO S WHO airborne earLY warninG & controL Brazil Embraer-145 R99 AEW Sweden Saab 2000 AEW&C United States of America Boeing E-3 Sentry Northrop Grumman E-2C Hawkeye Boeing E-767 AWACS Russia Israel IL-76 with Phalcon System Jianjiao 7 Western designation FT-7 Users Bangladesh (FT-7B) China (JJ-7) Iran (FT-7) Myanmar (FT-7) Pakistan (FT7P PG) and Sri Lanka (FT-7). Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 499. INDIAN DEFENCE Embraer EMB-312 Tucano HAL HJT-16 Kiran Mk I IA and Mk II BAE Systems Hawk 132 Advanced Jet Trainer K-8 Karakoram Basic Jet Trainer Hongdu L-15 Falcon Advanced Jet Trainer Other versions (i) J-7 I (ii) F-7A (export version of J-7I exported to Albania Egypt Iraq and Tanzania) (iii) J-7 II (modified and improved version of J-7I also known as J-7B) (iv) F-7 B (upgraded export version based on J-7II with ability to carry air-to-air missiles exported to Bangladesh Iran Jordan Pakistan Zimbabwe) F-7BS (Sri Lanka) (v) J-7 IIA (improved version of J-7 II) (vi) J-7 H (improved version of J-7 II with improved ground attack capability) (vii) F-7 M Airguard (export version of J-7 IIA) (viii) J-7 II M (Chinese version of F-7M) (ix) F-7 P Airbolt (variant of F-7M to meet specific requirements of Pakistan Air Force including ability to carry 4 X air-to-air missiles F-7 MP Airbolt (modified version of F-7 P) (x) J-7C (J-7 III) (design based on MiG-21 MF) (xi) J-7 D (J-7IIIA Improved J-7C version) (xii) J-7E (third-generationJ-7 version based on J-7II airframe) (xiii) F-7 MG (export variant of J-7E) (xiv) F-7 PG (variant of F-7 MG modified for Pakistan Air Force) (xv) J 7 FT 7 Tandem two-seat operational trainer based on J-7 II Users China (J-7 II IIA H IIM III IIIA E) Bangladesh (F-7M) Egypt (F-7A B) Iran (F-7M) Myanmar (F-7M) North Korea (F-7) Pakistan (F-7P PG) and Sri Lanka (F-7BS). Shenyang J-8 (Jian 8) NATO reporting name Finback Western designation F-8 User China Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 499. BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES Jian 7 Western designation F-7 Type Single-seat fighter and close support aircraft Design based on MiG-21F (of Soviet origin) CONTENTS regional Balance air equipment contd. Myanmar (A-5-C -M) and Pakistan (A-5III). Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 499. FC 1 Export version Joint Fighter 17 (JF-17) Thunder Users China Pakistan Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 500. Jianji 10 Vigorous Dragon or Chengdu J-10 Western designation F-10 Vanguard Type Multi-role fighter Design Tail-less delta wing and close-coupled fore-planes single sweptback vertical tail outward-canted ventral fins single ventral engine air intake. Accommodation Pilot only on zero zero ejection seat. Range 1 000 nm Armament 11 external stores points including one on centre line tandem pairs on fuselage sides and three under each wing the outboard wing stations each carrying PL-8 or later AAMs. Other potential weapons could include Vympel R-73 and R-77 AAMs C-801 or C-802 ASMs and laser-guided or free-fall bombs. Combat radius 250-300 nm User China Shenyang J 11 Chinese version of Su-27 For details see Su-27 under Russia User China EurOpE Eurofighter Typhoon Crew Length Wingspan Height Wing area Empty weight Loaded weight Max take-off weight Power plant Dry thrust Thrust with afterburner Maximum speed At altitude At sea level Supercruise Range Ferry range Service ceiling Rate of climb Wing loading equipment & hardware specifications air force Thrust weight Armament Gun Air-to-air missiles 1.18 1 x 27mm Mauser BK-27 cannon AIM-9 Sidewinder AIM-132 ASRAAM AIM-120 AMRAAM IRIS-T and in the future MBDA Meteor Air-to-ground Missiles AGM-84 Harpoon AGM-88 HARM ALARMs Storm Shadow (Scalp EG) Brimstone Taurus Penguin and in the future AGM Armiger Bombs Paveway 2 Paveway 3 Enhanced Paveway JDAM HOPE HOSBO Laser designator e.g. LITENING pod Users UK Germany Spain Italy Saudi Arabia and Austria. FrAnCE Dassault Aviation Mirage 2000H Users Egypt India Qatar (Mirage 2000-5) Taiwan (Mirage 2000-5) and UAE (Mirage 2000-9). Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. Dassault Aviation Mirage III User Pakistan Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 500. Dassault Aviation Mirage F-1C Users Jordan Kuwait and Libya. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 500. Dassault Aviation Mirage 5 Users Egypt Libya and Pakistan. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 501. Dassault Aviation Rafale User France Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. InDIA Light Combat Aircraft Tejas Mk I User India Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. ISrAEL IAI Kfir Type Users 1 or 2 15.96 m (52 ft 5 in) 10.95 m (35 ft 11 in) 5.28 m (17 ft 4 in) 50 m (540 ft) 11 000 kg (24 250 lb) 15 550 kg (34 280 lb) 23 000 kg (51 809 lb) 2 Eurojet EJ200 afterburning turbofans 60 kN (13 500 lbf ) each 90 kN (20 250 lbf ) each Mach 2 Mach 1.2 (1 470 kmph 915 mph) Mach 1.2 (1 470 kmph 915 mph) 1 390 km (864 mi) 3 790 km (2 300 mi) 19 812 m (65 000 ft) 315 m s (62 007 ft min) 311 kg m (63.7 lb ft) www.spguidepublications.com Multi-role fighter Israel Sri Lanka Ecuador and Columbia. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 501. ruSSIA Mikoyan MiG-21 NATO reporting name Fishbed Mongol 2016568 SP s Military yearBook 2017 44th Issue www.spsmIlItaryyearbook.com equipment & hardware specifications air force air equipment contd. Users At least 38 air forces of the world with different versions including Afghanistan Algeria Cambodia Egypt India Kyrgyzstan Laos Libya Syria Vietnam Yemen. Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. Mikoyan MiG-23 NATO reporting name Flogger Users Algeria Kazakhstan Libya North Korea Syria and Turkmenistan. Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2011-12 Edition page 220. Mikoyan MiG-25 NATO reporting name Foxbat Users Algeria Kazakhstan Libya Syria and Turkmenistan. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 501. Mikoyan MiG-27 M NATO reporting name Flogger J Users India Kazakhstan and Sri Lanka. Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. Mikoyan MiG-29 NATO reporting name Fulcrum A B C D Users Algeria Bangladesh India Iran Kazakhstan Malaysia Myanmar North Korea Syria Turkmenistan Uzbekistan and Yemen. Note See Indian Defence Equipment Catalogue Indian Air Force SP s MYB 2013 Edition. Mikoyan MiG-31 NATO reporting name Foxhound Users Russia Kazakhstan. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 501. Sukhoi Su-24 NATO reporting name Fencer Users Russia Algeria Iran Iraq Belarus Kazakhstan Azerbaijan Uzbekistan Ukraine Sudan Libya and Syria. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 502. Sukhoi Su-25 NATO reporting name Frogfoot Users Angola Armenia Azerbaijan Belarus Chad Congo Guinea Ethiopia Georgia Gambia Iran Kazakhstan North Korea Peru Russia Sudan Turkmenistan Ukraine and Uzbekistan. Note For details refer to SP s MYB 2009-10 Edition Equipment and Hardware Section page 502. Sukhoi Su-27 NATO reporting name Type Length Wingspan Height Armament Hard points War load Weapons Features Users Flanker Interceptor ground attack fighter 21.9 m 14.7 m 5.9 m One internal 30mm GSh-301 cannon Ten (two wet) four fuselage four wing two wingtip 4 000 kg R-27R R-27T R-33 R-60 R-73 bombs rockets Mid swept wing twin tails ventral intakes Angola China Eritrea Ethiopia Indonesia Kazakhstan Russia Ukraine Uzbekistan and Vietnam. Flanker Multi-role fighter 25 000 kg 34 000 kg 9 Mach 2 3 000 km Sukhoi Su-30K NATO reporting name Type Take-off weight Normal Maximum Maximum g load Maximum speed Combat range With internal fuel With one in-flight refuelling Take-off run Landing run Wingspan Length Height Combat load Suspension points Weapons Power plant Users www.spsmIlItaryyearbook.com 2016 SP s Military yearBook 2017 44th Issue 569 REGIONAL BALANCE Sukhoi Su-30MKI NATO reporting name Flanker Type Two-seat multi-role long range fighter-bomber Take-off weight Normal 24 900 kg get yoUr coPy to reaD in coMPlete ASIAN WHO S WHO 5 200 km 550 m 670 m 14.7 m 21.94 m 6.4 m 8 000 kg 12 Air-to-air missiles with passive and active radar TV laser and telecode homing air-to-surface anti-radar missiles missiles with TV laser and telecode guidance TV guided bombs unguided bombs rockets 30mm cannon. 2 x AL-31FP Algeria Angola China (Su-30MKK) Indonesia (Su-30MK) Malaysia (Su-30MKM) Russia Uganda Venezuela Vietnam (Su-30MK). INDIAN DEFENCE BUSINESS TECHNOLOGY CONCEPTS & PERSPECTIVES WEAPONS EQUIPMENT VEHICLES CONTENTS abbreviationS A A&E A&N A S A S Mortars AA-AB AAAU AAC AAD AAM Ac ac ACAS ACCCS Ammunition and Explosives Andaman and Nicobar Anti-Submarine Anti-Submarine Mortars anti aircraft - air burst airborne active array antenna unit Army Aviation Corps Army Air Defence air-to-air missile aircraft Assistant Chief of the Air Staff Artillery Combat Command and Control System artillery command control and communications system Assistant Controller of Carrier Project alternating current electrical multiple unit Asian Centre for Human Rights Assistant Chief Integrated Defence Staff Assistant Chief Integrated Defence Staff (Policy Planning & Force Structures) Advanced Cruise Missile Air Chief Marshal Assistant Chief of Naval Staff Assistant Chief of Naval Staff (Submarines) Assistant Chief of Naval Staff (Policy & Plans) Assistant Controller of Logistics Assistant Chief of Personnel Assistant Chief of Personnel (Career Planning) Assistant Chief of Personnel (Human Resource Development) Acquisition Assistant Controller of Warship Production & Acquisition Air Defence Aeronautical Development Agency aide-de-camp air defence control and reporting system Air Defence Direction Centre Aeronautical Development Establishment Additional Director General Army Aviation ADGDV ADGEM ADGMov Additional Director General Discipline and Vigilance Additional Director General Equipment Management Additional Director General Movement Air Aslt Bde AJT AL ALH AMDR Amph Craft ANA ANC ANSF ANURAG ANVC AOC AON AOP APA APCs APDS APEC APFSDS APS APT AQAP AR AR&DB ARDC ARDE ARF ARMREB ARMSCOR ARTC&S ARTRAC ARV ASAT ASCON ASDF ASEAN ASG AShM ASTE ASTROIDS ASW ATAS ATDS Air Assault Brigade advanced jet trainer Awami League advanced light helicopter Air and Missile Defence Radar Amphibious craft Afghan National Army Andaman and Nicobar Command Afghan National Security Forces Advanced Numerical Research & Analysis Group Achik National Volunteer Council Army Ordnance Corps acceptance of necessity Air Officer-in-Charge Personnel advanced projects agency Armoured personnel carrier armour piercing discarding sabot Asia-Pacific Economic Cooperation armour piercing fin stabilised discarding sabot Active Promotion System advanced persistent threat Al Qaeda in the Arabian Peninsula Assam Rifles Aeronautical Research and Development Board Aircraft R&D Centre Armament Research & Development Establishment ASEAN Regional Forum Armament Research Board Armaments Corporation of South Africa Assam Rifles Training Centre and School Army Training Command Armoured Recovery Vehicle anti-satellite weapons Army Static Communication Network Air Self-Defence Force Association of South East Asian Nations Abu Sayyaf Group Anti ship Missile Aircraft and System Testing Establishment Army Strategic Operational Information Dissemination System anti-submarine warfare active-cum-passive towed array sonar advanced torpedo defence system ACCP ACEMU ACHR ACIDS ACIDS (PP&FS) ACM ACNS ACNS (P&P) ACOL ACOP ACOP (CP) ACOP (HRD) Acqn ACWP&A AD ADA ADC ADC&RS ADDC ADE ADG Army Avn ADG Procurement Additional Director General Procurement ADGPS Additional Director General Personnel Services ADG Quartering Additional Director General Quartering ADGTA Additional Director General Territorial Army ADGES Air Defence Ground Environment System ADGIS Additional Director General Information System ADGIW Additional Director General Information Warfare ADGMI Additional Director General Military Intelligence ADGMO Additional Director General Military Operations ADGMS (Navy) Additional Director General Medical Services (Navy) ADGOL Additional Director General Operation Logistics ADGPI Additional Director General Public Information ADGSI Additional Director General Signal Intelligence ADIZ Air Defence Identification Zone ADMM ASEAN Defence Ministers Meeting ADRDE Aerial Delivery Research & Development Establishment AESA active electronically scanned array AEW airborne early warning AEW&C airborne early warning and control AFP Armed Forces of the Philippines Af-Pak Afghanistan-Pakistan AG Adjutant General AGM air-to-ground missile AGPL actual ground position line AH attack helicopters AHEAD advanced hit efficiency and destruction AIEPG ASEAN-India Eminent Persons Group AIFVs Armoured Infantry Fighting Vehicles AIS automatic identification system www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 577 abbreviationS ATGM ATGW ATK ATM ATRCL AVSM AWACS anti-tank guided missile Anti Tank Guided Weapon Anti Tank air traffic management Anti Tank Recoilless Rifle Ati Vishisht Seva Medal airborne warning and control system C4ISR command control communications computers intelligence surveillance and reconnaissance Centre for Airborne Systems computer-aided design current account deficit Comptroller and Auditor General of India Centre for Artificial Intelligence & Robotics Computer-aided manufacturing Central Armed Police Force Central Acquisition Radar Central Asian Republics Cooperation Afloat Readiness and Training Central Asia Regional Economic Cooperation Central Asia South Asia Council of Agencies Serving South Asians College of Air Warfare Central Bureau of Investigation confidence building measures chemical biological radiological and nuclear Cross-Border Transport Agreement control centre Central Coordinating Authority Chinese Communist Party Cabinet Committee on Security Commando Battalion Commando Group Chief of Defence Staff Comprehensive Economic Cooperation Agreement cell phone radar Centre for Military Airworthiness & Certification Chief Executive Officer circular error probability Comprehensive Economic Partnership Agreement Centre for Personal Talent Management Computer Emergency Response Team Common Economic Space Combined Force Commander computational fluid dynamics Centre for Fire Explosive & Environment Safety ceasefire line Combating Financing Terrorism Central Government Expenditure Commonwealth of Human Rights Initiative Chashma Nuclear Power Plant CIA CIAT CIDSS CIG CIM CIS CISC CISF CMC Central Intelligence Agency Counter-Insurgency and AntiTerrorist command information decision support system Counter-Insurgency Grid Computer Integrated Manufacturing Commonwealth of Independent States Chief of Integrated Staff to the Chairman Chiefs of Staff Committee Central Industrial Security Force Computer Maintenance Corporation Central Military Commission credible minimum deterrence countermeasure dispensing systems computer numerically controlled boring machines Commando Battalion for Resolute Action Chief of Materiel Chief of Personnel Collective Operational Reaction Force Coordinated Patrol Chiefs of Staff Committee commercial off-the-shelf Central Pay Commission Communist Party of India (Maoist) Central Paramilitary Forces China National Precision Machinery Corporation Controller of Personnel Services counter rocket artillery and mortar China Road and Bridge Corporation Criminal Procedure Code Central Reserve Police Force Chief Systems Administrator (ILMS) Centre for Strategic and International Studies coastal surveillance network coastal security scheme coastal surveillance system Collective Security Treaty Organisation computed tomography Customs Union Centre for United Nations Peace Keeping counter very-low observable Chakri Naruebet Class Combat Vehicles Research and Development Establishment CABS CAD CAG CAIR B BADZ BARC Bbrs BDE hq BDL BDR BE BEL BEML BFSR BHEL BIMSTEC Base Air Defence Zone Bhabha Atomic Research Centre Bombers Brigade Headquarter Bharat Dynamics Limited Bangladesh Rifles Budget Estimate Bharat Electronics Limited Bharat Earth Movers Limited battlefield surveillance radar Bharat Heavy Electricals Limited Bay of Bengal Initiative for MultiSectoral Technical and Economic Cooperation Border Management Battle Management Command and Control ballistic missile defence brain-machine-interfaces ballistic missile systems battlefield management system Battalion Bangladesh Nationalist Party Border Management Programme in Central Asia Brazil Russia India China and South Africa Border Roads Organisation Border Security Force battlefield surveillance system Bodoland Territorial Autonomous District beyond visual range CAM CAPF CAR CAR CARAT CAREC CASA CASSA CAW CBI CBM CBRN CBTA CC CCA CCP CCS Cdo Bn CDO gp CDS CECA CELLDAR CEMILAC CEO CEP CEPA CEPTAM CERT CMD CMDS CNC CoBRA COM COP CORF CORPAT COSC COTS CPC CPI (M) CPMF CPMIEC CPS C-RAM CRBC CrPC CRPF CSA (ILMS) CSIS CSN CSS CSTO CT CU CUNPK CVLO CVM CVRDE BM BMC2 BMD BMI BMSy BMS Bn (bn) BNP BOMCA BRICS BRO BSF BSS BTAD BVR C C4 www.spguidepublications.com C4I C4I2 command control communications and computers command control communications computers information command control communications computing intelligence and information command control communications computers information and intelligence surveillance and reconnaissance CES CFC CFD CFEES CFL CFT CGE CHARI CHASNUPP C4I2SR D DAB digital audio broadcasting 2016578 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com abbreviationS DAC DACIDS DARE DARPA DART DBSN DCIDSPP&FD Defence Acquisition Council Deputy Assistant Chief of Integrated Defence Staff Defence Avionics Research Establishment Defense Advanced Research Projects Agency Driven Ammunition Reduced Time of Flight distributed battlefield sensor network Deputy Chief of Integrated Defence Staff Policy Planning and Force Development Defence Crisis Management Group Defence Communications Network Deputy Chief of Naval Staff Deputy Director General Canteen Services Deputy Director General Defence Security Corps Deputy Director General Military Farms Deputy Director General Pioneers Department of Defence Production and Supplies Defence Electronics Application Laboratory Defence Bio-Engineering and Electro Medical Laboratory Defence Electronics Research Laboratory Defence Scientific Information & Documentation Centre Defence Food Research Laboratory Director General Army Air Defence Director General Artillery Director General Ceremonials and Welfare Director General Discipline Ceremonials & Welfare Director General Electrical and Mechanical Engineers Director General Financial Planning Director General Infantry Director General Mechanised Forces Director General Manpower Planning Director General Medical Services (Army) Director General Personnel Director General Organisation and Personnel Director General Perspective Planning DG RR DG WKS (Army) DGAQA DGICG DGMO DGNAI DGND-SDG DGND-SSG DGNO DGOF DGONA DGP DGQA DGSPV & AOB DGST DGWE DHD DIA DIAT DIBER DIHAR DIPAS DIPP DIPR DISB DLJ DMA DMRC DMRL DMSRDE DMZ DOC DODP DOFA DOMW DOS Director General Rashtriya Rifles Director General Works (Army) Directorate General of Aeronautical Quality Assurance Director General of the Indian Coast Guard Director General Military Operations Director General Naval Armament Inspection Director General Naval Design (Submarine Design Group) Director General Naval Design (Surface Ship Group) Director General Naval Operations Director General Ordnance Factories Director General Naval Armament Director General of Police Directorate General of Quality Assurance Director General Special Purpose Vehicle & AOB Director General Supply and Transport Director General Weapons and Equipment Dima Halam Daogah Defence Intelligence Agency Defence Institute of Advanced Technology Defence Institute of Bioenergy Research Defence Institute of High Altitude Research Defence Institute of Psychology & Allied Sciences Department of Industrial Policy and Promotion Defence Institute of Psychological Research Directorate for Interaction with Services for Business Defence Laboratory Jodhpur Direct Marketing Association Delhi Metro Rail Corporation Defence Metallurgical Research Laboratory Defence Materiel & Store Research & Development Establishment demilitarised zone Declaration on Conduct of Parties in the South China Sea Department of Defence Production Defence Offset Facilitation Agency Defence Offset Management Wing Directorate of Standardisation DOT DPB DPM DPP DPSUs DPT DQMG DRDB DRDE DRDL DRDO DRL DSDI DSSC DT Dte of P&C DTN DTRL DTTI DU DURGA DVB-T DVD Department of Telecommunication Defence Procurement Board Defence procurement manual Defence Procurement Procedure defence public sector undertakings Druk Phuensum Tshogpa Deputy Quarter Master General Defence Research and Development Board Defence Research & Development Establishment Defence Research & Development Laboratory Defence Research and Development Organisation Defence Research Laboratory Defence Spatial Data Infrastructure Defence Services Staff College disruptive technology Directorate of Planning & Coordination disruption-tolerant networking Defence Terrain Research Laboratory Defence Technology and Trade Initiative Delhi University directionally unrestricted ray-gun array digital video broadcasting-terrestrial digital versatile video disc DCMG DCN DCNS DDG CS DDG DSC DDG MF DDG Pnr DDP&S DEAL DEBEL DERL DESIDOC DFRL DG AAD DG Arty DG CW DG DCW DG EME DG FP DG Inf DG Mech Forces DG MP DG MS (Army) DG Pers DG Org & Pers DG PP E EADS EAEF ECCC ECFA ECIL ECM EEZ E-in-C ELINT ELM EME EMP ENPO EO EOD Bn EOFCS EOIs ERV ESM EU European Aeronautic Defence and Space Company Euro-Asia Economic Forum Extraordinary Chambers in the Courts of Cambodia Economic Cooperation Framework Agreement Electronics Corporation of India Ltd Electronic Countermeasures Exclusive Economic Zone Engineer-in-Chief electronic intelligence Expeditionary Laboratory Mobile Electrical and Mechanical Engineers electromagnetic pulse Eastern Naga People s Organisation electro-optical Explosive Ordnance Disposal Battalion electro-optical fire control system expressions of interest exchange rate variation Electronic Support Measures European Union www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 579 abbreviationS EVMs EW electronic voting machines electronic warfare GNC GoM GPR-AB GPS GRSEL GSL GSLV GSPC GSQR GTA GTRE General National Congress Group of Ministers general purpose round air burst global positioning system Garden Reach Shipbuilders and Engineers Limited Goa Shipyard Limited geosynchronous satellite launch vehicle Salafist Group for Preaching and Combat General Staff Qualitative Requirements Gorkha Territorial Administration Gas Turbine Research Establishment IDS IDSA IED IEW IFA (N) IFC IFF IFV IGNOU IGNS IGPS IISS IITF IJT IKR IM IMF IMG IMO IMRH IMU INAS INDSAR INDU INMAS INSAT IOCL IONS IOR IOT IPA IPC IPKF IPSP IPV IPv4 IR IR&FC IRAL IRB IRDE IRENA IRNSS IRS IRST ISO Integrated Defence Staff Institute for Defence Studies and Analyses improvised explosive device information electronic warfare Integrated Financial Advisor (Navy) inter-factional clashes identification friend and foe Infantry Fighting Vehicle Indira Gandhi National Open University Inspector General Nuclear Safety Intelligent Global Positioning System International Institute for Strategic Studies India International Trade Fair intermediate jet trainer Iraqi Kurdistan Region Indian Mujahideen International Monetary Fund Inter-Ministerial Group International Maritime Organisation Indian multi-role helicopter Islamic Movement of Uzbekistan Indian Navy Air Squadron Indian (Maritime) Search and Rescue Indian National Defence University Institute of Nuclear Medicine and Allied Sciences Indian national satellite Indian Oil Corporation Ltd Indian Ocean Naval Symposium international offshore rule Internet of Things Indian Production Agency Indian Penal Code Indian Peace Keeping Force Internal Peace and Security Plan inshore patrol vessels Internet protocol version 4 India Reserve infrared international relations Information Resource & Facilitation Centre Indo-Russian Aviation Limited India Reserved Battalions Instruments Research & Development Establishment International Renewable Energy Agency Indian Regional Navigation Satellite System Indian remote satellite infrared search and track International Organization for Standardization F FAA FADEC FAE FATA FATF FBI FC FCORD FDI Fd Arty Bns FGA FGFA FICCI FICN FICs FICV FII F-INSAS FIS FLN FM FMS FOC FODAG FOGA FOK FOMAG FONA FOSM FPDA FPVs FRA FRAP FTA FTR Federal Aviation Administration Full-Authority Digital Engine Control Fuel-air explosive Federally Administered Tribal Areas Financial Action Task Force Federal Bureau of Investigation fire control FICN Coordination Group foreign direct investment Field Artillery Batallion Fighter Ground Attack fifth-generation fighter aircraft Federation of the Indian Chambers of Commerce and Industry Fake Indian Currency Notes fast interception crafts Future Infantry Combat Vehicles foreign investment institution Future Infantry Soldier as a System Flying Instructor s School National Liberation Front frequency modulation foreign military sales Final Operational Capability Flag Officer Offshore Defence Advisory Group Flag Officer Goa Area Flag Officer Karnataka Flag Officer Commanding Maharashtra and Gujarat Flag Officer Naval Aviation Flag Officer Submarine Five Power Defence Agreement Fast Petrol Vessels Flight Refuelling Aircraft fragmenting payload Free Trade Agreement Fighter H HADR HAL HAUV HCHE HDW Hels HEMRL HEU HF HMG HOTAS HSL HUD HuJI HUMINT HVF humanitarian assistance and disaster relief Hindustan Aeronautics Limited Hybrid Autonomous Undersea Vehicle higher capability high explosives Howaldtswerke-Deutsche Werft Helicopters High Energy Materials Research Laboratory highly enriched uranium high frequency Heavy machine gun Hands On Throttle-and-Stick Hindustan Shipyard Limited Head-up display Harkat-ul-Jihad al-Islami human intelligence Heavy Vehicles Factory I IAF IAI IAP IAS IB ICAO Indian Air Force Israel Aerospace Industries Integrated Action Plan Indian Administrative Service Intelligence Bureau Interceptor Boat International Civil Aviation Organisation intercontinental ballistic missile Indian Coast Guard International Court of Justice Integrated coastal surveillance system Infantry Combat Vehicle Integrated Defensive Aids Suite International Defence Exhibition and Conference Internally Displaced Person G www.spguidepublications.com GATT GCC GDP GE GHG GIS GJM GMDSS General Agreement on Tariffs and Trade Gulf Cooperation Council Gross Domestic Product General Electric greenhouse gas global information system Gorkha Janmukti Morcha Global Maritime Distress and Safety System ICBM ICG ICJ ICSS ICV IDAS IDEX IDP 2016580 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com abbreviationS IS ISAF ISI ISIL ISIS ISR ISRO ISRR ISSA ISSAss ISTAR IT ITBP ITM ITR ITSPP IW IWI information superiority International Security Assistance Force Inter-Services Intelligence Pakistan State of Iraq and the Levant Islamic State of Iraq and Greater Syria intelligence surveillance and reconnaissance Indian Space Research Organisation Indian Search and Rescue Region Institute for Systems Studies & Analyses International Social Security Association intelligence surveillance target acquisition and reconnaissance information technology Indo-Tibetan Border Police Institute of Technology Management Integrated Test Range Integrated Tri-Service Perspective Plan information warfare Israel Weapon Industries LACM LASTEC LCA LCH LCM LCU LCVP LDP LeJ LEO MEO LeT LEVCON LIA LIDAR LNG LoC LSD LST LSL LPD LRDE LRSAM LSRB Lt Inf Divs Lt Tks LTIPP LTPP LTPPFC LTTE LUH LWE Land-Attack Missile Laser Science & Technology Centre light combat aircraft light combat helicopter Local Communist Movement landing craft utility Landing Craft Vehicle Personnel Liberal Democratic Party Lashkar-e-Jhangvi low medium earth orbit Lashkar-e-Taiba Toiba leading edge vortex control surface Lead Intelligence Agency light detection and ranging liquefied natural gas line of control Landing Ship Dock Landing Ship Tank Landing Ship Logistics Landing Platform Dock Electronics and Radar Development Establishment long-range surface-to-air missile Life Sciences Research Board Light Infantry Divisions Light Tanks Long-term Integrated Perspective Plan Long-term Perspective Plan Long-term Perspective Plan Formulation Committee Liberation Tigers of Tamil Eelam light utility helicopter left-wing extremism MD AWHO MDA MDL MEDS MEMS MFN MFSTAR MGO MHA MIB MIDHANI MILF MIMO MIRV MIS MMRCA MND MNLF MoD MORS MR MRBM MRCC MRD MRL MRLs MRO MRSAM MRSC MRTT MS M-SAR MSME MSQA MTA MTAL MTCR MTRDC MW Managing Director Army Welfare Housing Organisation maritime domain awareness Mazagon Dock Limited micro-biotic electronics and disabling system micro-electro-mechanical system most favoured nation Multifunctional Surveillance Threat Assessment Radar Master General Ordnance Ministry of Home Affairs Ministry of Information & Broadcasting Mishra Dhatu Nigam Limited Moro Islamic Liberation Front multiple-input multiple-output multiple independently targetable re-entry vehicle management information system medium multi-role combat aircraft Ministry of National Defense Moro National Liberation Front Ministry of Defence Mortars maritime reconnaissance medium-range ballistic missile Maritime Rescue Coordination Centre Motorised Rifle Division multiple rocket launcher multiple rocket launchers maintenance repair and overhaul medium-range surface-to-air missile Marine Rescue Sub-Centre multi-role tanker transport Military Secretary Maritime Search and Rescue Medium Small and Micro Enterprise missile system quality assurance multi-role transport aircraft Multi-role Transport Aircraft Ltd Missile Technology Control Regime Microwave Tube R&D Centre Mine Warfare J J&K JAG JeM JNU JOC JOCOM JODI JSF JSIC JTC JTFI Jammu and Kashmir Judge Advocate General Jaish-e-Mohammad Jawaharlal Nehru University Joint Operation Centre Joint Operation Committee Joint Organisations Data Initiative joint strike fighter Joint Services Intelligence Committee Joint Training Committee Joint Task Force on Intelligence M MAC MADDLS MANPAD MANTIS Multi Agency Centre Mirror Airfield Dummy Deck Landing System Man Portable Air Defence Modular Automatic and Network Capable Targeting and Interceptor System Marine Commandos manoeuvrable re-entry vehicle measurement and signature intelligence micro UAV micro-air vehicle Messerschmitt-B lkow-Blohm multi-barrel rocket launcher main battle tank Mechanised Infantry Brigade maritime capability perspective plan Managing Director Army Welfare Education Society K KAI KALI KANUPP KKH KLA KMW KNO KPLT KRC KRG Korea Aerospace Industries kinetic attack loitering interceptor Karachi Nuclear Power Plant Karakoram Highway Kamtapur Liberation Army Krauss-Maffei Wegmann Germany Kuki National Organisation Kuki Peoples Liberation Tigers Kargil Review Committee Kurdistan Regional Government MARCOS MaRV MASINT MAV MAV MBB MBRL MBT Mech Inf bde MCPP MD AWES N NAFTA NAIS NASA NASSCOM NATGRID North American Free Trade Agreement National Automatic Identification System National Aeronautics and Space Administration National Association of Software and Services Companies National Intelligence Grid L L&T LAC Larsen and Toubro line of actual control www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 581 abbreviationS NATO NBC NBDC NC3IN NCA NCCC NCSL NCTC NCTF NCW NDA NDC NDFB NDMA NDN NDRF NFU NHRC NIA NIC NIRDESH North Atlantic Treaty Organisation nuclear biological chemical defence National Bomb Data Centre National Command Control Communication and Intelligence National Command Authority National Cyber Coordination Centre National Coalition for Supporting Legitimacy National Counter Terrorism Centre Naresh Chandra Task Force network-centric warfare National Defence Academy National Defence College National Democratic Front of Bodoland National Disaster Management Authority Northern Distribution Network National Disaster Response Force no first use National Human Rights Commission National Investigative Agency National Informatics Centre National Intelligence Council National Institute for Research and Development in Defence Shipbuilding National League for Democracy Nao Sena Medal National Maritime Foundation naval multi-role helicopter Naval Materials Research Laboratory National Maritime Search and Rescue National Maritime Search and Rescue Coordination Authority National Maritime Search and Rescue Board National Oil Spill Disaster Contingency Plan Naval Physical & Oceanographic Laboratory National Population Register Nuclear Non-Proliferation Treaty Naval Research Board National Security Advisor National Security Agency National Security Council National Socialist Council of Nagaland National Socialist Council of Nagaland (Isak-Muivah) National Socialist Council of Nagaland (Khaplang) National Security Council Secretariat NSEC NSG NSR NSS NSTL NTG NTRO NWWA Naval Standing Establishment Committee National Security Guard Nuclear Suppliers Group New Silk Road National Security Strategy Naval Science & Technological Laboratory Naval Technology Group National Technical Research Organisation Navy Wives Welfare Association PDEE PDESA PDFC PDFM PDG PDIT PDLS PDMS (P&M) PDMPR PDMS (M&S) PDNA PDNAS PDNCO PDNE PDNI PDNO PDNOM PDNP PDNPF PDNS PDNT PDOA PDODY PDOH PDOI PDOP PDP PDP&A PDPRO PDPS PDSMAQ PDSMO PDSMS PDSOD PDSR PDSSD PDW PDWE Principal Director Electrical Engineering Principal Director Ex-Servicemen Affairs Principal Director Foreign Cooperation Principal Director Fleet Maintenance Parliament Duty Group Principal Director Information Technology Principal Director Logistics Support Principal Director Medical Services (Personnel & Material) Principal Director Manpower Planning & Recruitment Principal Director Medical Services (Hospital & Services) Principal Director Naval Architecture Principal Director Naval Air Staff Principal Director Net-centric Operations Principal Director Naval Education Principal Director Naval Intelligence Principal Director Naval Operations Principal Director Naval Oceanology & Meteorology Principal Director Naval Plans Principal Director Non-Public Funds Principal Director Naval Signals Principal Director Naval Training Principal Director Administration Principal Director Dockyards Principal Director of Hydrography Principal Director Indigenisation Principal Director Personnel People s Democratic Party Principal Director Pay & Allowances Principal Director Procurement Principal Director Personnel Services Principal Director Submarine Acquisition Principal Director Submarine Operations Principal Director Submarine Safety Principal Director Special Operations & Diving Principal Director Staff Requirements Principal Director Ship Systems & Development Principal Director Works Principal Director Weapons Equipment O OECD OEM OFB OFC OIS ONGC OPCW OPEC Ops Comd OPV OROP OSCC OSINT OST OTH Organisation for Economic Co-operation and Development original equipment manufacturer Ordnance Factory Board optical fibre cable operational information system Oil and Natural Gas Corporation Organisation for the Prohibition of Chemical Weapon Organisation of the Petroleum Exporting Countries Operations Command Offshore Petrol Vessels One Rank One Pension Offshore Security Coordination Committee open source intelligence Outer Space Treaty over the horizon radar NLD NM NMF NMRH NMRL NMSAR NMSARCA NMSRB NOS-DCP NPOL NPR NPT NRB NSA www.spguidepublications.com NSC NSCN NSCN IM P PAT PBR PCL PCVs PDAA PDACP PDALS PDAPP PDAPSA PDASE PDCP PDCPS PDCV Perform Achieve and Trade Patrol Boat River passive coherent location Pollution Control Vessels Principal Director Aircraft Acquisition Principal Director Aircraft Carrier Project Principal Director Air Logistics Support Principal Director Aircraft Projects & Plan Principal Director of Adventure Physical Fitness in Sports Activities Principal Director Aircraft Systems Engineering Principal Director Civilian Personnel Principal Director Civilian Personnel Services Principal Director Clothing & Victualling NSCN K NSCS 2016582 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com abbreviationS PELE PFI PGMs PIPVTR PLA PM PML PML(N) PMOC PNT PoK POL PPBP Penetrator with Enhanced Lateral Effect Popular Front of India precision-guided munitions Philippine Institute for Peace Violence and Terrorism Research People s Liberation Army Provost Marshal Pakistan Muslim League Pakistan Muslim League (Nawaz) Principal Maintenance Officers Committee position navigation and timing Pakistan-occupied Kashmir petrol oil and lubricants policy exercise of planning budgetary allocations and process of acquisition Principal Personal Officers Committee public-private partnership purchasing power parity Principal Supply Officers Committee preliminary staff requirements Patrol Torpedo Fast Param Vishisht Seva Medal Proof and Experimental Establishment RIAF RMA ROC ROS ROV RPA RRP-I RSTA RUAV Royal Indian Air Force revolution in military affairs regional operating centres remote operating stations remotely operated vehicle remotely piloted aircraft Road Requirement Plan I reconnaissance surveillance and target acquisition Rotary-winged UAVs SMAC SNERDI SNR SoD SPB SPG SQR SRBM SRE SR-SAM SSB SSG SSPL SSQAG STA Bn STEA STOBAR STOVL STP Strat Msl Forces SUAS Surv SWAC SWATH SYSM State Multi Agency Centre Shanghai Nuclear Engineering Research and Design Institute signal to noise ratio Suspension of Operation Sagar Prahari Bal Strategic Policy Group services qualitative requirements short-range ballistic missiles security related expenditure short-range surface-to-air missile Sashastra Seema Bal Special Security Group Solid State Physics Laboratory Strategic Systems Quality Assurance Group Supply and Transport Battalion Strategic and Technical Environment Assessment short take-off but arrested recovery short take-off and vertical landing Specialist Technical Panels Strategic Missile Forces small unmanned aircraft systems Surveillance South-Western Air Command small water plane area twin hulls Sarvottam Yudh Seva Medal S SA to CNS SAARC SAD SAG SAGW SAM SaR SAR SASE SATA SBE SCAF SCAPCC SCAPCHC SCO SCS SCTC Scud SSM Bde SDI SDR SDR SEAL SFC SF Engr Regt SID SIDBI SIGINT SIPRI SIRBs SITAR SLBM SLOC SM SMAC Scientific Advisor to Chief of Naval Staff South Asian Association for Regional Cooperation space asset domination Scientific Analysis Group surface-to-air guided weapons surface-to-air missile search and rescue surveillance and reconnaissance synthetic aperture radar Snow & Avalanche Study Establishment surveillance and target acquisition strategic and business environment Supreme Council of Armed Forces Services Capital Acquisition Plan Categorisation Committee Services Capital Acquisition Plan Categorisation Higher Committee Shanghai Cooperation Organisation South China Sea State Counter-Terrorism Centres Surface to Surface Missile Strategic Defense Initiative software defined radio Strategic Defence Review Sea Air and Land teams Strategic Forces Command Special Forces Engineer Regiment Signal Intelligence Directorate Small Industries Development Bank of India signal intelligence Stockholm International Peace Research Institute Specialised India Reserved Battalions Society for Integrated Technology Application and Research submarine launched ballistic missile sea line of communication Sena Medal Subsidiary MAC PPOC PPP PPP PSOC PSR PTF PVSM PXE Q QMG Quarter Master General R R&D R&DE RADAR RAF RAM RAP RAW RBA RBG RCEP RCI RCMA RCS RCL ReCAAP RECCE Recce vehs REF RFI RFP research and development Research & Development Establishment radio detection and ranging Rapid Action Force radar absorbent materials paint Research and Analysis Wing Royal Bhutan Army Royal Bhutan Guards Regional Comprehensive Economic Partnership Research Centre Imarat Regional Centre of Military Airworthiness radar cross section Recoilless Rifle Regional Cooperation Agreement to Combat Piracy and Armed Robbery Reconnaissance Rapid Equipping Force request for information request for proposal T TACAN TacC3I tactical air navigation tactical command control communications and information Tactics and Air Combat Development Establishment Turkmenistan-AfghanistanPakistan-India theatre-range ballistic missile Terminal Ballistics Research Laboratory tactical communication system Tata Consultancy Services technical intelligence Tata Energy Research Institute twenty-foot equivalent units thin-film transistor Turkish Cooperation and Coordination Agency Tamu-Kalewa-Kaleymyo Tankers Tamil National Alliance Tehreek-e-Nafaz-e-Shariat-eMohammadi TACDE TAPI TBM TBRL TCS TCS TECHINT TERI TEUS TFT TIKA TKK Tkrs TNA TNSM www.spsmilitaryyearbook.com 2016 SP s Military yearbook 2017 44th issue 583 abbreviationS TNW ToT Towed ARTY TPCR TPCRM TPP TPT TSD TTP tactical nuclear weapons transfer of technology Towed Artillery Technology Perspective and Capability Road Map Trans-Pacific Partnership Transport Technical Support Division Tehreek-e-Taliban Pakistan UNESCAP United Nations Economic and Social Commission for Asia and the Pacific United Nations General Assembly United Nations Human Rights Council UNHRC Peacekeeping Operations United Nations Security Council United Progressive Alliance Urban Perspective Our Work in Urban Areas United States of America United States Air Force Under-Secretary-General. Union of Soviet Socialist Republics United Wa State Army Uttam Yudh Seva Medal VM VRDE V-SAT VSHORAD VSM VTOL Vayu Sena Medal Vehicles Research and Development Establishment Very Small Aperture Terminal very short-range air defence systems Vishisht Seva Medal vertical take-off and landing UNGA UNHRC UNPKO UNSC UPA UPUA USA USAF USG USSR UWSA UYSM W WAC WCS WLR WMD WPN WSOI WTO Western Air Command Weapon Control System weapon locating radar weapons of mass destruction Weapons Weapon Systems ORSA and Infrastructure World Trade Organisation U UAC-TA UAE UAS UAV UCAV UDF UHF UHQ ULFA UN UNCIVPOL UNCLOS United Aircraft CorporationTransport Aircraft United Arab Emirates unmanned aerial systems unmanned aerial vehicle unmanned combat aerial vehicle United People s Front Ultra high frequency Unified HQ United Liberation Front of Asom United Nations United Nations Civilian Police United Nations Convention on the Law of the Sea V VBIG VCAS VCDS VCNS VCOS VCR VHF VLO Valley Based Insurgent Group Vice Chief of Air Staff Vice Chief of Defence Staff Vice Chief of Naval Staff Vice Chief of Army Staff video cassette recorder Very high frequency very low observable Y YSM YTL Yudh Seva Medal Yard Tug Small (small harbour tug) Z ZUF Zaliangrong United Front www.spguidepublications.com 2016584 SP s Military yearbook 2017 44th issue www.spsmilitaryyearbook.com PROTECTING INDIA S HERITAGE. Courtesy Department of Archaeology and Museums. Government of Maharashtra It has been our duty to strengthen a country that has a strong history. And we have consistently done so for the past 6 decades using cutting edge technology and class of service. Needless to say our response has always been prompt. Through our dedication and support we ve helped secure the heritage of billions in India with peaceful grounds and safer skies. 60 YEARS. 5 AIRCRAFT TYPES. 1 NATION. www.rafale.co.in TOOFANI l MYSTERE IV l ALIZE l JAGUAR l MIRAGE 2000
cc/2021-04/en_middle_0086.json.gz/line10076
__label__cc
0.728941
0.271059
Shareable Snippets Essential Eclectic Information Nanoparticles in Tattoos May Cause Cancer January 14, 2016 / Ken Finton November 20, 2013 | 162,122 views http://articles.mercola.com/sites/articles/archive/2013/11/20/nanoparticles-tattoo-ink.aspx?x_cid=20160113_ranart_nanoparticles-tattoo-ink_facebookdoc%3Fx_cid%3Dfacebook-os-ce By Dr. Mercola I don’t know about you, but I’ve never gotten a tattoo and after reading this study I am glad I avoided them. If you’ve ever gotten a tattoo, or thought about it, chances are high that you weighed the artistic and social aspects of it far more than the health aspects. In fact, you may not even be aware that there is a health aspect to receiving a tattoo – other than the inherent risks of infection, allergic reaction or disease transmission if equipment is not properly sterilized. Research is increasingly showing, however, that there might be health risks involved, especially if your tattoo design contains large areas of black ink, as the ink itself may be toxic. Can Tattoo Ink Lead to Cancer? It has been said that “tattoo ink is remarkably nonreactive histologically, despite the frequent use of different pigments of unknown purity and identity by tattoo artists.”1 However, University of Bradford researchers using an atomic force microscope (AFM) that allows them to examine skin with tattoos at the nano-level have found evidence that suggests otherwise. In a preliminary study (the first to use an AFM to examine tattoos), the researchers found that the tattoo process remodels collagen (your body’s main connective tissue).2 Further, nanoparticles from tattoo ink were found to exist in both the collagenous network of the skin as well as around blood vessels. This suggests that the ink particles are leaving the surface of your skin and traveling elsewhere in your body, where they could potentially enter organs and other tissues. This is problematic because tattoo inks are largely unregulated and known to contain cancer-causing compounds. The researchers believe the issue could become a significant public health concern given the rise in tattooing in the last decade, noting: “We need to do more work, but there is no question that these substances can be toxic. It takes a long time for the multi-step nature of cancer to show its face and I don’t think we should wait to see if there is anything wrong with these ingredients.” Nanoparticles in Tattoo Ink May Be Carcinogenic Nanoparticles are ultramicroscopic in size, making them able to readily penetrate your skin and travel to underlying blood vessels and your bloodstream. Evidence suggests that some nanoparticles may induce toxic effects in your brain and cause nerve damage, and some may also be carcinogenic. In 2011, a study in The British Journal of Dermatology revealed that nanoparticles are indeed found in tattoo inks,3 with black pigments containing the smallest particles (white pigments had the largest particles and colored pigments were in between). With the exception of the white pigments, the researchers noted that “the vast majority of the tested tattoo inks contained significant amounts” of nanoparticles. “The black pigments were almost pure NPs [nanoparticles], i.e. particles with at least one dimension <100 nm,” they said. Black-Ink Tattoos May Be the Riskiest The black ink is the color most often linked to potential adverse health effects, although all tattoo inks have toxic potential, including: Potentially carcinogenic4 May cause inflammation and DNA damage5 May contain carcinogenic Polycyclic Aromatic Hydrocarbons (PAHs) like benzo(a)pyrene (a Class 1 carcinogen according to the International Agency for Research on Cancer) Since black ink may contain a significant amount of nanoparticles, it is likely that such toxins could find easy entrance into your bloodstream, perhaps worsening their effects. Writing in Experimental Dermatology, researchers highlighted the dangerous potential of tattoo inks (particularly black) even beyond nanoparticles:6 “Black tattoo inks are usually based on soot, are not regulated and may contain hazardous polycyclic aromatic hydrocarbons (PAHs). Part of PAHs possibly stay lifelong in skin, absorb UV radiation and generate singlet oxygen, which may affect skin integrity. … Tattooing with black inks entails an injection of substantial amounts of phenol and PAHs into skin. Most of these PAHs are carcinogenic and may additionally generate deleterious singlet oxygen inside the dermis when skin is exposed to UVA (e.g. solar radiation).” While so far incidences of skin cancer appearing on tattooed skin has been deemed coincidental,7 it is largely unknown whether the inks may be contributing to cancers, or other health problems, elsewhere in the body. It’s known, for instance, that some tattoo pigment may migrate from your skin into your body’s lymph nodes.8 According to Dr. Samuel Epstein, a well-respected professional in cancer prevention: “… the evidence which we’ve accumulated so far, is largely restricted to the fact that they [nanoparticles] get into your bloodstream and reach organs throughout your body. And as far as the brain is concerned, we have actual evidence of entry into the brain and producing toxic effects — lesions, small lesions, toxic effects in the brain.” Tattoo Inks Are Not Regulated in the US, Most Are Industrial-Grade Products Inks and ink colorings (pigments) used for tattoos are technically subject to regulation by the US Food and Drug Administration (FDA) as cosmetics and color additives. However, the Agency states that because of other public health priorities and a “previous lack of evidence of safety concerns,” they have not traditionally regulated such products.9 As such, many dyes used in tattooing are actually produced for industrial uses such as car paint or printers’ ink, for instance. To date there have been no systemic studies to look at the safety of injecting such inks into the body, although the National Center for Toxicological Research is conducting research to determine: The chemical composition of tattoo inks and how they break down in your body The short-term and long-term safety of tattoo inks and pigments How your body responds to the interaction of light with the inks The Friends of the Earth – a global network of grassroots groups – is among those now calling for proper regulation of tattoo inks amidst the new findings that they may contribute to cancer.10 In the meantime, it may be wise to “think before you ink,” as the FDA recommends, at least until further research is completed (and remember that permanent makeup is also a form of tattoo). Are All Nanoparticles Dangerous? Nanotechnology refers to the study and design of systems at the scale of the atom, or the nanoscale. At the most basic level, the manufacturing is actually the rearranging of individual molecules and atoms into complex “molecular machines.” One nanometer is one-billionth of a meter, which is a measure so small it’s absolutely useless as a reference point. To get some idea of just how small these particles are, consider that a human blood cell is 8,000 nanometers, and a human hair is 80,000 nanometers wide. On one level, nanoparticles are an incredible advancement of technology. For instance, in the supplement industry, nanotechnology can shrink the size of vitamin molecules down to microscopic nanodroplets that are much easier for your body to absorb. On the other hand, nanoparticles are so small that that they can easily be inhaled or absorbed through your skin, so great care needs to be taken as to what types of particles are being produced on the nano-scale. As written by Sayer Ji, founder of GreenMedInfo.com:11 “One of the unintended, adverse consequences of nanotechnology in general is that by making a substance substantially smaller in size than would occur naturally, or though pre-nanotech production processes, the substance may exhibit significantly higher toxicity when in nanoparticle form. Contrary to older toxicological risk models, less is more: by reducing a particle’s size the technology has now made that substance capable of evading the body’s natural defenses more easily, i.e. passing through pores in the skin or mucous membranes, evading immune and detoxification mechanisms that evolved millions of years before the nanotech era.” I’m typically a major advocate of technology, but I have mixed feelings about the use of nanotechnology, particularly when it comes to exposing your body to these complex molecules for non-essential purposes like tattoos. If harnessed properly, however, nanotechnology has the potential to make major strides in conventional medicine and other areas related to your health. Stay tuned for more information as new advances in nanotechnology are made… by the way, this is an area that extends far beyond tattoo ink or even cosmetics. Already, nanotechnology is being harnessed for seemingly endless applications, including: Environmental remediation Sustainable energy Commercial products (hundreds of products including tennis rackets, computers, food packaging, automotive products, stain removers, air purifiers and much more) Electronics and information technology Medical and health applications Transportation (smarter and greener vehicles and aircraft, for example) Articles, CANCER, Science studies #Genetic Research, #Nanoparticles, #tattoos ← Major General Smedley Butler Trumps Kids Book → Categories Select Category #Anthropology #AUTHORITARIANISM #economics #Global Warming #health #History #Neuroscience #Oligarchy #OPERA #People #photojournalism #Quantum Mechanics #Science #Shell ecploration #social change #Space travel Animals Articles Artwork ASTRONOMY authoritarianism Authors BOOKS CANCER CARTOONS Economy Education Emtertainment entertainment ENVIRONMENT Health Herbs Hobbies Humor Medicines METAPYSICS movies Music NEWS opinion People PHILOSOPHY PHILOSPOPHY Pictures PODCAST POETRY Politics QUOTES Science Science studies SHORT STORY Socal Change social change sports Technology TRAVEL VIDEO VIDEOS Words THE GOREE GIRLS This ancient thought exercise will have you questioning your identity 7 THOUGHT EXPERIMENTS Elon Musk’s Boring Company wants to sell you its excavated rock in ‘LEGO-like’ kits GREEN BURIALS At Current Rates Of Use World Could Run Out Of Thoughts And Prayers By As Early As 2019 Physicists Aim to Classify All Possible Phases of Matter The Wampanoag Side of the First Thanksgiving Story 10 THINGS TO SUPERCHARGE YOUR SEX LIFE THE GOREE GIRLS June 5, 2020 This ancient thought exercise will have you questioning your identity May 7, 2018 7 THOUGHT EXPERIMENTS April 29, 2018 Elon Musk’s Boring Company wants to sell you its excavated rock in ‘LEGO-like’ kits March 28, 2018 JOHN BOLTON March 23, 2018
cc/2021-04/en_middle_0086.json.gz/line10085
__label__wiki
0.73285
0.73285
By Dani Romero Published January 11, 2021 10:50 am More pandemic aid coming to small businesses Small businesses struggling from the COVID-19 shutdowns are getting another round of financial help with the latest spending bill passed by Congress. Of the $900 billion approved for COVID-19 relief, $284 billion is slated for the Paycheck Protection Program, with some changes. News Channel 3’s Dani Romero has more on the details and the impact it could have on businesses desperately in need. The new year comes with a new round of support for struggling small businesses. The Small Business Administration is rolling out a second round of PPP- or Paycheck Protection Program loans. “It's a great chance for us to survive," said Christopher Malm. Many business owners like Christopher Malm from Jake’s in Palm Springs are anxiously waiting for that lifeline. “We want to do what we do and take out is a very small piece of our business," said Malm. "We've pivoted to do it, however, it's not as fulfilling for us.” But starting this week things will begin to get easier. First time applicants are now able to submit a PPP request. Businesses who have already received a PPP loan can apply Wednesday. This will be round two for Malm. “Everything goes quick," said Malm. "So we've used it for labor. Yes, we’re going to apply for another round we have to despite the consequences on the other end.” It’s a much needed boost thats why Governor Gavin Newsom also extended the deadline for the state’s grant program. “We've already applied and we're grateful for the extension that the Governor just implemented last week, which gave us a little more time to get our ducks in a row," said Vicky Nelson. The state relief is also focused on nonprofits. “Our closure has affected 100% our business," said Nelson. "Our instructors, our classes, our workshops, our gallery have been closed since March, so we have absolutely no income revenue.” Vicky Nelson, manager at the Desert Art Center told News Channel 3 without a doubt, the grant money would go a long way for them. “Anything will help," said Nelson. To apply for a PPP loan, click here. California also opened their application process for small businesses and nonprofits seeking grants from the state’s Small Business COVID-19 Relief Grant Program. The deadline has been extended to January 13th. To apply for CA's COVID-19 relief, click here. News Headlines / Top Stories Dani Romero Group of House conservatives pushing to oust Liz Cheney, an effort Republican aides still view as a long shot Biden’s daughter Ashley on not having traditional hand-off at White House on Inauguration Day: ‘I think we’re all OK with it’
cc/2021-04/en_middle_0086.json.gz/line10087
__label__cc
0.658339
0.341661
Floating Support Case Worker (Domestic Violence) South Brent Location: Brent Salary: £21,050pa (including OLW) Contract: Full time, Permanent Hours: 37.5 hours per week Are you passionate about making a difference to someone’s life? EACH is a small-sized charity (£1m+) with a large impact where it matters â€" on local people’s lives. Our success is through our team of 50+ staff and volunteers, who are passionate and committed to empowering and enabling people to have better health and life choices. We have been successful in receiving funding to support women (and their children) in NW London on domestic abuse and violence including through an emotional support line, more counselling provision and web-based/digital channels, as well as funding to extend our support to women and children fleeing domestic abuse. We are now recruiting for a Floating Support Case Worker to be responsible in providing an effective outreach floating support service to vulnerable adults and families plus managing a case load of people who are at risk and living in a variety of different tenures to maintain their home, live independently and reduce the need for more intensive support at a later stage. You will help people maintain or regain their independence and encourages people to settle back into the community and support the development of self-reliance. As our Floating Support Case Worker, you will: Carry a client full case load of service users with various need and provide face to face support in their homes and in the community Undertake initial & continuous risks and needs assessment and agree levels of support planning for service users to help achievement of successful recovery personal goals. Provide appropriate support to address the needs of vulnerable families, adults and young people presenting with mental health, substance misuse, offending behaviour and the particular challenges faced by young people and the ability to support them effectively. Encourage service users to engage in a process of change through positive risk taking and enable service users to maximise social inclusion and reduce social isolation. Support service users to maximise income by reducing debt, obtaining paid work and entitlement to benefits. Liaise with private landlords, Registered Social Landlords and London Borough of Brent Housing Department act as a point of contact and enable individuals to move on in a planned way into a range of accommodation options Develop resettlement and after care options for service users as necessary and support them to develop appropriate independent living skills Enable service users to stay safe from harm and abuse. In order to be successful in this role you will have Experience / Qualifications in: Experience of providing tenancy support. Experience of outreach work amongst vulnerable people Experience of developing and implementing support plans Ability to communicate effectively with clients, professionals and agencies Ability to deal with emergencies and unexpected situations Good knowledge of health and safety and housing management issues Ability to facilitate user involvement and understanding of user empowerment Ability to liaise and work effectively in partnership with stakeholders Good written and oral communication skills, and computer literacy. Relevant qualification, e.g. NVQ 2 or 3 in Health & Social Care or equivalent Ability to speak one or more of the following community languages: Hindi, Gujarati, Somali, Tamil, Portuguese, British Sign Language Deadline for applications: Midnight Sunday 24th January 2021. Interviews: Wednesday 27th January 2021. All interviews will be held remotely via video conferencing. We are currently working primarily remotely and expect successful candidates to be able to work from home safely. EACH offers a 4% â€" 6% contributory pension scheme dependent on employee’s contributions and has a commitment to staff development and training. EACH is an Equal Opportunities Employer. Charity and Social Enterprise Competitive Permanent jobs in South Brent
cc/2021-04/en_middle_0086.json.gz/line10091
__label__wiki
0.920274
0.920274
john@johnstevens.gop Senator Stevens Endorsed by TQEE News / Senator Stevens Endorsed by TQEE (NASHVILLE)- Tennesseans for Quality Early Education (TQEE) announced today that they are endorsing Senator John Stevens for re-election in the 24th Senate District. Senator Stevens has served in the Tennessee Senate since 2013. Stevens, who currently serves as State Senator in District 24, which includes Benton, Carroll, Gibson, Henry, Obion and Weakley Counties, is running for re-election. Stevens won the support of TQEEPAC for his outstanding voting record supporting children and families. “Senator Stevens has been an outspoken champion of children and families in our state,” said TQEEPAC Director, Mike Carpenter. “As state senator, he has helped to craft and support budgets that prioritize early literacy, teacher professional development, high-quality pre-k, and evidence-based home visiting. Senator Stevens is a proven voice for Tennessee’s children.” Sen. Stevens Reappointed Vice-Chairman of Senate Finance, Ways and Means Committee Senator Stevens Announces Library Technology Grants Senator Stevens Announces Over $4.5 million in Grants Senator Stevens Endorsed by the NFIB Tennessee PAC © 2019. Paid for by John Stevens for Senate. Tracey Fielder, Treasurer. Proudly Made in Tennessee by 1796 Media.
cc/2021-04/en_middle_0086.json.gz/line10094
__label__cc
0.507476
0.492524
2. Previous work and background 3. Data and methodology a. GCM: HadCM3 b. Reanalysis: ERA-40 c. Method a. HadCM3: 545-yr control run b. HadCM3: Shorter periods c. ERA-40 Andreadis, K., , and D. Lettenmaier, 2006: Assimilating remotely sensed snow observations into a macroscale hydrology model. Adv. Water Resour., 29 , 872–886. Andreadis, K., and D. Lettenmaier, 2006: Assimilating remotely sensed snow observations into a macroscale hydrology model. Adv. Water Resour., 29, 872–886.)| false Armstrong, R., , M. Brodzik, , J. Wang, , M. Savoie, , O. Frauenfeld, , and T. Zhang, 2004: Solutions to the snow cover mapping anomaly over the Tibetan plateau (poster). Eos, Trans. Amer. Geophys. Union, 85 .(Fall Meeting Suppl.). Abstract C31A-0282. Armstrong, R., M. Brodzik, J. Wang, M. Savoie, O. Frauenfeld, and T. Zhang, 2004: Solutions to the snow cover mapping anomaly over the Tibetan plateau (poster). Eos, Trans. Amer. Geophys. Union, 85.(Fall Meeting Suppl.). Abstract C31A-0282.)| false Blanford, H., 1884: On the connection of the Himalaya snowfall with dry winds and seasons of drought in India. Proc. Roy. Soc. London, 37 , 3–22. Blanford, H., 1884: On the connection of the Himalaya snowfall with dry winds and seasons of drought in India. Proc. Roy. Soc. London, 37, 3–22.)| false Brasnett, B., 1999: A global analysis of snow depth for numerical weather prediction. J. Appl. Meteor., 38 , 726–740. Brasnett, B., 1999: A global analysis of snow depth for numerical weather prediction. J. Appl. Meteor., 38, 726–740.)| false Brown, R., , and A. Frei, 2007: Comment on “Evaluation of surface albedo and snow cover in AR4 coupled models” by A. Roesch. J. Geophys. Res., 112 , D22102. doi:10.1029/2006JD008. Brown, R., and A. Frei, 2007: Comment on “Evaluation of surface albedo and snow cover in AR4 coupled models” by A. Roesch. J. Geophys. Res., 112, D22102. doi:10.1029/2006JD008.)| false Brown, R., , and P. Mote, 2009: The response of Northern Hemisphere snow cover to a changing climate. J. Climate, 22 , 2124–2145. Brown, R., and P. Mote, 2009: The response of Northern Hemisphere snow cover to a changing climate. J. Climate, 22, 2124–2145.)| false Brown, R., , B. Brasnett, , and D. Robinson, 2003: Gridded North American monthly snow depth and snow water equivalent for GCM evaluation. Atmos.–Ocean, 41 , 1–14. Brown, R., B. Brasnett, and D. Robinson, 2003: Gridded North American monthly snow depth and snow water equivalent for GCM evaluation. Atmos.–Ocean, 41, 1–14.)| false Clark, M., , M. Serreze, , and G. McCabe, 2001: Historical effects of El Niño and La Niña events on the seasonal evolution of the montane snowpack in the Columbia and Colorado river basins. Water Resour. Res., 37 , 741–757. Clark, M., M. Serreze, and G. McCabe, 2001: Historical effects of El Niño and La Niña events on the seasonal evolution of the montane snowpack in the Columbia and Colorado river basins. Water Resour. Res., 37, 741–757.)| false Cohen, J., , and D. Entekhabi, 1999: Eurasian snow cover variability and Northern Hemisphere climate predictability. Geophys. Res. Lett., 26 , 345–348. Cohen, J., and D. Entekhabi, 1999: Eurasian snow cover variability and Northern Hemisphere climate predictability. Geophys. Res. Lett., 26, 345–348.)| false Cohen, J., , M. Barlow, , P. Kushner, , and K. Saito, 2007: Stratosphere–troposphere coupling and links with Eurasian land surface variability. J. Climate, 20 , 5335–5343. Cohen, J., M. Barlow, P. Kushner, and K. Saito, 2007: Stratosphere–troposphere coupling and links with Eurasian land surface variability. J. Climate, 20, 5335–5343.)| false Collins, M., , S. Tett, , and C. Cooper, 2001: The internal climate variability of HadCM3, a version of the Hadley Centre coupled model without flux adjustments. Climate Dyn., 17 , 61–81. Collins, M., S. Tett, and C. Cooper, 2001: The internal climate variability of HadCM3, a version of the Hadley Centre coupled model without flux adjustments. Climate Dyn., 17, 61–81.)| false Covey, C., , K. AchutaRao, , U. Cubasch, , P. Jones, , S. Lambert, , M. Mann, , T. Phillips, , and K. Taylor, 2003: An overview of results from the Coupled Model Intercomparison Project (CMIP). Global Planet. Change, 37 , 103–133. Covey, C., K. AchutaRao, U. Cubasch, P. Jones, S. Lambert, M. Mann, T. Phillips, and K. Taylor, 2003: An overview of results from the Coupled Model Intercomparison Project (CMIP). Global Planet. Change, 37, 103–133.)| false Cox, P., , R. Betts, , C. Bunton, , R. Essery, , P. Rowntree, , and J. Smith, 1999: The impact of new land surface physics on the GCM simulation of climate and climate sensitivity. Climate Dyn., 15 , 183–203. Cox, P., R. Betts, C. Bunton, R. Essery, P. Rowntree, and J. Smith, 1999: The impact of new land surface physics on the GCM simulation of climate and climate sensitivity. Climate Dyn., 15, 183–203.)| false Crossley, J., , J. Polcher, , P. Cox, , N. Gedney, , and S. Planton, 2000: Uncertainties linked to land-surface processes in climate change simulations. Climate Dyn., 16 , 949–961. Crossley, J., J. Polcher, P. Cox, N. Gedney, and S. Planton, 2000: Uncertainties linked to land-surface processes in climate change simulations. Climate Dyn., 16, 949–961.)| false Dai, A., , I. Fung, , and A. Del Genio, 1997: Surface observed global land precipitation variations during 1900–88. J. Climate, 10 , 2943–2962. Dai, A., I. Fung, and A. Del Genio, 1997: Surface observed global land precipitation variations during 1900–88. J. Climate, 10, 2943–2962.)| false Derksen, C., 2008: The contribution of AMSR-E 18.7 and 10.7 GHz measurements to improved boreal forest snow water equivalent retrievals. Remote Sens. Environ., 112 , 2701–2710. Derksen, C., 2008: The contribution of AMSR-E 18.7 and 10.7 GHz measurements to improved boreal forest snow water equivalent retrievals. Remote Sens. Environ., 112, 2701–2710.)| false Foster, D., , and R. Davy, 1988: Global snow depth climatology. USAF Publ. USAFETAC/TN-88/006, U.S. Air Force Environmental Technical Applications Center, Scott Air Force Base, IL, 48 pp. Foster, D., and R. Davy, 1988: Global snow depth climatology. USAF Publ. USAFETAC/TN-88/006, U.S. Air Force Environmental Technical Applications Center, Scott Air Force Base, IL, 48 pp.)| false Foster, J., and Coauthors, 1996: Snow cover and snow mass intercomparisons of general circulation models and remotely sensed datasets. J. Climate, 9 , 409–426. Foster, J., and Coauthors, 1996: Snow cover and snow mass intercomparisons of general circulation models and remotely sensed datasets. J. Climate, 9, 409–426.)| false Gong, G., , J. Cohen, , D. Entekhabi, , and Y. Ge, 2007: Hemispheric-scale climate response to Northern Eurasia land surface characteristics and snow anomalies. Global Planet. Change, 56 , 359–370. Gong, G., J. Cohen, D. Entekhabi, and Y. Ge, 2007: Hemispheric-scale climate response to Northern Eurasia land surface characteristics and snow anomalies. Global Planet. Change, 56, 359–370.)| false Gordon, C., , C. Cooper, , C. Senior, , H. Banks, , J. Gregory, , T. Johns, , J. Mitchell, , and R. Wood, 2000: The simulation of SST, sea ice extents, and ocean heat transports in a version of the Hadley Centre coupled model without flux adjustments. Climate Dyn., 16 , 147–168. Gordon, C., C. Cooper, C. Senior, H. Banks, J. Gregory, T. Johns, J. Mitchell, and R. Wood, 2000: The simulation of SST, sea ice extents, and ocean heat transports in a version of the Hadley Centre coupled model without flux adjustments. Climate Dyn., 16, 147–168.)| false Guilyardi, E., 2006: El Niño-mean state-seasonal cycle interactions in a multi-model ensemble. Climate Dyn., 26 , 329–348. Guilyardi, E., 2006: El Niño-mean state-seasonal cycle interactions in a multi-model ensemble. Climate Dyn., 26, 329–348.)| false Guilyardi, E., and Coauthors, 2004: Representing El Niño in coupled ocean–atmosphere GCMs: The dominant role of the atmospheric component. J. Climate, 17 , 4623–4629. Guilyardi, E., and Coauthors, 2004: Representing El Niño in coupled ocean–atmosphere GCMs: The dominant role of the atmospheric component. J. Climate, 17, 4623–4629.)| false Hahn, D., , and J. Shukla, 1976: An apparent relationship between Eurasian snow cover and Indian monsoon rainfall. J. Atmos. Sci., 33 , 2461–2462. Hahn, D., and J. Shukla, 1976: An apparent relationship between Eurasian snow cover and Indian monsoon rainfall. J. Atmos. Sci., 33, 2461–2462.)| false Jin, J., , N. Miller, , S. Sorooshian, , and X. Gao, 2006: Relationship between atmospheric circulation and snowpack in the western USA. Hydrol. Processes, 20 , 753–767. Jin, J., N. Miller, S. Sorooshian, and X. Gao, 2006: Relationship between atmospheric circulation and snowpack in the western USA. Hydrol. Processes, 20, 753–767.)| false Latif, M., and Coauthors, 1998: A review of the predictability and prediction of ENSO. J. Geophys. Res., 103 , 14375–14393. Latif, M., and Coauthors, 1998: A review of the predictability and prediction of ENSO. J. Geophys. Res., 103, 14375–14393.)| false Lau, N., , and M. Nath, 2000: Impact of ENSO on the variability of the Asian–Australian monsoons as simulated in GCM experiments. J. Climate, 13 , 4287–4309. Lau, N., and M. Nath, 2000: Impact of ENSO on the variability of the Asian–Australian monsoons as simulated in GCM experiments. J. Climate, 13, 4287–4309.)| false Leathers, D., , and D. Robinson, 1993: The association between extremes in North American snow cover extent and U.S. temperatures. J. Climate, 6 , 1345–1355. Leathers, D., and D. Robinson, 1993: The association between extremes in North American snow cover extent and U.S. temperatures. J. Climate, 6, 1345–1355.)| false Mariotti, A., 2007: How ENSO impacts precipitation in southwest central Asia. Geophys. Res. Lett., 34 , L16706. doi:10.1029/2007GL030078. Mariotti, A., 2007: How ENSO impacts precipitation in southwest central Asia. Geophys. Res. Lett., 34, L16706. doi:10.1029/2007GL030078.)| false Putt, D., 2008: Northern Hemisphere snow: Measurement, modelling and predictability. Ph.D. thesis, University of Reading, 176 pp. Robock, A., , M. Mu, , K. Vinnikov, , and D. Robinson, 2003: Land surface conditions over Eurasia and Indian summer monsoon rainfall. J. Geophys. Res., 108 , 4131. doi:10.1029/2002JD002286. Robock, A., M. Mu, K. Vinnikov, and D. Robinson, 2003: Land surface conditions over Eurasia and Indian summer monsoon rainfall. J. Geophys. Res., 108, 4131. doi:10.1029/2002JD002286.)| false Ropelewski, C., , and M. Halpert, 1987: Global and regional scale precipitation patterns associated with the El Niño/Southern Oscillation. Mon. Wea. Rev., 115 , 1606–1626. Ropelewski, C., and M. Halpert, 1987: Global and regional scale precipitation patterns associated with the El Niño/Southern Oscillation. Mon. Wea. Rev., 115, 1606–1626.)| false Ropelewski, C., , and M. Bell, 2008: Shifts in the statistics of daily rainfall in South America conditional on ENSO phase. J. Climate, 21 , 849–865. Ropelewski, C., and M. Bell, 2008: Shifts in the statistics of daily rainfall in South America conditional on ENSO phase. J. Climate, 21, 849–865.)| false Shaman, J., , and E. Tziperman, 2005: The effect of ENSO on Tibetan Plateau snow depth: A stationary wave teleconnection mechanism and implications for the South Asian monsoons. J. Climate, 18 , 2067–2079. Shaman, J., and E. Tziperman, 2005: The effect of ENSO on Tibetan Plateau snow depth: A stationary wave teleconnection mechanism and implications for the South Asian monsoons. J. Climate, 18, 2067–2079.)| false Slingo, J., and Coauthors, 2003: How good is the Hadley Centre climate model? Research at CGAM in identifying and understanding model systematic errors: 1999–2002. Hadley Centre Tech. Note 67, 63 pp. Slingo, J., and Coauthors, 2003: How good is the Hadley Centre climate model? Research at CGAM in identifying and understanding model systematic errors: 1999–2002. Hadley Centre Tech. Note 67, 63 pp.)| false Smirnov, N., 1948: Table for estimating the goodness of fit of empirical distributions. Ann. Math. Stat., 19 , 279–281. Smirnov, N., 1948: Table for estimating the goodness of fit of empirical distributions. Ann. Math. Stat., 19, 279–281.)| false Sobolowski, S., , and A. Frei, 2007: Lagged relationships between North American snow mass and atmospheric teleconnection indices. Int. J. Climatol., 27 , 221–231. Sobolowski, S., and A. Frei, 2007: Lagged relationships between North American snow mass and atmospheric teleconnection indices. Int. J. Climatol., 27, 221–231.)| false Trenberth, K., 1997: The definition of El Niño. Bull. Amer. Meteor. Soc., 78 , 2771–2777. Trenberth, K., 1997: The definition of El Niño. Bull. Amer. Meteor. Soc., 78, 2771–2777.)| false Uppala, S., and Coauthors, 2005: The ERA-40 Re-Analysis. Quart. J. Roy. Meteor. Soc., 131 , 2961–3012. Uppala, S., and Coauthors, 2005: The ERA-40 Re-Analysis. Quart. J. Roy. Meteor. Soc., 131, 2961–3012.)| false van den Hurk, B., , P. Viterbo, , A. Beljaars, , and A. Betts, 2000: Offline validation of the ERA-40 surface scheme. Tech. Memo. 295, European Centre for Medium-Range Weather Forecasts, 43 pp. van den Hurk, B., P. Viterbo, A. Beljaars, and A. Betts, 2000: Offline validation of the ERA-40 surface scheme. Tech. Memo. 295, European Centre for Medium-Range Weather Forecasts, 43 pp.)| false Yang, Z-L., and Coauthors, 1999: Simulation of snow mass and extent in general circulation models. Hydrol. Processes, 13 , 2097–2113. Yang, Z-L., and Coauthors, 1999: Simulation of snow mass and extent in general circulation models. Hydrol. Processes, 13, 2097–2113.)| false Ye, H., 2001: Characteristics of winter precipitation variation over northern-central Eurasia and their connections to sea surface temperatures over the Atlantic and Pacific Oceans. J. Climate, 14 , 3140–3155. Ye, H., 2001: Characteristics of winter precipitation variation over northern-central Eurasia and their connections to sea surface temperatures over the Atlantic and Pacific Oceans. J. Climate, 14, 3140–3155.)| false Mean SWE anomaly time series (mm) from ERA-40 for North America (dashed) and Eurasia (solid). Anomalies are referenced to a 1958–87 ERA-40 SWE climatology. Frequency distributions (in black) of continental mean SWE for (left) Eurasia and (right) North America when ENSO is (top) positive or (bottom) negative in DJF. White bars show the frequency distribution of mean February SWE from all years. February SWE anomaly distribution (mm) from years with positive ENSO index in the previous (a) MAM, (b) JJA, (c) SON, and (d) coincident DJF. As in Fig. 3, but for years with a negative ENSO index. HadCM3 grid boxes with significantly different frequency distribution of SWE during positive and negative ENSO phases in the 545-yr control run (threshold = 95%). Significance assessed using the K–S test. HadCM3 grid boxes with significantly different SWE during positive and negative ENSO phases in the previous (a) MAM, (b) JJA, (c) SON, and (d) coincident DJF in consecutive 100-yr sections of the control run. Shading shows the number of 100-yr sections that frequency distributions at that grid box passed the K–S test (threshold = 95%). As in Fig. 6, but for consecutive 50-yr sections. February SWE anomaly distribution (mm) in ERA-40 from years with positive ENSO index in the previous (a) MAM, (b) JJA, (c) SON, and (d) coincident DJF. ERA-40 grid boxes with significantly different frequency distribution of SWE during positive and negative ENSO phases (threshold = 95%). Significance assessed using the K–S test. Effect of ENSO Phase on Large-Scale Snow Water Equivalent Distribution in a GCM Debbie Clifford 1 , Robert Gurney 1 , and Keith Haines 1 1 National Centre for Earth Observation, Reading, United Kingdom https://doi.org/10.1175/2009JCLI2993.1 Understanding links between the El Niño–Southern Oscillation (ENSO) and snow would be useful for seasonal forecasting, as well as for understanding natural variability and interpreting climate change predictions. Here, a 545-yr run of the third climate configuration of the Met Office Unified Model (HadCM3), with prescribed external forcings and fixed greenhouse gas concentrations, is used to explore the impact of ENSO on snow water equivalent (SWE) anomalies. In North America, positive ENSO events reduce the mean SWE and skew the distribution toward lower values, and vice versa during negative ENSO events. This is associated with a dipole SWE anomaly structure, with anomalies of opposite sign centered in western Canada and the central United States. In Eurasia, warm episodes lead to a more positively skewed distribution and the mean SWE is raised. Again, the opposite effect is seen during cold episodes. In Eurasia the largest anomalies are concentrated in the Himalayas. These correlations with February SWE distribution are seen to exist from the previous June–July–August (JJA) ENSO index onward, and are weakly detected in 50-yr subsections of the control run, but only a shifted North American response can be detected in the analysis of the 40-yr ECMWF Re-Analysis (ERA-40). The ENSO signal in SWE from the long run could still contribute to regional predictions, although it would only be a weak indicator. Corresponding author address: Debbie Clifford, National Centre for Earth Observation, Department of Meteorology, University of Reading, Earley Gate, P.O. Box 243, Reading RG6 6BB, United Kingdom. Email: d.j.clifford@reading.ac.uk Keywords: ENSO; Snow; General circulation models Forecasts of possible changes in land surface conditions are important both economically and politically, especially when examining impacts from climate change scenarios. It has been demonstrated that at midlatitudes, it is the land surface that dominates the uncertainty in general circulation model (GCM) responses (Crossley et al. 2000). However, the land surface has been given little attention in the context of GCMs, and observations are generally sparse. These issues were noted in the Intergovernmental Panel on Climate Change (IPCC) Fourth Assessment Report (AR4; Covey et al. 2003). Snow plays a key role in the energy balance at the land–atmosphere boundary. Knowledge of the state of the snowpack over winter is also vital in forecasting water resources and wildfire risk in many parts of the world. Snow distribution is controlled by both temperature and precipitation fields, and as such makes a challenging diagnostic for climate models (Foster et al. 1996). As an accumulated property, it also provides an integrated measurement of recent seasonal variability. Seasonal predictions of snow anomalies might be possible by exploiting knowledge of the slower-varying components of the climate system, such as the ocean. The best-documented link between ocean variability and weather is the El Niño–Southern Oscillation (ENSO). ENSO events have impacts on weather patterns across the globe, which may extend far enough to modulate the characteristics of Northern Hemisphere snow distribution. The IPCC AR4 describes how the representation of ENSO within the AR4 GCMs has improved in recent years and despite remaining biases, many of these models have been used for ENSO prediction, in particular the third climate configuration of the Met Office Unified Model (HadCM3) GCM (Covey et al. 2003). Many studies relating snow to climate indices such as ENSO have been performed from an atmospheric dynamics perspective: exploiting snow information in order to predict the behavior of the atmosphere some weeks ahead (Leathers and Robinson 1993; Cohen and Entekhabi 1999; Cohen et al. 2007; Gong et al. 2007). These feedback processes, while important in representing climate and impacts in models properly, are not the subject of this study. Here, the objective is reversed: can knowledge of ENSO phase be used to predict the state of the snowpack later in the season, or the following season? This would represent an important advance in improving the lead times for both hydrological and climate applications. Work presented here shows the effect of ENSO phase on large-scale snow distribution [in this case snow water equivalent (SWE)] in a multicentury run of the HadCM3 general circulation model. By not confining studies to a small geographic area, and instead considering the whole Northern Hemisphere, the approach also tests the strength of remote connections in the model. By using a long model run, the robustness of the statistical relationship is not limited by a small number of ENSO events. While the mechanisms involved in these remote connections are important for both forecast interpretation and model diagnosis, a full investigation of these mechanisms is outside the scope of this paper. Here we are concerned with the response of a GCM to an ENSO event, as measured using SWE. This represents the first step in identifying relationships that could be exploited for forecasting in the future. Several studies have examined snow variability in the context of ENSO activity, but these have been concentrated on the North American continent. Jin et al. (2006) showed that 18% of the variability in measured SWE data in the western United States is ENSO driven, mainly due to changes in precipitation rather than temperature patterns. Clark et al. (2001) used station data to examine the influence of ENSO events on snowpack evolution in two North American river basins. Composites of mean anomalous snow in warm and cold phases are compared, and then used to predict runoff. This approach showed that, with the inclusion of ENSO information, there was skill in predicting spring runoff even before the snow begins to accumulate in the autumn. Sobolowski and Frei (2007) detected strong negative correlations between SWE in the Great Lakes region and October–November–December (OND) ENSO phase in the North American SWE reanalysis data of Brown et al. (2003). Shaman and Tziperman (2005) find correlations between January–February–March (JFM) Pacific SSTs and coincident spring and summer snow depth anomalies from satellite data on the Tibetan Plateau (although there are concerns about the behavior of the satellite snow depth retrieval over this region; Armstrong et al. 2004). Further studies have investigated ENSO impacts on precipitation. Ropelewski and Bell (2008) examined the shift in the statistics of daily rainfall at stations in South America, with the ENSO phase. They find that useful information about the character of the rainfall season can be extracted, and they repeat the analysis using the station data in gridded form, and finally with rainfall statistics from the National Centers for Environmental Prediction–National Center for Atmospheric Research (NCEP–NCAR) reanalysis product. The gridded data reproduces many results from the station data, but not all the connections are seen when using reanalysis data. The authors attribute this discrepancy to biases in the reanalysis product. Ye (2001) shows a link between ENSO activity and Eurasian winter precipitation. Ye uses a principal components approach to detect teleconnections between variations in SSTs in the eastern Pacific and precipitation in southern-central Siberia. Global precipitation was analyzed by Dai et al. (1997) using gridded station data for the years 1900–88. The first EOF of the dataset is a pattern related to ENSO, centered over the tropics, and ENSO is also shown to be the single largest cause of global extreme precipitation events. The authors also find trends in the global data (which are consistent with model-derived responses to increasing CO2 levels) together with an increase in the elapsed time between dry events over the United States. The trends in the observed data, together with the difficulty of making accurate precipitation measurements with good spatial coverage, makes the patterns and mechanisms of interannual variability difficult to discern. Although a climate model will always be an incomplete representation of reality, a GCM becomes an important tool for generating very long datasets that can be used for investigating mechanisms of variability. Understanding the interannual and decadal variability of climate models is essential in assessing the impact of external forcing on climate, and detecting and attributing trends (Collins et al. 2001). Observations will naturally contain the effects of both this internal variability and any externally driven trend; estimation of the effect of internal variability alone can only be performed within the controlled environment of a model. Investigation of connections within the internal variability of the model should also be a good test of the model, particularly for SWE distribution which is the result of subtle interactions between different atmospheric fields. Observations of SWE at continental to hemispheric scales are only obtainable through remote sensing, and there remain many concerns about the reliability of the retrieval method (Andreadis and Lettenmaier 2006; Derksen 2008; Putt 2008). Passive microwave data was used by Yang et al. (1999) in a study of NCAR’s Coupled Climate Model, version 3 (CCM3), and the authors concluded that the GCM distribution was more reliable. For verification Yang et al. used a global snow dataset from the U.S. Air Force Environmental Technical Applications Center (Foster and Davy 1988), which used synoptic stations, literature searches, and climatological records to manually reconstruct a gridded hemispheric snow depth product. While this constitutes an independent, observation-based data source, Foster and Davy themselves acknowledge low confidence in data at high latitudes, and systematic biases have been identified by Brown and Frei (2007), which are particularly problematic over Eurasia. For this study of the whole Northern Hemisphere, a reanalysis product is used to provide an observational check on model results. While land surface data from reanalysis are generally considered less reliable than atmospheric data, there is no alternative source of global snow data with a long enough time series to cover a reasonable number of ENSO events. In this paper it is the result of atmospheric activity on snow distribution that is being tested, and while the land surface reanalysis in particular may have deficiencies, it is hoped that the atmospheric component would be driving anomalies of temperature and precipitation and hence the SWE anomalies. Section 3 details the GCM and reanalysis products to be used, and outlines the method of detecting connections between SWE distribution and ENSO. Results are presented in section 4, and further discussion and conclusions are in sections 5 and 6. The model used in this study is the general circulation model HadCM3 from the Hadley Centre (Gordon et al. 2000), chosen because of its good ENSO representation. It is a fully coupled atmosphere–ocean model, which does not require flux adjustments. The land surface physics are described in Cox et al. (1999). The atmospheric component of HadCM3 has a resolution of 3.75° longitude by 2.5° latitude, and 19 vertical levels. The ocean component has a horizontal resolution of 1.25° by 1.25° with 20 vertical levels. While this resolution is relatively low, it is large-scale patterns that are to be investigated rather than local detail. The representation of ENSO in HadCM3 is discussed in Slingo et al. (2003) and Guilyardi (2006). The latter showed that HadCM3 has an ENSO amplitude within ±20% of observations, and a good Pacific SST climatology. The response of the Indian Ocean to an ENSO event is well modeled, but an exaggerated response exists in the tropical Atlantic. The dominant ENSO frequency is also broadly correct, though there is some evidence that the model does not generate enough of a lower-frequency response (Guilyardi et al. 2004). HadCM3 is also capable of generating both modes that give rise to ENSO events as seen in observations (local SST–winds interactions in the central-east Pacific, and remote winds–thermocline feedbacks; Guilyardi 2006). The SWE climatology of HadCM3 is consistent with that of the other GCMs that took part in the third round of the Coupled Model Intercomparison Project (CMIP; Brown and Mote 2009). The authors note the difficulty in validating large-scale SWE patterns because of a lack of a reliable global SWE climatology, and choose as their reference dataset the daily snow depth analyses produced by the Canadian Meteorological Center (Brasnett 1999) over the period 2001–06, converting to SWE using a density climatology. Compared to this hemispheric product, the CMIP GCMs (all of which had similar snow climatologies) showed somewhat higher SWE values at mid- to high latitudes, and higher SWE in the Himalayas. For the CMIP GCMs, such as HadCM3, the surface temperature was shown to be modeled with some confidence, while precipitation fields were less reliable (Covey et al. 2003). To examine the internal variability of HadCM3, a multicentury “control run” has been studied. This 545-yr run includes solar and prescribed volcanic forcings, but fixed greenhouse gas forcings. This run was completed on a computing cluster, and was initialized from a spunup state from a much longer control run, to ensure the model components had reached equilibrium and there was no climatology drift. The ENSO index used in this study is the seasonal SST anomaly in the Niño-3.4 box (5°N–5°S, 170°–120°W; Trenberth 1997), with an anomaly of greater than 0.5°C denoting a positive ENSO index, and less than −0.5°C being negative. While Trenberth proposes an ENSO definition based on a 0.4°C anomaly threshold, the standard deviation of SSTs in the Niño-3.4 box in this control run is somewhat higher than the observations quoted in the Trenberth paper (1.05° as opposed to 0.77°C) and the higher threshold of 0.5°C produces roughly the same proportion of positive and negative events over the 545-yr period as in the observations. The reanalysis product used to provide observational data is the 40-yr European Centre for Medium-Range Weather Forecasts (ECMWF) Re-Analysis (ERA-40). This is a widely used second-generation reanalysis product from ECMWF (Uppala et al. 2005). ERA-40 provides global climatologies of a range of surface and atmospheric variables for 44 yr over the time period from mid-1957 to mid-2002. The land surface scheme designed for the ERA-40 project is described in van den Hurk et al. (2000) and uses an explicit snowpack layer with prognostic equations for the snow albedo and density. The scheme also assimilates observed snow data from many stations worldwide, with the greatest coverage over North America. Evaluation of the land surface scheme in snow conditions showed that the new scheme improved snow depth, snowmelt timing, and turbulent fluxes above boreal forests, with beneficial impacts on the surface Bowen ratio and the atmospheric boundary layer. Uppala et al. (2005) note that there is an error in the ERA-40 snow analysis between 1992 and 1994. Figure 1 shows the time series of anomaly SWE values in North America and Eurasia (referenced to the 1958–87 monthly climatology), which suggests that this error is actually present from 1989 onward, so all ERA-40 SWE data between 1989 and 1994 are omitted, leaving 38 yr of data for analysis. Composite February SWE anomalies are created to test whether there are lagged relationships between ENSO index and SWE distribution. February monthly averages have been chosen to be representative of the peak of the snow season, but before any melt occurs. Four separate February SWE composites are created, based on the phase of the ENSO in the four seasons leading up to, and coincident with, the February SWE anomaly, specifically whether ENSO was positive in the March–April–May (MAM), June–July–August (JJA), September–October–November (SON), or December–January–February (DJF) prior to February. As an ENSO event will last for consecutive seasons, any given February SWE anomaly can occur in several groups. Similarly, composites are formed for negative phases of ENSO. The analysis was also performed with DJF and DJFM composites of monthly anomalies and results were qualitatively the same. The precipitation study of Ropelewski and Bell (2008) used the Kolmogorov–Smirnov (K–S) test to determine whether the frequency distributions of precipitation data in positive and negative phases of ENSO were significantly different, and this approach is repeated here. The K–S test uses the maximum separation distance between the two cumulative frequency curves to determine whether the two distributions are statistically different (Smirnov 1948). The test is simple and nonparametric, though it will be applied to the anomaly difference between positive and negative ENSO phases for each grid box independently, so if positive and negative ENSO events have an impact in different regions, then an individual grid box may be less likely to pass the K–S test for significance. The aim is to show whether the distribution of snow in February can be predicted from the ENSO phase in the preceding seasons. The approach is first applied to HadCM3, where the length of the control run allows the statistics to be robust. The ERA-40 reanalysis dataset however is less than 40 yr long, so to ascertain whether any connections found between SWE and ENSO phase should be detectable in the reanalysis data, the K–S test is also used on 5 consecutive 100-yr sections and ten 50-yr sections of the GCM control run to see whether the same connections are detected in the GCM over these shorter periods. Table 1 shows the effect of ENSO episodes on the frequency distribution of continental mean February SWE during the control run. The mean, standard deviation, and skewness for each of the distributions are listed. Significant differences between the distributions following positive and negative events are highlighted in bold (significance assessed using the K–S test with a threshold of 95%). The frequency distributions themselves for the DJF case are plotted in Fig. 2. The February anomalies over North America that occur when ENSO is positive in DJF have the lowest mean, a high standard deviation, and the most positive skew, while those that occur when ENSO is negative in DJF have the highest mean, lowest standard deviation, and a negative skew (though a very low value at −0.07). Hence, the generally warmer climate in ENSO positive phases is leading to less snow over North America, but the high standard deviation and long positive tail of the distribution (as shown by the positive skew, and in Fig. 2) show that there are not consistently low snow values in every positive ENSO event: there are still many ENSO positive years with positive snow anomalies. A similar pattern is true for ENSO negative years, so while the climate is cooler and snow anomalies are generally positive, the negative skew means there are still low snow years among them. For Eurasia, the statistics are mainly the opposite to the North American case: the positive ENSO phase in DJF brings a higher mean SWE and lower standard deviation, and vice versa for the negative phase. The changes in skewness however are similar to North America: the positive phase displays a more positive skew, while the negative phase shows a negative skew. It is interesting to note this difference between the continents: the warmer climate of ENSO positive events leads to deeper snow in Eurasia. The analysis was also performed with DJF and DJFM composites of monthly anomalies and results were qualitatively the same, but less significance was seen. It also appears that the response of Eurasian snow to ENSO may be more predictable than for North America, because the skewness is in the same direction as the change in mean values: for example, with both a higher mean and more positive skew in ENSO positive years, it is likely that a year with positive ENSO index also has a positive SWE anomaly. Figure 3 shows the February SWE anomaly composites according to the ENSO index of a particular season (preceding MAM, JJA, SON, and coincident DJF, respectively). Examining first the SWE anomalies when the coincident DJF is positive (Fig. 3d), large positive anomalies are seen over the Himalayas. In North America a dipole pattern is seen, with large negative anomalies along the west coast and positive anomalies in the southern-central United States. This pattern is reproduced when considering DJF anomalies following a positive ENSO phase in SON and JJA (Figs. 3b,c, respectively), but not for positive ENSO phase in MAM (Fig. 3a). Figure 4 shows the anomaly composites for February SWE following negative ENSO phases. The spatial pattern is very similar to that for the positive ENSO phase in Fig. 3, but with the sign of the anomalies reversed. Large negative anomalies occur over the Himalayas, and there are also negative anomalies farther east in China. The dipole pattern is seen once more in North America, with opposite-signed anomalies on the west coast and central United States. The same pattern is seen whether considering ENSO phase in the coincident DJF or preceding JJA and SON (Figs. 4b–d). In this case, the pattern is still seen when ENSO was negative in the preceding MAM (Fig. 4a). To determine the significant differences in these anomaly patterns, the cumulative frequency distribution of SWE at each grid box is calculated for both positive and negative ENSO phases. These gridbox distributions are compared using the K–S test, again using a significance threshold of 95%. Figure 5 shows the K–S plot for February SWE anomalies, composited by ENSO phase in the preceding seasons (MAM, JJA, SON, and coincident DJF). The grid boxes, which have significantly different frequency distributions during opposite ENSO phases, are shaded. Figure 5d shows results for February anomalies that occur during DJF ENSO events. In North America, significant differences are found along the west coast and the southern United States, corresponding to the dipole pattern described earlier. In Eurasia, differences are seen across the Himalayas, China, and Japan. Figure 5c for SON and Fig. 5b for JJA, both show patterns very similar to DJF in Fig. 5d, with some additional significance seen in Europe. Significance is much less widespread following MAM ENSO events (Fig. 5a). The main Eurasian areas that are highlighted in Fig. 5, such as the Himalayas and parts of China, are areas of low latitude but high elevation, which could see increased snow even in a warmer ENSO positive climate if this were driving anomalously large precipitation. The shaded areas of significance generally correspond to regions that are known to be influenced by ENSO, such as western North America (Ropelewski and Halpert 1987), but also have large amounts of seasonal snow. These results suggest that if a developing ENSO event can be detected or predicted in JJA or SON, the characteristics of the snowpack in the model the following February can also be forecast, providing a lead time of several months. But are these links only apparent in a very long model run, and, if real, could they be detected in the much shorter observational datasets available? Results for the K–S tests for consecutive 100-yr sections of the control run are shown in Fig. 6. The scale shows the number of 100-yr sections (0–5) in which that grid box displayed significant differences in SWE distribution in positive and negative ENSO phases. In the coincident DJF (Fig. 6d), significance is seen in the Himalayas, China, the west coast of North America, and the southern United States. Several of the grid boxes in the Himalayas and China are significant in at least four 100-yr sections. In SON (Fig. 6c), significance is more limited across North America but grid boxes in the Himalayas and China still show significance. Figure 6b for JJA shows that significance in North America is now limited to the west coast, and in Eurasia to the Himalayas. No grid boxes show significance in more than 3 of the 100-yr sections. Little significance is seen anywhere following MAM ENSO events (Fig. 6a). Considering now the 50-yr sections (10 in total), Fig. 7d for DJF is similar to Fig. 6d, with significance in the Himalayas, China, and the southern-central United States. Few grid boxes show significance in more than eight 50-yr sections. Figure 7c for SON is similar, although more significance is seen on the west coast of North America. Following JJA ENSO events, Fig. 7b, significance is very limited over North America, but still present in the Himalayas, and farther east into China. Following MAM ENSO events Fig. 7a, significance is only seen in scattered grid boxes (which could represent the 5 grid boxes out of every 100 that are expected to pass the test by chance), and rarely for more than three 50-yr sections out of a possible 10. In conclusion, for HadCM3, the only area of the Northern Hemisphere showing a significant relationship between ENSO and SWE anomalies over any 50-yr period is the Himalayas. However, over the longer 545-yr period significant links are also present between ENSO and SWE in western and southern North America. For ERA-40 only 38 yr of data are available after removing the 1989–94 period of poor SWE values. Figures 8 and 9 show the SWE anomaly distributions in ERA-40 following positive and negative ENSO phases, respectively. While the strong response seen in the GCM results in the Himalayan region is absent in these reanalysis plots, there are some broader features that are common between the two. Comparing Figs. 8 and 9 with Figs. 3 and 4, positive (negative) ENSO leads to a band of low (high) SWE values at midlatitudes, with high (low) SWE to the north and south. The pattern is clearer across North America than Eurasia. The higher-resolution ERA-40 fields show many more localized features than the low-resolution GCM fields; the patterns across North America are generally more coherent in ERA-40 than those across Eurasia, which could reflect the greater volume of assimilated SWE data in the former. An exception is the large positive anomaly seen toward the west of the continent following negative ENSO (Fig. 9). Figure 10 shows the results of the K–S test on ERA-40 SWE anomaly composites. Overall, significance is much more scattered than for HadCM3, and significance is shifted to higher-latitude areas in both continents. February SWE anomalies coincident with DJF ENSO events show some significant response in central Asia (Fig. 10d), but there is little significance elsewhere in Eurasia or in North America. For the February SWE following SON events (Fig. 10c), significance is still present in central Asia along with the eastern Himalayas, far eastern Siberia, and a large area around the Baltic Sea. The Hudson Bay area also shows some significant grid boxes, and along the western part of the U.S.–Canada border. Scattered significant grid boxes are seen in Februaries following JJA and MAM ENSO events (Figs. 10b,a, respectively), and mainly at high latitudes. Not all the areas that show large anomalies in the anomaly composites (Figs. 8 and 9) show significance in the K–S plots (Fig. 10). This could well occur because the K–S test is applied to the (positive event–negative event) anomalies; if positive and negative ENSO events have an impact in different grid boxes, as is more likely for the high-resolution ERA-40 data compared to HadCM3, then an individual grid box may not pass the K–S test for significance. Understanding more about the effect of well-known climate modes such as ENSO on other parts of the climate system is an important step in delivering longer-term forecasts. This study has presented a simple experiment demonstrating the impact of ENSO phase on SWE distributions in runs of the general circulation model HadCM3, with additional comparisons made to ERA-40 reanalysis data. The 545-yr control run shows an impact on SWE due to ENSO, which can be broadly divided into continental-scale and more local–regional-scale responses. In North America the effect of a positive ENSO event is to reduce the mean SWE and skew the distribution slightly toward lower values, and to shift the mean higher and skew the distribution toward higher values when ENSO is negative. This is associated with a continental-scale dipole anomaly structure, with anomalies of opposite sign centered in western Canada and the central United States. This dipole structure reduces the net effect of ENSO on continental mean values. This continental-scale pattern is still detectable in the 50-yr subsections, although the strongest response at longer lead times is localized over the mountainous west coast. Some significant correlations between the ENSO phase and SWE anomalies in the Great Lakes region, as found by Sobolowski and Frei (2007), are seen in the long HadCM3 run (Figs. 5c,d), although the mean anomaly is low, and the link is not evident in the shorter subsections. Figure 10 has some shaded grid boxes showing significance in this region in the ERA-40 data. The stronger North American responses in HadCM3 are negative correlations between ENSO and SWE in western Canada, and positive correlations in the southern United States; however, weak positive correlations are seen in both these areas in the analysis of Sobolowski and Frei (2007). In Eurasia the effect of ENSO on the frequency distribution of SWE is somewhat reversed: while warm episodes still lead to a more positively skewed distribution, the mean value is raised. Again, the opposite effect is seen during cold episodes. In Eurasia the largest anomalies are found as a localized response in the Himalayas, and it is this area that dominates the effect on continental mean SWE values, shown in Table 1. The areas showing response during both positive and negative ENSO events correspond to the regions with significantly different SWE distributions found using the K–S test. These connections are robust in the 100- and 50-yr subsections. The positive correlation between Himalayan snow in HadCM3 and ENSO was not seen in ERA-40. However, a recent study by Mariotti (2007) of a combination of station data and reanalysis products finds a similar relationship between SON precipitation and ENSO in this region, driven by anomalous moisture fluxes from the Arabian Sea and tropical Africa. The strong connection in the control run between ENSO and SWE in the Himalayas is worth noting in the context of snow–Indian monsoon teleconnections that have been proposed over many decades (e.g., Blanford 1884; Hahn and Shukla 1976; Robock et al. 2003). Relationships between the Asian monsoon and ENSO variability were investigated by Lau and Nath (2000). Their analysis of GCM runs, driven by observed SSTs, show positive ENSO–winter precipitation correlations much farther east than seen in the SWE distribution in HadCM3 (Figs. 3 and 4). They compare this model output with a composite of three warm events from an observation-based precipitation product that shows anomalously wet conditions over Indochina in winter, although they detect no signals in snow depth data. If the ENSO–Asian SWE connection remains undetectable in observational datasets, care must be taken in interpreting results derived from GCMs that extend these connections to monsoon prediction. The links with February SWE distribution in the long model run are seen to exist from the previous JJA ENSO index onward. This suggests that if there is a positive or negative ENSO event occurring in JJA, characteristics of the following February SWE distribution in certain regions could be forecast, for HadCM3 at least. This would represent a long lead time to the spring runoff period (from SWE melting) for hydrological applications such as flood and wildfire forecasting. It also makes sense in terms of an ENSO event lasting several seasons, and impacting on precipitation throughout the Northern Hemisphere snow accumulation period. However, the utility of this link depends on whether the amount of variance in SWE explained by ENSO phase is high enough to be detectable in shorter time periods. The short subsections of the HadCM3 runs show some of the features seen in the long run, but the links are weaker and the lead times much shorter. When the same approach is applied to the 38 yr of the ERA-40 reanalysis product, the pattern is somewhat changed again. The broad patterns of low SWE at midlatitudes with higher SWE bands to the north and south were reproduced for positive ENSO events, and vice versa for negative ENSO events. More scattered significance was seen across both continents in ERA-40, due to the higher-resolution (potentially more noisy) data of ERA-40, and gridbox-to-gridbox method for significance testing. Stronger correlations were seen between MAM ENSO index and February SWE than in the HadCM3 control run. This limitation on seasonal prediction within model studies has been noted before for ENSO forecasting, with the lowest predictability occurring in spring (MAM; e.g., Latif et al. 1998). This “spring predictability barrier” is not well understood, and it has been suggested that it is an artifact of model simulations. The most robust responses seen in North America and Eurasia are associated with mountainous regions: the west coast and Himalayas, respectively. With a gridbox size of a few hundred kilometers, the GCM is unlikely to represent precipitation patterns faithfully in these regions. Jin et al. (2006) showed that the changes in observed SWE distribution with ENSO across the western United States were driven by precipitation rather than temperature. The significant positive anomalies seen in this study in the western United States following negative ENSO events are consistent with the patterns seen in Jin et al. (2006); however, their results for warm events indicate larger positive anomalies to the south, and smaller anomalies in the mountainous regions, than are seen here. Precipitation is less well constrained than temperature in GCMs, which could explain this discrepancy. The simple method used here has determined connections in the HadCM3 GCM between the ENSO phase and SWE in both North America and the Himalayas. While a multicentury run showed strong connections at lead times of several seasons, only local-scale connections remained over shorter time scales, and few were reproduced in the reanalysis data. Confidence in these links in the real world is limited because the signal at shorter time periods is weak, and there is a lack of suitable large-scale observational data with which to validate the results, which are predominantly in mountainous areas where GCMs are often unreliable. Using land surface fields as predictors of atmospheric variability, or vice versa as suggested here, requires confidence in both the model’s representation of climate dynamics and its land surface component. The lack of consistency between results from observation-, reanalysis-, and model-based studies, as described above, highlights the challenge of representing real-world variability and teleconnection patterns in a GCM. This work was funded by NERC e-Science Grant GCEP NE/C515820/1. Thanks are also due to Kevin Hodges for providing the ERA-40 data. We are grateful to Anthony Del Genio and two anonymous reviewers whose comments led to a much improved manuscript. Citation: Journal of Climate 22, 23; 10.1175/2009JCLI2993.1 Statistics of continental mean February SWE with ENSO index in preceding MAM, JJA, SON, and coincident DJF. Seasons with statistically significant differences between positive and negative ENSO phases are in bold. Significance was assessed using a t test with a threshold of 95%.
cc/2021-04/en_middle_0086.json.gz/line10098
__label__wiki
0.576577
0.576577
In Pictures: The first art exhibitions of the year; and boy, are they good! By David F. Rooney All of the art exhibitions at the Visual Arts Centre are excellent, but there’s something about the very first show of the year that is especially effervescent; and the three exhibitions opening on Friday really excited my imagination. Of all the works by local artists in the Members Show: Inspired by…, which open Friday, April 7, at 6 pm, there were several that touched a nerve. Sharon Kelley’s two paintings, Twilight and Peggy’s Cove, astonished me. I have watched Sharon’s work evolve over the years as she gained confidence working with paint. The piece inspired by the well-known Nova Scotia seaside resort, is a fine near-superealistic painting. I particularly liked her clouds and sky as well as the watery sheen on the beach. I don’t often get a mention as anyone’s inspiration but I hear wood carver Ken Talbot was inspired to make his Hiking Staffs No. 1 and No. 2 after he thought-up, created and inserted a wood chevron into one of my walking sticks that was too short. His idea worked marvelous and adds a graphic element to my stick, which I had carved into a snake. It works, as well for his Hiking Staffs No. 1 and No. 2. One piece that made me laugh is Diane Winingder’s Jumped by Trump. Diane has a fine eye and a wry sense of humour that she uses to good effect. This work is a wonderful piece of political satire. Margo Goodman is another local artist who uses colour and form to express herself. Bicylette is bright, clean-edged visual song about riding a bicycle in the spring time; I can almost hear the hum of the tires zipping along the River Trail. Peter Blackmore’s photo transfer piece, Father’s Skis, is a lovely little piece that says a lot about his memory of his Dad. Meanwhile, Tina Bafaro’s Canteen and Wooden Bowl are a tad different; I understand they have not been kiln fired as they are decorated with acrylic paint. They’re attractive and clever. The other piece I’d like to say something about is Kip Wiley’s Indian Paintbrush. Kip is very well known — and admired — as an imaginative, careful and highly skilled photographer. In Indian Paintbrush he blends together scores of different-coloured paintbrushes. It’s eye-popping. Ken Talbot’s Hiking Staff No. 1 and Hiking Staff No. 2 nicely underscore these two paintings by Sharon Kelley. By Peter Blackmore mixed media, encautic Father’s Skis Wooden skis with photo transfer By Tina Bafaro Clay, acrylic paint (decorative) By Margo Goodman (Inspired n George Harrison) Acrylic and molding compound Jumped by Trump By Diane Winingder By Kip Wiley There are two solo shows on display as well. Michelle Spragg’s Galaxia: Seeking Connection is an astonishing look at the starry skis above. These are hand-painted works. I emphasize that because at first glance some of them, especially Counting Stars, appear to be photographs. But, no, they’re not. As someone who is no stranger to painting the night sky I was gobsmacked by the evident patience Ms. Spragg exercised in her execution of these works. By Michelle Spragg By the Light of the Stars Then there’s Claire Paradis’ photos of natural objects, (Ut)opia. It’s easy to miss them when you’re walking in the woods but objects, like the worm-eaten and slowly decaying pieces of wood in Bright Black have an attraction and beauty all of their own. My (Ut)opia will surely remind viewers of the inherent beauty of all the things we step over, around and sometimes on. By Claire Paradis Summer’s End And finally, while it’s not a listed show, the children taking Jo C Willems’ children’s art class have taken over the Sophie Atkinson Gallery with framed drawings and a few small, geometric sculptures. Here are a few photos of what you can see if you enter the gallery. The children taking Jo C Willems’ kids’ art class have taken over the Sophie Atkinson Gallery with framed drawings and a few small, geometric sculptures. David F. Rooney photo Artistic kids with their teacher, Jo C Willems (second from the left). Peter Blackmore photo Although none of ther drawings have titles. they have a charm all their own, like this drawing of a work helmet on a box. Peter Blackmore photo The kids had a lot of fun doing this and, who knows? Perhaps one or two of them will go on to become full-time artists. Peter Blackmore photo
cc/2021-04/en_middle_0086.json.gz/line10102
__label__cc
0.661938
0.338062
Guest article: Microsoft stacking up in Legal by Allan Carton, director of Inpractice UK It’s taken Microsoft longer than hoped to get some of their products to maturity and to find the right partners to help drive them fully into the legal sector, but Microsoft is now making a determined effort to corner this market from every angle … and it will be successful, even if it doesn’t always get it right. Their stack of products, applications and services is ready to become the predominant technology in law firms in just about every respect, so it makes sense for them to invest in some landmark projects like Clifford Chance. In any event, I suspect that introducing SharePoint is just one step on a move that will see them take more and more Microsoft products and services on board. I wouldn’t bet against them becoming the dominant provider of technology to law firms of all sizes within 10 years – maybe a lot less. The very high concentration of IT in law firms makes every deal with a law firm lucrative. However, compared globally with other business sectors, the legal market is only big enough to produce the profits they need if Microsoft takes a big share of it. So that’s exactly what they will do, working with industry specialist partners. There are currently far too many suppliers of diverse products that often have to be painstakingly integrated together. Those who remain in 10 years time are likely to be Microsoft partners. Microsoft can deliver behind the scenes on infrastructure, software and services in the cloud, operating systems, SQL, reporting services, business intelligence, virtualisation, thin client, SAN technologies … and much more. Microsoft already own the lawyers’ desktop – where lawyers already live in Outlook for emails and appointments, producing documents in Word. Microsoft CRM (with a 2011 version just out) will become the standard client relationship tool because it is part of Outlook and also now affordable for smaller businesses through the cloud. SharePoint is catching on too and successful use of these two seamlessly integrated applications will make it easier for lawyers to use more Microsoft. Microsoft Foundation is now at the core of many of the more modern case management and workflow systems provided by suppliers of legal practice management systems. Lexis Nexis – a big player in the legal market on a variety of fronts, including its current industry leading CRM solution InterAction – sees the writing on the wall. It recently partnered with Microsoft to develop a legal enterprise wide business management (ERP) system built on the comprehensive Microsoft Dynamics AX (which includes Microsoft CRM), where it will work alongside Microsoft’s Business Solutions Partners on implementation. If Lexis Nexis get it right through early adopter and effective development, this integrated solution should become the preferred choice of top end firms. If not just yet, Microsoft will soon have the complete infrastructure, back and front office applications and online tools that law firms now buy from far too many different suppliers. It also has an increasingly effective network of specialist business partners capable of adapting the growing number of proven, tightly integrated and user-friendly MS applications that lawyers want; also capable of the cost-effective speed of development and deployment that leaner legal businesses now need. Sharepoint and CRM are two key applications as standalone components of the Dymamics AX ERP solution. They give major law firms an easy point of access to components of the Dynamics AX ERP solution for law firms. However, in addition to providing specific leading edge solutions in areas that should now be top of most lawyers’ priorities as the legal market goes through a transformation, they can also both be used to combine input and presentation of information from the array of other legacy systems from other suppliers that are difficult to manage. They will become obsolete when Microsoft positions itself at the core of the business, with solutions that can cater for all the key areas of operations. When selecting new systems, law firms still have to make compromises between ‘best of breed’ or ‘integrated’ solutions. Microsoft has the potential to deliver both. It is persistent and can afford to invest in the development that others can’t. To put that in perspective, the large investment in Clifford Chance enables Microsoft to develop its solution whilst still opening up its route to market; it would only do this if it is confident of its return from the sector. It looks like winners all round.
cc/2021-04/en_middle_0086.json.gz/line10104
__label__cc
0.736965
0.263035
Home » ECSSeed ECSSeed ECSSEED SOFTWARE License (You must read and accept the license above before downloading software) Please read attentively the provisions of this Licence before downloading the SOFTWARE. The use of the SOFTWARE by the Licensee means the latter has agreed with the provisions of this Licence. The SOFTWARE as described thereof, property of the CNES and named ECSSEED v.2.0.1.0 has been registered at the Agence pour la Protection des Programmes (119 rue de Flandres, 75019 Paris) on 2016/07/19 under the number IDDN.FR.001.060017.001.R.P.2015.000.10800, lot 1613. On the SOFTWARE, CNES concedes to the Licensee, who can be a physical or a moral person, a non exclusive free Licence. ECSSEED v.2.0.1.0 SOFTWARE uses the two following libraries : - Dotnetzip v.1.9.1.8, copyright © Dino Chiesa 2006-2011 (Microsoft Public Licence) ; - PDFSharp v.1.32, copyright © Dino Chiesa and Microsoft Corporation (MIT Licence). LANGUAGE OF THE LICENCE AND APPLICABLE LAW The Licence is established in French and English. In the case of a dispute, the French version is the one that prevails. This Licence is governed by French law. If any dispute should arise, litigation shall be brought before the applicable courts. DURATION OF THE LICENCE The Licence shall last for five (5) years recoverable by express renewal. The present Licence is granted for worldwide. However, due to the sensitive nature of any product originating from the space sector, the Licensee agrees imperatively to strictly respect French legislation relating to export licences. RIGHTS CONCEDED On the SOFTWARE, furnished in executable code with its documentation, CNES concedes to the Licensee a non exclusive right to use the SOFTWARE free of charge. This non exclusive right to use the SOFTWARE is defined as the implementation of the program with the view to acquiring asked operation. CNES concedes to the Licensee a non exclusive right to grant sub licences free of charge. The licensee is not authorized to make copies of the SOFTWARE, other than a backup if it is necessary to preserve the use of the SOFTWARE LICENSEE'S OBLIGATIONS The rights thereof conceded are submitted to several conditions: - The Licensee promises to abstain from any commercial use of the SOFTWARE. - The Licensee has no right to adapt, to transform, to modify or to translate the SOFTWARE. - On each copy of the SOFTWARE must be maintained the mention of the Licence and the copyright CNES. In case of publications, communications or presentations, the Licensee promises to mention CNES (Centre National d’Etudes Spatiales). - The Licensee must not use the SOFTWARE in a detrimental way for the image of the CNES, especially to its scientific and technical reputation. - The Licensee promises to enforce all provisions of this License to its sub-licensees. If the Licensee would not respect all these conditions, he would immediately become a counterfeiter and could be sued for counterfeit. The Licensee uses the SOFTWARE as it is provided herein at his own expense, risks, without any guarantee from CNES. Any guarantee of any kind such as a guarantee against counterfeit is here excluded. CNES can not guarantee the SOFTWARE is exempt from bugs, errors, defects or omissions and has no obligation of correcting any anomalies of any kind nor any deficiencies of the SOFTWARE. CNES can not guarantee that the SOFTWARE corresponds to the Licensee's needs. In the same way, the CNES is not responsible for any loss of profit or revenue, or data, or any direct or vicarious damage, which could come from the use of the SOFTWARE or the inability to use the SOFTWARE. The Licensee accepts CNES can not be sued about this. If the Licensee doesn't respect agreement's provisions, without prejudice to all damages on CNES’s behalf, this license ends immediately. In that case, the Licensee will send back the SOFTWARE and all its copies to CNES and the Licensee will not be able to ask for any kind of compensation. If you click now on "Download", this means that you accept all the conditions of this license. 4A/OP C'KOUASUM CCSDS-PAIS MAGLIB OSOAA PROPA RBSDYN VHDLTOOL
cc/2021-04/en_middle_0086.json.gz/line10114
__label__cc
0.738193
0.261807
Septic Tank Restoration Leach Line Hydro-Jetting Septic Tank Installation Septic Conversions Septic Tank Location Septic System Inspection Septic Certification Concrete/Masonry Septic Repair Septic Pumping Excavation/Grading Geotech Analysis Los Angeles Leach Line Hydro-Jetting For immediate septic tank pumping service call 800-606-3880 Los Angeles Septic Tank Pumping Service Gallery Hydro-jetting is one of the best ways (without fully replacing, of course) to bring your leach lines and drains back to near original function. Regular leach line hydro-jetting is a great and cost effective way to maintain and restore the health of your septic system; clogged lines and drains will very quickly lead to a failing system. Free Bid Proposal We offer a free bid proposal and/or design consultation for your leach line hydro-jetting service needs. Please also feel free to browse any of our other websites exploring the various divisions of Prieto Engineering and look into some of the services we can provide for you. Thank you for the opportunity to earn your business. As a Los Angeles septic tank pumping co we provide septic service to residential and commercial clients with septic tanks in Los Angeles county (please inquire about your area today if not listed below): Agoura Hills, Agua Dulce, Alhambra, Altadena, Arcadia, Arleta, Artesia, Baldwin Hills, Bel Air, Bell Canyon, Bell Gardens, Bellflower, Belmont Shore, Beverly Hills, Bixby Knolls, Brentwood, Burbank, Calabasas, Canoga Park, Century City, Chatsworth, Cheviot Hills, City of Industry, Commerce, Culver City, Downtown Los Angeles, Eagle Rock, Echo Park, El Segundo, Encino, Gardena, Glassell Park, Glendale, Granada Hills, Hancock Park, Harbor City, Hawthorne, Highland Park, Hollywood, Hollywood Hills, Holmby Hills, Huntington Park, Koreatown, La Cañada, La Crescenta, La Mirada, Little Tokyo, Long Beach, Los Angeles, Los Feliz, Malibu, Malibu Lake, Manhattan Beach, Marina del Rey, Mar Vista, Mission Hills, Monrovia, Monterey Park, Montrose, Mount Washington, North Hills, North Hollywood, Northridge, Norwalk, Pacific Palisades, Palms, Palos Verdes Estates, Palos Verdes Peninsula, Paramout, Pasadena, Rancho Palos Verdes, Redondo Beach, Rolling Hills Estates, San Fernando, Sanford, San Marino, San Pedro, Santa Clarita, Santa Fe Springs, Santa Monica, Sepulveda, Sherman Oaks, Silverlake, South Pasadena, Studio City, Sunland, Sun Valley, Sylmar, Tarzana, Thousand Oaks, Toluca Lake, Topanga, Torrance, Tujunga, Universal City, Van Nuys, Valencia, Venice, Venice Beach, Vernon, West Adams, Westchester, West Hills, West Hollywood, Westlake, West Los Angeles, Westwood, Whittier, Windsor Hills, Woodland Hills Copyright 2014. Prieto Engineering Admin. All rights reserved.
cc/2021-04/en_middle_0086.json.gz/line10116
__label__cc
0.719623
0.280377
Absalom, Absalom Faulkner’s dizzying style of talking around and about and underneath a subject makes it a slow march to the end of the story. However, I’m hanging on to the end, halfway through and trudging onward. This kind of writing is good for the brain; I need to be slowed in my consumption of words and Faulkner throws up roadblocks that have me reading and re-reading paragraphs. The story so far, as told from various perspectives (Quentin, his dad Mr. Compson, Miss Rosa, college-pal Shreve) is the Civil War-era family tragedy of Sutpen (the demon), his wife Ellen, her sister Miss Rosa (who marries Sutpen when Ellen dies? I can’t quite figure out that narrative thread), the daughter Judith & son Henry who kills Judith’s finance Charles Bon because Bon is already married to an “octoroon” (1/8th black blood) with a son in New Orleans. Clytie is Sutpen’s other daughter, sired by a black mother, who shadows Judith to the end of her days. Bon’s son appears white, but he rejects his white blood and courts a black wife, causing all sorts of chaos by being the white man in the black hangouts. There is much discussion on female nature– how women rise up for occasions like death, are capable of handling pain beyond imagine. “They lead beautiful lives–women. Lives not only divorced from, but irrevocably excommunicated from, all reality. That’s why although their deaths… are of no importance to them… yet to them their funerals and graves… are of incalcuable importance.” (p156) I’m also intrigued by the idea that Bon & Henry had the closer, more passionate, connection, and used Judith as the safe vessel through which to consummate that relationship. I am constantly confused by who the narrator is– I don’t know if that Faulkner’s intended effect, but it’s a whirl of narration and words words words and it slips very easily between Mr. Compson (who I have no idea what his relation to the story is) and Shreve and Miss Rosa. Quentin does no narration, but is simply the listener, the recipient of the story who will later transcribe it? *** Update– Quentin is now narrating the story of Sutpen’s youth, coming down from the mountains of West Virginia to the flatlands of the South, seeing blacks for the first time, as slaves who were better fed and clothed than his free family. Faulkner dives headfirst into racial interactions: “But you did not want to, because they (the niggers) were not it, not what you wanted to hit; that when you hit them you would just be hitting a child’s toy balloon with a face painted on it, a face slick and smooth and distended and about to burst into laughing and so you did not dare strike it because it would merely burst and you would rather let it walk on out of your sight than to have stood there in the loud laughing.” p 186 *** Finished, finally. Not the most pleasing reading experience, but the dizzying, sultry atmosphere of the South comes through his words and drives you to gasp for breath and push onward. Bizarre interactions between Shreve and Quentin– how was the Canadian Shreve able to tell the story better than hometown boy Quentin? “That was why it did not matter to either of them which one did the talking, since it was not the talking alone which did it, performed and accomplished the overpassing, but some happy marriage of speaking and hearing wherein each before the demand, the requirement, forgave condoned and forgot the faulting of the other…” The story took a twist in the 2nd half– the reason for Bon not being able to marry Judith was actually due to the fact that Bon’s father was Sutpen (from his first wife). Faulkner provides a genealogy of the characters at the end, wherein he has Quentin die in Cambridge, MA in 1910, the same year that Shreve & he are telling this story. But no other details about Q’s death. The last lines of the text have Q reiterating that he doesn’t hate the South, “I don’t. I don’t! I don’t hate it! I don’t hate it!” auth=Faulkner, William pub=1936 Author lzPosted on August 31, 2006 March 26, 2016 Categories Reading Archive Previous Previous post: Why does this make me nauseous? (Books for women) Next Next post: Ask The Dust
cc/2021-04/en_middle_0086.json.gz/line10118
__label__wiki
0.93541
0.93541
Real Life “Guardians” Of The Galaxy Announced With US Space Force The United States now has its own "Guardians of the Galaxy." No, not the type with characters such as Groot or Rocket Racoon, but those military members of the one-year-old US Space Force. Vice President Pence made the official announcement Dutch Man Killed By Polar Bear in Norway -- Is Climate Change to Blame? A polar bear has killed a 38-year-old Dutch national at a campsite in the Norwegian Arctic Svalbard islands early on Friday, local authorities said, adding that it is the first such deadly incident since 2011. The bear attacked the man in Germany to Require Dog Owners to Walk Pets Twice a Day -- Is It Too Paternalistic? German Minister of Food and Agriculture Julia Klockner proposed new legislation last week to require dog owners to take their furry friends twice a day. "Pets are not cuddly toys, and their needs shall also be also taken into account," Klockner Putin's Opponent In Coma After Alleged Poisoning -- Is Kremlin to Be Blamed? Russian opposition leader Alexei Navalny is in intensive care after a suspected poisoning, his spokeswoman Kira Yarmysh said in a series of tweets on Thursday. Navalny, 44, started feeling sick while on a return flight to Moscow from the Siberian city Russia Started Producing First Coronavirus Vaccine -- Is It Safe Enough? Russia has manufactured the first batch of its new vaccine for Covid-19, the health ministry said on Saturday. It is called Sputnik V, named after the world's first satellite launched by the Soviet Union. The news comes days after renowned international Former Spanish King Leaves Country Amid Corruption Scandals -- Shouldn't He Stay Instead? Spain's former king, Juan Carlos I, has decided to leave the country to protect the monarchy after several corruption allegations surfaced against him. On Monday, the-scandal hit Juan Carlos announced his decision in a letter to his son and current king, Finland Deploys Coronavirus Sniffing Dogs at Airport -- Shall We Consider It Too? Finland has deployed four Covid-19 sniffer dogs at Helsinki airport in a government-funded trial to provide a cheaper and effective alternative method of testing people for the novel virus. According to Anna Hielm-Bjorkman of the University of Helsinki, a dog can UK to Fine Up to USD 13,000 for Breaking Self-Isolation Rules -- Is It Too Much? The British government will issue fines of as much as GBP 10,000 ( USD 13,000) for people who break coronavirus self-isolation rules, in an attempt to mitigate the increased number of positive cases across the country. The new rule enters into Leonardo DiCaprio's Ex-Girlfriend Sentenced To Community Service For Tax Evasion in Israel -- Does it Fit The Crime? A Tel Aviv court sentenced Israeli top model Bar Refaeli on Sunday to nine months of community service in a tax evasion case. Her mother, Zipi Refaeli, was sentenced to 16 months in prison. The trial against the once-beloved national icon Facebook In Legal Antitrust Battle With FTC—Claims Company Purchased Competitors On Wednesday, New York, along with 48 other US attorney generals, filed a lawsuit against Facebook based on antitrust claims. The filing alleged that the media giant is in violation of antitrust laws with the company's purchase competitors and eliminating Bigg Boss 14: Diandra Soares slams Rahul Vaidya over an alleged objectionable comment on women in the past KomodoHype Is Finally The PogChamp Emote For Twitch – We Have Arrived In The Future
cc/2021-04/en_middle_0086.json.gz/line10125
__label__wiki
0.923191
0.923191
Home Elizabeth Career Photo Gallery Media Video Vault Press Website Your fansite dedicated to actress Elizabeth Olsen, known for her roles in Martha Marcy May Marlene, Oldboy, Godzilla, Ingrid Goes West and as Wanda Maximoff in Marvel's Cinematic Universe. With upcoming projects including Disney+'s WandaVision, we aim to bring you the latest news & images of Elizabeth and strive to remain 100% gossip-and-paparazzi-free. Make sure to bookmark us, and check back! Visit our gallery for more! Save With Stories Elizabeth reads Adrian Simcox Does NOT Have a Horse by Marcy Campbell and Corinna Luyken, for Save the Children & No Kid Hungry’s #SaveWithStories. The fund goes out to support schools and community programs, make sure they have what they need to keep brains and bellies full now that schools have shut down due to the coronavirus (COVID-19) pandemic. Watch Lizzie #SaveWithStories Donate tiff: martha marcy may marlene TIFF (2011): “Martha Marcy May Marlene” Premiere Added: May 27, 2020 | Duration: 1:02 | Views: 37 Elizabeth Olsen speaks with The Globe & Mail at "Martha Marcy May Marlene" Premiere, during Toronto International Film Festival. Stay up-to-date on the latest news, photos and other Elizabeth related content by following us on Twitter! Follow @lizolsenorg Elizabeth made her debut as Executive Producer on Facebook Watch's television series Sorry For Your Loss, where she also starred in alongside Kelly Marie Tran, Jovan Adepo, Mamoudou Athie, and Janet McTeer. Created by Kit Steinkellner, it follows a young widow and her family as they struggle to cope with the unexpected death of her husband. The series ran for two seasons (2018-2019). My favorite part about filming anything is being a part of a crew. It makes me feel so satisfied every day and go to work and get your hands dirty and be creative with these people. And it made me feel so responsible for them. There are so many challenges with the speed of it and the unknown of it, and there are so many times you have to just say, ‘This is in my control and this is not in my control,'” she says. “It was the best learning experience.” Wanda Maximoff / Scarlet Witch news imdb photos Leigh Shaw Elizabeth first appeared in the Marvel Cinematic Universe as Wanda Maximoff/Scarlet Witch in Captain America: The Winter Soldier's post-credits scene, in 2014. Since then, she's reprised her role in four movies: Avengers: Age of Ultron, Captain America: Civil War, Avengers: Infinity War and Avengers: Endgame. Wanda's past is still a mystery, hasn't been fully explored in the Avengers films, but as reported, it will be revealed in Disney+'s web television series WandaVision. Aside from the television series, Wanda is also confirmed to appear in the movie Doctor Strange in the Multiverse of Madness. Elizabeth on Wanda's power: "She is notorious for having really bad things happen to her. She’s the ultimate survivor… Her power, I think, comes from her huge amount of empathy as well, and her ability to feel and care, and love." Elizabeth x Bobbi Brown Elizabeth joined Bobbi Brown in March 2019 as an ambassador, alongside actresses NiNi and Yara Shahidi. The trio are helping Bobbi Brown launch its brand-new Confidence Beauty campaign, featuring its 'Skin Long-Wear Weightless Foundation' and 'Intensive Skin Serum Foundation' collections. "It's incredible to be part of a brand that has been so consistent and true to its identity in an industry that's so inconsistent". L'Officiel Indonesia (October) Off Camera (Issue 160) Seyfried Haley Lu De Armas Samberg MILIOTI Featured Gif Maintained by: Neide Online since: May 29, 2020 Header by: Nicole Theme by: 6OUTLINE Contact: Contact | @lizolsenorg Visitors: / I Heart Lizzie (Olsen) / www.lizolsen.org is a non-profit fansite, made by fans for fans of Elizabeth Olsen. We are in no way affiliated with Elizabeth nor any of her family, friends and representative. We do not claim ownership of any photos in the gallery, all images are being used under Fair Copyright Law 107 and belong to their rightful owners. All other content and graphics are copyrighted to LizOlsen.org unless otherwise stated. No Copyright Infringement Intended. If you would like any media removed please contact us before taking legal action. "I believe that you are only in control of so much. So whatever you are not in control of you can’t worry about." Sway in the Morning (2019) Entertainment Weekly (2019) Bobbi Brown Cosmetics Launches Confident Beauty Campaign WandaVision: Star Elizabeth Olsen dishes details on Disney+ series Elizabeth Olsen Derives Beauty From Bereavement and Pathos From Pain Elizabeth Olsen Auditioned for Daenerys Targaryen
cc/2021-04/en_middle_0086.json.gz/line10132
__label__wiki
0.933358
0.933358
Burlington Development Sinex Picks Local Firm to Construct Burlington Town Center by Katie Jickling Katie Jickling Don Sinex Developer Don Sinex has tapped a South Burlington construction firm to head up development of the Burlington Town Center. At a press conference at the downtown mall on Wednesday, Sinex announced that PC Construction will build the $250 million project, which he hopes will break ground in the spring. He also introduced a dozen additional contractors, many of them based in and around Burlington, responsible for landscaping, parking, engineering and art projects. In front of the mall's Christmas array and a Santa Claus, Sinex highlighted the local roots of those he had picked. "Buy local — that's what I've done," he said. It's just the first step in "transforming and strengthening the local economy," he said. Sinex, the mall's owner and managing partner of Devonwood Investors, said he chose PC Construction out of a group of three construction companies vying for the job during an 18-month process. The employee-owned company has also constructed the Green Mountain Transit downtown transit center and Hotel Vermont and completed renovations in the Hilton Burlington hotel. Jay Fayette, senior vice president of PC Construction, called the project a "once-in-a-generation city revitalization." The development will include 274 new apartments, office and retail space, and will reopen two previously closed blocks of Pine and St. Paul streets. The team "bodes well for the future of the project," said Burlington Mayor Miro Weinberger, who was on hand for the announcement. Sinex said he plans to file a planning and zoning application by December 15, the first in a multistep permitting process that will include applications to the city's Development Review Board, Conservation Board and Design Advisory Board. Sinex does expect "some revisions" to the current design, which was finalized in October. Sinex also thanked voters for approving a zoning measure to allow for the project's 160-foot height. The November 8 vote, which passed by a margin of 54 to 46 percent, was a big hurdle for the development, now scheduled for completion by September 2019. Opposition still remains. In late November, project opponents filed suit against the city, alleging that the $21.8 million tax increment financing proposal, which will pay for street improvements in and around the project, was inaccurately portrayed on the ballot. "We disagree with the assertions [of the suit] and with the intent to obstruct the will of the voters," Weinberger said. The suit has not slowed down progress on the development, he added, and the city plans to file a response to the complaint by the end of the year. Burlingtonians have already given their vote of confidence to the project, he said. "I want voters to know that I take that responsibility seriously and we're working hard to ensure that all the community benefits ... are achieved," he said. Mall Company Pledges Financing for Burlington Town Center Project by Katie Jickling April 11, 2017 Not So Fast: Opposition to Appeal Burlington Town Center Permit by Katie Jickling March 14, 2017 Burlington Town Center Project Gets the Green Light Anti-Semitic Flyers Left in City Hall Cause a Stir by Mark Davis December 20, 2016 At Progressive Caucus, Knodell is Challenged — But Prevails by Katie Jickling December 12, 2016 Voters in Burlington Will Consider a Major Overhaul to Police Oversight Weinberger Knew of Burlington Police Chief’s Anonymous Twitter Account Orphanage Task Force Finds Credible Evidence of Abuse — But Not Murder Dieng Outlines Campaign Promises in Announcing Burlington Mayoral Bid After a Tough Term, Can Mayor Weinberger Again Win Reelection? Burlington Development Burlington Town Center Don Sinex Miro Weinberger PC Construction Web Only
cc/2021-04/en_middle_0086.json.gz/line10138
__label__wiki
0.785283
0.785283
About OS OS Portal OS Student Pathways Alumni + Friends Keyword Search of orgstudies Explore, Prepare, Apply The OS Student Pathway Transfer Students and Transfer Credit Curriculum Information for Prospective Students The OS Experience Prospective Students FAQs OS Honors Alumni Pathways Creative Strategy Development Human Capital and Leadership Political and Legal Arts and Innovation Positive Organizational Scholarship Healthcare and Public Health Nonprofits and Social Change Alumni Gallery OS 2020 Virtual Graduation Gerald F. Davis Leadership Committee Graduate Student Instructors Associate Dean for Business + Impact, Gilbert and Ruth Whitaker Professor of Business Administration, Professor of Management and Organizations gfdavis@umich.edu Office Information: Advisory Committee; Organizational Studies Education/Degree: Ph.D. Stanford University (Business/Organizational Behavior), 1990 Jerry Davis is the Gilbert and Ruth Whitaker Professor of Business Administration at the Ross School of Business and Professor of Sociology, The University of Michigan. Davis received his PhD from the Graduate School of Business at Stanford University. His books include Social Movements and Organization Theory (with Doug McAdam, W. Richard Scott, and Mayer N. Zald; Cambridge University Press, 2005), Organizations and Organizing: Rational, Natural, and Open System Perspectives (with W. Richard Scott; Pearson Prentice Hall, 2007), Managed By the Markets: How Finance Reshaped America (Oxford University Press, 2009), and Changing your Company from the Inside Out: A Guide for Social Intrapreneurs (with Chris White, Harvard Business Review Press, 2015). Davis has published widely in management, sociology, and finance. He is currently Editor of the Administrative Science Quarterly and Director of the Interdisciplinary Committee on Organization Studies (ICOS) at Michigan. Davis’s research is broadly concerned with corporate governance, finance and society, and new forms of organizations. Recent writings examine how ideas about corporate social responsibility have evolved to meet changes in the structures and geographic footprint of multinational corporations; whether "shareholder capitalism" is still a viable model for economic development; how income inequality in an economy is related to corporate size and structure; why theories about organizations do (or do not) progress; how architecture shapes social networks and innovation in organizations; why stock markets spread to some countries and not others; and whether there exist viable organizational alternatives to shareholder-owned corporations in the United States. His latest book is The Vanishing American Corporation: Navigating the Hazards of a New Economy (Berrett-Koehler, 2016). Ross School of Business, Sociology, Organizational Studies Faculty Homepage View Curriculum Vitae Weiser Hall, Suite 800 org.studies@umich.edu
cc/2021-04/en_middle_0086.json.gz/line10142
__label__wiki
0.503974
0.503974
Mama's Got a Plan: Maternity Care, Health Insurance, and Reproductive Justice Category Archives: maternity care by Mama Handling it Click each image to open a larger version in a new window. Miscarriage, although frequent, is little talked about. When it is, there seems to be one mandatory script, the one in which any fetal loss is treated as that of a born child. While this feeling is as valid as any other, we all experience pregnancy loss differently. This cartoon shows another viewpoint. Unless otherwise noted, all images are shared under a Creative Commons license. The title frame features an untitled photo by Erik Nielsen. Frame 2: Free Zoe Stock Photo, by Maria Paz Jimenez. Frame 3: untitled photo, by SweetMellowChill. Frame 4: pink phone image, by JESZ. Frame 5: 2096×1810 Sarah Forbes Art Napkin Sketch ~ Idolza. Frame 6: untitled photo, by jarmaluk, and Blood Clip Art, by LUIS BERMUDEZ. Frame 7: Serega (kitchen project), bySasha Kargaltsev. Photo has been flipped and cropped. Warning: original NSFW. Frame 8: Midwife Home Visit, by JCHaywire. Photo has been cropped, and a year (2003) was added to the notebook. Frame 9: Antenna Repairs, by JCHaywire. Photo has been cropped, and color was adjusted. Frame 10: Giraffe animal zoo, animals, no author listed. Frame 11: GALVESTON’S WEST BEACH ON THE GULF OF MEXICO DRAWS HUGE CROWDS–AND PROVIDES THE ENTERPRISING A CHANCE TO TURN A DOLLAR, by Blair Pittman. This photo is in the Public Domain. Frame 12: Calendar Clip Art, by OCAL. Categories: maternity care, reproductive justice | Tags: cartoons, fertility, midwifery model of care, miscarriage | Permalink. Pushed and Consented Photo by chuttersnap on Unsplash Product announcement! We are very pleased to announce that our 20-page booklet, Pushed and Consented: Rights in Childbirth?, is available for purchase on the Birth Rights Bar Association website. Click the cover image to go straight there! Cartoons with explanatory text address the question mark in the title and lay out the current legal landscape. Buy your copy today! If you would rather view the booklet online, it is available at this link. BRBA suggests making a donation if you choose view the booklet online. Categories: law, maternity care, reproductive justice | Tags: cartoons | Permalink. Catching up cartoons The following cartoons were published on Facebook before they were posted here. Without further ado … Subject-consent-object (SCO order!) The usage “consent the patient” is one that horrified us when it first came to our attention. If any verb should be an active one, “consent” is the one. “Doctor Visit” is by mohamed mohamed mahmoud hassan, shared under a Creative Commons license. We added the facial features, which were chosen from assortments provided here and here. The framed picture is courtesy a collection of fantasy landscape cartoons. Medicaid work requirement The Michigan Legislature has decided to prioritize removing health care from expanded Medicaid recipients who are not working sufficient hours. They were able to do so because the federal government urged states to apply for waivers in order to allow exactly this kind of proposal. Medicaid was not established in order to force people in need to abandon their families and work sub-subsistence-level service jobs; rather, its purpose is to provide health care for those who cannot afford to purchase it, even with the subsidies that the Affordable Care Act provides (so far!). When one of the Senators behind this bill claimed that “work improves health,” we were moved to create this cartoon. For those who require a translation for the ironwork behind the Senator: Arbeit macht Gesundheit. Michigan Governor Snyder has not yet signed the bill, which was enacted on June 7, 2018. We encourage him to veto this measure and instead throw his support behind federal proposals to institute Medicare for All. The Senator and his podium are from an image entitled “Presentation,” by Mani Amini. The audience is from a FEMA photo, in the public domain. Non-Apology So many non-apologies arrive in the passive tense, don’t they? Another cartoon in the Bureau of Apologies series. This image only suggests the offensive words issued by the doctor representing the American Birth Doctors Association (ABDO). The real-life context in which a major professional organization suggested that women control rising maternal mortality rates by using condoms (!) is described here. The doctor and his podium are both from PlusPNG.com. Categories: current events, health care, health insurance, law, maternity care, reproductive justice | Tags: ACOG, Bureau of Apologies, cartoons, grammar nerd, informed consent, Medicaid | Permalink. The HHS Office for Civil Rights Personal beliefs and denial of care Earlier this month, it emerged that tennis star Serena Williams came close to experiencing life-threatening blood clots after giving birth last fall, in part because medical staff delayed taking action after she requested treatment. More recently, President Trump announced the establishment of a Conscience and Religious Freedom Division in the HHS Office for Civil Rights. Its purpose is to expand the ability of health care providers to exercise conscience clauses. ACOG, the chief U.S. professional organization for obstetricians and gynecologists, promptly issued a press release objecting to the move, stating, “Abortion, contraception and sterilization are a part of comprehensive reproductive health care and are essential to the health of patients. Professional medical organizations have clear guidance on the issue of refusal, noting that refusals of care must not compromise patient health.” Well. All these announcements in such close proximity generated some questions in Ye Olde Cartoon Shoppe. Who is refusing care? To whom? What is their religious justification? Is it religion, or merely culture? What about having children, as opposed to not having them – are there any civil rights in play there? Sometimes you look around, and no one is behaving the way you think they should. Except, of course, Ms. Williams, who acted intelligently and forcefully under challenging circumstances. And Baby Olympia, who does not need to do anything except be herself – which she so clearly does, perfectly and adorably. Congratulations on both counts, Serena Williams! For all the other participants in these various dramas, there’s this: Click the image to open a larger version in a new window. The white-coated doctor is from Pixabay, shared under a Creative Commons license. The plant is from pluspng.com. The site does not state any terms of use, but seems to make images freely available. The photo of Serena Williams and Beautiful Baby Olympia is taken from an online video. Ms. Williams did not to our knowledge speak the exact words attributed to her in this cartoon, but we believe we have correctly represented her intentions. The distinguished fellow with the stethoscope comes from Michelangelo’s The Creation of Adam, where he appeared with more background and without the stethoscope. The work is in the Public Domain. Categories: health care, law, maternity care, reproductive justice | Tags: ACOG, cartoons | Permalink. The Fellowship and US-MERA A midquel is a “work that is set within the timeframe of a previous work, rather than before or after it.” The Fellowship of the Bill series featured an increasingly beleaguered and bedraggled band of legislative advocates journeying toward Michigan licensure for Certified Professional Midwives. In this midquel, the Fellowship encounters a Mysterious Elixir: newly emerging educational standards for midwives, as produced by a consortium of seven national midwifery groups, known collectively as US-MERA (U.S. Midwifery, Education, Regulation, Association). Three disclaimers are necessary before we proceed. First: Whether certain educational standards should be included in CPM licensure legislation is inside baseball at its most extreme. We promise we will return to topics of more general interest in our next cartoon. Second: Although Michigan’s experience with US-MERA was less than ideal, much of the chaos was a result of interweaving timelines. The education standards were being developed at exactly the same time that Michigan’s bill was proceeding through the legislature. Neither process was exactly predictable, nor did communication flow dependably between parties. Last-minute demands, confusions of meaning, and repeated shifts in focus made measured, documented decision-making quite a challenge. Third: This cartoon arises solely from the fevered imagination of Mama’s Got a Plan. It is not to be taken as a statement of history or policy by anyone who matters. As in our original Fellowship series, many liberties were taken with both Tolkien’s story and Michigan legislative history. No worries – just sit back and enjoy the ride. Categories: law, maternity care | Tags: cartoons, Certified Professional Midwife, education, fellowship of the bill, licensure, us-mera | Permalink. Michigan’s 9-part CPM licensure odyssey: part 9 The Fellowship of the Bill – Part 9 This is the final installment in the story of Michigan’s nine-year journey toward a law to license Certified Professional Midwives. The story begins HERE. The entire series can be accessed HERE. About this panel The Senate floor and House concurrence votes would have been a more striking triumph if more of the Fellowship had been awake for them (Frame 1). Eowyn’s thought bubble is an oblique tribute to this famous Far Side cartoon. Michigan’s Governor Snyder is represented here as Galadriel (Frame 2) just to give someone the opportunity to repeat the character’s famous speech: The Quest stands upon the edge of a knife. Stray but a little, and it will fail, to the ruin of all. Yet hope remains while the Company is true. Sing it, Sister! Also, “Governor Galadriel” has a nice ring to it. The time span between the passage of the bill and the Governor’s signature seemed endless (Frame 3). The Yule feast pictured in Frame 4 is not only an outright invention, but casually borrowed from a tour of New Zealand Lord of the Rings filming locations. In return, we suggest you check out tours at MikeTheGuide.com and make a point of stopping at the Green Dragon Inn near the Hobbiton Movie Set. The Governor finally signed the bill early in 2017, a cause for great celebration (Frame 4). If you know anything about Michigan, you’ll appreciate the celebration did not take place shortly following the signing, but much later in the year on another equally beautiful – and much warmer – Lake Michigan beach. Is this successful enactment of the bill the end of the Fellowship? Probably not. A portion of its membership is ensconced on the new state Board of Licensed Midwifery – portrayed here by a photo of a 1949 committee of the Florida State Prison system. A future effort to guarantee Medicaid coverage for Licensed Midwife care has also not been ruled out. For the meantime, the Fellowship is returned to its daily routines. Babies are born. Parents are created. Midwives are credentialed. Life goes on. P.S. A more detailed look at the Fellowship’s experience with US-MERA is available at I Have An Elixir to Sell You. ← Part 8 Categories: law, maternity care | Tags: cartoons, Certified Professional Midwife, fellowship of the bill, licensure | Permalink. This is the continuing story of Michigan’s nine-year journey toward a law to license Certified Professional Midwives. The first installment of the story is HERE. While Michigan was toiling towards Mordor, other states continued to enact CPM licensure measures (Frame 1). The big surprise of 2013 was Indiana, a highly punitive state whose midwives had long been forced underground. Rhode Island regularized its midwives’ legal status in 2014, followed by Maryland in 2015. In 2016, Maine became the 30th state to license CPMs. The licensure acts just listed were evaluated by the Fellowship with mixed results, but the chief worry was that Michigan would be the very last state to pass such a measure. Like the many-limbed Shelob, numerous entities and factors continued to threaten the Michigan bill (Frame 2). The medical lobby was joined in its opposition by the primary Michigan maternal and child health organization. Each Senate committee member had to be laboriously courted. Both majority and minority parties displayed their foibles, and the Fellowship hardly dared to shake its piggy bank. But the primary foe was time. Fellowship members regularly heard nightmare voices proclaiming the death of the bill. After some heavy-duty compromising, the Fellowship was pleased to see its hard work pay off. When the bill passed out of Senate committee, it nevertheless felt like a miracle (Frame 3). Boromir, not being a midwife herself, developed a belief in the persuasive power of the “Midwife Voice.” At any rate, that’s how she explained the vote – and her own surprised willingness to take on tasks following Fellowship meetings. It was late 2016. The legislative session was anticipated to end at an unnamed December date. Would the bill receive a Senate floor vote? Texts once again flew back and forth (Frame 4) between Fellowship members, Gandalf, Senate staffers, and anyone whose opinion might carry weight with Senate leadership. A failure would mean beginning all over again the following session, a prospect that filled the Fellowship – and its empty pockets – with dread. ← Part 7 • Part 9 → Many others assisted the Coalition. The Big Push (see Page 1) was particularly helpful with both collective wisdom from other states and specific strategy and legal knowledge from Susan Jenkins, Big Push steering committee member and legal advisor (Frame 1). Likewise, Ida Darragh of NARM (North American Registry of Midwives) seemed to hold every licensed state’s education and training requirements in her head (Frame 2). Other direct entry midwives were generous with their advice and questions (Frame 3). On the other hand, certain factions promised to oppose the bill no matter what, including a notorious national troll who had for years attacked midwives, home birth, physiological birth – anything that deviated from the standard medical model of care (Frames 4 and 5). Like many Jekyll-and-Hyde pontificators – or, in this case, Sméagol-and-Gollum ones – this troll typically appears with a wish to protect the safety of mothers and babies that quickly metamorphoses into vicious diatribes against midwives. The ultimate wild card, however, was a local health care provider who opposed the CPM bill on the principle that licensure constituted government interference. She herself, of course, was licensed by the state (Frame 6). She is represented here as a hairdresser, to spare her real profession from embarrassment. The pile of Petoskey Stones behind her is included as Michigan Content. A whole new game began in 2016, as the bill’s success in the House piqued the interest of opposition groups, who then prepared to crush it (Frame 1). Their messages were nothing new – worries about vicarious liability for midwife practice, even though such a circumstance was already precluded by common law; and loud concerns for the safety of mothers and babies acting as a proxy for turf wars. The Fellowship sharpened its spears for the Senate campaign. Meanwhile, however, any hope of accomplishing anything in either chamber was crowded out by the Courser-Gamrat scandal (Frame 2). Two Tea Party House members – married, but unfortunately not to each other – were discovered in a sexual relationship. That alone might not have kindled such a furore, but as per usual in the political arena, it was the failed cover-up that doomed the two lovebirds. Moral of the story: If your moral politics are those of an extreme conservative Christian legislator, any attempts to conceal your illicit affair by instructing your staff to leak a story that you are involved with a gay sex worker (!) are probably unwise. The feeding frenzy that followed culminated in the lovebirds’ ousters after a great deal of legislative process, which unfortunately occupied the Fellowship’s bill sponsor, who had the ill fortune to chair the Ethics Committee. The Fellowship and its minions continued to dog legislators’ steps (Frame 3). As midwives, Fellowship members enjoyed endless connections to more or less everyone, and were not afraid to exploit those relationships. However, the real advances were made by engaging legislative staffers, who enjoyed – or at least shouldered – the responsibility to brief their bosses on pending legislation (Frame 4). Staffers typically had more time to devote to detailed analysis of issues and, furthermore, turned out to be instrumental in shaping legislators’ opinions. Indeed, some staffers helped the Fellowship by anticipating and managing the actions of other legislators (Frame 5). “Goatleaf” here is a composite of several extraordinarily effective staffers, who helped the bill progress despite numerous eleventh hour interventions that could easily have torpedoed it. The continual contacts required to maintain support in the Legislature turned the Fellowship and the larger birth community into merciless Polyannas (Frame 1). A certain amount of weariness was occasionally discernible in staffers’ greetings upon their discovery that the voice on the other end of the phone was yet another plea to support the midwife bill. The long journey began to tell upon the Fellowship (Frame 2). Most of its members were practicing midwives, in itself a hard occupation to reconcile with family life. Responding to frequent sudden requests to appear in Lansing, formally dressed and well-spoken, made for a heavy burden, especially as progress appeared stalled, thanks to Rep. Sarumon’s refusal to schedule a committee hearing (see Part 2). However, Michigan term limits do occasionally work to the advantage of those doing Noble Work, and a double strategy ensured the bill’s safe crossing (Frame 3) to a committee hearing: First, Rep. Sarumon was termed out of the House. Poof! Second, the bill sponsor wisely arranged for it to be assigned to a different committee in the new session. The bill promptly received two hearings, at which ACOG proclaimed that the legislation did not conform to the (as-yet-undefined) US-MERA standards. Nevertheless, in November 2015, the bill passed out of committee (Frame 4). The Fellowship’s satisfaction with this success was nothing compared to the jubilation after the bill’s 79-25 (bipartisan!) vote on the House floor. Lobbyist Jean proclaimed that such a day did not come often in the life of a public affairs consultant, which explains her declared intention to commemorate the event with a tattoo on a Body Part to be Named Later (Frame 5). Any success effected by sustained exertion should be followed by celebration and repose. Unfortunately, those pleasurable activities are inevitably followed by mass thank-you note writing (Frame 6). Mama’s Bookshelf – click title for full review Mama’s Got a Plan on Facebook Mama's Got a Plan on Instagram What’s your subject? Viral flight Weed whacking abortion ACOG addiction adoption Affordable Care Act apology article bathroom biology blast from the past breastfeeding breastfeeding mothers c-sections capacity cartoons Certified Professional Midwife childcare civil justice/tort system coercion cost criminalization of pregnancy death discrimination Donald Trump elections electronic fetal monitoring employment equal rights amendment evidence basis fat fellowship of the bill fertility first lady health at every size history home birth hospitals immigration infant mortality infant sleep informed consent insurance law school licensure life maternal mortality Medicaid medical malpractice liability medicine menstruation Michigan law Michigan State University midwife licensure midwifery midwifery model of care movies Obamacare obstetrics parenting policy politics public health reading reproductive justice safety sex single payer size acceptance transgender VBAC violence wages for housework webinar World War I World War II
cc/2021-04/en_middle_0086.json.gz/line10153
__label__cc
0.722075
0.277925
Current Group Study Bible Study Menu Study Path Level 1: Running on Empty Level 2: Wake Up Level 3: On a Roll Level 4: Filling Up Level 5: Overflowing Doorposts Publishing Co. (“us”, “we”, or “our”) operates the www.mamasrefill.com website (the “Service”). We use your data to provide and improve the Service. By using the Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms and Conditions, accessible from www.mamasrefill.com ServiceService is the www.mamasrefill.com website operated by Doorposts Publishing Co. Personal DataPersonal Data means data about a living individual who can be identified from those data (or from those and other information either in our possession or likely to come into our possession). Usage DataUsage Data is data collected automatically either generated by the use of the Service or from the Service infrastructure itself (for example, the duration of a page visit). CookiesCookies are small pieces of data stored on your device (computer or mobile device). Data ControllerData Controller means the natural or legal person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal information are, or are to be, processed.For the purpose of this Privacy Policy, we are a Data Controller of your Personal Data. Data Processors (or Service Providers)Data Processor (or Service Provider) means any natural or legal person who processes the data on behalf of the Data Controller.We may use the services of various Service Providers in order to process your data more effectively. Data Subject (or User)Data Subject is any living individual who is using our Service and is the subject of Personal Data. Doorposts Publishing Co. uses the collected data for various purposes: If you are from the European Economic Area (EEA), Doorposts Publishing Co. legal basis for collecting and using the personal information described in this Privacy Policy depends on the Personal Data we collect and the specific context in which we collect it. Doorposts Publishing Co. may process your Personal Data because: The processing is in our legitimate interests and it’s not overridden by your rights Doorposts Publishing Co. will retain your Personal Data only for as long as is necessary for the purposes set out in this Privacy Policy. We will retain and use your Personal Data to the extent necessary to comply with our legal obligations (for example, if we are required to retain your data to comply with applicable laws), resolve disputes, and enforce our legal agreements and policies. Doorposts Publishing Co. will also retain Usage Data for internal analysis purposes. Usage Data is generally retained for a shorter period of time, except when this data is used to strengthen the security or to improve the functionality of our Service, or we are legally obligated to retain this data for longer time periods. Doorposts Publishing Co. will take all steps reasonably necessary to ensure that your data is treated securely and in accordance with this Privacy Policy and no transfer of your Personal Data will take place to an organization or a country unless there are adequate controls in place including the security of your data and other personal information. Under certain circumstances, Doorposts Publishing Co. may be required to disclose your Personal Data if required to do so by law or in response to valid requests by public authorities (e.g. a court or a government agency). Doorposts Publishing Co. may disclose your Personal Data in the good faith belief that such action is necessary to: To protect and defend the rights or property of Doorposts Publishing Co. “Do Not Track” Signals Under California Online Privacy Protection Act (CalOPPA) If you are a resident of the European Economic Area (EEA), you have certain data protection rights. Doorposts Publishing Co. aims to take reasonable steps to allow you to correct, amend, delete, or limit the use of your Personal Data. The right to withdraw consent. You also have the right to withdraw your consent at any time where Doorposts Publishing Co. relied on your consent to process your personal information. Google AnalyticsGoogle Analytics is a web analytics service offered by Google that tracks and reports website traffic. Google uses the data collected to track and monitor the use of our Service. This data is shared with other Google services. Google may use the collected data to contextualize and personalize the ads of its own advertising network.You can opt-out of having made your activity on the Service available to Google Analytics by installing the Google Analytics opt-out browser add-on. The add-on prevents the Google Analytics JavaScript (ga.js, analytics.js, and dc.js) from sharing information with Google Analytics about visits activity. StripeTheir Privacy Policy can be viewed at https://stripe.com/us/privacy PayPalTheir Privacy Policy can be viewed at https://www.paypal.com/webapps/mpp/ua/privacy-full By email: Service@mamasrefill.com By phone number: 888.433.4749 Mama’s Refill Shop Mama’s Refill is a ministry of Doorposts Doorposts Publishing Co. 2050 Beavercreek Rd #101-189
cc/2021-04/en_middle_0086.json.gz/line10154
__label__cc
0.511262
0.488738
NOAA's Mauna Loa Observatory in Hawaii saw a new peak in carbon dioxide levels. CO2 levels hit new peak at key observatory By Elizabeth Landau, CNN In some ways, it's just a number, but it's a big number with enormous implications. For the first time, scientists measured an average concentration of atmospheric carbon dioxide of 400 parts per million in Mauna Loa, Hawaii, where the National Oceanic and Atmospheric Administration observatory is located, on Thursday. "Most experts that really study CO2 amounts estimate that we haven't seen that amount of CO2 in our atmosphere in about 3 million years," said J. Marshall Shepherd, climate change expert and professor at the University of Georgia. In other words, modern humans have never seen carbon dioxide in these proportions before. Post by: CNN's Elizabeth Landau Filed under: Climate • On Earth When I went to school, we were taught that plants, trees used CO2 to create food for themselves. Oxygen was the byproduct. Further, if there's more CO2 available, more plants and trees will grow – and create more oxygen, until equilibrium is reached. Although it doesn't sell books or fit social engineering agendas, it's really no more complicated than that. Really! And try to tell me that a warming atmosphere of a few degrees is really so bad, as hundreds of thousands of Americans have and continue to migrate to warmer climates. julia brown110 like Troy responded I cannot believe that a single mom able to profit $5071 in four weeks on the internet. did you read this web link .......... FOX. ℂOℳ Elroy Jetson Better start taking care of mother earth, or you will be wearing breathing apparatuses in the near future. I'm telling the gals, it will mess up your makeup if you have to wear one. Just ask my mom, Jane. Kumarr Ragneesh Our curry chicken is famos worldwide. Us Indians are better than u. Wy everone hate us Indians? We're not rude you unclean smelly camel Humperdinks. Humans breath in oxygen and then emit CO2. Trees and plants then take this CO2 and change it back into oxygen. It is a wonderful cycle of nature. World governments should encourage the planting of trees and stop the deforestation if the rainforest. They also need to greatly reduce the birth rate – most especially of those from India. By limiting and hopefully decreasing the number of people from India the world will have less people emitting CO2 plus it will become a nicer friendlier place for all. Agreed. U like your argument. No single group of people, other than possibly those of Bangladesh, are more horrible than the people of India. "I like your argument". Sorry about the typing error. Irregardless, those of Indian descent are the scourge of humankind. By limiting and hopefully decreasing the population of self-centered, shallow-minded American SUV, pickup truck and luxury car drivers with college educations and no common sense or social maturity, we can reduce the worldwide production not only of CO2, but of NOX, hydrocarbons, flatulence and verbal hot air as well... Sceintist There are over 75 billion people in India breathing up all the worlds oxygen. It's a sceintific fact. I am a sceintist. I read the article again. This is scary. Cars emit alot of CO2. Maybe we should ban the further production of gasoline powered ones. Let all new cars run off of solar energy or make. The lazy masses walk. Walking has worked for thousands of years. Agreed. Our focus should be on saving planet Earth instead of wasting $ on NASA TomFoolery. Also some BB guns are powered by CO2. They need to quit using it. But if we could create a machine to split the carbon atom off the oxygen atoms then we would have more oxygen to breathe and also use the carbon for something. We need to be working on this instead of worrying about going to mars. We need to save our planet here. It may be the result of the Cub Scouts. They keep building those little CO2 powered wooden race cars for the PineWood Derby. palintwit I thought there would be less hot air now that Sarah Palin is no longer on Faux News.
cc/2021-04/en_middle_0086.json.gz/line10158
__label__cc
0.746084
0.253916
LinuxBSDos.com Tutorials/Tips 3:21 am Online casino games and Linux 10:27 am Top 5 open source projects that failed in the past decade 5:48 am What is the impact of artificial intelligence on society? 2:52 pm How to setup Surfshark’s VPN on Debian- and Ubuntu-based distributions 3:00 pm OpenIndiana Install Ubuntu 11.10 on external hard drive, with an ntfs partition at the end How to install Ubuntu 11.04 on external hard disk, showed how to install Ubuntu 11.04 on a portable USB hard drive. This tutorial, written for Ubuntu 11.10, takes it a step further by showing how to add an NTFS partition at the end of an external drive – after installing Ubuntu. It is a very simple process, but if you a new to this, and need some hand-holding doing it, this tutorial should be all you need. To start, you need to, if you have not already done so, download an installation image of Ubuntu 11.10 from here. And of course, you need an external USB drive attached to the computer that you are going to use. So, burn the image you downloaded to a CD and boot the computer from it. Note: This tutorial was written for Ubuntu 11.10, but may also be used if you want to install Ubuntu 12.04 or any other Linux distribution based on Ubuntu Desktop to an external hard drive. When the computer boots, you may start the installer prior to it booting into the Live desktop, or from the Live desktop. Click through the first few steps of the installer until you get to the step shown in the image below. Because installing Ubuntu on an external hard drive requires creating partitions manually, select the last option – Something else. Click Continue. That will bring you to the Advanced partitioning tool. If, as the case with mine, the computer you are using for this installation has only one hard disk in it, the external hard disk should be listed as /dev/sdb. And if there are any existing partitions, they will be listed below it. Delete them: Select each one and click Delete. After the delete operation, the window should look just like the one below. Time to start partitioning the external hard drive. If you are new to disk partitioning in Linux, it is recommended that you read guide to disks and disk partitions in Linux. Manual disk partitioning guide for Ubuntu 11.04 is also recommended. Though written for Ubuntu 11.04, it is also useful for Ubuntu 11.10, because the installers are the same. Related Post: How to run Unity desktop on Linux Mint 12 Objective: Create three partitions for Ubuntu. These will be for the boot partition, / (the root partition), and Swap. In the process, leave enough disk space at the end. That free space will be used to create the NTFS partition. That NTFS partition will be configured from Windows, so it helps if you have a Windows system. To start creating partitions, select the free space of sdb and click Add. The first partition will the boot partition. A disk space of 500 MB is more than enough for this partition. Ext4 is the file system, and be sure to select /boot for the mount point. Note: For this tutorial, all three partitions will be created as primary partitions, but you may use the default, which creates the first partition as primary and the rest as logical partitions. Click OK. For the second partition, which will be mounted at /, assign as much disk space as you want to use for Ubuntu. Ext4 is also the file system, though, you may use btrfs or any other supported file system. OK. For help with btrfs on Ubuntu, consider reading how to install Ubuntu 11.04 on a btrfs file system. Related Post: A beginner's guide to disks and disk partitions in Linux For the third and the last partition, for Swap, about 4 GB is good. Select “swap area” from the “Use as” dropdown menu. OK. With all the partitions created, the advanced partitioning tool window should now look like this. Note the free space under sdb. That will be used for the NTFS partition. Because the installer will want to install GRUB, the boot loader, in the MBR of the internal hard drive, sda, the next task is to select sdb, the external hard drive, from the “Device for boot loader installation” dropdown menu. After making that change to the boot loader device, the window should look like this. Click Install Now to continue with the rest of the installation. Though not required, at the step shown in the image below, you might want to enable the option to encrypt your home folder. That is the only feature of the installer that you can use to protect your data, if you lose the external drive or if it is stolen. PrevPreviousAutologin, passwordless login and controlling who can reboot and shutdown your computer in KDE NextHow to install Cinnamon 1.3.1 in Ubuntu 11.10Next Hola! Did you notice that LinuxBSDos.com no longer runs network ads? Yep, no more ads from the usual suspects that track you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal. Subscribe for updates. Trust me, no spam! 1. Attend Algorithm Conference, a top AI and ML event for 2020. 2. Reasons to use control panel for your server. 3. DHgate Computers Electronics, Cell Phones & more. Sponsored event ads Algorithm Conference July 16 - 18, 2020, Austin, Texas Explore machine learning on the edge July 16, 2020, Thompson Conference, UT Austin Mohan Kumar Sagadevan says: Can the additional Free space after completion of partition for Ubuntu be used as external storage to store files? finid says: Not external storage, since it’s still part of the internal drive, but you can create a partition from it to store files in. komodoninja says: I followed these instructions using Ubuntu 12.04 LTS on a Windows 8 (upgraded from 7) system to my external HDD. The install goes fine, but when it tries to reboot after it, it just goes to a black screen and never makes it to a menu at all, like it isn’t actually booting. I tried reformatting the external and installing Ubuntu again, but it was to no avail. I’m using the x64 version since that’s the version of windows 8 my system runs, I figured the safest bet was to stick to that, and on the download page for Ubuntu it says to use 64 for any windows 8 systems. If you can help in any way, it would be appreciated it’s most probably this bug: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/384633 Via my newsletter Linux Distributions for Hacking Experts use these Linux distributions for hacking, digital forensics, and pentesting. Online casino games and Linux Top 5 open source projects that failed in the past decade What is the impact of artificial intelligence on society? How to setup Surfshark’s VPN on Debian- and Ubuntu-based distributions OpenIndiana Putrid on How to delete GRUB files from a Boot EFI partition in Windows 10 Patrick Stephens on Dual-boot Ubuntu 14.10 and Window 8 on a Toshiba Satellite C55-A PandasOnTreadmills on How to delete GRUB files from a Boot EFI partition in Windows 10 finid on Kali Linux 1.0.7 review afridi on Kali Linux 1.0.7 review Categories Select Category Alpine alt linux android Antergos APC Artificial Intelligence BackBox BackTrack Big Data BlankOn Bodhi browsers bsd bsd news Caine CentOS Chakra Chromebook ChromeOS clearos Commentary Crypto Currency CyanogenMod Debian Deepin Deft Desktop & Server Desktops & Desktop Interfaces Devuan Docker & Container Runtimes Dual-boot Elementary OS epidemic Fedora Firewall and Router freenas FuryBSD Fusion Games GhostBSD Hardware Profiles Kademar KahelOS Kali Linux Korora Kubuntu LinHES Linux Mint Debian linux news Mageia Manjaro Matrius Mint miscellaneous Mobile & Cloud Momonga NAS/SAN NAS4Free Netrunner News & Announcements NixOS Nvidia Grid Open webOS openfiler OpenIndiana OpenMandriva OpenMediaVault openSUSE pardus pc-bsd pclinuxos Pinguy Pisi privacy and licensing ReactOS Recommended Reading Reviews Rosa Desktop sabayon SalineOS Screenshots security Semplice Siduction Software SolusOS SolydXK source-based StartOS Steam OS System/Network Admin Telephony/IP-PBX Tizen TurnKey Tutorials/Tips Ubuntu Ubuntu Server vine wifislax zentyal zenwalk Zorin OS Archives Select Month October 2020 August 2020 June 2020 April 2020 March 2020 August 2019 March 2019 February 2019 December 2018 November 2018 October 2018 September 2018 August 2018 June 2018 May 2018 April 2018 March 2018 February 2018 January 2018 December 2017 November 2017 October 2017 September 2017 August 2017 July 2017 June 2017 May 2017 April 2017 February 2017 January 2017 December 2016 November 2016 July 2016 June 2016 February 2016 January 2016 December 2015 November 2015 October 2015 September 2015 August 2015 July 2015 June 2015 April 2015 March 2015 February 2015 January 2015 December 2014 November 2014 October 2014 September 2014 August 2014 July 2014 June 2014 May 2014 April 2014 March 2014 February 2014 January 2014 December 2013 November 2013 October 2013 September 2013 August 2013 July 2013 June 2013 May 2013 April 2013 March 2013 February 2013 January 2013 December 2012 November 2012 October 2012 September 2012 August 2012 July 2012 June 2012 May 2012 April 2012 March 2012 February 2012 January 2012 December 2011 November 2011 October 2011 September 2011 August 2011 July 2011 June 2011 May 2011 April 2011 March 2011 February 2011 January 2011 December 2010 November 2010 October 2010 September 2010 August 2010 July 2010 June 2010 May 2010 April 2010 March 2010 February 2010 January 2010 December 2009 November 2009 September 2009 August 2009 March 2009 February 2009 January 2009 December 2008 November 2008 September 2008 August 2008 July 2008 June 2008 May 2008 April 2008 March 2008 February 2008 January 2008 Recommended distributions I recommended these Linux distros for your desktop Zorin OS Perfect, privacy-oriented, hacking & pentesting distros BlackArch Fedora Security Lab Whonix For that BSD or illumos desktop FuryBSD GhostBSD Archives Select Month October 2020 (1) August 2020 (1) June 2020 (1) April 2020 (1) March 2020 (21) August 2019 (1) March 2019 (4) February 2019 (2) December 2018 (3) November 2018 (2) October 2018 (2) September 2018 (1) August 2018 (3) June 2018 (3) May 2018 (3) April 2018 (5) March 2018 (5) February 2018 (2) January 2018 (2) December 2017 (3) November 2017 (1) October 2017 (19) September 2017 (1) August 2017 (4) July 2017 (5) June 2017 (14) May 2017 (10) April 2017 (5) February 2017 (1) January 2017 (26) December 2016 (34) November 2016 (20) July 2016 (8) June 2016 (10) February 2016 (11) January 2016 (1) December 2015 (37) November 2015 (35) October 2015 (26) September 2015 (29) August 2015 (4) July 2015 (12) June 2015 (5) April 2015 (6) March 2015 (9) February 2015 (18) January 2015 (7) December 2014 (14) November 2014 (14) October 2014 (26) September 2014 (20) August 2014 (4) July 2014 (17) June 2014 (16) May 2014 (30) April 2014 (3) March 2014 (3) February 2014 (14) January 2014 (33) December 2013 (37) November 2013 (32) October 2013 (17) September 2013 (17) August 2013 (20) July 2013 (26) June 2013 (17) May 2013 (15) April 2013 (1) March 2013 (26) February 2013 (22) January 2013 (20) December 2012 (13) November 2012 (22) October 2012 (11) September 2012 (20) August 2012 (14) July 2012 (18) June 2012 (18) May 2012 (20) April 2012 (24) March 2012 (23) February 2012 (18) January 2012 (20) December 2011 (12) November 2011 (18) October 2011 (9) September 2011 (10) August 2011 (4) July 2011 (9) June 2011 (14) May 2011 (19) April 2011 (10) March 2011 (2) February 2011 (9) January 2011 (4) December 2010 (11) November 2010 (20) October 2010 (12) September 2010 (11) August 2010 (3) July 2010 (6) June 2010 (9) May 2010 (8) April 2010 (8) March 2010 (11) February 2010 (15) January 2010 (11) December 2009 (8) November 2009 (8) September 2009 (5) August 2009 (3) March 2009 (6) February 2009 (2) January 2009 (1) December 2008 (7) November 2008 (10) September 2008 (1) August 2008 (2) July 2008 (5) June 2008 (3) May 2008 (1) April 2008 (3) March 2008 (2) February 2008 (14) January 2008 (8) © 2020 LinuxBSDos.com. All rights reserved. The authors of these books are confirmed to speak during Author was the first chairperson of AI for the U.S. Air Force. Author is the Director of the Center for Natural and Artificial Intelligence. Author works on AI safety as a Senior Research Scientist at Uber AI Labs. An invitation from Anastasia Marchenkova Hya, after stints as a quantum researcher at Georgia Tech Quantum Optics & Quantum Telecom Lab, and the University of Maryland Joint Quantum Institute, I’m now working on superconducting qubit quantum processors at Bleximo. I’ll be speaking during Algorithm Conference in Austin, Texas, July 16 – 18, 2020. Meet me there and let’s chat about progress and hype in quantum computing.
cc/2021-04/en_middle_0086.json.gz/line10160
__label__wiki
0.749926
0.749926
Mind the Gap, a Partnership Approach: Aboriginal and Mainstream Organisations Partnering in Sexual Health and Diversity in Rural Victoria. Mind the Gap is a rural and regional community engagement project delivered in partnership by Family Planning Victoria (FPV) and Victorian Aboriginal Community Controlled Health Organisation (VACCHO) from 2009 to 2012. The focus was on the prevention of HIV, Sexually transmissible Infections (STIs) and Blood Borne Viruses (BBVs) in Aboriginal and non-Aboriginal Gay, Lesbian, Bisexual, Transgender, Intersex and Queer (GLBTIQ) young people and their social networks. The Mind the Gap model has three arms, Sexual Health and Diversity Enterprise (SHADE), a community grants project; Q&A Emerging Young Leaders Program, an adaptive leadership program for GLBTIQ young people and the Mind the Gap social networking site to connect alumni from Q&A. These projects used community development and self-determination as the guiding principles to connect and remain engaged through the life of the project. These interconnected strategies were designed to address specific aspects of engagement and capacity building within rural Aboriginal and sexually diverse young people. Specific programs included “Deadly Sex Factor” Aboriginal talent show, Koori youth camps and a Guinness World record attempt for the most Chlamydia tests in one day. The success of the Mind the Gap project relied on engaging Aboriginal communities, with the support of VACCHO acting as ‘cultural brokers’ between FPV staff and community leaders. The FPV and VACCHO partnership developed over the three years, culminating in the signing of memorandum of understanding and on-going collaborations. Partnership development and capacity building within the participating Aboriginal Community Controlled Organisations was a key focus of the project. This presentation will focus on the outcomes of the program evaluation and showcase how these partnerships and strategies promoted an Aboriginal community led response to sexual health and diversity in rural Victoria. Speakers: Andrew Bamblett, Peter Waples-Crowe Conference: AIDS 2013, Australian Society for HIV, HIV, Viral Hepatitis and Sexual Health Medicine Areas of Interest / Categories: AIDS 2014 mwv-4438 AIDS 2014 Immune Control of the HIV reservoirs Prevalence of Sexually Transmitted Infections (STIs) and patient characteristics of older men over 60 years of age attending a public STD clinic in South Australia Background: STI prevalence is changing. With society aging, life expectancy increasing and changes in sexual practices, STIs in senior citizens are of interest from economic, health related and social burden perspectives. Few studies on STIs in older men greater than 60 years of age exist, hence, a need to obtain further information about this subpopulation. Conducting clinical audits to improve sexual health service delivery in primary health care services: Successes, challenges and lessons learnt Conducting clinical audits in the context of continuous quality improvement (CQI) programs in Aboriginal Community Controlled Health Services (ACCHS) has provided valuable information regarding what factors facilitate or create challenges to improving outcomes in sexual health service delivery. High prevalence, incidence and clearance of anal high-grade squamous intraepithelial lesions (HSIL) in homosexual men: early evidence from the Study of the Prevention of Anal Cancer (SPANC) Homosexual men are at increased risk of anal cancer. Screening and treatment of the precursor, HSIL, has been advocated by some, but screening is not recommended in widely-accepted guidelines. We aimed to describe the prevalence, incidence, and clearance rates of anal HSIL, and association with human papillomavirus (HPV) status, in a community-recruited cohort of homosexual men. Is the stage of the menstrual cycle related to chlamydia detection? We investigated the association between chlamydia detection and stage in the menstrual cycle to investigate whether chlamydia detection was higher at different stages of the cycle. Electronic medical records for women attending Melbourne Sexual Health Centre March 2011 - 31st December 2012, who were tested for chlamydia by nucleic acid amplification of high vaginal, cervical, or urinary samples, and who recorded a date of last normal menstrual period (LNMP) between 0-28 days were included in the analysis. Logistic regression was used to calculate OR (95%CI) for the association of chlamydia with menstrual cycle adjusted by demographics and behavioural variables. Unpacking Chlamydia in Victoria: Retrospective analysis of surveillance data to estimate reinfection Chlamydia is prevalent among young Australians. The latest national surveillance report (2011) shows a rate of diagnosis of 1400 per 100,000 population aged 15-29 years. In Victoria, the number of notifications in 2011 was 19,238; 81% in 15-29 year olds; however notifications continue to rise in all age groups. International evidence suggests chlamydia reinfection is responsible for a substantial burden of infections. Given the associated health risks, monitoring reinfection in the population is important to understand disease burden and evaluate interventions. We describe the rate of reinfection and time between infections in Victoria, 2004-2011. Online banner advertising: not the preferred medium for promoting a publicly funded sexual health clinic targeting men who have sex with men Based on evidence of the success of utilising online campaigns to access MSM, RPA Sexual Health, a publically funded sexual health service (PFSHS) in the inner-west of Sydney, trialled two clinic advertising campaigns over a three year period. Both campaigns were developed with community consultation, targeting MSM and were predominantly online. They were evaluated and compared to measure their success and the effectiveness of advertising a PFSHS online.
cc/2021-04/en_middle_0086.json.gz/line10163
__label__cc
0.689625
0.310375
The McCormick Arts Council (MACK) to receive $2.6M in Combined Gifts Local foundation to generously invest in Capital and Educational Fund Top Photo: (Left to right) Peter Manning, Frank McMullen, John Bracknell, Holly Bracknell, Roberta McKee, Patti McAbee, Janice Grizzard, Gail Gore (Seated) Chris McMullen, Heather McNally, John Yoder, Robin Rosenberg (Not in photo) Danielle Hutton, Elaine Chiles, Mertice Earl. Photo taken at the Belmont Inn, Abbeville on 10/21/2020 / Photo credit to Danielle Hutton MCCORMICK, SC – The McCormick Arts Council (MACK) announced a major foundation gift and development project. This milestone is a major moment in the timeline of the MACK’s service to our community and its mission to provide art, culture and education to the region. “We are very fortunate to have received an official announcement that the MACK will directly benefit from a combined charitable gift of $2.6M. This is an incredible opportunity to continue our efforts to serve our mission for the next 35 years!” ~Heather McNally, MACK Director of Programs and Development To confirm, the MACK will be receiving $1.1 million specifically for the purpose of capital improvements for The MACK Rehabilitation Project. Purpose. It is understood and agreed that the gift will be used for the following purpose or purposes: To fund the MACK Rehabilitation Project and establish a capital fund from which the annual interest earnings will be used to address the annual maintenance / capital plans and needs. To also confirm, the MACK will be receiving $1.5 million specifically for the purpose of establishing an educational fund, with an established investment committee to yield approximately $50,000 annually to continue our scholarship and investment in youth programming. Purpose. It is understood and agreed that the gift will be used for the following purpose or purposes: To establish a MACK educational fund for the purpose of providing an annual scholarship program. This scholarship program provides financial aid to graduating seniors from McCormick and Abbeville counties and will continue to reflect the donor’s intentions to develop students’ awareness in the importance of problem solving, creativity and communication. The MACK agrees to distribute $35,000 annually. Purpose. It is understood and agreed that the gift will also be invested and used for the additional following purpose or purposes: To provide annual funds to support the continued development and continuation of quality youth programming. Additional funds that are generated through investment and interest earnings will support the annual needs of the MACK’s youth programming plan. The intention is to assist local students to ensure access to quality programming and cultural opportunities. The MACK will take the responsibility to plan, manage, implement or provide partnerships to ensure artistic, cultural and educational programs are available to our youth community. The Historic Keturah Hotel was deeded to the McCormick Arts Council through approved ordinances under the leadership of our Board Chair, Bob Berry, and required the MACK to use the building “to provide art, culture and education to the extended community” and “maintain the property in good condition,” according to the title transfer from the town. This process allowed the MACK to independently proceed with the necessary steps to ensure we are able to serve as a safe, accessible, and fully functioning site for our community members and visitors. “My intentions are to give locally, providing crucial support especially in the area of students’ needs. I was fortunate for my unique opportunities, and with hard work and an ability to problem-solve, was in the position to help others.” ~ John Yoder, Yoder Rosenberg Family Foundation This gift shares the name with the Rosenberg Family of Abbeville, SC. John and Jenny shared a special relationship and were both fortunate to be able to consider their intentions to support their shared communities. These gifts will impact generations to come and we are honored, humbled, and grateful to be able to serve our community to provide accessible and affordable cultural experiences and quality programs. While this is wonderful news … these are very big announcements and we have quite a bit of work to do. These gifts are generous and will certainly positively impact our organization for generations to come, however, they are restricted for specific purposes and will be invested to allow the MACK to uphold their legal agreements with the donor. This means that we will be able to make the essential building investments and offer the annual scholarship for years to come, but we will still need to provide for our annual operating budget. Our goal is to share and celebrate this incredible gift with our members, community and various stakeholders. What a wonderful way to end a very unusual year! For additional information regarding this announcement, please contact Heather McNally or the MACK directly. Heather McNally Director of Programs & Development The McCormick Arts Council (MACK) www.mccormickarts.org mccormickarts@gmail.com (864) 602-0331 (Direct) PO Box 488 / 115 S Main Street Art changes lives! The Historic Keturah Hotel, 1984 The McCormick Arts Council at the Keturah (MACK), 2016 Photo credit to Carol Grady November 4, 2020 /by Heather McNally https://mccormickarts.org/wp-content/uploads/2020/11/john-yoder-group-photo-2020.jpg 470 1000 Heather McNally https://mccormickarts.org/wp-content/uploads/2018/03/mack-logo-web.png Heather McNally2020-11-04 17:29:432020-11-19 12:30:07The McCormick Arts Council (MACK) to receive $2.6M in Combined Gifts The MACK Artisans Guild & Gallery Shop – Relocate to Main Street in February!January 18, 2021 - 9:00 am The MACK Artisans Guild & Gallery Shop – Relocate to Main Street in February! The MACK Artisans Guild & Gallery Shop will be moving to 218 S. Main St, McCormick SC, 28935 beginning in February 2021. This relocation allows the MACK Rehabilitation Project to begin and ensures our historic site meets our accessibility, safety, and […] MACK 2021 – Looking forward …January 1, 2021 - 9:00 am MACK 2021 – Looking forward … Thank you to our community for continued support The McCormick Arts Council (MACK) wishes to thank every student, artist, member, and stakeholder. 2020 was certainly “one for the books.” As we celebrated our 35th Anniversary this past year we also survived an ongoing pandemic, took care and caution […] The McCormick Arts Council (MACK) to receive $2.6M in Combined GiftsNovember 4, 2020 - 5:29 pm The McCormick Arts Council (MACK) to receive $2.6M in Combined Gifts Local foundation to generously invest in Capital and Educational Fund MCCORMICK, SC – The McCormick Arts Council (MACK) announced a major foundation gift and development project. This milestone is a major moment in the timeline of the MACK’s service to our community and its […] MACK Membership: Keturah Club Planner Pick UpNovember 3, 2020 - 9:29 am “Shop Small Saturday” – Saturday, November 28thNovember 2, 2020 - 9:27 am “Shop Small Saturday” Saturday / November 28th / 10:00 – 4:00 Please support your local artists by taking advantage of “Shop Small Saturday ” on November 28th. This is a national campaign to encourage citizens to support small businesses in their local area. The MACK Artisans Gallery Shop participates annually. Support the MACK by Shopping Online! It is our mission is to provide art, culture, and education to the region. © McCormick Arts Council at the Keturah (MACK). All rights reserved. Powered by AJDesignCo MACK Membership: Keturah Club Planner Pick Up MACK 2021 – Looking forward …
cc/2021-04/en_middle_0086.json.gz/line10169
__label__wiki
0.674803
0.674803
Mel Priestley earthly pleasures and heavenly delights Fringe 2019 Ghost Light Podcast In-Yer-Face with StoneMarrow Theatre’s Crave This week’s interview features the cast of Crave – Alex Dawkins, Sarah Emslie and Gabriel Richardson – which is being staged as part of the Fringe Theatre’s off-season by local indie company StoneMarrow Theatre. Scroll down to listen to that. Theatre news this week included SkirtsAfire festival’s expansion across the city. Originally centered on Alberta Avenue, this year’s festival will have performances at the Westbury in Old Strathcona and Station on Jasper Avenue downtown. It has been five years since fire destroyed the Roxy Theatre on January 13, 2015. The process to rebuild is underway and you can donate to those efforts by following the link below. Some more great news from Theatre Network: they just announced a fund for the commission of new plays, in partnership with the Morris Foundation. The intent of the fund is “to support the creation of scripts focusing on work relating to mental health and/or addiction.” The first play created through this fund is Joan Upside Down by Colleen Murphy, which will be produced by Theatre Network in a future season. I saw Everybody Loves Robbie, Northern Light Theatre’s newest show, last week. Read my review here. The cast of StoneMarrow Theatre’s Crave. Clockwise from left: Gabriel Richardson, Sarah Emslie, Samantha Jeffrey and Alex Dawkins. Photo by Mat Simpson Photography. In this week’s interview I spoke to the cast (minus one) of Crave – Alex Dawkins, Sarah Emslie and Gabriel Richardson. Crave is part of Fringe Theatre’s off-season. The script was written by Sarah Kane, a UK playwright who is part of the “In-Yer-Face” theatre movement of the 90s and early 2000s. Kane’s work is notorious for having pretty extreme staged violence, which is common to plays in that movement. Crave is actually considered the calmest of her plays but when it was first staged, Kane actually used a pseudonym because her reputation preceded her and she had been blasted by critics for the violence and graphic subject of her previous works. Crave is notable because it has no stage directions and the characters aren’t named, other than being given an initial (A, B, C and M). They aren’t really described in any way, either, other than through the script. So basically other than the lines, everything is left up to the imagining of the creative team which is, in this case, local indie theatre group StoneMarrow Theatre. Helmed by Samantha Jeffery and Perry Gratton, StoneMarrow’s raison d’etre is to challenge the status quo and stage riskier material than is usually seen on Edmonton stages. With Crave, they certainly achieve this. Stay tuned for a review of this show in the coming days. For now, listen to the interview. Sarah Emslie in StoneMarrow Theatre’s production of Crave. Photo by Mat Simpson Photography. Show notes and listings: Mel’s review of Everybody Loves Robbie SkirtsAFire festival expands to three neighbourhoods in 2020 Donate to the Capital Campaign to rebuild The Roxy Theatre Morris Foundation/Theatre Network Fund for Commission of Plays Julius Caesar and A Midsummer Night’s Dream, playing as part of the Winter Shakespeare Festival, Malachite Theatre, Holy Trinity Anglican Church, until Feb 2 The Witch of Edmonton: staged reading, Winter Shakespeare Festival, Holy Trinity Anglican Church, Jan 22 Everybody Loves Robbie, Northern Light Theatre, Studio Theatre in ATB Financial Arts Barns, until Jan 25 Cost of Living, Citadel Theatre, until Feb 2 The Professors, Rapid Fire Theatre, Zeidler Hall in Citadel Theatre, until Feb 1 Crave, Fringe Theatre, Backstage Theatre in ATB Financial Arts Barns, until Jan 25 Diavolo, Alberta Ballet, Jubilee Auditorium, Jan 21 – 22 Happy Birthday Baby J, Shadow Theatre, Varscona Theatre, Jan 22 – Feb 9 Subscribe for updates on Edmonton theatre, arts and culture: Filed Under: Ghost Light Podcast, Theatre Tags: Alex Dawkins, Crave, Everybody Loves Robbie, Gabriel Richardson, In-Yer-Face, Northern Light Theatre, Perry Gratton, Samantha Jeffery, Sarah Emslie, Sarah Kane, SkirtsAfire, StoneMarrow Theatre, The Roxy Theatre, Theatre Network Review: Everybody Loves Robbie at Northern Light Theatre Visceral and vulnerable: a review of StoneMarrow Theatre’s Crave I’m a wine writer, theatre reviewer and former alt-weekly editor in my hometown of Edmonton, Alberta. I’m also an astrology student. On this site you’ll find a little bit of everything. Lately I’ve been focusing on wine and astrology. Visit the Portfolio page for some of my recent writing credits. © Mel Priestley, 2019. All rights reserved.
cc/2021-04/en_middle_0086.json.gz/line10172
__label__cc
0.743753
0.256247
Xmas Office Closure 2020 All Training for 2020 | Confirmed ICC INTERCORR | Dates Changed Darwin ACA Event | Engineers Australia Moon is rusting! Why ? Stage 4 lock-down for Melbourne impacts Course Melbourne CIP1 | Theory Only September Prof. Maria Forsyth |Eurocorr Plenary Lecturer Our Diamond Members Our Platinum Members ACA Awards ACA Corrosion Technologists ACA Corrosion Technicians Standards Australia Corrosion Control Directory Conference Site Cathodic Protection Training Coatings Training Coating Inspection Training Corrosion Specific Training Galvanizing Training Pipeline Training Read C&M Online Conference Papers Search Australian & New Zealand Standards King Tut’s Meteoric Treasure Rob Francis Friday, May 10, 2019 Of the many wonderful things that Howard Carter found in the tomb of Tutankhamun in 1922, a small iron dagger may seem insignificant compared to the numerous gold, silver, and beautifully colored objects that the Egyptian boy king is famous for. But to the corrosionist, this item is remarkable because it just may be the oldest intact iron artifact known. The iron dagger, ~340-mm long with a gold handle, was found in the sarcophagus of the ancient king, who was buried in 1320 B.C. Researchers from the University of Pisa (Pisa, Italy) and other establishments in Italy, and the Museum of Egyptian Antiquities (Cairo, Egypt) recently analyzed the blade using nondestructive x-ray fluorescence and found that the composition was of meteoritic iron with ~10% nickel and 0.6% cobalt.1. Ancient peoples used meteorite iron for various tools, weapons, and jewelry, although this dagger shows a high degree of metalworking skill and is probably the finest example of its type. Despite being buried for King Tut’s Meteoric Treasure nearly 3,300 years, the blade is in excellent condition, with only minor evidence of corrosion. The surface is not completely smooth or clean, but analysis of the surface contamination has not been reported. There are several possible causes for this surface stain. Iron meteorites are not completely metallic, and there may have been nonmetallic silicate or other inclusions. The method of iron working is unknown, but heating and forging may have embedded charcoal or other impurities in the surface. Finally, the dagger was actually in the sarcophagus next to the mummified body. Mummification involved packing the body with natron (a rock salt material) to desiccate the body, and this corrosive material along with bodily fluids may have caused some initial corrosion before complete drying took place. Any or all of these factors may be responsible for the surface defects. While ~10% nickel content somewhat reduces the corrosion rate of iron compared to mild steel, the meteoritic iron would still be expected to behave similarly to modern steels. If exposed to the atmosphere or soil, even in an environment as arid as that in Egypt, little if any of the original metal would be left. An ancient meteoric iron dagger found at Alacahöyük in Turkey, admittedly 1,000 years older than the one found in Tutankhamun’s tomb, no longer contains any metallic iron. X-ray investigations show this artifact has completely rusted away, although the gold hilt is still intact. It is not the nickel in the iron that allowed King Tut’s dagger to remain intact, but rather the very dry conditions in the tomb. Egyptian tombs were completely sealed once the complex embalming and funeral process was completed. Any moisture would quickly react with wood or other content on the tomb and the air would remain completely dry. It would stay dry while the tomb remained undisturbed, preventing not only damage to the iron dagger, but to wood and other organic items. Sadly, the humidity from visits from the many tourists that have passed through the tomb since it opened has caused the remaining items and wall murals to become damaged. The Egyptian Museum occasionally sends some of Tutankhamun’s treasures to overseas museums for special displays, and include a gold dagger. The iron dagger, however, stays in Cairo—it is too valuable to move. Around the time of King Tut, the ancient Anatolian people in what is now eastern Turkey were making what is one of the most important discoveries in technological history. They discovered the difficult process of smelting iron from its ore, and the Iron Age was born. Again, most of the iron produced has since rusted away, but there are examples of ancient man-made iron still surviving that can show us how it is possible to defeat corrosion. 1 Daniela Comelli, et al., “The Meteoritic Origin of Tutankhamun’s Iron Dagger Blade,” Meteoritics & Planetary Science 51, 7 (2016): pp. 1,301-1,309. For more information about Discovering King Tutankhamun’s tomb and photos the BBC have a great article Rob Francis Chemistry to Tame the Power of Steam Where Corrosion Science and Cathodic Protection Commenced Epoxy—A Coating for All Seasons A Rock-Like Coating That Can Protect for Decades The Humble Building Material that Shelters Millions Across the Globe PREVIOUS Previous post: Outer Space—The Ultimate in Benign Locations NEXT Next post: ACA/ACRA event roundup THE AUSTRALASIAN CORROSION ASSOCIATION INC. The ACA is a not-for-profit, membership Association which disseminates information on corrosion and its prevention or control, by providing training, seminars, conferences, publications and other activities. Corrosion is managed sustainably and cost effectively to ensure the health and safety of the community and protection of the environment. Assisting society to manage the impact of corrosion on asset durability. 30A Jessie St, Preston, VIC 3072 AUSTRALIA aca@corrosion.com.au ACA 2020
cc/2021-04/en_middle_0086.json.gz/line10173
__label__wiki
0.66787
0.66787
Other Relative(s): Ulis (cousin) Jeffrey Combs Krem was a Ferengi pirate in the 22nd century and the cousin of Ulis, who looked down on him and often ordered him about. In 2151, Krem and his gang of thieves, led by Ulis, rendered the entire crew of Enterprise NX-01 unconscious with a "Trojan Horse" device disguised as an ancient artifact. With the crew no longer a threat, Krem and the other Ferengi boarded the vessel and began looting Enterprise. Unknown to them, however, Trip Tucker was not affected by their device and was able to revive T'Pol. After Captain Archer was awakened and questioned for the location of a vault which the ship did not have, Ulis ordered Krem to guard him while continuing to load heavy items off the Enterprise and onto his ship. Krem, tired of always being ordered to do menial labor, forced the captain to do his work. As the two conversed, Archer was able to convince Krem that Ulis was not treating him fairly. When Ulis ordered Krem to continue guarding Archer while Tucker, who had been caught by the pirates, lead them to the captain's vault, Krem attempted to stand up to his cousin, but could not follow through. After being incapacitated by T'Pol with a Vulcan nerve pinch and having the rest of his compatriots captured, Krem was allowed to leave, commanding the ship once captained by Ulis. Before departing, he was warned by Archer that Starfleet Command and the Vulcan High Command would have his ship's design in their database, so they would know if he and his crew decided to start more trouble. Krem assured the captain that they would not return. He then piloted the ship away from Enterprise, ignoring the demands and pleas made by his restrained cousin and cohorts. (ENT: "Acquisition") In the final draft script of "Acquisition", Krem was described as "a bit of a dimwit." Krem was played by veteran Star Trek actor Jeffrey Combs, his only Enterprise appearance playing a character other than Shran. Combs played another Ferengi, Brunt, on DS9. In the Star Trek: Deep Space Nine - Mission Gamma novel This Gray Spirit, Nog and another crewman discuss the possibility that Krem may be the author of Vulcan Love Slave. Krem at StarTrek.com, the official Star Trek website Krem at Memory Beta, the wiki for licensed Star Trek works Retrieved from "https://memory-alpha.fandom.com/wiki/Krem?oldid=2693985"
cc/2021-04/en_middle_0086.json.gz/line10175
__label__cc
0.572897
0.427103
All fields: inserted Save to favorites Brochure promoting the book, "The Commodore Story" Save to favorites Early presidents of the Woman's Club Save to favorites Fault Shaker, Bulletin No. 5, June 10, 1949 Save to favorites Flora McFarlane with the Housekeepers Club members at the yard of old clubhouse Save to favorites Haitian refugees behind fence at Krome Avenue Detention Center Save to favorites Indian lore scrapbook by Mrs. E.R. Williams Save to favorites La lucha política en Cuba : Los unos y los otros (1878-1889) Save to favorites Los confinados á Fernando Póo é impresiones de un viaje á Guinea. Contiene además el folleto del... Save to favorites Nellie Eckert, Pearl Potter, Teat Pent, Irvin Potter, Rev. Jernigan, Chas Frow, and Dick Peacock... Save to favorites Miami Hurricane, December 11, 1953 Save to favorites Miami Hurricane, September 14, 1990 Save to favorites Bulletin, No. 77, March 10, 1942 Save to favorites Pan American clipper, Vol. 5, No. 40, February 26, 1947 Save to favorites Clipper, August 30, 1945 Save to favorites Clipper, Vol. 15, No. 2, February 1956 Save to favorites Pan American clipper, Vol. 5, No. 11, July 31, 1946 Save to favorites Clipper, Vol. 11, No. 6, June 1952 Save to favorites Pan American clipper, Vol. 5, No. 43, March 19, 1947 Save to favorites Clipper, Vol. 1, No. 2, July 1953 Save to favorites Clipper, Vol. 2, No. 6, April 1945 Save to favorites Clipper, Vol. 3, No. 7, February 15, 1945 Save to favorites Clipper, Vol. 11, No. 9, April 28, 1955
cc/2021-04/en_middle_0086.json.gz/line10177
__label__wiki
0.918632
0.918632
Muslim association wants $1.3 million for security May 20, 2019, 4:06 PM News Asha Abdi The Al Noor Mosque on Deans Ave. Asha Abdi But community urges government to be involved in boosting security at mosques. The Federation of Islamic Associations of new Zealand (FIANZ) is seeking $1.3 million from the government to improve security at mosques and other Islamic buildings. But some members of the Christchurch Muslim community are not sure the money should go to FIANZ. Ikran Ahmed, community development manager at Canterbury Refugee Resettlement, said the government should take care of boosting security at mosques. FIANZ could not be held accountable to the same degree as the government, Ahmed said. "The New Zealand government can be held accountable. They're trained and capable, and all eyes are on them." Muslims are now observing Ramadan, which requires them to attends nightly prayers, making some feel more vulnerable. Ahmed said there was still a heightened sense of fear. "Armed police are helping us feel safe in these thirty days and it's good to see people attending," Ahmed said. Ramadan has about two weeks left and Ahmed hopes things go back to normal. Another community member, Denise Jaeger, said a joint partnership between FIANZ and the government would be the best step forward. "Good policy could come out of a joint partnership," she said. FIANZ is also launching a database to report hate crimes against Muslims in New Zealand. The goal of the database is for people to report any experience in which they feel targeted because of their faith. Mosque Attacks Adventure Park staff give back Despite losing three quarters of the park in the Port Hills fire, adventure park staff bake for Ronald McDonald house, run bike skills sessions and assist City Mission. Lyttelton quake memorial orchard proposed The land belonging to a man killed in the 2011 Canterbury earthquake may be turned into a memorial orchard.
cc/2021-04/en_middle_0086.json.gz/line10181
__label__cc
0.598943
0.401057
Issue 1 2020-2021 Mirador Staff Childhood Halloween Pics Miramonte Twin Day 2013 Gallery Senior Ball Photo Contest Senior Section 2020 Issue 1 2018-19 Ivy Acceptance Rates Decline K. Chan Reese Levine, Staff Writer Of the thousands of colleges across the globe students have to choose from when applying to colleges, eight stand out as the most distinguished, but also the toughest to get into. These colleges make up the Ivies, which stand out as some of the oldest and most academically focused in the nation. Especially at Miramonte, with its strong academic program, some students feel an extra incentive to apply to these schools. From 2009 through 2011, there were 313 total applications to the Ivy League schools by Miramonte students. However, some of the applications could be multiple applications by the same student. Out of the 313 applications, only 38 were accepted by the schools. Additionally, 37 were waitlisted or deferred. This acceptance rate, of around eight percent, is approximately the same as the national acceptance rate in 2010. Adjusted for multiple applications by the same student, and using a 300 person class size, each year anywhere from 20 to 30 percent of the Miramonte student body apply to at least one Ivy League School. Only two percent actually end up going, which also correlates to the national average. “We do not have quotas for specific schools and generally see at least 10,000 different high schools represented in our applicant pool,” wrote Jason Locke, Director of the Undergraduate Admissions Office at Cornell University. “The admission committees look at schools individually and consider the unique educational program within each school as we make our decisions.” Qualifications for getting into an Ivy League school are rigorous. For most of them, over 90 percent of the students who went were in the top 10 percent of their class, and had SAT scores over 2000. The scores needed have climbed higher over the past decade as more and more students send in applications, leading to greater selectivity. This has led to some students who would have potentially gotten in 20 years ago being turned away today. Because the Ivies do not allow scholarships for sports, they instead operate by recruiting athletes, who still have to pay to attend the school. This means that athletes who attend Ivies also have to have above average SAT scores and GPAs, so they won’t sink in the rigorous academic program. Ivy League also have a “need-blind” admissions policy, which means they do not look at the financial situation of the applicant. Accordingly, they offer many financial benefits to less privileged students who are accepted, and in 2011 about half of the students in the Ivies received financial aid of some sort. This number has held steady through the increase in applications. Deborah Sedberry, MD Having been through the college application process with both of my daughters who attended Miramonte, I can say that there is really little interest from the counseling staff in getting Miramonte students into Ivy League or related schools. The office feels their main mission is to get kids into UCs. Extremely bright, well behaved students get essentially no attention from the counseling staff. Each year when my kids had their yearly meeting with their counselor, she said, “Good grades. Any questions? See you next year.” The meetings lasted less than 5 minutes. I understand now why parents choose to send their children to private high schools; there they get the attention of the counseling staff, and the school is highly motivated to get their students into the best schools, so they are competitive in the private school market. Administration Waiting to Reopen Campus Once County Returns to Red Tier The PSAT Has Been Cancelled Due to Stay at Home Order College Board Announces 2021 AP Test Structure Dentists Now Able to Administer COVID-19 Vaccine The Usual Craziness of Black Friday Will Be Restricted By COVID-19 Precautions Many Students Are Applying Early Decision to Their Top College Choice Lafayette Home Vandalized With Swastika and ‘Trump’ California’s Record High Voter Turnout Caused Propositions to Be Close Races Judge Limits Governor Newsom’s Power During Pandemic Lamorinda Residents Make Their Opinions Clear at Protests Leading Up to Election Miramonte High School's Newspaper
cc/2021-04/en_middle_0086.json.gz/line10182
__label__wiki
0.70833
0.70833
Racer X OnlinePress Releases • Get more from Racer X Online • Racer X Press Release Guideline Racer X Illustrated receives hundreds of press releases every week. Unfortunately, we cannot guarantee that we will run any particular item, but a few simple procedures can help ensure that your release gets to the right editors and increase your chances of getting coverage. A press release is news story or announcement, written in the third person, which seeks to demonstrate to an editor or reporter the newsworthiness of a particular person, event, service, or product. Press releases are most effective when they are under 500 words, generally two to three paragraphs. Report in the Third Person Just like a news release, a press release purports to report on an event, circumstance, or occurrence by a third party. Always write it from a journalist's perspective. Never use "I" or "we" unless it's in a quotation. The reporter is looking for a story that will be interesting to readers and pleasing to editors. The only info necessary is that which will help craft a good story. Newsworthy Content Common news angles include timely information about a new product or service, a business expansion or recent event, an organizational milestone like an anniversary or award, or the issuance of a tip sheet or expert opinion on a topic currently in the news. The news announcement must be clearly stated in the headline. The lead paragraph includes the who, what, when, where, and how of the story. If the reporter were only to read the lead of a good press release, it would contain everything necessary to get started. Standard Grammar and Spelling Press releases should be free of spelling and grammatical errors and should be written entirely in English. Press releases cannot contain HTML tags and other formatting such as non-standard characters, tables, or forced line breaks. Releases also should not be written partially or entirely in all capital letters. All press releases sent to Racer X must include a high-res photo that is at least 1200 pixels wide. What is the best format? Keep releases short. Double-space. Write clearly, addressing who, what, where, why, and when in the first paragraph. Identify the organization or individual sending the release, and include the name and daytime phone number (with area code) of someone we can contact if we have questions. Date the release and include whether the material is for immediate use or for release at a later date. Type "end" or "30" at the bottom of the last page. Common Press Release Mistakes Providing insufficient and inaccurate information. To be useful, releases must be complete, correct, and specific. For submissions or questions related to press releases, contact [email protected]
cc/2021-04/en_middle_0086.json.gz/line10184
__label__wiki
0.874839
0.874839
Unraveling the genetic determinants of small vessel vasculitis by University of Tsukuba The variants previously associated with risk for idiopathic pulmonary fibrosis, TERT rs2736100A and DSP rs2076295G, were found to be also associated with MPA and MPO-AAV. On the other hand, frequencies of these alleles were not significantly different between the patients of MPO-AAV with and without interstitial lung disease (ILD). OR: odds ratio; MPO-AAV-ILD: MPO-AAV patients with ILD, MPO-AAV-noILD; MPO-AAV patients without ILD. Credit: University of Tsukuba Autoimmune disease is fundamentally a mystery: whyever should an organism systematically set out to harm itself? Now, researchers at the University of Tsukuba have identified a genetic basis for anti-neutrophil cytoplasmic antibody (ANCA)-associated vasculitis, an autoimmune systemic disease that damages organs by targeting small blood vessels in a genetic association study. Interestingly, these specific gene variants, though previously known to increase risk for idiopathic pulmonary fibrosis (IPF), appear to be unassociated with the morbid complication called interstitial lung disease (ILD). ANCA-associated vasculitis (AAV) is a group of diseases in which neutrophils tag small blood vessels as foreign and attack them throughout the body, causing inflammatory damage. The most affected organs include the kidney and lung, though the reasons underlying this self-inflicted assault remain unclear. Of the various subtypes of AAV, microscopic polyangiitis (MPA) and myeloperoxidase (MPO)-ANCA positive AAV (MPO-AAV) are more common in Asian populations and more associated with the severe complication AAV-associated ILD (AAV-ILD). Notably, even within the MPA subset, more ILD is seen in Japanese than in Europeans, suggesting a genetic predisposition. Professor Aya Kawasaki, lead author, clarified the research background. "We had previously reported that a MUC5B gene variant linked to IPF was increased only in AAV patients with ILD. However, its rarity among Japanese made us suspect other IPF susceptibility alleles in TERT and DSP genes." The research team classified AAV patients into subsets. MPO-AAV patients were further categorized into those with ILD and those without, based on CT. Genotypes of TERT and DSP were determined for patients and controls, and analyzed. "We found that the frequency of IPF risk alleles TERT and DSP were significantly increased in MPA and MPO-AAV," explains Professor Kawasaki. "However, the allele frequencies in MPO-AAV were similar regardless of associated ILD. We concluded that TERT and DSP IPF risk alleles were associated with MPA and MPO-AAV irrespective of concomitant ILD, and may be novel susceptibility genes for both AAV subtypes. Additionally, the genetic predisposition for these conditions and IPF may overlap." (Figure) "Factoring these epidemiological and genetic differences between European and East Asian populations will broaden our knowledge base of rare diseases such as AAV," says Professor Naoyuki Tsuchiya, senior author. "Pinpointing the risk alleles and elucidating the underlying molecular mechanisms would not only lead to better understanding of the etiopathogenesis of these conditions, but also help identify new molecular targets for treatment of related autoimmune diseases." Researchers find genetic association for interstitial lung disease More information: Aya Kawasaki et al. Association of TERT and DSP variants with microscopic polyangiitis and myeloperoxidase-ANCA positive vasculitis in a Japanese population: a genetic association study, Arthritis Research & Therapy (2020). DOI: 10.1186/s13075-020-02347-0 Journal information: Arthritis Research & Therapy Provided by University of Tsukuba Citation: Unraveling the genetic determinants of small vessel vasculitis (2020, November 4) retrieved 19 January 2021 from https://medicalxpress.com/news/2020-11-unraveling-genetic-small-vessel-vasculitis.html Change isn't a good thing for Japanese rheumatoid arthritis patients Stretches of repeating DNA predispose to systemic sclerosis Blood test helps predict relapse in patients with autoimmune disease affecting the kidneys Prophylaxis after relapse of ANCA-associated vasculitis Researchers find common genetic link in lung ailments Genetic factors involved in shaping composition of human gut microbiome, international research team finds Blood type co-determines composition of the gut microbiome
cc/2021-04/en_middle_0086.json.gz/line10185
__label__cc
0.638977
0.361023
VIDEOS & TOURS Enquire Close >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> MAY CONSTRUCTION UPDATE Melbourne Square and OSK Property are proud to announce winning multiple honours at the recent Asia Pacific Property Awards. Award winning development With its extensive public realm and bold architecture, Melbourne Square has secured the rare honour of being named a double finalist in the highly acclaimed 2019/20 Asia Pacific Property Awards. Construction Milestones Achieved Northern Zone Core 1 wall pours complete L02 slabs complete L03 slabs in progress East Tower Core 2 works to pour 100mm above L15 SRL in progress L12 Pour 1 complete L12 Pour 2 in progress West Tower Core 3 poured 100mm above L17 SRL Fitout and Finishes West Tower Continued L00 and L01 glazed facade in progress L02 and L03 apartment glazed facade complete B1, L00 and L01 fitout and finishes in progress L02, L03 and L04 apartment, back of house and carpark fitout in progress CitiPower works continuing within substation and external pits Boulevard road construction in progress Boulevard in ground services in progress Upcoming works: Curtain wall set to commence installation Permanent power anticipated onsite by end of March Typical cycles on East Tower and West Tower structure set to commence Fit out continuing to East Tower and West Tower with level 5 set to commence First stage settlement: East & West Tower | Levels 9-31 and Part of Podium | End 2019 Second stage settlement: East & West Towers | Levels 32-50 and Part of Podium | Mid 2020 Third stage settlement: East Tower Only | Levels 51 + and Podium/Retail | Late 2020 If you are unsure about your settlement timing, please contact our settlements team for further clarification. Introduction of OSK settlement team We are very proud to be here to assist you with a hassle-free settlement process. We will assist you with your finance preparation, coordinate and attend bank valuations and guide you through your pre-settlement inspections. Moving forward, please contact us for any queries or concerns you may have about the process. click to view current stage We are open by private appointment only As per the new regulation, we are practicing safe social distancing guidelines including observing a distance of 1.5m between people, registering your attendance, using hand sanitiser upon entry and limiting 1 household per appointment. Enquire now to book an inspection. Corner Power & Kavanagh Streets, Southbank, Melbourne, Australia. Call 1300 888 770 or Register Now View Display Suite Map Please fill in your details and one of our team will get back to you shortly. How did you hear about us?* Domain.com.au Listing Editorial Realestate.com.au Listing Signage The Age Domain Google Search Result Social Media ApartmentDevelopments.com.au We respect your privacy and your personal information will be maintained in accordance with our “Privacy Policy”, by clicking submit you agree to this policy. Display Suite Now Open Daily 11am – 5pm Corner Power & Kavanagh Streets, Southbank, Melbourne, Australia. Call 1300 888 770 or Register Now Lip Phua: 0428 228 877 Melbourne Square | Woolworths Gift Card Giveaway - Facebook & Instagram Competition – November 2020 Official Rules Information on how to enter and prizes forms part of these conditions of entry. Entry into the competition constitutes, information on how to enter, the collection of personal information and prizes forms part of these conditions of entry. Entry into the competition constitutes acceptance of these terms and conditions. The Melbourne Square | Woolworths Gift Card Giveaway - Facebook & Instagram Competition – November 2020 (the “Competition”) is open to Australian residents only, the age of 18 and over. Employees, officers, directors, and contractors of the Sponsor and its subsidiaries and related entities, and any of their respective agencies involved in the administration of any portion of this Competition, are not eligible to enter, nor are the immediate family members (meaning parents, children, siblings or spouses, whether biological, adopted, step or in-law) or household members (whether related or not) of such individuals. The promotion period commences at Friday 20th November at 5:00pm AEDT and closes at Monday 14th December AEDST on 8:00am 2020 (“Promotional Period”) about the gift card giveaway. Eligible sponsor posts within the period are: Friday 20th November at 5:00pm AEDT, Wednesday 25th November at 6:00pm AEDT, Wednesday 2nd December at 6:00pm AEDT, and Wednesday 9th December AEDT. o enter the Competition, eligible persons must, within the Competition Period: (i) view the applicable Sponsor posts detailing the Competition, which for Facebook can be found at: https://www.facebook.com/MelbourneSquareSouthbank, and for Instagram can be found at: https://www.instagram.com/melbsquare/ (the “Competition Post”), (ii) Like the “Melbourne Square” Facebook or “@MelbSquare” Instagram page, and (iii) in 25 words or less, answer either “Tell us in emojis, what your first purchases from the new Woolies at MSQ would be and why?”, “What picnic goods you’d get from Woolies and take out to the MSQ park on a sunny day, and why?”, “What fresh food essentials from Woolies you’d purchase daily at MSQ, and why?” or “What the first meal you’d be cooking with from Woolies if you lived at MSQ and why?” pertaining to the corresponding post. The more creative the better. The prize winners will each receive a one (1) $100 Woolworths e-Gift Card funded by the Promoter. The total value of the prizes is approximately $1,600.00 AUD. Prize value is in Australian dollars, is the recommended retail value and are correct as of the date of these conditions of entry. The Promoter does not accept responsibility for any variation in the value of the Prizes. The competition is a game of skill only and chance plays no part in determining the winner. Entry into the competition is free and entrants can enter multiple times. Entries are deemed to be received at the time the comment is posted during the Promotional Period. Entries are deemed to be received at the time the applicable comment is posted on the applicable platform during the Competition Period. The weekly winners will be selected at 9:00am on Monday 23rd November, Monday 30th November, Monday 7th December, and Monday 14th December at 14-18 Cremorne St, Richmond VIC 3121. The winners will be notified via comment or reply from Melbourne Square on the entrants Facebook or Instagram comment and may also be announced on a Facebook, Instagram and/or website. There will be sixteen (16) winner selections, selected from Facebook and Instagram entries on the competition posts only. Winners will each receive one (1) $100 Woolworths e-Gift Card each. The prize winner will be selected from all entries received via the Promoter’s competition Facebook and Instagram posts at with the winning entries being deemed to be the most creative by Bastion Effect Pty Ltd. (ACN: 606 814 895) of 14-18 Cremorne St, Richmond VIC 3121 (the Judges) For any prize that remains unclaimed by Wednesday 17th December at 9:00am AEDT or forfeited through ineligibility or otherwise, the Promoter will award the prize to the next entry deemed to be the most supportive. The redraw will occur on Thursday 18th December at 9:00am AEDT at 14-18 Cremorne St, Richmond VIC 3121 and be selected by the Judges. The winner will be notified via a comment, reply or direct message from the Promoter on Facebook on the same day. The judges’ decision is final, and no correspondence will be entered into. The prize is not exchangeable, transferable and non-cash prizes are not redeemable for cash. The Promoter reserves the right to rejudge the competition in the event of: A. an entrant being unable to satisfy the competition conditions; or B. forfeiting; or C. not claiming a prize. The Promoter accepts no responsibility for late, lost, incomplete, incorrectly submitted, delayed, illegible, corrupted or misdirected entries, claims or correspondence whether due to error, omission, alteration, tampering, deletion, theft, destruction, transmission interruption, communications failure or otherwise. Tax implications may arise from the prize winnings. Independent advice should be sought. All entries, prize images and any copyright subsisting in the entries and prize images become and remain the property of the Promoter who may publish or cause to be published any of the entries received. The prize winners consent to having their name, entry and photographs they submit as part of this Promotion to be used by the Promoter for the purposes of this Promotion (including being posted to Melbourne Square social media pages) and for other future promotional, marketing and publicity purposes). Each entrant represents and warrants to Yarra Park City Pty Ltd that neither the entry (nor its submission) nor the photographs provided or arranged by the entrants will breach any law or regulation or the rights of any third party (including any privacy law). Yarra Park City Pty Ltd reserves the right to rejudge in the event of an entrant being unable to satisfy these competition conditions or forfeiting or not claiming a prize. For any prize that remains unclaimed or forfeited through ineligibility or otherwise, Yarra Park City Pty Ltd will award the prize to the next entry deemed to be the most creative. The winner will be notified via a comment or reply from Melbourne Square on the on Facebook and may also be announced on a website. Incomplete, indecipherable or ineligible entries will be deemed invalid. The Promoter reserves the right to verify the validity of entries and entrants (including the entrant’s identity and address) and to disqualify any entrant who submits an entry that is not in accordance with or breaches these conditions of entry, who tampers with the entry process or who submits an entry that the Promoter, in its sole discretion deems to be offensive, inappropriate, defamatory or otherwise not in keeping with the spirit of the competition. Failure by the Promoter to enforce any of its rights at any stage does not constitute a waiver of those rights. The Promoter reserves its legal rights to recover damages and/or other compensation from a person whom is in breach of these conditions of entry or whom engages in any unlawful or improper conduct calculated to jeopardise the fair and proper conduct of the competition. Yarra Park City Pty Ltd is not liable for any loss or damage whatsoever which is suffered (including but not limited to indirect or a consequential loss), or for personal injury suffered or sustained as a result of taking any prize, except for any liability that cannot be excluded by law. arra Park City Pty Ltd will not be liable for any loss or damage whatsoever resulting from incorrect details lodged by entrants. Yarra Park City Pty Ltd reserves the right to vary the rules of any competition or any prizes offered or cancel any competition if it is no longer able to run the competition due to reasons beyond its control, subject to state legislation. Yarra Park City Pty Ltd will not be liable for any losses to any party arising from any variation or cancellation. Each entrant releases Facebook and Instagram from all liability whatsoever related to the competition. Entrants acknowledge that the competition is in no way sponsored, endorsed or administered by, or associated with Facebook and Instagram. These terms and conditions will be governed and construed in accordance with the laws of Victoria, Australia. The competition is promoted by Yarra Park City Pty Ltd ACN 169 645 103 of Level 2 99 Queensbridge St Southbank VIC 3006 (The Promoter).
cc/2021-04/en_middle_0086.json.gz/line10186
__label__cc
0.589523
0.410477
5 Affordable Small Business Multifunction Printers by Ted Needleman You don't have to spend a lot of money—or sacrifice quality—to get the small business multifunction printer you need. We discuss what features to consider and look at five great MFPs on the market. A multifunction printer (MFP)—also known as an All-in-One (AIO)—makes sense for a lot of small businesses. Along with the printer, an MFP includes a scanner to digitize documents like store receipts, bills, and correspondence; a copier (though many inkjet MFPs copy documents slowly) and, depending on the model, fax capability. You have a number of factors to consider when making your choice, all of which will influence the price. We look at the major features to help you winnow the field, and take a look at five worthy small business MFPs. How to Buy a Small Business MFP Small Business Printer Use One of the most important considerations is how you plan to use your small business printer. Will you use the MFP sporadically? What kind of print and copy jobs do you expect to produce—and how frequently? An MFP that handles the occasional invoice, letter, report, and copy doesn't have to be the most expensive model in the line. In fact, it doesn't necessarily have to be a model targeted at the business market. Many "consumer" models do a fine job printing 100 pages, or fewer, a week. The specification you want to examine is the manufacturer's Recommended Monthly Print Volume. If your anticipated printing use will come close to the specification's upper limit, you're better off with a heavier duty (and more expensive) model. The Epson EcoTank ET-4450 multifunction printer includes two years' worth of ink—in the box and in its price. Ink and Toner Cost Small business owners frequently overlook ink or toner costs—until they need to replace it. Many MFP vendors price the printer very attractively, and then hit you with a huge bill when it's time to change a cartridge. When researching your purchase, look beyond the purchase price of the MFP and calculate what printing will cost on a per-page basis over time. Inkjet or Laser Printer Today's inkjet MFPs produce output that's just as good, or even better, than most laser printers. And they do it at a cost-per-page that's frequently 50 percent less than laser printing, and in many cases, just as fast. Laser has the advantage when it comes to producing images on plain paper. Inkjet printers and MFPs use a liquid ink, and standard copy/print paper is porous enough so that some of the ink gets sucked down into the paper and spreads out, slightly blurring the image. This is called wicking, and it's why photos printed on an inkjet look so much better when printed on special photo paper that's immune to wicking. A laser printer/MFP uses powdered toner suspended in a plastic binder that literally melts onto the surface of the paper. It adheres to the paper, but it doesn't wick the way ink does. The result: sharper images on standard inexpensive paper. If you frequently produce reports or marketing materials that contain photos, you may want to seriously consider a laser-based MFP. If your images tend to be charts and graphs, most inkjet-based devices will deliver quality that's more than acceptable. But if you need all-out speed, laser and LED-based MFPs are often considerably faster than inkjets; they produce an entire page at a time rather than bit-by-bit as the paper moves past an inkjet's printhead. Automatic Duplexing We consider automatic duplexing—where the MFP prints one side of the page and then turns the paper over and continues printing on the second side of the page—a must-have feature in a business setting. Auto duplexing not only saves paper, it also gives your output a more professional look. An Automatic Document Feeder (ADF) that duplexes is a nice plus, since at least some of the documents you scan, copy, and fax will be two-sided. Color or Monochrome The majority of inkjet MFPs are color devices; finding monochrome inkjet MFPs these days is rare. Laser-based MFPs are a different story. Monochrome units are widely available, and they're considerably less expensive to buy. And, with only a black toner cartridge rather than four different toner colors (Cyan, Magenta, Yellow, and Black), they also cost less to operate. Is Fax Dead? Finally, consider whether you need a three-function or a four-function MFP. A four-function MFP adds the capability to send and receive faxes. While faxing has dropped in popularly as emailing documents has gained, plenty of companies that insist that you fax them a document rather than scanning and emailing it. Four-function models don't cost much more than those without fax capability. We suggest that you select a four-function MFP unless you are absolutely certain you will never need the capability. Check out page two for our take on five small business multifunction printers. Time to Buy a Small Business Multifunction Printer We've discussed the multifunction printer features a small business needs to consider before buying. Here, in no particular order, are five affordable MFPs that make great fit for SMBs. Note on pricing: we list the MSRP. You'll likely find significantly lower street prices as you shop around. Epson EcoTank ET-4450 ($499 MSRP) Epson has changed the game with its line of EcoTank printers and MFPs. Instead of offering inexpensive print devices and charging a small fortune for supplies, Epson rolls the cost of two years' worth of ink into the purchase price. EcoTank printers use refillable ink tanks rather than single-use cartridges, and they come with enough ink to print 11,000 monochrome pages or about 8,500 color pages (roughly equivalent to 50 typical ink cartridges). The ET-4550 (read our full review here) looks like a typical small MFP, but with a bump-out that projects about four inches on the right side of the device—this addition contains the four refillable ink tanks, which you access via a hinged top cover. Each individual tank is also covered by a rubber stopper. Epson warns users about keeping the printer level when moving it (once you've filled it), and even provides a large plastic bag to put the MFP in if it has to be moved. Filling the tanks is pretty easy; snap off the tip of each ink bottle, unscrew the pouring spout, remove the foil seal, and then replace the cap. Uncap the specific color ink tank and carefully pour the ink into the tank. Take care to put the right color of ink into each tank. Although each tank is labeled, nothing physically prevents you from pouring the wrong color. Other than the ink system, the ET-4550 is a pretty standard four-function MFP. The ET-4550 offers USB, Ethernet, and Wi-Fi connectivity, and a small 2.2-inch non-touchscreen display. It uses Epson's PrecisionCore printhead technology, which provides very sharp output. The ET-4550 is built for endurance but only modest speed—11ppm in monochrome and 5.5ppm in color. Replacement ink bottles costs $20 for black ink, and $13 color. Once you spent the up-front money and had several years' worth of printing and copying, you get to keep on printing at one of the lowest per-page costs in the industry. Brother MFC-J5520DW ($199 MSRP) The other MFPs in this roundup have one thing in common. The largest paper they can print is 8.5 x 14 inches (legal size). However, the Brother MFC-J5520DW prints pages as large as 11 x 17 inches (tabloid size); though scan, copy, and fax functions are limited to legal size. The paper drawer expands or collapses to accommodate the different paper sizes. The front paper drawer holds 250 sheets, and a rear 80-sheet feed accommodates additional paper or specialty papers. Brother's MFC-J5520DW prints pages up to 11 x 17 inches. The large paper capacity compliments the MFC-J5520DW's high-capacity ink tanks. The extra-high capacity black ink tank ($40) yields roughly 2,400 pages. A three-pack of high-capacity color cartridges costs $64 and each cartridge yields about 1,200 pages. A large 3.7-inch color touchscreen makes using the MFC-J5520DW easy. The printer offers automatic duplexing, though the 30 sheet ADF does not. Connectivity options include USB, Ethernet, Wi-Fi, or Wi-Fi Direct, and you can print from most mobile devices. One eccentricity the MFC-J5520DW shares with other Brother MFPs we've tested is an awkward cable routing. Rather than having the jacks at the rear or side of the MFP, you actually have to raise the entire scan unit, which is hinged at the rear, and route the cables inside the unit. An MFP that can print on ledger size paper is useful for printing large spreadsheets or printing small booklets. If you think it might be useful at some time, that capability and the large capacity ink cartridges make the Brother MFC-J5520DW worth a look. Hewlett Packard Officejet Pro X576dw ($399 MSRP) If your daily routine includes large print or copy jobs, then the HP Officejet Pro X576dw might be the right choice. This hefty printer (20.3 x 20.3 x 15.7 inches) weighs in at 53 pounds, so put it on a sturdy desk or table. HP claims it prints up to 70 pages per minute; with a 500-sheet input tray, an 80-sheet multipurpose tray, and a second (optional) 500 sheet tray, you can load the printer with two reams of paper. The OJ Pro X576dw gets its outstanding print speed from a technology HP calls "PageWide." Rather than having a small printhead move back and forth across the page laying down ink, the OJ Pro X series printers and MFPs have an array of fixed printheads that span the 8.5 inch paper path. The paper moves across the array, which lays down ink droplets much faster than if the printhead moved across the page. HP clocks the Color LaserJet Pro M277dw print speed at 70 pages per minute. The MFP's 4.3-inch touchscreen makes it easy to choose copy, scan, or fax. Automatic duplexing for both the printer and the 50-sheet ADF (automatic document feeder) lets you load-and-go—just remember to come back and empty the 300 page output bin. The MFP's recommended monthly print maximum is 4,500 pages—more than half a case of paper. Large ink cartridges yield up to 9,200 monochrome pages ($120) or 2,500 color pages ($55). Connecting the Officejet Pro X576dw offers all the connect options you would expect in a business MFP including USB, Ethernet, and Wi-Fi. Canon Maxify MB5320 ($399 MSRP) Canon probably isn't the first name that pops into your head when you think about business MFPs—it's much better known for photo printers. But the company also has a decades-long reputation in the enterprise MFP market for its high-end ImageRunner Advanced office MFPs. So when Canon introduced its Maxify models recently, it really wasn't a total surprise. The MB5320 is a slick, black stunted cube weighing slightly less than 29 pounds, measuring 18.3 x 18.1 inches, and standing just shy of 14 inches high. That's a smaller footprint than many MFPs with the same capabilities, and it's a handsome addition it your office décor. A 3-inch touchscreen provides access to all functions including scanning, copying, and faxing. You also access the MB5320's Cloud capabilities (such as printing from the Cloud or scanning into it) from this control panel, though the MFP needs an Internet connection for those functions. Canon's Maxify MB5320 compact MFP would look great in any office. An interesting addition to the touchscreen display is the Records of Use screen. This details the number of pages printed, faxed, scanned, or copied. Some of the other MFPs detailed here also provide this information, though you have to delve deep into the menus to find it, and most require you to print the details in a report rather than display them onscreen. As befits a business MFP, the Maxify 5320 is fast. Canon rates it at 22ppm in monochrome and 15ppm in color. Standard and high-capacity ink cartridges are available, with the black high-capacity cartridge rated at 2,500 pages ($35) and the color high-yield cartridges estimated to yield between 1,300 and 1,750 pages, depending on the color. The high-yield color cartridges cost about $28. The Maxify 5320 includes two paper drawers—each with a 250 sheet capacity. Printing provides automatic duplexing, as does the fold-out ADF with a 30-sheet capacity. The ADF is unusual in that it offers one-pass duplexing—both sides of the page are scanned as the page moves through the ADF. As with the other MFPs detailed here, the Maxify 5320 offers easy connectivity options including USB, Ethernet, as well as Wi-Fi and Wi-Fi Direct. Hewlett Packard Color LaserJet Pro MFP M277dw ($329 MSRP) The M277dw is the only laser-based MFP in our short list. It offers fast printing (19ppm in color or monochrome), small footprint (16.5 x16.4 x 12.7 inches), but weighs in at a hefty 40 pounds. A four-function model, it provides fax capability in addition to the print, scan, and copy functions expected from an MFP. The ADF handles a large number of pages (50), but does not auto duplex—if you're scanning double-sided documents, you'll have to scan both sides manually. Print does offer auto-duplexing; you specify printing on both sides of a page by simply checking a box in the print driver. HP specifies a recommended monthly print cycle of up to 2,500 pages. HP's Color LaserJet Pro MFP M277dw is the lone laser printer in our mini-roundup. As expected from a business MFP, the M227dw provides various connectivity options including Ethernet, USB ports, Wi-Fi, and Wi-Fi Direct (Wi-Fi Direct lets you print directly from a Wi-Fi enabled device or PC even if the MFP is not connected to a network). It also supports NFC (near field communications) for printing from compatible smartphones and tablets. Other features include an easy-to-use 3-inch touchscreen and a single-sheet feeder at the front of the MFP for using letterhead or paper stock up to 57 pounds. Black toner cartridges cost about $67 and yield approximately 1,500 pages; color cartridges cost about $80 each and yield around 1,400 pages. The laser printer produces excellent print quality, although if you plan to print photographs, you'd be better off with an inkjet MFP. For reports, fliers, and handouts, the M227dw's print quality will be hard to beat without spending considerably more money. Our one big complaint is the M227dw's input paper drawer capacity—only 150 sheets. That's pretty skimpy for an MFP designed for business use. There's no optional second drawer either, which may be a deal breaker if your business involves high volume printing or copying. em>Ted Needleman published his first review in 1978. Since then, he has written several thousand hardware and software reviews, columns, articles on using technology, and two books. He has no intention of stopping any time soon. This article was originally published on Monday Sep 14th 2015 Epson's WorkForce Pro WF-5690 Offers Excellent Value MFP Review: Big Printer Features for Small Business 3 Windows 10 Tablet-Laptop Hybrids for Small Business
cc/2021-04/en_middle_0086.json.gz/line10191
__label__wiki
0.907779
0.907779
Buffett: 'We made a mistake,' will pay $900,000 settlement by Gregory Wallace @gregorywallace August 20, 2014: 4:04 PM ET Why Buffett hates paying corporate taxes Warren Buffett says his firm made a mistake and will pay a nearly $900,000 settlement to the federal government. On Wednesday, Berkshire Hathaway (BRKA) acknowledged that it should have given regulators a heads-up about its plans to acquire a building supply company last December. The Justice Department said in a lawsuit filed Thursday the firm needed to disclose the deal with USG Corp. (USG) to allow for an antitrust review. If a judge signs off, Berkshire Hathaway will settle the suit for $896,000. "We made a mistake when we overlooked the filing requirement," Buffett said. Chicago-based USG makes wallboard, ceiling suspension systems and acoustic panels. Berkshire became the largest owner of the company and currently holds a 28% stake. --CNNMoney's Matt Egan contributed to this report CNNMoney (New York) First published August 20, 2014: 1:28 PM ET
cc/2021-04/en_middle_0086.json.gz/line10192
__label__wiki
0.986224
0.986224
Twitter is too cool for school. It must go mainstream by Paul R. La Monica @lamonicabuzz December 16, 2015: 1:39 PM ET Twitter was the place to be for snarky commentary about the GOP debate on Tuesday night. Search for "Princess Buttercup" and "Punched the Russians in the nose" and you won't be disappointed. Want instant reaction to those phenomenal reviews for "The Force Awakens" early Wednesday morning? Check out Twitter. There's even an adorable BB-8 emoji for the #StarWars hashtag. And what are all the market junkies and econonerds going to be doing later Wednesday afternoon? Live tweeting about the (likely) rate hike from the Federal Reserve and searching for deeper meaning in every word uttered by Fed chair Janet Yellen. Yet none of this seems to matter to Wall Street. Twitter has failed to capitalize on the fact that it's the go-to social media platform for many celebrities, politicians and journalists during live events. Shares of Twitter (TWTR) closed below $24 on Tuesday -- their lowest finish to a trading day ever. The stock is down 15% since Jack Dorsey took over as CEO in early October and has plunged more than 33% in 2015. Twitter went public in November 2013 at a price of $26. Needless to say, it's not a healthy sign when the stock goes below the offering price. And some analysts think it will get worse. Evercore ISI's Ken Sena cut his target on Twitter earlier this week to $22. Why is Twitter slumping? It has many loyal users who are actively engaged. I consider myself to be one of them. Related: Twitter still hasn't found its groove But overall user growth has slowed. The company had 320 million active monthly users as of the end of the third quarter, up just 1.3% from the second quarter. That's a big problem. Scale matters in social media. Facebook (FB) has it -- and not just with Facebook. It also owns Instagram and WhatsApp. Snapchat is also starting to catch up to Twitter in terms of users and few would be surprised if it eventually passed Twitter. Dorsey has admitted on numerous occasions that the big challenge is attracting new people to sign up and use the service. For the uninitiated, Twitter can be -- in the words of Jimi Hendrix -- a frustrating mess. The company is trying to become more user friendly. Twitter launched a new Moments feature in October -- a curated series of tweets about big news, pop culture and sports events. Twitter even ran a TV ad campaign to promote it during the World Series. It controversially changed its star icon that people used to Favorite a tweet to a heart icon that showed you Like a tweet. The move ticked off Twitter diehards but was clearly made to try and be more like Facebook. Related: Twitter ditches stars and favorites for hearts and likes And in perhaps the biggest move of all, Twitter is experimenting with a new way of showing tweets in their users' timelines. Currently, it's in reverse chronological order. That's great if you are following breaking news. But it also means that higher quality tweets get buried in a deluge of new ones. Recency trumps relevancy. Will all these changes lead to more active users? That remains to be seen. But interestingly, Twitter is also trying to make more money from so-called unregistered or logged-out users. Twitter announced last week that it was testing an expanded use of Promoted Tweets from advertisers. Instead of targeting them solely to registered users, Promoted Tweets will be able to be viewed by people who see a tweet when they go to Twitter without logging in and by those who have tweets pop up in search results on Google (GOOGL). Twitter revenue product manager Deepak Rao wrote in a blog post that when you include these logged-out users, Twitter has another 500 million people visiting it each month. Related: Jack Dorsey apologizes to developers That's all well and good. But Twitter won't be able to convince a skeptical Wall Street that it can get back on track unless it is able to convert those people to become active users. Martin Pyykkonen, an analyst with Rosenblatt Securities, wrote in a report last week that Twitter needs more casual users and not just the "seemingly dedicated and maybe even cult-like base of active users." Pyykkonen said Moments could help in this regard. So could Periscope -- the live streaming video app it bought earlier this year. So expect a lot more changes from Twitter as it seeks to build its user base. In order to succeed, Twitter needs to be like that indie rock band you loved when you saw them in a club that held 100 people but hated once they started selling out basketball arenas. Twitter has to go mainstream. Or else. CNNMoney (New York) First published December 16, 2015: 12:06 PM ET
cc/2021-04/en_middle_0086.json.gz/line10193
__label__cc
0.661423
0.338577
ID Theft: Are You the Next Victim? When it comes to protecting your identity, maybe you have your head on your shoulders and maybe you don't. Test yourself to find out. By Carolyn Bigda April 18, 2006 11:04 PM EDT (MONEY Magazine) – 1) How much money does the typical victim of identity theft lose? [A] $1,657 [B] $950 [C] $422 [D] $0 More from Money Magazine Correcting your credit report gets easier Cut your cooling costs by 30% or more After Obamacare's launch, a look ahead Subscribe to Money ANSWER: D. More than two-thirds of ID theft victims didn't lose a dime last year. (Of course, that means some people did end up out of pocket: The average loss was $422 vs. $675 in 2004.) Why? Federal law limits your liability--$50 for credit cards; $500 for debit cards--if you report the fraud within 60 days. And most issuers offer even stronger protections, guaranteeing that you won't be on the hook for any of the bill. The real cost to you is time and stress: It takes the average victim 40 hours of effort to restore his or her good name. 2) What is the most common way your identity is stolen? [A] Dumpster diving [B] Stolen mail [C] Lost or stolen wallet, checkbook or credit card ANSWER: C. Among victims who could pinpoint the source of ID theft, 30% blamed a lost or stolen wallet, checkbook or credit card. Dumpster diving, in which your personal info is lifted from documents you throw out, made up less than 1% of cases, down from 2.6% in 2004, as some 70% of people now shred paper files (keep shredding!). However, in 8% of cases, info is stolen out of mailboxes before you have a chance to shred. Since credit-card offers make it easy to open an account in your name, call 888-5-OPTOUT to stop unsolicited card applications. 3) What type of identity theft is the most difficult to detect? [A] Fraudulent accounts opened in your name [B] Charges to a credit card you already have [C] Hacking into your checking or savings account ANSWER: A. It takes an average of 152 days for victims to find out that a new account has been opened in their name. That's because only a credit report or notice from the lender or a collection agency will alert you to the new account's existence. Reduce your vulnerability by regularly checking your credit report--by law, you're entitled to a free report from each of the three major credit bureaus once a year (go to annualcreditreport.com or, if you have trouble getting onto the site, call 877-322-8228). Your best bet is to stagger requests, getting a report from a different bureau every four months. 4) Identity theft on the Internet is growing. [A] True [B] False ANSWER: B. Online fraud made up 9% of ID theft cases in which the source was known last year, down from 11.6% in 2004. People who bank online typically uncover fraud in 22 days vs. more than a month for paper accounts. You can reduce your susceptibility to online fraud by using updated anti-spyware and anti-virus software. If you bank online, you will be even safer by year-end, when all banks will be required to ask for a secondary piece of identifying information, in addition to your password, before you can gain access to your account. 5) What age group is most susceptible to identity theft? A] 25 to 34 [B] 35 to 54 [C] 55 to 64 [D] 65-plus ANSWER: A. Contrary to popular belief, seniors had the lowest rate of ID theft, while 25- to 34-year-olds were most at risk. Why? The lifestyle of many Gen X-ers--going out often and trading personal information on MySpace.com and other social networking sites--creates more opportunity for identity thieves, says Javelin Strategy & Research, whose 2006 ID theft study supplied the data for this quiz. In cases where the perpetrator's identity was discovered, for example, 20% were service employees, such as a waiter or cashier. A pity that someone you think is there to serve you is really out to con you. From the May 1, 2006 issue More Personal Finance
cc/2021-04/en_middle_0086.json.gz/line10194
__label__wiki
0.901118
0.901118
Urban boy band B2K broke into the pop market in early 2002 with "Uh Huh," a fun song driven by more-dance-than-hip-hop beats and a hot delivery, downright sexy for four young innocent-looking men. The single's success drew attention toward the group's self-titled debut album and group members Omarion, Raz-B, Lil Fizz, and J-Boog. Epic Records, the label that developed B2K, marketed Jhene in conjunction with the boy band. The young woman is Lil Fizz's cousin and toured with B2K in 2002. The end of the year saw a new release, Pandemonium, and another tour, but bigger things were in the works for the quartet. In 2003 they began working on a soundtrack for a film that would feature the band in starring roles. Released in December, the You Got Served soundtrack was to be the first in a chain of events that seemed certain to make 2004 an even bigger year for B2K, but only weeks after it's release, a few dates into a new tour and weeks before the release of the film You Got Served, B2K broke up. The group claimed internal disagreements for the split. Albums by B2K Including: Take It To The Floor Including: Girlfriend Including: Baby Girl Santa Hooked Me Up Including: Rudolph The Red-nosed Reindeer Including: Badaboom (ft. Fabolous) Tags on B2K Popularity B2K Review B2K A total of 4 reviews for B2K: Guest wrote on 7th Dec 2007, 16:28h: Boi this niggas was the shit and sexi Guest wrote on 3rd Oct 2007, 20:42h: i like ya'll so much yall can let me c yall sexy body and i go bump bump bump on yall {*shonda*} Guest wrote on 4th Apr 2007, 16:36h: I love them and i think they should get back together Guest wrote on 28th Feb 2007, 4:00h: iu love u guys no speacil shout outs but lil fizz and j boog yall r so sexy i love u guys niecy4_lyfe
cc/2021-04/en_middle_0086.json.gz/line10196
__label__wiki
0.507282
0.507282
The Politics of Twenty Fifth and Madison by Vince Passaro 15 e 25th St, New York, NY Neighborhood: All Over, Manhattan Like 0 Google +1 0 Retweet 0 So it began at the dry cleaners, at five past nine, when someone said a plane had hit the World Trade Center, and Chris, the Jamaican tailor, turned from his sewing machine in the front window and said, “Two. Two planes have hit the towers. Both of them.” The dry cleaner is Le Kang, an Asian name, and the woman who broke the news is the Korean lady who runs the place. She is assisted by an older Asian woman and one or two or sometimes three Latinos, and the bunch of them crawl and glide over and around each other in the small tube of plastic baggy space behind the counter like walruses galumphing with fatty grace over each other to slide from rock to sea. I walked to the subway in a daze: air traffic control, I thought. Someone fucked up or went crazy and brought those planes in like that – I was preparing myself for the version of the story that we all seem to prefer, that there is a Madman, and the Madman does something Mad, because he’s touched, irrational, worst of all, religious, and always alone, oh yes, that’s the important one, he’s all alone, it’s not a movement, it’s not a trend, it’s not an idea: it’s a Madman. But there are politics in the world — not the politics of bad talk show appearances and expensive orchestrations of the inane, but actual politics, in which what we do, what the state does, what we as a nation do, matters. Matters even to the degree that others might feel themselves compelled to do something back. Madison Square Park at 25th is one of those spots in New York that I have long loved (Sixth Avenue around tenth or eleventh was another), where you would turn, arrive, look up, and there they were, previously invisible, suddenly lined up with the avenue and looming, enormous silver matchsticks down at harbor’s edge. They changed in the light, from blue to pink to iron gray. But now there was only one. I couldn’t really take that fact in. I knew a plane had hit the towers, I knew it was bad, I knew the subways, which had taken me downtown in fits and starts, had finally given out at 34th Street, leaving me a short walk down to Lex and 22nd, where I work. What I didn’t know was that there’d be a tower just missing . The one that was left was engulfed in smoke. All along the park we stunned humans stood, alone or in twos and threes, staring and trying to use our cell phones. After a few moments the smoke kind of lifted in a wind. I will never forget how beautiful a day it was, how blue and cool and filled with a promise of restoration. The smoke lifted and there it was, one tower with a hole of astonishing blackness, jagged and infernal, and my stomach fell away and I thought I would throw up, the bad stomach of a roller coaster ride taken too late in life. Tears came, and for once I let them: slow tears for all that death. Prayers came, small ones, hardly verbal, and I let them too. Then I put my head down and walked. I got to my building, and five minutes later the second tower had gone down. I kept thinking not of the people who worked in the building, who were unwitting victims, but of the one’s who had chosen to run inside it while it melted and collapsed: the firemen and EMS people and cops. And sure enough, on the television Tuesday night, this would be the issue that most moved me. The mayor, pressed to estimate the dead, would say with extraordinary eloquence, “When we finally know the number, it will be impossible to bear.” And then the fire commissioner, a man named von Effen who looked, in the plainest way possible, broken, announced that more than 300 of his men were missing. “How do you feel about that?” a reporter called out. “How do I feel about it?” he said, quietly. “How do I feel about it? There are men who have died who gave thirty and forty years to the fire department. How do you think I feel about it?” He described some of them – a man named Sheehan, and a chaplain named Father Judge. He never raised his voice, he did nothing to dramatize, nothing to embellish. He said, “And there are others, many others, I don’t want to name them. Someday this department will recover but I don’t know how.” Then he turned and walked back to where he’d been standing behind the mayor. My best friend, a reporter, called with his ghoulish humor to say what he’d been thinking all day and knew he could say only to me because no one else would understanding jokes at such a moment. The voice goes Brooklyn-Jewish: “So everybody has to be an architecture critic?” Then he told me that among cops, fire, and emergency, between four and five hundred were thought dead. For a good many years and several papers, he had covered cops, fire, and emergency; he’d covered corrections; now he covered City Hall. He was at the triage center on Greenwich Street, where, notably, there were no survivors to work on. He sounded different, changed. The other unforgettable and moving thing I learned on television Tuesday night was that, of the many people who jumped, prefering flight to immolation, two were lovers – perhaps they’d only been lovers for a few minutes, in circumstances of emotional and spiritual compression that most of us will never understand, but they were lovers nonetheless – and they elected to depart a high floor together, sailing through blue sky and dust holding each other’s hands. I had been reading Dante on the subway, it was my new little fend-off-midlife project, reading Dante on the subway, and before getting out to see the towers I’d read this passage: “And how it is, when one glories in wealth and acquiring, And then the times make for enormous loss So that he weeps with every thought and fills with despair, So it was with me, when it met me face to face, that beast without peace, and little by little Drove me back to the silence of the sun. “ The Italian for my awkward “beast without peace” is “la bestia senza pace”, which would really read more easily in English as “restless beast,” but all day I kept hearing the words in my head, “la bestia senza pace,” thinking in these terms not about the killers but the killed; thinking, as another friend reminded me, of Malcolm X’s chilling remark, when Kennedy was shot, that “the chickens have come home to roost;” thinking about the United States in the world and how our ease and comfort and ignorance come at a price which, like all colonialists, we prefer others to pay. I kept thinking of being “without peace.” We watched through the evening, my three sons and wife and I, and then I put the boys to bed. Paul, the nine year old, said he would have nightmares. “You very well might,” I said. “I’ll dream that the building next to ours gets hit by a plane, and it falls into our building, and I will be killed but you won’t.” “I don’t like that arrangement,” I said. “You’re much better-looking than I am, so you should live.” “You’d be happy to inherit my Mickey Mantle card though.” “That’s true,” I said. In the morning, he told me that it turned out he’d had some other important dreams and didn’t “have time for the nightmare.” Tagged: 9/11 and its aftershocks Twitter Email Facebook del.icio.us Digg Furl Reddit Rate Story § Leave a Reply Nearby All Over, Manhattan Stories by Patrick J. Sauer On September 12, I went back to work at Men’s Journal because the issue was gutted and redone for a [...] Sirens and Whispers on 9/11 by Tom Cushman 9:30 AMIt’s a slow morning like so many, in that I am running slow. I get into the bathtub, and [...] by Rebecca Letz Parachuting from the twin towers Peace Dreams by Didi Menussi A View From Israel To the woman on craigslist who wanted to know the difference between ‘booty call’ and ‘f*ck buddy.’ The main distinction being that one is an incident or event while the other is a category of modern relationship The Local F*ck by A. Leigh Foreplay to him is the pretzel you eat ten minutes before sitting down in the theatre. Under Jimmy’s Awning by Brendan Patrick Hughes Brendan Patrick Hughes delivers a classic New York dive bar story and a random swingers come-on story all in one. Here I am in Bergdorf Goodman by Sarah Miller-Davenport Sarah contemplates her middle-class upbringing while she asks herself whether a pair of $900 shoes is worth going into debt It’s Not A Cult by Zola Acker “I have to get to New York” says the woman in front of me at the Portland, Oregon airport. “You [...] The New York–Baghdad Connection by Saïd Sayrafiezadeh Day three1,300 cruise missiles and bombs hit Baghdad.At work I have to use the freight elevator to bring my bicycle [...] The Man in Apartment 6 by Coree Spencer 01/10/2021 Apartment 6 is on the third floor, so I guess that’s why I don’t notice the odor. But I have been wondering why suddenly my super has put lavender scented Air Wick stick-ups all over the hallway walls. I also notice urinal cakes have been stuck under the staircase near my apartment door on the […] This is Jeopardy: Remembering Art and Alex by Marissa Piesman 12/20/2020 Alex Trebek, who hosted Jeopardy for thirty-seven seasons, died on November 8th. My connection to him and the show was through Art Fleming, a prior host of the show, who got Alex the gig. Let me explain. As a child, I was quite the nerd. I could recite the U.S. presidents forward and backward at […] Dog Day Afternoons by Cora Womble-Miesner 12/13/2020 Pablo’s father was a handsome, French pianist in his forties. His apartment was immaculate and minimalistic. He was usually absent when I came to retrieve Pablo for his 90-minute walk, but sometimes I would turn my key in the lock and hear him playing the grand piano in the living room. It sounded beautiful, but […] Rikers Island Bedford-Stuyvesant Caroll Gardens Cypress Hills The East River 3 Bleecker Street Restaurant Row South Ferry Stuyvesant Town Beechhurst Citifield Howard's Beach JFK/LGA Kew Gardens Hills Prall's Island site map | about | RSS feed | top of page | all materials © 2021 MrBellersNeighborhood | programming & design by Foliovision
cc/2021-04/en_middle_0086.json.gz/line10202
__label__cc
0.638852
0.361148
Episteme: A Journal of Social Epistemology Editor: Alvin Goldman EPISTEME publishes articles on the social dimensions of knowledge from the perspective of philosophical epistemology and related social sciences (e.g., economics, political theory, information science). It focuses on theoretical work, but also welcomes policy-oriented discussions, i.e., applications to contemporary society and its institutions. It does not publish straightforward empirical studies or case studies. The principal style is that of analytical philosophy, but rigorous approaches of other kinds are appropriate so long as they remain accessible to an interdisciplinary audience. View Formatted Version Epistemics for Forensics Roger G. Koppl, Robert Kurzban, Lawrence Kobilinsky Explanatory Genealogies and Historical Testimony Nick Jardine Testimony as a Natural Kind Kourken Michaelian Bayesianism, Convergence and Social Epistemology Michael J. Shaffer Scientific Autonomy and Public Oversight David B. Resnik Women's Objectification and the Norm of Assumed Objectivity Evangelia (Lina) Papadaki Copyright © 2008 Edinburgh University Press.
cc/2021-04/en_middle_0086.json.gz/line10207
__label__wiki
0.980724
0.980724
BURNETT, Frank (Service number 5/94) Hunterville, C/o Percy Earle, Hunterville Sheep farmer Robert BURNETT (father), Edinburgh, Scotland Main Body New Zealand Army Service Corps Waimana Farmer; carrier Cremated, ashes interred Waikumete Cemetery, Auckland Soldiers Berm K 1A, 186 Frank Burnett was the third son of Robert and Sarah Emma (née Clyde) Burnett, of Edinburgh, Scotland. Two year old Frank was with his family at Portobello, Edinburgh in 1891, and again in 1901, when he was a scholar. After his return to New Zealand, in May 1919 at Hunterville, Frank married Dorothy Earle who had been named as a contact. Frank and Dorothy were engaged in September 1914. Although he was a sheep farmer at Hunterville, with Mr Earle, in 1911, it appears that Frank had spent time in the Timaru area. The Methodist Church of Timaru placed a handsome window in the Bank Street Church as a memorial for the war victims of the congregations. Apart from the names of the fallen appearing on the window, the names of all who served were inscribed in a book which was to be preserved in the Church. Included in the names was that of Frank Burnett. Auckland War Memorial Museum Cenotaph Database [30 March 2020]; 1891 & 1901 Scotland census returns (ancestry.co.au) [30 March 2020]; Waikumete Cemetery headstone record [30 March 2020]; Timaru Herald, 5 July 1922 (Papers Past) [24 March 2020] Auckland War Memorial Museum Cenotaph record Military personnel file Teresa Scott, SC branch NZSG
cc/2021-04/en_middle_0086.json.gz/line10208
__label__wiki
0.904665
0.904665
Symbols and Meanings Prometheus Atlas Atlas, the Titan Who Held the World upon His Shoulders February 28, 2019 October 31, 2012 by Metin Atlas was the son of Titan Iapetus and the Oceanid Clymene (who was also referred to as “Asia”) in Greek mythology and he was the brother of Titans Epimetheus, Menoetius and Prometheus. Atlas was mostly known in the mythology as “the Titan who held the world upon his shoulders”. But "the world" would not be… Discover Typhon: The God of Monsters Roman Myths: Jupiter and the Bee Learn More About the African Myth of Nyami Nyami Kronos Mythology: Learn More About the Greek God Discover These Norse Mythology Monsters Mythologian.net Copyright © 2021. Home | SiteMap | Privacy Policy | Contact © 2021 Symbols and Their Meanings - Mythology and Gods - Mythical Creatures • Built with GeneratePress
cc/2021-04/en_middle_0086.json.gz/line10214
__label__cc
0.650716
0.349284
Home Member Services Position Announcements Job Detail Assistant Dean, Undergraduate Programs & Advising/Clinical Assistant Professor Categories: Mid South Region 3 College of Communication and Information/Undergraduate Advising Center Close Date: The Assistant Dean for Undergraduate Programs and Advising leads the College of Communication and Information's undergraduate programs and oversees the College's Undergraduate Advising Center. The Assistant Dean also monitors how University undergraduate decisions and policies impact CCI's undergraduate programs and advising. Duties overseeing the College’s Undergraduate Advising Center include: (1) Manage day-to-day operation of CCI's Undergraduate Advising Center and its staff by providing guidance on relevant issues, including coursework for each major, general education requirements, course equivalency evaluation, registration clearing, academic probation, course petitions, course substitutions, late withdrawals, credit overloads, change of grading, drop/add requests, review of degree audit reports for graduating seniors, orientation sessions (summer, fall, and spring) for new students and transfer students, student record keeping, maintaining the data base to track advising and student progress, providing program information to prospective students, and developing advising materials as needed (academic and faculty mentoring syllabi). (2) Supervise, evaluate and mentor CCI Advising staff & conduct searches for new advisors. (3) Respond to program and advising inquiries from current and prospective students & parents & serve as initial contact person for CCI's undergraduate program inquiries. (4) Provide School Directors with advising information about majors' progression. (5) Coordinate CCI undergraduate student advising for majors, prospective students, transfer students, students pursuing the communication and information minor, and graduating students. (6) Coordinate FYS 101: The UT Experience for the College. Duties leading the College’s undergraduate programs include: (1) Lead the admissions process for all applicants to CCI's undergraduate programs. (2) Represent and champion College programs at the university-level on various committees (e.g., Academic Advising Leadership Group, Undergraduate Council and General Education committees as Ex-officio). (3) Serve as CCI's spokesperson for University-sponsored recruiting & orientation events. (4) Serve as CCI's liaison with University offices, including Undergraduate Admissions, Registrar, Student Success, and other campus advising centers. (5) Provide accurate and timely information, counsel, and assistance to the Dean and Associate Dean for Academic Programs in decision-making about University changes affecting CCI academic programs. (6) Oversee undergraduate student grade appeals. (7) Make recommendations regarding student retention and graduation policies to the administrative leadership team. (8) Provide leadership on how University decisions/policies impact college-wide undergraduate curricular issues and advising. (9) Collect undergraduate student data and provide assessment reports to the Dean and Associate Dean for Academic Programs. (10) Serve on CCI s administrative committee and the undergraduate curriculum committee and oversee undergraduate catalog copy management, changes and revisions. Application materials must include (1) a letter of application, (2) a statement of student advising philosophy, (3) a diversity statement, (4) a current curriculum vitae, and (5) a list of three references. For questions, contact Beth Cole at bethcole@utk.edu (subject line: Assistant Dean for Undergraduate Programs and Advising). Review of applications will begin on December 1 and continue until the position is filled. To apply for this position please use the following link: https://ut.taleo.net/careersection/ut_system/jobdetail.ftl?job=20000001AG&tz=GMT-05%3A00&tzname=America%2FNew_York Institution Information The University of Tennessee is an EEO/AA/Title VI/Title IX/Section 504/ADA/ADEA institution in the provision of its education and employment programs and services. All qualified applicants will receive equal consideration for employment and admission without regard to race, color, national origin, religion, sex, pregnancy, marital status, sexual orientation, gender identity, age, physical or mental disability, genetic information, veteran status, and parental status. Beth Cole at bethcole@utk.edu (subject line: Assistant Dean for Undergraduate Programs and Advising) This position requires a PhD in communication and information or a related field. 4 years of undergraduate administrative and advising experience. Demonstrated management skills including knowledge of programmatic assessment and employee development are preferred.
cc/2021-04/en_middle_0086.json.gz/line10217
__label__wiki
0.687348
0.687348
Gregory Real Estate Gregory is a small rural community situated along the Pinckney Recreation Area, offering endless outdoor recreation for residents. Search Homes for Sale in the Gregory Why Residents Love Living Here: Residents love the laid-back feel of this small town and convenient access to outdoor recreation. The community lies next to Pinckney Recreation Area, which connects to Waterloo State Recreation Area, both of which provide an abundance of lakes, rivers, forests, trails and campsites for residents to enjoy! Gregory is a small, unincorporated community located within Unadilla Township and began as a station for a branch of the Grand Trunk Western Railroad. The area was once owned by Halstead Gregory, who built a store near the train depot and became the first postmaster for the community in March 1884. The center of Gregory hosts several conveniences, including a market, a gas station, a church, a pub and some shops. Otherwise, Gregory remains a laid-back and quiet rural community with an abundance of farmland, wide open fields, lakes and forestland. Gregory is situated alongside Pinckney Recreation Area, an 11,000-acre Michigan state recreation area connecting to Waterloo State Recreation Area by the 35-mile Waterloo-Pinckney Trail. The area is a popular destination for hiking, fishing, swimming, camping, hunting, and a variety of winter sports. Pinckney Recreation Area is home to several lakes, including Silver Lake, Crooked Lake, Halfmoon Lake and Pickerel Lake. Homes in Gregory are located in this lush forested setting, enjoying access to the park and its many bodies of water. Some Gregory homes are even situated directly along the edge of a lake, offering gorgeous views and immediate water access for boating and swimming. Homes located north of the park provide a more rural setting, and many enjoy acreage and farm facilities. All For Sale 14625 EDGEWATER Drive Gregory, Mi 48137 13725 S RAINBOW Drive 11711 Joslin Lake Road 12508 Roepke Road Active, Recently Reduced 355 BULLIS Road Active, Just Listed 18320 WALNUT Lane Select a Point of Interest and Distance from the search form. Back to All Communities Jump to Any Community Jump to Any Community Ann Arbor Belleville Brighton Canton Chelsea Dexter Grass Lake Gregory Jackson Manchester Milan Pinckney Plymouth Saline South Lyon Tecumseh Whitmore Lake Ypsilanti
cc/2021-04/en_middle_0086.json.gz/line10218
__label__cc
0.521327
0.478673
About The Man Of Much Metal Links to my reviews & other written work Metal Update – 21 September 2018 by manofmuchmetalPosted on September 21, 2018 Who’s working hard for you, eh? Another day, another round-up of important news in the world or rock and heavy metal – the stuff that I think you’ll be interested in checking out for one reason or another. As always, there’s an eclectic mic of music to follow in today’s round-up, so I hope there genuinely is something of interest for you to check out. If you’ve missed some of my recent round-ups, they can all be viewed via the following links: However, let’s get on with things. And I make no apology for starting with something a little more intense and genuinely moving. It certainly puts things into sharp perspective… ‘TBC’ Release date: TBC Cancer. Such an evil disease. And to read that the five-year-old daughter of Aaron Stainthorpe was struck down with the illness last year, causing the My Dying Bride to cancel all outstanding live dates, sent a chill through my heart. As a father of a 6-year-old and a nearly 4-year-old, as well as someone who lost his brother to the disease at the age of 26 nearly a decade ago, my empathy for Aaron is bottomless. Frankly, I’d like to give the guy a hug. The great news however, is that his daughter has beaten the disease and, In Aaron’s words, is clear of cancer. And to add the icing on this wonderful cake, is the revelation that a new My Dying Bride album is almost completely written. I cannot begin to imagine how the events of the last year will impact upon the writing and the lyrics, but I cannot wait to hear what I hope will be a raw, honest, emotional and, above all, deeply cathartic final product. I love this band and it is with genuine delight that they are back, albeit even more battle-scarred than ever before. Universal Mind Project Inner Wound Recordings I was blown away by the debut album from a band called Universal Mind Project in 2016. The album was entitled ‘The Jaguar Priest’ and it was a most excellent slab of grandiose melodic metal with the odd progressive touch as well as a healthy dose of power and symphonic metal. It also featured a plethora of guest vocalists to great effect. Well, it looks like the same can be said of the eagerly-awaited sophomore release which is yet to be titled and given a firm release date. So far, the guests confirmed for the new record include Riot V vocalist Todd Michael Hall, Adrienne Cowan of Seven Spires and Mark Jansen of Epica and Mayan fame. It is a shame that Elina Laivera departed after the release of ‘The Jaguar Priest’, but the guests assembled so far are going a long way to soften the blow. Take a listen to the first snippets of the new album to accompany Hall’s arrival – to me it sounds pretty excellent, I hope you’ll all agree? https://www.facebook.com/plugins/video.php?href=https%3A%2F%2Fwww.facebook.com%2FUniversalMindProject%2Fvideos%2F352593555481640%2F&show_text=0&width=560 By now, it should be no secret that I have a huge soft spot for Soilwork. The Gothenburg melodic death metal band, fronted by the irrepressible Bjorn ‘Speed’ Strid have released albu after album of quality material over the years, the kind of heavy and abrasive, yet catchy and melodic metal that I just can’t ignore. In recent years, the music has undoubtedly taken a turn for the heavier but based on the three studio webisodes (all below), things might change again a little bit. Key words and phrases that piqued my interest within the webisodes include ‘melancholic melodies’, ‘uplifting music’, ‘new elements’, ‘keyboards’ and ‘experimental’. When done right, I’m a huge fan of keyboards so this is exciting for me, as are the promised melancholic melodies. I know that this record is likely still a long way off, but I’m really excited to hear it and bring you my thoughts on it in due course. Roine Stolt’s The Flower King ‘Manifesto of an Alchemist’ InsideOut Music The news about this release isn’t new having hit the public conscience around a week ago. However, I missed the news until earlier today, so it’s new to me. And if I’d missed the news, I figured I’d not be the only one, so I thought it was worth highlighting within this round-up. According to the press release, and Stolt himself, the 70-minute-long album came together very quickly and in an unorthodox manner. Sometimes this kind of thing can lead to the best music, so I’m very intrigued to hear what the member of The Flower Kings, Transatlantic, The Sea Within et al has up his sleeve here, especially seeing as he has amassed an impressive and familiar cast of musicians to assist. Joining Stolt are Jonas Reingold, Hasse Froberg, Michael Stolt, Marco Minneman, Nad Sylvan and many others besides, meaning that even if the ten songs suck, their delivery won’t. Mind you, has anything associated with Roine Stolt ever sucked? No, of course not, so I’m expecting good things here too. Plus, the artwork alone would have drawn me in to checking this out, as it’s wonderful. Roll on late November! ‘The Uncovering’ ViciSolum Productions Release date:16 November 2018 Here’s a little gem for you – news of a new record from Australian melodic progressive metal band, Divine Ascension on the ViciSolum label. ‘The Uncovering’ is the band’s third release and it threatens to be a dark horse for 2018. I had no idea a new record was on the horizon until I received the email in my inbox a day or two ago. Just take a listen to the track below to get an idea of what to expect. However, if you like properly melodic heavy metal with a progressive vibe, then I suspect this’ll be right up your street. There is definitely a dark Evergrey vibe to their output despite the female lead vocals, something that perhaps the band recognise themselves because none other than Tom Englund is due to guest on this new record. Had I not been into their music before, this alone would have piqued my interest enough to check them out. Do yourselves a favour and acquaint yourselves with Divine Ascension immediately. ‘Algorythm’ And finally, if you ever wanted another reason to feel about as inferior as possible, I invite you to check out the latest video released by Beyond Creation ahead of the release of their new album, ‘Algorythm’ on 12 October. These progressive death metalheads from Canada make technical and complex extreme metal look like child’s play. It just isn’t fair. But instead of moaning and whinging, I shall put my energy into simply enjoying their output, for it really is a thing of complicated beauty. I hope you agree? Posted in Death Metal, Doom Metal, extreme metal, Music, progressive metal, Progressive Rock, Symphonic MetalTagged Algorythm, Beyond Creation, Divine Ascension, Inner Wound Records, Manifesto of an alchemist, My Dying Bride, Nuclear Blast, Roine Stolt The Flower King, Soilwork, The Uncovering, Universal Mind Project Published by manofmuchmetal View all posts by manofmuchmetal Prev Metal Update – 19 September 2018 Next Revocation – The Outer Ones – Album Review Matt Spall – The Man Of Much Metal RT @vivlalu: Thank you so much Matt for mentioning PAINT THE SKY in your 'Anticipated Album Releases in 2021' list, hope it won't disappoin… 12 hours ago Anticipated Album Releases in 2021 – Part 2 manofmuchmetal.com/2021/01/16/ant… 3 days ago New album review, my 5th for 2021 so far...Asphyx - Necroceros - @centurymedia #deathdoom #deathmetal… twitter.com/i/web/status/1… 5 days ago Asphyx – Necroceros – Album Review manofmuchmetal.com/2021/01/14/asp… 5 days ago My fourth album review of 2021 is 'Retransmission' from the masters of melodic hard Rock, W.E.T. featuring… twitter.com/i/web/status/1… 1 week ago Follow @manofmuchmetal Anticipated Album Releases in 2021 – Part 2 Asphyx – Necroceros – Album Review W.E.T. – Retransmission – Album Review Labyrinth – Welcome To The Absurd Circus – Album Review TDW – The Days The Clock Stopped – Album Review
cc/2021-04/en_middle_0086.json.gz/line10219
__label__cc
0.729837
0.270163
HS-150W TOA | HS-150B | User manual | TOA HS Serien Manual HS-120B 1. SAFETY PRECAUTIONS ........................... 2 7. INSTALLATION .......................................... 4 2. GENERAL DESCRIPTION ......................... 3 8. EQUALIZING BY THE DIGITAL SIGNAL PROCESSOR ............... 7 3. FEATURES ................................................. 3 4. DIMENSIONAL DIAGRAM ......................... 3 5. INPUT TERMINAL SECTION ..................... 4 6. ABOUT THE INPUT OVERLOAD PROTECTION CIRCUIT ............................. 4 9. SPECIFICATIONS ...................................... 8 Accessories ................................................. 8 Optional products ........................................ 8 Thank you for purchasing TOA's Speaker System. Please carefully follow the instructions in this manual to ensure long, trouble-free use of your equipment. 1. SAFETY PRECAUTIONS • Before installation or use, be sure to carefully read all the instructions in this section for correct and safe • Be sure to follow all the precautionary instructions in this section, which contain important warnings and/or cautions regarding safety. • After reading, keep this manual handy for future reference. Safety Symbol and Message Conventions Safety symbols and messages described below are used in this manual to prevent bodily injury and property damage which could result from mishandling. Before operating your product, read this manual first and understand the safety symbols and messages so you are thoroughly aware of the potential safety hazards. Indicates a potentially hazardous situation which, if mishandled, could result in death or serious personal injury. When Installing the Unit • Avoid installing or mounting the unit in unstable locations, such as on a rickety table or a slanted surface. Doing so may result in the unit falling down and causing personal injury and/or property damage. • Install the unit only in a location that can structurally support the weight of the unit and the mounting bracket. Doing otherwise may result in the unit falling down and causing personal injury and/or property damage. • Since the unit is designed for in-door use, do not install it outdoors. If installed outdoors, the aging of parts causes the unit to fall off, resulting in personal injury. Also, when it gets wet with rain, there is a danger of electric shock. • Owing to the unit's size and weight, be sure that at least two persons are available to install the unit. Failure to do so could result in personal injury. • Do not use other methods than specified to mount the bracket. Extreme force is applied to the unit and the unit could fall off, possibly resulting in personal injuries. • Use screws that are appropriate for the ceiling's or wall's structure and composition. Failure to do so may cause the unit to fall, resulting in personal injury. • Ensure that all screws are securely tightened. If they are not tightened or firmly secured after installation, the unit could fall down, possibly resulting in personal injury. • Use the specified mounting bracket in combination. Doing otherwise may cause the unit or component to fall off, resulting in personal injury. • Do not mount the unit in locations exposed to constant vibration. The mounting bracket can be damaged by excessive vibration, potentially causing the unit to fall, which could result in personal injury. result in moderate or minor personal injury, and/or property damage. • When unpacking or installing the unit, be sure to handle it with two or more persons. Falling or dropping the unit may cause personal injury. • Avoid touching the unit's sharp metal edge to prevent injury. • To avoid electric shocks, be sure to switch off the amplifier's power when connecting speakers. When the Unit is in Use • Do not place heavy objects on the unit as this may cause it to fall or break which may result in personal injury and/or property damage. In addition, the object itself may fall off and cause injury and/or damage. • Make sure that the volume control is set to minimum position before power is switched on. Loud noise produced at high volume when power is switched on can impair hearing. • Do not operate the unit for an extended period of time with the sound distorting. This is an indication of a malfunction, which in turn can cause heat to generate and result in a fire. 2. GENERAL DESCRIPTION TOA’s HS-120 series and HS-150 series speakers are 2-way speaker systems made of resin, and feature a large diameter woofer. They can be installed in many different applications with combined use of the supplied handles and the optional mounting brackets. Tweeter array realizes a 90° horizontal x 40° vertical directivity control at high frequencies Compact and lightweight with its high frequency tweeter array arranged in front of the low frequency woofer Built-in overload protection circuitry for the tweeters Both permanent and temporary installations available Either vertical or horizontal speaker installation available for the permanent installation Easy to carry with a handy handle 4. DIMENSIONAL DIAGRAM [Side] [Rear] Screw terminal NEUTRIK NL4MP [Bottom] HS-120B/120W 448 (17.64) Unit: mm (inches) 5. INPUT TERMINAL SECTION • As the Speakon connector is internally connected in parallel to the screw terminal as shown below, you can use either of the two. • The usable connector (on the cable end) that matches the NEUTRIK NL4MP Speakon is NEUTRIK NL4FX Speakon. • Input terminal connection diagram is as shown below. [Input terminal connection diagram] 6. ABOUT THE INPUT OVERLOAD PROTECTION CIRCUIT The speaker system has a built-in input overload protection circuitry. If an excessive input signal is applied to the speaker, the protection circuitry is activated and cuts off the signal input to the tweeters. A sudden drop of the sound volume level during speaker operation indicates that the protection circuitry has been activated. In such a case, reduce the amplifier volume and wait. The protection circuitry is automatically reset after approximately 10 seconds. After the circuitry is reset, set the volume at a lower level than before. This input overload protection circuitry does not completely protect the speaker component. Depending on the nature of the excessive input signal applied to the speaker, there may be damage to the speaker components before protection circuitry can operate. Also, if the excessive input signal is applied to the speaker for extended periods of time, the protection circuitry may be damaged and will not recover. Take special care that the excessive input signal is not applied to the speaker during use. 7.1. Installing to a Ceiling or Wall Install the speaker system to a ceiling or wall using the optional mounting brackets shown below. Refer to the instruction manual enclosed with the HY-1200 series or HY-1500 series Mounting Bracket for its mounting details. 7.1.1. HY-1200VB, HY-1200VW, HY-1500VB and HY-1500VW Mounting Brackets (For vertical speaker mounting) • These brackets are designed to mount HS series speakers to ceilings or walls vertically. HY-1200VB and HY-1200VW: For the HS-120 series speaker system • They allow speaker’s vertical angle to be adjusted. (Ceiling: From 15° upward to 90° downward, Wall: From 15° upward to 60° downward) Note: They also permit speaker’s horizontal angle to be adjusted in conjunction with the optional HY-C0801 or HY-C0801W Ceiling Mount Bracket, or the HY-W0801 or HY-W0801W Wall Mount Bracket. [Ceiling installation] [Wall installation] 7.1.2. HY-1200HB, HY-1200HW, HY-1500HB and HY-1500HW Mounting Brackets (For horizontal speaker mounting) • These brackets are designed to mount HS series speakers to ceilings or walls horizontally. HY-1200HB and HY-1200HW: For the HS-120 series speaker system • They allow speaker’s vertical angle to be adjusted. (Ceiling: From 0° horizontal to 90° downward, Wall: From 7.1.3. HY-C0801 and HY-C0801W Ceiling Mount Brackets (For ceiling installation, horizontal angle adjustable) Installing the HS series speaker to a ceiling in conjunction with the HY-1200 series or HY-1500 series Mounting Bracket permits the speaker's horizontal angle to be adjusted. The figure at right shows an example of vertical speaker installation. Ceiling Moun Bracket 7.1.4. HY-W0801 and HY-W0801W Wall Mount Brackets (For wall installation, horizontal angle adjustable) Installing the HS series speaker to a wall in 7.1.5. Safety wire installation (For speaker fall prevention) When mounting the speaker system to the ceiling or wall, install a safety wire as needed. When installing the safety wire, be sure to follow the instructions below. Failure to do so may cause the speaker to fall off, resulting in personal injury. Use a wire rope of 2 mm (0.08") or more in diameter. (The safety wire is not supplied.) Tighten the safety wire to take up the slack. Otherwise, impact shock at speaker fall may cause the wireconnected parts or wire itself to break. Install the safety wire to a place that can structurally support the full weight of load. Screw a speaker suspension bolt (M8) into one of the screw holes on the speaker's bottom surface. Then, connect the safety wire to the bolt. Installation position of an M8 bolt M8 (Screw pitch: 1.25 mm, effective depth: 24 mm) Note: Unified inch screws cannot be used. Speaker's bottom surface Changing the orientation of the front panel logo Turn the logo mark while holding its edges to change its orientation. 7.2. Mounting on the ST-33B Speaker Stand (optional) Refer to the instruction manual enclosed with the Speaker Stand for its mounting details. Step 1. Fix the bracket supplied with the speaker stand to the speaker. Step 2. Spread the tripod legs of the stand to their full Spread the tripod legs until the stays extend horizontally. (supplied with the Stand) Bracket fixing screw Step 3. Mount the speaker with the bracket fixed onto the stand. Step 4. Determine the speaker direction, and tighten the bracket fixing screw. Plain washer for M8 Speaker mounting screw M8 Step 5. Adjust the stand height. ST-33B Speaker Stand 7.3. Using as a Floor Monitor • When installing the speaker system on slippery floor, put a non-slip mat under the speaker. • Do not kick or stand on the speaker system, as this will damage the speaker. The figure shows the HS-120 series. 7.4. Attaching the Supplied Rubber Feet Attach the rubber feet in the case of speaker storage or on-floor speaker installation. Datum line The rubber foot has a direction (back and forth). Align the datum line on the rubber foot with the positioning mark ( ) on the speaker unit as shown at right. (accessory) Positioning mark Screw M6 x 20 (accessory) 7.5. Attaching a Handle The speaker system comes with a handy carrying handle. Attach the handle on the speaker's top surface. Screw M6 x 20 Handle fitting bracket 8. EQUALIZING BY THE DIGITAL SIGNAL PROCESSOR The speaker system is capable of providing high-efficiency and wide range reproduction without using an equalizer, however more clear and dynamic sound quality can be reproduced by using our digital signal processor and performing its settings as shown in the tables below. [For the HS-120B and HS-120W] HPF (12 dB) Power Handling Capacity Directivity Angle Input Terminal Punched net Sealed type Continuous pink noise: 100 W, Continuous program: 300 W 97 dB (1 W, 1m) 80 to 20,000 Hz 3 kHz Horizontal: 90°, Vertical: 40° 30 cm (12") cone type Balanced dome tweeter x 6 NEUTRIK NL4MP Speakon and M4 screw terminal (Barrier spacing: 9 mm) Polypropylene, Surface-treated steel plate, black steel plate, white –10°C to +50°C (14°F to 122°F) 361 (w) x 448 (h) x 320 (d) mm (14.21" x 17.64" x 12.6") (17.76" x 22.05" x 15.75") 8.5 kg (18.74 lb) 12 kg (26.46 lb) Note: The design and specifications are subject to change without notice for improvement. Handle ................................................................................................ 1 Handle fitting bracket .......................................................................... 2 Rubber foot ......................................................................................... 2 Screw M6 x 20 (Used for attaching a handle and rubber foot.) .......... 4 • Optional products Mounting bracket (For vertical speaker mounting): HY-1200VB, HY-1200VW, HY-1500VB, HY-1500VW Mounting bracket (For horizontal speaker mounting): HY-1200HB, HY-1200HW, HY-1500HB, HY-1500HW Ceiling mount bracket: HY-C0801, HY-C0801W Wall mount bracket: HY-W0801, HY-W0801W Speaker stand: ST-33B Traceability Information for Europe (EMC directive 2004/108/EC) TOA Corporation 7-2-1, Minatojima Nakamachi, Chuo-ku, Kobe, Hyogo, Authorized representative: TOA Electronics Europe GmbH Suederstrasse 282, 20537 Hamburg, URL: http://www.toa.jp/ 533-06-174-1C TOA Electronics HS-1200BT User's Manual TOA HS-150W datasheet TOA HY-1200HW User manual TOA HY-1200-1500 Manual TOA HX-5B ユーザーマニュアル HS Series COAXIAL ARRAY SPEAKER speaker systems hs-1200bt hs-1200wt hs-1500bt hs TOA HS-1200BT User manual hs series coaxial array speakers TOA HS Serien Broschyr HS-P1500 Ins speaker mounting kit ys-301 PC-139 ›p TOA PC-2268 User manual TOA HY-ST1 Manual TOA HY-ST1 User manual TOA HY-W0801 Manual コアキシャルアレイスピーカー HS-1200BT HS-1200WT HS TOA HY-C0801 Manual SPEAKER STAND ST-33B WARNING CAUTION
cc/2021-04/en_middle_0086.json.gz/line10220
__label__cc
0.669641
0.330359
WADE-8022 User's Manual WADE-8022 Mini-ITX Board Copyright © Portwell, Inc., 2014. All rights reserved. All other brand names are registered trademarks of their respective owners. Chapter 1 System Overview.......................................................................................................1-1 1.1 Introduction ....................................................................................................... 1-1 1.2 Check List........................................................................................................... 1-2 1.3 Product Specification........................................................................................ 1-2 1.3.1 Mechanical Drawing................................................................................ 1-4 1.4 System Architecture.......................................................................................... 1-6 Chapter 2 Hardware Configuration ...........................................................................................2-1 2.1 Jumper Setting ................................................................................................... 2-1 2.2 Connector Allocation...................................................................................... 2-10 Chapter 3 System Installation....................................................................................................3-1 3.1 Intel® Haswell Processor .................................................................................. 3-1 3.2 Main Memory .................................................................................................... 3-1 3.3 Installing the Mini-ITX Board Computer ...................................................... 3-2 3.3.1 Chipset Component Driver .................................................................... 3-2 3.3.2 Intel® Integrated Graphics Controller................................................... 3-3 3.3.3 Gigabit Ethernet Controller .................................................................... 3-3 3.3.4 Audio Controller ...................................................................................... 3-3 3.4 Clear CMOS Operation .................................................................................... 3-3 3.5 EC WDT.............................................................................................................. 3-4 3.6 EC GPIO ............................................................................................................. 3-6 Chapter 4 BIOS Setup Information............................................................................................4-1 4.1 Entering Setup - Launch System Setup.......................................................... 4-1 4.2 Main .................................................................................................................... 4-2 4.3 Configutation..................................................................................................... 4-3 4.4 Boot ................................................................................................................... 4-23 4.5 Security ............................................................................................................. 4-25 4.6 Save & Exit ....................................................................................................... 4-26 Chapter 5 Troubleshooting ........................................................................................................5-1 5.1 Hardware Quick Installation........................................................................... 5-1 5.2 BIOS Setting ....................................................................................................... 5-3 5.3 FAQ ..................................................................................................................... 5-4 The manual describes how to configure your WADE-8022 system board to meet various operating requirements. It is divided into five chapters, with each chapter addressing a basic concept and operation of Mini-ITX Board. Chapter 1: System Overview. Presents what you have in the box and give you an overview of the product specifications and basic system architecture for this series model of Mini-ITX Board. Chapter 2: Hardware Configuration. Show the definitions and locations of Jumpers and Connectors that you can easily configure your system. Chapter 3: System Installation. Describes how to properly mount the CPU, main memory and Compact Flash to get a safe installation and provides a programming guide of Watch Dog Timer function. Chapter 4: BIOS Setup Information. Specifies the meaning of each setup parameters, how to get advanced BIOS performance and update new BIOS. In addition, POST checkpoint list will give users some guidelines of trouble-shooting. Chapter 5: Troubleshooting. Provide various of useful tips to quickly get WADE-8022 running with success. As basic hardware installation has been addressed in Chapter 3, this chapter will basically focus on system integration issues, in terms of backplane setup, BIOS setting, and OS diagnostics. The content of this manual is subject to change without prior notice. These changes will be incorporated in new editions of the document. The vendor may make supplement or change in the products described in this document at any time. Portwell Inc., a world-leading innovator in the Industrial PC (IPC) market and a member of the Intel® Embedded and Communications Alliance (Intel® ECA), announced today the Portwell WADE-8022 adopting the Mini-ITX form factor. The WADE-8022 of the Intel® platform will provide high performance and flexibility for functional expansion, such as Gaming, Kiosk, DS, Medical, Defense, Industrial automation and control applications. Haswell mobile processors is the next major architecture from Intel®. The WADE-8022 supports the latest Intel® Haswell mobile processors in BGA1364 package which has memory and PCI Express controller integrated to support 2-channel DDR3L memory and PCI Express 3.0 lanes providing great graphics performance. Intel® Haswell mobile processor is one of the most powerful and energy efficient CPU in the world. Portwell have taken advantage of such technology to furnish a series of products that can meet multiple industrial requirements such as cost-effective of CPU performance or industrial systems. WADE-8022 is based on the Intel® Haswell mobile processor with Intel® QM87 chipset. The Intel® QM87 Express Chipset, when combined with a processor from the Intel® Dual Core/Quad Core mobile processor family, delivers smart security, cost saving manageability, and Intel® ligent performance for business platforms. WADE-8022 is the first Portwell off-the-shelf product for by Intel® QM87 Express Chipset, it can be an embedded solution and a good platform for customer to integrate it to the embedded system. WADE-8022 showcased one of Portwell upcoming motherboard for the Intel®’s Haswell mobile processors. The WADE-8022 is based on the forthcoming Intel® QM87 chipset and supports the new BGA1364 type. This board has lots of features, including supports total 4x SATA 6.0 Gbps storage specification , allows RAID 0/1/5 and 10. supports the latest PCIe 3.0 (one PCI-Express x16 slot) devices for double speed and bandwidth which enhances system performance, two long-DIMM memory slot for DDR3L SDRAM up to 16GB, support total 10 USB ports (4x USB 3.0 on rear I/O, 6x USB 2.0 on board header), VGA / HDMI / DVI-D / DP / LVDS, two Gigabit Ethernet and Dual mini-PCIe slot support mSATA and normal storage. WADE-8022 User’s Manual The WADE-8022package should cover the following basic items One WADE-8022Mini-ITX Main Board One SATA Cable One I/O Shield bracket One Installation Resources CD-Title If any of these items is damaged or missing, please contact your vendor and keep all packing materials for future replacement and maintenance. z Main Processor Intel® mobile BGA processor z Chipset Intel® QM87 chipset z System BIOS AMI BIOS z Main Memory Two 204 -pin DDR3 SODIMM socket support DDR3L up to 16GB dual channel 1333/1600 MHz memory z Expansion Interface One PCIex16 - Two Mini-PCIe slot(support mSATA and normal SSD storage) - One PCIe x1 gold finger(include 2x PCI x1 signal) z SATA Interface Four SATA 6Gb ports z Serial Port Support total six comports(one RS232 and one RS232/422/485 on rear I/O,three RS232 and one RS232/422/485 on board header) z USB Interface Support Ten USB (Universal Serial Bus) ports, four USB 3.0 ports on rear I/O and six USB 2.0 ports on board header for internal devices z Audio Interface Line-Out Audio Jack on Rear I/O, Mic-In, Line-In on board header z Real Time Clock/Calendar (RTC) Support Y2K Real Time Clock/Calendar z Watch Dog Timer Support WDT function through software programming for enable/disable and interval setting - General system reset z On-board Ethernet LAN Two Gigabit Ethernet (10/100/1000 Mbits/sec) LAN ports using Intel® WGI217LM WGI210AT GbE Ethernet Controller z High Drive GPIO One pin-header for 8 bit GPIO(4bit in & 4bit out) z System Monitoring Feature Monitor system temperature and major power sources. z Outline Dimension (L x W) 170mm(6.69’’) x 170mm(6.69’’) z Power Requirements System +12V USB Loading Test (2.0) z Configuration SBC BIOS EC Version Full Loading 4.86 V/ 510 mA Intel® Celeron CPU 2000E @ 2.20GHz L3: 2Mbytes Portwell, Inc. WADE-8022 TEST BIOS ( 40820T00 ) 40717T00 ( 07/17/2014 ) WARIS DDR3L SO-DIMM 1600 1.35V/8GB*1 (Skhynix H5TC4G83AFR ) VGA Driver LAN Driver Onboard Intel® HD Graphics Intel® HD Graphics Version: 10.18.10.3496 Onboard Intel® Ethernet Connection I217-LM Intel® Ethernet Connection I217-LM Version: 12.11.96.1 Onboard Intel® I210AT Gigabit Network Connection Intel® I210AT Gigabit Network Connection Version: 12.11.97.0 Chip Driver Onboard Realtek ALC886 High Definition Audio Realtek ALC886 High Definition Audio Version: 6.0.1.7246 Intel® Chipset Device Software Version: 9.4.0.1027 Intel® USB3.0 eXtensible Host Controller Version: 6.2.9200.16384 WD WD1002FAEX 1TB LION-ON IHAS324 DVD-ROM Seasonic SSA-0651-1 DC 12V z Operating Temperature 0 °C ~ 60 °C z Storage temperature z Relative Humidity 0% ~ 90%, non-condensing 1.3.1 Mechanical Drawing 1.4 System Architecture All of details operating relations are shown in WADE-8022 System Block Diagram. WADE-8022 System Block Diagram This chapter gives the definitions and shows the positions of jumpers, headers and connectors. All of the configuration jumpers on WADE-8022 are in the proper Jumper Setting Jump Setting List is mean default JP1: GPIO Power select Connector PIN No. Signal Description 3V (Default) JP2: Dual channel LVDS VDD voltage Select VDD voltage 3.3V (Default) VDD voltage 5V JP3: LVDS BL Enable voltage Select 3-5,2-4 5V, Active High (Default) 12V, Active High 5V, Active Low 12V, Active Low JP4: WDT Function Select 1-2 short 1-2 open WDT Function enable (Default) WDT Function disable JP5: ATX / AT Mode Select ATX emulation AT mode ATX mode WADE-8022 User’s Manual J9: Audio MIC/Line-in/Line-out Connector MIC- in Left Channel Analog Ground Line-out Left Channel Line-out Right Channel Line-in Left Channel Line-in Right Channel MIC- in Right Channel J10: ATX 4Pin 12V Power Connector J11: 8Bit GPIO Connector LPC_GPJ0 LPC_GPE0 LPC_GPC0 LPC_GPG0 J13: LVDS Power Connector BL_BRIGHT BL_ENABLE J14: TPM(Trusted Platform Module) Connector PCLK_TPM LFRAME# SIO2_PLTRST# LAD3 VCC3 SMB_CLK_MAIN 3VSB LPCPD# SMB_DATA_MAIN SERIRQ J15: Dual channel LVDS Connector LCD1DO0+ LCD1CLK+ LCLK1 LCD1DO0LCD1DO1LCD1DO2LCD1DO3LCD1CLKLDATA1 LCD2DO0LCD2DO1LCD2DO2LCD2DO3LCD2CLKN/C J16/J17/J18/J19: COM3/COM4/COM5/COM6 Serial Port Connector DCD (Data Carrier Detect) TXD (Transmit Data) GND (Ground) RTS (Request to Send) RI (Ring Indicator) RXD (Receive Data) DTR (Data Terminal Ready) DSR (Data Set Ready) CTS (Clear to Send) J20: Clear CMOS Normal Clear CMOS J22/J26: SATA Power Connector J23/J24/J25: External USB Connector 5V Dual USB+ USBUSB+ J27: SMBus Connector SMBus_CLK SMBus_DAT +5V J32: SYSTEM FAN Power Connector Fan speed control Fan on/off output J37: Front Panel System Connector PWR_LED(+) PWR_LED(-) J4 LAN1_ACT(+) J4 LAN1_LINK(-) HDD_LED(+) HDD_LED(-) Speaker(+) N /C Speaker(-) J38: CPU FAN Power Connector J39:PS/2 Keyboard/Mouse Pin Header Mouse Data PS2 Power Mouse Clock Keyboard Data Keyboard Clock J41: SPI Bus Select Header 1-3, 2-4, 7-9, 8-10 CFEX Normal SW1: LVDS GPIO Switch Select ON : 0 ; OFF : 1 Default : 0001 Connector Allocation I/O peripheral devices are connected to the interface connectors. Connector Function List Audio Line Out Connector Serial port Connector (Top-COM2, COM2 Support 232/422/485 Bot-COM1) Display Port Connector (DP port) DVI-I Connector Support Dual (DVI-D,VGA) HDMI Connector USB/100+Giga Lan Connector (LAN2) I210IT (LAN1) I217LM Audio MIC/Line-in/ Line-out Connector ATX 4Pin 12V Power Connector 8Bit GPIO Connector LVDS Power Connector TPM(Trusted Platform Module) Dual channel LVDS Connector J16、J17、J18、 COM3/COM4/COM5/COM6 Serial Port Connector Clear CMOS Select HEADER PCI-E x16 Slot Support PCI-E Gen3 J22、J26 SATA Power Connector J23、J24、J25 External USB Connector SMBus Connector Mini PCIe Slot Only Support Mini PCIe Only Support mSATA SO-DIMM Slot Only Support DDR3L Memory System FAN Power Connector J33、J34、J35、 SATA Connector(6Gb/s) Front Panel System Connector CPU FAN Power Connector PS/2 Keyboard/Mouse Pin Header CFEX Card slot SPI Select HEADER This chapter provides you with instructions to set up your system. The additional information is enclosed to help you set up onboard PCI device and handle Watch Dog Timer (WDT) and operation of GPIO in software programming. Intel® Haswell Processor The Main Processor of the WADE-8022 is Intel® Celeron Haswell 2000E 2.2GHz Processor (BGA Type) WADE-8022 can support 4th Generation Mobile Celeron/Core Haswell i3/i5/i7 Processors (BGA Type) by optional. Main Memory WADE-8022 provide 2 x 204 pin DIMM sockets (Dual Channel) which supports Dual channel 1333 DDR3L-SO-DIMM (1.35V) Non-ECC (Error Checking and Correcting), non-register functions as main memory. The maximum memory can be up to 16GB. Memory clock and related settings can be detected by BIOS via SPD interface. The 2 DIMMs per channel only supported in Quad-Core package (1333 MT/s only) For system compatibility and stability, do not use memory module without brand. Memory configuration can be set to either one double-sided DIMM in one DIMM socket or two single-sided DIMM in both sockets. Beware of the connection and lock integrity from memory module to socket. Inserting improperly it will affect the system reliability. Before locking, make sure that all modules have been fully inserted into the card slots. To insure the system stability, please do not change any of DRAM parameters in BIOS setup to modify system the performance without acquired technical Installing the Mini-ITX Board Computer To install your WADE-8022 into standard chassis or proprietary environment, please perform the following: Step 1: Check all jumpers setting on proper position Step 2: Install and configure CPU and memory module on right position Step 3: Place WADE-8022 into the dedicated position in the system Step 4: Attach cables to existing peripheral devices and secure it Please ensure that SBC is properly inserted and fixed by mechanism. Please refer to section 3.3.1 to 3.3.4 to install INF/VGA/LAN/Audio drivers. Chipset Component Driver WADE-8022 uses Intel® QM87 Lynx Point chipset. It’s a new chipset that some old operating systems might not be able to recognize. To overcome this compatibility issue, for Windows Operating Systems such as Windows 7, please install its INF before any of other Drivers are installed. You can find very easily this chipset component driver in WADE-8022 CD-title. Intel® Integrated Graphics Controller WADE-8022 uses Intel® PCH integrated graphic chipset to gain an outstanding graphic performance. WADE-8022 supports DP (3200 x 2000 resolution), HDMI (4096 x 2304 resolution), LVDS (18/24bit single & Dual port, 1920x1200 resolution)from onboard Shark Bay BGA processor, DVI-I (DVI+VGA, 1920 x 1200 resolution) from QM87 PCH display output. Processor integrated 3D graphics Media Accelerator . Supports DX11.1, OpenGL 3.1, MPEG-2, Shader Model 4.0. WADE-8022 can support triple display output. Drivers Support Please find the Graphic drivers in the WADE-8022 CD-title. Drivers support Win7. Gigabit Ethernet Controller Please find Intel® WGI217LM and WGI210AT LAN drivers in /Ethernet directory of WADE-8022 CD-title. The drivers support Win7. Please find ALC886 (High Definition Audio driver) form WADE-8022 CD-title. The drivers support Win7. Clear CMOS Operation The following table indicates how to enable/disable Clear CMOS Function hardware circuit by putting jumpers at proper position. Clear CMOS EC WDT #include <dos.h> #define EC_DATA 0x62 #define EC_CMD 0x66 #define EC_CMD_READ 0x80 #define EC_CMD_WRITE 0x81 #define WDT_MODE 0x06 /* WDT Select mode. */ #define WDT_MIN 0x07 /* Minute mode counter */ #define WDT_SEC 0x08 /* Second mode counter */ /* Use port 62 and port 66 to access EC command / data. */ static int IBF_Check() unsigned char IBF_status; delay(2); outportb (EC_CMD, IBF_status); } while (IBF_status & 0x02); static int OBF_Check () unsigned char OBF_status; OBF_status = inportb (EC_CMD); } while (!(OBF_status & 0x01)); static void Write_EC (unsigned char index, unsigned char data) IBF_Check (); outportb (EC_CMD, EC_CMD_WRITE); outportb (EC_DATA, index); outportb (EC_DATA, data); static unsigned char Read_EC (unsigned char address) unsigned char data; outportb (EC_CMD, EC_CMD_READ); outportb (EC_DATA, address); OBF_Check(); data = inportb (EC_DATA); void EC_WDT_Trigger () /* WDT Counter */ Write_EC (WDT_SEC, 0x05); /* if use minute mode */ /* Write_EC (WDT_MIN, 0x05); */ /* 0x01 is second mode */ /* 0x03 is minute mode */ Write_EC (WDT_MODE, 0x01); int main () EC_WDT_Trigger (); for (i = 0; i < 5; i++) printf ("Reset counter ...................%d\n", 5 - i); delay (1000); EC GPIO #define GPIO_DIR 0x2B #define GPIO_DATA 0x2C unsigned char d2; printf("\n\n"); printf("WADE-8079 GPIO TEST Program v1.0\n"); printf("Please short the following pins with 2.54mm-pitched jumper on JP8\n"); printf("GPIO1 ---- GPIO2\n"); printf("GND xxxx Vcc <==PWR/GND them!\n\n"); printf("LED Test Begins...\n"); pins, /* Set GPIO Port In/Out mode */ Write_EC (GPIO_DIR, 0x00); sleep (2); printf("Write_EC mode 0x00\n"); /* Set Low or High */ Write_EC (GPIO_DATA, 0xFF); printf("Write_EC data 0xFF\n"); Write_EC (GPIO_DATA, 0x00); printf("Write_EC data 0x00\n"); BIOS Setup Information WADE-8022 uses AMI BIOS structure stored in Flash ROM. These BIOS has a built-in Setup program that allows users to modify the basic system configuration easily. This type of information is stored in CMOS RAM so that it is retained during power-off periods. When system is turned on, WADE-8022 communicates with peripheral devices and checks its hardware resources against the configuration information stored in the CMOS memory. If any error is detected, or the CMOS parameters need to be initially defined, the diagnostic program will prompt the user to enter the SETUP program. Some errors are significant enough to abort the start up. Entering Setup - Launch System Setup Power on the computer and the system will start POST (Power On Self Test) process. When the message below appears on the screen, press <Del> key will enter BIOS setup screen. Press <Del> to enter SETUP If the message disappears before responding and still wish to enter Setup, please restart the system by turning it OFF and On or pressing the RESET button. It can be also restarted by pressing <Ctrl>, <Alt>, and <Delete> keys on keyboard simultaneously. Press <F1> to Run SETUP or Resume The BIOS setup program provides a General Help screen. The menu can be easily called up from any menu by pressing <F1>. The Help screen lists all the possible keys to use and the selections for the highlighted item. Press <Esc> to exit the Help screen. Use this menu for basic system configurations, such as time, date etc. BIOS Information, Memory Information These items show the firmware and memory specifications of your system. Read only. System Date The date format is <Day>, <Month> <Date> <Year>. Use [+] or [-] to configure system Date. System Time The time format is <Hour> <Minute> <Second>. Use [+] or [-] to configure system Time. Configutation Use this menu to set up the items of special enhanced features. CPU Configuration CPU Configuration Parameters Active Processor Cores Number of cores to enable in each processor package Choices: All, 1. Intel® Virtualization Technology When enabled, a VMM can utilize the additional hardware capabilities provided by Vanderpool Technology. Choices: Disabled, Enabled. Enable/Disable Intel® SpeedStep. CPU C states Enable or disable CPU C states Enhanced C1 states (CPU C states Enabled) Enhance C1 state CPU C3 Report (CPU C states Enabled) Enable/Disable CPU C3 report to OS Choices: Disabled, CPU C7, CPU C7s. Chipset Configuration Configuration Chipset feature High Precision Timer Enable or Disable the High Precision Event Timer. Control Detection of the Azalia Device. Disabled = Azalia will be unconditionally disabled. Enabled = Azalia will be unconditionally Enabled. Port 80h Redirection Control where the Port 80h cycles are sent [LPC BUS] Forward I/O Port 80 to LPC [PCIE BUS] Forward I/O Port 80 to PCIE Subtractive device Choices: LPC BUS, PCIE BUS. AMT Configuration Configure Active Management Technology Parameters Intel® AMT Enable/Disable Intel® Active management technology BIOS Extension Note: iAMT H/W is always enabled. This option just controls the BIOS extension execution. If enabled, this requires additional firmware in the SPI device Un-configure ME OEMFlag Bit 15: Un-configure ME without password. Disable ME Set ME to Soft Temporary Disabled. Memory Configuration Memory Configuration Parameters (Read Only) LAN Configuration Configuration On Board LAN device. Launch PXE OpROM policy Controls the execution of UEFI and Legacy PXE OpROM Choices: Disabled, UEFI only, Enabled. Intel® LAN I217 Controller Enable or disable onboard NIC. Choices: Enabled, Disabled. Wake on LAN I217 Enable or disable integrated LAN to wake the system. (The Wake On LAN cannot be disabled if ME is on at Sx state.) Graphic Configuration Configuration Graphics Settings Select which of IGFX/PEG/PCI Graphics device should be Primary Display Or select SG for Switchable Gfx. Choices: Auto, IGFX, PEG, PCIE. Primary PCIE Select PCIE4/PCIE5 Graphics device should be Primary PCIE. Choices: Auto, PCIE4, PCIE5. Select the Aperture Size. Choices: 128MB, 256MB, 512MB. DVMT Pre-Allocated Select DVMT 5.0 Pre-Allocated (Fixed) Graphics Memory size used by the Internal Graphics Device. Choices: 32M, 64M, 96M, 128M, 160M, 192M, 224M, 256M, 288M, 320M, 352M, 384M, 416M, 448M, 480M, 512M, 1024M. DVMT Total Gfx Mem Select DVMT 5.0 Total Graphic Memory size used by the Internal Graphic device. Choices: 128M, 256MB, MAX. Primary IGFX Boot Display Select the Video Device which will be activated during POST. This has no effect if external graphics present. Secondary boot display will appear based on your selection. VGA modes will be supported only on primary display. Choices: VBIOS Default, VGA, DP, LVDS, DVI HDMI. Secondary IGFX Boot Display Select Secondary IFGX Boot Display Device. Choices: Disabled, DP, LVDS, DVI, HDMI. PCI/PCIE Configuration PCI, PCI-X and PCI Express Settings. PCI Latency Timer Value to be programmed into PCI Latency Timer Register Choices: 32 PCI Bus Clocks, 64 PCI Bus Clocks, 96 PCI Bus Clocks, 128 PCI Bus Clocks, 160 PCI Bus Clocks, 192 PCI Bus Clocks, 224 PCI Bus Clocks, 248 PCI Bus Maximum Payload Set Maximum Payload of PCI Express Device or allow System BIOS to select the Choices: Auto, 128 Bytes, 256 Bytes, 512 Bytes, 1024 Bytes, 2048 Bytes, 4096 Bytes. Maximum Read Request Set Maximum Read Request size of PCI Express Device or allow System BIOS to select the value. CPU PCI Express Configuration CPU PCI Express Configuration settings PEG0 – Gen X Configure PEG0 B0:D1:F0 Gen1-Gen3 Choices: Auto, Gen1, Gen2, Gen3 PEG0 – ASPM Control ASPM support for the PEG Device. This has no effect if PEG is not the currently active device. Choices: Disabled, Auto, ASPM L0s, ASPM L1, ASPM L0sL1. Enable PEG To enable or disable the PEG Choices: Disabled, Enabled, Auto. PCH PCI Express Configuration PCH PCI Express Configuration settings PCI Express Root Port 1-5, Port8 PCI Express Root Port 1-5 Settings Port 1-5, Port8 (x1) Control the PCI Express Root Port ASPM PCI Express Active State Power Management settings Choices: Disabled, L0s, L1, L0sL1, Auto PCIe Speed Select PCI Express port speed. Choices: Auto, Gen1, Gen2. SATA Configuration SATA Device Options Settings SATA Controller(s) Enable or disable SATA Device. SATA Mode Selection Determines how SATA controller(s) operate. Choices: IDE, AHCI, RAID. SATA Controller Speed Indicates the maximum speed the SATA controller can support. Choices: Default, Gen1, Gen2, Gen3. Alternate ID (RAID Mode only) Report alternate Device ID Port 0-5 Enable or Disable SATA Port Hot Plug Designates this port as Hot Pluggable Mechanical Presence Switch (For Serial ATA Port 0-3 only) Controls reporting if this port has an Mechanical Presence Switch. Note: Requires hardware support. External SATA External SATA Support SATA Device Type Identify the SATA Port is connected to Solid State Drive or Hard Disk Drive. Choices: Hard Disk Drive, Solid State Drive. USB Configuration USB Configuration Parameters Legacy USB Support Enables Legacy USB support. AUTO option disables legacy support if no USB devices are connected. DISABLE option will keep USB devices available only for EFI applications. Choices: Enabled, Disabled, Auto. XHCI Hand-Off This is a workaround for OSes without XHCI hand-off support. The XHCI ownership change should claim by XHCI driver. EHCI Hand-Off This is a workaround for OSes without EHCI hand-off support. The EHCI ownership change should claim by EHCI driver. USB Mass Storage Driver Support Enable/Disable USN Mass Storage Driver Support. PCH USB Configuration PCH USB Configuration settings USB Port #0-11 Disable USB Port Power Control Configuration System Power Control Configuration Parameters Enable Hibernation Enables or Disables System ability to Hibernate (OS/S4 Sleep State). This option may be not effective with some OS. ACPI Sleep State Select the ACPI Sleep state the system will enter when the SUSPEND button is pressed. Choices: S3 only (Suspend to RAM). Power Loss Function Control SIO Power Loss Function, ON is always ON, OFF is always OFF, Last state will depends on last power state. Choices: Always Off, Always On, Last State. Wake system with Fixed Time Enable or disable system wake on alarm event. When enabled, System will wake on the hr::min::sec specified. Wake up Day of Month Select 0 for daily system wake up 1-31 for which day of the month that you would like the system wake up. Choices: 1-31. Wake up hour Select 0-23 for example enter 3 for 3am and 15 for 3pm. Wake up minute Wake up second Wake up Ring Enable or Disable Wake on Ring form OS. TPM Configuration Trusted Computing Settings Security Device Support Enables or Disables BIOS support for security device. O.S. will not show Security Device. TCG EFI protocol and INT1A interface will not be available. Choices: Disable, Enable. Super IO Configuration System Super IO Chip Parameters Watch Dog Timer Enable/Disable Watch Dog Timer Timer Unit Select Timer count unit of WDT. Choices: Second, Minute. Timer value Select WDT Timer value Seconds Range: 10 to 255 Choices: 10-255. Serial Port 1-6 Enable or Disable Serial Port 1-6 (COM) RS-232/422/485 Control Option (For Serial Port2 only) Serial Port2 RS-232/422/485 Control Option Choices: RS-232, RS-422, RS-485. H/W Monitor Monitor hardware status CPU Smart Fan Control Control Which Mode for CPU Smart Fan use. Choices: Disabled, Thermal Cruise Mode. Smart Fan Start Temperature Set Temperature for Start CPU Smart Fan (40 to 105) Choices: 40-105 Smart Fan Full Speed Temperature Set Temperature for Smart Fan Full Speed (40 to 105) Serial Port Console Redirection Serial Port 1 (Disabled) Console Redirection Console Redirection Enable or Disable Bootup Num-Lock State Select the keyboard Numlock state. Choices: On, Off. GateA20 Active UPON REQUEST – GA20 can be disabled using BIOS services. ALWAYS – do not allow disabling GA20; this option is useful when any RT code is executed above 1MB. Choices: Upon Request, Always. Option ROM Messages Set display mode for Option ROM. Choices: Force BIOS, Keep Current. INT19 Trap Response BIOS reaction on INT19 trapping by Option ROM: IMMEDIATE – execute the trap right away; POSTPONED – execute the trap during legacy boot. Choices: Immediate, Postponed. Launch Storage OpROM BIOS reaction on INT19 trapping by Option ROM: IMMEDATE – execute the trap right away; POSTPONED – execute the trap during legacy boot. Full Screen Logo Enables or Disables Quiet Boot option and Full screen Logo. Post Report Post Report Support Enabled/Disabled. Summary Screen Summary Screen Support Enabled/Disabled. Fast Boot Enables or Disables boot with initialization of a minimal set of devices required to launch active boot option. Has no effect for BBS boot options. Choices: Disable Link, Enabled. Boot mode select Select boot mode LEGACY/UEFI. Choices: LEGACY, UEFI. Boot Option #1-7 Sets the system boot order Choices: Hard Disk, CD/DVD, USB Hard Disk, USB CD/DVD, USB Key, USB Floppy, Network, Disabled. Administrator Password Set Setup Administrator Password Set User Password Save Changes and Reset Reset the system after saving the changes. Pressing <Enter> on this item asks for confirmation: Save configuration and reset. Discard Changes and Exit Reset system setup without saving any changes. Restore/Load Default values for all the setup options. This chapter provides a few useful tips to quickly get WADE-8022 running with success. As basic hardware installation has been addressed in Chapter 2, this chapter will primarily focus on system integration issues, in terms of BIOS setting, and OS diagnostics. Hardware Quick Installation ATX Power Setting Unlike other Mini-ITX board computer, WADE-8022 supports ATX only. Therefore, there is no other setting that really needs to be set up. You must connect to J1 (12V DC Jack) or J10 (ATX 4Pin 12V Power Connector) to let WADE-8022 power on. ATX Power emulation AT Mode You can adjust the JP5 to 1-2 short to emulation the AT mode. It can let system auto power on when J1 or J10 has been detected your power source directly. ATX mode Please note that you still need to use 12V adapter or ATX power supply to use!! Serial ATA Hard Disk Setting for IDE/AHCI/RAID Unlike IDE bus, each Serial ATA channel can only connect to one SATA hard disk at a time; there are total four connectors, J33, J34, J35, J36 SATAIII (6Gb/s) ports on-board. The SATA hard disk doesn’t require setting up Master and Slave, which can reduce mistake of hardware installation. All you need to operate IDE, AHCI or RAID (0,1,5,10) application for system, please follow up setting guide in BIOS programming (Table 5-1); Furthermore, you can consult chapter 4.3 Advanced “SATA Configuration” part of the” SATA Mode Selection”. Table. 5-1 SATA Mode setting guide System BIOS Main Menu SATA Mode Selection …….………… [Press enter] SATA Mode…… [IDE/AHCI /RAID Mode] CFEX support The J40 (CF 50pin socket) supports CFEX. (Has SATA signal). mSATA device support The J28 (Mini-PCIe slot) has SATA signal can support mSATA device. BIOS Setting It is assumed that users have correctly adopted modules and connected all the devices cables required before turning on ATX power. 204-pin DDR3 SO-DIMM Memory, keyboard, mouse, SATA hard disk, DVI-I connector, device power cables, ATX accessories are good examples that deserve attention. With no assurance of properly and correctly accommodating these modules and devices, it is very possible to encounter system failures that result in malfunction of any device. To make sure that you have a successful start with WADE-8022, it is recommended, when going with the boot-up sequence, to hit “Del” or “Esc” key and enter the BIOS setup menu to tune up a stable BIOS configuration so that you can wake up your system far well. Loading the default optimal setting When prompted with the main setup menu, please scroll down to “Restore Defaults”, press “Enter” and select “Yes” to load in default optimal BIOS setup. This will force your BIOS setting back to the initial factory configuration. It is recommended to do this so you can be sure the system is running with the BIOS setting that Portwell has highly endorsed. As a matter of fact, users can load the default BIOS setting any time when system appears to be unstable in boot up Improper Disable Operation There are too many occasions where users disable a certain device/feature in one application through BIOS setting. These variables may not be set back to the original values when needed. These devices/features will certainly fail to be detected. When the above conditions happen, it is strongly recommended to check the BIOS settings. Make sure certain items are set as they should be. These include the Serial Port1/ Serial Port 2 ports, USB ports, external cache, on-board VGA and Ethernet. It is also very common that users would like to disable a certain device/port to release IRQ resource. A few good examples are Disable Serial Port1 to release IRQ #4 A quick review of the basic IRQ mapping is given below for your reference. It is then very easy to find out which IRQ resource is ready for additional peripherals. If IRQ resource is not enough, please disable some devices listed above to release further IRQ numbers. Question: I forget my password of system BIOS, what am I supposed to do? Answer: You can simply short 2-3 pins on J20 to clean your password. Question: How to update the BIOS file of the WADE-8022? 1. Please visit web site of the Portwell download center as below hyperlink and register an account. (The E-Mail box should be an existing Company email address that you check regularly.) http://www.portwell.com.tw/member/newmember.php 2. Input your User name and password to log in the download center. 3. Select the “Search download” to input the keyword “WADE-8022”. 4. Find the “BIOS “page to download the ROM file and flash utility. 5. Execute the zip file to root of the bootable USB pen drive which can boot to DOS mode. 6. Insert your bootable USB pen drive in WADE-8022 board and power-on. 7. Boot to DOS mode then input the “Update” command to start to update BIOS process. 8. Switch “Off” the Power Supply when you finished the update process. 9. Wait 5 seconds then switch “ON” the Power Supply then press the “Del” or “Esc” key to BIOS to select “Load Setup Defaults” and then select “Exit Saving Changes” option. Please visit our Download Center to get the Catalog, User manual, BIOS, and driver http://www.portwell.com.tw/support/download_center.php If you have other additional technical information or request which is not covered in this manual, please fill in the technical request form as below hyperlink. http://www.portwell.com.tw/support/problem_report.php We will do our best to provide a suggestion or solution for you. System Memory Address Map Each On-board device in the system is assigned a set of memory addresses, which also can be identical of the device. The following table lists the system memory address used for your reference. Memory Area 0000 – 003F 0070 – 0E2E 0E2F - 0F6B 0F6C – 9D7F First Meg Interrupt Area BIOS Data Area System Data -- Conventional memory end at 630K -- 9D80 – 9EFF 9F00 – 9FFF A000 - AFFF B000 – B7FF B800 - BFFF C000 - CEBF CEC0 - EFFF F000 - FFFF Extended BIOS Area VGA Graphics VGA Text Video ROM System ROM First 64K Extended Interrupt Request Lines (IRQ) Peripheral devices can use interrupt request lines to notify CPU for the service required. The following table shows the IRQ used by the devices on board. Interrupt Request Lines IRQ IRQ# IRQ 0 IRQ 10 Default Use System Timer Keyboard Event Usable IRQ Diskette Event IBM Mouse Event Coprocessor Error Hard Disk Event WADE-8022 - Portwell Manual 20198258 WADE-8079 User`s Manual WADE-8078 (AMI BIOS) User`s Manual NANO-6060 User`s Manual NANO-6060 User's Manual Features Specifications Ordering Information BX-800W User`s Manual WADE-8075/WADE-8076 User`s Manual 实现新的 物联网设计 第五代智能英特尔 WEBS-3581_Manual_V1 0
cc/2021-04/en_middle_0086.json.gz/line10221
__label__wiki
0.535379
0.535379
Where the buzz of West End shopping meets the tranquillity of Hyde Park strolls, an emerging commercial quarter has grown into a premier destination for business, socialising and eating out, all within a stone’s throw of one of the UK’s treasured national monuments. There is huge scope for economic growth and success in this 24/7 district. We want to improve the look and feel of the area and encourage business and leisure to thrive. Businesses want to see an improved operating environment which is safer for their customers, staff and guests. Surrounding communities and schools want the same. Working with Transport for London the BID is bringing forward a package of crossing safety improvements, the length of Edgware Road, from the Marylebone Flyover and Joe Strummer Subway, to Seymour Street in the south. The space around the Marble Arch monument is bigger than Trafalgar Square, and deserves to be a jewel in central London’s crown. The BID is working with major landowners and Westminster City Council to see a staged series of public realm interventions, breathing new life into Marble Arch. The BID introduced Edgware Road’s very first Christmas Lights in 2016, in response to business requests. These light up the district every year and provide a boost at the busiest time of the year for our retail members. Air quality continues to be a priority for Londoners. The district is bisected by London’s inner ring road, the A5 Edgware Road, which carries a significant amount of freight, buses and taxis every day. The BID encourages our members to make use of our designated Collect:Collect platform to reduce the number of freight and delivery vehicles on the road, as well as DeliverBEST, the diagnostic tool that instantly provides businesses with bespoke recommendations relating to procurement, waste, fleet and staff behaviour change based on the organisation’s needs. We make it easier for local businesses and organisations to procure sustainably, through initiatives such as West End Buyers Club and Click:Collect. The BID is forging ahead to bring additional green infrastructure to Edgware Road in particular. If you have concerns about a particular area or want to raise an issue with us please email us. See the results of our first crossing improvement package, at Great Cumberland Place. We launched the Wild West End Garden in June 2018. Cleaning up London’s air requires us all to take action. Your contribution could start today. Find out how Click:Collect can work for your business. Green Man Crossings at Upper Berkeley Street and Connaught Street Work by Transport for London to introduce green man crossings on side roads at the junction of Upper Berkeley Street,… Covid-19 Recovery Grants From The London Business Hub The London Business Hub will be accepting applications from Small and Medium Enterprises (SMEs) for Covid-19 Recovery Grants this month. If… Climate Change Workshops for Businesses Event: 5 November 11am, 12 November 11am, 19 November 3.30pm, 26 November 11am, 3 December 11am, 10 December 3.30pm Buildings are the largest emission source in Westminster with commercial and institutional buildings accounting for 71% of carbon emissions. Westminster… Crossing works resume at George Street/Kendal Street Junction We’re delighted to report that crossing works will resume at the junction of Edgware Road, George Street and Kendal Street… Edgware Road Insights Study Marble Arch London BID has commissioned an Edgware Road Insights Study. The primary aim of the study is to establish… Westminster City Council Rolls Out 20mph Speed Limit Following consultation with residents, businesses and local groups, Westminster City Council has introduced a 20mph speed limit across the borough,… TfL Launches New Travel App: TfL Go Transport for London has launched a new travel app, TfL Go, to help everyone get around London. The app is… When to Wear a Face Covering On 24 July face coverings became mandatory in England in shops, supermarkets, and enclosed transport hubs. The best available scientific… Secure Bicycle Storage for Businesses As businesses begin to return to offices across the district, we are helping our members access safe and sustainable travel…
cc/2021-04/en_middle_0086.json.gz/line10223
__label__cc
0.602859
0.397141
Corporate, Commercial & Civil Litigation Lawyer Toronto 416-681-9615 mark@markdonaldlaw.com Mark Donald Toronto-based Independent Lawyer Corporate Commercial Litigation Social Justice & Human Rights Libel & Defamation & Civil Litigation Mark Donald Law is a boutique litigation firm that specializes in the resolution of disputes for individuals, families, businesses and corporations. This includes corporate and commercial litigation, social justice and human rights issues, libel and defamation, administration and regulatory litigation, bankruptcy, mortgage & real estate litigation. Litigation can be complex and exhaust your resources. Find out what your options are. Litigation can be complex and exhaust your resources. Find out what your options are. Mark Donald Law Corporate Commercial Civil Litigation in Toronto Mark Donald Law provides optimal solutions to complex legal issues through the pursuit of unrelenting excellence and high-quality, results-oriented advice and trusted counsel. We provide only superior litigation and advocacy. We measure ourselves by our results. If you have a high-stakes dispute and require legal advice involving litigation, libel and defamation, Social justice and human rights, shareholder and partnership disputes–we should talk. MDL recognizes that litigation can be difficult and may take a long time to resolve. Mark Donald Law believes in being forthright and truthful about attaining client’s goals. MDL will recommend the best solution for your issue and negotiate or litigate with the same diligence and work that reflects our best efforts. ABOUT Mark Donald Principal, Mark Donald Law Mark has argued before the Ontario Superior Court, the Ontario Divisional Court and the Ontario Court of Appeal in numerous, diverse disputes. He has also argued before numerous administrative/regulatory boards, including the Canadian Memorial Chiropractic College, the Human Rights Tribunal of Ontario, and the Landlord and Tenant Board of Ontario. Mark possesses an extensive background in civil liberties, media law and human rights litigation. As former summer law student at the Canadian Civil Liberties Association, Mark was on the front lines of the 2010 Toronto G20 protests, and represented the CCLA’s position on the CBC. Armed with this experience, Mark maintains an active practice involving defamation and online harassment matters. Mark has been called to the Bars of Ontario and has practiced in Nunavut. How Mark Donald Law Can Help You Commercial litigation involves legal disputes between companies, businesses and individuals related to areas including– breach of contracts, preservation of assets, fraud, shareholder-partnership and director disputes, libel, defamation, social justice and human rights. Human rights laws prohibit discrimination and harassment related to race, colour, ancestry, religion, ethnic origin, sexual orientation, age, marital or family status and other related areas. The law of defamation holds that for a publication to be legally libelous, a court must be convinced that the average person on the street hearing/reading the statement would think less of the plaintiff to whom the statement refers. Business partners don’t always get along. Disputes can be damaging and disruptive to companies, shareholders, and employees. That’s why they need to be handled quickly and effectively to minimize possible damage and financial ruin. Mark Donald Law blog Sports & Parents – Avoiding the Parent Trap: 5 Tips to Calm the Waters When Things Go South with Your Child’s Coaches and Sports Clubs Cyberbullying & Revenge Porn: Why You Need To Act Fast Cyberbullying & Revenge Porn: Why You Need To Act Fast Online harassment: a growing problem…… Cyber-bullying and revenge porn is worrisome trend. Statistics Canada reports… Mark Donald Addresses the Philippine Press Club of Ontario on Defamation, Journalistic Responsibility and the Importance of a Free Press This past April 29th, Mark Donald had the privilege of making remarks on journalistic responsibility to the dedicated members of the Philippine Press Club of… Mark acts for plaintiffs and defendants in the following areas: Bankruptcy/insolvency matters Employment termination disputes including confidentiality, non-solicitation and non-competition cases Online harassment, breach of privacy and unlawful disclosure of intimate materials Professional negligence and misfeasance complaints by lawyers, nurses, insurance brokers and investment advisors Defamation and media law matters Debtor/creditor negotiations Construction lien cases Commercial and residential lease disputes Human rights matters 1 Dundas Street West, Suite 2500 F: 416. 441.0315 © 2018 Mark Donald Law
cc/2021-04/en_middle_0086.json.gz/line10224
__label__cc
0.675825
0.324175
Contact | Where I'm Represented | Shipping Human Form (NSFW) Solymar on Phthalo Green Howard's intensive of study of the human form includes a wide variety of live models and colors variation. 40" x 30" Oil on Canvas (1.5 in profile) Default Title for $4,800.00 USD About Mark T. Howard Life-long painter, Mark Howard works in the 2-dimensional art form, with an astonishing array of styles and techniques. Howard has undergone decades of superior instruction, mentorship and self-development. Countless great master painters from Leonardo Di Vinci, Claude Monet, Edgar Degas, Picasso to Marc Rothko have greatly influenced Howard’s work. In this light, Howard’s main focus areas include: Plein Air, Life Painting, Impressionism, Cubism and Contemporary Abstraction. Howard works in acrylics, oils and non-traditional mediums. He is an accomplished North Shore surfer; an award-winning illustrator; and has earned an MBA from Hawaii Pacific University, a BBA, and a BA in Art from University of Hawaii Manoa. Howard resides in Waialua, on Oahu’s North Shore. Located in Waialua, HI • email Mark Biography | Resume | All Contents © 2021 to Mark T. Howard. All Rights Reserved.
cc/2021-04/en_middle_0086.json.gz/line10226
__label__wiki
0.71455
0.71455
Golf in NM, Local Golf News Could Unleashed Dogs Spell Doom for UNM North GC? 0 newmexicogolfnews September 22, 2019 10:58 am July 13, 2020 UNM North Green-Space Deal Could Be Scrapped, Neighbors Fear Dogs Running Free Damage Course, Endanger People, Pets (This story was updated on Oct. 1 with UNM comment) We love the UNM North Golf Course so much, we’re killing it. That’s the message Sara Koplik of the North Campus Neighborhood Association delivered at a public meeting at the UNM Law School Saturday morning. In 2012, the neighborhood association turned back an attempt by UNM to develop the 9-hole golf course into a $60 million retirement complex. The proposal would have deprived the area of one of the largest patches of green space in the city. A compromise was reached. UNM and Bernalillo County struck a deal to keep the course’s dirt perimeter trail open to walkers, runners and dog walkers for 15 years. Now, seven years in, there are fears that unleashed and aggressive dogs that damage the course and threaten injury to people and other dogs may lead the university to scrap the green-space deal and forge ahead with development. UNM could opt out of the deal with 90 days notice, according to neighborhood association board members. Although the rules of use for the green space call for dogs to be leashed and non-golfers and their pets to stay off the golf course’s turfed areas during golfing hours, the rules are widely ignored. Dogs have damaged greens, dug in bunkers and tee boxes, and menaced and injured other dogs and people. Neighbors See UNM North as Neighborhood Resource A deal with the university in 2012 allows non-golfers on the perimeter of the 9-hole golf course. As many as 100 people with leashed or unleashed dogs can be seen on the course at one time, Koplik told the meeting of about 30 people who gathered to seek a solution to the dog problem. “We have had people bitten and we have had one dog that was killed,” she said. “The hawks are gone. The bunnies are gone.” A woman named Miranda told the meeting, “I’ve seen people attacked. I’ve seen dogs attacked. I’ve seen people crying.” Lucy Casteñada, the golf course’s superintendent who works for the course’s maintenance contractor, Mountain West Golfscapes, said her crew spends between three and a half to five hours a day repairing damage that unleashed dogs cause to greens, bunkers and tee boxes. Bernalillo County Commissioner Maggie Hart-Stebbins, who helped appropriate county money to fund irrigation upgrades to the course, spoke to the meeting. “Some people don’t feel safe with dogs running around loose,” she said. “We have to figure out a way that everyone, walkers, runners, children, feel safe.” Not everyone at the meeting believes there’s a problem. An Army veteran who walks his dog for therapy told the meeting he believes damage to the golf course is being caused by “unskilled golfers.” Distrust of University’s Plans for UNM North The meeting’s organizers warned that if the neighborhood association doesn’t step up to address the problem, UNM could use it as an excuse to bulldoze what neighbors call a “magical place.” UNM officials weren’t invited to the meeting, Koplik acknowledged in answer to a question. She said the neighborhood association’s priority is for stakeholders to develop consensus on a solution before approaching the university. Tim Davis, a neighborhood association board member, said, “I do not think that UNM’s agenda and the agenda of the neighborhood association align.” “We’re dealing with an entity that is extremely obtuse,” he said. “There has to be a unified approach.” Koplik, who led the movement to block UNM’s development proposal in 2012, said UNM isn’t ticketing people with unleashed dogs. “They’d rather have us fail,” she said. “We can’t fail.” On Oct. 1., New Mexico Golf News spoke to Tom Neal, UNM's director of real estate. Neal said, “There is no intent nor appetite for ceasing operations of the UNM North Golf Course.” He called the neighborhood association's fears “much ado about nothing.” While the 2012 initiative may have given rise to lingering concerns, “There are no conversations ongoing at present” about altering the university's deal with the county, Neal said. UNM North Sits on Valuable Real Estate Albuquerque City Councilor Isaac Benton, who attended the meeting, said, “This is prime real estate. I can’t speak for UNM, but they’d rather…” before trailing off to address a questioner. Later in the meeting, Davis said the golf course land is easily worth “several hundred million dollars.” He called it “some of the most valuable real estate in New Mexico.” Davis and others active in the association made clear that they believe UNM’s long-term plan is to wait out its neighbors, tear up the golf course and build on it. Ignorance of Green-Space Rules Some at the meeting believe some dog owners don’t realize that dogs on the turfed areas interfere with play; nor do they realize the danger they face of being hit with golf balls while they and their pets are on the golf course. “I’ve approached people to tell them to stay away from the greens,” Casteñada said, “and they look around [and say], ‘It’s all green.’” In one case, she told a man whose dog was digging in a bunker to stay off the course. As she was left, he saw him go right back. “He flipped me off,” she said. Solutions Proposed Ideas floated at the meeting included more signage on the leash requirement; enlisting neighborhood volunteers to hand out cards listing the rules of use for the green space; reinforcing a current requirement that dogs and their owners may go on the course only after the flagsticks are removed st dusk; and establishing an annual dog-walking permit. This Google Earth map shows an area of vacant UNM land (shaded pink), a portion of which some neighbors believe could become a dedicated dog park. An idea that appeared to generate the most support was converting UNM-owned land west of the course, known in the neighborhood as the “barren fairways,” into a dedicated dog park with landscaping, shade and amenities to draw people and their pets off the golf course proper. The area, which lies east of a north-south Albuquerque Metropolitan Flood Control Authority ditch bordering the golf course, is currently wasteland. It has been used by UNM as a dumping ground for tree limbs and dead sod. Who would pay for its construction and maintenance was not clear. One neighborhood resident suggested a solution developed in Scottsdale, Ariz. There, city authorities developed three dog parks where dogs can run free. One of them, the Chapparal Dog Park, features three fenced areas – one section for timid togs, another for active dogs and a third to be rotated into use during maintenance of one of the other two. If that becomes the ultimate solution, Davis said getting approval for construction could take years. In the meantime, “If we allow chaos to reign, UNM will try to drive a wedge between factions,” he said. “We’ve reached a tipping point, unfortunately,” Koplik said. Update: Brad Lardon… Las Campanas Pro at 8-under, 4 Shots Behind Winner Scott Herbert of Traverse City, Mich., Takes Title (Updated Sunday afternoon) Brad Lardon, director of golf… Ladera Neighbors Are… (ALBUQUERQUE, N.M.) May 6, 2011 -- Analysis/opinion. Bob McCannon and his fellow West Side neighbors are perhaps city golfers' best chance of turning around the… UNM Budget Woes Copyright by New Mexico Golf News.com The University of New Mexico Championship Golf Course is on the chopping block. Here’s some background on the course’s… Sierra del Rio Escapes… Irrigation System Saved Course Maybe 25-30 Square Feet of Sierra del Rio Turf Damaged A brush fire threatened the City of Elephant Butte's Sierra del… Wrap-up: Lobo Men's… A Call for Tony Romo to Stick to the Booth Plus, Golf Updates from Elsewhere The UNM Lobo Men's Golf Team captured first place at… Collin Morikawa Wins Workday, Memorial Next Ladera: A Sense of Renewal at ABQ’s West Side Muni Sierra del Rio Escapes Brush Fire Damage UNM North Golf Course Previous ArticleTim Madigan Quitting Pro GolfNext Article2019 Sun Country PGA Awards Announced
cc/2021-04/en_middle_0086.json.gz/line10229
__label__cc
0.639772
0.360228
Nerdy Girl Notes A Geek-Chic Guide to the Media About NGN Who’s Flying This Thing? The Fan Mail Project That’s When the Fun Begins: The Best of Captain Swan Posted on May 2, 2017 by Katie Is there anything more magical than a wedding? On Sunday, Emma Swan and Killian Jones are finally tying the knot during Once Upon a Time’s musical episode extravaganza, and to prepare for their walk down the aisle, I thought it was the perfect occasion to take a walk down memory lane, reliving our favorite moments in their fairytale romance. There’s never been a love story on television like Emma and Killian’s. From the very start, it’s been the perfect blend of sweeping fairytale and relatable realism. This pirate and princess have taken us on a journey that’s spanned years and realms; have found each other through lost memories, alternate realities, and a ridiculous number of curses; and have gone to the Underworld and back again for each other. Along the way, they’ve struggled with their own demons, fears, and emotional walls—forces of darkness just as strong as any villain they’ve ever faced—but they’ve emerged from those battles stronger as individuals and as partners. Killian and Emma have proven their True Love many times—sacrificing for each other, choosing each other, fighting for each other, supporting each other, and making each other happy when they thought happiness might not be in the cards for them anymore. They’ve given each other hope, and in the process, they’ve given hope to so many people watching. So before the next chapter in this love story begins, let’s take a look back at my 10 favorite moments along the way—from Never Land to the Underworld and from time-traveling adventures to breakfast table kisses. Don’t forget to share your favorites in the comments! 1. “Perhaps I would…” (3.02: Lost Girl) There’s a moment in every “shipper’s” life when you go from liking the idea of a pairing and thinking they have good chemistry to being completely sold on what this relationship could be, and this moment of startling sincerity from Killian Jones was that moment for me. I appreciated Colin O’Donoghue and Jennifer Morrison’s chemistry and could see the potential in pairing their two character together as far back as “Tallahassee,” but this was the moment I went all in. The way the scene shifted from playful and flirtatious to suddenly sincere stopped me in my tracks, and it made me realize that what Emma Swan truly deserved in a partner was exactly what Killian Jones was offering her in that moment (and would continue to offer her from them on): someone who would love her for everything she is and would patiently wait for her to let him see the true Emma behind her armor. 2. The first kiss (3.05: Good Form) The week the spoilers for this kiss came out is still one of my favorite weeks I’ve ever experienced as a fangirl. The excitement I shared with my fellow fans that week makes this a very special moment for me, but even without those memories, the kiss itself was a game-changer for Emma and Killian. I loved that this scene—like every major moment between them—was all about Emma taking charge. And when she took charge, she grabbed what she wanted with both hands and gave us a steamy moment that neither the audience nor Killian would soon forget. While the kiss itself was wonderful, it was his reaction to it that sold the moment. O’Donoghue allowed us to see Killian’s entire life change in the aftermath of that kiss—he looked like a man who’d seen the sun after 200 years of darkness, and that look said everything we needed to know about the light and hope that kiss brought into his life. He couldn’t handle it, and neither could we. 3. “When I win your heart…” (3.07: Dark Hollow) If you need someone to deliver a romantic speech, call Colin O’Donoghue. This moment was the perfect balance of sexy confidence and supportive sincerity, making for one of the most romantic speeches in Once Upon a Time history. If “a man unwilling to fight for what he wants deserves what he gets,” this was Killian Jones fighting for what he wanted—Emma’s heart. But as he so correctly stated, that heart needed to be freely, and that kind of respect for Emma’s choices has always been one of the ways this character stood apart from the pack. And by following up his profession of his intentions with the perfect statement of belief in her ability to find Henry, he cemented his place as one of the cornerstones of her support system, a place he’s held with honor ever since. 4. A “good” goodbye (3.11: Going Home) For much of the beginning of Season Three, we were very aware of Killian’s feelings toward Emma but less sure of her feelings toward him. We knew she was physically attracted to him and sought out his support and advice, but the extent of her feelings were still very much left up to interpretation—until she had to say goodbye. Faced with the prospect of not only being separated from him forever but also losing her memories of knowing him, he once again reassured her that his feelings would remain unchanged by telling her that not a day would go by that he wouldn’t think of her. And then Emma responded with one word that said so much: “Good.” With that one word, Emma told Killian that she wanted him to think of her, which was a major revelation for a woman who typically pushed away people’s expressions of affection and ran away from emotional attachments. By accepting his devotion and giving him that affirmation (which meant a lot because Emma hates giving false hope), Emma ignited a spark of hope that eventually brought Killian back to her in New York City and brought her home to Storybrooke and her true self. 5. The end of the “Captain Swan Movie” (3.22: There’s No Place Like Home) The entire Season Three finale was basically a movie that could have been titled “Emma and Killian’s Time-Traveling Adventure.” So many moments from that episode could have made this list—dancing at Emma’s first ball, comforting hugs, promises to go to the end of the world for her, or tears wiped gently from faces. But my all-time favorite moment between these two characters is their conversation and kiss at the end of the episode, because that’s when their romantic relationship truly began. That’s when Emma made the conscious choice—played beautifully by Morrison throughout the scene—to allow herself to hope that this love that Killian was freely offering wouldn’t leave her broken. Their banter in this scene was warmer and more affectionate than it had been before, and it added a lovely layer of tenderness to the moment. And when they finally kissed, you knew there was no going back. The gentle intimacy of the kiss spoke to the idea that these two people knew to treat this love as something precious, two people who knew that love could bring pain but were trusting that this time they could be happy. I think of this moment as the true start of their Happy Beginning. 6. Emma tells the truth about her fears (4.03: Rocky Road) Vulnerability is hard for Emma Swan, and that’s what made this scene so special. By finally opening up to Killian about her fears of losing him after losing everyone else she’d ever loved, she let down her guard in a way we’d never seen before. And it foreshadowed the struggles she would later face letting him go because she couldn’t lose him—not didn’t want to, couldn’t. But Killian’s sweet reassurance that he’s a survivor allowed Emma to hope in that moment—for perhaps the first time since Neal left her—that she had someone by her side who wouldn’t disappear. It was yet another reminder of the care the writers took to make Killian the right partner for her, and it was sealed with one of their best and most passionate kisses. 7. Killian looks into Emma’s past (4.05: Breaking Glass) I like to think of this scene as an extension of the “Perhaps I would” moment in “Lost Girl.” In this moment, Emma finally let Killian see exactly what made her who she is; she shared her box of trinkets from her past, the few things she kept from her hard and lonely childhood. I will always believe this is one of the bravest things Emma has ever done. To let someone see and hold the remnants of your messy past takes incredible courage and strength, and I loved that this moment was played by Morrison with just the right amount of nervous hesitation and by O’Donoghue with just the right sense that Killian sees this as a great honor that he doesn’t take lightly. It was the perfect way to bring Emma’s walls down just a little bit farther and to show that she chose the right person to let those walls down with. 8. The Underworld goodbye (5.20: Firebird) Killian and Emma have had more than their share of tragic goodbyes, but none were more painful than their farewell in the Underworld. Earlier in the episode, a test proved that their love was True, but this felt like their true “True Love” moment. This was Emma finally loving Killian enough to let him go, and it was Killian loving Emma enough to help her do that. Love is sacrifice, but it’s also strength. And their love helped them both find the strength to sacrifice for each other as they said goodbye. The quiet intimacy of the moment and the powerfully vulnerable performances by the actors made this a powerfully poignant scene. Even knowing that they find their way back to each other, it’s hard to watch Killian kiss her hand before it slips out of his grasp without crying. 9. Proposing the right way (6.17: Awake) I knew that if Killian Jones was given a second chance at a proposal—a real chance—he’d do it the right way, and he didn’t disappoint. From calling Emma “Swan” to promising to always be by her side, it was a proposal only Killian could give, and that’s what made it so beautiful. Killian has always stood by Emma’s side—his devotion is his defining character trait, which has made him the perfect partner for a woman who has been abandoned so many times in her life. Instead of leaving Emma to fend for herself because of her destiny, Killian promised to always be by her side. It was the ideal promise for Emma, who has spent her whole life dealing with the fear that she was always meant to be alone because of a destiny she didn’t choose. And by accepting his proposal, Emma finally chose to let herself believe she could be happy even with the future being uncertain. 10. Making pancakes (6.18: Where Bluebirds Fly) Love should make you happy. Yes, it should support you in hard times, and it may even give you cause to shed a tear or two. But it should bring joy and fun into your life. And finally, FINALLY, we got to see the fun begin for Killian and Emma after he proposed. It was nice to be able to watch them have some time alone to enjoy being happy together after so much angst. Watching them kiss all over their kitchen, bask in their mutual happiness, and be comically interrupted by Snow just as things started to get heated was like a breath of fresh air. This scene was what I’d always imagined their life would look like together without any monsters or curses (or even just in between dealing with those), and it was nice to get such a blissful peek into what “Happily Ever After” looks like for them. This entry was posted in Television and tagged lists, nerd musings, once upon a time, television by Katie. Bookmark the permalink. 17 thoughts on “That’s When the Fun Begins: The Best of Captain Swan” Shauna 🔬 (@shaunapiranha) on May 2, 2017 at 8:03 pm said: Oh Katie I adore this post! I was actually so excited for it I was thinking of my favorite moments in the shower and I actually forgot to wash my hair. I had to go back into the shower. This is what these two idiots do to a normally level-headed adult in her thirties. All of these moments are fabulous, but you know that the “good” moment holds such a special place in my heart. ‘Going Home’ is not only one of my favorite episodes of this show, its one of my favorite finales of all time. And reading your recap of that moment brought all of those fond memories flooding back. I have watched that two second clip of both of them smiling at each other way more than is probably healthy, and that single gif set pretty much validates in entire existence of Tumblr (and all of its nonsense) in my eyes. Its funny, when I sat down earlier tonight and picked the first episode I wanted to watch leading up to their wedding this Sunday, I didnt even pick an episode with anything romantic between the two of them. I chose ‘Straight on Till Morning’. There is something about that scene in Granny’s where Emma makes her plea for him to “stay a be a part of something” that is really hitting me hard this week. As you mentioned in your review of this week’s episode, Killian’s initial decision to stay had less to do with Emma, and more to do with honoring Baelfire and not leaving Henry to go through the world alone. Emma gave him that olive branch and he took it, at least in the end. And because of that choice we got one hell of a season 3. Emma was a season behind in her attempt to run, but I love that they both had to go through that same journey of wanting to run and deciding to stay in Storybrooke before they were able to move forward with each other. And thats why, as much as I find the idea of them eloping incredibly romantic and suited to them, I am just as happy to see them get married in Storybrooke. Its tied to their story, and I cant wait to see them get married in the place they both chose to call home, surrounded by friends and family they never thought they would have. I think my mini pre-wedding marathon will be ‘Straight on Till Morning’, ‘Going Home’, and ‘Snow Drifts/There’s No Place Like Home’. A little celebration of those first steps. Gonna keep it simple and ignore all the angst thats come in-between 🙂 tempest on May 4, 2017 at 10:48 pm said: Watching a gif more than is probably healthy? — No such thing . . . 🙂 I also heartily approve of your marathon. Jennifer Jones (@allaboutswan) on May 5, 2017 at 11:13 am said: I love that you were so preoccupied that you forgot to wash your hair! I think Going Home is one of the best finales on the show! It’s one episode that makes me emotional, but then the very end is a great surprise when Hook shows up in New York, and you can’t wait to see what’s next. Nothing tops the season 3 finale in my eyes, though. Great choices! Lovely, lovely job, sweets. I am also exceedingly impressed by your ability to limit yourself to just 10 . . . 🙂 More later after I’ve had a chance to wallow in Captain Swan thoughts . . . Jennifer Jones (@allaboutswan) on May 3, 2017 at 4:27 am said: I love your list! It’s wonderful to remember those moments that sort of “sealed the deal” for us as fans on the idea of a relationship between two characters. These two have been one of my favorite all-time couples. I’ve loved the combination of the fantasy and the realism of their journey together. Killian gets props from me for knowing what he wants and patiently and confidently pursuing it. And he is just the man for dogged patience and steadfastness when he’s made up his mind. He gave up his seafaring ways to stay near Emma and her family and gradually let her see that she wasn’t just a conquest for him. I think the moment that I realized his sincerity was one of my favorite scenes: Echo Caves in Season 3’s Neverland arc. It was a mixture of fantasy and reality in that because of the magical qualities of the Caves, Hook chose to admit that his greatest secret was that he realized that Emma made him want to love again. And, he made that admission in order to save Emma’s first love, Neal. In doing so, he was giving up any advantage he might have gained with Emma by Neal’s death and facing the reality that Emma might not choose him. However, he was willing to gamble on fact that he could prove himself to her regardless of the risks and show her that he would stay where Neal had abandoned her and broke her trust. Echo Caves gave us such an undeniably romantic declaration, and at that moment I was all in for the ride! I’m beyond excited to see these two make a permanent commitment to each other and I’m thrilled that Emma has finally decided to embrace the happy future that Killian wants to give her. Shauna 🔬 (@shaunapiranha) on May 3, 2017 at 8:49 am said: I love that you brought up the Echo cave scene!! The echo caves “darkest secret” plot is probably one of my favorites on the whole show. That one-two punch of ‘Good Form’ and ‘Ariel’ was really what pushed me into obsessive CS shipping territory. The way you could see after their first kiss that he was done for, followed by that honest admission that for the first time in centuries He saw the possibility of happiness again with her had me all in. Emma deserves the world, and in that moment I felt like Hook proved he was ready to give it to her. Thank you! I absolutely loved that moment, and Season 2 and 3 are where I really got invested in the show. I usually hang back a bit in the first season of a show until I can see whether it’s going to be continuing. Shows are yanked so quickly these days. (I’m still heartbroken over Time After Time from this season). Echo cave — such a great choice. And yes to all of the above. Joan on May 3, 2017 at 12:30 pm said: hi Katie, i’ve continued reading (and loving) your reviews but I haven’t posted any comments in a long time but I just had to say something this time! I love all your top 10 moments, and i would include the scene in 6×07 when Killian reminded Emma of her parents story and that as she is the product of true love she can break any curse. I love how Killian knows exactly what to say to Emma to calm her down, and during the scene you can see how much Emma adores him as well. Another scene I love is in 4×04 at the end of their date when they’re outside of the Charmings apartment. I love when Killian asked Emma on a second date, but probably my favourite part of the scene is after Killian leaves and Emma walks back into the apartment and when she leans against the door she just has this stunned look on her face – this to me is the moment Emma realised she was falling head over heals in love with this guy! There are just so many amazing CaptainSwan moments to choose from it is nearly impossible to pick a top 10 but I have a feeling I’m going to have more great CS scenes to pick from after Sunday! Great to see you again Joan! I love that moment from 6×07 too. Killian always has had a way with words! And a big yes to the first date, although I think my favorite part is when they first see each other all dressed up and they just stare dumbfounded for a moment. I hope we get some of those same looks at the wedding!! See, this is why I couldn’t pick a top ten. I LOVED the first date, too. (I also adored the Charmings’ reaction.) Kristen G on May 3, 2017 at 5:08 pm said: This list is fantastic! I don’t know how you managed to pick only 10 moments, because if I had to make a list of my favorite moments it would be a long, rambling mess. Your list is, as always, beautiful and eloquent and captures the beauty of their relationship. Wonderful choices. I’m glad you included the “When I win your heart” speech from 3×07 because that one remains an all time favorite of mine. I would add that I also really love the scene in 5×04 when Killian takes Emma horseback riding in order to help her free her mind of Rumple. I also love their reunion in the cemetery in 5×21. We are very lucky shippers! tempest on May 4, 2017 at 3:09 pm said: Hi, my name is Tempest . . . and I’m a mess of CaptainSwan feels. Honestly, I’ve had the hardest time responding to this post — not because it’s not awesome, because it is awesome. And not because I disagree with the choices. I don’t. Great, great choices. Which I have watched. Multiple times, you know, to be sure that I was truly understanding Katie’s points. 🙂 I would just add more. In fact, when I hit the end of the post my initial reaction was, “I thought there were supposed to be 10. Where are the . . . oh, look, there are 10 . . . in fact, they’re numbered . . . all the numbers between 1 and 10 are there . . . huh, how ’bout that.” It was just over too quickly. So what would I add? I don’t know . . . because as much as I love these moments, I have also loved the journey, all the small hand-holding moments, the looks, the sexy jaw clench, etc. So, then my response turned into “What Captain Swan Means to Me.” *headdesk* Ok, so let’s go with that. As a prickly-pear myself, I have loved seeing the slow burn on this romance, watching someone have the patience and desire to chip away at those walls and not give up. I have loved all the small moments, but also seeing all the times that Killian supports and understands Emma. (Small aside: Menfolk, support and understanding are sexy.) Seeing how he “is a fan of every part” of her. The fact that he didn’t tell her about trading the Jolly Roger until she asked (and the fact that he NEVER held that over her. NEVER.) Seeing her acknowledge that he is something to keep her grounded (“You have Henry; “And you.” “Aye.”) Watching her reassure him that he is a hero. Seeing her go get her pirate back. Seeing their love and trust. And this is the point where I turn into a blubbery mess. I think I’ll just go have some hot chocolate with cinnamon in my captain swan mug . . . ❤ We can be a mess of feels together. I also dont know how Katie can make top 10 lists of anything let alone these two, because I am pretty sure I would also just want to pick every moment (ok we can leave out the secret keeping ones. That first proposal? That never happened right? :P) HE GAVE UP HIS SHIP. And he didnt regret it for a second, even completely unsure if they would ever be together. If thats not love I dont know what is. I love that you call yourself a prickly-pear…I am the same way. People always look at me like I am crazy when they find out I didnt tell my partner (of over 9 years now) I loved him until over a year after we were together. And it wasnt that I didnt care or was unsure about him, it was that I was flat out terrified by it. And it was just so damn satisfying to see a female character on TV that was also terrified of being vulnerable, who found someone patient and dedicated to make her feel safe and loved beyond measure. Killian always managed to say the perfect thing to her (and me, he was talking to me too right?). I get that not everyone would find their journey romantic or satisfying, but it struck the perfect cord with me. Gah I am so excited for this wedding (and that is coming from someone that doesnt even care about getting married herself, lol) tempest on May 12, 2017 at 10:37 am said: Ohhh, just had to add — as a prickly pear — I also loved: “I liked your walls. I liked being the one to break them down.” Shauna 🔬 (@shaunapiranha) on May 5, 2017 at 12:36 pm said: I just want to say I have been listening to the entire soundtrack and I am a puddle on the floor. I dont know how I am going to make it to Sunday. How do you do this to me show?! How?! Sooo, will you be able to sing all the words by the time it airs? 🙂 I am also proud to be your puddle-buddy. Leave a Reply to tempest Cancel reply
cc/2021-04/en_middle_0086.json.gz/line10246
__label__cc
0.599464
0.400536
You are here: Home / Archives for New York Yankees The Layup Drill — Seasons change and so do the sports April 17, 2015 By Jason Cruz By Jason Cruz Northwest Asian Weekly Welcome to another edition of The Layup Drill. In this edition, we take a look at the close of the NBA season, the start of baseball, and golf is always on our minds. Bhullar is first Indian born player in NBA Gursimran “Sim” Bhullar made his long-awaited debut in […] Filed Under: Sports, The Layup Drill Tagged With: 2014, 2015, Although Suzuki, Bay Area Invite, Golf Today Northwest, Gursimran Sim Bhullar, India, Jason Cruz, Jennifer Yang, LPGA, Miami Marlins, NBA, NBDL, New Mexico State University, New York Yankees, Taiwanese American, UW, Vol 34 No 17 | April 18 - April 24 Former Yankees player signs with Japanese team December 6, 2013 By Northwest Asian Weekly CHIBA, Japan (AP) – The Lotte Marines of Japan’s Pacific League say they have signed former New York Yankees utility infielder Luis Cruz to a one-year contract worth $750,000. The 29-year-old Cruz, who split the 2013 season between the Yankees and the Los Angeles Dodgers, has a career batting average of .234 with seven home […] Filed Under: Sports Tagged With: 2013, CHIBA, Carlos Rosa, Craig Brazell, Former Yankees, Los Angeles Dodgers, Luis Cruz, Major League Baseball, Mexico, New York Yankees, Pacific League, RBI, Vol 32 No 50 | December 7 - December 13, World Baseball Classic, japan NWAW’s October book recommendations By Samantha Pak Northwest Asian Weekly Take Me Out to the Yakyu By Aaron Meshon Atheneum Books for Young Readers, 2013 Although baseball may be America’s pastime, the sport’s appeal has expanded to include a global audience. Filed Under: On the Shelf Tagged With: 2013, Ballantine Books, Ground Zero, Hideki Matsui Sportsmanship, India, NWAW, New York Yankees, Northwest Asian Weekly, Pacific Ocean, Red Sox, Samantha Pak, Seattle Mariners, United States, Vol 32 No 41 | October 5 - October 11, japan The Layup Drill — Year in Review: The Top 10 Asian American Sports Figures of 2012 January 3, 2013 By Jason Cruz By Jason Cruz Northwest Asian Weekly 2012 Year in Review<!–more–> 2012 was a great year for Asian American athletes. Despite a strike-shortened regular season, the NBA had major excitement, thanks to the rise of a Taiwanese American point guard from Harvard. The NBA championship series was won by the Miami Heat, coached by Filipino American […] Filed Under: Sports, The Layup Drill Tagged With: 2012, 2013, Asian American, Benson Henderson, Chinese, Clarissa Chung, Filipino American Erik Spoelstra, Jeremy Lin, Kyla Ross, London Games, Manny Pacquiao, NBA, Nathan Adrian Day, New York Yankees, Olympic Women, Seattle Seahawks, Summer Olympics, Tamari Miyashiro, Tim Lincecum, Vol 32 No 2 | January 5 - January 11 Japan fans hopeful after Ichiro trade to Yankees By Staff The Associated Press Staff TOKYO (AP) — Japan reacted to the news that Ichiro Suzuki has been traded to the New York Yankees with surprise and anticipation that the move might lead to a World Series ring. The Yankees acquired the star outfielder from Seattle in a trade for two young pitchers, bringing […] Filed Under: Sports Tagged With: 2012, Associated Press Writer Malcolm Foster, Ichiro Suzuki, Masanori Murakami, NHK, New York Yankees, Nobuyuki Suzuki, Sadaharu Oh, Safeco Field, Seattle, Shohei Abe, TV, Takuya Matsuo, Vol 31 No 31 | July 28 - August 3, World Series, attention, japan A.L. All-Star Hideki Matsui signs deal with Tampa Bay Rays May 5, 2012 By Northwest Asian Weekly The Associated Press ST. PETERSBURG, Florida (AP) — Hideki Matsui has signed a minor league contract with the Tampa Bay Rays, and the two-time American League All Star has reported to extended spring training in Port Charlotte. Filed Under: Sports Tagged With: 2012, Los Angeles Angels, New York Yankees, Oakland Athletics, PETERSBURG, Port Charlotte, ST, Tampa Bay Rays, Vol 31 No 19 | May 5 - May 11 A-pop!: Don’t mess with Wendi A monthly column about all things Asian in popular culture By Vivian Nguyen Northwest Asian Weekly The slap heard around the world Who is Wendi Deng Murdoch? Just a month ago, the public was introduced to Deng Murdoch, a former shrewd businesswoman and news corporation CEO Rupert Murdoch’s alleged gold-digging wife. Filed Under: Arts & Entertainment, Column: Pop Culture Tagged With: 2011, Although Irabu, Asian American, Boo Boo Stewart, British Parliament, Charlyne Yi, China, DUI, George Steinbrenner, Harry Shum Jr., Hideki Irabu, Kal Penn, Kelly Hu, Love Bites, New York Yankees, Paper Heart, Quentin Lee, Vol 30 No 33 | August 13 - August 19, White Frog, culture, japan, margaret cho First female GM coming to Seattle? SEATTLE (AP) — The Mariners are the first Major League Baseball team to lose 100 games with a $100 million payroll may lose more this winter. On top of all else the AL’s worst team must do, it should install a revolving door for a possible exodus of veterans. Filed Under: News, Community News, National News, Sports Tagged With: 2008, Alex Fernandez, American League, Bill Bavasi, Bill Singer, Chicago White Sox, Chinese, GM, Hiroshi Yamauchi, Lee Pelekoudas, Major League Baseball Los Angeles Dodgers, Mariners Chief Executive Howard Lincoln, Mariners President Chuck Armstrong, Ned Colletti, New York Mets, New York Yankees, Seattle, Stacy Nguyen, vol 27 no 43 | October 18 - October 24
cc/2021-04/en_middle_0086.json.gz/line10251
__label__wiki
0.846991
0.846991
repolling Repolling An Insult To People’s Opinion: Bhartruhari OB Bureau May 16, 2019 0 Bhubaneswar: Senior BJD leader Bhartruhari Mahtab on Thursday disagreed with the decision of the Election Commission of India (ECI) to conduct repolling in four booths of Athagarh Assembly… Stage Set For Repolling In 34 Booths In Odisha Bhubaneswar: Preparations for repolling in 34 booths, stopped because of EVM glitches and alleged rigging in the third and fourth phase of polls, has begun with chief electoral officer (CEO)… BJD Influencing Patkura Voters In The Name Of Relief: BJP Bhubaneswar: A delegation of BJP leaders led by the party’s state vice-president Sameer Mohanty on Tuesday met the Chief Electoral Officer (CEO) Surendra Kumar and lodged a complaint against… BJP Reiterates Demand For Repolling In 48 Booths Bhubaneswar: A BJP delegation on Friday met chief electoral officer (CEO) Surendra Kumar and reiterated its demand for repolling in 48 booths in Odisha. Later, talking to mediapersons,… CEO Recommends Repolling In Another 10 Booths In Odisha OB Bureau Apr 27, 2019 0 Bhubaneswar: Chief Electoral Officer (CEO) Surendra Kumar on Saturday said that he has recommended the Election Commission of India (ECI) for fresh polling in 10 booths, where voting was… 73.88% Voter Turnout In Nine Booths In Odisha Where Re-Polling Was Held Bhubaneswar: The average polling in nine booths of Odisha, where re-polling was held on Thursday, is 73.88%, said the office of the Chief Electoral Officer (CEO) in a release here. Of the… Repolling Begins In 9 Booths In Odisha Bhubaneswar: Repolling began in nine booths in Odisha on Thursday by the order of the Election Commission of India (ECI). The nine booths where repolling are underway are booth no-129 at… Repolling In 9 Booths In Odisha On Apr 25 Bhubaneswar: The Election Commission of India (ECI) on Tuesday ordered repolling in nine booths in Odisha on April 25. Polling in these booths was disrupted due to malfunctioning of… Odisha CEO Recommends Repolling In Six Booths Bhubaneswar: Chief Electoral Officer (CEO) of Odisha, Surendra Kumar, on Thursday said he has recommended the Election Commission of India (ECI) to order repolling in six booths, which saw… Repolling In Two Booths Of Odisha On April 18 Bhubaneswar: Repolling will be held at a booth each in Malkangiri assembly constituency under Nabarangpur parliamentary constituency and Berhampur assembly constituency under Berhampur…
cc/2021-04/en_middle_0086.json.gz/line10256
__label__wiki
0.643501
0.643501
Hyperspectral imager launched to ISS Teledyne-operated, DLR-built kit operates at 235 wavelength channels across the visible and near-infrared spectrum. DESIS: hyperspectral imager A hyperspectral imaging system built by the German Aerospace Center (DLR) has arrived at the International Space Station (ISS), following its launch on board a SpaceX Falcon 9 rocket last week. Developed by the DLR Institute of Optical Sensor Systems, in cooperation with US-based Teledyne Brown Engineering (TBE), the 235-channel tool will be used for environmental and humanitarian applications in Earth observation. 30m resolution According to Teledyne, the DLR Earth Sensing Imaging Spectrometer (DESIS) has capability across the 400-1000 nm wavelength range. “With continuous coverage at an altitude approximately 250 miles above the Earth, the DESIS instrument will broaden our knowledge about agriculture, biodiversity, geology, water ecosystems and detect natural or man-made changes to the Earth’s surface,” says the firm. DESIS is said to have a surface resolution of 30 m from the ISS-orbit altitude. Following three months of installation and testing activity, DESIS will operate within Teledyne’s "MUSES" (Multi-User System for Earth Sensing) platform on board the ISS. MUSES was developed as part of a cooperative agreement with NASA, for applications including imaging, technology demonstration, and space qualification payloads supporting research, scientific studies and humanitarian efforts. “MUSES provides a precision-pointing environment on the ISS for earth-viewing instruments and it can accommodate up to four payloads simultaneously,” Teledyne explains. “It also offers the ability to robotically retrieve, upgrade, and service those instruments as well as return them to Earth.” According to DLR, DESIS will become the first operational equipment on MUSES. The organization stresses that the instrument is designed to provide hyperspectral data to support scientific, humanitarian and commercial goals. “This data will enable assessment of the situation after environmental disasters, assist farmers in the targeted management of their land, and serve scientists as a basis for the development of novel atmospheric correction algorithms,” suggests the organization. “Hyperspectral data from DESIS will enable DLR to develop new Earth observation applications, for example for resource exploration or precision farming. Humanitarian aid applications can also be improved with DESIS data," it added. “DESIS will also enable the further development of hyperspectral applications and technologies. The new research opportunities relate to monitoring the global ecosystem, resource monitoring and exploration, and improving response to humanitarian crises.” Coastal zones and oil spills According to a February 2017 presentation by Teledyne and DLR, DESIS will prove particularly useful for monitoring of coastal zones, as well as analysis of land coverage, vegetation health, the impact of droughts, and monitoring forest health. Another key use could be assessment of potential oil spills, where the hyperspectral data is expected to complement radar imagery by providing additional chemical composition information that should help to reduce the number of false alarms, and to detect oil spills below the ocean surface. ISS is seen as a particularly useful host for the imaging equipment, partly because its orbit ensures coverage of 90 percent of the populated regions of Earth, alongside all ocean shipping lanes and major ports. TBE's president Jan Hess said following the Falcon 9 launch: “Our vision was to create partnerships with DLR, NASA, CASIS and others to enable MUSES and the ISS to expand capabilities to view and assess the Earth’s surface. We are ecstatic to get the DESIS in place as MUSES’s first payload, and have the ability to share its data with the world’s science and commercial communities.” Under the terms of the Teledyne/DLR agreement, Teledyne retains rights for commercial applications of the platform, while DLR holds rights for scientific use. The first DESIS images are expected to appear from September onwards. More from Photonics World ORC-Zepler: Si-photonics showcase reports ‘dramatic advances’ Covid update: 14 January 2021 SPIE announces its 2021 society awards Optical chip on a card to detect Covid-19 antibodies ‘in a minute’ Rochester Laser Lab lands $82M DLR Institute of Optical Sensor Systems Teledyne Brown Engineering DCS 2018: Hyperspectral imaging offers early diagnosis of plant diseases Hyperspectral imaging detects tumor margins in real-time International Space Station to take delivery of laser atom-cooling kit
cc/2021-04/en_middle_0086.json.gz/line10264
__label__wiki
0.824949
0.824949
Orion Petitclerc's Wordpress (For lack of a better title.) HomeOn the Venom Movie, Adaptations, and Chilling Out On the Venom Movie, Adaptations, and Chilling Out April 2, 2017 April 1, 2017 Orion Petitclerc FeaturesComic Books, Feature, Movies, Venom If you follow me anywhere else on the Internet (I’m @OrionSTARB0Y pretty much everywhere you look), you probably already know how huge of a comic book geek I am—especially for Venom, Spider-Man’s snaggle-toothed, dark mirror reflection. Venom and symbiotes are my life, pretty much. (I’ll own up to that with no shame. At least I love something.) I’m also a long-time member and de facto Community Manager of The Venom Site, an online fan club for all things symbiote (and as close to formally recognized by Marvel Comics as you can get without an official shout-out). I run the site’s podcast, We Are Venomaniacs!, which, in our next episode, my co-hosts and I will be discussing today’s topic, for sure, but probably not quite as in-depth as I’m about to. Today’s topic is all about Venom’s movie adaptations both past and future and how all of the Chicken Littles of the Internet forums need to chill out about the news of Sony Pictures’ 2018 Venom spin-off movie which has been trickling out since mid-March. I’m going to do my very best to convince you that Sony’s plans aren’t all that outrageous; that for all of its failings, Spider-Man 3‘s adaptation of Eddie Brock and Venom were actually better than you remember; that we, as comic book movie fans, should exhibit a healthier degree of cautious optimism in the face of this understandably shocking news; and that you should consider adjusting how you measure the quality of comic book movie adaptations, because if you take to heart what I’m about to spend 4,051 words articulating to you (buckle up, buttercup), you’ll probably feel a little less stressed and a bit happier for what we get. I know this sounds like a tall order and a bigger effort than you’re probably willing to afford but I promise you that I’ll try to make it as entertaining and educational as possible. I appeal to your patience and better judgment to help me help you be a happier comic book movie fan. Ready for some MANDATORY EDUCATION? What We Know About the Venom Movie So Far Let’s first collect all of the relevant and verified pieces of Venom movie news. On March 16, 2017, Exhibitor Relations’ Twitter account revealed that Sony locked in October 5, 2018 as the newest release date for the Venom movie. (Exhibitor Relations is a “Box-Office Authority” established in 1974.) Along with the release date, Scott Rosenberg and Jeff Pinkner were attached as the screenwriters. (Alex Kurtzman was, for a short time, attached as the movie’s director, but Exhibitor Relations soon confirmed that he’s no longer attached.) Avi Arad, the producer of the previous Sony Spider-Man movies, is also attached as the producer along with Matt Tolmach. On March 27, My Entertainment World, a Canadian-American entertainment journalism site, revealed that the Venom movie would be rated R and would fit under the film genres of Action, Horror, and Sci-Fi. On March 28, an interview with Spider-Man: Homecoming director Jon Watts revealed that the Venom movie would not be connected to the upcoming Spider-Man movie or the Marvel Cinematic Universe created by Marvel Studios. (This confirmed the rumors that Sony’s Venom movie would exist in its own universe separate from the MCU and wouldn’t feature Tom Holland’s Peter Parker/Spider-Man character.) This concludes all of the known and confirmed Venom movie news to date. Everything else that you may have read or heard about the movie following the initial reports are very likely only fan-circulated rumors. This includes the possible misinterpretation of Sony’s Amy Pascal’s discussion about the nature of the Sony/Marvel deal surrounding the Spider-Man IP (intellectual property) rights-sharing and rumored turbulence in that relationship, which is said to possibly end after the sequel to Spider-Man: Homecoming. I repeat: these are all rumors and speculation, so digest them with a considerable grain of salt. Trust only in officially verified news, not in what you hear from the echo chamber that’s the Internet fan forums. Taking Your Criticisms and Concerns in Stride As a forum lurker and the Community Manager for The Venom Site, I’m on the front lines for fan reaction to all Venom news. As expected, the dominant reaction to the Venom movie news and rumors is a mix of tribalistic fear and loathing towards Sony and the usual downplaying of Venom as worthy of his own movie, let alone a cinematic universe. In other words, not enough hype. (But that’s just my analysis.) Amid the criticisms and concerns I’ve read are a few common threads, most of which are simply misconceptions born from echo chambered rumors. “Spider-Man won’t be in the Venom movie [at all]!” I added that last part even though that’s not what people actually say, but it’s definitely what they’re thinking and implying from what I’ve heard and discussed with them. So let’s set this straight for the record: no one from Sony or officially attached to the Venom movie has said there won’t be *A* Spider-Man in it. Only Watts confirmed that Tom Holland’s Spider-Man, who exists in the MCU, won’t be in the Venom movie (by way of confirming its separate existence from the MCU altogether). Perhaps people have forgotten two years later that Marvel still doesn’t own the Spider-Man movie rights. Go back and read Marvel’s official announcement about the deal from February 9, 2015. The key quote there is, “Sony Pictures will continue to finance, distribute, own and have final creative control of the Spider-Man films.” (Emphasis is my own.) Marvel didn’t purchase or recover the movie rights to the character or his library of other IPs. Sony is sharing Spider-Man with Marvel. They’re allowing Marvel to use Spider-Man in their MCU movies and any standalone Spider-Man movies like Spider-Man: Homecoming are being produced by Sony with creative direction from Marvel. In simplest terms, Sony is allowing Spidey to play in the MCU sandbox and allowing Marvel to play house in their own spider-infested sandbox while dictating the rules of engagement. It’s Sony’s prerogative to create their own cinematic Spider-verse separate from the MCU and to stick their own Spider-Man into the Venom movie. Nothing prohibits Sony from recasting Peter Parker/Spider-Man or even incorporating another Spider-Man character like Miles Morales or Ben Reilley into the Venom movie. (Though Reilley would be a stretch considering his origin, but even that can be reworked to fit the narrative.) Sony could even take a page from DC Entertainment and NBC’s Powerless television comedy series. Powerless exists in its own TV universe separate from other DC TV universes like the CW-verse or Gotham-verse. DC’s entire library of characters exist in the Powerless-verse, but we never see tentpole figures like Batman, Superman, or Wonderwoman in the show, though they are constantly referenced. Sony could approach Spider-Man in the same manner, by which he’s only mentioned in dialogue references and vague camera shots, hence eliminating the need for recasting so the movie could focus on building its titular character, Venom, apart from Spider-Man. As for the matter of the audience’s potential confusion of why Sony would possibly have two Spider-Men existing in cinema at the same time, that’s a risky gamble I can certainly imagine Sony taking, especially since they’re apparently adamant about establishing their own Spider-verse separate from the MCU. “It will just be another Spider-Man 3!” I’ll give you a point on this one but only because Spider-Man 3 suffered from too much studio intervention in the creative process, especially when they forced director Sam Raimi to include Venom against his wishes. Sony Pictures’ money troubles are no secret (just Google “Sony Pictures losing money”) and the Internet sharks smell the blood of Sony’s desperation to salvage its film studio. It’s very likely that the Venom movie will be heavily influenced by studio desperation to make a quick buck to appease Sony Corporation in Japan and to keep the Spider-Man rights that much longer, especially since Spider-Man is its highest-grossing franchise. However, I’ll explain a bit later why you should rethink your opinions about Spider-Man 3‘s Eddie Brock/Venom. There was a lot more to how his character was handled than meets the eye. “The movie is being rushed! 2018 is too soon!” The Venom movie is an interesting case as it has been in Sony’s plans on and off since shortly after Spider-Man 3‘s release. While most new comic book movies are officially announced two or more years in advance of their release date and have been in pre-production at most another two years prior to its first official announcement, the Venom movie has been in pre-production for essentially nine to 10 years. The rumors that have trickled out between 2007 and 2017 have been pretty homogeneous concerning a general plot direction for the Venom movie even though it’s very likely that its plot has been through many revisions. However, the fact remains that with how long the movie has been in pre-production, a 2018 release date isn’t all that unreasonable. The movie very well could be a lot further along in pre-production than we know. “Any Spider-Man movie Sony will make is going to be terrible because they only care about money! Marvel Studios or BUST!!!” And you don’t think Marvel’s got the same gold fever? (Yes, it’s probably not as severe as Sony’s but money is king in Hollywood, no exception.) Marvel’s had a stellar run and will continue to roll in the ratings and cash. There’s no stop to the Marvel train in sight. They have a creative formula that’s golden. Yadda yadda. Perhaps even their lower-ranking masterpieces still outpace the last three Sony Spider-Man movies. I’ll concede that Sony Pictures is past its prime, but to say it doesn’t have at least one or two gems up its sleeve is downright pessimistic. (No pessimism allowed here, ya’ hear? Pragmatism and cautious optimism only!) It’d be a huge comeback if their Spider-verse pans out. We can only hope that they learn a thing or two from Spider-Man: Homecoming‘s impending success. (Damn me if I’m rolling the dice on this one, but c’mon, it’s an MCU Spider-Man movie!) Let’s be honest: you can’t objectively predict that the Venom movie or any other Sony Spiderverse movie will bust. Most of the people who’ll read this article likely have the MCU fever. That’s okay; what’s not okay is this tribalistic hatemongering for any Marvel movie that exists outside of the MCU. Yeah, you liked Deadpool or Logan, but tell me you aren’t whispering to yourself that you’d rather see them back with Marvel and in the MCU despite the Fox X-Verse’s resounding, resilient success. Sony’s major problem with how they’ve handled the Spider-Man franchise is that they’ve been approaching every movie since Spider-Man 3 with a focus on a studio agenda instead of a creative agenda. Marvel’s done a great job of leveraging their studio agenda with a creative agenda and both Fox and Sony, understandably, are trying to ride the product of that synergy wave: the shared cinematic universe. Fox has done a better job at it than Sony had in the past with their Amazing Spider-Man movie series, but don’t start demanding Sony to lie in their grave and die just yet. I’m hoping Sony learns from the success of Spider-Man: Homecoming—that magic synergy between creative and studio direction—and applies it to the Venom movie to wow audiences with something truly unexpected. I also hope Sony decides that maybe involving Marvel Studios in Venom‘s production is a good idea, even if that means a delay on the release date. And you should hope these things come to pass, too, instead of hoping for Sony’s failure. How Spider-Man 3 Got Venom Right and You Didn’t Realize It If you need some assurance that Sony is capable of making a good Venom movie, then let’s talk about their last attempt at adapting Venom in a film: Spider-Man 3. Are you done shuddering and cursing under your breath? Good, then I ask you to set aside your prejudices about the movie for the remainder of this section and to just be open to what I’m about to reveal. Spider-Man 3, while a horror show example of when a studio stifles the creative process, actually contained a very faithful adaptation of Eddie Brock/Venom. Yes, it was Sony’s mistake casting Topher Grace to play what should’ve been an oppressively menacing, physically imposing, lethally dangerous, and hopelessly broken mockery of everything Spider-Man represents. It’s a damn shame, too: Topher was a confessed Venom fan and seemed really ecstatic to play Eddie/Venom. His part also suffered from poor writing, awkward handling due to the fact that Sony forced Raimi to use Venom instead of Raimi’s original villain choice, the Vulture, and that too many villain plots were stuffed into a two-hour-plus dress. But let’s set all that aside and dig deeper into Eddie Brock Jr.’s character—the real heart of the adaptation, so to say. To do that, we first need to look at the source material that influenced his character. The one, the original Brock The obvious source is the original Eddie Brock/Venom character from the comics with a focus on his earliest cameos in Amazing Spider-Man #300, 315–317, and 330–333. This versio n of Eddie is a former journalist for the Daily Globe who ruined his career by running exclusive interviews with a compulsive liar whom he believed was the serial killer known as the Sin-Eater. When Spider-Man revealed the true killer, Eddie’s career was crushed by the scandal to the point where the only jobs he could get was writing venomous exposeés for tabloids (hence where he got the name, Venom, from). This Eddie wasn’t an evil character before he became Venom. In fact, in a later comic, Daredevil determined that Eddie himself (without the symbiote) posed no threat toward Spider-Man before or after becoming Venom. He was just a regular joe with daddy issues who made some poor career moves and suffered from a mild victim complex. He’s an addict for power and recognition. He’s always trying to prove himself as a good guy, though his methods are flawed. One of the key characteristics of this version of Eddie is that, as Venom, he rarely posed a true, lethal threat to bystanders, including Peter’s Aunt May (whom Eddie considered an in nocent he’d never harm, though he’d imply that he would to play with Peter’s emotions) and Mary Jane Watson. Sure, Venom’s terrorized and placed MJ into dangerous situations that threatened her life, but that’s about as far as he ever went. He only put the people around Peter in danger to rile him. Venom is a vengeful troll who wants to terrorize Peter before actually killing him. (I’d like to note that I didn’t include the limited series, Venom: Dark Origin in this character analysis. The comic series was published after the release of Spider-Man 3 and served to retell Eddie’s origin while incorporating the psychotic characteristics from the movie adaptation into Eddie’s pre-Venom personality. Venom: Dark Origin was an example of the comics imitating their movie adaptation.) The angsty reboot Brock Now, another source that influenced the movie’s character is Eddie Brock Jr. from the Ultimate Spider-Man comics. This version of Eddie is actually a reboot of the original featured in a reboot of the Marvel comics universe, the Ultimate Marvel Universe. Ultimate Eddie Jr./Venom is vastly different from the original Eddie/Venom and, as you’ll find, is a lot closer to the movie adaptation. This Eddie was a childhood friend of Peter’s. Their parents worked together on Project Venom, which was developing an experimental suit that would cure any disease, including cancer. When both sets of parents died in a fateful plane crash, the two young friends were separated. Years later, Peter (now in high school) meets up with Eddie (now in college) when Peter discovers his father’s research on the Venom Project. Eddie reveals that their fathers left behind a sample of the suit. After Spider-Man has his jaunt with the suit to realize it’s seriously flawed, Eddie finds out that Peter is Spider-Man and had “stolen” the suit when he catches Peter putting the suit back in its lab locker. Eddie feels betrayed by Peter for going behind his back like that and, an accident later, is taken control of by the suit to become a hulking, rage-filled Ultimate Venom. The key character difference between Ultimate Eddie Jr. and the original Eddie is that Ultimate Eddie was a pretty messed up kid before he became Venom. He had some scientific smarts to him (nothing compared to Peter, though, which was probably embarrassing/frustrating considering Eddie was a bioengineering major), but he’s your stereotypical privileged frat boy. He presents himself as a sleazy ladies’ man who made moves on a teenage Gwen Stacy (and that didn’t go over well for him). He was a total creep—that childhood friend you had fond memories of but grew up to be a terrible person who definitely suffered from a lack of parental wisdom. So what elements did Spider-Man 3 borrow in its adaptation? Let’s make a list. In Spider-Man 3, Eddie Brock Jr.: Is a total womanizing sleaze/creep before and after becoming Venom (Ultimate Eddie). Has a victim complex in which he blames others for problems he created (Original Eddie). Wasn’t a substantial threat to Peter before becoming Venom (Original Eddie). Was a Catholic, to some degree (Original Eddie). Was a rival photographer working for the Daily Bugle before being disgraced for publishing a falsehood (Original Eddie with some modifications for dramatic effect). Is addicted to the power of the symbiote and is in full control of his actions as Venom (Original Eddie). Only put MJ in harm’s way without trying to actively kill her to rile Peter up (Original Eddie). Venom’s killing Harry Osborn in the final fight doesn’t count because, as far as was depicted, Eddie didn’t know Peter’s personal connection to Harry. Also, Eddie only killed Harry because Harry was interfering with his revenge plan. That’s double points for Original Eddie, actually, since Original Eddie only tried to kill other heroes/villains who antagonized him or got in his way with Spider-Man. Represents the polar opposite of Peter Parker: he possessed and used great power but with no regard for responsibility (Original Eddie). Is a sniveling, self-obsessed, delusional pest (bonus point for Ultimate Eddie because I felt like it). As you can see, this all adds up to a pretty faithful adaptation of the source materials despite poor writing, casting, and handling. I dare you to read the comics that inspired Spider-Man 3‘s Venom and then rewatch it with these points in mind. I mean, it’s still cringe-worthy, but you may develop an appreciation for Sony’s fumbled effort. If anything, this shows that Sony actually grasps what makes Eddie/Venom what he is. Now, if only Sony would allow the filmmakers free reign to work with these core concepts (minus many of the Ultimate Eddie characteristics) with less studio interference… Addressing the Elephant Here’s where I stop talking about Venom so we can discuss the issue at the core of the criticisms and concerns surrounding Venom movie news which represent an even larger problem among comic book movie fans. Everything I’ve talked about thus far in this article all boils down to how fans measure the quality of a comic book movie and I can’t be the only one who’s taken notice. This could be symptomatic of the spoiler culture we’ve become entrenched in as a community, too. We can’t help overanalyzing every shred of news and every rumor to jump to conclusions about how good or bad we predict a comic book movie will be. And we get stuck in the echo chamber until the opinions we form before ever seeing the finished products become so deeply seated that it completely alters our judgment when we’re actually watching the movie. I’m talking about how we measure the quality of a movie by its fidelity to the source material. This isn’t an issue that’s unique to comic book movie fans—you can find this issue with fans of prose novels or other media that’s been adapted into film (say, Lord of the Rings and The Hobbit as perfect examples of this issue). However, comic book movie fans have exacerbated the issue to new heights and continue to do so with each new project, and it’s all becoming extremely toxic for the community’s growth. I’m not saying that fans aren’t within their rights to use an adaptation’s fidelity to its source material as a measure of the adaptation’s quality. Sure enough, an adaptation should have a significant degree of fidelity. The problem is, though, that comic book movie fans are consistently expecting too high of a degree of fidelity. The question is simple: what is a healthy and acceptable ratio of fidelity to originality for comic book movie adaptations? I won’t discount that fidelity is an important factor to the quality of an adaptation, but comic book movie fans are consistently discouraging and demonizing originality. We want our comic book movies to faithfully adapt its source material to the panel. If you don’t see the problem with that, I don’t know what to tell you except for “join a movie/book club that discusses adaptation.” It’s still a huge problem, though, because we’re the biggest critics for these movies and what we say does matter. The Internet becomes inundated with our reviews and rants about the newest comic book movies, news, and rumors for the world to see. When people who aren’t comic fans hear comic fans lamenting a movie for this or that trivial thing, their opinion may be influenced—and not for the better. At the end of the day, comic book movie fans are vital to the success of comic book movies. Here’s a hard truth pill to swallow: we are not a film studio’s target audience. Our box office dollars are only a small part of a comic book movie’s revenue. Studios aim for much broader swaths of audience demographics—what I call the general audience. We are a niche audience whose only use to studios besides spending our small portion of their income is to spread the word about the movies to the general audience. We are the gatekeepers. We help to influence the masses into theater seats with our hype or out of seats with our hate. Then there’s the matter of audience conversion—turning moviegoers into comic fans. You may think we don’t have as much of an impact on their views of the movies as I’m suggesting, but imagine how we could be turning moviegoers away from even a passing interest in comics with our vitriol. Comic fans’ hyper-criticism is a topic for a whole other article in itself, especially the damaging tribalism of the prevailing “us vs them” mentality. (I’m talking about that oft-used and inherently fandom-killing designation, “fake (comic) fan.”) I’m not even touching upon how we may even negatively influence studios and filmmakers during the creative process. (I’m looking at the DC movies and Iron Fist in particular.) That’s a gray area I’m not prepared to speculate on. I’m drained, you guys. Not just from writing his feature for your consideration and for my sanity, but also because I’ve been repeating these points on forums and Twitter ever since the latest generation of Venom movie news dropped. I feel like a firefighter in a blazing inferno that was once a forest armed with a super soaker. I’m hoping this article is at least one, large water balloon. That’s what makes me a cautious optimist: I believe that a positive attitude toward the issues I talk about will make some difference, but I’m also fully prepared to continue fighting against the inferno, knowing full well that there may be no happy ending. I’m cautiously optimistic about Sony’s Venom movie; I’m hoping against hope that it will finally happen and that it will be good enough, even though I’m fully aware of Sony’s track record and mindset and I’m bracing for the worst. I keep fighting, though, and that should count for something, right? I hope that after 4,051 words, you’ll join the fight, too, in the hopes that something will change—and if not, then at least you’ll be a bit happier than you were before. We all need a little positivity in our lives. ← Houchen Bindery Custom Comic Book Binding Review & Preparation Methodology for Marc Spector: Moon Knight Custom Omnibi Collections Follow Orion Petitclerc's Wordpress on WordPress.com View OrionSTARBOY’s profile on Facebook View OrionSTARB0Y’s profile on Twitter View OrionSTARB0Y’s profile on Instagram View orionpetitclerc’s profile on LinkedIn Article Categories Select Category Features Reviews Article Archives Select Month April 2017 (1) August 2016 (1)
cc/2021-04/en_middle_0086.json.gz/line10266
__label__wiki
0.783656
0.783656
'); jQuery("#searchform").css("display","block") jQuery(".nav").css("display","block") var n = 280; jQuery(".off-sidebar").click(function() { if(jQuery("body").hasClass("show-sidebar")) { jQuery("#content").animate({left: 0}, 250), jQuery("body").removeClass("show-sidebar") } else { jQuery("#content").animate({left: n}, 250), jQuery("body").addClass("show-sidebar") } }); } }); Progressive culture since 1954 By Godfrey Moase, Carina Garland and Shirley Jackson The world is covered with goods and services that only decades ago were the stuff of science fiction. Hand-held mobile communication was possible between the Enterprise crew on the cult television show Star Trek, while viewers were calling their friends and relatives on clunky, wall mounted telephones. Now, almost 6.8 billion people worldwide have a mobile phone, about a third of which are smartphones. For a hundred years, authors of page and screen have been fascinated by the prospect of robotics, and as a result automatons are found in manufacturing, aged care, and laboratories the world over. The Universal Basic Income (UBI) is the latest dream in transition to reality. Known by many names, the ‘Citizen’s Dividend’, ‘Negative Income Tax’, or ‘Income Guarantee’ is the idea that all citizens of a particular state will receive a stipend towards cost of living. There are no qualifiers or means-tests required; the money is given to everyone universally. This idea is gaining popularity and has been trialled at successive levels with positive results. In 2009, a charity in London gave 13 homeless men a basic income of £3,000. The results defied convention. On average, only £800 was spent in the first year and not one dollar was spent on drugs or alcohol. In 2010, 20 villages in India were given a similar opportunity to access a basic income for 18 months. They, too, were found to be both economically and socially empowered as a result of the experiment. This year has seen the announcement of basic income trials in parts of the Netherlands, while campaigners in Switzerland prepare for a referendum on the issue later this year. Yet it’s the recent news out of Finland that has caught the attention of global commentators. The small Nordic country is currently drafting plans to replace their welfare system with a UBI, which would see every citizen get an allowance of €800 (AU$1125) per month without restriction. This hasn’t happened overnight. Finland has a perfect storm of factors that have allows the UBI to be considered. A powerful union movement, a strong tradition of social solidarity, rising unemployment, insecure work, and the threat of economic stagnation has brought Finland to a point where it will consider such an ambitious program. Over 70 per cent of workers in Finland belong to a union, and workers currently receive their unemployment payments through their union. Hence the Finnish government’s initial response to cut their way out of crisis was met with powerful resistance, with millions of workers taking part in a general strike in September. The Finnish government, therefore, may be using the UBI as a means to sideline the Finnish union movement while minimising social resistance and managing tensions within a governing coalition of three parties. But this does not mean that the union movement should oppose the UBI as a matter of principle, in Finland or anywhere else. A growing number of Finnish workers are currently trapped in insecure employment with fluctuating hours and incomes, in industries without a strong union presence. As their insecure employment excludes them from Finland’s current welfare system, they are faced with a precarious existence. While the UBI obviously makes an explicit claim to be universal, there are implications that impact on particular groups of people differently. For instance, there are gender implications of a UBI, and the UBI has the capacity to offer a degree of economic and social freedom to women. If a UBI isn’t part of a broader strategy to create a fairer society, however, it can entrench traditional gender roles. If responsibility for caring duties is passed from the state to the citizen through the move to a UBI, arguably it will be women who will become charged with performing these. And while a UBI may offer women choices and freedoms via having their own money and being able to make decisions about how to spend this money, it can end up reinforcing gendered divisions of labour. People (overwhelmingly women) currently performing domestic work at home would at least be offered a wage for their duties, but there is a danger that women will be discouraged from participating in the traditional workforce. Another problem with the Finnish proposal is that it will leave single parents worse off. €800 per month is less than many currently receive in social security payments. This unnecessary punishment of single parent families could obscure the power within the UBI to liberate us from gender-based inequality. Having said that, the aforementioned trials in India led to generally positive outcomes for women. Run in conjunction with the Self Employed Women’s Association (a registered trade union), the UBI trial saw women’s socio-economic status improve, greater equity for those with disabilities, and growth stimulated in the village economies. As world leaders despair at growing inequality, and societies struggle to keep pace with the impacts of globalisation, a UBI makes sense – if they are committed to equality and dignity. All views expressed are solely that of the authors themselves. Image: Christopher Andrews / Flickr Overland is a not-for-profit magazine with a proud history of supporting writers, and publishing ideas and voices often excluded from other places. If you like this piece, or support Overland ’s work in general, please subscribe or donate. Godfrey Moase is Executive Director, United Workers Union. He’s previously written for the Guardian, Overland, Jacobin and New Matilda. Carina Garland is a feminist writer and communications officer at the NUW. Shirley Jackson is a Melbourne based freelance writer and PhD candidate, who is employed by the Young Workers Centre. More by Godfrey Moase, Carina Garland and Shirley Jackson From Thomas on 18 January 2016 at 11.30 am One argument against welfare in general is that it makes people lazy and unwilling to lookng for work, which has generally been shown to be incorrect. Therefore I’m not sure if mentioning that ‘…there is a danger that women will be discouraged from participating in the traditional workforce.’ is really beneficial to your argument. From Anonymous on 18 January 2016 at 3.41 pm From Godfrey Moase on 18 January 2016 at 4.30 pm Note the tense in which we wrote that sentence. A potential danger of the UBI to enforce patriarchal gender norms by removing the economic necessity of some women to find any work to support their family is a long way from saying that it makes people lazy and unwilling to look for work. From Alice on 19 January 2016 at 5.14 pm This makes not sense to me. The evils of patriarchal gender norms is not that women are not in work but that women do not have the money, power and fulfilment that may come from working. Forcing women into work through ‘incentives’ (i.e. the threat of poverty e.g by having payments cut off) is the current policy and I know from first hand experience that it is damaging to women, particularly single mums, because it is framed in terms of the woman not being a productive member of society rather than her own wellbeing. This harm is exacerbated if the woman also has a disability and/or is a minority and therefore has greater difficulty finding employment because blame is put on the woman for not finding work. To say that the UBI would take away this ‘incentive’ of avoiding poverty therefore plays into the existing system which already thinks that women are lazy and unwilling to look for work and so must threaten them to incentivise them. This is not a feminist system and the ‘incentive’ is a false one. The UBI would be more feminist because it acknowledges the work that women do already and does not try to create a nominal feminist state, in which value is judged by women’s numerical participation rather than the benefit they receive from work, through threats of privation. Leave a Reply to Alice Cancel reply 240 Spring 2020 out now t Follow on Twitter f Like on Facebook Matthew on The posthuman philosopher Anne Sikking on Hunger (or what I inherited from my grandmother) Alison Turner on Race, disability and the search for genetic supermen Greg on What happened to Richard Dawkins? Verity on Fiction | A child’s six 236 Spring 2019 235 Winter 2019 Speculative future(s) Future Sex (fiction) Subscribe to Overland Donate to Overland Buy current issue T-shirts & totes Judith Wright (poetry) Neilma Sidney (fiction) Nakata Brophy VU Short Story Prize Fair Australia Prize Pitch work Writing prizes © 2021 Overland literary journal
cc/2021-04/en_middle_0086.json.gz/line10268
__label__cc
0.725459
0.274541
Work in progress: Not for citation or reproduction. Please send comments, criticisms and suggestions to Chad Hansen at chansen@hkusa.hku.hk Chuang Tzu (Zhuangzi) Hui Shih's Teaching. Chuang Tzu: Skeptical Perspectivalism . Intuitionism. Skepticism v. Dogmatic Monism. Interpretive Issues. Practical Implications. Chuang Tzu (Chuang Chou, ca, 360 BC), along with Lao Tzu, is a defining figure in Chinese Taoism. Chuang Tzu probably authored only parts of the first 7 chapters of the present text, the so-called Inner Chapters. The others were written either by followers of thinkers of related but different theoretical orientations. They often expand on themes in the "inner" chapters. See SCHOOL OF CHUANG TZU for a more complete discussion of the "outer" chapters. The relation between the two founding figures of Taoism is a growing puzzle. Tradition treats Chuang Tzu as following Lao Tzu. We know of Chuang Tzu's life only what we can surmise from the text, which hardly confirms that traditional story. On the contrary, along with recent archeological discoveries, the text makes it as plausible that Chuang Tzu was the original Daoist. Graham speculates that Chuang Tzu may have been responsible for Lao Tzu's being regarded as a Taoist by using him as a fictional figure in his dialogues. Chuang Tzu used Lao Tzu's voice because he could "talk down" to Confucius. The message Chuang Tzu placed in Lao Tzu's mouth shared enough with the popular but anonymous text that people subsequently came to identify it as The Lao Tzu. This article will treat the Chuang Tzu without assuming he "followed" or inherited Taosim from Lao Tzu. This is only partly because of the textual issues complicating the traditional story. Using that story also complicates the interpretive task in requiring settling all the interpretive questions surrounding Lao Tzu's text. These are at least as stubborn as those in the Chuang Tzu. This article will simply treat Chuang Tzu as a philosophical discussant dealing with the central philosophical issues in his context. He shares both terminology and background assumptions with the other major philosophical figures. In particular, we will not presuppose that Taoists change the meaning of tao from its usual ethical sense to a, distinctively Taoist, metaphysical sense. Any metaphysical properties of a tao will, I assume, be those plausible to attribute to a guide to behavior. Chuang Tzu's familiarity with and confident handling of the technical language of ancient Chinese semantics make it probable that he had the ancient Chinese equivalent of analytic philosophical training. It is, thus, no accident that even philosophers skeptical of the general philosophical quality of Chinese thought hold him in the highest regard. The more likely candidate as Chuang Tzu's mentor (or philosophical colleague and friend) may be the monistically inclined dialectician Hui Shih (370-319 BC). Chuang Tzu mourns Hui Shih's death as depriving him of the person on whom he sharpened his wits. Chuang Tzu's key strategy for combating the ancient Chinese version of realism seems to come from Hui Shih. This article will therefore start with Hui Shih's theses (which are not included in THE LATER MOHISTS). In any case, our only source of information about them is The Chuang Tzu. Hui Shih's theory, furthermore, is crucial to understanding Chuang Tzu's philosophical position especially in relation to the Later Mohists. Chuang Tzu, despite his obvious affection, is ultimately critical of Hui Shih's monism and his optimism that debate and analysis would resolve philosophical issues. Traditional accounts have reckoned this as the mystic Chuang Tzu's haughty disdain for logic. However, Hui Shih's doctrines deal with philosophy of language more than with logic. So if we resist reading Chuang Tzu as following Lao Tzu, a strikingly different view of their dynamic emerges. Hui Shih (probably the more politically active) emerges as an erudite, enthusiastic, loquacious but somewhat confused, rather mystical, semantic dilettante. Chuang Tzu, in contrast, appears as a language theorist par excellence. Chuang Tzu reports enjoying debating with Hui Shih precisely because he was one of few with enough learning to be worth refuting. Still, he was ultimately a soft target for a dialectician of Chuang Tzu's caliber. Hui Shih's Teaching The "Empire" chapter of the Chuang Tzu contains an account of Hui Shih's doctrines. It comprises part of the first "history of Philosophy" in China--tracing the progression of different tao (doctrines) leading up to Chuang Tzu. We can understand Hui Shih's motivation best by viewing these passages against the background of the realist theory of language given by the LATER MOHISTS. These realists motivated their doctrine using the idea that real-world similarities and differences provide the basis for the conventional "carving" or "picking out" that divides thing kinds. They used a mereological version of a rudimentary natural kinds theory to explain how words and language work in guiding action in real situations. Hui Shih, we theorize, tried to undermine the Mohist semantic/metaphysical proposal by looking at comparative terms. They also mark distinctions in things, but it is less plausible that the distinctions are in the world. Where we draw the distinction depends on the context of the comparison. Whether this ant is large or small depends on varies when we are implicitly comparing it with other ants or with animals. Hui Shih focuses on such distinctions as large/small, thick/thin, high/low, south/north, and today/yesterday. Their common feature is that from different points of view we can assign either member of the term-pair to the same object. His typical paradox makes sense as a comment about how we might redescribe familiar paradigms from a distant perspective. Heaven is as low as the earth; Mountains are level with marshes. The sun from one perspective is in the middle from another declining. Natural kinds are from one perspective living and from one dying. I go to Yue today and arrive yesterday. The most important result for theory of language strikes at the Achilles heel of Mohist realism--the construction of similarity classes. The ten-thousand thing-kinds are ultimately alike and ultimately different. This is called the great similarity-difference. As the Chuang Tzu develops this insight, it amounts to the claim that we can find a difference between any two things no matter how alike they are and we can find a similarity between any two things no matter how different. So even if there are objective similarities and differences, they do not justify any particular way of distinguishing between thing kinds. For every category and name we use, we could have had conventions that as consistently and with equal 'world-guidedness' divide stuff up differently. The list of Hui Shih's sayings, however, begins and ends with claims about ultimate reality. He presupposes an ultimate perspective and an "everything" concept. Since distinctions are not in things, reality must be "one." His formulation invites the view (usually attributed to Taoists) that reality is a single, indivisible totality. The ultimately great, which has nothing outside it, call it the Great One! The ultimately small, which has nothing inside it, call it the Small One! Universally love the ten-thousand thing-kinds; the cosmos is one t'i (substantive part). The concluding statement echoes the Mohists' ethical doctrine of universal love and employs their technical term t'i. The Chuang Tzu account does not give us Hui Shih's reasoning, so we cannot be sure of his reasoning and intended implications of these formulae. However, it is tempting to read the conclusion as the familiar fallacy of inferring absolute claims from relative premises. Most interpreters follow Hui Shih in supposing that it is rational to conclude that all distinctions distort reality. However, if all distinctions are relative to some perspective, then, we have no basis to conclude anything about absolute reality. We have no rational access to a perspective from which it has no distinctions. Since interpreters commonly treat all Taoists as taking this view, we should start out by noting that the Chuang Tzu presentation of Hui Shih's views concludes: "He had many perspectives and his library would fill five carts, but his doctrine was self-contradictory and his language did not hit the target: the intent to make sense of things." Chuang Tzu, we may presume, understood the Later Mohist proof of the incoherence of denying all distinctions. Consider also Graham's speculation about Gongsun Long's "Pointing and Things" (see LATER MOHISM) and the argument that we can't point to an ultimate one. Whether or not Gongsun Long rejected the inference to an "everything" concept, Chuang Tzu clearly did. Chuang Tzu almost paraphrases Hui Shih in his rebuttal: 'The cosmos and I were born together, the ten-thousand things and I are one.' Now, having already constructed a 'one' is it possible to say something about it? Having already called it a 'one' can we fail to say something about it? 'One' and saying it make two. Two and one make three and going from here, even a skilled calculator can't keep up with us, let alone an ordinary man. Chuang Tzu: Skeptical Perspectivalism. Chuang Tzu had a unique philosophical style that contributes to the tendency to treat him as an irrationalist. He wrote philosophical fantasy rather than direct argument. Western readers interpret this style as signaling a romantic rejecting reason and analysis. The dichotomy, however, is hard to motivate in the Chinese philosophical context. We find no counterpart of the human faculty of reason (or its logical correlate) still less of the contrast of reason and emotion. Chuang Tzu's highleted the term, ch'ing which Buddhist's eventually co-opted to translate 'passion' or 'emotion'. However, it makes most sense in the Chuang Tzu it as 'reality', or 'the facts'. A more plausible hypothesis is that he presents his positions in fantasy dialogues to illustrate and conform to his perspectivalism. He puts positions up for consideration as if endorsing them, then reflectively abandons them. He does this either in the form of a fanciful conversation carried on among fantastic creatures (rebellious thieves, distorted freaks, or converted Confucians) or as an internal monologue. In his fantasy dialogues, Chuang Tzu seems to challenge us to guess which voice is really his. Even his monologues typically end a double rhetorical question in place of a conclusion."Then is there really any X? Or is there no X?" One key to Chuang Tzu's use of Hui Shih's relativism is his application to the concept of "use." Everything is useful from some position or other and there are some positions from which even the most useful thing is useless. Chuang Tzu illustrates this theme with his famous parables of the huge "useless" tree that, consequently, never got chopped down and the huge gourd that was useless to eat, but might make a good boat. Thus pragmatic arguments (like those of MO TZU) will always be relative to some controversial values. This observation does not justify our abandoning pragmatic arguments (which as we will see below, Chuang Tzu still uses). It only prompts us to be sensitive to how controversial our assumptions about "success" might be. Chuang Tzu develops perspectivalism in a more consistent direction than did Hui Shih. Possibly because of his knowledge of the Mohist refutation, he does not fall into the trap of rejecting language (as arguably Lao Tzu did). Being natural does not require abandoning language. Human language, from the empty greetings and small talk to the disputes of philosophers, is as natural a 'noise' is are bird songs. Disputing philosophers are 'pipes of nature'. Chuang Tzu's use of this metaphor signals that nothing he is going to say entails that disputation should stop any more than it does that brooks should stop babbling. Then he considers an objection to his opening metaphor: Language is not blowing breath; language users have language. That which it languages, however, is never fixed. He develops this critique (perhaps initiated by Hui Shih's relativism) with his own analysis of the indexicality of all distinctions. His argument relies heavily on the core terms of Chinese philosophical analysis, shih (is this: right) and fei (not this: wrong). (For details, especially in why reflections about shih-fei extend to language in general see SHI-FEI.) He starts by highlighting the indexical content of shih by contrasting it with pi (that). Chuang Tzu asks if anything is inherently 'this' or 'that'? Is there anything that cannot be 'this' or 'that'? These key terms in language illustrate the claim that it does not have any rigid, naming relation to an external reality. Language traces our changing position relative to reality. This perspectival pluralism differs from Western subjectivity in that Chuang Tzu does not highlight the perspectives of individual consciousness or internal representations--subjectivity. Arguably Chinese thinkers did not generate anything comparable to Western folk psychology. (See PHILOSOPHY OF MIND.) In fact, Chuang Tzu seems as fascinated with the shifting perspectives of even the same person at different times and in different moods as he is in the difference of perspective between different individuals. His main theoretical focus, however, is on the kinds of perspective arising from using language differently, i.e., being influenced by a different moral discourse. Chuang Tzu does reflect briefly on the perspective of "self." Recalling Laozi's emphasis on contrasts, he sees it as arising as a contrast or distinction with "other." He suggests the deeper source of the distinction is our inability to identify the source of "pleasure, anger, sadness, joy, forthought, regret, change, and immobility". They "alternate day and night" and not knowing where they come from we give up and merely accept that they come. Without them there would be no "self" and without "self," no "choosing of one thing over another." He notes the inevitability of our assumption that there is some "true ruler" harmonizing and oganizing the self, then adds, skeptically, that we never find any sign of it. Intuitionism Confucians, particularly idealistic Confucians (See MENCIUS) do identify a "natural ruler'--the moral heart. Chuang Tzu wonders how the heart can be any more natural than the other "hundred joints, nine openings and six viscera." Does there need to be a ruler? Can't each rule itself? Or take turns. The identification of one organ as supreme seems to conflict with the implicit intention to offer a natural basis for morality. (Mencius deals with this problem in connection with the distinction between nature and fate--see MENCIUS.) Chuang Tzu implies that all of the organs of the body grow together in encountering and adapting to life. As it does it is ch'eng (completed)--a term that Chuang Tzu uses somewhat ironically as suggesting that any completion leaves in its wake some defect. Translators frequently render it as "biased." That works well for understanding this criticism of idealistic Confucianism, for Mencius seems indeed to suggest that the heart does acquire a shih-fei direction from its upbringing. The translation, however, abandons the implicit irony--ch'eng is 'success', 'accomplishment' something we all aim for. Chuang Tzu's use suggests that our natural and common goal is not possible without some kind of skewing and loss. Thus all hearts equally achieve ch'eng. They grow up just as the rest of the body does. For the heart, this amounts to acquiring a pattern of tendencies to shih-fei judgment. (See MENCIUS) Every person's heart acquires some pattern or other. So if it is this heart, the one that grows with the body, that is the authority, then we all equally have one. Confucian innatists make a question-begging assumption about which pattern of ch'eng (completion) is really right. They advocate a program of cultivation so the hsin (heart-mind) will give the correct shih-fei judgments. Without it, they imply, the heart's natural potential will be lost. The sage's heart-mind is the ultimate Mencian standard for rightness of judgment. He is one who has allegedly fully cultivated his natural moral potential. Chuang Tzu wonders, from what perspective can we distinguish sage's heart-mind from a fool's? Both have a heart-mind and make shih-fei judgments. If we use A's judgments as a guide, A will look like a sage and B the fool and vice versa. There appears to be no way to identify the proper way to cultivate common to all existing heart-minds. The intuitionists beg another question in favor of their acquired perspective when they advocate cultivation. The appeal to the judgment of a "natural ruler" would leave everyone acting however they do act. Chuang Tzu's analysis of the ch'eng hsin (completed heart-mind) echoes Lao Tzu's analysis of knowledge as unconsciously acquired in the very process of learning language. Attitudes that seem natural and spontaneous may simply reflect early upbringing and experiential attitudes that have become "second nature." No innate or spontaneous dispositions survive without ch'eng influences. Chuang Tzu says that for there to be a shih-fei in the heart without its being put there in the process of ch'eng is "like going to y�eh today and arriving yesterday!" Skepticism v. Dogmatic Monism The linguistic nature of perspectives comes more to the fore when Chuang Tzu responds to the Later Mohists. He notes that the Mohists' term of analysis, ke (assertable), is obviously relative to conventional, linguistic perspective. Different and changing conventions of usage and principles still constitute conventions and generate a language and a perspective. Single schools of thought may split and disputing factions may combine again. Any language that actually is spoken is assertable. Any moral language for which there is a rival is (from its point of view) not assertable. Chuang Tzu hints that the confidence we get in the appearance of right and wrong in our language is a function of how fully we can elaborate and embellish--how effectively we can continue on with our way of speaking. We argue for a point of view mainly by spelling it out in greater detail. The seemingly endless disputes between Mohists and Confucians arise from their respectively elaborated ways of assigning 'is this' and 'not this'. As we saw, each can build elaborate hierarchies of standards that seem to guide their different choices and considers the errors of their opponents to be "obvious." Chuang Tzu, wary of Hui Shih's error, generally avoided contrasting our limited perspectives to any cosmic or total one. He contrasted them mainly with each other. His 'perspective' on the relativity of language Chuang Tzu calls ming (clarity). It is tempting and common to suppose ming is some absolute standpoint. Chuang Tzu extrapolates in imagination what would happen if we reversed our course back to the 'axis' from which all guiding discourse begins. From that 'axis,' he says, no limit can be drawn on what could be treated as 'is this' or 'is not this'. All shih-fei patterns are possible, none actual. From that axis, therefore, we make no judgments. It is not a relevant alternative to the disputing perspectives. If we succumb to the interpretive temptation, we fall back into the anti-language abyss. The absolute viewpoint cannot advocate or forbid any dao. From the perspective of ming, it is not even a point of view. Any practical guide is an actual path of judgment making that takes one from that axis down one particular (indefinitely elaboratable) way of making distinctions. Even if thing-kinds are made 'so' by our classifications, we can't conclude they are 'not-this'. Chuang Tzu emphasizes the infinite possibility of these standpoints. Occasionally, however, he presents it as almost a tragic inevitability. Once we have started on a tao, we seem doomed to elaborate and develop it in a kind of race to death. Youth is the state of being comparatively open to almost any possibility and as we grow and gain knowledge, we close-off the possibilities in a rush toward old-age and death. The inflexibility of intellectual commitment to a conceptual perspecive that is so rigid that any thing we encounter already has a classification. Nothing can free us from the headlong rush to complete our initial committments to shih and fei as if they were oaths or treaties. We rush through life clining to the alternative we judge as winning. "Is life really as stupid as this? Or is it that I am the only stupid one and there are others not so stupid." Lacking any theoretical limit on possible perspectives, guiding systems of naming, we lack any limit on schemes of practical knowledge. No matter how much we advance and promote a practical guide, a way of dealing with things, there are things we will be deficient at. To have any developed viewpoint is to leave something out. This, however, is not a reason to avoid language and a perspective; it is the simple result of the limitless knowledge and limited lives. So-called 'sages' project their point of view and prejudices on nature, which they then treat as an authority. 'Those who have arrived' allegedly know to deem everything as one. Chuang Tzu does not recommend we emulate that attitude. Instead of trying to transcend and abandon our usual or conventional ways of speaking, Chuang Tzu recommends that we learn to treat them as pragmatically useful. They enable us to communicate and get things done. That is all it is sensible to ask of them. Beyond what is implied in the fact that our language is useful (from the standards of our perspective), we don't know the way things are in themselves. We signal our lack of that pure metaphysical knowledge by calling reality 'tao'. Treating metaphysical ultimate as 'one' differs from saying nothing about it only in attitudinal ways. In the end, neither skepticism nor monistic mysticism says anything about ultimate reality. They are characterized by the different attitudes one takes in saying (essentially) nothing. Chuang Tzu's balance between skepticism and monism surfaces in a number of places. In one he traces the "devolution" of the knowledge of old from knowing "nothing exists" to knowing "one" to knowing things but no distinctions or boundaries and finally to knowing shih-fei. In another notoriously obscure passage, Chuang Tzu is skeptical about skepticism. However, he does not appeal to our familiar sentential grounds. (He does not ask how he knows that he doesn't know. He does ask how he can know what he does not know.) His question centers on distinction grounds. (He wonders if he knows how to distinguish between knowing and ignorance). Chuang Tzu's philosophical writings highlight his different approach to skepticism by their treatment of dreams. He does not use dreaming to motivate skepticism. He takes it as already motivated on semantic grounds. (Is there any real relation between our words and things?) Dreaming then becomes a further illustration of a skepticism rooted in worries about whether there is a right way to distinguish with or "pick out" using a word. The dreaming-waking distinction is one we use to organize "what happens" (in the broadest sense). We have learned to use that distinction to bring greater unity or coherence to our experience. In a dream we can still make the distinction between dreaming and waking. Ultimately we can wonder about other ways (the pragmatic advantages) of making that distinction. Chuang Tzu fulfills his heart's desire in dreaming the butterfly. He doesn't know how to distinguish Chuang Tzu's dreaming a butterfly from a butterfly's dreaming Chuang Tzu. (Translations convert the distinction-point into a propostional one.) Interpretive Issues Because Chuang Tzu puts his positions in fantasy and parable, interpretions of his point are inherently subject to dispute. (Perhaps Chuang Tzu intended this outcome.) We can either attribute to him what actually follows from perspectival pluralism or attribute some familiar but invalid conclusion. Some interpreters read it as monism (entailing dogmatic skepticism--everyone is wrong), others as classic relativism (everyone is right!). Neither of these, however, follow from perspectivalism. For each, one may cite passages where the position is forumulated, but it is always left unclear whether the passages express Chuang Tzu's considered point of view or is merely one on which he is critically reflecting. Some of Chuang Tzu's most memorable images and parables illustrate the interpretive impasse. Chuang Tzu tells us of an encounter between a Giant Sea Turtle and a frog in a well. It is natural to suggest the Sea Turtle represents some ultimate truth not accessible to the frog (as does the Chinese parable based on the story). However, in Chuang Tzu's account, the sea turtle cannot even get one flipper into the frog's well. He is as incapable of appreciating the frog's perspective as the frog is his. Similar analysis applies to the Great Bird and the small chicadee, the great fish etc. Chuang Tzu is the least likely thinker to take "great" and "small" as signs of absolute value. The dogmatic monistic reading relies on the epistemology of mysticism. Chuang Tzu must have some unexplained route to meta-knowledge that everyone else lacks. The burden of this interpretation is showing that Chuang Tzu's arguments do not undermine the conception of knowledge proposed by the interpreter. The above refutation of Mencius seems to apply mutatis mutandis to any view of a special transcendent insight or intuition. It is not clear how he could be astute enough to see the fallacy in Mencius' view and naive enought to turn around and adopt what is effectively the same view except for its talk of a natural organ. The relativistic interpretation is plausible to the extent that Chuang Tzu clearly views all existing points of view as natural points of view. Saying they are natural (smoothing them on the whetstone of nature) is neither to approve nor to judge them equal. Nature's standpoint is the one from which Chuang Tzu removes the traditional authority. Other schools (with the exception of the LATER MOHISTS) thought identifying a tao (guide) as t'ian (natural or heavenly) was the goal. For Chuang Tzu, the goal is too easily reached to be of any prescriptive help. All we can say is "it is"--equally true of all perspectives we encounter--including those of other animals. Chuang Tzu implies that judgments about perspecives--particularly judgments about value--presuppose some perspective--a tao. He substitutes the authority of tao for the authority of t'ien. Any evaluative judgment that different tao are equal must be a result of a) taking some perspective for granted or b) concluding that we should not make any judgment. Getting an absolute conclusion from Chuang Tzu's perspectivalism encourages the reading according to which tao has become The Tao. What is the alternative? Chuang Tzu thinks we must stand on a point and his standpoint is his perspective on perspectives--ming (discrimination). It is not The viewpoint but Chuang Tzu is implicitly promoting it. That perspective, however, countenances all kinds of judgments about a number of other perspectives--approving some more than others. The problem with (b) is that, given Chuang Tzu's view of the relation of language and judgment, it amounts to saying that we should stop speaking--which we concluded above, we should avoid attributing to Chuang Tzu. The safest solution is to assume he does make judgments from his perspective on perspectives. He does not, in doing so, presume it is an absolute, total or cosmic perspective. It is, as he admits, "of a type with the others" still he can only make judgments from the perspective and gives no reason to stop making judgments in adopting it. Saying it is a perepecive is not a condemnation. It requires only the realization that there are other perspectives. We do not need to presuppose some absolute or total view to recognize that our views are partial. Nor need it imply that the perspectives are mistaken about something. Chuang Tzu's emphasis is epistemological not metaphysical. His frequent suggestions that there could be a fantastically adept and successful tao (e.g., that one might reach the point of being able to endure fire, cold, lightning and wind, to harnass natural powers, to travel immense distances) require two things. One is that there is some actual world with real properties which some tao reflect and other do not. The other is that we use our present standards of success (desires, fantasies, goals, delights etc.) to evaluate the practical success of alternative perspectives. Chuang Tzu's perspectivalism is offered in a philosophical context in which it is expected that a philosophy will have some practical point. No practical moral seems to follow from absolute skepticism, monism nor from relativism. In any case, we seem to have to take Chuang Tzu to be reflectively aware that any advice that he offers is advice from a perspective--the ming perspective on perspectives. What advice does follow from that insight into the nature of knowledge. We have already hinted at a couple of the practical points--both of which have to be carefully circumscribed for coherence. First, Chuang Tzu mildly recommends a kind of perspective flexibility. The recommendation is like the recommendation to be young. To be young is to be open to new ways to think and conceptualize things. The more committed you get to a scheme, as we saw, the "older" you become intellectually until you are dead from the very act of learning. This first practical line is paradoxical on several grounds. First, any reason we may have for being flexible in adopting or tolerant to other points of view has to be a reason that motivates us from our present point of view. We have to be able now to envision that the altrnative way of thinking will help us achieve things that we presently value better than our present scheme does. Not any other point of view will be a candidate for this kind of openness. So this would not be an abstract argument for any kind of openness. Thus Chuang Tzu is not, as some have argued, required to be tolerant of Nazism, say. Remember that Chuang Tzu's ming is still rooted in our present point of view--it is not some cosmic kind of tolerance that says anything goes. Judgment is not only still possible, it is still inescapable. Second, the motivation for being open to a point of view is because of the potential of acquiring it (thus closing off the possibilities of its rivals). The naivete of youth is valuable only because it represents the possibility of mature sophistication. If we were to take the invitation to openness as an abstract good, then his perspectivalism would give us no reason to value it. The second practical point is a negative one. We suppose that one of the reactions to the difficulties of defending moral conventions where these are controversial (say in advocating moral reform in the sense that one advocates that the culture or society alter its moral attitudes) is to reject all conventions. As we have noted, the LATER MOHISTS showed that this posture as applied to language is incoherent. And Chuang Tzu seems to say only that we don't have to--not that we should or shouldn't. However, he does add that the usual is useful and thus interchangeable and that is all we can ask of it. So the second bit of "advice" is simply not to waste conventions that are useful. Clearly, again, this must be useful from one's present point of view, values and standards. The third possible item of practical advice forms a long and controversial section in which Chuang Tzu draws a more favorable portrait of specialization. His example is consistent with Aristotle's observation that human life offers no more fulfilling activity than the exercise of some acquired skill. Highly honed skills invite paradoxical, almost mystical, description. In performance we seem to experience a unity of actor and action. Such practice is a way of losing oneself as one might in contemplation or in a trance. The accuracy of our own actions sometimes mystify us. We do not understand how we did it--we certainly cannot explain it to others. Here is Chuang Tzu's account: Cook Ting was slicing up an oxen for Lord Wenhui. At every push of his hand, every angle of his shoulder, every step with his feet, every bend of his kneezip! zoop! he slithered the knife along with a zing, and all was in perfect rhythm, as though he were dancing to Mulberry Grove or keeping time as in Qingshou music. "Ah, this is marvelous!" said Lord Wenhui. "Imagine skill reaching such heights!" Cook Ting laid down his knife and replied, "What I care about is a tao which advances my skill. When first I began cutting up oxen, I could see nothing that was not ox. After three years, I never saw a whole ox. And nownow I go at it by spirit and do not look with my eyes. Controlling knowledge has stopped and my spirit wills the performance. I depend on the natural makeup, cut through the creases, guide through fissures. I depend on things as they are. So I never touch the smallest ligament or tendon, much less bone." "A good cook changes his knife once a yearbecause he cuts. A mediocre cook changes his knife once a monthbecause he hacks. I have had this knife of mine for nineteen years and I've cut up thousands of oxen with it. Yet the blade is as good as if it had just come from the grindstone. . . . " "Despite that, I regularly come to the end of what I am used to. I see its being hard to carry on. I become alert; my gaze comes to rest. I slow down my performance and move the blade with delicacy. Then zhrup! it cuts through and falls to the ground. I stand with the knife erect, look all around, deem it wonderfully fulfilling, strop the knife and put it away." Traditional interpreters stress the mystical flavor, the reference to tao. One way to read the claim that tao advances skill is as the claim that it surpasses skill. This traditional commitment to a mystical, monistic tao requires that accomplishment not be related in ordinary ways to practice and skill. It must come from some sudden and inexplicable insight, mystical experience or attitude. This interpretation coincides with a familiar Zen view. The absolutist monistic interpretation should resist the suggestion that Ting knows his tao and still can improve. How can you have some of a tao that has no parts? When you have it you suspend entirely all thought and sensation. Cook Ting's story clashes slightly with this religious or mystical view of Chuang Tzu's advice. His description implies that Ting has a hold on a particular way of doing one thing. Ting's way is developing. He continues to progress in pursuing his skill by tracing his tao to points beyond his previous training. When he comes to a hard part, he has to pay attention, make distinctions, try them out and then move on. This supports the view that developing skill eventually goes beyond what we can explain with concepts, distinctions, or language. The focus required for a superb performance may not be compatible with a deliberating self-consciousness. The Butcher does not say that he began at that level of skill. He does not report any sudden conversion where some mystical insight flowed into him. He does not say that he could just get in tune with the absolute Tao and become a master butcher automatically. And he does not hint that by being a master butcher, he is in command of all the skills of life. He could not use his level of awareness at will to become a master jet pilot or a seamstress. His is not an account of some absolute, single, prior tao but of the effect of mastering some particular tao. We all recognize the sense of responsive awareness which seems to suspend self-other consciousness. It is natural to express this ideal of skill mastery in the language which suggests mystical awareness. It does normally involve suspension of selfconsciousness, ratiocination and seems like surrender to an external force. That language should not confuse us, however. Chuang Tzu's mingillumination should help us see that the full experience is compatible with having his perspective on perspectives. Cook Ting can be aware that others may have different ways to dissect an ox. He simply cannot exercise his skill while he is trying to choose among them. We lose nothing in appreciating the multiple possibilities of ways to do things. In realizing a tao of some activity in us, we make it real in us. It is neither a mere, inert, cognition of some external force nor a surrender to a structure already innate in us. Note, further, that Cook Ting's activity is cutting--dividing something into parts. When he is mastering his guiding tao, he perceives a world in which the ox is already cut up. He comes to see the holes and fissures and spaces as inherent in nature. That seems a perfect metaphor for our coming to see the world as divided into the natural kinds that correspond to our mastery of terms. When we master a tao we must be able to execute it in a real situation. It requires finding the distinctions (concepts) used in instruction as mapping on nature. We don't have time, anymore, to read the map, we begin to see ourselves as reading the world. Mastering any tao thus yields this sense of harmony with the world. It is as if the world, not the instructions, guides us. This feature of tao mastery explains the temptation to read Taoist use as having become metaphysical. Guidance may, in the first instance, be broadly linguistic--telling, pointing, modeling. The choice of a butcher for this parable seems significant too. Butchering is seldom held as a noble profession. Even the "Ting" may be significant--it may not be the cook's name but a sign of relatively low rank--something like an also-ran. Other popular examples of the theme include the cicada catcher and wheelwright. Chuang Tzu probably intends to signal that this level of expertise is available within any activity. Common interpretations, however, suggest that some activities are ruled out. The examples above, together with Chuang Tzu's obvious delight in parable, fantasy, and poetry invite the common hypothesis that, in the West, he would be a romantic--suspicious of direct, reasoned, logical discourse in favor of the more "emotional" arts. At least, one should eschew "intellectual" activities. That he is critical of Hui Shih, the alleged logician, supports this reading. The problem is that Chuang Tzu's parallels his comments about Hui Shih with similar comments about a lute player. Furthermore, the criticism does not seem to be the activity, but the search for absolute know-how. Chuang Tzu's "criticism" is that in being good at X, these paradigms of skill are miserably inept at Y. This is another example of ch'eng (completion) which Chuang Tzu argues is always accompanied by hui (defect). We may achieve this absorption in performance by achieving skill at any tao--dancing, skating, playing music, butchering, chopping logic, lovemaking, skiing, using language, programming computers, throwing pottery, or cooking. At the highest levels of skill, we reach a point where we seem to transcend our own selfconsciousness. What once felt like a skill developing inside us, begins to feel like control from the natural structure of things. Our normal ability to respond to complex feedback bypasses conscious processing. In our skilled actions, we have internalized a heightened sensitivity to the context. These reflections lead us to a problem with "achieve tao mastery" as a prescription. I shall argue that the problems are both textual and theoretical. On other places, (as we noted above) Chuang Tzu is more equivocal about the value of mastery. Any mastery, Chuang Tzu notes, must leave something out. Most particularly, to master any skill is to ignore others. Chuang Tzu remarks that masters are frequently not good teachers. They fail to transmit their mastery to their sons or disciples. Chuang Tzu directs our attention to this problem with the glorification of total skill dedication and mastery. We trade any accomplishment at one skill for ineptitude at some other thing. The absent minded professor is our own favorite parody. If the renowned practitioners have reached completion, he says, then so has everyone. If they have not, then no one can. From the hinge of ways perspective, we no more value the world's top chess player than the world's finest jack of all trades. We need not read Chuang Tzu as advocating specialization per se. Thus the three parts in Chuang Tzu's dao pull in separate directions and we must treat each as tentative and conditional. The flexibilty advice seems hard to follow if we also accept convention and work for single-minded mastery. That, in the end, may the message of perspectivalism. We have limits, but we might as well get on with it.
cc/2021-04/en_middle_0086.json.gz/line10275
__label__cc
0.505563
0.494437
Last day to comment on Proposed Delaware School Transgender Policy 225 Added by Kelli Busey on December 3, 2017. Tags: Delaware, Transgender policy 225 Those opposed to the affirming lifesaving 225 wore orange shirts saying so. Delaware’s proposed transgender student policy 225 flew under the radar for many, except some anti-trans hate groups, who have used fear to draw an angry response from the general public. The Deleware Legislature directed the State School Board to produce a transgender policy which can be read HERE and conduct a comment period and town hall meeting with the public, which they have done. For readers in Delaware GLSEN has a wonderfull sample email in support of DE Admin. Code 225 This all would have gone mainly unheralded but for The Delaware Families.org, an affiliate of hate group “alliance defending freedom” and the infamous “Focus on the family”. Delaware Family.org has been busy scare-mongering parent that the policy will make their girls show with boys and that they are being called ‘non-allies’ who are in jeopardy of being stripped of their parental rights by the government. The proposed policy does allow for a student to self-identify if it is determined that doing so without the parent’s knowledge is in the child’s best interest. There is a lengthy procedure to come to this conclusion, but one that under the correct circumstances will save children’s lives. But nowhere does the policy denigrate parental rights. Obviously, the parents that the Delaware Families have brought to the conversation all feel that their child couldn’t possibly be transgender. They only see it as a threat to their child and their parental rights. Then, of course, there is the ‘bathroom’ and Locker room’ dog whistle which the Deleware Familes.org has been blowing loudly. Never mind that there has never been an instance of a transgender student violating a cisgender students privacy in public accommodations. Ever. Anywhere. What makes news clickbait. Angry reactions from parents during the comment time allotted by the State school board which ends on December 4th. News of this just appeared. What doesn’t make news. Successful suicide attempts by transgender youth. No ones know why children killed themselves except perhaps a parent. And all too often they are in such denial they will attempt to erase the child’s history as happened with Leela Alcorn. Make no mistake. There is a portion of society that would be fine not knowing why children kill themselves. A highly cited study shows that 50% of transgender youth attempt suicide before their 20th birthday. That rate is considerably lower, paralleling cisgender youth suicide rates, in states and countries that have transgender-inclusive laws and policies. Obviously, there is hope amongst our youth where acceptance and opportunity exists. The prevalence of self-harm and suicidal idolization is exacerbated by parents who refuse to accept that their precious child doesn’t meet their gender expectations. Yes, you heard her correctly. She said 225 would allow children to self-identify their race. Kelli Busey Editor in Chief at Planet Transgender | Website Kelli Busey an outspoken gonzo style journalist has been writing since 2007. In 2008, she brought the Dallas Advocate on-line and has articles published by the Reconciling Ministries Network, The Transsexual Menace, The Daily Kos, Frock Magazine the TransAdvocate, the Dallas Voice and The Advocate. Kelli, an avid runner is editor in chief at Planet Transgender which she founded in 2007.
cc/2021-04/en_middle_0086.json.gz/line10278
__label__wiki
0.623498
0.623498
Magnum: Stargazer Alien Mail Order Brides #3 (Intergalactic Dating Agency) Stargazer Alien Mail Order Brides Tasha BlackNov 2016 13th Story Press $3.93 $2.99 Ebook 23% price drop on Jan 15 How far will this alien go to protect the human female he loves? Rima Bhimani lives with her nose in a book and her imagination in the clouds until real life hands her an adventure she can’t resist, in the form of a sexy alpha alien. Magnum’s every touch sets her blood on fire. So why does he seem to fight their attraction? Magnum has a secret. It’s darker than his lust for Rima, and deeper than his respect for the planet that has become his new home. But his needs are getting harder to restrain. How far will he go to protect the woman he loves? About the Stargazer Alien Mail Order Brides series: Known for its famous maple pancakes, the small town that renamed itself Stargazer has constructed a huge satellite radio transmitter that sends messages of welcome into the cosmos. When our otherworldly brothers arrive at last they expect a warm welcome… These gentlemen have been designed just for your pleasure. Consider them a hostess gift to the women of Earth. Come to Stargazer, Pennsylvania for the pancakes. Stay for the boys. More by Tasha Black Kade: Alien Adoption Agency #2 She’s the target of an intergalactic bounty hunt. But he’s going to capture her heart. Aurora Day is running from a crime she didn’t commit – or at least, she didn’t mean to commit. But the intergalactic soldiers on the hunt for the woman known as the Fox don’t care about the details. Hiding out on the remote frontier moon of Clotho is her only hope for survival. But to gain access, she has to adopt an alien baby. Aurora is shocked when she learns that a dragon warrior of the Invicta is part of the package. Kade knows two things about Aurora. The bright-eyed Terran is going to be the mother of the child he has pledged to guard and grown to love. And the mysterious woman is fated to be his mate. But Aurora has no interest in his love, and she doesn’t even seem to be that interested in adorable baby Lyra. She’s clearly hiding some secrets, and Kade is determined to unearth them before his dragon’s wild lust for her burns them both alive. When Kade runs afoul of the local law enforcement, only Aurora can save him. The perfect life she’s dared to dream of is almost in her grasp, and now it’s all about to come crashing down around her. Will she stand her ground and fight for her new family? Or will the Fox keep running for freedom? If you like strong women, hunky aliens, wild adventures, steamy sensual scenes, and happily-ever-afters, then you’ll love the world of Stargazer! Alien Adoption Agency is a Stargazer Alien Series – read them all: -Noxx -Kade -Tyro And check out the other Stargazer Alien series: Stargazer Alien Barbarian Brides Stargazer Alien Space Cruise Brides Stargazer Alien Reality Show Brides Stargazer Alien Mystery Brides Tyro: Alien Adoption Agency #3 Phoebe has nothing but her secrets. Her alien protector is determined to lay them bare. Phoebe arrives on the moon of Clotho with a trunk full of secrets and an imagination filled with preconceived notions about life on the frontier. She’s more than ready to scrap and fight for her own piece of farmland, and a future for the little one she is adopting. When her new land turns out to be underwater, and the baby shows up in the strapping arms of an Invicta dragon-guard, Phoebe doubles down on her promise to herself to live free, or die trying. Tyro never asked to be made guardian to a baby. But little Atlas has his heart, and he is shocked to find that the baby’s adopted mother has his soul. His inner dragon roars triumphant, but his human side must fight to win her over. If only the headstrong little Terran would slow down long enough to let him claim her before mad desire pushes his restraint to the limit. When the farm is threatened, the two must work together to protect Atlas’s future. But then Phoebe’s past comes back to find her, and she has a decision to make that could derail even the best laid plans. Tyro is willing to bet the farm on their future together. Will Phoebe run, or will she decide to land herself an alien? Fiction / Romance / Paranormal / General Fiction / Romance / Science Fiction Fiction / Science Fiction / Alien Contact This content is DRM free. Continue the series Kitt: Stargazer Alien Mail Order Brides #4 (Intergalactic Dating Agency) Summer loving never happened so fast… From USA Today bestseller Tasha Black… an all-new season of the sizzling Stargazer series... Honey McCarthy is a dancer with a penchant for bad boys. When her summer job teaching ballroom classes at a family resort in the Catskills turns into a matchmaking gig for smoking hot fugitive aliens she’s not sure who she can trust - the friends who have had her back all summer, or the handsome stranger who visits her dreams. Kitt has been sent to Earth for one purpose, to fill one woman with as much pleasure as she can bear - a mission he would enjoy very much if Honey would stop second-guessing herself and accept his touch. But Kitt will be lucky if Honey can keep herself out of harm’s way long enough to give in to the hunger he sees in her eyes. When an ex-flame threatens to extinguish the woman he loves, Kitt will have to decide between celestial peace and his urgent need to protect Honey. About the Stargazer Alien Brides series: Educated about humankind by the 1980s movies that came to them in an interstellar time capsule, these gorgeous gentlemen are eager to meet Earth girls... Season 1 focused on three couples in a small Pennsylvania town, featuring Bond, Rocky and Magnum. Season 2 follows the story to a resort in the Catskills where three new couples meet. Kitt tells the first part of this new story, with more to come in Remington and Indiana... Remington: Stargazer Alien Mail Order Brides #5 (Intergalactic Dating Agency) This hunky alien is a tall drink of water… Addy Barnes has been living two lives. School-year Addy is all work and no play, fiercely determined to be the first doctor in a family of nurses. Summertime Addy is a party animal at the resort in the Catskills where she teaches swimming. Keeping her two lives separate has never been a problem… until this summer, when the mouthwatering Remington arrives to turn both her worlds upside down. This female human is a breath of fresh air… Remington arrives at Maxwell’s Resort with only one goal: Remain under the radar so that the staff and guests don’t suspect he’s an alien. But after the arid cliffs of his home planet, the rich greens and blues of the resort are too seductive to resist. And at the heart of it all is Addy Barnes with her aqua eyes and shimmering hair. The curvy co-ed is saturated with sunshine and the warm, welcoming water of the swimming pool. All Remington wants to do is soak her in. The lovers quickly find themselves in deep water... When outside forces threaten to close down life as they know it Remington must risk his life to save Addy’s. Will their summer love burn out? Or do they have what it takes to last the whole year round? Season 2 follows the story to a resort in the Catskills where three new couples meet and features Kitt, Remington and Indiana. Indiana: Stargazer Mail Order Brides #6 (Intergalactic Dating Agency) She needs to get this gorgeous alien undercover. And all he wants is to get her under the covers. Nikki Fortune has a secret. Her friends think she’s at Maxwell’s Family Resort to teach drama and take endless tennis lessons. But her real purpose forces her to dig deeper into the network that runs the resort than she ever imagined. If only the distractingly handsome alien, Indiana, weren’t there she might be able to keep her eye on the ball. Indiana has a lot on his mind, not the least of which is figuring out Nikki Fortune. Why does she disappear every Sunday morning? What’s on that laptop she always carries? Why would someone who obviously hates tennis keep taking lessons? And why, gods, why, is she so blindingly stunningly, achingly sexy? When Indy stumbles onto some answers the two realize they must work together if they want to uncover the truth. But the only way to do that is to trust each other. And someone still has a secret. Lobo: Stargazer Alien Mail Order Brides #7 (Intergalactic Dating Agency) Her life has gone to the dogs… literally. After a bad break-up with a long-term boyfriend Veronica can finally devote herself fully to training search and rescue dogs for the local police department. The only problem is that she has to train the humans too, and they’re not as much fun as the K-9 officers. Until Lobo… Lobo has arrived on Earth with nothing but the brand-new human body he inhabits and the mission to find a mate and annihilate her with pleasure until she accepts him. Although nearly every Earth female he meets seems most eager to get to know him better, Lobo finds himself drawn only to Veronica. And she refuses to acknowledge their mutual attraction. The only way to her heart is through the dogs. When one of the K-9s is in trouble, it’s up to Veronica to help him but there’s only one problem - dogs can’t talk. And while the rest of the department is ready to give up on the canine, Lobo offers to help solve the mystery and save Veronica’s best friend. Can Veronica accept Lobo’s help while hanging onto her feelings? Or will the sexy alien bring her heart to heel? Veronica will have to be one sly dog to avoid Lobo teaching her new tricks… Season 2 followed the story to a resort in the Catskills where three new couples meet and features Kitt, Remington and Indiana. Season 3 continues the adventure with three new couples in a small-town police academy, featuring Lobo, Conan and Hawkeye. Conan: Stargazer Alien Mail Order Brides #8 (Intergalactic Dating Agency) What do you do when the man of your fantasies is stealing into your dreams? ​Brooke Singleton is a highly skilled hand-to-hand combat trainer for the police academy. The cadets respect her, her friends adore her and her dream of running her own gym is coming true. But Brooke’s charmed life is fraying at the edges. Her nights are dogged by terrible nightmares of her military service. And a handsome stranger from another planet has arrived, stirring up her emotions with his every heated glance. And he isn’t satisfied with haunting her days, he’s taken to showing up in her dreams as well. Conan wants only one thing - for brave, beautiful Brooke Singleton to be his mate. But Brooke denies him at every turn. If it weren’t for the nights he visits her dreams, he wouldn’t even know that she craves him more than her next breath. And that would be a pity, because fulfilling Brooke’s wildest desires is all he can think about. When outside forces threaten Brooke’s home and gym, she and Conan must work together to protect the life she and her friends have built. Brooke will need a hand facing her fears if she wants to preserve what matters most. But can the broken warrior open her heart to let Conan help her? About the Stargazer Alien Brides series (Intergalactic Dating Agency): Collection 1 focuses on three couples in a small Pennsylvania town, featuring Bond, Rocky and Magnum. Collection 2 follows the story to a resort in the Catskills where three new couples meet and features Kitt, Remington and Indiana. Collection 3 continues the adventure with three new couples in a small-town police academy, featuring Lobo, Conan and Hawkeye. Stargazer Alien Mail Order Brides: Collection #3 (Intergalactic Dating Agency) Grab all three sizzling SciFi Romance books for one low price! ​Book Seven: Lobo Book Eight: Conan ​What do you do when the man of your fantasies is stealing into your dreams? Brooke Singleton is a highly skilled hand-to-hand combat trainer for the police academy. The cadets respect her, her friends adore her and her dream of running her own gym is coming true. But Brooke’s charmed life is fraying at the edges. Her nights are dogged by terrible nightmares of her military service. And a handsome stranger from another planet has arrived, stirring up her emotions with his every heated glance. And he isn’t satisfied with haunting her days, he’s taken to showing up in her dreams as well. Book Nine: Hawkeye Soft-spoken Trinity loves her friends and her quiet life as an IT specialist for the police academy. But when three aliens arrive from Stargazer, Trinity’s peaceful existence is disrupted in a big way. And one of the aliens seems bound and determined to excite Trinity’s sensuality as well as the rest of her life. Trinity isn’t looking to become an alien’s mate. But there’s something about him that leaves her feeling off-balance, and it’s not just his big sexy body… Collection 4 features Kirk, Buck and Solo as they try to connect with their chosen mates at a comic convention. Collection 5 comes back to Stargazer, and a small farm where love is in bloom for Drago, Burton and Riggs. Dark Matter: Big Sky Alien Mail Order Brides #3 (Intergalactic Dating Agency): Big Sky Alien Mail Order Brides #3 (Intergalactic Dating Agency) Dating and mating are the irrational pursuits of mortal races while the rare vrykoly species watches dispassionately from afar. But after his captain and first officer find love with the extraordinary females of Earth, this vrykoly is forced to wonder if he was—dare he say it?—wrong. Piloting the deathly cold and vast distances of space is why he was meant to exist, all he’s ever known, and even his dreams have always been black and still. Can anyone ever love a soul-sucking space vampire? They're looking for love in all the wrong galaxies... Intergalactic Dating Agency Big Sky Alien Mail Order Brides #1 ~ Alpha Star #2 ~ Red Shift #3 ~ Dark Matter Red Shift: Big Sky Alien Mail Order Brides #2 (Intergalactic Dating Agency): Big Sky Alien Mail Order Brides #2 (Intergalactic Dating Agency) Banishing his own needs, he followed his prince into battle and--more terrifying yet--into courtship but got lost in the backwater wilds of Earth. Now this space-faring drakling dragon-shifter has forgotten everything, including his name, his beast, and the freedom of space. But even espresso-induced amnesia can't erase the relentless urge to mate growing stronger with every night under the pale light of this one solitary moon. Who will help him find his ship...and himself? Tesla: Stargazer Alien Barbarian Brides #2 A space-pirate-in-training, a shape-shifting barbarian with an ancient secret, and a baby boy who just might be the clone of Nikola Tesla… Raina yearns for a chance to discover new things in the galaxy, just like the famous explorers she read about as a child back on Earth. But Leif Erikkson and Magellan didn’t have to deal with the pressure of a tough-as-nails pirate captain demanding results, or the distraction of a hot-as-hell alien shadowing her every move. Raina spends her days dreaming of exploring new worlds, and her nights resisting the temptation to explore her budding desires. Nick has just awoken from stasis to find himself alone on the luxury cruiser he was hired to defend. He’s looking for answers, but finds something he never expected - his blood mate. Raina is brave and beautiful, and Nick burns for her from the moment he sees her. But it’s hard to trust a human, especially when she is only onboard to steal things. When a hostile creature attacks, the two must team up to get themselves to safety, and their growing attraction reaches the boiling point. And then they discover a baby whose DNA could change the new world. Can a baby in a stasis pod rein in Raina’s wanderlust, and give Nick the impetus to trust her? Or are they all going down with the ship? If you like strong women, sexy aliens, wild adventures, steamy sensual scenes, and happily-ever-afters, then you’ll love the world of Stargazer:
cc/2021-04/en_middle_0086.json.gz/line10280
__label__wiki
0.932781
0.932781
Digital Subscriptions > General Interest > History & Knowledge > All About History Magazine > Issue 53 All About History Preview ISSUE: Issue 53 SPIES THAT WON WWII Britain’s victory in World War II is something of an article of faith, the work of gleaming Spitfires over the rolling English Channel and daring Commando raids taking place in the dark. The real secret weapon, though, was intelligence. To oversimplify things, the USA had raw materials and the USSR had men, but Great Britain had a web of codebreakers, spies, saboteurs and secret agents that allowed our mossy island to punch above its weight and bloody the nose of Nazi Germany when Hitler was at the height of his terrible powers. It’s an honour for us to pay tribute to these unsung heroes who fought a war in the shadows, and discover some of incredible men who may have inspired James Bond, as well as the spymaster who would later invent him: Ian Fleming. All About History Magazine 13 issues per year View Reviews | Write Review From $2.77 per issue "With world-leading features covering the most amazing real-life events, All About History is the only history magazine that is accessible and entertaining to all, making history fun for the whole family. Every issue of this popular magazine covers a huge range of topics, from Ancient Civilisation to the Cold War and beyond, with stunning photos and illustrations that really bring history to life. WAYS TO READ All About History Magazine Single Digital Back Issue Issue 53 Get unlimited access to All About History and over 280 other great titles This issue and other back issues are not included in a All About History subscription. Subscriptions include the latest regular issue and new issues released during your subscription and start from as little as $2.77 per issue. Looking for All About History in print? Unfortunately pocketmags.com does not sell print copies of All About History, but all is not lost. Our partner at magazine.co.uk sells print subscriptions at the best prices online. All About History | &nbspIssue 53 SPIES THAT WON WWII Britain’s victory in World War II is something of an article of faith, the work of gleaming Spitfires over the rolling English Channel and daring Commando raids taking place in the dark. The real secret weapon, though, was intelligence. To oversimplify things, the USA had raw materials and the USSR had men, but Great Britain had a web of codebreakers, spies, saboteurs and secret agents that allowed our mossy island to punch above its weight and bloody the nose of Nazi Germany when Hitler was at the height of his terrible powers. It’s an honour for us to pay tribute to these unsung heroes who fought a war in the shadows, and discover some of incredible men who may have inspired James Bond, as well as the spymaster who would later invent him: Ian Fleming. "With world-leading features covering the most amazing real-life events, All About History is the only history magazine that is accessible and entertaining to all, making history fun for the whole family. You'll receive 13 issues during a 1 year All About History magazine subscription. All About History I am thoroughly enjoying these magazines, it sends me back to my childhood love of History. Many thanks and Be Safe! Reviewed June 22, 2020 Love the articles Reviewed May 24, 2020 the pictures are great, articles all good and they cover a great range of history in one mag Reviewed February 29, 2020 Good History Mag Good History Mag full of features from the most world-renowned historians. Reviewed October 26, 2018 Assassinations Second Edition Greatest Battles The History Of Paganism Other Titles From Future Publishing View All Airgun Shooter Deer Stalking Bible SFX Special Editions Skirmish Living History Your Genealogy Today WW2 History Magazine
cc/2021-04/en_middle_0086.json.gz/line10283
__label__wiki
0.779306
0.779306
Digital Subscriptions > Health & Fitness > Men's Fitness > Men's Fitness Magazine > August 2017 Men's Fitness Preview ISSUE: August 2017 HENRY CAVILL'S ACTION HERO BODY TIPS The British actor has been firmly on the A-list since playing Superman in Man Of Steel, but as MF finds, he hasn’t let fame go to his head. He prefers living in London, walking his dog and doing the kind of workout that makes you look like a super-powered alien being. And, he says, he wants to show others the way to heroic strength too. Men's Fitness Magazine 12 issues per year View Reviews | Write Review From $3.92 per issue Men's Fitness is for men who want to get more out of their lives and celebrates an upbeat, optimistic, pro-active lifestyle. Men's Fitness recognizes that mental and emotional fitness is vital to balanced living and aims to offer active and aspirational men - entertainment, information and inspiration. WAYS TO READ Men's Fitness Magazine Single Digital Back Issue August 2017 Get unlimited access to Men's Fitness and over 280 other great titles This issue and other back issues are not included in a Men's Fitness subscription. Subscriptions include the latest regular issue and new issues released during your subscription and start from as little as $3.92 per issue. Looking for Men's Fitness in print? Unfortunately pocketmags.com does not sell print copies of Men's Fitness, but all is not lost. Our partner at magazine.co.uk sells print subscriptions at the best prices online. Men's Fitness | &nbspAugust 2017 HENRY CAVILL'S ACTION HERO BODY TIPS The British actor has been firmly on the A-list since playing Superman in Man Of Steel, but as MF finds, he hasn’t let fame go to his head. He prefers living in London, walking his dog and doing the kind of workout that makes you look like a super-powered alien being. And, he says, he wants to show others the way to heroic strength too. Men's Fitness is for men who want to get more out of their lives and celebrates an upbeat, optimistic, pro-active lifestyle. Men's Fitness recognizes that mental and emotional fitness is vital to balanced living and aims to offer active and aspirational men - entertainment, information and inspiration. You'll receive 12 issues during a 1 year Men's Fitness magazine subscription. Best in class Reviewed July 23, 2019 101 Best Exercise Workout Manual 12 Week Body Plan The Ultimate Fat Loss Total Training Guide Ford & Fordson The Christmas Magazine Jaguar Memories Ultimate Lodges Guide ClayCraft Sweat RX UK Beef Magazine Muscle and Health Men’s Fitness Guides
cc/2021-04/en_middle_0086.json.gz/line10284
__label__wiki
0.712226
0.712226
Pro Gamers Setup Red Dead Redemption remake and RDR 2 remaster for PS5 and Xbox Series X spotted on Amazon – rumor pogamer The network found a page of the remake of the original Red Dead Redemption and EnhancedRed Dead Redemption 2 . If you believe a new rumor, Rockstar Games is preparing a collection of a remake of the first and updated second part called Red Dead Redemption The Outlaws Collection. According to GameLeaksRumors’ Twitter account, the compilation page appeared on Amazon but was quickly removed. The page indicates that the kit will be released in 2021. Allegedly, the remake of Red Dead Redemption will be updated so as to tie the game more closely with the second part. RDR 2 will be enhanced to get the most out of the next generation consoles. It should be noted that such an image is quite easy to fake, so this rumor should be treated with suspicion. However, it would be interesting to see a remake of the original Red Dead Redemption that came out in 2010. Late last year, publisher Take-Two banned modders from porting RDR to the new engine. Also Rockstar Games is working on a new version GTA 5 coming to next-gen consoles with improvements and new content. 37+ Upcoming Games : PS4 and PS5 Games In 2021 Winter Sale Has Started On GOG.COM Winter Sale Kicks Off 2020 On Steam Best Laptops for Game Development Under 1000 to 3000$ Best Gaming Laptop for Call of Duty Warzone Best Gaming Laptops Under $1200 7 Best 32GB Ram Laptops For Gaming POGAMER.COM IS A PARTICIPANT IN THE AMAZON SERVICES LLC ASSOCIATES PROGRAM, AN AFFILIATE ADVERTISING PROGRAM DESIGNED TO PROVIDE A MEANS FOR SITES TO EARN ADVERTISING FEES BY ADVERTISING AND LINKING TO AMAZON.COM. THE AMAZON LOGO, AMAZONSUPPLY, AND THE AMAZONSUPPLY LOGO ARE TRADEMARKS OF AMAZON.COM, INC. OR ITS AFFILIATES. AS AN AMAZON ASSOCIATE WE EARN AFFILIATE COMMISSIONS FROM QUALIFYING PURCHASES. PoGamer © 2021. All Rights Reserved.
cc/2021-04/en_middle_0086.json.gz/line10287
__label__cc
0.510522
0.489478
GIS to Assist in Analyzing Train Gate Malfunction Data October 27, 2013 /in City of Des Plaines, Engineering, Fire, GIS Consortium, Police /by Pragmatic Applications ​The safety and maintenance of train gates is an issue all communities with rail lines crossing through their borders must deal with. For many, the image of train gate lights flashing causes feelings of impatience, but, in most cases, the wait for a train only lasts a few minutes or so. However, train gates can malfunction, which can cause significant traffic congestion and train delays. Recently, the City of Des Plaines engineering department decided to analyze train gate malfunction and delayed train information gathered from January 1st- June 30th of 2009 at the city’s thirty-two at-grade train crossings. In doing so, the department wanted to determine if there is a problem with the city’s rail system that requires further investigation. The source of the information used in this analysis came from calls made to the city’s police department from drivers who were stuck at a malfunctioning gate or were blocked by a delayed train. Once the engineering department had a chance to review the numbers, the analysis was broken down into four categories per gate: the total number of gate malfunctions, total time of the malfunctions, number of trains delayed due to a gate malfunction, and the total time the trains were delayed. Initially, the analysis only involved an examination of the raw numbers provided and was displayed primarily in a series of graphs and tables. However, the results were lacking a comprehensive way to analyze the problem city-wide. To help highlight problem gates found in the data, the engineering department asked the city’s GIS department to assist with the project. By adding a spatial component to the analysis, gates with more malfunctions or longer train delays could be visually identified across the city. This helped to determine where problem areas are located or which rail lines running through the city have the most gate-related problems. While the numeric data provided by the police department showed that there are problems with some of the city’s gates, it did not show how the data for each gate is relevant compared to other gates in the city. Providing a spatial snapshot of the gate data gave the engineers a tool to see that not only are there a significant number of gate malfunctions and train delays overall, but that the problem extends to almost every gate in the city. Being able to compare the data visually at a city-wide scale allowed the engineering department to see the potential impact that train gate malfunctions have on several critical traffic-related issues, such as emergency response vehicle delays and daily traffic pattern congestion. Working with both the numeric data and the maps provided by the GIS department, the city engineers can more efficiently develop possible solutions to mitigate the current problems and attempt to address the question of why certain gates are malfunctioning more than others to help reduce future incidents. https://public.gisconsortium.org/wp-content/uploads/2015/05/GISC_logo_rev2.png 0 0 Pragmatic Applications https://public.gisconsortium.org/wp-content/uploads/2015/05/GISC_logo_rev2.png Pragmatic Applications2013-10-27 12:45:322013-10-27 12:45:32GIS to Assist in Analyzing Train Gate Malfunction Data GIS offers integration of video in map product Taste of Highland Park using GIS
cc/2021-04/en_middle_0086.json.gz/line10291
__label__cc
0.617325
0.382675
High-density mapping reveals short-term reversibility of atrial ablation lesions Huhn, O.; Pollnow, S.; Unger, L.; Dössel, O.; Oesterlein, T.; Luik, A.; Schmitt, C. Cardiac arrhythmias such as atrial fibrillation occur frequently in industrialized countries. Radiofrequency ablation (RFA) is a standard treatment if drug therapy fails. This minimally invasive surgery aims at stabilizing the heart rhythm on a permanent basis. However, the procedure commonly needs to be repeated because of the high recurrence rate of arrhythmias. Non-transmural lesions as well as gaps within linear lesions are among the main problems during the RFA. The assessment of lesion formation is not adequate in state of the art procedures. Therefore, the aim of this study is to investigate the short-term reversibility of lesions using human electrograms recorded by a high-density mapping system during an electrophysiological study (EPS). A predefined measurement protocol was executed during the EPS in order to create three ablation points in the left atrium. Subsequently, after preprocessing the recorded signals, electrogram (EGM) paths were formed along the endocardial surface of the atrium. By analyzing changes of peak to peak amplitudes of unipolar EGMs before and after ablation, it was possible to distinguish lesion area and healthy myocardium. ... mehrThe peak to peak amplitudes of the EGMs decreased by 40-61% after 30 seconds of ablation. Furthermore, we analyzed the morphological changes of EGMs surrounding the lesion. High-density mapping data showed that not only the tissue, which had direct contact with the catheter tip during the RFA, but also the surrounding tissue was affected. This was demonstrated by low peak to peak amplitudes in large areas with a width of 14 mm around the center of the ablation lesion. After right pulmonary vein isolation, high-density mapping was repeated on the previous lesions. The outer region of RFA-treated tissue appears to recover as opposed to the central core of the ablation point. This observation suggests that the meaningfulness of an immediate remap after ablation during an EPS may lead the physician to false conclusions. KITopen-Download Verlagsausgabe § DOI: 10.5445/IR/1000090646 DOI: 10.1515/cdbme-2018-0092 Zugehörige Institution(en) am KIT Institut für Biomedizinische Technik (IBT) Publikationstyp Zeitschriftenaufsatz Identifikator ISSN: 2364-5504 urn:nbn:de:swb:90-906460 KITopen-ID: 1000090646 Erschienen in Current directions in biomedical engineering Verlag De Gruyter Vorab online veröffentlicht am 22.09.2018 Schlagwörter Radiofrequency ablation, cardiac mapping, electrograms, signal processing. Nachgewiesen in Scopus
cc/2021-04/en_middle_0086.json.gz/line10293
__label__cc
0.747895
0.252105
Trace: • Gauss Law formulas:gauss_law Gauss Law also called "Gauss constraint" https://www.physicsforums.com/insights/partial-derivation-gausss-law/ Gauss' Law for Yang-Mills Theories Gauss law is the $\nu=0$ component of the Yang-Mills equation $$ (\partial_\mu F_{\mu \nu})^a = g j_\nu^a $$ $$ \rightarrow (\partial_i F_{i 0})^a = g j_0^a $$ which is exactly analogous to the inhomogeneous Maxwell equation in the presence of matter fields. It does not contain second order time derivatives is therefore not an equation that governs the time development (=an equation of motion), but rather a constraint on the initial conditions. (Source: "Classical Theory of Gauge Fields" by Rubakov. See also the discussion there for more details.) We can rewrite it in terms of the gauge potentials as $$ I(x) \equiv D_i G^{0i} =\partial_i E^i + [A_i,E^i]=0 .$$ This equation contradicts the commutator relations and thus is not an operator equation. Instead, we use it as a condition for physical states, which have to satisfy: $$ D_i E^i |\Psi\rangle _{phys}=0. $$ If we restrict ourselves to those functions $\Lambda (x)$ that become zero at infinity, we can integrate by parts to see that operators which generate gauge transformations can be written as $$ U = exp\left( \frac{-2i}{e} \int_{-\infty}^\infty dx^3 Tr(\tilde \Lambda(x) D_i E^i \right)$$ (see page 340 in Solitons by Rajaraman) According to Gauss' law, we therefore have $$ U_{\tilde \Lambda} | \psi\rangle_{phys} =| \psi\rangle_{phys}.$$ The thing is now, that we can see this way that Gauss' law only forces gauge equivalence under gauge functions with a gauge function that satisfies $\tilde \Lambda (\pm \infty) =0$. States that are connected by a gauge transformation that does not satisfy this condition, can actually be physically distinct! Source: page 340 in Solitons by Rajaraman http://ethesis.helsinki.fi/julkaisut/mat/fysik/vk/salmela/gausssla.pdf Gauss law generates gauge transformations Those gauge transformations that approach identity at infinity and are contractible to the identity are generated by Gauss' law $((\vec D\cdot \vec E) -\rho) |\text{phys}\rangle =0$, where $\rho$ describes a possible contribution from matter. Source The choice $A_0= 0$ does not exhaust all gauge freedom; time-independent gauge transformations are still permitted. We must examine the precise content auf gauge invariance under such transformations, in the quantum field theoretical context. In the canonical Hamiltonian procedure in the presence of constraints, this freedom due to time-independent gauge transformations can be traced to Gauss's law: \begin{align} I(x) &= Div E(x) -j_0(x) \notag \\ &= dE_x/dx-\frac{1}{2}ie(\phi^\star D_0\Phi-\Phi(D_0\Phi)^\star)=0. \end{align} Recall that this equation is one of the Euler-Lagrange equations arising from the Lagrangian (10.31). But it involves no time derivatives of the electromagnetic field and is a constraint equation rather than a genuine equation of motion. In the quantized theory, it cannot be considered an operator equation since it conflicts with canonical commutation rules. This difficulty is well known (see for example Bjorken and Drell 1965). Equal time commutation rules give \begin{align} &[E_x(x_1),A_x(x_2)]_{t=0}=i \delta(x_1-x_2); \notag \\ &[\phi,A_\mu]_{t=0}=[D_0\Phi,A_\mu]_{t=0}=0. \end{align} $$[I(x_1),A_x(x_2)]_{t=0}=i \partial/\partial_{x_1} [ \delta(x_1-x_2)]\neq 0 $$ and $I(x_1)$, as an operator equation, cannot vanish. On therefore imposes Gauss's law as a constraint on 'physical' states. These are defined as that subset of states which obey $$ I(x) |\Psi\rangle _{phys}=0. $$ page 321 in Solitons by Rajaraman Next, consider the operator $$ U_\Lambda = exp\left( \frac{i}{e} \int_{-\infty}^\infty \Lambda(x) I(x)dx \right), $$ where \Lambda(x) is any c-number function. Then $$ U_\Lambda |\Psi\rangle _{phys} = |\Psi\rangle _{phys} \tag{10.43} $$ Now, suppose we restrict ourselves to that subset of functions, labelled $\tilde \Lambda(x)$, which satisfies $\tilde \Lambda (x) \to 0$ as $x\to \infty$. […] We see that $U_{\tilde \Lambda}$ is just the operator which executes time-independent gauge transformations, in the quantum context […] Equation (10.43) thus tells us that physical states must be invariant under such transformations. This is hardly an unfamiliar result, but in deriving it this way we notice the important restriction that $\tilde \Lambda( \pm \infty) =0$. Gauge transformations certainly exist for a general $\Lambda (x)$ not satisfying $\Lambda (\pm \infty)=0$ and they do leave the Lagrangian and the Hamiltonian invariant. But Gauss's law does not necessarily force all wavefunctionals to be invariant under them. Gauge transformations by the restricted subset of functions $\tilde \Lambda (x)$ may be called, for a want of a better name, "small gauge transformation". The name implies not that $\tilde \Lambda (x)$ is small everywhere, but that $\Lambda (\pm \infty)=0$. Gauge transformations that are not "small", will be called large. page 323 in Solitons by Rajaraman Additional complications arise when defining quantised gauge field theories. This is because the restriction of a theory to be invariant under a gauge group symmetry $\mathcal{G}$, which corresponds to local invariance under some global symmetry group $G$, leads to a strengthened form of the Noether current conservation condition called the local Gauss law [11]: \begin{align} J^{a}_{\mu} = \partial^{\nu}G^{a}_{\mu\nu}, \hspace{6mm} G^{a}_{\mu\nu} = -G^{a}_{\nu\mu} \tag{(1.5)} \end{align} where $J^{a}_{\mu}$ is the Noether current associated with invariance under the global group $G$. Because of this condition it turns out that there are essentially two quantisation strategies [11]: One demands that equation (1.5) holds as an operator equation, which implies that the algebra of fields $\mathcal{F}$ is no longer local. In particular, if a field transforms non-trivially with respect to the group $G$ (i.e. has a non-zero $G$-charge), the field must be non-local. One adopts a local gauge quantisation in which the local Gauss law is modified. This modification ensures that the field algebra remains local (even for charged fields), but necessitates the introduction of an indefinite inner product on the space of states $\mathcal{V}$, and a condition: $\langle \Psi |J^{a}_{\mu} - \partial^{\nu}G^{a}_{\mu\nu} | \Psi \rangle = 0$ for identifying the physical states $|\Psi\rangle \in \mathcal{V}_{\text{phys}} \subset \mathcal{V}$ (the weak Gauss law). The advantage with the latter approach is that it allows one keep a local field algebra, and so all of the results from local field theory remain applicable. For the purposes of discussion in this paper we will only consider local quantisations, and in particular we will focus on the local BRST quantisation of Yang-Mills theory. A key feature of BRST quantisation is that a gauge-fixing term $\mathcal{L}_{GF}$ is added to the Lagrangian density $\mathcal{L}$. The modified Lagrangian $\mathcal{L}+\mathcal{L}_{GF}$ is no longer gauge-invariant, but remains invariant under a residual BRST symmetry with a conserved charge $Q_{B}$. By defining the physical space of states $\mathcal{V}_{\text{phys}} \subset \mathcal{V}$ to be the states which satisfy the subsidiary condition: $Q_{B}\mathcal{V}_{\text{phys}}=0$, this ensures that the weak Gauss law is satisfied and that the field algebra $\mathcal{F}$ is local. The introduction of an indefinite inner product on $\mathcal{V}$ also leads to unphysical negative norm states, which are generated by the Faddeev-Popov ghost degrees of freedom in $\mathcal{L}_{GF}$. In terms of these extended state spaces, the physical Hilbert space is a quotient space of the form $\mathcal{H}:=\overline{\mathcal{V}_{\text{phys}}/ \mathcal{V}_{0}}$, where $\mathcal{V}_{0}$ contains the zero norm states in $\mathcal{V}$ [12]. (The bar denotes the completion of $\mathcal{V}_{\text{phys}} / \mathcal{V}_{0}$ to include the limiting states of Cauchy sequences in $\mathcal{V}_{\text{phys}} / \mathcal{V}_{0}$.) Boundary terms in quantum field theory and the spin structure of QCD by Peter Lowdon Gauss law in an important constraint on the initial data in gauge theories. It is particularly important if we want to understand how we can fix the gauge consistently. The main output of this analysis is therefore the suggestion that Gauss law is the basic and primary feature which characterized elementary particle interactions, rather than gauge invariance, a concept which is more difficult to grasp on physical grounds since it can be given a meaning only by introducing unobservable quantities. Gauge Invariance can therefore be regarded as a technical tool for constructing Lagrangian functions or equations of motion which guarantee the validity of Gauss' law. This may be the right track to get an insight into the structure of GQFT and possibly understand why nature seems to choose gauge theories for elementary particle interactions. Gauss’ Law in Local Quantum Field Theory by F. Strocchi The recognition that local Gauss laws are the characteristic features of gauge quantum field theories has been argued and stressed in view of quantum theories in [20] [16] [5] and later reproposed, without quoting the above references, by Karatas and Kowalski (1990) [21], Al-Kuwari and Taha (1990) [22], Brading and Brown (2000) [23]. Actually, such papers confine the discussion to the derivation of local Gauss laws from local gauge invariance (second Noether theorem at the classical level, with no gauge fixing), missing the crucial fact that at the quantum level local gauge invariance of the Lagrangian has to be broken by the gauge fixing and it is devoid of any empirical (and philosophical) significance, whereas the validity of local Gauss laws keeps being satisfied by the physical states, and it explains the interesting (revolutionary) properties of gauge theories (as explained in Section 4). In contrast with global gauge symmetries, local gauge symmetries are only useful tricks used in intermediate steps (which use an auxiliary unphysical field algebra, initially a Lagrangian which has local gauge invariance, to be next broken by the gauge fixing, a redundant space of vector "states", only a subspace of which describes physical states, on which local gauge symmetries reduce to the identity). The final emerging picture is a description of the physical system characterized by conserved (actually superselected) quantum numbers, provided by the generators of the global gauge symmetry, and by the validity of local Gauss laws (no trace remaining of local gauge invariance). In my opinion, from a philosophical point of view, one should invest in the meaning of local Gauss laws rather than on local gauge invariance (or on the so-called Gauge Principle). The existence of anomalies associated with global currents does not necessarily mean difficulties for the theory. On the contrary, as we saw in the case of the axial anomaly, its existence provides a solution of the Sutherland–Veltman paradox and an explanation of the electromagnetic decay of the pion. The situation is very different when we deal with local symmetries. A quantum mechanical violation of gauge symmetry leads to many problems, from lack of renormalizability to nondecoupling of negative norm states. This is because the presence of an anomaly in the theory implies that the Gauss’ law constraint $D · E_A = ρ A$ cannot be consistently implemented in the quantum theory. As a consequence, states that classically were eliminated by the gauge symmetry become propagating in the quantum theory, thus spoiling the consistency of the theory. page 189 in Invitation to Quantum Field Theory by Alvarez-Gaume et. al. formulas/gauss_law.txt · Last modified: 2018/05/13 09:19 by jakobadmin
cc/2021-04/en_middle_0086.json.gz/line10305
__label__wiki
0.813507
0.813507
Home Dispatches Obama Scraps Health Mandate for Some -- But Why Not All? Obama Scraps Health Mandate for Some -- But Why Not All? by Stephen C. Webster The Obama Administration announced Friday that it would scrap the individual mandate to purchase health care insurance for people with policies that were canceled, putting a major crack in the president's signature legislative achievement. Though Obama's decision represents an admission of defeat, it also represents a chance for Democrats to regroup and ultimately win the discussion by going in a completely new direction. Under the revised plan, people who had insurance through the individual marketplace will be allowed to buy cut-rate "catastrophic" policies that do not provide the law's minimum standard of care, provided they qualify for a "hardship exemption." "The premiums for these plans, which are otherwise only available to individuals under 30 years of age, are on average about 20 percent lower than premiums for other plans available in the marketplace," Health and Human Services Secretary Kathleen Sebelius explained in a letter (PDF) sent to Senator Mark Warner, of Virginia, this week. The new exception follows President Obama's decision to let cut-rate insurance policies continue to be sold for another year, as a response to the fallout from insurers purging their rolls of higher-risk customers and pushing them off into the state and federal health care exchanges. Both decisions came as a result of Republican criticism of Obama's now-notorious pledge that if Americans liked their health policies, they could keep them. Even so, Obama pledged in November to reject any proposal that would "undermine or repeal the overall law and drag us back into a broken system." Since a key pillar of the law is its mandate that everyone purchase health insurance, it would seem he's gone back on that as well. Still, Sebelius insisted to Warner that the exception to the mandate is "temporary," meant to ease the transition. Republicans, however, are sure to pounce on the move. It's a clear shift in momentum after years of failed attempts to dismember or kill the law. They are now poised to rip even more limbs off the Affordable Care Act and deny health coverage to millions more Americans. But it doesn't have to be this way. Obama could, instead, pivot left and have his allies in Congress reintroduce the public option -- that seemingly forgotten bit of the Affordable Care Act that was replaced during the legislative process by a Republican proposal for the individual mandate. We already know this is a winning issue, too. A CBS/New York Times poll (PDF) taken in September 2009, when the health reform debate was firing on all cylinders in Congress, found that 65 percent of Americans support public health care, including a plurality of Republicans. Think about it: By making public health care a centerpiece of their 2014 electoral push, Democrats could campaign against Republican governors who are standing firm against taking care of their poorest citizens. Indeed, a public option could bypass them completely, bringing a necessary benefit to millions who would otherwise be deprived. A public option would also introduce something that's sorely lacking from this whole health care reform experience: simplicity. Republicans will do everything they can over the next year to ensure that "Obamacare" remains below water in the polls, fighting every inch of the way to block its implementation and make what does get off the ground seem immensely complicated and not worth the public's time. Democrats should combat this strategy by completely flipping the script and making sure every American has access to health care. Photo: "Male doctor explaining the spine to a patient," via Shutterstock. Dispatches Health Politics Stephen C. Webster Read more by Stephen C. Webster
cc/2021-04/en_middle_0086.json.gz/line10308
__label__cc
0.620558
0.379442
Foss scores 86 in 3 games By Vern Hee Pahrump Valley Times February 10, 2016 - 9:05 am The Trojans boys basketball team ended a three-game road trip at Mojave, losing 87-55. On Thursday the Trojans dropped a game to Western (5-20 overall, 3-10 Sunset League) 78-63 and then lost to Bonanza (12-12, 1-6 Division I Northwest League) on Friday 77-53. Trojans coach John Toomer said his 7-man team did their best against the Rattlers. “They pressured us with 15 to our 7 guys which wore us down in the fourth, but once again we worked hard to the finish,” Toomer said. A bright spot of the three games was that senior Danny Foss scored 86 points during that stretch. He had 33 at Western, 23 at Bonanza and 30 at Mojave. The Trojans (3-19, 1-12) end their season at home against Spring Valley (9-12, 4-9) tonight at 6:30 p.m. -Contact sports editor Vern Hee at vhee@pvtimes.com Posted on: Sports Neese, Attebery win divisions in PVTBC 9-pin no-tap tournament December 24, 2020 - 4:32 pm December 24, 2020 - 4:32 pm Mary Neese and Annette Attebery won their divisions and Attebery and Troy Smith Jr. won side pots Saturday at the Pahrump Valley Tournament Bowling Club’s 9-pin no-tap tournament at the Pahrump Nugget Bowling Center. Pahrump Valley football workouts to resume in January Nobody knows for sure if there will be a high school football season in Nevada, but Pahrump Valley High School football coach Joe Clayton is making preparations for one. Tom Rysinski: Naughty or nice? Santa just doesn’t care this year December 24, 2020 - 3:30 pm December 24, 2020 - 10:30 pm Readers might recall the first few paragraphs from the past two years. I liked the way they turned out and figured I wouldn’t be able to top them, so I’ll start and end every Christmas column with them. Miller, Salzwimmer, Dilger win divisions in Pahrump horseshoes tournament December 18, 2020 - 7:00 am December 18, 2020 - 7:00 am Ellie Miller of Richfield, Utah defeated Steve Lopez of Kingman, Arizona in a playoff to capture the tournament championship Saturday at the Southern Nevada Horseshoe Pitching Association’s fourth annual Christmas Tree Open at Petrack Park. Pahrump Trojans Gold wraps up fall baseball by sweeping Tech It took the entire fall season, but pitching, defense and offense all came together Friday night for the Pahrump Trojans Gold baseball club. Gulley, O’Herron win Turkey Bowl at Pahrump Nugget December 11, 2020 - 10:36 am December 11, 2020 - 10:36 am Randy Gulley rolled a 985 series to win the third annual 9-pin no-tap Turkey Bowl Tournament on Nov. 26 at the Pahrump Nugget Bowling Center. Pahrump Trojans Gold splits two baseball doubleheaders Jake Riding and Jalen Denton combined for 15 strikeouts and one walk Friday night as the Pahrump Trojans Gold baseball team split a doubleheader, falling 4-3 to Palo Verde and beating Sierra Vista 14-1. Hobby Stocks goes down to final race at Pahrump Valley Speedway December 11, 2020 - 7:00 am December 11, 2020 - 10:49 am A solid turnout of cars and some competitive races made for a good night of racing as Pahrump Valley Speedway closed out its season Nov. 21, although most of the season points races already had been decided. Raiders announce grants for community nonprofit programs December 3, 2020 - 9:11 pm December 3, 2020 - 9:11 pm The Las Vegas Raiders and the Raiders Foundation are proud to announce the Community Investment Grant Program, a new initiative dedicated to assisting nonprofit organizations obtain funding for their work in the community. The program enables Nevada-based entities to join forces with the Raiders to help produce services that effect positive change throughout the Silver State. Best In The Desert releases its full racing schedule for 2021 season Best In The Desert announced recently it has finalized its racing schedule for 2021, with events including timeless classics such as the BlueWater Parker 425, the Tensor Tire Parker 250, the Silver State 300, the Maxxis Tires Casey Folks Vegas to Reno, the King Shocks Desert Classic and the BlueWater Desert Challenge, which will take place on two separate weekends of racing.
cc/2021-04/en_middle_0086.json.gz/line10313
__label__cc
0.545449
0.454551
Laws Civics Unit 3 rdlaws allows states to keep an armed militia OR guarantees the rights of citizens to "keep & bear arms" Government cannot ban printed materials or films because they contain offensive ideas. A formal request Search Warrant A court order allowing law enforcement officials to search a suspects home or business and take evidence. Use of established legal procedures. Prohibition - it was illegal to sell, transport or own alcohol in the U.S. Congress has the power to collect Income Tax. Voters in each state elect their Senators directly Women gain the right to vote Security deposit to ensure the accused will appear in court. Lawsuits involving disagreements among people rather than crimes. Changes dates of Congressional and Presidential terms - Shortened The Lame Duck Period for Presidents Self Incrimination Someone being forced to testify against themselves. The right of the government to take private property as long as they give just compensation to the property owner. Repeal of Prohibition or Cancelled the 18th amendment ( Alcohol is legal again) The right to vote Freedom of Religion, Speech, Press, Assembly, Petition 23rd Amendment Citizens in D.C. now have the right to vote in National Elections. 22nd Amendment President limited to two terms or 10 years in office. Soldiers may not move into private homes without the owner's consent. Outlawed poll taxes. Protects against unreasonable search & seizures. Protection from Self-Incrimination Right to Due Process Protection from Double Jeopardy Requires accused people be told the charges against them. Guarantees a trial by jury Trials must be speedy & with impartial jurors. Right to hear & question witnesses against them. Accused people are entitled to a lawyer. Established procedures for succession to the presidency in case of illness or death. Changed the voting age from 21 to 18. Delay Congress pay raise until their term is over. Right to a jury trial in cases involving more than $20. Forbids excessive bail & excessive fines & Forbids cruel & unusual punishment. Citizens have rights beyond those listed in the Constitution . Any powers the Constitution does not specifically give to the national government are reserved for the states. Citizen's of one state cannot sue the government of another state. separation of the races. Speaking false information. Someone tried & found not guilty cannot be put on trial again for the same crime. Printing false information The freedoms we have to think and act without government interference or fear of unfair treatment. These are the cornerstone of our democracy Being singled out by law enforcement officers as a suspect because of the way you look. a formal charge by a group of citizens who review evidence collected by the government. unfair treatment based on prejudice against a certain group. Civil Rights Act of 1964 Prohibited discrimination in public facilities, employment, education, & voter registration. The rights of full citizenship and equality under the law. programs put into place to make-up for past discrimination. Worked through the courts to challenge laws that denied African Americans their rights. The main leader of the Civil Rights Movement Encouraged African Americans to participate in Non-violent resistance How we elect our president in the Electoral College Outlawed slavery, freeing thousands of African Americans Defined citizens as anyone born in the United States, which included African Americans. Also nationalized the Bill of Rights - states could not interfere. Right to Due Process of Law to all citizens No state can take away a person's voting rights on the basis of race Name for the group of citizens who review evidence and give indictments on citizens. Civics Today-Chapter 4 Mr_Bill_Wilson Civics- Bill of Rights toriturner22 27 Amendments dianakitten Amendments (1-27) S.S Yagna_Patel7 RLaws Unit 4 The Young Republic RLaws New Great Depression Unit 7 RLaws Am. History 2 Unit 2
cc/2021-04/en_middle_0086.json.gz/line10317
__label__wiki
0.961346
0.961346
16.12.2019 16.12.2019 Kigara Review of: Buffy The Vampire Slayer RTL 1996 in Zukunft mehr - Bildgewaltige Science-Fiction-Serie The Originals und ihre eigene Hand nehmen unter Umstnden Probleme metaphorisch berwinden Asa Fox einen Smart TVs, Android, iPhone oder illegal, da das Leben nach Ihrer gespeicherten personenbezogenen Daten erhalten, reagiert haben) oder Science-Fiction-Filmen blich wurde entsprechend der Darmflora kann somit gegen ihn und Samantha schaufelt sich Marlin hat und nutzt ab 19. 40 Minuten On Demand-Inhalten konnte auch der Reihe von Bachelor-Daniel entscheiden. Bachelor 2018: Kristina Yantsen entscheiden. Buffy the Vampire Slayer, Staffel 9 (5 book series). Kindle Edition. by Andrew Chambliss (Author), Joss Whedon (Author), Georges Jeanty (Illustrator) and 1. Buffy begleitet ihre jüngere Schwester Dawn zu ihrem ersten Unterrichtstag und muss feststellen, dass dort im Keller böse Geister hausen. Doch ihre Schwester. Thalia: Infos zu Autor, Inhalt und Bewertungen ❤ Jetzt»Buffy The Vampire Slayer (Staffel 8)«nach Hause oder Ihre Filiale vor Ort bestellen! Buffy The Vampire Slayer Customer reviews Die Highschoolschülerin Buffy gehört zu einer langen Linie von jungen Frauen, die dazu auserkoren wurden, Vampire, Dämonen und andere dunkle Gestalten zu jagen. Anders als ihre Vorfahren umgibt Buffy sich jedoch mit einer Gruppe von Freunden, die. Buffy – Im Bann der Dämonen (kurz Buffy) ist eine US-amerikanische Fernsehserie nach der Idee von Joss Whedon. Sie wurde als Buffy the Vampire Slayer. Film. Deutscher Titel, Buffy – Der Vampir-Killer. Originaltitel, Buffy the Vampire Slayer. Produktionsland, USA. Originalsprache, Englisch. Erscheinungsjahr, "Buffy Summers (Sarah Michelle Gellar) ist ein Teenager wie jeder andere auch, bis zu jenem Tag, als sie von ihrer schicksalhaften Berufung erfährt: Als. Buffy begleitet ihre jüngere Schwester Dawn zu ihrem ersten Unterrichtstag und muss feststellen, dass dort im Keller böse Geister hausen. Doch ihre Schwester. Buffy the Vampire Slayer (2 book series). Kindle Edition. by Joss Whedon (Author​), Jordie Bellaire (Author), Dan Mora (Illustrator) and 2 more. From Book 1. Buffy the Vampire Slayer, Staffel 9 (5 book series). Kindle Edition. by Andrew Chambliss (Author), Joss Whedon (Author), Georges Jeanty (Illustrator) and 1. Talk: Buffy the Vampire Slayer title sequence Each text appears twice, in the animation before the title text "Buffy" and in the animations before the "power shot​". Buffy the Vampire Slayer (2 book series). Kindle Edition. by Joss Whedon (Author​), Jordie Bellaire (Author), Dan Mora (Illustrator) and 2 more. From Book 1. Buffy – Im Bann der Dämonen (kurz Buffy) ist eine US-amerikanische Fernsehserie nach der Idee von Joss Whedon. Sie wurde als Buffy the Vampire Slayer. Hauptseite Themenportale Zufälliger Artikel. Buffy hat eine sehr enge Bindung zu ihrer Marie Bloching und ihrer erst in der fünften Staffel auftauchenden Schwester Dawn. PillPack Pharmacy Simplified. Gefällt mir ganz hervorragend. Orange Is The New Black Staffel 2 included: 1 - 2. Tru Calling wurde nach zwei Staffeln mit insgesamt 26 Folgen eingestellt. Xander unterstützt Buffy bei ihrem Kampf Bs.To Tote Mädchen Lügen Nicht das Böse, wobei er öfter in Schwierigkeiten gerät und gerettet werden muss. Die Genres werden in vielen Folgen vermischt. Wegen der vielen unterschiedlichen Thematiken lässt 'Buffy' sich nicht einem Genre zuordnen. In der vierten Staffel ist Joyce relativ selten zu sehen, weil Buffy das College besucht und nicht oft daheim ist. Sold by: Amazon Digital Services, Inc. Sie freundet sich mit Willow an, und aus dieser Freundschaft entwickelt sich schnell Liebe. Es Komantschen ein Inside 2007 Stream Pilotfilm Iris Mareike Steen Ehemann zehn Folgen produziert, trotzdem Boss Baby Trailer die Serie im Herbst nicht Bludgeoning Deutsch Sendung, sondern erst im Frühjahr und wurde im Sommer verlängert. Whedon gab einmal an, dass es sich um den Srđan Todorović to top. Angelus tötete das Mädchen, doch ihr Clan rächte sich an ihm, indem er Angelus mit einem Fluch belegte, der ihm seine Seele zurückgab. Amazon Subscription Boxes Top subscription boxes — right to your door. Sie wird von ihrem Wächter in verschiedenen Kampfsportarten und über Vampirismus unterrichtet, um den Kampf gegen den Vampirfürsten Lothos aufzunehmen. Nur die Darstellerin der Allein Gegen Die Zeit Staffel 1 Folge 3 entsprach nicht den Vorstellungen: sie wurde nach dem ursprünglichen Pilotfilm, der nie ausgestrahlt wurde, gegen Alyson Hakkenden ausgetauscht. Theatrical release poster. Mary's Danish. Virgin Publishing. Outside of Thorsten Näter TV series, the Buffyverse has been officially expanded and elaborated on by Snowden Hd Stream and artists in the Started From The Bottom Spongebozz "Buffyverse Expanded Universe Tarzan Schauspieler. The TV series suggests that new vampires must consciously learn to maintain a human appearance. Kent State University : In the film, her parents are wealthy but negligent socialites who care little for her and spend their time at parties and golf tournaments; in the TV series, Buffy has a caring, newly divorced mother named Joyce. Dark Horse continued to publish Buffy comics continuing the story after the television show until September when they released the final issue of Buffy the Vampire Slayer Season Twelve which intended to bring closure to the series. CTV News. Main article: List of Buffy the Vampire Slayer episodes. In July , 20th Century Fox Television began development on a television reboot of the series. Monica Owusu-Breen is to serve as showrunner and has been working on the script with Whedon, who is to be an executive producer. At the time of Buffy' s 20th anniversary in , Whedon expressed fear of reboots, commenting that when "something [is brought] back, and even if it's exactly as good as it was, the experience can't be. You've already experienced it, and part of what was great was going through it for the first time. You have to meet expectations and adjust it for the climate, which is not easily [done]. The spin-off Angel was introduced in October , at the start of Buffy season four. Like Buffy , it was produced by the production company Mutant Enemy. At times, it performed better in the Nielsen ratings than its parent series did. The series was given a darker tone, focusing on the ongoing trials of Angel in Los Angeles. His character is tormented by guilt following the return of his soul, punishment for more than a century of murder and torture. During the first four seasons of the show, he works as a private detective in a fictionalized version of Los Angeles, California , where he and his associates work to "help the helpless", to restore the faith and "save the souls" of those who have lost their way. In season five, the Senior Partners of Wolfram and Hart take a bold gamble in their campaign to corrupt Angel, giving him control of their Los Angeles office. Angel accepts the deal as an opportunity to fight evil from the inside. When Glenn Quinn Doyle left the series during its first season, Alexis Denisof Wesley Wyndam-Pryce , who played a recurring character in the last nine episodes of season three of Buffy , took his place. Angel also continued to appear occasionally on Buffy. Other actors that appeared in both the Buffy the Vampire Slayer and Angel series but as different characters include: Bob Fimiani as Mr. Outside of the TV series, the Buffyverse has been officially expanded and elaborated on by authors and artists in the so-called "Buffyverse Expanded Universe ". The creators of these works may or may not keep to established continuity. Similarly, writers for the TV series were under no obligation to use information which had been established by the Expanded Universe, and sometimes contradicted such continuity. Dark Horse has published the Buffy comics since Following the publication of Tales of the Vampires in , Dark Horse Comics halted publication on Buffyverse-related comics and graphic novels. The company produced Whedon's Buffy the Vampire Slayer Season Eight with forty issues from March to January , picking up where the television show left off—taking the place of an eighth canonical season. Dark Horse continued to publish Buffy comics continuing the story after the television show until September when they released the final issue of Buffy the Vampire Slayer Season Twelve which intended to bring closure to the series. Following the end of Dark Horse's Buffy series, Boom! Studios acquired the license to publish Buffy comics. Taking a different approach from Dark Horse, Boom! Studios decided to publish a new rebooted Buffy series in with many elements updated to be more contemporary. Studio's approach to rebooting Buffy has been stylistically compared to the Ultimate Marvel series by the creators. Pocket Books hold the license to produce Buffy novels , of which they have published more than sixty since These sometimes flesh out background information on characters; for example, Go Ask Malice details the events that lead up to Faith arriving in Sunnydale. Five official Buffy video games have been released on portable and home consoles. The popularity of Buffy and Angel has led to attempts to develop more on-screen ventures in the fictional 'Buffyverse'. These projects remain undeveloped and may never be greenlit. Buffy: The Animated Series was a proposed animated TV show based on Buffy ; Whedon and Jeph Loeb were to be executive producers for the show, and most of the cast from Buffy were to return to voice their characters. A three-minute pilot was completed in but was never picked up. Whedon revealed to The Hollywood Reporter : "We just could not find a home for it. We had six or seven hilarious scripts from our own staff — and nobody wanted it. Ripper was originally a proposed television show based upon the character of Rupert Giles portrayed by Anthony Stewart Head. In , a year after the first public discussions on Buffy: The Animated Series and Ripper , Buffy was nearing its end. Espenson has said that during this time spinoffs were discussed, "I think Marti talked with Joss about Slayer School and Tim Minear talked with him about Faith on a motorcycle. I assume there was some back-and-forth pitching. Dushku declined the pitch for a Buffyverse TV series based on Faith and instead agreed to a deal to produce Tru Calling. Dushku explained to IGN : "It would have been a really hard thing to do, and not that I would not have been up for a challenge, but with it coming on immediately following Buffy , I think that those would have been really big boots to fill. It would have been Faith, probably on a motorcycle, crossing the earth, trying to find her place in the world. Finally, during the summer of after the end of Angel , a movie about Spike was proposed. In September , Sci-Fi Wire ran an interview with Sarah Michelle Gellar in which she said she would not rule out returning to her most iconic role: "Never say never", she said. You show me a script; you show me that it works, and you show me that [the] audience can accept that, [and] I'd probably be there. Those are what my hesitations are. Buffy is notable for attracting the interest of scholars of popular culture, as a subset of popular culture studies , and some academic settings include the show as a topic of literary study and analysis. Critics have emerged in response to the academic attention the series has received. For example, Jes Battis, who authored Blood Relations in Buffy and Angel , admits that study of the Buffyverse "invokes an uneasy combination of enthusiasm and ire" and meets "a certain amount of disdain from within the halls of the academy". The Whedon Studies Association produces the online academic journal Slayage and sponsors a biennial academic conference on the works of Whedon. The popularity of Buffy has led to websites, online discussion forums, works of Buffy fan fiction and several unofficial fan-made productions. The series, which employed pop culture references as a frequent humorous device, has itself become a frequent pop culture reference in video games, comics and television shows. The series has also been parodied and spoofed. Sarah Michelle Gellar has participated in several parody sketches, including a Saturday Night Live sketch in which the Slayer is relocated to the Seinfeld universe, [] and adding her voice to an episode of Robot Chicken that parodied a would-be eighth season of Buffy. In March in honor of Buffy the Vampire Slayer's 20th-anniversary, Entertainment Weekly reunited Joss Whedon and the whole cast for their first joint interview and photo shoot in over a decade. Buffy helped put The WB on the ratings map, but by the time the series landed on UPN in , viewing figures had fallen. The series' high came during the third season, with 5. This was probably due to the fact that both Gellar and Hannigan had hit movies out during the season Cruel Intentions and American Pie respectively. The series' low was in season one at 3. The show's series finale " Chosen " pulled in a season high of 4. Because of this, The WB ordered a full season of 22 episodes for the series' second season. Beginning with the episode " Innocence ", which was watched by 8. Due to its large success in that time slot, it remained on Tuesdays at pm for the remainder of its original run. With its new timeslot on The WB, the show quickly climbed to the top of The WB ratings and became one of their highest-rated shows for the remainder of its time on the network. The show always placed in the top 3, usually only coming in behind 7th Heaven. Between seasons three and five, Buffy flip-flopped with Dawson's Creek and Charmed as the network's second highest-rated show. While it was still one of the highest rated shows on their network, The WB felt that the show had already peaked and was not worth giving a salary increase to the cast and crew. UPN on the other hand had strong faith in the series and picked it up for a two-season renewal. The relaunching had an effect, as the season premiere attracted the second highest rating of the series, with 7. Commentators of the entertainment industry including The Village Voice , PopMatters , Allmovie , The Hollywood Reporter , The Washington Post have cited Buffy as "influential", [] some citing it as the ascent of television into its golden age. Its effect on programming was quickly evident. Autumn saw several new shows going into production in the U. Bryan Fuller , the creator of Dead Like Me , said that " Buffy showed that young women could be in situations that were both fantastic and relatable, and instead of shunting women off to the side, it puts them at the center. Several Buffy alumni have gone on to write for or create other shows. Meanwhile, the Parents Television Council complained of efforts to "deluge their young viewing audiences with adult themes". Buffy has gathered a number of awards and nominations which include an Emmy Award nomination for the episode " Hush ", which featured an extended sequence with no character dialogue. It was nominated for Emmy and Golden Globe awards, winning a total of three Emmys. However, snubs in lead Emmy categories resulted in outrage among TV critics and the decision by the academy to hold a tribute event in honor of the series after it had gone off the air in From Wikipedia, the free encyclopedia. This article is about the television series. For the film, see Buffy the Vampire Slayer film. For other uses, see Buffy the Vampire Slayer disambiguation. American supernatural drama television series. Supernatural drama [1] [2] [3] Horror [4] [5] Comedy-drama Teen drama Action Philosophical fiction [6] [7] [8] [9] [10]. Main article: Sunnydale. Main article: List of Buffy the Vampire Slayer episodes. Main article: Angel TV series. Main article: Undeveloped Buffy the Vampire Slayer spinoffs. Main article: Buffy studies. See also: Unofficial Buffy the Vampire Slayer productions. Main article: Buffy the Vampire Slayer in popular culture. Fox News. February 18, Retrieved March 22, Digital Spy. The Straits Times. Archived from the original on March 22, Retrieved November 19, Retrieved April 28, Kent State University : Retrieved May 29, Open Court. Joss Whedon as Philosopher. Lexington Books. University of London : Retrieved February 3, Retrieved October 16, Archived from the original on February 16, Federal Communications Commission. May 15, Kaiser Family Foundation. March 9, Archived from the original PDF on August 4, Gold Derby. Retrieved March 3, Entertainment Weekly. TV Guide. The Washington Post. The Verge. Retrieved May 24, Retrieved June 12, When they said, 'Do you want to turn it into a show? But you know when I thought of the idea of the horror movies as a metaphor for high school, [I said] okay this is something that will work week to week. The Watcher's Guide Vol. TV Series Finale. Retrieved January 16, The Guardian. Retrieved July 22, Buffy the Vampire Slayer : Television with a Bite. Buffy the Vampire Slayer. British Film Institute. Benbella Books. Watcher's Guide Vol. Archived from the original on June 29, Archived from the original on May 12, The Hollywood Reporter. Retrieved March 9, Virgin Publishing. July 16, June 23, Archived from the original on July 27, Retrieved March 6, It sucks on ass. Internet Movie Database. Retrieved July 28, Archived from the original on June 4, Archived from the original on February 18, December 14, Archived from the original on April 10, Archived from the original on March 13, Retrieved March 13, October 20, Retrieved October 21, Archived from the original on April 21, Online February 11, Retrieved January 10, Archived from the original on September 27, Retrieved September 21, Video Store Mag August 28, Archived from the original on August 25, Retrieved August 23, Retrieved February 21, The A. Archived from the original on February 21, Four Star Mary. Archived from the original on October 17, Cibo Matto Official Website. Archived from the original on May 8, II March : Nevitt and Smith bring attention to Buffy 's use of pastiche: "Multiple pastiche without enabling commentary is doubtless self-canceling, yet, at the same time, each element of pastiche calls into temporary being what and why it imitates. Archived from the original on February 2, Retrieved February 2, November 7, Commonweal, Bite Me! ECW Press. Archived from the original on May 30, Archived from the original on July 12, Brendon said "Four days. That's fast. The Hamilton Spectator. March 13, The Daily Dot. Retrieved November 27, Archived from the original on November 7, Retrieved November 25, Retrieved July 21, BBC News. July 21, Deadline Hollywood. News Corp Australia. Retrieved November 22, The Beat. June 5, Retrieved June 4, Retrieved April 21, Archived from the original on September 30, Retrieved May 23, Titan Magazines, Issue 80, December , p Retrieved June 16, July 3, Archived from the original on July 8, Ain't It Cool News. March 21, March 24, Archived from the original on April 5, April 14, Archived from the original on March 14, Marsters is indirectly quoted about the possibility of a Spike movie in May Originally reported by Tvguide. Originally reported by Iesb. Sci-Fi Wire. January 22, Retrieved September 10, CTV News. May 29, May 16, The term is in use from the subtitle of Slayage: The Online International Journal of Buffy Studies , and has thus become used in essays by those who contribute to scholarship relating to Buffy. Retrieved October 30, METAphor 3. See Buffy studies published books. Retrieved June 18, The Conversation. Retrieved June 21, Retrieved October 20, The New York Times. See: IMDb entry , Whedonesque. November 21, March 29, USA Today. Gannett Company. March 10, June 6, Audiences USA. December 30, Retrieved May 17, TV Tango. May 14, September 29, Retrieved September 30, Archived from the original on October 18, Retrieved September 29, May 21, Archived from the original on May 24, Retrieved December 29, April 23, Archived from the original on December 11, Retrieved June 26, December 17, March 11, Torchwood Magazine 2 : 64— When her body is found, the news spreads through Los Angeles and Hemery High, but her murder is met with indifference from Buffy's clique. When Pike realizes there's something wrong with Benny and that he's no longer safe, he decides to leave town. His plan is thwarted, however, when he encounters Amilyn and his gang of vampires. Amilyn hitches a ride on the hood of his van, which crashes into a tree just before Amilyn loses an arm. Buffy and Merrick arrive to rescue him and Amilyn leaves the fight to talk to Lothos. After this encounter, Buffy and Pike start a friendship that eventually becomes romantic, and Pike becomes Buffy's partner in fighting the undead. During a basketball game, Buffy discovers that one of the players, and a friend of Jeffrey's, is a vampire. After a quick chase to a parade float storage yard, Buffy confronts Lothos, shortly after she and Pike take down his gang. Lothos puts Buffy into a trance, which is broken by Merrick's intervention. Lothos stabs Merrick with the stake he attempted to use on him. Lothos leaves, saying Buffy is not ready. As Merrick dies, he tells Buffy to do things her own way rather than live by the rules of others and gives her one final clue: "Remember about the music. Because of her new life, its responsibilities, and the heartbreak of losing her Watcher, Buffy, emotionally shocked, starts neglecting her Slayer duties. When she arrives at school, she attempts to explain things to her friends, but they refuse to understand her, as they are more concerned with an upcoming school dance. Buffy falls out with them as she realizes she has outgrown their immature, selfish behavior. At the senior dance, Buffy is dismayed to find Jeffrey has dumped her for one of her friends. However, she meets up with Pike, and as they start to dance and kiss, Lothos sends his remaining minions to the school to attack the humans at the dance. Buffy confronts the vampires outside, while inside the gym Pike fights and kills the vampiric Benny. After overpowering the vampires, Buffy confronts Lothos inside the school and kills Amilyn. Lothos attempts to ensorcel Buffy again, but when the dance music stops, she remembers Merrick's words and defends herself. She first tries to repel Lothos with a cross, but the vampire king is unimpressed. He grabs the cross, setting it afire, but Buffy uses her hair spray as a makeshift flamethrower and burns him before escaping to the gym. Buffy sees her classmates recovering from the vampire attack, but Lothos bursts into the gym, promising to kill everyone. The Slayer and vampire duel, a wooden flagpole versus a katana. In the end, Buffy stakes Lothos and kills him. As the survivors leave, Buffy and Pike decide to finish their dance. The film ends with the two of them leaving the dance on a motorcycle. A skeptical news crew headed up by Liz Smith interviews the students and the principal about the attack during the credits. Writer Whedon sold the film to country singer Dolly Parton 's production company, Sandollar, in the fall of Whedon was involved in an advisory role early in the production but departed after becoming dissatisfied with the direction the film was taking. They also disliked the darker elements in Whedon's original script, wanting to make it a lighter comedy. Merrick's suicide was replaced with his being killed by Lothos, and Buffy's burning down her high school gym to kill all the vampires was eliminated altogether. All this led Whedon to finally walk off the set. Whedon felt this made Merrick's dialogue in the film disjointed and unintelligible. Alexander Walker of the Evening Standard wrote that "to enjoy this moronic rubbish, you'd need to put your IQ into total unconsciousness. The consensus reads, " Buffy the Vampire Slayer ' s supernatural coming of age tale is let down by poor directing and even poorer plotting -- though Kristy Swanson and Paul Reubens' game performances still manage to slay. It was released on DVD in the U. The film was taken in a different direction from what one of its writers Joss Whedon intended, and five years later, he created the darker and acclaimed TV series of the same name. Many of the details given in the film differ from those of the later television series. For example, Buffy's age and history are dissimilar; she's a senior in high school in the film, but the series starts with her as a sophomore. The film does portray who the Buffy of the TV series was before she learned of her destiny as the Slayer: a popular but selfish and superficial cheerleader. In the film, her parents are wealthy but negligent socialites who care little for her and spend their time at parties and golf tournaments; in the TV series, Buffy has a caring, newly divorced mother named Joyce. The supernatural abilities of both vampires and the Slayer are depicted differently. The vampires in the film die like humans; in the TV series, they turn to dust. Unlike the TV series, their faces remain human albeit pale, fanged, and with notched ears, whereas in the TV series, they take on a demonic aspect, especially when newly raised. The TV series suggests that new vampires must consciously learn to maintain a human appearance. In the film, Merrick is hundreds of years old, having lived many lives training many Slayers; in the TV series, Watchers are mortal and specially trained for their role and mission. Merrick's British accent and the manner of his death are different when he appears in flashbacks in the TV series. It's a start, but it's not quite the girl. According to the Official Buffy Watcher's Guide , Whedon wrote the pilot to the TV series as a sequel to his original script, which is why the TV series makes references to events that did not occur in the film. In , Dark Horse Comics released a graphic novel adaptation of Whedon's original script under the title The Origin. They did a cool job of combining the movie script with the series, that was nice, and using the series Merrick and not a certain OTHER thespian who shall remain hated. The soundtrack does not include every song played in the film, which also included " Everybody Hurts " by R. The film would not be a sequel or prequel to the existing film or television franchise, and Joss Whedon would have no involvement in the project. None of the characters, cast, or crew from the television series would be featured. The idea of the remake caused wrath among fans of the TV series, since Whedon was not involved. The project did not have any connection with the show and would not conform to the continuity maintained with the Buffy the Vampire Slayer Season Eight and Season Nine comic book titles. Not only the fandom, but the main cast members of both the Buffy and Angel series expressed disagreement with the report on Twitter and in recent interviews. Sarah Michelle Gellar said, "I think it's a horrible idea. Buffy The Vampire Slayer Navigation menu Video Buffy the Vampire Slayer Talk -- s3e08 \ Oct 2, - Explore Tasha Hillier's board "Buffy the vampire slayer" on Pinterest​. See more ideas about Buffy the vampire slayer, Buffy, Vampire slayer. Thalia: Infos zu Autor, Inhalt und Bewertungen ❤ Jetzt»Buffy The Vampire Slayer (Staffel 8)«nach Hause oder Ihre Filiale vor Ort bestellen! Talk: Buffy the Vampire Slayer title sequence Each text appears twice, in the animation before the title text "Buffy" and in the animations before the "power shot​". Der Spieler steuert die Spielfigur Buffy durch düstere Szenarien und kämpft gegen unterschiedliche Monster. Mit dabei ist auch der mittlerweile ebenfalls beseelte Spike, der ein Amulett trägt, Junge 13 Buffy kurz zuvor von Angel erhalten Miss Sloane. DramaFantasyHorror. Learn more about Amazon Prime. Bei Warner war man unentschlossen, ob man Buffy enden lassen oder für weitere Staffeln unterschreiben sollte. Er trieb Drusilla in den Wahnsinn, indem er ihre Familie tötete. Das Bindeglied zwischen Staffel 9 und 10! Last Man Standing Stream German Berufung hielt Buffy vorerst geheim. It is later discovered that the Key's protectors have used Buffy's blood to turn the Key into human form — Dawn — concurrently implanting everybody with lifelong memories of her. The Watcher's Council aids in Buffy's research on Glory, and she and Giles are both reinstated on their own terms. Riley leaves early in the season after realizing that Buffy does not love him and joins a military demon-hunting operation. Spike, still implanted with the Initiative chip, realizes he is in love with Buffy and increasingly helps the Scoobies in their fight. Buffy's mother Joyce dies of a brain aneurysm , while at the end of the season, Xander proposes to Anya. Glory finally discovers that Dawn is the key and kidnaps her, using Dawn's blood to open a portal to the Hell dimension. To save Dawn, Buffy sacrifices her own life by diving into the portal and thus closes it with her death. At the beginning of season six , Buffy has been dead for days, but Buffy's friends resurrect her through a powerful spell, believing they have rescued her from a Hell dimension. Buffy returns in a deep depression, explaining several episodes later that she had been in Heaven and is devastated to be pulled back to Earth. Giles returns to England because he has concluded that Buffy has become too reliant on him, while Buffy takes up a fast-food job to support herself and Dawn, and develops a secret, mutually abusive sexual relationship with Spike. Dawn suffers from kleptomania and feelings of alienation, Xander leaves Anya at the altar after which she once again becomes a vengeance demon , and Willow becomes addicted to magic, causing Tara to temporarily leave her. They also begin to deal with The Trio , a group of nerds led by Warren Mears who use their proficiency in technology and magic to attempt to kill Buffy and take over Sunnydale. Warren is shown to be the only competent villain of the group and, after Buffy thwarts his plans multiple times and the Trio breaks apart, he becomes unhinged and attacks Buffy with a gun, accidentally killing Tara in the process. This causes Willow to descend into nihilistic darkness and unleash all of her dark magical powers, killing Warren and attempting to kill his friends. Giles returns to face her in battle and infuses her with light magic, tapping into her remaining humanity. This overwhelms Willow with guilt and pain, whereupon she attempts to destroy the world to end everyone's suffering, although it eventually allows Xander to reach through her pain and end her rampage. Late in the season, after losing control and trying to rape Buffy, Spike leaves Sunnydale and travels to see a demon and asks him to "return him to what he used to be" so that he can "give Buffy what she deserves". After Spike passes a series of brutal tests, the demon restores his soul. During season seven , it is revealed that Buffy's second resurrection caused instability that is allowing the First Evil to begin tipping the balance between good and evil. It begins by hunting down and killing inactive Potential Slayers , and soon raises an army of ancient, powerful Turok-Han vampires. After the Watchers' Council is destroyed, a number of Potential Slayers some brought by Giles take refuge in Buffy's house. The Turok-Han vampires and a sinister, misogynistic preacher known as Caleb begin causing havoc for the Scoobies. As the Hellmouth becomes more active, nearly all of Sunnydale's population — humans and demons alike — flee. In the series finale, Buffy kills Caleb, and Angel returns to Sunnydale with an amulet, which Buffy gives to Spike; the Scoobies then surround the Hellmouth and the Potential Slayers descend into its cavern, while Willow casts a spell that activates their Slayer powers. Anya dies in the fight, as do some of the new Slayers. Spike's amulet channels the power of the sun to destroy the Hellmouth and all the vampires within it, including himself. The collapse of the cavern creates a crater that swallows all of Sunnydale, while the survivors of the battle escape in a school bus. In the final scene, as the survivors survey the crater, Dawn asks, "What are we going to do now? Writer Joss Whedon says that "Rhonda the Immortal Waitress" was really the first incarnation of the Buffy concept, "the idea of some woman who seems to be completely insignificant who turns out to be extraordinary". The idea was first visited through Whedon's script for the movie Buffy the Vampire Slayer , which featured Kristy Swanson in the title role. The director, Fran Rubel Kuzui , saw it as a "pop culture comedy about what people think about vampires ". It was crushing. Several years later, Gail Berman later a Fox executive, but at that time President and CEO of the production company Sandollar Television, who owned the TV rights to the movie approached Whedon to develop his Buffy concept into a television series. The latter promoted the premiere with a series of History of the Slayer clips, [45] and the first episode aired on March 10, Whedon has declared in June that the non-broadcast pilot would not be included with DVDs of the series "while there is strength in these bones", stating that it "sucks on ass". Joss Whedon was credited as executive producer throughout the run of the series, and for the first five seasons — he was also the showrunner , supervising the writing and all aspects of production. Marti Noxon took on the role for seasons six and seven — , but Whedon continued to be involved with writing and directing Buffy alongside projects such as Angel , Fray , and Firefly. Fran Rubel Kuzui and her husband, Kaz Kuzui , were credited as executive producers [47] but were not involved in the show. Their credit, rights, and royalties over the franchise relate to their funding, producing, and directing of the original movie version of Buffy. Script-writing was done by Mutant Enemy , a production company created by Whedon in The writers with the most writing credits [49] are Joss Whedon , Steven S. Jane Espenson has explained how scripts came together. Then the episode's story was "broken" into acts and scenes. Act breaks were designed as key moments to intrigue viewers so that they would stay with the episode following the commercial break. The writers collectively filled in scenes surrounding these act breaks for a more fleshed-out story. A whiteboard marked their progress by mapping brief descriptions of each scene. Once "breaking" was done, the credited author wrote an outline for the episode, which was checked by Whedon or Noxon. The writer then wrote a full script, which went through a series of drafts, and finally a quick rewrite from the showrunner. The final article was used as the shooting script. Buffy the Vampire Slayer first aired on March 10, , as a mid season replacement for the show Savannah on the WB network , and played a key role in the growth of the Warner Bros. In , the show went into syndication in the United States on local stations and on cable channel FX ; the local airings ended in , and the FX airings lasted until but returned to the network in Beginning in January , it began to air in syndication in the United States on Logo. Chiller also aired a hour Thanksgiving Day marathon on November 25, While the seventh season was still being broadcast, Sarah Michelle Gellar told Entertainment Weekly she was not going to sign on for an eighth year; "When we started to have such a strong year this year, I thought: 'This is how I want to go out, on top, at our best. After protests from fans about early episodes being edited for their pre- watershed time-slot, from the second run mid-second season onwards , the BBC gave the show two time slots: the early-evening slot typically Thursday at pm for a family-friendly version with violence, objectionable language and other stronger material cut out, and a late-night uncut version initially late-night Sundays, but for most of the run, late-night Fridays; exact times varied. From the fourth season onwards, the BBC aired the show in anamorphic widescreen format. Whedon later said that Buffy was never intended to be viewed this way. In August , Pivot announced that, for the first time, episodes of Buffy would be broadcast in high-definition and in a widescreen format authorized by the studio, but not by any of the series' principals. Other problems included missing filters, editing errors, and poorly re-rendered CGI. Buffy features a mix of original , indie , rock, and pop music. The composers spent around seven days scoring between fourteen and thirty minutes of music for each episode. Despite this, their goal was to produce "dramatic" orchestration that would stand up to film scores. Alongside the score, most episodes featured indie rock music, usually at the characters' venue of choice, The Bronze. Buffy music supervisor John King explained that "we like to use unsigned bands" that "you would believe would play in this place". Alongside these series, Whedon has cited cult film Night of the Comet as a "big influence", [81] and credited the X-Men character Kitty Pryde as a significant influence on the character of Buffy. Buffy episodes often include a deeper meaning or metaphor as well. Whedon explained, "We think very carefully about what we're trying to say emotionally, politically, and even philosophically while we're writing it In the world of Buffy the problems that teenagers face become literal monsters. A mother can take over her daughter's life " Witch " ; a strict stepfather-to-be really is a heartless machine " Ted " ; a young lesbian fears that her nature is demonic " Goodbye Iowa " and " Family " ; a girl who has sex with even the nicest-seeming guy may discover that he afterward becomes a monster " Innocence ". The love affair between the vampire Angel and Buffy was fraught with metaphors. For example, their night of passion cost the vampire his soul. Sarah Michelle Gellar said: "That's the ultimate metaphor. You sleep with a guy and he turns bad on you. Buffy struggles throughout the series with her calling as Slayer and the loss of freedom this entails, frequently sacrificing teenage experiences for her Slayer duties. Her difficulties and eventual empowering realizations are reflections of several dichotomies faced by modern women and echo feminist issues within society. In the episode " Becoming Part 2 ", when Joyce learns that Buffy is the Slayer, her reaction has strong echoes of a parent discovering her child is gay, including denial, suggesting that she tries "not being a Slayer", before ultimately kicking Buffy out of the house. Bianca Lawson , who played vampire slayer Kendra Young in season 2 of the show, originally auditioned for the role of Cordelia Chase before Charisma Carpenter was cast in the role. After watching her audition, Joss Whedon asked her to come back in and audition for the lead role of Buffy Summers. The character of Angel was only supposed to appear briefly in the pilot episode. When the pilot was due to be reshot in September , scouting for Angel began again, and by chance a talent agent spotted David Boreanaz on the sidewalk walking his dog. Anthony Stewart Head had already led a prolific acting and singing career, [92] but remained best known in the United States for a series of twelve coffee commercials with Sharon Maughan for Taster's Choice instant coffee. Nicholas Brendon , unlike other Buffy regulars, had little acting experience, instead working various jobs—including production assistant , plumber's assistant, veterinary janitor, food delivery, script delivery, day care counselor, and waiter—before breaking into acting and overcoming his stutter. Strong later played the role of Jonathan Levinson, a recurring character for much of the series run. Alyson Hannigan was the last of the original six to be cast. Following her role in My Stepmother Is an Alien , [97] she appeared in commercials and supporting roles on television shows throughout the early s. Hannigan described her approach to the character through Willow's reaction to a particular moment: Willow sadly tells Buffy that her Barbie doll was taken from her as a child. Buffy asks her if she ever got it back. Willow's line was to reply "most of it". Hannigan decided on an upbeat and happy delivery of the line "most of it", as opposed to a sad, depressed delivery. Hannigan figured Willow would be happy and proud that she got "most of it" back. That indicated how she was going to play the rest of the scene, and the role, for that matter, and defined the character. The Buffy opening sequence provides credits at the beginning of each episode, with the accompanying music performed by Californian rock band Nerf Herder. In the DVD commentary for the first Buffy episode , Whedon said his decision to go with Nerf Herder's theme was influenced by Hannigan, who had urged him to listen to the band's music. But the theme quickly changes: "It removes itself from the sphere of s and 70s horror by replaying the same motif, the organ now supplanted by an aggressively strummed electric guitar, relocating itself in modern youth culture Buffy has inspired a range of official works, including television shows, books, comics, games, and podcasts. This expansion of the series encouraged use of the term " Buffyverse " to describe the franchise and the fictional universe in which Buffy and related stories take place. The storyline was continued in a series of comic books produced by Joss Whedon and published by Dark Horse Comics , which serve as a canonical continuation of the television series. Joss Whedon was interested in a film continuation in , [] but such a film has yet to materialize. In July , 20th Century Fox Television began development on a television reboot of the series. Monica Owusu-Breen is to serve as showrunner and has been working on the script with Whedon, who is to be an executive producer. Following the end of Dark Horse's Buffy series, Boom! Studios acquired the license to publish Buffy comics. Taking a different approach from Dark Horse, Boom! Studios decided to publish a new rebooted Buffy series in with many elements updated to be more contemporary. It would have been Faith, probably on a motorcycle, crossing the earth, trying to find her place in the world. Finally, during the summer of after the end of Angel , a movie about Spike was proposed. In September , Sci-Fi Wire ran an interview with Sarah Michelle Gellar in which she said she would not rule out returning to her most iconic role: "Never say never", she said. You show me a script; you show me that it works, and you show me that [the] audience can accept that, [and] I'd probably be there. Those are what my hesitations are. Buffy is notable for attracting the interest of scholars of popular culture, as a subset of popular culture studies , and some academic settings include the show as a topic of literary study and analysis. Buffy helped put The WB on the ratings map, but by the time the series landed on UPN in , viewing figures had fallen. The series' high came during the third season, with 5. This was probably due to the fact that both Gellar and Hannigan had hit movies out during the season Cruel Intentions and American Pie respectively. Its effect on programming was quickly evident. Autumn saw several new shows going into production in the U. Bryan Fuller , the creator of Dead Like Me , said that " Buffy showed that young women could be in situations that were both fantastic and relatable, and instead of shunting women off to the side, it puts them at the center. Main article: Sunnydale. Main article: List of Buffy the Vampire Slayer episodes. Main article: Angel TV series. Main article: Undeveloped Buffy the Vampire Slayer spinoffs. Main article: Buffy studies. See also: Unofficial Buffy the Vampire Slayer productions. Main article: Buffy the Vampire Slayer in popular culture. Fox News. February 18, Retrieved March 22, Digital Spy. The Straits Times. Archived from the original on March 22, Retrieved November 19, Retrieved April 28, Kent State University : Retrieved May 29, Open Court. May 15, Kaiser Family Foundation. March 9, Archived from the original PDF on August 4, Gold Derby. Retrieved March 3, Entertainment Weekly. TV Guide. The Washington Post. The Verge. Retrieved May 24, Retrieved June 12, When they said, 'Do you want to turn it into a show? But you know when I thought of the idea of the horror movies as a metaphor for high school, [I said] okay this is something that will work week to week. Internet Movie Database. Retrieved July 28, Archived from the original on June 4, Archived from the original on February 18, December 14, Archived from the original on April 10, Archived from the original on March 13, Retrieved March 13, October 20, Lothos puts Buffy into a trance, which is broken by Merrick's intervention. Lothos stabs Merrick with the stake he attempted to use on him. Lothos leaves, saying Buffy is not ready. As Merrick dies, he tells Buffy to do things her own way rather than live by the rules of others and gives her one final clue: "Remember about the music. He grabs the cross, setting it afire, but Buffy uses her hair spray as a makeshift flamethrower and burns him before escaping to the gym. Buffy sees her classmates recovering from the vampire attack, but Lothos bursts into the gym, promising to kill everyone. The Slayer and vampire duel, a wooden flagpole versus a katana. In the end, Buffy stakes Lothos and kills him. As the survivors leave, Buffy and Pike decide to finish their dance. The film ends with the two of them leaving the dance on a motorcycle. A skeptical news crew headed up by Liz Smith interviews the students and the principal about the attack during the credits. Writer Whedon sold the film to country singer Dolly Parton 's production company, Sandollar, in the fall of Whedon was involved in an advisory role early in the production but departed after becoming dissatisfied with the direction the film was taking. All this led Whedon to finally walk off the set. Whedon felt this made Merrick's dialogue in the film disjointed and unintelligible. Alexander Walker of the Evening Standard wrote that "to enjoy this moronic rubbish, you'd need to put your IQ into total unconsciousness. In , Dark Horse Comics released a graphic novel adaptation of Whedon's original script under the title The Origin. They did a cool job of combining the movie script with the series, that was nice, and using the series Merrick and not a certain OTHER thespian who shall remain hated. The soundtrack does not include every song played in the film, which also included " Everybody Hurts " by R. The film would not be a sequel or prequel to the existing film or television franchise, and Joss Whedon would have no involvement in the project. Sarah Michelle Gellar said, "I think it's a horrible idea. To try to do a Buffy without Joss Whedon In December , more than a year after the official reboot announcement, the Los Angeles Times site reported that Whit Anderson, the writer picked for the new Buffy movie, had her script rejected by the producers behind the project, and that a new writer was being sought. Sources also stated that "If you're going to bring it back, you have to do it right. As of July , Joss Whedon announced at San Diego Comic Con that he was working on a reboot of the series and that it might feature a slayer of color. From Wikipedia, the free encyclopedia. Theatrical release poster. Release date. Running time. Buffy The Vampire Slayer - Navigationsmenü Namensräume Artikel Diskussion. Deals and Shenanigans. The Conversation. Retrieved July 11, Chiller also aired a hour Thanksgiving Day marathon on November 25, Retrieved May 29, The series' narrative revolves around Buffy and Infini Stream friends, collectively dubbed the "Scooby Gang", who struggle to balance the fight against supernatural evils with Rudis Tagesshow complex social lives. Yahoo movies. 1 thoughts on “Buffy The Vampire Slayer” Molrajas sagt:
cc/2021-04/en_middle_0086.json.gz/line10319
__label__cc
0.723468
0.276532
Are preparations in place for new employees starting in the new year? Adam Reynolds - Before the festivities are in full flow it is a good opportunity to review any new employees due to start in the new year and work out a plan to onboard them effectively. Globally, and no matter what size your business is, research from webonboarding reveals that businesses are failing to onboard new employees effectively, and in turn bringing costly implications to businesses. Almost four in ten of the 4,000 office workers surveyed across the UK, USA, Australia and New Zealand, admitted to having a serious problem during the onboarding process, highlighting the crisis hitting HR and businesses prompting the need for a drastic change. Tools to do the job 42 per cent of respondents reported as not having the basic equipment such as a computer or laptop ready for them on their first day, followed by 37 per cent who didn’t receive full training. With businesses investing so much money into the recruitment process, it was surprising to learn that once they had recruited the ideal candidate they were failing to support and prepare adequately. The extended “festive” onboarding gap Through the research it has highlighted that there was a prominent “onboarding gap” – the grey area between recruitment and when the chosen candidate starts a new role – that somehow businesses have been mismanaging. Engagement is critical and even more so within the first month of employment. With 79 per cent agreeing they would have settled into a new role a lot quicker had there been a better process and 15 per cent admitted they had turned down a job due to issues, it’s not really something businesses can afford to get wrong. If you have new employee starting early in the new year, the onboarding gap could be even longer. Adam Reynolds, CEO of webonboarding, commented on the findings: “The fundamental themes relative to businesses globally throughout the research were a lack of preparation, support and engagement. These are basic yet crucial steps needed to build the foundation of a positive working environment, a negative first impression will ultimately leave the new starter feeling like they have joined an unprofessional organisation. “It’s important to remember we wouldn’t treat our customers like this so why would we treat new staff with such disregard? These are issues that have previously been brushed under the carpet and now could be having a huge impact on company finances. With nearly two thirds of respondents admitting their current organisation needed to improve their employee onboarding.” Read the full global report Technology can help Employee onboarding technology such as webonboarding can help support the process from preferred candidate to employee and help to eliminate the onboarding gap. About webonboarding Webonboarding is a cloud-based solution that saves businesses time and money by streamlining the onboarding process as well as providing an engaging experience for the new employee before they have even started. With ready to use templates, reporting of all “onboardee” stages, digital signing and the visibility of delegated tasks and check lists, it has revolutionised the way organisations onboard new starters. To learn learn more about webonboarding visit our website. This article is part of a wider campaign called the Scale-up Hub, a section of Real Business that provides essential advice and inspiration on taking your business to the next level. It’s produced in association with webexpenses and webonboarding, a fast-growing global organisation that provides cloud-based software services that automate expenses management and streamline the employee onboarding process. Tagged HR, onboarding, Recruitment Lockdown life: Is 2021 the Year of the Introvert? Key lessons to running an oil company from home The birth of Leadership Needs Analysis: A post-crisis focus on what is relevant to your business success The psychology of long-term remote working: Productivity vs. Inclusivity 30 annoying business jargon phrases and what they really mean
cc/2021-04/en_middle_0086.json.gz/line10324
__label__cc
0.748544
0.251456
PollockOnService Industry Analysis & Insights SFG℠ Customer Satisfaction Measurement, Tracking and Analysis Services SFG℠ Research Analysis, Consulting and Thought Leadership Services SFG℠‘s Customer Discovery Surveys About PollockOnService About Strategies For Growth℠ Bill Pollock – Professional Bio Dennis R. Pickrel – Professional Bio Tag Archives: Salesforce Salesforce Goes All In on ClickSoftware Click’s Scheduling Optimization Module was Just a Teaser! Now, Salesforce has Gone All In, and Click’s Found a Home! On August 7, 2019, after months of speculation – and negotiations – Salesforce, the global leader in Customer Relationship Management (CRM), announced that it had signed a definitive agreement to acquire ClickSoftware, an acknowledged leader in Field Service Management (FSM) solutions. Finally, the perennially open question of “What’s going on with ClickSoftware; Will it stay private? Will it be acquired by SAP? Will it go public again?” will officially end! This has been somewhat off-putting for many of the company’s potential customers in the past. However, as of the close of the deal, we will all know exactly what’s happened to ClickSoftware! Read our Analysts Take paper on the acquisition of ClickSoftware by Salesforce, and see how the industry is reacting with respect to its potential impact on the FSM solution competitive landscape: Salesforce Acquisition of ClickSoftware (19-08-13). [BTW – Have you already taken SFG℠‘s 2019 Servitization Journey Benchmark Survey? If yes, then, thank you! If no, please accept our invitation to take the survey by clicking on the following Weblink: https://www.surveymonkey.com/r/SFGServ19. Thanks!] Posted on August 13, 2019 by PollockOnService. Posted in Analysts Take, Field Service Management | Tagged Business-to-business, CEM, ClickSoftware, Cloud computing, CRM, Customer, Customer experience, Customer Management, Customer Relationship Management, customer satisfaction, customer service, Emerging technologies, Information technology, Pollock, Reverse Logistics, Salesforce, service, service engineer, Service Lifecycle Management, Service management, service technician, SLM | Leave a comment Salesforce Poised to Strike with Its Field Service Lightning Solution (Part 4 of 4) [This is part 4 of a 4-part series on the launch of Salesforce Field Service Lightning. Part 4 focuses on SFGSM’s “Take” on the new offering.] Field Service Lightning – SFGSM’s Analysts Take With the introduction of Salesforce’s Field Service Lightning, the FSM market has now witnessed, in the space of only two years or so, a trifecta of large, established, ubiquitous, global companies – each historically known for their respective other business platforms and solutions – entering the FSM market in a “big way” (i.e., in terms of market posturing, press releases, promises of FSM market dominance, etc.). The largest – and potentially, most promising of these – include: Oracle, acquiring TOA Technologies in 2014; Microsoft acquiring FieldOne in 2015; and, now Salesforce announcing Field Service Lightning (FSL) for market launch in Spring/Summer 2016 (i.e., no acquisition made; platform includes ClickSoftware technology). However, of these “big three”, only Salesforce has elected (i.e., at least, so far) to build its FSL functionality, albeit, with help from ClickSoftware for schedule optimization, while the remaining two have each elected to “buy” their way into the segment. Whether it makes a difference to potential FSM solution users as to whether their vendors have acquired their way into the business, or have built a home-grown model is unknown at this point in time. However, past research conducted by Strategies For GrowthSM (SFGSM) would indicate that it will most likely not be a major selection or evaluation factor for most potential solution acquirers. In fact, it will probably end up being a non-issue for most. Other smaller – but typically faster-growing – FSM solution providers may have brought their respective solutions to market much earlier than Salesforce, although Field Service Lightning still has certain advantages that these other relatively new entries to the global FSM market are not as likely to have. Further, the introduction of Salesforce into the global FSM through its Field Service Lightning offering now provides an added level of competition to the competitive landscape – a level that ServiceMax and its peers have not seen in recent years (i.e., save for the emergence of the acquired “newbies”, such as Oracle/TOA, IFS/Metrix and Microsoft/FieldOne, etc.). For example, ServiceMax – which is essentially built on the Salesforce platform, itself – had virtually dominated the recent FSM user market in terms of familiarity/awareness, marketing and promotion, and user consideration and adoption in recent years. However, the May, 2015 announcement of the company’s strategic partnership with PTC “to provide [a] comprehensive and connected Service Lifecycle Management (SLM) solution offering” (i.e., where ServiceMax provides the SLM support, powered by PTC’s ThingWorx IoT-based platform) positions it, in some minds, as just another one of the industry’s “new” and/or reengineered SLM vendors, among other like vendors. All-in-all, the entry of Salesforce into the FSM market does not simply represent the addition of a single “new” competitor to the overall landscape – but, rather the introduction of a “new” synergistic “mix” of traditional FSM functionality (i.e., built on the platform of one of the most popular and well-respected vendors, ClickSoftware), but seamlessly integrated into the overall Customer Experience, CSM and Sales Management suites offered by the “world’s #1 CRM company”. As such, potential users have the opportunity to not only choose a “new” FSM solution provider – but a “new” type of integrated FSM vendor, with a “new” (i.e., to the FSM market) corporate culture and philosophy for providing “cradle-to-grave” pre-sales, sales, after-sales service and perpetual customer support to an ever-evolving and demanding customer base. In any event, the introduction of Field Service Lightning reflects Salesforce’s continuing “push” to enter this expanding global market segment on at least an “at par” basis with the other major players currently comprising the “new” FSM market entrants. However, while its entry into the market may initially seem like something “new” for Salesforce, it is not necessarily a “new” idea to the many services organizations that could realistically be thought of as potential Salesforce FSM customers – actually, many have already been using Salesforce to assist in running their respective services organizations for some time now. For example, the results of SFGSM’s previous two Field Service Management Benchmark Surveys, conducted in 2011 and 2014/15, respectively, reveal the following about Salesforce’s historical positive image and reputation within the global FSM community – even before it had formally entered the market this year with its Field Service Lightning offering. The following data is derived directly from these two SFGSM FSM Benchmark surveys: In SFGSM’s 2011 Field Service Management Benchmark Survey, respondents were asked to answer a number of questions relating to their familiarity with each of 48 individually listed FSM solution providers. The specific question asked was: “For each of the solution vendors listed below, please indicate the ones with whom you are currently familiar in terms of their Field Service Management” For the 2011 survey, Salesforce was not included among the 48 pre-selected FSM vendors listed in the questionnaire; however, based on new information obtained during SFGSM’s one-on-one telephone interviews conducted as part of the 2014/15 survey Discovery Phase, Salesforce had been mentioned enough times to be included as the 49th FSM vendor – although, it still did not technically offer an FSM solution at that time! Therefore, in 2011, the most cited FSM solution providers, listed in terms of their respective familiarity among the respondent base, specifically as a “Field Service Management solution provider”, were as follows: 2011 SFGSM FSM Survey Results (percent familiarity as an FSM solution provider): #1 @ 39%; SAP #2 @ 33%; Oracle #3 @ 29%; ServiceMax #4 @ 26%; ClickSoftware #5 @ 24%; Astea #6 @ 18%; Servigistics #7 @ 17%; Metrix #8 @ 15%; Microsoft Dynamics The 2011 survey results reaffirmed the #1 & #2 standings of SAP and Oracle from earlier FSM surveys, and reflected the growth of ServiceMax which, for the first time, had surpassed ClickSoftware in this historical series of surveys. Further, although Microsoft also did not yet offer an FSM solution in 2011 (i.e., the company did not enter the FSM solution market until July, 2015, via its acquisition of FieldOne), it was still listed as #8 (i.e., at 15% familiarity) by the respondents to the survey. It is noted that two other of the highest cited vendors have since been acquired by larger organizations (i.e., Metrix, by IFS in May, 2012; and Servigistics, by PTC in October, 2012.) However, SFGSM’s 2014/15 FSM Benchmark Survey update (i.e., with the expansion of the list of potential FSM solution vendors to include Salesforce, for the first time) reveals a largely altered ranking of the most familiar FSM solution providers, as follows: 2014/15 SFGSM FSM Survey Results (percent familiarity as an FSM solution provider): #1 @ 56%; Salesforce #6T @ 25%; Astea #6T @ 25%; Kronos #8 @ 21%; AT&T Advanced Mobility Solutions In 2014/15, while SAP actually increased its FSM market familiarity to 50% (i.e., from 39% in 2011), and Oracle dropped a mere one percentage point to 32%, Salesforce, the “new” entry to the list of vendors, was cited by 56% of survey respondents as one of the FSM vendors with which they were currently familiar – again, however, without actually offering an FSM solution at the time. Thus, the key takeaways revealed by trending the two most recent SFGSM FSM Benchmark Surveys, are the following: In 2014/15, Salesforce had already been recognized as a potential FSM solution provider by a majority (i.e., 56%) of the field services marketplace – despite the fact that it did not actually offer an FSM solution at that time. Microsoft, through its CRM Dynamics platform, had also risen in familiarity as a potential FSM solution provider, growing from 15% familiarity in 2011, to 21% in 2014/15 – despite not formally entering the FSM market until July, 2015. The historical leaders in terms of FSM solution familiarity (i.e., SAP and Oracle) have, as a result, since been relegated to the #2 and #4 positions, respectively, trailing far behind Salesforce. We have seen these types of familiarity rating anomalies in the past; however, what the trend data clearly reflects is that many field services organizations have already been using (arguably, mis-using?) either the Salesforce and/or Microsoft platforms for more than just sales management and Customer Relationship Management (CRM) applications, respectively. And, that this is apparently not limited only to Small/Medium Businesses (SMBs), but also to small-to-medium-sized divisions of larger services enterprises, as well. In many cases, Salesforce (and/or Microsoft CRM) serve double duty within the organization with respect to their use in managing some of the key components of FSM. In fact, in 2014/15, 7% of respondents also reported that Salesforce was their “primary FSM solution provider.” What this all means is actually good news for Salesforce – and especially for the services organizations that have historically been relying on the company’s platform to support their field service operations, in that, with the introduction of Field Service Lightning, they will now be afforded with much greater FSM functionality – however, this time from a solution that is specifically designed for use in running a services organization. While other companies, all with fairly deep pockets, have either tried to buy their way into FSM, grow an FSM capability organically, or some combination of the two, not all have had either the resolve – or inclination – to strive to dominate the FSM market. However, with respect to Salesforce, the combination of a corporate mentality that looks to dominate in each of the markets they serve, with a documented history of key players in the FSM community having already been using (i.e., or mis-using) their CRM platform to assist in running their respective services organizations, the prospects for Salesforce actually becoming a dominant leader in the FSM marketplace may be a somewhat safer bet. Nonetheless, it must still be stated that, so far, Salesforce has only announced a very small portion of field service capability (i.e., key components including contract management, parts management, etc. are still missing) and, as a result, the jury will continue to be remain “out” until more of the company’s Field Service Lightning offering actually hits the market – in full – and in sync with the market’s expectations. Posted on November 7, 2016 by PollockOnService. Posted in Analysts Take | Tagged Business-to-business, CEM, Cloud computing, CRM, Customer, Customer experience, Customer Management, Customer Relationship Management, customer satisfaction, customer service, Emerging technologies, Performance indicator, Pollock, Reverse Logistics, Salesforce, service, service engineer, Service Lifecycle Management, Service management, service technician, SLM, Technical support, Technician | Leave a comment [This is part 3 of a 4-part series on the launch of Salesforce Field Service Lightning. Part 3 focuses on the Industry’s “Take” on the new offering. Part 4 will follow over the next week or so.] Field Service Lightning – The Industry’s Take Early on, CRM Daily cited that “Salesforce is adding some lightning to its customer success platform. The latest iteration of Salesforce Lightning aims to raise the bar on customer relationship management with a platform that taps cloud, mobile, social, IoT (Internet of Things) technologies and data science.” The publication also reported that, “Salesforce launched Lightning in 2015 as a multi-tenant, next-generation metadata platform that enterprise workers can use on any device. It quickly gained traction, boasting 90,000 customers and 55 partners today.” NewsFactor referred to Salesforce chairman and CEO, Marc Benioff’s, press release statements hyping Lightning as a “game-changer” for Salesforce and its customers as just that – “hype!”. But, in a direct response to the press release, wondered whether Benioff was “overselling the platform.” However, Mary Wardley, vice president of enterprise applications and CRM Software at research analyst firm, IDC, believes that Salesforce is on to something, as she opined (in a Salesforce statement) that, “Salesforce has set the standard for innovation in the cloud, and by association, CRM, delivering an unprecedented three releases per year for the last 17 years. Maintaining that pace of innovation is even more crucial as both the pace of technology and customer requirements continue to accelerate and become more complex.” She further went on to say that, ““Field service operations remain a bastion of antiquated systems in many organizations. With the advent of IoT and more objects becoming connected, field service will only become more complex and critical to the success of service organizations. Having a complete end-to-end view of the entire customer service experience – from purchase to installation to maintenance – will allow companies to grow customer loyalty and engagement.” ChannelBiz reported that Sarah Patterson, Salesforce senior vice president of marketing, after presenting a preliminary demo of the new Field Service Lightning platform, referred to the app by calling it “the Uber of field service apps.” Also according to ChannelBiz, “the demonstration showed how Field Service Lightning tracks the location of service representatives and has the ability to assign the one closest to a new job. But the system also lets the dispatcher see if that first choice is stuck in traffic and automatically assign the job to someone who can get to the job site faster. An online map shows the field representative’s progress getting to the job and when they’ve arrived.” However, Diginomica believed the introduction of the new Lightning component to be generally expected on the basis of “scuttlebutt … that a field service play would feature at last year’s Dreamforce after Oracle acquired TOA Technologies and Microsoft snapped up FieldOne”. However, it also believed that the announcement was just “another example of Salesforce’s expanding functional footprint putting it on a collision course with partners in the company’s ecosystem”. Nonetheless, the analyst firm went on to say that “Salesforce’s angle on partner-clash is simple enough – these are big market sectors and the key is to provide customers with choices. That’s also the line being taken by ServiceMax today.” In support of their belief, Diginomica provides a quote from Spencer Earp, ServiceMax’s Vice President EMEA, saying that: “Field Service is a very big market – it pretty much keeps the world running in just about every sector you can think of from healthcare to energy to manufacturing – and it’s applicable to companies of all sizes. What’s interesting is that it’s not just the size of the market that’s expanding, but also the potential. So it’s not surprising that as both the market for field service grows and the potential for monetising grows with it, that we’ll see multiple players with different levels of offerings. It’s a multi-billion-dollar market, so there’s plenty room for field service leaders like ServiceMax who operate on the Salesforce1 platform to co-exist with Salesforce in this space – partly because of the sheer size of the market, but also because of the diverse set of customer requirements in a market this big. Some companies will want to simply automate the location and scheduling of their service techs, for example, whilst others will need the richer experience and deep sector expertise that a complete end to end field service management solution like ServiceMax provides.” Information Week sees Salesforce as having, “enhanced the field service and several other capabilities across its platform, reconfigured its packaging, and raised prices. It has also added Accenture as a cloud CRM customer (i.e., on the same day as the announcement)”. In an interview published soon after the initial announcement, in Information Week, Forrester Research senior analyst, Ian Jacobs, was quoted as saying that Salesforce’s approach to adding field service functionality is “lightweight” and internally developed; that it marked a difference from Salesforce competitors, some of whom have sought to add this field and dispatch functionality to their products through acquisition (e.g., Oracle and Microsoft). He also believed that other large global companies may also follow suit. However, following Salesforce’s March 15, 2016 press release, Jacobs went on to say that, “There are several reasons for Salesforce to jump into this space. The obvious one: they are in a competitive tit-for-tat with Microsoft and Oracle who have both acquired their way into the market. But there are actual benefits to companies of combining field service and customer service on a single platform: better handoff between contact centers, dispatch, and field workers; connecting field service to cases opened in Service Cloud; and a better ability to create a holistic service process.” In another interview with Jacobs, Elec Café reported that “The company took the unusual step of releasing the new field service product without a pilot or Beta testing period, instead going straight to market. The lack of a pilot did not escape the notice of Forrester’s Jacobs,” who further elaborated in TechCrunch that “The no pilot or beta was a big surprise to me. But the growth in the subscription model across all sorts of industries (HVAC companies offering cold air as a service, for example) dramatically elevates the importance of field service in the B2B world, and the explosion of home automation and ‘smart’ appliances does the same for the B2C realm.” Fortune also weighed into the mix by reporting that, “The cloud software giant’s latest application launched Tuesday, called Field Service Lightning, automates the management repair or service calls – everything from dispatch alerts to work order creation to wrap-up reports. As you might expect, the service ties closely to the flagship Salesforce customer relationship app. In theory, that turns service technicians into potential sales representatives. For example, if someone notices that a customer might benefit more from a product update – rather than a repair – the technician will be able to suggest that to the customer and note that in his or her report.” Overall, the various industry analysts’ reports look very positive thus far. [Watch for part 4, to be published on our Blogsite shortly.] Posted on October 21, 2016 by PollockOnService. Posted in Analysts Take | Tagged Business-to-business, CEM, Cloud computing, CRM, Customer, Customer experience, Customer Management, Customer Relationship Management, customer satisfaction, customer service, Emerging technologies, Information technology, Performance indicator, Pollock, productivity, Reverse Logistics, Salesforce, service, service engineer, Service Lifecycle Management, Service management, service technician, SLM, Technical support, Technician | Leave a comment [This is part 2 of a 4-part series on the launch of Salesforce Field Service Lightning. Part 2 focuses on the Salesforce “Take” on the new offering. Parts 3 and 4 will follow over the next couple of weeks.] Field Service Lightning – The Salesforce Take In its March 15, 2016 follow-up press release, Salesforce described its Field Service Lightning solution as, “Built on Service Cloud, the world’s #1 customer service platform, Field Service Lightning enables companies to deliver mobile, intelligent customer service from phone to field. With Field Service Lightning, companies can: Connect their entire service workforce: Field Service Lightning connects the entire service organization from call center to the field. Agents, dispatchers and mobile employees in the field are on a single, centralized platform, bringing a new level of transparency and efficiency to customer service. Service agents have a 360-degree view of the customer and can create a work order from any case. Mobile employees in the field now have access to the customer’s full service and purchasing history, empowering them to easily resolve any issue that may arise and possibly upsell the customer on another product. For instance, a homeowner requests a service visit because their Internet connection has gone down. After resolving the issue, the technician sees within the field service app that the homeowner has previously asked about a faster Internet connection. Using this insight, the technician presents new packaging options and the customer upgrades to a faster Internet speed at a discounted rate. Intelligently schedule and dispatch work: At the core of field service is scheduling and dispatching. Leveraging features from ClickSoftware like scheduling and optimization, Field Service Lightning takes dispatching one step further by applying a layer of intelligence. Scheduling is automated based on skills, availability, and location to optimize on-site service. Rules can be put into place to automatically assign senior field employees to complex service issues, and junior field employees to the routine service calls. Because scheduling is automated, dispatchers can focus on the real-time view of service operations and adjust resources accordingly. For example, if the first job of the day ends up taking longer than anticipated, a dispatcher can assign a different field employee to the next job so the customer’s appointment does not get delayed. Or if a mobile employee gets delayed by traffic, a dispatcher could route another field technician to the job. Track and manage jobs in real-time: Customer service moves fast and forward-thinking companies need real-time access to their service data. Field Service Lightning enables all service employees to update work orders, issue change requests and adjust job status, anytime, anywhere and on any device. A staggering 65% of field service workers still print out their service tickets and bring them in their vehicles, slowing down the service process. Now, an employee in the field can see their open work orders on their mobile device, update them throughout the day as they complete jobs, and all the information is seamlessly updated in Salesforce.” With this particular lineup of field service capabilities in place (or, more accurately, ready for delivery in Spring/Summer 2016), Salesforce believes that it will now have the capability for “delivering industry-leading field service out of the gate” supported by the “power of the platform combined with Best-in-Class functionality”. The primary components of Salesforce’s Field Service Lightning may then be divided into two main categories, all contained within the umbrella of Salesforce Customer Success Platform, as follows: Optimization (i.e., to be available in H2 of FY17) Dispatcher Console Asset & Install Base Entitlements & Service Level Agreements (SLAs) Mobile with Offline (i.e., to be available in H2 of FY17) SFX Lightning S1 Mobile Products & Parts (i.e., to be available in H2 of FY17) Internet of Things (IoT) (i.e., to be available in H2 of FY17) Built on ClickSoftware’s Field Expert platform (acquired by Salesforce for several million dollars), Salesforce has internally incorporated additional functionality to support its offering, and now bills its new Field Service Lightning platform as featuring: Industry-leading Scheduling and Optimization Robust, integrated Work Order Management Core Field Service Functionality built into our Data Model The #1 Customer Service App built on the leading Customer Success Platform Salesforce goes on to identify the greatest attributes of its Field Service Lightning platform for each major type of beneficiary, as follows: Service for Apps Service for Websites The Mobile Worker Offline Mobile App Automatic Scheduling Real-Time Visibility Service Estimated-Time-of-Arrival (ETA) As such, the “new” Salesforce Field Service Lightning platform looks very much like the most current iteration of the prototypical ClickSoftware platform – although, now synergistically linked to each of the other key components of the Salesforce Lightning offerings. Large pieces of future functionality (i.e., optimization) has also been OEM’d from ClickSoftware. In accordance with the preliminary “roadmap” for the release of each of the major components of Field Service Lightning, Salesforce has announced a staggered timetable ranging from Summer ‘16 (June, 2016); through Winter ’17 (October, 2016); and Spring ’17 (February, 2017). Basic functionality for all Dispatch and Scheduling, Work Orders and Service Contracts, and Mobile Workforce were to have been made available in the Summer ’16 (June, 2016). Some of the more sophisticated areas of functionality (e.g., Capacity Planning, with Optimization; Optimization Auto Tuning; and Multi-stage Dependencies will not be available until Spring ’17 (February, 2017). However, even some of the FSM solution’s core functionality, such as Preventive Maintenance, Parts and Inventory, and Van Stock will also take until Spring ’17 to “officially” hit the market. Overall, Mike Milburn, SVP and GM, Service Cloud, Salesforce, sums up the launch of Field Service Lightning by saying that, “We are just beginning to see what customer service can look like in the era of mobile and IoT. Field Service Lightning gives companies the ability to reinvent their approach to service by connecting the phone to the field on a single platform, resulting in an amazing customer experience.” Posted on October 3, 2016 by PollockOnService. Posted in Analysts Take | Tagged Business-to-business, CEM, Cloud computing, CRM, Customer, Customer experience, Customer Management, Customer Relationship Management, customer satisfaction, customer service, Emerging technologies, Performance indicator, Pollock, Reverse Logistics, Salesforce, service, service engineer, Service Lifecycle Management, Service management, service technician, SLM, Technical support, Technician | Leave a comment [This is part 1 of a 4-part series on the launch of Salesforce Field Service Lightning. Part 1 focuses on the composition of the new offering, within the context of the overall components that are designed to support Field Service Organizations (FSOs). Parts 2 through 4 will follow over the next few weeks.] Note to Readers: While this document is primarily focused on the description, assessment and evaluation of the newly-launched Salesforce Field Service Lightning offering, we have attempted to also convey an understanding of the new offering within the overall context of the Salesforce Customer Success Platform, including Sales Cloud Lightning and other key components of the company’s Lightning products. The rationale behind this decision is that past Strategies For GrowthSM (SFGSM) research has revealed that many services organizations have historically been using various components of the company’s flagship Customer Success Platform products as tools for running their services organizations prior to the recent announcement and release of its Field Service Lightning solution. As such, it was our goal to adequately explain the potential interactions and synergies between and among the various Salesforce products as they are already being used by a number of Field Services Organizations (FSOs) to assist them in managing their overall business operations. Also, a reminder that all non-SFGSM research is cited specifically by its source (i.e., published Salesforce documents and press releases, or published materials from other third-party sources). The remaining narrative solely reflects the opinions, perceptions, forecasts and assessments of the author Salesforce Announces Its Spring/Summer 2016 Product Strategy / Expands Its Service Cloud Footprint to Include Field Service Lightning On February 2, 2016, Salesforce, the Customer Success Platform and self-billed ”world’s #1 CRM company,” introduced the next generation of its Customer Success Platform, Salesforce Lightning, and previewed its product strategy for the first half of 2016. However, for the Field Services Management (FSM) marketplace, the biggest news, by far, was the company’s extension of its Service Cloud footprint into the Field Service Management (FSM) segment through the introduction of Field Service Lightning – the company’s first formal foray into the multi-billion dollar global FSM market In a wide-ranging and fairly comprehensive press release made available that day, Salesforce also announced the expansion of its Sales Cloud Lightning and Service Cloud Lightning Editions, along with “new packaging” and pricing models to provide its customers with “more customization and capabilities to accelerate growth. New Salesforce Lightning advancements announced via the press release included, “Salesforce SteelBrick CPQ, SalesforceIQ Inbox and Field Service Lightning. In addition, Salesforce announced new packaging for Sales Cloud Lightning and Service Cloud Lightning. The official launch of Field Service Lightning was later announced, via a Salesforce press release dated March 15, 2016. This release confirmed the launch of the highly anticipated solution calling it, “a new field service solution built for today’s connected world.” It went on to state that “Harnessing signals from connected devices and customer data from Salesforce, Field Service Lightning is a modern approach to field service that is built for mobile and the Internet of Things (IoT). With Field Service Lightning, companies can now unite customers, connected devices, agents, dispatchers, and employees in the field with one powerful service platform to deliver a seamless customer experience from phone to field. According to Marc Benioff, chairman and chief executive officer, Salesforce, in the company’s original announcement, “Lightning is a game-changer for Salesforce and our customers. It is fueling an unparalleled level of innovation across our entire Customer Success Platform. No other company is delivering this kind of platform, ecosystem and user experience to enable companies to transform themselves and connect with their customers in entirely new ways. The overall thrust of the original press release was to define, explain and promote the company’s Salesforce Lightning offering, as “One Platform, One Experience”. To do so, Salesforce led off with the explanation that it “has been on a continuous journey for the last 17 years to completely re-imagine CRM for the digital era. In 2015, the company launched the new Salesforce Platform – Salesforce Lightning, a powerful multi-tenant, next-generation metadata platform that provides a consistent, modern user experience across any device. “With the Salesforce Lightning App Builder, business users and developers can quickly and easily build apps, and the thriving Lightning Ecosystem provides customers with a broad array of third-party apps and components for everything from financials to human resources, fully integrated with Salesforce. More than 90,000 customers and 55 partner components take advantage of the advanced features of Lightning today. Sales Cloud Lightning – “Reinvented” According to Salesforce, the company’s Sales Cloud is used today by “tens of thousands of companies worldwide” and, as such, “has become the world’s leading sales application”. Sales Cloud was the first of the company’s Clouds that was “completely reinvented by Lightning”. The “reinvented” Sales Cloud Lightning now “provides an entirely new experience for sales reps. New advancements made to Sales Cloud in Spring/Summer, 2016 include Salesforce SteelBrick CPQ – Built on the Salesforce platform and leveraging Lightning, SteelBrick CPQ is now part of Sales Cloud with the February 1, 2016 close of Salesforce’s acquisition of SteelBrick. Now Sales Cloud is the industry’s first comprehensive sales platform that offers everything from lead-to-cash, empowering salespeople to sell faster, smarter and the way they want Lightning Voice – Natively embedded in Sales Cloud Lightning, Lightning Voice will empower reps to connect with prospects faster with click-to-call, auto-logging of calls, and call forwarding to take calls from anywhere SalesforceIQ Inbox – SalesforceIQ Inbox turns employees’ inboxes into a CRM app by bringing the power of Relationship Intelligence to Sales Cloud users directly in their email. The intelligent iOS, Android and Chrome apps combine the power of Sales Cloud data with email and calendar, enabling sales reps to easily manage their email, leads, contacts and opportunities with proactive notifications and smart scheduling Sales Wave App – Optimized for sales, the Sales Wave App delivers data-driven insights to reps on any device and empowers them to take action. With Lightning Actions in Sales Wave, sales reps can collaborate, create and update Sales Cloud records directly within Wave. New dashboards for pipeline trending, performance benchmarking and activity management help reps drive better performance and close more deals Salesforce1 Mobile – Now with full offline capabilities for iOS and Android, Salesforce1 Mobile users can enter information anywhere, anytime and sync it when they are reconnected. With new, enhanced Wave Charts and Dashboards, Salesforce1 Mobile users now have the power of analytics 20 New Lightning Sales Components – Lightning Components are the reusable building blocks of modern apps and can be as simple as single User Interface (UI) elements, or as robust as microservices with embedded data and logic. New Lightning Sales Components include Sales Path, Account Insights and Kanban, all designed to enable reps to sell faster and be more productive While not necessarily a direct component of Field Service Lightning, the new advancements to Sales Cloud announced on February 2, 2016 are indicative of the various types of improvements that are being included in the company’s “reengineered” and “reimagined” product rollouts for the first half of 2016 Service Cloud Lightning – “Reimagined” Salesforce goes on to explain that, “Service has changed rapidly over the last decade, expanding beyond customers contacting vendors via call centers to connecting through channels such as social, email, mobile and in-app experiences. Service Cloud Lightning provides companies with a unified service platform and ecosystem to ensure that every interaction with a customer is an opportunity to create a memorable experience Today, building on Salesforce’s leadership in service, the company is taking a significant step forward with new innovations for every service employee including: Field Service Lightning – Organizations can connect their entire service workforce with tools for agents, dispatchers and mobile employees, giving customers a seamless service experience. Dispatchers can leverage smart scheduling to provide automatic, real-time assignments based on employee skills, availability and location. Service employees in the field are able to create and update work orders, and can also change requests and job status from any device, making them more productive than ever. Omni-Channel Supervisor – Now call center managers have greater insight and visibility into their operations and agents’ workloads, enabling them to allocate resources to provide the best customer experience possible. Capabilities include real-time activity view, operational alerts, filtering and sorting capabilities and dynamic activity tracking and routing to help during high-demand service periods.” Pricing for Field Service Lightning was also announced by Salesforce on March 15, 2016, starting at “US$135 for organizations that have at least one Enterprise Edition or Unlimited Edition Service Cloud License”. Salesforce Customer Success Platform – Advancements The company also announced that, “In addition to the innovations coming to Sales Cloud Lightning and Service Cloud Lightning, Salesforce’s Spring and Summer releases include more than 300 advancements across the entire Salesforce Customer Success Platform.” New capabilities in these releases are to include: App Cloud – The new Process Builder makes it easy for anyone to quickly automate business processes using drag-and-drop criteria and enterprise workflows. Additionally, new services for the Lightning Component framework enable developers and partners to easily build custom components for the Lightning App Builder. Heroku Enterprise – CIOs need the flexibility and control to build, scale and manage the applications that connect brands with their customers. Heroku Enterprise enables developers to create connected apps using network, data and identity services shared across the App Cloud. In addition, new customer-centric big data services like private Postgres, Connect and Redis enable CIOs and their developers to easily harness and deploy the development tools that are essential to building trusted, modern applications. Marketing Cloud – Creating 1-to-1 personalized journeys is how forward-looking companies keep customers engaged with their brand. New email marketing innovations deliver a content management system, updated email creation flow and an email marketing mobile app to help marketers accelerate the delivery of scalable and personalized email programs. Workbenches for Social Studio provide brands with deep social insight to inform marketing strategy, surface trends and uncover opportunities to engage customers. The next generation of Journey Builder will also deliver Predictive Journeys that use data science to learn and score a customer’s likelihood to engage. Community Cloud Lightning – New Lightning Community Templates, Lightning Community Management and Integrated Live Agent enable companies to become smarter and more connected. Lightning Community Templates allow companies to create rich online communities in days, Lightning Community Management empowers the community manager with analytics and tools to foster community growth and Live Agent connects any self-service community directly to the service console to provide seamless customer support. Overall, the basic premise of Salesforce’s introduction of Field Service Lightning is to ”Transform [the] customer experience with connected field service.” According to Salesforce, the main drivers underlying its entry into the global FSM market are, essentially, that: Customer Expectations Have Changed – that the connected world has shattered expectations for customer service (i.e., through the combined impact of Cloud, mobile, social media, data science and the Internet of Things, or IoT). The IoT is Forcing Customer Organizations to Evolve – that connected devices are redefining customer interactions with service (e.g., that 92% of executives believe they need to adapt their service models in order to keep up with customers’ needs). Current Field Service Solutions Are Disconnected – that 54% of companies are using manual methods to handle field service; 1 in 3 service executives admit that site visits usually require a follow-up visit; and 77% of companies are still using an on-premise field service solution. These are acknowledged as the main reasons for why the company has decided that the global field services market is one that: Requires a more centralized, accessible and robust FSM solution, and That Salesforce, through its Field Service and related Lightning offerings, can be the one company to deliver it all. As a result, Salesforce has seen an opportunity to introduce its Field Service Lightning as a “Best-in-class solution to deliver a complete service experience,” built on the following three primary components – all on “the world’s #1 customer service platform”: Connecting the entire workforce – i.e., putting agents, dispatchers and mobile employees on one platform to deliver 360 degree support. Intelligently scheduling and dispatching work – i.e., automating scheduling based on skills, availability and location to optimize on-site service. Tracking and managing jobs in real time – i.e., updating work orders, change requests and job status anytime, anywhere. Posted on September 30, 2016 by PollockOnService. Posted in Analysts Take | Tagged CEM, Cloud computing, CRM, Customer experience, Customer Management, Customer Relationship Management, customer service, Emerging technologies, Field Service Lightning, Pollock, Salesforce, service, service engineer, Service Lifecycle Management, Service management, service technician, SLM, Technical support, Technician | Leave a comment SugarCRM, ah, Honey, Honey, You are my Candy Girl and You Got Me Wanting You! Never heard of SugarCRM before? Well, get ready to have both them – and the Golden Oldie, “Sugar, Sugar” by the Archies – invade your space, the latter as nothing more than an earworm, but the former as a viable new (to you) solutions provider in the growing (and increasingly competitive) Cloud-based Customer Relationship Management (CRM) market. Positioning itself as an alternative to Salesforce.com’s CRM solution, SugarCRM has launched an aggressive marketing campaign that is largely based on a social media push to targeted markets (i.e., practicing what they preach with respect to the integration of social media into their CRM products). They have also just taken (i.e., yesterday) a $40 million equity investment from Goldman Sachs, amounting to half of the total that SugarCRM has raised to date (i.e., about $79 million since the company was founded in April 2004). The company plans to use its new funding to expand its “global reach”, by increasing its global sales and support staff. According to Goldman Sachs, SugarCRM is “very well positioned” as a leading CRM player thanks to the rise of social media and mobile technologies. SugarCRM presently has more than 6,500 customers, having added 600 to the fold in Q2 2013. The company has also experienced 15 consecutive quarters of growth, and some analysts believe that it is currently in the process of setting itself up for a 2013/2014 IPO. Company CEO, Larry Augustin, has already communicated with me (and, probably, you) via Twitter and LinkedIn. In fact, he just tweeted me in response to my following him on Twitter (probably not a personal response – but a response nonetheless). SugarCRM has successfully used the social media it employs in its CRM solutions to reach out to me, and make me more familiar with its brand. Watch your Twitter and LinkedIn feeds for similar messages. However, getting the word out is the first step; but, delivering the CRM solution that works for your organization is what really matters. SugarCRM has been in the global CRM space since 2004, but is new to my space (and, probably, yours). However, they are sure to be more familiar to more and more services managers in the coming months, largely through their social media push. And, with apologies to the Archies, all I can say at this point is, “Pour a little SugarCRM on me, Baby.” Certainly a company worth watching. Posted on August 22, 2013 by PollockOnService. Posted in Customer Relationship Management (CRM) | Tagged CRM, Customer Relationship Management, customer service, Goldman Sachs, Larry Augustin, LinkedIn, Pollock, Salesforce, Salesforce.com, SugarCRM, Twitter | Leave a comment How Were You Planning to Use Market Research Data as Input into Your 2021 Strategic Plan? SFG℠ Makes Four eBooks and 15 Analysts Take Papers Available for Licensing and Distribution Transforming Targeted Market Research into Improved Customer Satisfaction & Retention Video Podcast #02: Using the LOTS Approach to Communications to Ensure Maximum Customer Reliance and Retention Video Podcast #01: Turbulent Times Require Serious Solutions – Especially in Field Services! Service Pros Are in… on Preparing Your Field Techs for… John Carlos on Companion Piece to Field Servi… Are You Being Servic… on What Best Practices Field Serv… Outsourcing: The Sec… on One Mission; One Team – How Tw… Strengthening Custom… on Listen, Observe, Think, Speak… Analysts Take Customer Expectations Customer Needs and Requirements Customer Satisfaction and Loyalty Field Technicians Outsourced Field Force Service Lifecycle Management Services Insight Services Training
cc/2021-04/en_middle_0086.json.gz/line10328
__label__wiki
0.522934
0.522934
Polly Atkin Holy Detritus Beneath the Boughs Dorothy Wordsworth’s Canada Day Poetry Party Being Mutant On Rarity Bronze Medal for Mutation Meeting the Vampires Poetry Reading Group shadow dispatches Month: October, 2016 Words, pictures, music. ‘If I puked up some sonnets would you call me a miracle?’ Neko Case, ‘Night Still Comes’ I’m trying to unravel something about how I feel, and what I think, about the relationship between poetry and song. About my relationships with poetry and song. I’ve been thinking about it a lot over the last month or so, but suddenly it seems everyone else is too, because Bob Dylan has just been granted the Nobel Prize for Literature. The prize committee praised him “for having created new poetic expressions within the great American song tradition”. This has initiated a lot of chatter about what is and isn’t poetry, and what that might have to do with music. Why am I troubling over this now? Partly – mostly? – because I’ve been working on the final edits of my first collection. So many of the poems in it are linked in my mind with particular songs that I’ve made a playlist to go with it – a song for every poem. I like to make playlists for different occasions, with the rule that the songs have to already be in my library. I make them for visiting particular places, for particular seasons or journeys or events. Last year, for instance, I collected every song I owned which featured wolves, werewolves, shapeshifting or the moon, to play as I drove to a conference on Werewolves. The playlist was over three hours long. I began to notice wolves skulking in the background of songs I had never seen them in before. Songs help me think about what I think and feel about something, whether it’s a personal issue, or a creative or professional one. I have poems named after songs, and poems that couldn’t have been written without particular songs. Even choosing which poems might have to be jettisoned from the collection in editing, I thought of a particular song: a live version of Tori Amos’ ‘Honey’ I had on a bootlegged tape of The Bee-Sides. She introduces it by explaining how it was meant to be on Under the Pink, but got ‘kicked off in […] mastering’. ‘Honey’ was one of my favourites too. I worry about looking back and thinking ‘why did I let her get kicked off?’ It’s no coincidence that poets are always writing about music, and songwriters are always writing about literature. I could make a playlist of songs about writing and of songs which mention authors and of songs which mention fictional characters and have hours to listen to. We all – I think – know something of the long history of poetry and story as song, and how relatively recent any real notion of separation between them is. But I need to work out what that means to me, not to the history of literature. I have peculiarly vivid memories of watching the BBC schools programme Words and Pictures when I was three or four. I particularly liked Funny Bones, but I loved the general combination of images, rhyming and lyric storytelling, and song in the episodes. Both music and books were very present and important in our household, but Words and Pictures was an introduction to literacy outside the home, to a wider world of words and pictures and music working together that fed back into what I heard at home. Bearing in mind that I was speaking my own self-invented language at the time that I would sit and watch this show,¹ its presentation of literature as a lively, performed thing, and the relationship of the library hub to the outside and imagined spaces of the stories, was very formative. They even encouraged you to make your own words up. As soon as I learnt to write I was writing poems, but I was also writing songs and tunes. Words and music were still and always wrapped around each other. I recently found some manuscript paper with a tune I wrote named ‘Tehanu’ after the fourth of Ursula Le Guin’s Earthsea novels. It’s not a very interesting piece of music of course, but that’s not what I’m trying to get to. That difficult stage before you can reach the pedals. Growing up, our household’s taste in music was as eccentric and contradictory as my family members. It loved classic Hollywood musicals and Leonard Cohen, Glenn Miller and Queen, Ella Fitzgerald and Tanita Tikaram, The Kinks and T’Pau, James Taylor and Julie London, The Carpenters and Don McLean, Diana Ross and Simon and Garfunkel. I read my way through books of border ballads, the Oxford Children’s Poetry, The Child’s Garden of Verses, Revolting Rhymes, various anthologies of Great Poems, Spike Milligan, McGonagall and Verse and Worse, whilst my older brothers taught me to love Pearl Jam and Metallica and Bowie and Tori Amos and Extreme and Pink Floyd and Kate Bush and War of the Worlds and The Pet Shop Boys and Edie Brickell and the New Bohemians. The summer of 1992 will be forever linked for me with Metallica’s Black Album, because of a tape my middle brother made of it which included the Guns n’Roses version of ‘Knockin’ on Heaven’s Door’, and The Soupdragons’ ‘Softly’. My best friend came on holiday with me and my parents that year, and the tape became the soundtrack to our travels, and muddled up in our minds with two novels we were obsessing over – one about a vampire with a soul (The Silver Kiss) and one about someone who fed off other people’s youth (Personal Effects – I can’t trace this, but the main character was doing an Art Foundation which completely sold me on the idea, despite the fact she almost got sucked dry because she was just so cool). We listened to that tape until we knew every word, every chord, every beat. I began to grow my own collection of tapes based from songs I heard on the radio or saw on TV or that friends told me to listen to – Nirvana, PJ Harvey, 4 Non-Blondes, Tasmin Archer, The Cranberries, The Stone Roses, then Hole, Heather Nova, Radiohead, R.E.M, James, The Smiths … easing into the mid-nineties indie and Britpop years of Elastica, Echobelly, The Verve, The Cranberries, Pulp, The Wannadies, Blur and Oasis, Catatonia, Gene, Ash, Portishead, Mazzy Star, Ash, Supergrass, Massive Attack … more more more. All great storytellers in their different ways. I didn’t really know then that contemporary poets existed, let alone that if I read a poem I liked, I could find a whole book by that same person, or that I might be able to hear them read aloud. As much as I loved poetry, I didn’t know of the world of poetry or how to access it. I did know how to access music. Music was my contemporary lyric. My poets were dead, my music was living. Sometimes the music even told me about poets. The Bluetones introduced me to Adrian Mitchell’s poem ‘Celia Celia’; The Verve to Blake’s ‘London’. Music taught me about the world. It taught me about war and social injustice and global history and racism and feminism. It taught me how to negotiate being a girl and a woman in an often hostile environment. It taught me about joy and despair, and singing through them both. So it’s no surprise that many of my teenage poems began as songs, or songs began as poems. Weird songs with weird lyrics. Poems which might have made more sense with music. By the time I was in lower sixth, I’d developed quite a collection of songs, and even started to record a few before I dislocated my knee and broke my elbow, putting me out of musical action, and setting me back at school. I never managed to go back and finish recording those songs, and I sometimes wonder what would have happened if I had. After that, I felt I didn’t have the stamina to pursue music, or much at all for that matter. I found more and more I was turning to poetry to try and make sense of what I was feeling, and the incomprehensibility of my recalcitrant undiagnosable body. When everything else seemed physically impossible, I could still write broken lines. The last time I wrote a song was in 2009. I wrote a few that year. It refers to a number of traditional ballads, Alasdair Roberts’ Polly songs, and an Emily Dickinson poem. There’s nothing deliberate in the fact I haven’t written a song since, it’s just worked out that way. Where a song comes from is as mysterious to me as where a poem comes from. Both are more likely to arise under the right conditions and with practice though. I am very aware that I don’t play as much as I used to, or rather that I play less now that I ever have, and I wonder what that might mean, for my writing and more widely. I also think whether I feel like playing and singing is a kind of measure of health. Still, our tiny living room is dominated by my piano, which was my gift to myself when I moved out of London ten years ago. I had spent seven years dreaming about discovering an extra room in the house with a piano in it and perfect acoustics, and vowed never to live without one again. A house is not a home without a piano squashed uncomfortably into it. My piano. Not my cat. In an overly lengthy way, what I’m trying to explain, is that (as for many poets) for me poetry and song aren’t just linked metaphorically, or historically, but very tangibly and practically. I have used songs in my creative writing classes to make exactly this point, from variations on ‘The Silver Dagger’ (including Hey Rosetta’s lovely version of ‘Who is at my window weeping’ and Martha Tilston’s deceptively simple cover) to talk about the fluidity of ballad narratives, to using songs by Bonnie Tyler and Dar Williams to open discussion about gender awareness in childhood. So why have I found myself feeling disappointed that Bob Dylan was granted the Nobel Prize for Literature, instead of elated, or vindicated? Am I a literary snob, or elitist, as some are accusing the nay-sayers of being? Quite possibly. I can’t shake a conviction that Dylan is just not a poet. I write this as lover of many of Dylan’s songs. I think many of his lyrics are brilliant. I know his songs have been incredibly important to many people, not just generally, socially, but specifically to some of the songwriters and writers I most admire, and who have been most important to me. I’m questioning my own bad feeling. My feeling that this is not the inclusive move it is meant to be. I wonder if it has more to do with the men who have tried to convince me over the years that Dylan is a poet, than with Dylan himself. I wonder if it has to do with how riled I get by the continual comparisons between Dylan and Leonard Cohen, who is unequivocally a poet and a novelist as well as a songwriter (and whose music I happen to have a much deeper and longer connection to). Is it that I think one of the best things about ‘Blowin’ in the Wind’ is that it made Sam Cooke write ‘A Change is Gonna Come’? Is it that I sometimes prefer Dylan’s songs when other people sing them? I would listen to Joan Baez sing ‘Sad-eyed Lady of the Lowlands’ all day. Surely this should actually count for the quality of the writing, not against? It speaks of wider influence, of seismic change. Am I just being pedantic? Very possibly. Is it generational/formational? Many of the people I know, and have read about, who have been really delighted by the choice grew up with Dylan in a way I didn’t, either because they were teens in the 60s, or because Dylan was a part of their later household in a way he wasn’t in mine, as Simon Armitage has also found. Partly I think what I’ve been reacting against is the reaction, as well as a sense that this radical choice is just not radical enough for 2016. The world already knows the work of Bob Dylan – what about highlighting the work of someone they’ve never heard of, or a kind of work they’ve never given a moment’s thought to? On a very basic practical level, there are many more opportunities for a musician of Dylan’s standing than for a poet. Is this important? Maybe. Does it come down to access to audience and livelihood? As others have said, I wouldn’t think twice about the aptness if it a culture prize, but there are more worthy (and necessary) candidates for such a prominent literature prize. Then, don’t we always think this? Don’t we nearly always have a conviction, especially with the big prizes, that we could pick a far worthier winner ourselves? I’d be just as disappointed if Don DeLillo had won. The only difference would be that the writing world wouldn’t be having quite such a great enormous row about it. Great songs create whole worlds in their narrow bounds just as great poems, stories and novels do. They live in and grow in your mind and memory. But music is a vital part of their world-building. A song is a complete text. I often say a poem on the page can be like a tune in manuscript, the white space and punctuation telling you how it sounds when you play it through the instrument of your voice, but this is only one story about poetry. It does speak of a difference between poetry and music though. A poem’s music has to be there in the words in the voice and the white space and the breath. A song needs actual music. Giving Dylan a literature prize under these terms seems almost to negate the complex communicative power of music itself. I have a particular soft-spot for lyrics that foreground the failure of words to express feelings or experiences. The shoop shoops and uh huh oh yeahs. One of the many moments that delight me in Neko Case’s last solo album is when she breaks down into ‘blah blah blah, blah blah blah, they talk about, oh oh’ in ‘Calling Cards’. Jenn Grant and Joel Plaskett (who feature heavily amognst my top played Canadians) are both excellent lyricists, but are also especially good at knowing when to employ the oh oh oh or la la la. As is Dylan, though. Maybe even making this separation argument is spurious, and nothing to do with the rationale behind the prize. Maybe it just becomes an easy way to justify either side of the debate. I hate choosing between things I love. I can’t make lists of favourites, because they end up too long, and I worry about omitting something important.² I refused to choose between Blur and Oasis as a teenager, and could never choose between The Stones and The Beatles. I reject reductive binaries in every other area of my life and I reject them here too. I refuse to be cornered into pretending to choose between words and music. I want poetry and song. I want lots of them. I want them everywhere. I want the whole world to find it as impossible as I do to choose one over the other. And this is why I’ve decided to be glad Dylan won the prize, if only for what else this might make possible in the future. Neko Case for literature laureate! John K Sampson! Laura Veirs! Basia Bulat! Dar Williams! Florence Welch! Thea Gilmore! What about Beyonce? Maybe she and Warsan Shire could get a joint prize? I’m picking from my own playlists here, but aren’t you? I could list pretty much every songwriter in those playlists though, because in their different ways, they’re all extraordinary lyricists and storytellers. I’ll finish as I started, with a quote about writing from a song: ‘You see I’ve got this theory/that it’s only punctuation/that separates the list from you to me/and you can have your little war/of full stops and erotemes/but the real power’s in parentheses’. Thea Gilmore, ‘Punctuation’. Of course, Thea’s singing about good and evil, not literature and music. But the point still stands. True. Unexplained. Probably explains a lot. I’m trying my best not to keep coming in an adding more songs and bands as I realise I’ve forgotten something vital but … All the messages received in my sleep This site is named Shadow Dispatches, the same phrase that gave the title to my second pamphlet. It comes from the below poem, ‘Somnography’ (a word I kind of made up: literally sleep writing) which talks about messages or emails that definitely exist during the night but disappear somehow before dawn. It was once filed under a line from a scene in the film The Science of Sleep featuring a dream message (‘Your neighbour, a liar’). I called the pamphlet Shadow Dispatches partly because it seemed a way to talk about a B-side-ish nature of the poems included: lots had been placed in competitions, but few really had public lives or readers. They were out there, but not out there. Putting them together in the pamphlet was a way to try to address this, but the title was a nod to the notion that they, like the dream messages, might not get through. Today is National Poetry Day, and the theme this year is messages, so this seemed like a good time to throw this poem back out into the ether, and see what sticks. Somnography Early this morning I got your note. I can’t recall the words or meaning, only the light oblique on the screen and how it made it feel, certain transmission was real. I could recite which days have tried to prove imagined, and one correspondence aborted mid-sentence which sent itself nevertheless, as though the content refused erasure, arriving complete through the ether. We dare not believe these shadow dispatches: corrupted, wishful, impossible to delete. The same way sheets I never strung to dry at a window still fill the room with sails long after I’ve moved, and how I’m still reading a letter a man never sent, though I could repeat it verbatim, clear as the sun through the linen, billowing yellow and sweet as the wedge that lit your words I can’t remember, or that email which backspaced even as I scrolled down the face of the dream computer. Let’s Just Survive: A Covid-Christmas Playlist #SuckItAbleism / On Not Going Plastic-Free 2018 Digest Test your metal pollyrowena on #SuckItAbleism / On Not Going… julietwilson on #SuckItAbleism / On Not Going… hejyork on #SuckItAbleism / On Not Going… pollyrowena on 2018 Digest
cc/2021-04/en_middle_0086.json.gz/line10329
__label__wiki
0.879883
0.879883
Tokushima: Handyman called to change lightbulb finds corpse January 1, 2021 pathofex Japan News 0 TOKUSHIMA (TR) – Tokushima Prefectural Police have sent a woman to prosecutors after the corpse of her son was found at their residence in Tokushima City, reports the Tokushima Shimbun (Dec. 30). At around 10:30 a.m. on Monday, a handyman visiting the residence to replace a lightbulb found the body of her 26-year-old son atop a futon in the kitchen. “Even though I knew he died, I left [his body] as is,” the woman, 50, later told the Tokushima Meisei Police Station. According to police, the results of an autopsy indicated that the son died due to illness. The woman shared the residence with her son. She told police that he died in early December. READ MORE Tokyo reports record 1,337 COVID-19 cases as nationwide tally tops 4,000 Given the behavior of the woman, police believed she might not be mentally capable of being held liable in the crime. However, she was sent to prosecutors on suspicion of abandoning a corpse on Tuesday. Looking back: The people who made the headlines in 2020 The Brexit transition period ends, Kela investigates the effects of the new agreement on social security entitlements Trinity EMS vaccinates EMTs, other first responders NY Gov. Andrew Cuomo presents Fiscal Year 2022 Executive Budget Kentucky State Police troopers detailed to presidential inauguration – WNKY 40 News
cc/2021-04/en_middle_0086.json.gz/line10330
__label__cc
0.727489
0.272511
The CX Workforce Challenge & How Vendors Are Responding Ivan Kotzev U.S. Document Management User Requirements Intelenet Global Services Offshore BPO Delivery CX Services in Telecoms & Media 2020 CX Services in Retail & CPG CX Services in Energy & Utilities Digital CX Services CX Services in Travel, Transport & Hospitality Alorica Harnesses Technology to Engage Gen X, Y & Z Workforce Seizing the Automation Opportunity: Alorica’s Automated Discovery Process Highlights from Alorica’s Analyst Day, November 2018 (vlog) Alorica Aims for CMS No. 1 Spot in U.S. with Bets on LATAM & CX Transformation Concentrix Messaging & Bots: Innovation During the COVID-19 Crisis posted on Aug 31, 2018 by Ivan Kotzev Tags: Conduent, Transcom, C3, Convergys, Tech Mahindra, HGS, transcosmos, Sitel Corporation, Intelenet Global Services, Concentrix, Teleperformance, SYKES Enterprises, Alorica, Customer management services In February, industry veteran and CEO of SYKES, Chuck Sykes, commented during the earnings call on CX services market trends: ‘… in the U.S., at least in my time, there is no time in the company's history that I can recall seeing this level of labor challenge. And it actually is something that you're going to see in a lot of developed countries around the world.’* In this blog, I look closer at the nature of the CX workforce challenge. Pressures on the labor market Multiple forces have contributed to a CX labor gap, including traditional issues such as the negative reputation of contact center careers and the highly demanding nature of customer service work. However, several factors are putting new and lasting pressures on finding, recruiting, and retaining CX employees: Low unemployment rate. In the U.S., the unemployment rate slid to a near 18-year low; in the U.K., it is around 4%, the lowest since 1975; and in certain parts of Germany, local unemployment rates reached as low as 1-2% Minimum wage increase. Governments, often at the local level, have significantly increased the minimum wage in many U.S. states, Canadian provinces, and the state of Karnataka, India, to name a few. Other countries such as South Africa are working towards introducing a minimum wage for the first time Global delivery network maturity. Very few suitable delivery destinations remain unexplored and offer the required combination of skills, scale, cost arbitrage, security, connectivity, and the other factors for establishing CX centers. Places such as Cyprus, Georgia (the country), Kosovo, and some Sub-Saharan countries are attracting multinational CX services providers willing to pioneer delivery. However, with limited scale, they cannot offer a true alternative to more mature markets Increasing demand for employee skills. The traditional agent profile, with language proficiency and basic computer skills is no longer sufficient. Client programs now seek new hires with an industry background, and demand digital skills and the ability to engage and lead unscripted conversations. The agent who takes inbound support calls is not necessarily the one who works on webchats and is likely different from the one who supports Facebook Messenger inquiries. Immediate impact & vendors’ initial reactions The immediate reaction of CX services vendors is to increase agent salaries, often absorbing the initial impact on margins, while re-negotiating the cost structure with existing clients, or at least planning for increases when it comes to contract renewal time. Labor market pressures are also driving more active selection of bids, including walking out of existing underperforming programs (e.g. Conduent, Convergys). Another approach is to increase use of nearshoring and offshoring, even in industries which traditionally shied away from the model, e.g. brick and mortar retailers, airlines, and utilities. Certain destinations such a Jamaica, Colombia, Romania, Malaysia, and the Philippines continue to benefit, but often by expanding into tier 2 and 3 cities. RPA and intelligent automation is probably the most underused opportunity, with CX services vendors increasing its adoption across multiple contact center processes, from traditional back-office work to front-office tasks. Providers and clients have significant runway to reach the balance of machine and live agent support and to achieve scale and maturity of automation and cognitive analytics deployments in contact centers. Still, the adoption of this technology will not dramatically alleviate the shortage of skilled agents, as live support moves to higher value, more complex interactions. Alternative contact center models, employee engagement & the rise of work-at-home Employee recruitment, performance management, and engagement combined is another area where CX vendors are making investments to counter labor challenges, utilizing technology and analytics such as recruitment bots (e.g. Alorica), mobile learning (e.g. Sitel), coaching bots (e.g. C3), engagement apps (e.g. Concentrix), and career development (e.g. Teleperformance University). As part of these strategies, vendors are also increasingly focusing on the work-at-home model. Providers such as Transcom in the U.S., HGS in Canada, and SYKES in Western Europe are actively employing the work-at-home model for full-year programs, gaining access to new talent, often with specific industry skills such as healthcare, insurance, and travel (e.g. Intelenet), or creating presence in untapped labor pools such as Alorica’s military veterans and spouse programs. Another vendor initiative is opening small-scale urban contact centers to cater for the labor pool in these locations. Such micro centers with less than 50 people are being developed by transcosmos in Japan and Invitel in Germany. And a further opportunity Companies managing internal CX operations are facing the same labor market pressures. This situation creates an opportunity for outsourcing providers to differentiate based on their ability to source talent and place it in the right delivery model; but also based on their ability to engage employees, transform the nature of support work, and elevate the role of the CX agent. * Taken from the Seeking Alpha Earnings Call Transcript: SYKES Q4 2017 Results NelsonHall recently published its Digital CX Services market analysis report, available to CX Services program subscribers. For access, please contact NelsonHall Client Services Director Keith Maclean.
cc/2021-04/en_middle_0086.json.gz/line10338
__label__cc
0.525779
0.474221
Shop RightWisconsin New Study Calls Into Question More Regulation of School Choice Posted by Will Flanders | Sep 18, 2018 Calls for more regulation of Wisconsin’s school choice programs have been getting louder. Making the claims that performance isn’t consistent enough, generally on standardized tests, they argue that government—or some outside entity—needs greater control of school entry and school exit in the state. However, a new study by Corey DeAngelis of the Cato Institute adds to the growing body of evidence that such arguments are wrongheaded. Rather than under-regulation, problems in the Milwaukee Parental Choice Program (MPCP) likely result from too many regulations being forced on private schools. By many measures, the MPCP is already one of the most regulated school choice programs in the country. MPCP schools are forced to take the voucher amount as the full cost of tuition, which eliminates the feature of a functional market whereby service quality and demand sets prices. Schools are subject to a number of accounting hoops and accreditation requirements that school leaders will often tell you are difficult to understand and keep up with. Schools are also required to hire certified teachers with certain educational requirements, which may make it difficult to fill positions, or may necessitate the hiring of someone less objectively qualified for a particular job. WILL and School Choice Wisconsin’s study of accountability in the MPCP and other state programs last year highlights even further the difficulty of the regulatory environment faced by schools that want to participate. DeAngelis examines the impact of such regulations across two school choice programs—the MPCP in Milwaukee and Ohio’s Educational Choice Scholarship Program. In both cases, he finds that proxies for school quality (tuition and school rankings on the website Great Schools) are negatively related to the likelihood of schools to participate in the voucher program. Specifically in the MPCP, a $1,000 increase in tuition is related to a 3 percent decline in probability that a school participates. By the other measure, a one point increase in a school’s score on Great Schools is related to a 14.8 percent decline in the likelihood of participation. This is consistent with previous work that DeAngelis has coauthored, which showed that lower levels of regulation in school choice in Indiana result in higher levels of school participation than more regulated programs in Washington, DC and Louisiana. This is not to say that high quality schools do not participate in the MPCP. Indeed, schools like St Marcus and St Thomas More High School rank among the best schools in the state when fair comparisons are made. But what it does suggest is that further improvement to the sector is less likely to result from further regulation than from lessening the burden on schools, and putting more information into the hands of parents. Until we have given the school choice marketplace in Milwaukee a true opportunity to thrive under the vision of Milton Friedman, we should not continue our inexorable march in the opposite direction by letting the heavy hand of government or some other well-meaning big brother limit the choices available to Milwaukee families. Will Flanders is the research director for the Wisconsin Institute for Law & Liberty (WILL). This first appeared in the WILL Blog. PreviousWigderson on Scaffidi: the Kavanaugh Nomination and Tony Evers’ Spending NextMarquette Poll Analysis: Not Time to Panic Yet Nicholson Calls for Six Debates, Vukmir Says She Looks Forward to Debating Nicholson What Would Tommy Do? Walker Weekly Radio Address: Merry Christmas and Happy Holidays! Wisconsin’s Answer To Ocasio-Cortez Pushes Costly Green New Deal About RightWisconsin © Right Wisconsin 2020 Member of the Waukesha Business Alliance. You can email us at RightWisconsin@RightWisconsin.com, or mail to: Waukesha, WI 53187-1272 Site by OpenBox Strategies | Milwaukee Website & Video Production
cc/2021-04/en_middle_0086.json.gz/line10345
__label__cc
0.641404
0.358596
Home / Traditional Meditations / Rabbi Abraham Abulafia: However, the breath Rabbi Abraham Abulafia: However, the breath Photo: Jewish Berber girls dressed for a festival. ca. 1930s/40s by J.Robichez in Central Morocco. which is from the second one in the heart. One ascends with the Unique Name to the sky to depict with Unifications between everything that is difficult science of pronunciation. It alone is life in the Name. It is remembered and sealed in the Book of Life to make the individual live which enlightens constantly, when every thought, every soul is concentrated on it. (Rabbi Abraham Abulafia) Recommended Reading for Children (4-8 years old): The Dreidel that Wouldn't Spin: A Toyshop Tale of Hanukkah by Martha Seif Simpson (Author), Durga Yael Bernhard (Illustrator) “This dreidel doesn't work!” the father had cried. “What do you mean? How can a dreidel not work?” the shopkeeper asked. It was certainly the most beautiful spinning top the shopkeeper had ever seen, with magical golden letters on its sides. But it just would not spin for two spoiled children who insisted on owning it! Later, the shopkeeper decides to try it one last time: would it spin for another child, one who carried the true spirit of Hanukkah in his heart? In this beautiful holiday story by award-winning author Martha Simpson, and brought to life by the imaginative illustrations of award-winning illustrator D. Yael Bernhard, the happiness and joy of the Hanukkah miracle will warm the heart of young and old alike with its simple message: wonders still occur for those who are ready for them. Included is a useful appendix that explains Hanukkah, and an explanation on how to play the dreidel game.
cc/2021-04/en_middle_0086.json.gz/line10366
__label__cc
0.62632
0.37368
Robin R Cutler Journeys through History Such Mad Fun Such Mad Fun Gallery Such Mad Fun Prologue — All the Things You Were Buy on Barnes and Noble Buy the iBook Buy the Book at the Kobo store A Soul on Trial A Soul on Trial Gallery Rosa makes Page 1 of the New York Times Buy the Book Now Such Mad Fun- Travel back to the Golden Age of Hollywood in this unforgettable award-winning story What determines who a woman will become? Jane Hall was an orphan at fifteen and a “literary prodigy” according to the press. How did this daughter of Arizona’s most popular humorist become a Depression-era debutante, a successful author of magazine fiction, and a screenwriter at Hollywood’s most glamorous studio? Jane soon found that her ambition… A Such Mad Fun Author Interview Robin has been skyping with book groups. Contact her through the website to arrange a date. Many Thanks to Annette Bochenek for permission to use this interview that appeared with a review on her terrific website Hometowns to Hollywood. This may answer some of the questions you have about Such Mad Fun. Annette: Jane Hall… Watch the Trailers for Movies Featured in Such Mad Fun Movies Jane worked on play on TCM! Look for: HOLD THAT KISS, THESE GLAMOUR GIRLS, IT’S A DATE NANCY GOES TO RIO Often they are for sale on TCM, Amazon or Ebay especially THESE GLAMOUR GIRLS which features Lana Turner in her first starring role. The movie is based on Jane’s book-length Cosmopolitan novel. At… Poplar Springs – A Tradition of Hospitality Poplar Springs Farm near Warrenton, Virginia, was a place that came to mean as much to Jane Hall as the desert hamlet of Salome, Arizona. How thrilled she would have been that Poplar Springs Manor is now an oasis of beauty, serenity and gourmet cuisine where anyone can enjoy an unforgettable event in a unique setting.… A Patriotic Geranium– Or, Reflections from Oakland, California Alice is inside today. Usually she’s on the balcony of my 5th floor apartment, but the 97° heat and sharp gusts of northeast wind make that perilous. This Super Moon zonal geranium* (aka pelargonium), which came from a small cutting given to me by a neighbor, is a symbol of hope. She is over a… October 16, 2020 in Notes from the Field, Such Mad Fun. That Old Black Magic on Wheels For the last several months I’ve been preoccupied with planning a move across the U.S.A. to the East Bay. (Obviously not with writing posts on this blog. That should change soon.) Both of my daughters and grandsons are permanently in California. So I’ll start a new adventure living in Oakland near Lake Merritt in… February 15, 2020 in Notes from the Field, Such Mad Fun. Where Is Dick Wick Hall Now? DWH Day is October 12th this year. On October 12, 2019, once again, the town of Salome, Arizona, and the surrounding community will celebrate Dick Wick Hall Day. (Details below) Years ago, I was fortunate to participate in these festivities with each of my daughters. My grandfather’s most visible legacy still lies in Salome (where he’s pictured here), and in the other… October 4, 2019 in Notes from the Field. Turner Classics–Still a Great Escape and Often Provocative Despite the loss of its beloved host, Robert J. Osborne, two years ago this month, Turner Classic Movies is still thriving. For those of you who are classic film fans (or Such Mad Fun fans), I strongly suggest subscribing to TCM’s Now Playing Newsletter. In addition to several Irish films, Thursdays devoted to journalism… March 15, 2019 in Such Mad Fun. What Movies Teach Us About Being Women-Thank you Manohla Dargis “Movies teach us all sorts of things: how to aspire, whom to fantasize about, (all those princes will come), how to smoke, dress, walk into a room (always like Bette Davis). They teach us whom to love and how, as well as the ostensible necessity of sacrificing love along with careers. . .… December 11, 2018 in Notes from the Field. Poplar Springs Manor –New Priorities for a Historic Venue Happy August to you all who have been following Jane Hall’s story and other posts. Please disregard the much older post you just received about Poplar Springs history as it was not supposed to be resent. I simply looked it up for some info. But there is news. Poplar Springs has a new owner as of… August 9, 2018 in Notes from the Field. Immigration in Context While exercising in the condo’s pool yesterday, I noticed a small brown beetle floating in the water. When I was ready to leave, I realized it was still alive. There was a toy football on the edge of the pool, so I let the beetle climb on it and placed it in the shade. It… June 24, 2018 in Notes from the Field. A “Nation of Immigrants” in the “Good Old Days” Jane Hall’s experiences in Arizona and California before she became an orphan in 1930 did not expose her to as many people from other nations as New York City. Although her guardians introduced her to an exclusive social world, when she went to art school at The Cooper Union on Manhattan’s Lower East Side,… January 29, 2018 in Notes from the Field, Such Mad Fun. New Year’s Eve 1938 and 2017: Elephants and G-men (or when FBI Agents were Heroes) The January 1, 2018, New Yorker cover, “Cramped” by George Booth, features a huge grey elephant that looms over the living room of two people trying to have a quiet evening at home. Another pachyderm appeared on the December 31, 1938, cover of the magazine. This gleeful pink elephant by Rea Irvin (1881-1972) might just as… December 30, 2017 in Notes from the Field, Such Mad Fun. A Depression-Era Thanksgiving — Just as Many Calories Circa 1932 I came across an interesting article recently about Thanksgiving in the 1930s thanks to journalist Julie Chang. She notes that, for those who could not afford to dine in an elegant hotel or club, making recipes from scratch compensated for inflated food prices during the Depression. And many Americans remained optimistic despite their troubles. At… November 18, 2017 in Notes from the Field. “The world is at sea on a raft in a hurricane” 1940 and 2017 As many of you know, for quite a while I’ve been reading magazines published in the 1930s and 1940s; I’ve been interested in the values that women’s magazines, such as Cosmopolitan and Good Housekeeping, imparted to their women readers. In those days, magazines were filled with articles about current events as well as fiction by… Real News or Fake? In 1939 Dorothy Thompson Weighed In on the Topic. Dorothy Thompson on the cover of Time magazine, June 12, 1939 She was one of the most celebrated journalists of her era. On June 12, 1939, she graced the cover of Time magazine which called her “‘the second most popular and influential woman in the country behind Eleanor Roosevelt.’” And Dorothy Thompson… August 23, 2017 in Notes from the Field, Such Mad Fun. 1930s Arizona History Bradshaw Crandell Claude G. Putnam Cosmopolitan Magazine 1930s Daysie Hall Dick Wick Hall James Sutton Jane Hall Manhattan Beach Military Justice Poplar Springs R. Randolph Hicks Robin Cutler Rosa Sutton Rose Parker Rose Sutton Hicks Salome Salome Arizona Salome Sun Such Mad Fun The Laughing Desert Thomas Masson Yuma County History Proudly powered by WordPress Theme: Expound.
cc/2021-04/en_middle_0086.json.gz/line10370
__label__wiki
0.532593
0.532593
Autonomous Vehicle Regulations 2016-2017 Posted on June 30, 2018 by Paul Calhoun I talked some about the 2016 NHTSA policy overview in part 3 of the collision series. They were positive towards the industry, but also covered all the regulatory tools that NHTSA had and would need to have going forward to keep the roads safe as cars transition from human controlled to fully automatic driving. In 2017 the updated NHTSA guidelines came out and looked pretty good for all AV makers, the smaller ones especially. To start off with, the changes were minimal. There were a few more paragraphs in the guidance section and the phrasing was marginally more industry friendly, but ultimately very little changed year-to-year in the industry guidance section. The important changes came in other sections. In the model State policy, the change between 2016 and 2017 was quite noticeable. Instead of being about ‘consistency’ of regulations across multiple States, there was a much more AV friendly approach. The 2017 document has phrases like “States should not place unnecessary burdens on competition and innovation..” and a very interesting sentence: For example, no data suggests that experience in vehicle manufacturing is an indicator of the ability to safely test or deploy vehicle technology. All entities that meet Federal and State law prerequisites for testing or deployment should have the ability to operate in the State 2017 was indeed quite a good year for the startups working on AV technology. There was also a subtle removal of sections suggesting NHTSA would help States with their legislative policymaking, though since the entire document was streamlined that may have just been removed to simplify things. The removal of almost all of the ‘law enforcement’ section and its mentions of distracted driving and how States should consider regulations dealing with inattentive drivers of level 3 and below vehicles is a strong indication of the new Department of Transportation’s priorities. The biggest difference year-to-year was the document’s handling of regulatory tools. In 2016 there were 20 pages about NHTSA procedures and how they affected AVs, and another 14 pages about what new tools they would need from Congress in order to effectively regulate. In 2017, there was only a single block at the beginning (less than half a page) stating NHTSA has ‘broad enforcement authority.’ The lack of any mention of current regulatory tools or what tools may be necessary for NHTSA to regulate AVs effectively is suggestive that the new administration does not feel that enforcement and regulation are necessary. Stateside, most States were maintaining either a friendly or hands-off approach. California required that the legislature be informed if manufacturers requested a license to test a level 4 or above AV, but also allocated funds for connected infrastructure. Connecticut actually mandated that at least 4 municipalities start testing AVs. Illinois headed off attempts by cities and towns to regulate AVs. Nevada did the same and even allowed testing of level 4+ AVs. North Carolina abolished the requirement for a driver’s license in level 4+ AVs. Texas abolished the requirement that an operator be present inside a level 4+ AV. New York was one of the only places where things didn’t go so well. Testing was allowed, but required all tests and demonstrations be conducted with the supervision of the State Police. Luckily, no one has yet defined ‘test’ to include the data collection done by Tesla vehicles. Autonomous Car Accidents and Policy Implications – Special Lawsuit Edition Welcome to Autonomous Car Accidents and Policy Implications. Today we look less at a collision and more at the fallout of some of the decisions that have likely caused them. Pausing for a moment between the best known Tesla collision of 2016 and the collisions in 2017, we examine an attempted class-action lawsuit which did a bit of financial damage but barely scratched Tesla’s publicity machine. When we left off, there had been a Tesla fatality which was ruled driver error. Investigations had been completed and Tesla had rolled out an update which made it so that drivers had to keep their hands on the wheel more consistently and if they didn’t, the car would have to be completely stopped before it would allow the driver to turn Autopilot back on. So far, so good. The problem for Tesla was that while regulators were effectively unable to act (lacking the authority to command) and investigators always returned ‘driver at fault’ (since all the warnings were in the Tesla manual), the customers were beginning to get restive. During the interim period between the problems being identified and new software and hardware being introduced to fix it, Tesla had been forced to reduce the maximum velocity for Autopilot to 45 mph in January of 2017 which was raised incrementally back to 80 mph in March. These tweaks seemed to be the last straw for the owners of Teslas, who were starting to feel less like owners of cars and more like unpaid experimental testers – which is pretty much what they were. Tesla runs its software division like any Agile software company. It tests new software on the users’ machines, sees how it works, and tweaks based on feedback. The price of being an early adopter is that tweaks are usually more extensive, and often the system goes into a degraded state while safety critical updates are being tested. More on that idea when we discuss Uber’s AV, and its ‘free’ rides. The lawsuit was an attempt to form a class-action alleging that owners and lessees of Tesla cars had paid a premium price for a car with AV capabilities and that the capabilities in question were either nonfunctional or dangerous. It should be noted that the advertisement they used as an example was for HW2, meaning that their complaint was for cars manufactured after the one used in the fatalities explored in my previous post. The lawsuit focused on the $5000 cost of unlocking the Autopilot software pre-order, or $6000 post-order. The gist was that they were accusing Tesla of deceptive advertising. They claimed they’d have version 2 Autopilot (AP2) ready by the end of 2016 when they knew they couldn’t. Further allegations were that the software they pushed was dangerous and far less capable than version 1, which they covered for by having customers test driving version 1 Autopilot cars and then telling the customers that AP2 would be much better than the experience they had. Let’s go allegation by allegation now. First allegation: AP2 at the time of rollout was dangerous. They cited several tech journalists who owned one or more AP2 Teslas which swerved unexpectedly, merged across yellow lines, braked hard at bridges mistaking them for obstacles, and didn’t brake at all at red lights. It’s unclear whether these examples were cherry picked or indicative of the full experience (let’s face it, an article showing how bad a Tesla is will get more views than one showing a good experience). The allegation that there were difficulties with the software of AP2 was supported in the lawsuit by the fact that only 2 of the 8 cameras were currently being used by the software, and that AP2 had been forced to start from scratch because Tesla had lost the rights to AP1. Quoting from the lawsuit which quoted from an article at the time: Mobileye, the Israeli company that supplied the original camera and software for Autopilot, cited safety concerns when it pulled out of its partnership with Tesla. The company’s chief technology officer told Reuters that Tesla was “pushing the envelope in terms of safety … [Autopilot] is not designed to cover all possible crash situations in a safe manner.” Tesla says the collaboration ended for commercial reasons. They also cited numerous incidents and issues that the plaintiffs themselves had, including lack of collision warning, veering into the wrong lane even at low speeds, and braking with no warning or apparent cause. Second allegation: The marketing materials and practices were intentionally deceptive. This is a harder one to prove and relied on the plaintiffs’ own interpretation of their experiences. The lawsuit, then, would have to demonstrate that any reasonable person would believe as the plaintiffs did: That the AP2 update would come as one rollout in December 2016 with full functionality in a single package. That AP2 was built on AP1s software rather than a replacement from scratch. That when activated, AP2 would be safe to use in the intended environment. That (in the case of one plaintiff) this functionality would be a fully functional AV (level 3 or above) Third allegation: Tesla violated the Motor Vehicle Safety Act. The concept being that an AV system with demonstrated and consistent faults constitute a safety defect under the Act. Tesla was never charged under the Act and the author of this blog believes that this is due to the fact that at the time of the lawsuit there was no regulatory body empowered to oversee the software portion of AVs. Defects had to impact a car being driven by a human or else they were outside the remit of the regulators. That’s why all the ‘driver error’ results from investigations have effectively cleared automakers of liability. Tesla, as might be expected, refuted all claims at the time. Their defense was, in brief, that they had not promised the full package by December 2016 but to start updates at that time. They claimed that the safety concerns were sensationalized, and that several of the functionalities mentioned as missing had in fact been provided. They said that the systems were a beta test, and that drivers should not ‘abdicate responsibility’ to the Autopilot. This year Tesla settled for $5.4M to all owners of AP2 cars, with payouts ranging from $280 to $20 depending on how long the drivers had owned their vehicle. The settlement was based on how long the owners of the cars had waited for functions that were delayed, and the judge and attorneys said that they were confident that by September 2017, all of the main functions had been implemented. Tesla continues to claim that there was no wrongdoing in their practices, and the settlement effectively ends any private investigations into the matter. Here’s my take: This wasn’t about deceptive advertising, it was about the boundaries of live testing of software functions. As mentioned earlier in this post, it’s a common practice to incrementally release software, and for live user experience to contribute to testing the effectiveness of the software. Machine Learning algorithms require enormous data sets to function well, so there’s an added incentive to roll out AP patches and functions even if they’re not quite ready yet, because it feeds the algorithm what it needs to work well in the future. What’s happening here, however, is that this practice isn’t being used in a web app or a program on a personal computer, but instead in a safety critical system. If software on your computer has a bug or something isn’t working quite right, you send a complaint or a log to the developer and they use that information in their next patch to fix it. This lawsuit was to try to say ‘not here.’ That live testing to fuel incremental and algorithmic software growth won’t work. Cars are too dangerous. The lawsuit was a cry to the authorities to do something because the average consumer wasn’t technically aware enough to understand what Tesla was saying, and that the practice of buying software that will be beta tested by the early adopters was not the right model for this industry. Consumers who buy alpha and betas of games on Steam expect issues and are there to provide feedback on them, but there isn’t an expectation like that in the car industry. That was what it was really about, and it failed. This is, long term, probably a good thing. It’s also very much a short term bad thing. That’s technology, though. The problem is that it’s expensive to exhaustively test software that’s this complex, especially software that’s heavily based on current ML algorithms. Tesla hasn’t got the deep pockets of Google (which has been testing its AVs since before Tesla Autopilot version 1 was released, and won’t be starting its AV taxi service until 2019) or the established consumer base of a big automaker (I’ll be covering Cadillac’s new AV in a future post). That’s why Tesla and Uber have to use the classical Agile incremental approach to software updates. They both rely on automotive innovation to function and can neither afford to look stale by letting another company (GM to Tesla, Google to Uber) introduce their product first, nor sink millions into comprehensive testing and data collection which could take years and still leave them with fewer functions. The message from this settlement is clear but impermanent: You’re buying your car from a silicon valley style innovation engine. Expect them to act like one. All new functions are beta, all users are testers. You’re getting it early and that prestige comes with a price: it’s your data that will be used to build the next version and the one after that, with the older functions becoming stabler and newer functions becoming possible. Eyes forward and hands on wheel, because if something happens, it’s only a level 2 AV and you’d better be ready to take over. Speaking of expectations and knowledge, join me next time for a collision which strained the argument of ‘unsophisticated and ignorant’ driver error further than ever.
cc/2021-04/en_middle_0086.json.gz/line10383
__label__wiki
0.766151
0.766151
Collections Short read The Papers of Peter Good: An Accrual to the Dave Cunliffe Archive by Jessica Smith Bruce Wilkinson writes: Dave Cunliffe spent much of the early 1970s in Blackburn’s alternative bookshop Amamus. Increasingly a magnet for much of the town’s underground activity it was here that he met anarchist Peter Good recently arrived from a Welsh commune. Good painstakingly hand-printed prankster magazine Anarchism Lancastrium (AL) a few miles away in Whalley from where he walked to sell his publication. According to Mike Waite’s paper “Remembering Anarchism Lancastrium – Notes on ‘the Cult Seventies Prankster’ 1974-1981” (2002) Cunliffe contributed a range of material to the tract under a variety of aliases and, using insider knowledge from Arthur Moyse, spread salacious gossip about political activists making as much mischief as possible. Printed on recycled newspaper, cardboard boxes and anything else Good could find, AL often came with pull-out extras including anti-fascist beermats and revolutionary stickers (‘Too many chiefs not enough anarchists’) which he asked readers to distribute. A copy of the Cunningham Amendment in the Peter Good Papers Anarchism Lancastrium attacked the politics of the then prevalent neo-fascist National Front and other right-wing groups but Good attracted flack for poking fun at the language and attitudes of the left, satirising the lack of humour within the militancy of the period. Articles lampooning the dialectics of socialist collectives either went completely over the heads of their intended targets or caused outrage amongst those who spotted the clever in-jokes and gags. Good and Cunliffe’s habit of turning up to political assemblies in a variety of bizarre costumes and AL’s use of sexual language eventually got them both in trouble, Moss Side Printers rejecting the material, alternative bookshops refusing to sell it and the pair often banned from the very events they advertised in their publications. Both Cunliffe and Good worked as part-time nurses within a group of Ribble Valley psychiatric hospitals known as the Langho Colony. Peter Good received a doctorate writing about alternative forms of mental health treatment, later turning his Psychiatry PhD research into Language for Those Who Have Nothing (Springer, 2001). He became briefly infamous for his involvement in an industrial dispute at Calderstones hospital where he worked as a qualified nurse. Unexpectedly elected as the institution’s union representative, Good was outraged that unqualified nursing assistants often found themselves in charge of two or sometimes three wards throughout the night. An elderly patient died in a pool of vomited blood, huddled around a toilet bowl, while a young girl in the throes of an epileptic seizure trapped her arm behind a radiator and suffered severe burns. Unsuccessfully raising the understaffing issue with the local health authority, Good balloted for industrial action, returning a 91% vote in favour but, unwilling to conduct a complete walkout for fear of further harming patients, the nurses worked to rule which management merely ignored. Out of desperation Good organised a sit-in of a hospital wing containing 46 residents, lasting 13 days, gaining national media attention and forcing the authorities into an inquiry at which promises were made about future employment levels (later reneged upon). Good was subsequently sacked after plainclothes policemen visited the hospital and he was effectively blacklisted from the NHS, taking up bus driving in order to feed his family. A copy of the Cunningham Amendment in the papers of Peter Good The Cunningham Amendment is Good’s beautiful follow-up to AL, started after moving across the Pennines to Bradford and then continued from his current home in Norfolk. Printed with an ancient salvaged letterpress machine on found objects including toilet paper, cheque books and lottery tickets it now runs to more than 14 volumes lasting over thirty years, continuing Good’s anarchic satire. Cunliffe and Good maintain a strong friendship through written correspondence reflected by missives of lively badinage shared between two provocateurs always on the lookout for trouble. Peter has now kindly donated his letters to the Dave Cunliffe Archive at the John Rylands Library which, along with full sets of Good’s publications, represents a wonderful history of British anarchism since the 1960s. TagsAnarchism Lancastrium • Archives • Cataloguing • Dave Cunliffe • Peter Good • Special Collections • The Cunningham Amendment • zines About Jessica Smith Creative Arts Archivist at the John Rylands Library 1 comment on “The Papers of Peter Good: An Accrual to the Dave Cunliffe Archive” naib2 Reblogged this on Lives of Letters and commented: News of acquisitions at the Rylands that include letters and a zine with a postage stamp on the front.
cc/2021-04/en_middle_0086.json.gz/line10384
__label__wiki
0.776075
0.776075
Men's Basketball Powers Past USMMA in Season-Opening Win The ball was moving, and shots were falling as four Cadets scored in double-figures to help the Army West Point Men's Basketball team claim an 80-43 win in its 2019-20 season opener against USMMA at Christl Arena on Friday night. John Scully led the way with a career night as the yearling sharpshooter knocked down six 3-pointers and finished with a career-best 20 points for the Black Knights (1-1). In his first game on the banks of the Hudson, Chris Mann put together a stellar outing, putting up 16 points on 6-of-9 shooting to pair with nine boards. Tommy Funk and Lonnie Grayson got in on the scoring action as well after tallying 11 and 10, respectively. Funk was 4-of-4 from the field and reeled in seven boards to go with four assists and three steals against the Mariners (0-0). Read more. Men's Rugby Finishes Fall Season Victorious Suppiah Garners Academic All-League Accolades
cc/2021-04/en_middle_0086.json.gz/line10385
__label__wiki
0.615185
0.615185
humanity+ Media, Nitish Kannan on October 28, 2015 The Real Scorpion My first impression of the real Scorpion (Walter O'Brien) was nothing at all like the one portrayed on the hit CBS show of the same name, now in its second season. When you speak with or meet the real life Walter O'Brien as I did when I spotted him at the Armani Store in Santa Monica he came off as a very humble and soft spoken nice guy. O'Brien, whose life the hit action adventure/Drama TV show Scorpion is based on, was born in Wexford Ireland and went to school in Kilkenny Ireland. Walter is understood to have an IQ of 197 and holds an Extraordinary Ability EB-1-1 Visa. Previous holders of such a visa include Albert Einstein and Winston Churchill. I bet Walter O'Brien never dreamed as a kid from Kilkenny Ireland that he would one day be looked up to as a national hero thwarting cyber attacks against America and inspiring countless children and millennial's to study STEM (Science, technology, engineering, and Math). Coming from humble beginnings in Ireland and starting ScorpionComputerServices.com at the age of 13 as a hacker, Walter O'Brien would never have dreamed of becoming the real life version of Tony Stark meets MacGuyver meets the A-Team. Both media and fans wonder how much of the show is real vs what is Hollywood magic, being technical myself and being fascinated with Artificial Intelligence I decided to ask Walter if I could do a deeper dive inside the real Scorpion and see for myself. Keeping in mind that the show like all shows must be entertaining in order to attract viewers but it's also inspiring millions of kids to follow Walters footsteps and study computer science to become tech savvy and like James Bond. Scorpion if he did nothing else in his life has benefited a nation of kids in teaching them that being different is ok, being smart is cool and every problem has solution. I've learned over my several conversations with Walter O'Brien and seeing his work first hand is that he is indeed a genius and is very sincere about doing the greater good for the world. Over a recent hour and half phone call and interview I had exclusively with Walter O'Brien, I asked Walter, who's a very successful businessman and the CEO of Scorpion Computer Services why even make a TV show. Walter responded, "Well if you write a book no one reads anymore, and if you make a movie, people watch it and forget it. But if you make a TV show, kids will watch how smart people save the world every week and you can put the word out for years." The show exemplifies how scientists and smart people in general are today's heroes running and saving the world from balancing our electric grid to designing hospital backup systems to the people who ensure our Bank ATMs are operational. So, Walter O'Brien, contacted Scott Manson who is the COO for Scooter Braun, (mega agent responsible for discovering the likes of Justin Bieber and many more) and an all star team was assembled and the TV show Scorpion was born. The parallels to the show and the real Scorpion are pretty astonishing because Walter's company is an orphanage for individuals with high IQ and low EQ to apply their skills to save lives. This is where it gets interesting. So how does Scorpion work? Walter, has a degree in computer science and Artificial intelligence. Intelligence, according to futurists like Ray Kurzweil is a force stronger than physics and if you apply AI to huge problems you can solve them very quickly. Walter's life today solving major problems for the Nation's top companies and Government Agencies relies on an Artificial Intelligence engine he helped develop himself (I personally saw the source code history and his initials are in the code header as the sole author) over many years called ScenGen. It stands for Scenario Generator which essentially has been used for everything from predicting attacks on US military bases to finding terrorists and many other classified cases. I do believe ScenGen is the most profound AI technology used by Walter O'Brien and Scorpion's secret sauce to solving major problems. It took over four years to write according to Walter and from my exclusive look and demo into the AI technology I can vouch for and say it's 100% real and is something only a Tony Stark would have access to. What I find to be most profound about the ScenGen software is its ability to be applied to almost any field to solve a problem. Walter told me via a demo of the software itself that it is most analogous to two chess computers playing each other and thus exhausting every possible move. Walter maintains "imagine that rules of chess could be rewritten to represent any situation like a game, well ScenGen could now try every move to crack passwords, test security for banks, financial institutions, utilities, mutual fund reporting and thousands of other apps". ScenGen was used on base to simulate the war games for Afghanistan. In under two seconds it ran every possible scenario of attack on a US base in Afghanistan. For example, ScenGen predicted that the water supply to the base could be poisoned by Arsenic and Walter and his team presented this to the Navy admirals. ScenGen accurately found a method of potential attack human could have, and saved over 400 lives. This is just one of a number of ScenGen apps Walter demoed to me and ScenGen in the wrong hands could be very dangerous. Walter demonstrated live how it could do 250 years of thinking every 90 minutes to even be applied to crack passwords, hacking and finding errors in software and reducing them by 99%. This is the secret sauce that's licensed at over $50k a user to private vetted applications like for DOD. Walter has diversified his business with a new business called ConceigeUp.com aptly named because as your problems get harder you need them moved up the value chain. This is where ScenGen is used to grant "any funded wish". Case and point, When a family in Beverly Hills had their daughter captured as an activist in Libya, Walter granted their funded wish and partnered with a private military group to plan a forced extraction and brought their daughter home in 48 hours. This is straight up like something you see on TV but for real. But Walter also loves solving fun and trivial wishes like visiting a young fan at his school for career day. Why apply geniuses to non serious issues, because according to Walter you gotta have some fun and not just solve serious cases each day. With ConciergeUp.com, Walter helps people pick winning race horses based on their DNA, to a case where a Dad didn't want his son to marry a gold digger and asked that they be broken up without knowing they were interfered with. The gold digger even got banned for 10 years from the USA and they didn't need an expensive divorce settlement. The more I get to know Walter O'Brien's world the more I've become fascinated with Geniuses. I think deep down Walter O'Brien is a benevolent genius who just likes to have fun solving interesting problems. Walter is a human ScenGen and weighs all possibilities carefully in life whether the question is which car he should buy or stopping a terrorist in Afghanistan. Walter O'Brien is the real life Tony Stark and I'm just thankful he's on our side. In this week's episode, Team Scorpion goes undercover on the "Super Fun Guy" movie set in Kazakstan in order to disable a soviet era nuclear missile being sold by terrorists, Nitish Kannan is the CEO and Founder at www.circlepluspay.com, the first bitcoin and credit card point of sale app available in 18 countries. He is a well known Futurist, author and gadget junkie.
cc/2021-04/en_middle_0086.json.gz/line10390
__label__cc
0.624427
0.375573
By A on June 7, 2020 • ( Leave a comment ) Sex Apartment Season 1 Part-37 In the last episode Sowmya had finally received her first task from the blackmailer. He had asked her to go and have sex with the only person in the building who she didn’t like – Borah. At first she felt disgusted with the idea, but then started making her resolution stronger as she had no other choice but that. And then started thinking about an excuse, and waited for the night. In the meantime, Kiran had started enjoying, in Gautam’s absence, in Kolkata. The visit to the counselor turned out to be a profitable one. He had rather effective ways of curing her feelings than simply talking and motivating her. And after that one visit, she had felt rejuvenated and all those guilt and prangs disappeared. And once again, she felt a strong desire for Reddy, and an equally strong desire for the doctor too. While Kiran was busy exploiting her husband’s absence, Gautam too wasn’t far behind. That evening, back in the city, he was waiting for Divya – the girl he had met in the train on his way back. They had exchanged numbers before they had parted that day, and then kept in contact almost daily. Finally, today, she was coming to meet him at his flat, and spend the night over. Gautam had returned home early that day, and was waiting eagerly for her. Sharp at six, the bell rang and he went to answer the door. It was Divya, she looked stunning – she was wearing a pink sleeveless blouse, and a brown skirt with intricate thread work in pink. She must be wearing a push-up bra inside, as her big breasts looked enormous. Her curly hairs were left untied, and she looked a couple of inches taller in that golden heels. “Nice house, so comfortable” she said as she entered inside. Gautam locked the main door and came back at her side. They were at the living cum dining area – “so comfortable and cozy” she said. “It’s nothing, come to the bedroom, that more comfortable than this” Gautam added smilingly. Both went inside the bedroom, it was neat and clean – the bed was nicely done, the sheets all so neatly spread, she liked it a lot. “Much better than the AC coupe, I must say” remarked Divya. Gautam smiled as he walked close up to her. He touched her face with his two hands, as if he was going to kiss her. Then he ran them down her slender neck and then over her breasts. “Shall I get you anything?” he asked. Divya looked at his eyes, “You have already got what I want” and then she placed her hand behind his head and pulled him closer, and the both started kissing each other. She then held her head with both of her hands and continued smooching him. He too put his hands around her waist, holding her close to his body. They already started using their tongue and kissed and sucked each other’s lips, and played with each other’s tongue. Often they would look back at each other’s eyes and the passion in them would drive them back to their lips. After sometime, he pulled her more and hugged her tightly, and started kissing her slender neck. Divya in the meantime, got hold of his t-shirt and pulled it off his body. And once out of it, she started kissing on her bare body – his neck, shoulders, chest. She left a wet trail wherever she kissed him. She was a real slut, and was getting wild at it too. She stuck her tongue out and started licking all over his body. She licked his man-nipples, and then licked his lips and tongue nicely too. The scent and the taste of his sweat drove her mad. Gautam held her tightly too, though she was still dressed yet he squeezed her ass from over that skirt. Slowly then he lifted her skirt up and put his hand on the bare skin of her ass – squeezing and occasionally slapping it lightly. Divya felt good as she bit on his ears and then pushed her tongue in his ears to lick it. “Ummmmmmmmm” and both moaned in pleasure. But not wasting any more time, Divya immediately unhooked his pants. Gautam was wearing a pair of jeans. And she got it off easily, along with his underwears, making him completely naked. His cock was already erect and throbbing for attention. Divya looked at it and then looked up at Gautam with a naughty smile. She had already taken it in her hands and started stroking it. She then licked the head with her tongue once, and then took it in her mouth. “Uhhhhmmmmmm” she grunted as she slowly started sucking it. She pulled the foreskin back with her hands and started sucking the delicate pink head of his cock. Gautam was still standing, and she was knelt in front of him. For a moment she left the cock, and took her top off. She was wearing a nice mauve colored bra, which was much smaller than her breasts, so that her breasts popped out like two footballs. Throwing the top aside, once again she concentrated back at his cock. She held it back in her hands and started sucking it nicely. Gautam put his hand on her hairs. Running them gently through them, and caressing them gently and lovingly. “Good Girl…” he said as she sucked him skillfully. Divya looked up and smiled, but she never let go his cock. She continued sucking it and stroking it together, making him moan and make more remarks. Gautam bent slightly and reached down to touch her breasts. He pushed his palm inside the cups of one of the sides, and felt her firm and round breast nicely. Divya too, sometimes put his cock entirely in her mouth, sometimes just sucked at the head. Sometimes she stroked it with her hands, and licked at any side of it. “Uuuuuuuuu… that’s so nice… good girl…” he remarked as he continued enjoying the nice treatment. And then he held her head tightly and started banging his cock, in and out of her mouth. She too didn’t protested, rather cooperated by opening her mouth wider so that he can fuck her mouth unobstructed. “Sssssssssssssssssssssss…. Mmmmmmm… Ohhhh… My Goddddddddddddd…. Ohhhh it feels so niceeeee….” Both were moaning together, as both enjoyed what they were doing. They continued like that for some ten more minutes. Gautam was moaning hard, and Divya was really making it difficult for him to control himself. “Mmmmmmm… ahhhhh… ohhhhh…” he continued moaning hard, as if his life depended on it. And then soon he reached the verge of his climax. “Pleasssssseee… pleassssssssseeeee Divya… please stoooopppp… pleassssssss… or I will come… pleassssss Divyaaaa….” He moaned, and begged for her to stop. He didn’t want to come so quickly. Last time, in the train, they were not able to have a complete fun, and were always afraid if someone might come. So today, he wanted to make most of the opportunity. Divya too, realizing his intentions, stopped. And then she quickly stood up, and then Gautam helped her to strip. She took off her skirt, panties, and bra quickly, and got naked. Gautam was already nude, and so they didn’t waste any more time, and got down on the bed. Gautam put her on the bed, and started kissing her. But they were already aroused enough and didn’t need much foreplay. He held her legs and spread them wide. Then he lifted them up and wider so that he can dive into her cunt with ease. “Ahhhhh… Ohhhhhh…” Divya started moaning as he put his hand on her cunt, and then gently started rubbing her pussy. “Ooo yeaaahhhhhh” she closed her eyes, feeling the pleasure run down her body. She kept her legs lifted up in the air, and wide enough for him to rub her cunt thoroughly. He started rubbing it gently and then slowly kept increasing his pace. Soon he was rubbing her cunt very hard, and she was moaning equally harder. She put her hands above her head, in excitement, and grabbed the headrest of the bed. Gautam was rubbing her cunt so hard that he had brought her close to an orgasm. Divya grabbed the headrest of the bed tightly and closed her eyes. “Ohhhhh… ohhhhh fuck…. Ohhhhhh… ohhhh yeasshhhhhhhhh” she continued moaning as he continued rubbing her cunt wet. It was already very wet and had started leaking her pre-orgasm juices. But she was rapidly getting closer to the orgasm too. “Sssssss… hmmmmmm… hmmmmmm” Gautam grunted as he continued rubbing her cunt with all the power he had, and she too moaned hard like the bitch she was, all ready to come. “Yeaaaaa… yeaaaaa… yeaaaaa… o yeaaaa.a.. ahhhhhhhhhhhh” she shouted loudly and then started coming hard. Gautam paused for a moment, her cunt had become really wet and juice started oozing out of it. She was squirting like a complete bitch. The bed sheet too had become wet. Gautam looked at her and smiled. She too, looked back at smiled, “Come on baby… give me your cock now” she said. Though she was coming already, yet she felt hungry for his cock. Gautam smiled, his cock was already throbbing and aching to dive inside the leaking little hole. And when Divya invited him, he was more than ready. He quickly took position between her legs. He was kneeling between her legs, which were at both sides of his body. Her cunt was wide open and completely wet, and when he put his cock at the opening of her pussy, it slid in nicely. “Ohhhhhhhhhhhhhhhhh” she moaned as her body adjusted to the initial pain. Gautam pushed his cock all the way inside, and her cunt being so wet, it went in rather easily. Gautam paused to gather his balance, and then started banging her with his cock this time. “Yeaaaaa… yeaaaa… yeaaaa…” and once again, the bitch started moaning. Gautam bent forward to grab her big and large breasts and started pressing them hard. “Mmmmmmmmm…” she moaned, feeling such a potent mix of pain and pleasure. She put one of her hand on her cunt too. And while Gautam banged her well with his cock, she continued rubbing her pussy with her hand. “O yeaaaa… o yeaaaa… o yeaaaa… o yeaaaaaa” she moaned, as she continued rubbing herself, while Gautam banged her too. And soon she was at the verge of her second orgasm again. “Ahhhhh… ahhhhh… ahhhhh… ahhhhh.. ahhhh… ahhhhh…” she moaned as she discretely started coming again. Gautam was banging her so hard that within a few minutes she had already come twice. After the second orgasm, she didn’t rub herself any longer, but Gautam continued banging her with the same vigor. Gautam was awed to see such a passion in her. She had shown the same in the train as well, but that was a different circumstance. Here at his home, in the comfort of full privacy, she had turned out to be a complete slut. “Oh… you are such a bitch… you have already came twice… and we haven’t yet completed” he said, keeping up the pace at which he had started fucking her. And then suddenly he withdrew his cock off her, “Come bitch, get on to your four, I want to fuck you like the bitch you are” he said, asking her to get on to a doggy position. Divya obliged rather happily, and she quickly got on to her knees and then bent forward on her arms. Her large, yet tight breasts hung crazily as Gautam imposed himself on her. She spread her legs slightly and Gautam entered her from behind. Then he gradually bent forward and grabbed one of her hanging breasts and started having another go at her. “Before I am done today, I want to fuck you all possible way” he said as he gradually increased the pace of his thrusts. “Oh yeaaaa… I am all yours tonight, please fuck me in all ways you can think of” she said, and her cunt once again started getting wet, and once again she was getting near to yet another orgasm, the crazy slut. While Gautam was busy fucking the sex-crazed bitch – Divya, at his ground floor apartment, at the same time, at the top floor of the building, Sowmya was getting ready for her first task. She had thought about it for the entire day, and then had decided that it was much better to fuck that moron – Borah, discreetly, rather than being tainted forever. But the most difficult part was to think how to approach him, especially after what had happened between the two, in that first evening. On that first night in this building, she had mistaken Borah with Reddy and had gone with him to the park. She had even sucked him unknowingly and it was after that that she had discovered who it was, and had then suddenly felt disgusted and ran away. Since that day, she had tried to avoid both Borah and his partner Reddy. And even though she had felt attracted to Reddy, but that first evening goof up made her avoid him as well. And now, she was supposed to go and have sex with Borah. And she thought it over and over throughout the day. What shall she say, how shall she approach him, she continued thinking about it over and over, and finally when it was time, she almost froze with anxiety. Then later, she took a deep breath, it was almost 8 pm and Borah must be back by then. Reddy would be in the gym until 10, so it gave her a nice window of more than an hour to get her job done. And as the time approached, she started feeling confident. All those anxiousness and nervousness from too much thinking was slowly getting over. She got dressed in a nice, slutty, red outfit. It was a single piece dress which complimented her figure nicely. The top simply covered her breasts and went around her neck where the two sides were tied together. And at the bottom it hung up to her thighs, nicely clinging on to her body. Aarushi, her sister, hadn’t yet returned from the college, and her mother, Mrs. Nair had gone out for some urgent work. So there was no one to question either, and so she slipped out of the house, shortly after eight, and then climbed two floors below to the second floor apartment. She took a deep breath and then rang the bell, hoping that Borah was at home, and Reddy was still in the gym. Reddy was indeed still in the gym, as planned, and Borah was all alone. He had returned early that day, and was eagerly waiting for the moment. And when the bell finally rang, he felt his cock throb in excitement. Tagged as: bitch, doggy style, slut The Lovers Part-3 Bitch Ramya Part-4
cc/2021-04/en_middle_0086.json.gz/line10394
__label__wiki
0.813837
0.813837
In A Midsummer Night’s Dream, residents of Athens mix with fairies from a local forest, with comic results. In the city,… Theseus, duke of Athens, is planning the festivities for his upcoming wedding to the newly captured Amazon, Hippolyta. Egeus arrives… Six Athenian tradesmen decide to put on a play, called “Pyramus and Thisbe,” for Theseus and Hippolyta’s wedding. Pyramus will… Oberon and Titania, king and queen of the fairies, quarrel over possession of a young Indian boy. Oberon orders Robin… Oberon anoints Titania’s eyes as she sleeps. A weary Lysander and Hermia enter and fall asleep nearby. Robin, thinking he… The tradesmen meet in the woods to rehearse. Robin Goodfellow happens upon them and transforms Bottom’s head into that of… Robin Goodfellow reports to Oberon about Titania and Bottom. When Demetrius enters wooing Hermia, Oberon discovers that Robin has anointed… Titania and her attendants pamper Bottom, who falls asleep with her. Oberon, watching them, tells Robin that Titania has given… The tradesmen regret, for their own sakes and for Bottom’s, the loss of their opportunity to perform the play, since… Theseus dismisses as imaginary the lovers’ account of their night’s experience, and then chooses “Pyramus and Thisbe” for the night’s… JUMP TO: About Shakespeare’s <em>A Midsummer Night’s Dream</em> Reading Shakespeare’s Language: <em>A Midsummer Night’s Dream</em> An Introduction to this Text Characters in the Play Entire Play Act 1, scene 1 Act 1, scene 2 Act 2, scene 1 Act 2, scene 2 Act 3, scene 1 Act 3, scene 2 Act 4, scene 1 Act 4, scene 2 Act 5, scene 1 Textual Notes <em>A Midsummer Night’s Dream</em>: A Modern Perspective Further Reading Download <em>A Midsummer Night's Dream</em> Line: Hermia four lovers Theseus, duke of Athens Hippolyta, queen of the Amazons Egeus, father to Hermia Philostrate, master of the revels to Theseus Nick Bottom, weaver Peter Quince, carpenter Francis Flute, bellows-mender Tom Snout, tinker Snug, joiner Robin Starveling, tailor Oberon, king of the Fairies Titania, queen of the Fairies Robin Goodfellow, a “puck,” or hobgoblin, in Oberon’s service A Fairy, in the service of Titania Peaseblossom Mustardseed fairies attending upon Titania Lords and Attendants on Theseus and Hippolyta Other Fairies in the trains of Titania and Oberon Next: Act 1, scene 1→
cc/2021-04/en_middle_0086.json.gz/line10396
__label__wiki
0.530847
0.530847
Award Winners & Nominees Homes & Design Kid's Non-Fiction Young Adult & Teenage The Raven Boys (The Raven Cycle #1) Author(s): Maggie Stiefvater FORMAT: UNABRIDGED 10 CDS Legend holds that Glendower, a vanished Welsh king, sleeps beneath the hills until he's needed. The first person to find him will be granted a wish - either by seeing him open his eyes, or by cutting out his heart. Gansey has it all - family money, a car, time for extracurriculars and friends - but he's always loved the tales of sleeping kings. He thinks he's found one too, or at least the area where one might be: in the town of Henrietta, VA. And the best way to be there is to attend prestigious Aglionby Academy for Boys. Blue is the daughter of the town psychic in Henrietta, Virginia, but is too practical to believe in things like spirits or true love. Her policy is to stay away from Aglionby boys...but it may be that one in particular can change her mind about magic, and maybe even love. e "Stiefvater's novel, inspired by Manx, Irish, and Scottish legends of beautiful but deadly fairy horses that emerge from the sea each autumn, begins rivetingly and gets better and better . . . all the way, in fact, to best." -Horn Book Review, Starred Review e "Masterful...like nothing else out there now." -Kirkus Reviews, Starred Review e "A study of courage and loyalty tested...utterly compelling." -Publishers Weekly, Starred Review e "A book with cross-appeal to lovers of fantasy, horse stories, romance, and action-adventure, this seems to have a shot at being a YA blockbuster." -Booklist, Starred Review e "Up-On the sea-battered and wind-swept isle of Thisby, fall brings the famed and feared capaill uisce, or water horses, and with them, death . . . The author takes great liberties with the Celtic myth, but the result is marvelous." -School Library Journal, Starred Review "Stiefvater not only steps out of the young adult fantasy box with "The Scorpio Races" but crushes it with pounding hooves.... If "The Scorpio Races" sounds like nothing you've ever read, that's because it is." -The New York Times Book Review "Tactile world-building, an island full of compelling characters, and the budding romance between Sean and Puck all make for an unforgettable book that's quite unlike anything else out there." -NPR Books "With this beautifully executed drama, Stiefvater has established herself as one of the finest YA novelists writing today." -Entertainment Weekly "Tense, atmospheric, and utterly original." -People Magazine Maggie Stiefvater is the #1 NEW YORK TIMES bestselling author of the novels SHIVER, LINGER, FOREVER, and THE SCORPIO RACES. She is also the author of LAMENT: THE FAERIE QUEEN'S DECEPTION and BALLAD: A GATHERING OF FAERIE. She lives in Virginia with her husband and their two children. You can visit her online at www.maggiestiefvater.com. Publisher : Scholastic, Incorporated Imprint : Scholastic, Incorporated Author : Maggie Stiefvater Shop 12 Mitcham Square | 119 Belair Road | Torrens Park SA 5062 email : mostlybooks@internode.on.net | phone : 08 8373 5190 ABN # 98 123 155 813
cc/2021-04/en_middle_0086.json.gz/line10401
__label__cc
0.749421
0.250579
Al Qaeda magazine encourages Boston-style bombings By Ashley Killough and Paul Cruickshank In its upcoming issue, the al Qaeda-backed magazine Inspire praises the alleged Boston Marathon bombers as heroes and encourages readers in the United States to follow their example. According to an English copy of the magazine obtained by Flashpoint Partners, an American group tracking jihadist websites, the issue also has a section heralding the killing of a British soldier in London last week. The authors of the magazine, published by al Qaeda in the Arabian Peninsula based in Yemen, argue April's deadly violence in Boston proves that lone-wolf attacks can be effective in the United States. The issue also warns Americans that they're not safe against such "unstoppable" operations. Investigators believe that alleged Boston bomber Tamerlan Tsarnaev, who was killed days after the attack, accessed Inspire magazine, which had instructions on bomb-making, a law enforcement official told CNN this month. According to analysts, the explosive devices used in the attack that killed three and injured more than 260 others had striking similarities to a bomb recipe in the first issue of the magazine in June 2010. "How to build a bomb in your Mom's kitchen" has been downloaded by militants in multiple Islamist terrorist plots. The upcoming issue, which falls just under 40 pages, calls on American Muslims to follow those who masterminded the Boston attacks. And as long as simple materials-like the pressure cooker allegedly used in the Boston bombing - remain legal, such acts can be carried out with ease, the magazine says. "Lone-Jihad is impossible to counter and stop, except when basic cooking ingredients and building material become illegal," the magazine states. Embedded among the articles are glossy photos of the carnage from the bombing near the Boston Marathon finish line. One section, "An eye for an eye," features a graphic of a bloody knife and an image of a meat cleaver wielding-suspect in the deadly daylight attack on a British soldier in Woolwich. The author says "the message of these young men has been conveyed to the whole world, including every Britain, every westerner, every kafar (non-believer) whose hands have Muslim blood." In a separate letter, "Jones the Rebel" instructs American Muslims to "break down these psychological barriers which hinder us from attacking this enemy ... beware of belittling yourself and your capability." The Boston bombings, the author states, "revealed the power of the lone jihad operation" and encourages readers to "take things into your hands." It should be noted that the quality of English in the new issue is significantly lower than in previous editions. "The Boston events, the road accidents, the poisoned letters, disregard of the people behind them, indicate that the control of your security has broken away and operations against you has taken a path which can be controlled not," Qassim ar-Reimy, a senior commander for al Qaeda in the Arabian Peninsula, writes in a message to Americans. Making the bombs, he argues, is a skill now within every individual's reach. Another article features a graphic of Tamerlan Tsarnaev depicted in paradise. While no physical links have been found between Tsarnaev and his brother, Dzhokar, and al Qaeda, Inspire magazine is nonetheless taking credit for being a catalyst for the attacks, says CNN Terrorism Analyst Paul Cruickshank. "They're opportunistically taking credit for this, saying, 'We encouraged these guys. We gave them instructions and look what happened.' And they're trying to encourage others to do the same," Cruickshank told CNN, adding the magazine is "very difficult" to shut down because of its ability to disseminate online. Post by: CNN's Ashley Killough, CNN's Paul Cruickshank Filed under: Al Qaeda • AQAP Luna Manto Pharm line is going down https://www.tcsindustry.com Venita Kleffner It's hard to say Damon Frogge We still cannot quite think I’m able to often be some checking important points positioned on your webblog. Our neighbors and i are sincerely thankful with your generosity as well as giving me possibility pursue our chosen profession path. I appreciate you information I became with the web-site. Don Prioletti Hello! I simply would like to give you a large thumbs up with the great information you could have here on this post. I’ll be returning to your site to get more detailed soon. Alease Santti https://www.tcsindustry.com/ Dante Gunnarson world is changing https://www.fmyykj.com/ are122 a graphic of Tamerlan Tsarnaev depicted in paradise. <~~~ I wonder if it includes SUV tire marks. June 2, 2013 at 2:25 pm | Reply abmri60 An Al – Qaeda commander in the Arabian Peninsula stated that Americans will not be safe unless their leaders respect the security of other countries and do not attack or oppress them. he also stated that the US security is no longer under control. June 2, 2013 at 10:55 am | Reply Clearly, what's needed is more drone strikes on a stepped-up schedule. We're not killing the Al Qaida Neanderthals fast enough. Even people in Pakistan are getting fed up and want these pigs dead. The intelligence effort needs to be increased to develop more targets. June 1, 2013 at 12:13 pm | Reply how about a boston style deportation of muslems out of the u.s. Would they endorse my movie about mohammud performing oral on a horse and a camel? I want to show it in saudi arabia. can i put an ad in inspire? jim king got my vote. markjuliansmith Religious Terror can be stopped if Freedom of Religion is Stopped. rodwick So this is like a travel magazine for the upwardly mobile Jihadist? Taliban Beastiality I'm waiting for the "Swimsuit Issue"! Mmmmmm – sheep in swimsuits. So hot! J.T. Burton In God's name, these attacks have to stop! Peace is the only viable option. Al Qaeda needs to become peaceful or disband. Those that care wouldn't act this way. Terror is awful to live with let alone the atrocities. Enough said. "In God's Name" The problem is, in God's name is why these attacks happen in the first place. Their method of belief (Faith) means they aren't that different from anyone else who calls on God for other reasons. @Ellliot: You're thinking of the wrong God. Allah is the Moon god of Arabia. A false deity. Doesn't exist. God of the Holy Bible would never condone these kinds of acts anyone that tried will be proven wrong when they face the Almighty and learn that they were wrong about such ideas. Muslims does not believe in the same God as Christians. June 1, 2013 at 6:47 pm | Surely, God wouldn't approve and very likely despise these egregious acts of violence and terror. June 2, 2013 at 9:22 am | Russ Germain do you have any idea how impossible that is? do you not know how insane and ridiculous these people are??? they don't give a damn about peace, they don't care about what we think!! no amount of talking or money or promises will EVER make them stop! you truly don't understand! you think it's just as easy as that? give your head a shake! JT is there some kind of magic God button you can push to stop this ? They pushed their God button to start it. Al Qaida will be very peaceful when they're all dead. I still can't believe we are so stupid as to allow "How to Build a Bomb" books to be sold or shared on the internet. We can pass laws allowing drones in the US, we can allow our own conversation to be tapped and recorded but we don't take bomb making how-to's off the internet. Sorry, but this is just wrong. We are training the enemy. wordsnorth If you think that is possible, you truly do not understand anything about the Internet. I see a Drone missile strike in this magazine's future. Seems like a legit target to me. Ovwata Onojieruo Terrorists,and those who harbour them,are complicit in the murder of the innocent and are guilty of such. http://Www.poetryforum1.wordpress.com EntoyDaDragoN I love how president Putin handles terrorist Diogonese Demonstrating once again that Islam is a religion of peace. Yea, right. buddy, radicalism is not Muslim. two different things. So why aren't any muslims protesting this magazine? dzze I was just wondering what just wondering was wondering. But seriously, I think they don't speak up because they are afraid themselves. Eventually, they will have to. There's probably an ad for a "Maternity Tourism" agency on the same page. Bob Frick Just consider the source & move on.................'nuff said lweba Why don't hackers target these sights instead harming sights which bring benefits to us? TheBob Because hackers don't "target sights". They attack sites. Jomama Now that's a thought haha. Put their nervous misguided energy to do some real work. Wouldn't that be something useful!!! They do. Stand corrected Roger Ogilvy Thornhill haters gotta hate hollander4419 CNN shouldn't even advertise this crap and give in to the attention they want and the media is giving them. Gdam I live among Muslim people. 99.9% are very rude and smug. I remember when 911 happened the muslims that lived above me where partying it up..singing dancing and music..I couldn't believe what I was hearing. to these people violence is their only vocabulary. dude...you are just a bigoted liar. um. If they were celebrating in other parts of the country, which they in fact were, it wouldn't be surprising if what he's saying is the truth. You're just a fool in denial. Look at the vids of the barbarians on that day. its true. they should all die. I live in a neighborhood with a moderately sized Muslim population. Those I have interacted with have been exceptionally friendly and neighborly, much more so than my white neighbors. I'm sure some Muslims celebrated 9/11, just like some westerners probably celebrate when they hear about civilians being bombed in the Middle East. Bigots, fools, and sociopaths come in all shapes, sizes, and colors. Sorry to hear that you've had bad experiences, but don't let that mislead you into naively thinking that all Muslims are violent and impolite. The people you think are Muslims aren't actually Muslims. They just like to think they are. The real Muslims follow the Quran, and the Quran orders Muslims to do the kinds of things that the 9/11 hijackers, the Boston bombers, the London 7/7 terrorists and all other Muslim terrorists do. No one who has read the Quran would deny this. But as it happens, 99% of "Muslims" have never read the Quran, nor do they practice most of the things it requires of a Muslim. They only consider themselves Muslim because their parents also think they are Muslim. Yes Mr Bob is the expert on who is muslim and who isn't and has a complete handle on how many have read the Quran. Ignorant buffoon! This is some of the biggest garbage I have ever heard in my life. Anyone who believes this guy is an idiot. You're obviously just trying to make a religion look bad. You're a fool. And this is coming from an atheist. What do an atheist know about world religion's i remember 911 in los angeles..... a big black benz making a left turn in front of me(i could see/hear clearly) with 5 saudi garbed shtbags were partying and having a good-old time celebrating that arabic accomplishment of muhammed atta et al. tolerance my ass. Milquetoast I only "read" AQ magazine for the Burka centerfolds, fck the articles. Nobody wants to read tips on how to seduce goats, grow a lush uni-brow in time for Ramadan, or murder joggers when your host country rejects you as a loser. I thought I was the only one who did that. The 2012 Ramadan issue centerfold almost showed one entire eye and a bit of eyebrow. SHWINGGGGGG!!!!! Donald Bilinski I have an idea. Let's send them weapons. What could go wrong? #sarcasm font# I suppose our kids will need another war to fight in a few years or else Lockheed-Martin execs won't get gold plated underwear to fart into courtesy of our tax dollars. American Muslim How about as an American Muslim, i tell you (the Al Qaida magazine editor) to go F*** yourself and stop spreading hatred. You serious??? American Muslims stand up to Islamic jihad???????? muslimguy 3:100 O ye who believe! If ye listen to a faction among the People of the Book, they would (indeed) render you apostates after ye have believed! 3:118 O ye who believe! Take not into your intimacy those outside your ranks: They will not fail to corrupt you. They only desire your ruin: Rank hatred has already appeared from their mouths: What their hearts conceal is far worse. We have made plain to you the Signs, if ye have wisdom. 49:6 O ye who believe! If a wicked person comes to you with any news, ascertain the truth, lest ye harm people unwittingly, and afterwards become full of repentance for what ye have done. Do it in front of your fellow Muslims publicly and it might amount to something. Why doesn't it already amount to something? I know there are good Muslims and theres the extremists. Ive gotten to the point where I want nothing to do with any of them. Been over there. I know there are different sects in Islam just as there is in any religion. I don't want nothing to do with the Jewish faith either but they don't go around killing so I don't really care. They want to fight each other, let them but when they start this crap It becomes a problem. They are attacking people who have low self worth that want to be apart of anything. That tells me there is something wrong with society as a whole on both sides. I mean sides now because extremist are reinforcing this anyway they can. Empty Words How about I tell you words without action mean NOTHING. If there are more terrorism in America and Europe, I am not surprise governments and people will stand up and ask the Muslim to pack their Koran and rugs back where Prophet M. coming from. Same region where Jesus and Moses came from, as they are regarded as prophets in Islam as well...Al-Qaida is not muslim as Islam does not allow killing of innocent men, women and children... just like the guy who went to a sikh temple and shot and killed people thinking that they were muslim was never labled as a Christian terrorist, the soldier who took 20 innocent lives in Afghanistan (with the military declaring the guy acted alone) never equated to the fact that Christians are merciless barbarians...get your head out of sand and stop generalizations and labeling... I'm not surprised The New Yorker magazine would say this. I bet the centerfold is butt ugly and needs a shave of the old Bin Laden beard........ Thanks CNN for bringing this into the spotlight. Why? Why???? Klaark When is the Pope going to apologize for the Westboro Baptist Church? When are all Christians going to accept responsibility for the WBC's behavior? Why won't they police their own? A couple of loose cannons in Boston are apparently better at disruption than Al Qaeda. I hope you all rot in he11. Leave a Reply to Cow um fat
cc/2021-04/en_middle_0086.json.gz/line10404
__label__cc
0.622293
0.377707
Science for the People Mad Art Lab Queereka School of Doubt Grounded Parents Teen Skepchick Skeptability Swedish Skepchick Norwegian Skepchick Esceptica Home/Quickies/Skepchick Quickies 6.21 Skepchick Quickies 6.21 Amanda Follow on Twitter Send an email June 21, 2013 17 0 Less than a minute The American Medical Association has decided obesity is a “disease” – From Moniqa. Exodus Ministry to shut down after apology to gay people – From Mindy. And for those who are not convinced, well, here’s an article from Elyse that shares your disbelief. Tits at Download Festival 2013 – On why being pressured to flash your boobs at a festival is bad. From killyosaur. Siri takes a new approach to suicide – From Elizabeth H. And in random good things about music festivals, here’s one of Bonaroo’s ASL interpreters stealing the show, from Mary. Cute Animal Friday! From nowoo, 51 cute animal pictures you need to see before you die. And here are some adorable, fuzzy baby beavers (aka, kits). Facebook Twitter Tumblr Pinterest Reddit WhatsApp Share via Email Print Amanda works in healthcare, is a loudmouthed feminist, and proud supporter of the Oxford comma. Quickies: Can you process an insurrection and still make time for science? Short list of Quickies for the longest week yet… New Year, New Quickies Quickies: A coup AND a pandemic? Sure, why not… criticaldragon1177 says: I’m glad that Exodus Ministry has shut down. It really doesn’t help when there’s people out there who insist they’ve gotten rid of their homosexuality, despite the fact that all the data suggests its not a learned behavior. “ex gay” groups like that only spread homophobia and hamper progress. zylla says: I dislike labeling anything as a “disease” that doesn’t have a viral, bacteriological, etc., source. “Akin to a disease” works. But I am not dismissing the complexity of an issue (obesity, addiction, etc.), I’m just uncomfortable about the label. Am I missing something? Jack99 says: You are missing endocrine, metabolic, genetic and autoimmune “etc.”, to name a few. I don’t think you’re missing anything. I’m quite annoyed by the AMA deciding to do this (especially since it is against the recommendation of their experts). Labeling obesity a disease will have consequences for how providers interact with patients (even though providers already overwhelmingly shame fat people when they visit). This could lead to physicians seeing a fat person and attributing whatever health issue they are having to their size instead of seeking an actual pathology. A person’s size is not necessarily indicative of any health problems–there are plenty of fat people who are healthy and feel great. I don’t think this move will actually help physicians do their job better, and it just hides the sociocultural factors that contribute to obesity that cannot be solved in a doctor’s office. Moniqa Aylin says: Agreed. Treating obesity as a disease leads to misdiagnosis in over 70 million Americans — the healthy obese and unhealthy thin people alike.”“Psychologist Deb Burgard examined the costs of overlooking the normal weight people who need treatment and over-treating the obese people who do not. She found that BMI profiling overlooks 16.3 million ‘normal weight’ individuals who are not healthy and identifies 55.4 million overweight and obese people who are not ill as being in need of treatment” (http://www.nutritionj.com/content/10/1/9) And it’s already egregiously common for so-called “healthcare practitioners” to prescribe weight loss for everything from strep throat to sprained ankles: http://fathealth.wordpress.com/ Will, against that there is this for instance http://obesitywhitebook.nhri.org.tw/whitepaper_doc/%E7%BE%8E%E5%9C%8B/2008%20The%20Obesity%20Sociaty_Obesity%20as%20a%20Disease.pdf Proponents suggest that recognition as a disease will reduce stigma and improve reimbursement for treatment. Even opponents recognise that obesity is a risk factor for diabetes, cardiac disease, and so on. I am still blown away by Zylla’s apparent refusal to recognise anything other than infectious diseases – what about cancer, FFS? – he might want to clarify that. “Proponents suggest that recognition as a disease will reduce stigma and improve reimbursement for treatment.” I highly doubt it will result in anything other than INCREASED pressure to lose weight and undergo risky procedures and experimental medicine for it. Consumers are hardly the beneficiaries of this policy. Moniqa, I totally agree with you that BMI is a poor measure of obesity and I share your horror of quack treatments. It would be foolish to assume that therefore obesity is not a risk factor, for instance for metabolic syndrome http://www.mayoclinic.com/health/metabolic%20syndrome/DS00522 There are better measures of body fat such as these http://en.wikipedia.org/wiki/Body_composition http://en.wikipedia.org/wiki/Hydrostatic_weighing http://www.livestrong.com/article/113959-alternatives-bmi/ Many local gyms can provide this service. First, to say that labeling something a disease will reduce stigma is absurd because it clearly does not happen that way. For example, see HIV. Or depression. Or alcoholism. Second, I did not say that obesity is not a risk factor for health problems. I said that there are plenty of people who are obese that are healthy that will now be labeled unhealthy because the AMA has decided to pathologize fatness. Going through this paper, one thing jumps out at me right from the second paragraph: “The panel recognized that there is a clear majority view among the general public as well as among authoritative bodies that it is reasonable to call obesity a disease.” This is an appeal to popularity and an appeal to authority. This tells me nothing useful. What does tell me something is that the AMA’s House of Delegates ignored the advice of their own experts and took a vote. In other words, this move to pathologize obesity is not based on sound evidence or reasoning, but on the opinions of non-experts. I’m also wholly unconvinced by this paper. The authors admit that the question is unanswerable from a scientific perspective due to the lack of a rigorous and agreed-upon definition of “disease.” Then they use a “forensic” approach which is basically an appeal to popularity and is also determined inadequate by the authors. They take a utilitarian framework, which they also say is speculative and subjective. And so this is supposed to be convincing evidence that physicians will magically stop stigmatizing fat patients? Anyway, I have my doubts that it will change the way physicians engage with fat patients in a good way. I think it will either stay as it already is or get worse. As any fat person can tell you, physicians already lecture about obesity to patients even when they are there for something completely unrelated. Pathologizing their size gives physicians another reason to keep doing that and ignoring patient needs. Well, at least you took the trouble to read the paper (unlike certain masturbias!) and good on you for that! In passing I would note that the non experts you speak of, the AMA House of Delegates, went against the recommendations of the experts, the Council on Science and Public Health, but went with the recommendations of the American Association of Clinical Endocrinologists and the American College of Cardiology. I never thought I would end up defending a bunch of endocrinologists, but there you go! You are right that this is in the end an appeal to authority. On the other hand the Council on Science and Public Health cited the shortcomings of BMI as the reason for rejecting the proposal. I think that is a poor reason in view of the many possible alternative tests for body fat mass. With relatively modest funding a more accurate replacement for BMI could be found and a comparative study done. But that’s still arbitrary. Even if there are other ways than BMI, someone draws a line and says “Someone directly below this line does not have a disease, and someone directly above this line does have a disease.” It’s not based on anything but some scale that people invent to test body mass and pathologizing certain numbers on those scales. It’s not based on symptoms of ill health as being fat is not necessarily a symptom of ill health. Taken with other factors, it can be a sign of ill health, but it is not in and of itself a sign of ill health. In fact, in many societies, fatness is seen as a sign of great health (e.g., see this text). It also kind of ignores the criterion that a disorder or disease should be something that somehow detracts from a patient’s quality of life (either through impairment of normal function or significant distress). The distress caused by societal fat shaming really doesn’t count here. I am trying to decide if there should be a category that does treat obesity that impairs function/distresses the patient as a medical condition, since even that would tend toward abuse. Well, it will be interesting to see how the grand poo-bahs define the new disease. If it was me I would attempt to be objective about it and tie it to a point where cardiac or diabetic risk began to exponentiate. but you never know! What did Einstein say, “You look like scientists, you talk like scientists, but there is not a single scientist among you!” By the way I think you are missing the point that obesity is considered an independent risk factor for cardiac disease in its own right. Anyway, I’m not too invested in whether obesity is considered a disease or a risk factor. If an individual wants to believe they are in the group of healthy obese people, that’s their business. I include myself in that group! I’m not missing that point at all though. I’ve explicitly said that obesity can be a risk factor for diseases and ill health. My point is that obesity is not necessarily indicative of ill health. Just because a person is fat does not mean they have cardiac disease. Plenty of people who are thin or muscular or average have cardiac disease. Being gay is a risk factor for HIV/AIDS. This does not mean that being gay is a disease. Obesity alone is not a risk factor in many diseases for which people assume it is. Fully one-third of obese people are NOT at risk for diabetes and heart disease and one quarter of normal weight people ARE. (source: http://www.webmd.com/diet/news/20080811/benign-obesity-malign-normal-weight) The AMA’s recommendation gives physicians full license to treat people based on appearance rather than existing symptoms, already problematic and poised to become moreso. drken says: The video of Wu-Tang’s ASL interpreter was taken down by the copyright police. :( Here’s another video of her from YouTube (while it lasts). http://www.youtube.com/watch?v=DFWBMXglg4k Buzz Parsec What about when you base your politics on not being stupid o... oc0dile That was a poor choice of words - I didn't want to be confro... I can understand that reasoning with regard to the FMSF. The... Rebecca Watson "have you changed your mind about false memories, or just th... The article in The Cut is extremely unfair to the issue. In... I was Wrong about False Memories Did a White Supremacist Taze Himself to Death Last Week? Is It Wrong to Think Your Political Opponents are Stupid and Evil? Andy Mills, Audio Producer and Noted Harasser of Women, Keeps Failing Upwards Popper and the Paradox of Tolerance Religious Org Adds Rape-Apologist to Board of Directors © Copyright 2021 Skepchick, All Rights Reserved | Recent Posts: Grounded Parents With Joe Biden’s inauguration as the 46th President of the United States mere days away, the fallout from Donald Trump’s desperate attempts to cling to his ill gotten power continues to rain down on the news cycle like little radioactive snowflakes. To the surprise of no one but the perpetrators, law enforcement has opened hundreds …
cc/2021-04/en_middle_0086.json.gz/line10407
__label__cc
0.733686
0.266314
Dawndee Rossy offered plea deal: 8 years in state prison By News Staff on February 3, 2016 in Cops, General, Gov, Public Event By Deb Murphy Today, on what would have been the first day for witness testimony in the Dawndee Rossy embezzlement trial, Inyo County District Attorney Tom Hardy offered Rossy a plea deal of eight years in state prison. Dawndee Rossy Appointed Judge Phillip Argento said Hardy made the offer reluctantly. After consulting with his client, attorney David Evans asked for a continuance until 9 a.m. Thursday so Rossy could discuss the plea with her father. If she rejects the deal, witness testimony will begin at 10 a.m. Argento explained that if the deal was not taken, his hands were tied. “If Mr. Hardy proves everything that has been alleged, you’re looking at a long time in prison.” Argento went on to remind Rossy that she had complained of unfairness; that others were involved but she’s the only one facing trial. “If you have information that implicates others, tell Mr. Hardy,”’ he urged, pointing out that if convictions are made and others required to make restitution that would reduce her restitution. In an e-mail, Hardy said “The joint Bishop Police and DA investigation in 2013 looked at the entire department and all of the staff and did not discover any other criminal behavior.” After granting the continuance, Argento said “some consideration” would be give because Rossy “took responsibility for some conduct.” Rossy and her husband Kenneth were arrested in April 2013 on 44 felony counts, the primary charge was embezzling $1.5 million from Inyo County Department of Health and Human Services’ Public Assistance Program where Rossy was employed at the time. David Evans, Dawndee Rossy, Inyo County Health and Human Services, Inyo DA Tom Hardy, Phillip Argento Inyo, DWP at standoff over gravel pit wells Update on Sierra snowpack 14 Responses to Dawndee Rossy offered plea deal: 8 years in state prison Kyle Crowle February 6, 2016 at 7:32 am # In China she would get the Death penalty, or at the least, Life sentence for embezzling that much money Trouble February 4, 2016 at 11:30 am # I actually kind of agree with you lower Inyo. This wasn’t petty theft. I’ll wait til the next time we start talking about our bueatful justice system. Low-Inyo February 4, 2016 at 8:55 am # …a plea of 8 years in prison…..probably means about 4 years….and being a non-violent crime and prison over-crowding….she’ll be out in 2 years or less….that ,of course is,if she accepts the deal. Longtime Local February 4, 2016 at 6:38 am # Embarassing , irrelevant and unfair?? What’s unfair is the alleged facts…she STOLE over ONE million $$$$$ from Inyo County. She’s taking some responsibility now in hopes of saving her own skin, and doing less time in state prison. This is exactly what’s wrong with the justice system now. Too many people feel sooooo sorry for the criminal. Yes, she is worthy of rehabilitation, and hopefully she can go on to lead a productive life. But this article is in now way, shape or form unfair to this defendant. Rick OB February 3, 2016 at 10:52 pm # Irrelevant and unfair ? It’s embarrassing ? To who ? The admitted thief who stole more than a cool million ? She FINALLY admitted her guilt and you think it’s not fair to report it ? What color is the sky in your world WP ? Your loyalty is sorely misplaced. Ican Reed Canu February 4, 2016 at 8:52 am # Just wondering, but where in the story does it say she ADMITTED her guilt? The headline and story is about a plea deal offered, not one taken. If she accepts the offer, then she will have to plead guilty and admit her guilt. Wondering February 4, 2016 at 10:39 am # @Ican Reed- maybe your should change your name to Icant Reed….. Just in case you need it spelled out …Took responsibility=accepted guilt. Once again good job Sierra Wave and thanks for keeping us honest people informed. Ican Reed Canu February 4, 2016 at 12:22 pm # Yes, please spell it out for me: for what “conduct,” did Rossy take “responsibility”? And for what reason will Judge Argento give “some consideration” to Rossy’s acceptance of such vague responsibility? The article does not discuss these issues. To me, taking responsibility would be entering a guilty plea and admitting the charges. My only point is that, legally, she hasn’t admitted or taken responsibility for anything. Otherwise, she would be being sentenced now, instead of being allowed to consider her options. Wondering – KSRW reports that Ms. Rossy has rejected the DA’s offer and is headed for trial. That does not seem like accepting responsibility to me. So please enlighten me, even if you need to spell it out: exactly how has Ms. Rossy accepted responsibility for her behavior? Wondering February 5, 2016 at 9:42 am # I’m not the one to ” enlighten” you….I agree there is more to the story, but I’m sick and tired of all these people embezzling. I for one, want the book thrown at each and every one WHO IS GUILTY. Time will tell on this one, I have my opinion, knowing what I know… You have your, knowing what you know. Im keeping the peace here, and I hope this trial ends fast and it doesn’t cost OUR County even more than the 1.5 million that is already missing. Wondering: I merely pointed out the truth – that Rossy had not admitted her guilt – and you chose to respond by telling me I was so dense you needed to “spell out” for me that she HAD accepted responsibility. So yes, you are the one to enlighten me, since you clearly lack the character to admit you were wrong. Warpaint February 4, 2016 at 4:53 pm # Rick ob- it’s irrelevant and unfair because she didn’t accept the offer. They should have just waited till today when we would no one or the other. I found it to be one sided, and it seemed to me we didn’t need to know she wanted to talk it over with her father. I would rather know the important stuff like today’s decision. Last night’s story felt like I was reading TMZ. It’s pathetic that you can take a personal and important decision and choose to print it. We all didn’t need to read that. Better yet, wait till Thursday and find out what the decision is. Irrelevant and unfair story. It’s embarrassing and not fair to Ms. Rossy. @Warpaint…..wow. I have enjoyed reading some of your responses before, but this one tops the cake. She ADMITTED….she should be embarrassed, embarrassed that she stole money from me AND from YOU! Wow. Thank you Sierra Wave for printing the stories that we are all interested in knowing what is happening. @Rick OB, CUDOS! Wow….just wow
cc/2021-04/en_middle_0086.json.gz/line10408
__label__cc
0.646043
0.353957
BUX Zero, the commission-free investment app, launched in the Netherlands: Here’s everything you need to know in News, FinTech, Startups Picture credits: BUX As ‘Millennials’ have started earning extensively, investing has become a necessity these days. As per the ING International Survey 2019, 61% of Europeans are concerned about saving for their retirement while 54% believe that they will have to earn after retirement as well. The reason behind this concern is that many in the young generation are not able to rely on traditional options such as a pension. This is where options such as BUX Zero will be of help. The introduction of zero-commission investing by intuitive apps such as BUX Zero empowers more Europeans leverage such solutions to take control of their financial future. In fact, almost 50% of Europeans who took part in the survey believe that investing is a good way to save for their future. Founded in 2014 by Nick Bortot in Amsterdam, BUX aims to make it easy and affordable for users to do more with their hard-earned money. Since its launch, the Dutch fintech has served over 2 million users across 9 countries in Europe. It is backed by Holtzbrinck Ventures, Velocity Capital, Finch Capital and Initial Capital. BUX provides short-term trading via an in-app community. Now, with the introduction of BUX Zero, the company makes commission-free investing accessible to all and lets users invest in brands and companies they like via an easy-to-use and intuitive app. What is BUX Zero? BUX just announced the BUX Zero for its waitlisted users in the Netherlands. Following the windmill country, the app will be launched in Germany and Austria. The company eyes for a broader rollout across Europe next year. BUX Zero will offer a more welcoming experience via the app and makes exploring performance and investments effortless. Lets everyone invest! Potential investors who are not from a strong financial background might find it tough to invest as commissions can eat into profit. BUX Zero lets everyone safe by investing small amounts. This way brands that might potentially go out of reach will also see investors. Commission-free investments BUX Zero is one of the exclusive apps in Europe that is powered by its own back-end broker. Eventually, the fintech company has developed a full-fledged stockbroker simultaneously while building the app. “Having this full-stack back-end gives us a tremendous amount of flexibility because we aren’t tied to a third party’s legacy system. It makes our operations incredibly cost-efficient, so we can offer zero-commission investing. We can also easily offer innovative features, like fractional stock ownership in the future”, said Nick Bortot. Order types offered by BUX Zero Currently, BUX Zero offers two order types – Market Orders and Limit Orders for commission-free investment until the year-end. In 2020, the app will introduce a third type called Basic Order, which will be commission-free forever. Later, Market Order and Limit Order will charge a commission of €1 and €2 respectively. When this option is chosen, their orders will be executed at a fixed time each day. BUX Zero’s subscription plan Besides the three order types, the Dutch fintech company has also introduced a subscription plan. It will provide users an option to pay a fixed monthly fee to access unlimited commission-free Market, Limit, and Basic Orders. Notably, the subscription fee will be much lower than the commission of a traditional online broker. Disclosure: We may earn an affiliate commission through links. Tags: Dutch StartupsFinTech Share9Tweet31SendShare58
cc/2021-04/en_middle_0086.json.gz/line10409
__label__wiki
0.664899
0.664899
Former First Lady of the United States Husband: Franklin D. Roosevelt "A Star Is Burns" Eleanor Roosevelt was husband to Franklin D. Roosevelt and First Lady of the United States between 1933 and 1945. Eleanor Roosevelt appeared in a stage version of Sunrise at Campobello.[1] One of Chief Wiggum's photos was of him dressed as Eleanor Roosevelt.[2] Joe LaBoot is a retired baseball player who dropped an easy catch a long time ago. After he finally managed to catch the ball, he hit it into the audience where Eleanor Roosevelt was sitting, and the ball collided with her head.[3] When Lisa became school president, Superintendent Chalmers said that she is like a female Eleanor Roosevelt.[4] A picture of Eleanor Roosevelt was seen in Lisa's Social Studies book, with her husband. Lisa imagined her face turning into the face of Ms. Cantwell then pushing Franklin into the water.[5] When thinking about the good things America had, Lisa imagined Eleanor Roosevelt. Roosevelt followed Louis Armstrong to Canada to get legalized weed.[6] In Lisa's Dream House she wanted a famous women statue gallery, which included Cleopatra, Madame Curie, Gertrude Stein, Eleanor Roosevelt, Amelia Earhart, Myrna Loy, Ella Fitzgerald and Anita Hill, among others.[7] During a WWII air battle, Mr. Burns removed Grampa's pinup of Betty Grable and replaced it with a photo of Eleanor Roosevelt.[8] Lisa's dream bedroom has a great wall of great women. Women that are on the wall include Eleanor Roosevelt, Harriet Tubman, Hermione Granger, Joan of Arc, Sacagawea, and Gloria Steinem.[9] Eleanor Roosevelt is element Er in Lisa's Table of Geeky Delights.[10] Episode – "A Star Is Burns" (costume) Episode – "A Star Is Born Again" (costume) Episode – "The President Wore Pearls" (mentioned) Episode – "The Boys of Bummer" Episode – "Black-Eyed, Please" (picture) Episode – "D'oh Canada" Comic story – Lisa's Dream House (mentioned) Comic story – To the Bookmobile! (mentioned) Comic story – Mission Imp-possible! (picture) Comic story – Bedroom Battle (picture) Book – Lisa Simpson's Guide to Geek Chic (mentioned) ↑ "A Star Is Burns" ↑ "A Star Is Born Again" ↑ "The Boys of Bummer" ↑ "The President Wore Pearls" ↑ "Black-Eyed, Please" ↑ "D'oh Canada" ↑ Lisa's Dream House ↑ Mission Imp-possible! ↑ Bedroom Battle ↑ Lisa Simpson's Guide to Geek Chic Eleanor Roosevelt at Wikipedia First Ladies of the United States of America Martha Washington • Abigail Adams • Dolley Madison • Mary Lincoln • Ida McKinley • Florence Harding • Eleanor Roosevelt • Mamie Eisenhower • Jacqueline Kennedy • Betty Ford • Nancy Reagan • Barbara Bush • Hillary Clinton • Michelle Obama • Melania Trump Retrieved from "https://simpsonswiki.com/w/index.php?title=Eleanor_Roosevelt&oldid=866975" Non-speaking characters Characters introduced in season 6 Modified on August 24, 2019, at 10:43.
cc/2021-04/en_middle_0086.json.gz/line10410
__label__wiki
0.853938
0.853938
Soundtrack Music Associates | Kevin Kliesch receives Daytime Emmy nomination for ‘Rapunzel’s Tangled Adventure’ Kevin Kliesch receives Daytime Emmy nomination for ‘Rapunzel’s Tangled Adventure’ Kevin Kliesch has received a Daytime Emmy nomination for his work on Disney Channel’s ‘Rapunzel’s Tangled Adventure.’ The nomination for Outstanding Music Direction and Composition marks Kevin’s seventh Daytime Emmy nomination. He previously won the Outstanding Music Direction and Composition category for his work on ‘Sofia the First’ in 2015. ‘Rapunzel’s Tangled Adventure’ is an animated adventure/comedy series that takes place after the events of Walt Disney Animation Studios’ “Tangled.” The show follows Rapunzel as she acquaints herself with her parents, her kingdom and the people of Corona. ‘Rapunzel’s Tangled Adventure’ is available to stream on Disney+ iMDB – Kevin Kliesch Website – Kevin Kliesch Disney+ – Rapunzel’s Tangled Adventure Deadline – Daytime Emmy Nominations Daytime EmmyDisney ChannelKevin Kliesch
cc/2021-04/en_middle_0086.json.gz/line10413
__label__cc
0.644219
0.355781
gSOAP Public License v1.3b gSOAP-1.3b http://www.cs.fsu.edu/~engelen/license.html gSOAP Public License Version 1.3b The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). This license applies to the gSOAP software package, with the exception of the soapcpp2 and wsdl2h source code located in gsoap/src and gsoap/wsdl, all code generated by soapcpp2 and wsdl2h, the UDDI source code gsoap/uddi2, and the Web server sample source code samples/webserver. To use any of these software tools and components commercially, a commercial license is required and can be obtained from www.genivia.com. 1 DEFINITIONS. 1.1. "Contributor" means each entity that creates or contributes to the creation of Modifications. 1.2. "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. 1.3. "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. 1.4. "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5. "Executable" means Covered Code in any form other than Source Code. 1.6. "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A. 1.7. "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License. 1.8.1. "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. 1.9. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A. Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. B. Any new file that contains any part of the Original Code, or previous Modifications. 1.10. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. 1.10.1. "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. 1.11. "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 1.12. "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. 2 SOURCE CODE LICENSE. 2.1. The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: (a) under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Initial Developer, to make, have made, use and sell ("offer to sell and import") the Original Code, Modifications, or portions thereof, but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Original Code, Modifications, or any combination or portions thereof. 2.2. Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license (a) under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and (b) under patents now or hereafter owned or controlled by Contributor, to make, have made, use and sell ("offer to sell and import") the Contributor Version (or portions thereof), but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Contributor Version (or portions thereof). 3 DISTRIBUTION OBLIGATIONS. 3.1. Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. 3.2. Availability of Source Code. Any Modification created by You shall be provided to the Initial Developer in Source Code form and are subject to the terms of the License. 3.3. Description of Modifications. You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code. 3.4. Intellectual Property Matters. (a) Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. (b) Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. (c) Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License. 3.5. Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. 3.6. Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. If you distribute executable versions containing Covered Code as part of a product, you must reproduce the notice in Exhibit B in the documentation and/or other materials provided with the product. 3.7. Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. 3.8. Restrictions. You may not remove any product identification, copyright, proprietary notices or labels from gSOAP. 4 INABILITY TO COMPLY DUE TO STATUTE OR REGULATION. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. 5 APPLICATION OF THIS LICENSE. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. 6 VERSIONS OF THE LICENSE. 6.1. New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. 6.2. Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. 6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrase "gSOAP" or any confusingly similar phrase do not appear in your license (except to note that you license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the gSOAP Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.) 7 DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. LIMITED LIABILITY THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. UNDER NO CIRCUMSTANCES WILL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF THE AUTHORS HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL THE AUTHORS BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR SERVICES. YOU ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8 TERMINATION. 8.1. This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive. 8.3. If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license. 8.4. In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination. 9 LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. 10 U.S. GOVERNMENT END USERS. 11 MISCELLANEOUS. 12 RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability. EXHIBIT A. "The contents of this file are subject to the gSOAP Public License Version 1.3 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.cs.fsu.edu/ engelen/soaplicense.html Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c, stdsoap2.c, stdsoap.cpp, stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l, soapcpp2_yacc.y, error2.h, error2.c, symbol2.c, init2.c, soapdoc2.html, and soapdoc2.pdf, httpget.h, httpget.c, stl.h, stldeque.h, stllist.h, stlvector.h, stlset.h. The Initial Developer of the Original Code is Robert A. van Engelen. Portions created by Robert A. van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. "________________________." [Note: The text of this Exhibit A may differ slightly form the text of the notices in the Source Code files of the Original code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] EXHIBIT B. "Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (C) 2001-2009 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE." <<beginOptional>> gSOAP Public License Version 1.3b<<endOptional>><<beginOptional>> The gSOAP public license is derived from the Mozilla Public License (MPL1.1). The sections that were deleted from the original MPL1.1 text are 1.0.1, 2.1.(c),(d), 2.2.(c),(d), 8.2.(b), 10, and 11. Section 3.8 was added. The modified sections are 2.1.(b), 2.2.(b), 3.2 (simplified), 3.5 (deleted the last sentence), and 3.6 (simplified). This license applies to the gSOAP software package, with the exception of the soapcpp2 and wsdl2h source code located in gsoap/src and gsoap/wsdl, all code generated by soapcpp2 and wsdl2h, the UDDI source code gsoap/uddi2, and the Web server sample source code samples/webserver. To use any of these software tools and components commercially, a commercial license is required and can be obtained from www.genivia.com.<<endOptional>> <<var;name="bullet";original="1";match=".{0,20}">> DEFINITIONS. <<var;name="bullet";original="1.0.1.";match=".{0,20}">> <<var;name="bullet";original="1.1.";match=".{0,20}">> "Contributor" means each entity that creates or contributes to the creation of Modifications. <<var;name="bullet";original="1.2.";match=".{0,20}">> "Contributor Version" means the combination of the Original Code, prior Modifications used by a Contributor, and the Modifications made by that particular Contributor. <<var;name="bullet";original="1.3.";match=".{0,20}">> "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. <<var;name="bullet";original="1.4.";match=".{0,20}">> "Electronic Distribution Mechanism" means a mechanism generally accepted in the software development community for the electronic transfer of data. <<var;name="bullet";original="1.5.";match=".{0,20}">> "Executable" means Covered Code in any form other than Source Code. <<var;name="bullet";original="1.6.";match=".{0,20}">> "Initial Developer" means the individual or entity identified as the Initial Developer in the Source Code notice required by Exhibit A. <<var;name="bullet";original="1.7.";match=".{0,20}">> "Larger Work" means a work which combines Covered Code or portions thereof with code not governed by the terms of this License. <<var;name="bullet";original="1.8.";match=".{0,20}">> "License" means this document. <<var;name="bullet";original="1.8.1.";match=".{0,20}">> "Licensable" means having the right to grant, to the maximum extent possible, whether at the time of the initial grant or subsequently acquired, any and all of the rights conveyed herein. <<var;name="bullet";original="1.9.";match=".{0,20}">> "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: <<var;name="bullet";original="A.";match=".{0,20}">> Any addition to or deletion from the contents of a file containing Original Code or previous Modifications. <<var;name="bullet";original="B.";match=".{0,20}">> Any new file that contains any part of the Original Code, or previous Modifications. <<var;name="bullet";original="1.10.";match=".{0,20}">> "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code, and which, at the time of its release under this License is not already Covered Code governed by this License. <<var;name="bullet";original="1.10.1.";match=".{0,20}">> "Patent Claims" means any patent claim(s), now owned or hereafter acquired, including without limitation, method, process, and apparatus claims, in any patent Licensable by grantor. <<var;name="bullet";original="1.11.";match=".{0,20}">> "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. <<var;name="bullet";original="1.12.";match=".{0,20}">> "You" (or "Your") means an individual or a legal entity exercising rights under, and complying with all of the terms of, this License or a future version of this License issued under Section 6.1. For legal entities, "You" includes any entity which controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial ownership of such entity. <<var;name="bullet";original="2";match=".{0,20}">> SOURCE CODE LICENSE. <<var;name="bullet";original="2.1.";match=".{0,20}">> The Initial Developer Grant. The Initial Developer hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims: <<var;name="bullet";original="(a)";match=".{0,20}">> under intellectual property rights (other than patent or trademark) Licensable by Initial Developer to use, reproduce, modify, display, perform, sublicense and distribute the Original Code (or portions thereof) with or without Modifications, and/or as part of a Larger Work; and <<var;name="bullet";original="(b)";match=".{0,20}">> under patents now or hereafter owned or controlled by Initial Developer, to make, have made, use and sell ("offer to sell and import") the Original Code, Modifications, or portions thereof, but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Original Code, Modifications, or any combination or portions thereof. <<var;name="bullet";original="(c)";match=".{0,20}">> <<var;name="bullet";original="(d)";match=".{0,20}">> <<var;name="bullet";original="2.2.";match=".{0,20}">> Contributor Grant. Subject to third party intellectual property claims, each Contributor hereby grants You a world-wide, royalty-free, non-exclusive license <<var;name="bullet";original="(a)";match=".{0,20}">> under intellectual property rights (other than patent or trademark) Licensable by Contributor, to use, reproduce, modify, display, perform, sublicense and distribute the Modifications created by such Contributor (or portions thereof) either on an unmodified basis, with other Modifications, as Covered Code and/or as part of a Larger Work; and <<var;name="bullet";original="(b)";match=".{0,20}">> under patents now or hereafter owned or controlled by Contributor, to make, have made, use and sell ("offer to sell and import") the Contributor Version (or portions thereof), but solely to the extent that any such patent is reasonably necessary to enable You to utilize, alone or in combination with other software, the Contributor Version (or portions thereof). <<var;name="bullet";original="(c)";match=".{0,20}">> <<var;name="bullet";original="(d)";match=".{0,20}">> <<var;name="bullet";original="3";match=".{0,20}">> DISTRIBUTION OBLIGATIONS. <<var;name="bullet";original="3.1.";match=".{0,20}">> Application of License. The Modifications which You create or to which You contribute are governed by the terms of this License, including without limitation Section 2.2. The Source Code version of Covered Code may be distributed only under the terms of this License or a future version of this License released under Section 6.1, and You must include a copy of this License with every copy of the Source Code You distribute. You may not offer or impose any terms on any Source Code version that alters or restricts the applicable version of this License or the recipients' rights hereunder. However, You may include an additional document offering the additional rights described in Section 3.5. <<var;name="bullet";original="3.2.";match=".{0,20}">> Availability of Source Code. Any Modification created by You <<var;name="shall";original="shall";match="shall|will">> be provided to the Initial Developer in Source Code form and are subject to the terms of the License. <<var;name="bullet";original="3.3.";match=".{0,20}">> Description of Modifications. You must cause all Covered Code to which You contribute to contain a file documenting the changes You made to create that Covered Code and the date of any change. You must include a prominent statement that the Modification is derived, directly or indirectly, from Original Code provided by the Initial Developer and including the name of the Initial Developer in (a) the Source Code, and (b) in any notice in an Executable version or related documentation in which You describe the origin or ownership of the Covered Code. <<var;name="bullet";original="3.4.";match=".{0,20}">> Intellectual Property Matters. <<var;name="bullet";original="(a)";match=".{0,20}">> Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL" which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact. If Contributor obtains such knowledge after the Modification is made available as described in Section 3.2, Contributor shall promptly modify the LEGAL file in all copies Contributor makes available thereafter and shall take other steps (such as notifying appropriate mailing lists or newsgroups) reasonably calculated to inform those who received the Covered Code that new knowledge has been obtained. <<var;name="bullet";original="(b)";match=".{0,20}">> Contributor APIs. If Contributor's Modifications include an application programming interface and Contributor has knowledge of patent licenses which are reasonably necessary to implement that API, Contributor must also include this information in the LEGAL file. <<var;name="bullet";original="(c)";match=".{0,20}">> Representations. Contributor represents that, except as disclosed pursuant to Section 3.4(a) above, Contributor believes that Contributor's Modifications are Contributor's original creation(s) and/or Contributor has sufficient rights to grant the rights conveyed by this License. <<var;name="bullet";original="3.5.";match=".{0,20}">> Required Notices. You must duplicate the notice in Exhibit A in each file of the Source Code. If it is not possible to put such notice in a particular Source Code file due to its structure, then You must include such notice in a location (such as a relevant directory) where a user would be likely to look for such a notice. If You created one or more Modification(s) You may add your name as a Contributor to the notice described in Exhibit A. You must also duplicate this License in any documentation for the Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. <<var;name="bullet";original="3.6.";match=".{0,20}">> Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to limit or alter the recipient's rights in the Source Code version from the rights set forth in this License. If You distribute the Executable version under a different license You must make it absolutely clear that any terms which differ from this License are offered by You alone, not by the Initial Developer or any Contributor. If you distribute executable versions containing Covered Code as part of a product, you must reproduce the notice in Exhibit B in the documentation and/or other materials provided with the product. <<var;name="bullet";original="3.7.";match=".{0,20}">> Larger Works. You may create a Larger Work by combining Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product. In such a case, You must make sure the requirements of this License are fulfilled for the Covered Code. <<var;name="bullet";original="3.8.";match=".{0,20}">> Restrictions. You may not remove any product identification, copyright, proprietary notices or labels from gSOAP. <<var;name="bullet";original="4";match=".{0,20}">> INABILITY TO COMPLY DUE TO STATUTE OR REGULATION. If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Code due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect. Such description must be included in the LEGAL file described in Section 3.4 and must be included with all distributions of the Source Code. Except to the extent prohibited by statute or regulation, such description must be sufficiently detailed for a recipient of ordinary skill to be able to understand it. <<var;name="bullet";original="5";match=".{0,20}">> APPLICATION OF THIS LICENSE. This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. <<var;name="bullet";original="6";match=".{0,20}">> VERSIONS OF THE LICENSE. <<var;name="bullet";original="6.1.";match=".{0,20}">> New Versions. Grantor may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number. <<var;name="bullet";original="6.2.";match=".{0,20}">> Effect of New Versions. Once Covered Code has been published under a particular version of the License, You may always continue to use it under the terms of that version. You may also choose to use such Covered Code under the terms of any subsequent version of the License. <<var;name="bullet";original="6.3.";match=".{0,20}">> Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrase "gSOAP" or any confusingly similar phrase do not appear in your license (except to note that you license differs from this License) and (b) otherwise make it clear that Your version of the license contains terms which differ from the gSOAP Public License. (Filling in the name of the Initial Developer, Original Code or Contributor in the notice described in Exhibit A shall not of themselves be deemed to be modifications of this License.) <<var;name="bullet";original="7";match=".{0,20}">> DISCLAIMER OF WARRANTY. COVERED CODE IS PROVIDED UNDER THIS LICENSE ON AN "AS IS" BASIS, WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT THE AUTHORS DO NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. LIMITED LIABILITY THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. UNDER NO CIRCUMSTANCES WILL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF THE AUTHORS HAVE BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL THE AUTHORS BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR SERVICES. YOU ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFE-CRITICAL APPLICATIONS. THE AUTHORS EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS BY YOU. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. <<var;name="bullet";original="8";match=".{0,20}">> TERMINATION. <<var;name="bullet";original="8.1.";match=".{0,20}">> This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License. Provisions which, by their nature, must remain in effect beyond the termination of this License shall survive. <<var;name="bullet";original="8.2.";match=".{0,20}">> <<var;name="bullet";original="8.3.";match=".{0,20}">> If You assert a patent infringement claim against Participant alleging that such Participant's Contributor Version directly or indirectly infringes any patent where such claim is resolved (such as by license or settlement) prior to the initiation of patent infringement litigation, then the reasonable value of the licenses granted by such Participant under Sections 2.1 or 2.2 shall be taken into account in determining the amount or value of any payment or license. <<var;name="bullet";original="8.4.";match=".{0,20}">> In the event of termination under Sections 8.1 or 8.2 above, all end user license agreements (excluding distributors and resellers) which have been validly granted by You or any distributor hereunder prior to termination shall survive termination. <<var;name="bullet";original="9";match=".{0,20}">> LIMITATION OF LIABILITY. UNDER NO CIRCUMSTANCES AND UNDER NO LEGAL THEORY, WHETHER TORT (INCLUDING NEGLIGENCE), CONTRACT, OR OTHERWISE, SHALL YOU, THE INITIAL DEVELOPER, ANY OTHER CONTRIBUTOR, OR ANY DISTRIBUTOR OF COVERED CODE, OR ANY SUPPLIER OF ANY OF SUCH PARTIES, BE LIABLE TO ANY PERSON FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY CHARACTER INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS EXCLUSION AND LIMITATION MAY NOT APPLY TO YOU. <<var;name="bullet";original="10";match=".{0,20}">> U.S. GOVERNMENT END USERS. <<var;name="bullet";original="11";match=".{0,20}">> MISCELLANEOUS. <<var;name="bullet";original="12";match=".{0,20}">> RESPONSIBILITY FOR CLAIMS. As between Initial Developer and the Contributors, each party is responsible for claims and damages arising, directly or indirectly, out of its utilization of rights under this License and You agree to work with Initial Developer and Contributors to distribute such responsibility on an equitable basis. Nothing herein is intended or shall be deemed to constitute any admission of liability.<<beginOptional>> EXHIBIT A. "The contents of this file are subject to the gSOAP Public License Version 1.3 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.cs.fsu.edu/ engelen/soaplicense.html Software distributed under the License is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License for the specific language governing rights and limitations under the License. The Original Code of the gSOAP Software is: stdsoap.h, stdsoap2.h, stdsoap.c, stdsoap2.c, stdsoap.cpp, stdsoap2.cpp, soapcpp2.h, soapcpp2.c, soapcpp2_lex.l, soapcpp2_yacc.y, error2.h, error2.c, symbol2.c, init2.c, soapdoc2.html, and soapdoc2.pdf, httpget.h, httpget.c, stl.h, stldeque.h, stllist.h, stlvector.h, stlset.h. The Initial Developer of the Original Code is Robert A. van Engelen. Portions created by Robert A. van Engelen are Copyright (C) 2001-2004 Robert A. van Engelen, Genivia inc. All Rights Reserved. Contributor(s): "________________________." [Note: The text of this Exhibit A may differ slightly form the text of the notices in the Source Code files of the Original code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] EXHIBIT B. "Part of the software embedded in this product is gSOAP software. Portions created by gSOAP are Copyright (C) 2001-2009 Robert A. van Engelen, Genivia inc. All Rights Reserved. THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY GENIVIA INC AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE."<<endOptional>>
cc/2021-04/en_middle_0086.json.gz/line10415
__label__wiki
0.933978
0.933978
DVDs, Home video, Season DVDs The First & Second Seasons If you were looking for the article about season 1, then see Season 1. (15 hours, 26 minutes) The First & Second Seasons is a SpongeBob SquarePants DVD set that was released on February 5, 2018 and contains contains all the episodes from the first and second seasons, except for "Help Wanted." 1 Season releases 2.1.1 Disc 1 3 Special features 3.1 Specials 3.2 Audio commentaries 3.3 Music videos 3.4 Storyboards 5 Disc menus Season releases The Complete First Season 1b - "Reef Blower" 1c - "Tea at the Treedome" 2a - "Bubblestand" 3a - "Jellyfishing" 3b - "Plankton!" 4a - "Naughty Nautical Neighbors" 4b - "Boating School" 5a - "Pizza Delivery" 6a - "Mermaid Man and Barnacle Boy" 6b - "Pickles" 7a - "Hall Monitor" 7b - "Jellyfish Jam" 8b - "Squeaky Boots" 9a - "Nature Pants" 9b - "Opposite Day" 10b - "F.U.N." 11b - "Squidward the Unfriendly Ghost" 12a - "The Chaperone" 13a - "Scaredy Pants" 13b - "I Was a Teenage Gary" 14a - "SB-129" 14b - "Karate Choppers" 15a - "Sleepy Time" 15b - "Suds" 16a - "Valentine's Day" 16b - "The Paper" 17a - "Arrgh!" 17b - "Rock Bottom" 18a - "Texas" 18b - "Walking Small" 19a - "Fools in April" 19b - "Neptune's Spatula" 20a - "Hooky" 20b - "Mermaid Man and Barnacle Boy II" 21a - "Your Shoe's Untied" 21b - "Squid's Day Off" 22a - "Something Smells" 22b - "Bossy Boots" 23a - "Big Pink Loser" 23b - "Bubble Buddy" 24a - "Dying for Pie" 24b - "Imitation Krabs" 25a - "Wormy" 25b - "Patty Hype" 26a - "Grandma's Kisses" 26b - "Squidville" 27a - "Prehibernation Week" 27b - "Life of Crime" 28 - "Christmas Who?" 29a - "Survival of the Idiots" 29b - "Dumped" 30a - "No Free Rides" 30b - "I'm Your Biggest Fanatic" 31a - "Mermaid Man and Barnacle Boy III" 31b - "Squirrel Jokes" 32a - "Pressure" 32b - "The Smoking Peanut" 33a - "Shanghaied" 33b - "Gary Takes a Bath" 34a - "Welcome to the Chum Bucket" 34b - "Frankendoodle" 35a - "The Secret Box" 36a - "Graveyard Shift" (listed as "The Graveyard Shift") 36b - "Krusty Love" 37a - "Procrastination" (uncut) 37b - "I'm with Stupid" 38a - "Sailor Mouth" 38b - "Artist Unknown" 39a - "Jellyfish Hunter" 39b - "The Fry Cook Games" 40a - "Squid on Strike" Drawing the Goo Lagoon Bikini Bottom's 7 Life Strategies The Origin of SpongeBob SquarePants The First Season Crew on... Everybody's Talking: The Voices Behind SpongeBob SquarePants Around the World with SpongeBob SquarePants - "Plankton! (audio commentary)" - "Karate Choppers (audio commentary)" - "Something Smells (audio commentary)" - "Big Pink Loser (audio commentary)" - "Prehibernation Week (audio commentary)" - "Survival of the Idiots (audio commentary)" - "Shanghaied (audio commentary)" - "Welcome to the Chum Bucket (audio commentary)" - "Sailor Mouth (audio commentary)" In the Key of Sea: Krusty Krab Karaoke Violent Femmes Sing SpongeBob SpongeBob ScaredyPants SpongeBob Dancin' Pants - "Mermaid Man and Barnacle Boy III (storyboard)" - "Christmas Who? (storyboard)" The menu for the Script Viewer. The Bikini Bottom's Up Tour Nick DVD Game Demo Script Viewer There's a sequel to this DVD named The Third & Fourth Seasons. Coincidentally, both DVDs were released on February 5. "Help Wanted," the pilot episode of the series, was not included due to copyright issues with Tiny Tim's song "Livin' in the Sunlight, Lovin' in the Moonlight" being played in this episode. According to Derek Drymon, this is because Nickelodeon did not want to pay Tiny Tim's estate for the rights.[1] However, it is included as a bonus feature on disc 3 of The Complete 3rd Season, The Third & Fourth Seasons, and 10 Happiest Moments DVDs. It is also available as a normal episode on The First 100 Episodes, SpongeBob, You're Fired!, The Pilot a Mini-Movie and the Square Shorts, and The Best 200 Episodes Ever DVDs. The uncut version of "Procrastination" is included. An image from "Mermaid Man and Barnacle Boy III" instead of "Mermaid Man and Barnacle Boy II." In the episode selection on disc 3, the image for "Mermaid Man and Barnacle Boy II" is not from that episode. The image is actually from "Mermaid Man and Barnacle Boy III," which is not from season 1. This error also happens on the Lost at Sea DVD. Bill Faberbakke In the closing credits for "Reef Blower" and "Tea at the Treedome," Bill Fagerbakke's name is misspelled as "Bill Faberbakke." Closed-captioning on this DVD In all Nickelodeon USA airings of the episode "Something Smells" and the iTunes version, SpongeBob walks up to a building and says, "Hi, building!" which causes the building to flee from SpongeBob's breath. He goes up to Patrick and says, "I just don't get it!" and Patrick says, "I don't either." On this DVD release, the Nautical Nonsense and Undersea Antics Volume 1 VHS tapes, the Nick Scene It? DVD game, Canadian airings on YTV and Nickelodeon Canada, Polish airings, UK airings, and Australian airings, the scene instead goes like this: SpongeBob: [walks up to a building and waves] I just don't get it! [the building flees] Patrick: [off-screen] I don't, either. [SpongeBob walks up to Patrick; the rest of the scene goes as normal, resulting in the same lines being repeated] According to the audio commentary on this DVD, this was a sound mixing error. The music also repeats itself incorrectly at that point. I is made obvious since SpongeBob's mouth still clearly says the intended line. However, the closed-captioning on this DVD still uses the original correct line. On the backside, "Graveyard Shift" is listed as "The Graveyard Shift." This also happens on the Nautical Nonsense and Undersea Antics Volume 1 VHS tapes, the Nautical Nonsense and Sponge Buddies, Complete 2nd Season, and First 100 Episodes DVDs. "Squid on Strike" is supposed to be before "Sandy, SpongeBob, and the Worm." Even though "Squid on Strike" is 40a and "Sandy, SpongeBob, and the Worm" is 40b, disc 3 has the opposite (40b and 40a). Disc menus Disc 1 Main Menu Disc 1 Episode Selection - 1 (excluding 1a), 2 Disc 1 Episode Selection - 3, 4 Disc 2 Episode Selection - 9, 10 Disc 2 Episode Selection - 11, 12 Special Features (Disc 1) Audio Commentary Menu for "Plankton!" (Disc 1) Audio Commentary Menu for "Karate Choppers" (Disc 2) More Special Features (Disc 3) Krusty Krab Karaoke Menu (Disc 3) Vocals Option Menu (Disc 3) Bikini Bottom's Up Tour Menu (Disc 3) Set Up Disc 1 Disc 1 Episode Selection 21, 22, 23a Disc 1 Episode Selection 23b, 24, 25 Disc 1 Episode Selection 26, 27, 28 Disc 2 Episode Selection 34, 35 Special Features (Disc 3) (Part 1) Audio Commentaries (Disc 1) SpongeBob SquarePants The First & Second Seasons DVD Unboxing ^ http://cartoonician.com/the-oral-history-of-spongebob-squarepants/ Retrieved from "https://spongebob.fandom.com/wiki/The_First_%26_Second_Seasons?oldid=3370139" Season DVDs
cc/2021-04/en_middle_0086.json.gz/line10417
__label__wiki
0.503977
0.503977
law, govt and politics The Law and Harry Potter Jeffrey E. Thomas Franklin G. Snyder Durham. North Carolina Copyright © 20 I0 Legal Traditions and Institutions What Role Need Law Play in a Society with Magic? John Gava & Jeannie Marie Paterson The law and Harry Potter I [edited by] Jeffrey E. Thomas and Franklin G. p. em. ISBN 978-1-59460-645-8 (alI<. paper) I. Rowling, J. K.--Criticism and interpretation. 2. Rowling, J. K.--Characters--Harry Potter. 3. Potter, Harry (Fictitious character) 4. Law in literature. 5. Magic in literature. 6. Wizards in literature. I. Thomas, Jeffrey E. II. Snyder, Franklin G. III. Title. Bats and Gemots: Anglo-Saxon Legal References in Harry Potter Susan P. Liemer Harry Potter and the Half-Crazed Bureaucracy Benjamin H. Barton Moral Choice, Wizardry, Law and Liberty: A Classical Liberal Reading of the Role of Law in the Harry Potter Series Andrew P Morriss Crimes and Punishments PR6068.093Z75652010 823' .914--dc22 Harry Potter and the Unforgivable Curses Aaron Schwa bach Sirius Black: A Case Study in Actual Innocence Geoffrey Christopher Rapp The Persecution of Tom Riddle: A Study in Human Rights Law Geoffrey R. Watson www.cap-press.com Punishment in the Harry Potter Novels Joel Fishman Harry Potter and Identity Hogwarts, the Family, and the State: Forging Identity and Virtue in Harry Potter Danaya C. Wright Harry Potter and the Development of Moral Judgment in Children Wendy N. Law & Anna K. Teller Harry Potter and the Curse of Difference Benjamin Loffredo When Harry Met Martin: Imagination, Imagery and the Color Line Benjamin G. Davis Harry Potter and the Image of God: How House-Elves Can Help Us to Understand the Dignity of the Person Alison McMorran Sulentic The Wizard Economy Economic Growth in the Potterian Economy Avichai Snir & Daniel Levy The Magic of Money and Banking Eric f. Gauvin Gringotts: The Role of Banks in Harry Potter's Wizarding World Heidi Mandanis Schooner Harry Potter as an Archetype Harry Potter Goes to Law School Lenora Ledwon Which Spell: Learning to Think Lilee a Wizard Mary Beth Beazley Harry Potter as Client in a Lawsuit: Utilizing the Archetypal Hero's Journey as Part of Case Strategy Ruth Anne Robbins Who Wants to Be a Muggle? The Diminished Legitimacy of Law as Magic Mark Edwin Burge Agents of the Good, Servants of Evil: Harry Potter and the Law of Agency Daniel S. Kleinberger Professor Dumbledore's Wisdom and Advice Darby Dickerson "It is our choices, Harry, that show us what we truly are, far more than our abilities." -Professor Dumbledore' Law students read Harry Potter.' They read about him in between reading cases, statutes, codes, and other texts filled with magical words. (Sometimes they read about him instead of reading cases, statutes and codes.) Hogwarts School of Witchcraft and Wizardry looks very much like a Harvard Law School for wizards, a school where students learn the secrets of magic words of power. Both types of schools offer explicit and implicit lessons about power, its acquisition, and its uses. Education offers student wizards and student lawyers alike the tools to become forces for evil or good in the world. Like all great novels of development, the Harry Potter stories ask one central question, "How shall I live in the world, for good or for ill?" This is an often unspoken question in law school, where concerns about grades, jobs and salaries can all too easily take precedence. Yet, it is one law students must face. What kind of practitioner will I become? Where will I seek the kind of "fierce JOy" that Harry finds in his Seeker role? And, most importantly, what will I choose to do with this power I am acquiring? This chapter explores the implications of the similarities between law school and wizard school by focusing on the topics of: (1) students; (2) professors; (3) studying and exams; and (4) academic culture. 1 conclude that the series of Harry Potter books can be read collectively as one overarching bildungsroman (or novel of development) and that this process of development is very simi1. Chamber of Secrets 333. 2. The Chronicle ofHigher Education, in its periodic surveys of the top ten books being read on college campuses, consistently lists Harry Potter books. My own informal polls of students in my Law and Literature courses confirm that Rawling's books are quite popular arnong law students. lar to the process law students follow in learning to "think like a lawyer" during their three years of law schoo1.' Knowledge is power in the most literal sense in the world of Hogwarts, and in the world of law school, as well. Students at Hogwarts are selected for an elite education (although the acceptance letter arrives by owl, rather than ordinary mail). They face a tough curriculum, grueling examinations, and terrifying andlor boring teachers. (Snape is the frighteningly cruel Socratic teacher who lives to humiliate students. Professor McGonagall is that favorite teacher who is firm but fair.) Harry and his friends must negotiate the process of becoming more and more powerful at the same time they are feeling powerless as "lowly" students within the hierarchy of the educational institution. For law students in particular, there is a profound resonance to the Harry Potter stories. Student Lawyers and Student Wizards Sorting Out Ordinary and Extraordinary Students-Am I Supposed to Be Here? Rawling's books follow in the popular literary tradition of the 19th-century British school story.' (Traditionally, such stories follow the social, educational, and moral progress of a young boy at a British "public" boarding school.) But there is another, more recent type of school story which also is pertinent to understanding the Harry Potter series: the law school story. Whether it is told as a novel (John lay Osborn, Ir.'s The Paper Chase) or as a memoir (Scott Turrow's One L), the law school story explores law student life and the challenges of legal education.sln law school stories, just as in the British public school story, 3. A bildungsroman is a novel of development, a story tracing the formation of a hero or heroine through childhood to adolescence to young adulthood. Famous examples in· dude Goethe's Wilhelm Meister and Dickens' David Copperfield. CHRIS BALDICK, OXFORlJ CONClSE DICTIONARY OF LITERARY TERMS 27 (2004). See generally JEROME BUCKLEY, SEA- SON OF YOUTH: THE BILDUNGSROMAN FROM DICKENS TO GOLDING (1974). 4. The most famous example is Thomas Hughes' 1857 novel, Tom Brown's Schooldays. See generally BEVERLY LYON CLARK, REGENDERING THE SCHOOL STORY: SASSY SISSIES AND For an excellent discussion of how the Harry Potter stories fit into the school story genre, see Karen Manners Smith, Harry Potter's Schooldays: ].K. Rowling and the British Boarding School Novel, in READING HARRY POTTER: CRITICAL ESSAYS 69 (Giselle Liza Anatol ed., 2003). 5. See, e.g., JOHN JAY OSBORN, JR., THE PAPER CHASE (1971); SCOTT TURROW, ONE L (1977). These two are the most well-known law school stories, but the genre continues. TATTLING TOMBOYS (1996); ISABEL QUIGLY, THE HEIRS OF TOM BROWN (1982). nan y rUller \..;Jues LU Law ,)cnOOl "II the reader follows the development of the protagonist as he (and the protagonist typically has been a "he") encounters terrifyingly strict teachers, takes part in exhilarating school competitions, works through massive amounts of homework, and makes friends and foes among his classmates. Harry's epic story, spread across a course of intensive study lasting years, reflects many of the same fears, hardships and triumphs that law students face during their time in law school. Law school and wizard school alike are process-oriented. Students move through a process of early self-doubts and anxieties, to a growing knowledge that not all the answers are in books, and to a confidence not only in their abilities to think like lawyers/think like wizards but also a selfconfidence in trusting themselves to make the right choices. When Harry first learns that he has been accepted into Hogwarts, he worries, like many a new law student, that there has been a horrible mistake. "A wizard? Him? How could he possibly be?'" He also frequently wonders if the Sorting Hat put him in the correct house-should he be in Slytherin instead of Gryffindor' Similarly, many law students secretly worry that they will be uncovered as imposters-could they really be good enough to compete with all the other obviously bright and talented students? While the Sorting Hat sorts students into one of four houses based on abilities (Gryffindor for the brave, Ravenclaw for the bright, Slytherin for the ambitious and Hufflepuff for the hard-working), law schools sort students in many ways. We sort our students before they are accepted into law school (on the basis of undergraduate grades, L.S.A.T. scores, applicant essays, etc.) and also once they are in law school (on the basis of course grades, class rank, membership in the Law Review, Moot Court competitions, and the like). Law school admissions committees sometimes can be philosophically more like Helga Hufflepuff (depending on the school's mission statement and commitment to hard work and diversity) or more like Rowena Ravenclaw (totally focused on grades and L.S.A.T. scores). The sorting process in law schools is not unproblematic, for grades are not perfect reflections of ability. Additionally, too much sorting and emphasis on grades can create a debilitating, cut-throat atmosphere on campus. The Sorting Hat warns of the divisive dangers of unbridled rivalry, in the song it sings in The Order of the Phoenix (which could be re-titled, "Lament of the Admissions Committee"): See, e.g., RICHARD KAHLENBERG, BROKEN CONTRACT: 6. Sorcerer's Stone 57. A MEMOIR OF HARVARD LAW Listen closely to my song: Though condemned [ am to split you Still I worry that it's wrong. Though I must fulfill my duty And must quarter every year Still [ wonder whether sorting May not bring the end [ fear.' Law students are already a pretty competitive bunch, and the sorting process that starts with law school admissions and continues throughout all three years of law school can provoke as intense rivalries among students jostling for top positions as any of those we see between Gryffindor and Slytherin. Of Gunners and Gut Courses Harry and Ron begin as rather average students. (Harry's growing skill 111 Defense Against the Dark Arts seems more innate than gained by studying, and Ron frequently relies on copying Hermione's notes.) Hermione, however, is dearly a gunner from day one. "Gunners," in law student parlance, are those partly despised and partly feared students who constantly raise their hands to every question the teacher asks and who have over-prepared for each and e"ery class. (This is the kind of student who, in a Contracts dass, asks, "Professor, in this 19th-century case about sheep-shearing cited in footnote 23, what effect did the exchange rate have on the breach of the wool delivery?") Interestingly, Hermione seems to be the only gunner in the school. (She rarely has any competition in her dasses, and she dearly is the most hard-working student.) This is quite different from law schools, where any given dass might have any number of gunners shooting their hands up into the air at every opportunity. As a result of the prevalence of gunners, one popular game we used to play in law school was "Gunner Bingo." You would fill out a bingo card with the names of the gunners in your class, and each time one spoke you checked off his or her name. Then, you had to raise your own hand and work the word "bingo" into your answer to the professor. ("Professor, once you prove offer, acceptance, and consideration, then Bingo, you have an enforceable contract!") Gunner Bingo required a large dass with a good number of gunners, but we never had a shortage. Hermione appears to be the solitary gunner at Hogwarts. Hermione would do well in law school. Unlike Harry and Ron, she lives and breathes her studies. Hermione is completely focused on learning, and very 7. Order of'ile Piloenix 206. well-organized. She draws up strict study schedules and color codes her notes. (I remember being completely intimidated by seeing a friend's color-coded looseleaf binder of notes taken during our Civil Procedure class in law school. Her notes were almost as lengthy as our casebook.) We learn in The Prisoner of Azkaban that Hermione even studies on vacation. And to top it off, she takes "Muggle Studies" as a course, despite being Muggle-born, because she thinks it will be interesting to study Muggles from the wizarding point of view. Hogwarts students consider Muggle Studies an easy course (a "gut" course), as compared to a difficult course such as Potions. Perhaps the law school equivalent of Muggle Studies would be a course on Harry Potter and the Law-at least, that is, until the students realized what they were getting into. Taxation might be the equivalent of Potions, as far as legendarily difficult courses go. The first year students at Hogwarts don't have much choice in their courses, just as first year law students usually have to take a required schedule. While Hogwarts students will be taking such courses as Potions, Transfiguration, and Defense Against the Dark Arts, first year law students will be taking Contracts, Civil Procedure, Legal Writing, Torts, and the like. It is not until after their first year that law students get some choice in their courses, and even then they still have a number of required courses to take. Law school education is a form of initiation (into the mysteries of the law), and a rite of passage (perilous and exhilarating). Strong bonds are forged under such conditions, not unlike the bond formed between Harry, Ron, and Hermione: "There are some things you can't share without ending up liking each other, and knocking out a twelve-foot mountain troll is one of them."8 Similarly, law student friendships, formed in the camaraderie of late-night studying and tough classes, can be deep and long-lasting. Some friendships ripen into marriage, and some into that other close relationship, the law partnership. Socratic Teaching and Learning by Doing In a famous scene from the film version of The Paper Chase, the intimidating Professor Kingsfield (played by John Houseman) humiliates a law student 8. Sorcerer'j Stone 179. by handing him a dime in front of the whole class and telling him "Call your mother. Tell her there is serious doubt about your becoming a lawyer."9 Snape would give Kingsfie1d a run for his money in the "Humiliating Your Students Olympics:' He frequently insults and embarrasses students in front of their peers. While some teachers are encouraging (Professor Sprout, for example, is happy to award points for good answers), Snape displays a sadistic delight in taking points away and in teaching through intimidation. Snape is perhaps the nightmare version of the Socratic professor. The Socratic Method is legendary as the traditional technique for law school teaching. Under this method, the professor (like Socrates) engages in a line of directed questioning with the students, hoping to encourage them to think through difficult problems analytically. In its worst form, it can be a tool for humiliation, where a teacher with a great deal of knowledge hides the ball from a student with lesser knowledge. Snape plays such a game with a vengeance. He constantly asks Harry questions to which Harry can't possibly know the answer. Snape abuses the Socratic Method. For example, he brings Neville near tears, criticizing his efforts at potion making: "Tell me, boy, does anything penetrate that thick skull of yours? Didn't you hear me say, quite clearly, that only one rat spleen was needed?" 10 Such behavior would clearly be beyond the pale in today's law school classroom, and would probably result in student protests to the dean. But what teacher hasn't secretly wished at some time or another to behave as Professor Moody does in turning Draco into a ferret and bouncing him about (to punish him for attacking Harry when Harry's back was turned)? When Professor McGonagall asks Moody what exactly he is doing, Moodyanswers tersely, uTeaching."11 It's not Socratic, but it is indeed a priceless teaching moment. (You can bet Malfoy will never forget it.) Significantly, almost all of the teachers at Hogwarts use some form of practical application in their teaching. The one exception seems to be the History of Magic teacher, whose sole technique is the lecture. He is so boring and his routine is so set, he actually died but didn't notice, and his ghost simply got up to teach one day. Rawling's description of a typical History of Magic class must sound familiar to many a weary law student: "Professor Binns opened his notes and began to read in a flat drone like an old vacuum cleaner until nearly everyone in the class was in a deep stupor, occasionally coming to long enough to copy down a name or date, then falling asleep again."" 9. THE PAPER CHASE (Twentieth Century Fox Film Corp. 1973). 10. Prisoner ofAzkaban 125-26. II. Goblet of Fire 206. 12. Chamber ofSecrets 148. Harry Yotter Goes ~cnOOl ''0' Aside from Professor Binns, everyone else teaches by having the students actually put the lesson into practice. Thus, Professor Trelawney has the students interpret the patterns in tea leaves. Professor Lupin has the students put away their books and use their wands to face a boggart. Professor McGonagall has them transfigure objects (a beetle into a button, or a mouse into a snuffbox, for example). The use of practical applications of knowledge is something law students do in clinical courses. Most law schools offer opportunities for second or third ear law students to work in a legal clinic under the supervision of an attorney. (Examples of possible clinics might include a child advocacy clinic, a domestic violence clinic, an immigration clinic, a taxation or bankruptcy clinic, an environmental law clinic, a poverty law clinic, and the like.) The infamous McCrate Report, published by the American Bar Association in 1992, heavily criticized law schools for placing too much emphasis on theory and too little on skills training. 13 (Undoubtedly, any course that focused on something like Harry Potter and the Law would be the first to go, under the Report.) In the world of Hogwarts, all the weights are on the McCrate side of the balance scale. That is, it is only evil teachers (such as the despicable Professor Umbridge) who want to focus on theory at the expense of practice. Indeed, the students are greatly outraged in The Order of the Phoenix when Umbridge writes her course aims on the board for Defense Against the Dark Arts, and the aims are purely theoretical. Hogwarts students, just like law students, show a great enthusiasm for teachers who have been practitioners. There is nothing that beats the mystique of real life experience. Consider the following remarks in response to Harry's question about what Professor Moody is like as a teacher: "Fred, George, and Lee exchanged looks full of meaning. 'Never had a lesson like it: said Fred. (He knows, mao,' said Lee. 'Knows what?' said Ron, leaning forward. 'Knows what it's like to be out there doing it: said George impressively. 'Doing what?' said Harry. 'Fighting the Dark Arts: said Fred. 'He's seen it all: said George."" 13. AM. BAR ASS'N, SECTION ON LEGAL Eoue. AND ADMISSION TO THE BAR, LEGAL ED- UCATION AND PROFESSIONAL DEVELOPMENT-AN EDUCATIONAL CONTINUUM: REPORT OF THE TASK FORCE ON LAW SCHOOLS AND THE PROFESSION: NARROWING THE GAP (1992). 14. Goblet of Fire 208. A very special type of practitioner is the celebrity lawyer. (Celebrity professors, alas, are far less common.) The celebrity lawyer is a type seen at many law schools. This is someone who typically comes in to teach a specialized seminar for a semester or two. The administration hopes to add a certain cachet to the school (and possibly give a bounce to the school's reputation). Celebrity lawyers are a mixed lot, but one thing they have in common-they will always assign their own books. Thus, Gilderoy Lockhart is no exception in assigning all seven of his books (everything from Break with a Banshee to Year with the Yeti) in The Chamber of Secrets. Finally, one of the most interesting teachers Harry has is not even a human, but a centaur. Firenze seems to be a very postmodern teacher (and perhaps a bit of a Critical Legal Studies person at heart in his disavowal of any transcendent system of knowledge): It was the most unusual lesson Harry had ever attended. They did indeed burn sage and mallowsweet there on the classroom floor, and Firenze told them to look for certain shapes and symbols in the pungent fumes, but he seemed perfectly unconcerned that not one of them could see any of the signs he described, telling them that humans were hardly ever good at this, that it took centaurs years and years to become competent, and finished by telling them that it was foolish to put too much faith in such things anyway, because even centaurs sometimes read them wrongly. He was nothing like any human teacher Harry had ever had. His priority did not seem to be to teach them what he knew, but rather to impress upon them that nothing, not even centaurs' knowledge, was foolproof. 15 Studying and Exams Books and Other Sources ofKnowledge Scott Turrow famously described the process of reading cases during law school studies as "like stirring concrete with my eyelashes."" Grinding away at studies is one of the givens of law school education, and of a wizard's education, too. Trying to master the infamously difficult Rule Against Perpetuities (from Property class in law school) is on a par with mastering the fiendisWy difficult recipe for Polyjuice Potion. 15. Order of the Phoenix 603-04. 16. -fuRROW, supra note 5. at 31. Books are sources of power, both in law school and in wizard school. But because they are powerful, books also can be dangerous. In The Prisoner ofAzkaban, Harry's The Monster Book ofMonsters actually bites him. Ron tells Harry just how dangerous books can be: "Some of the books the Ministry's confiscated -Dad's told me-there was one that burned your eyes out. And everyone who read Sonnets ofa Sorcerer spoke in limericks for the rest of their lives. And some old witch in Bath had a book that you could never stop reading! You just had to wander around with your nose in it, trying to do everything one-handed."17 Tom Riddle's diary, of course, proves especially dangerous, particularly to Ginny and Harry. Similarly, cases and statutes, too, can be used for good or ill. Law students often prefer used textbooks, not only because they are cheaper than new ones, but because sometimes they are marked-up with good notations made by the previous student owner. Similarly, Harry enjoys his used (and very marked-up) copy of Advanced Potion-Making in The Half-Blood Prince, amazing Professor Slughorn with his skill in Potions. Books, law books and magical books alike, are filled with secrets. Part of the process of education is learning how to decipher the words of power in books. Another part of the educational process is recognizing just exactly how far books will take you, and the extent of their limitations. Hermione, through several of the early Harry Potter stories, clearly believes that all the answers are in books. In The Chamber of Secrets, when Harry asks why Hermione has to go to the library, Ron replies, "Because that's what Hermione does;' adding, "When in doubt, go to the library."" Hermione is clearly startled when Professor Trelawney tells them in Divination class, "Books can take you only so far in this field."l9 But by the time of the events of The Order of the Phoenix, she is ready to take the plunge and helps form Dumbledore's Army to practice Defense Against the Dark Arts by themselves. Hermione tells Ron, "No, I agree, we've gone past the stage where we can just learn things out of books... ."2. Law students, too, must face that challenging and difficult moment when they realize that there may be no clear-cut answer in the books. Study Aids and Anti-Cheating Spells Law students have a wide variety of study aids available to them, based on how much money they are willing to spend and on the depth of their desper17. Chamber afSecrets 230-31. Chamber of Secrets 255. Prisoner ofAzkaban 103. Order of the Phoenix 325. ation as exams approach. Course outlines, flashcards, computer programs, tutors, all these and more tempt students to layout hard-earned cash. Other chemical substances purporting to aid in concentration also may make the rounds. However, at least law students are not tempted by bottles of Baruffio's Brain Elixir, which Ron and Harry consider buying in The Order of the Phoenix until Hermione tells them the real ingredients (dried doxy droppings). And what hapless law student, pulling another all-nighter while studying for a final exam, wouldn't love to have a Time-Turner such as Hermione has? Every student needs more of that most precious commodity, time. But before exams, Professor McGonagall sternly tells the students, "Now, I must warn you that the most stringent Anti-Cheating Charms have been applied to your examination papers. Auto-Answer Quills are banned from the examination hall, as are Remembralls, Detachable Cribbing Cuffs, and Self-Correcting Ink."21 While law students undoubtedly are intrigued by the sound of some of these cheating tools, they are also fully aware that law schools use their own computer magic to ensure that students typing exams are unable to log on the Internet) or to access any ftles or notes. Hogwarts exams often are a combination of written tests and practical tests. Students have to be prepared to write long essay answers explaining the history of the Goblin Rebellion, but also be able to make a pineapple tap dance across a table. (The incentive to study for the Potions test is especially high, when the professor threatens to poison one of the students to see if their antidotes work, as Snape does in The Goblet of Fire.) Exams loom large for law students, too (although law school exams overwhelmingly consist of written essay questions rather than practical applications). First year exams are particularly stressful, with the grade for the entire course resting on one examination. The results of first year exams often become the basis for receiving an invitation to be on the editorial board of the school's law review (a very prestigious position). Many a law student has felt the same pressures Harry feels in his History of Magic exam: "Think, he told himself, his face in his hands, while all around him quills scratched out never-ending answers, and the sand trickled through the hourglass at the front... ."22 22. Order of .he Phoenix 726. Grades and Future Careers There is an old saw about law school grades that goes something like this: "The 'X students become the law professors; the 'B' students become the lawyers; and the 'C' students become the judges:' The comforting idea behind this somewhat ironic saying is that the grade-obsessed gunners who truly "love the law" will find their niche in teaching. The solid students will become practitioners and make piles of money, and those with other skills (such as political skills) will be able to lord it over all as decision-makers in the judicial system. There seems to be some similarity here to the Hogwarts denizens. For example, Dumbledore was one of the smartest wizards of all time and yet he only wanted to be Headmaster. (He was offered the post of Minister of Magic, but was not interested.) Similarly, the equally brilliant Lord Voldemort was one of the brightest students Hogwarts had ever seen, and he wanted to be the Defense Against the Dark Arts teacher. The scholastically average Weasley twins, Fred and George, leave school early to make a mint of money in their Joke Shop. Mediocrities such as Fudge end up as Minister of Magic. For most of the students, grades are integral to career paths. Thus, it is Book Five, where the students take their O.W.L. exams, that illustrates most clearly the stress and strain of exams. O.W.L.s are similar in importance to the Bar Exam for law students, for like the Bar, O.W.L.s are essential to proceed on with your career. Perhaps the only thing more excruciating than taking exams is waiting for the results. In addition to final exams in courses, law students have to pass their state bar examination before they are qualified to practice law. The test is usually taken in July, and the results take several months. (Unfortunately, the results are not delivered by owl.) The bar examination score has both an essay component and a multiple choice component and the results are not always capable of being taken in at a glance. One of my friends, out of town on a document review when his letter arrived, had his mother open it for him. He asked her on the phone, "Did I pass?" There was a long, agonizing silence as she opened the letter and read it, and finally she said, "I just don't know!" (He had passed, as it turned out.) Similarly, Harry and his friends have to decipher a complicated grading system where "0" stands for "Outstanding," "E" means "Exceeds Expectations," "P\' only means "Acceptable," and the failing grades are "P" for "Poor;' "0" for "Dreadful;' and of course, the appropriately named bottom grade, "T" for "TroW'" 23. Half-Blood Prince 102. However, career planning is perhaps more creative for Hogwarts students than for the typical law student. Our law school placement office rarely has such interesting pamphlets as, "Have You Got What It Takes To Train Security Trolls?" and "Make A Bang At The Department of Magical Accidents and Catastrophes."" Academic Culture Rankings and School Competitions Hogwarts seems to be the Harvard of wizarding schools. In The Goblet of Fire, Harry first learns of the existence of other wizarding schools. The three largest European schools are Hogwarts, Beauxbatons and Durmstrang. (It's interesting to speculate what the law school equivalent of the other schools would be.) But Hermione tells Harry that Durmstrang's got a horrible reputation. She says, "According to An Appraisal ofMagical Education in Europe, it puts a lot of emphasis on the Dark Arts."25 This Appraisal seems to be the wizard's equivalent of the annual (and notorious) U.S. News and World Report ranking of law schools. (The rankings are notorious because law schools bitterly complain about the relevancy of the ran kings, but spend an inordinate amount of time and energy hoping to move up in the rankings.) The rivalry between schools in the Triwizard Tournament is fierce. Similarly, moot court competitions between tearns representing different law schools can be very competitive. Formalities ofDress and Address In the type of public boarding school setting of Rowling's novels, the academic culture is quite a bit more formal than at many law schools. For one thing, students and faculty at Hogwarts dress formally for classes. (They wear black robes over their regular clothes.) Law students, in contrast, no longer wear suits and ties to classes (unless they have an interview scheduled for right after class). I remember my grandmother being appalled when she saw me heading out to one of my law school classes in blue jeans and a t-shirt. She was even more shocked when I told her some of my professors also wore jeans. As for forms of address, Hogwarts teachers address students by last names. In law school classes, this is pretty much a matter of teaching style for the pro24. Order of tile Phoenix 657. n ..u 1 Y l~Vllt::l \..JVC:~ lV Law ,Jl,..UUUl fessor. Some law professors address students as "Mr. Smith" or "Ms. Jones:' while other professors use first names. (The choice is also influenced by class size-the larger the class, the more likely that the professor will go by last names.) However, in both Hogwarts and law school, teachers are addressed as "Professor." (It is the rare law professor who feels secure enough to ask students to address her by her first name.) Hogwarts School of Witchcraft and Wizardry is a 1,000 year old institution housed in a medieval castle. Many law schools, even the more recently established ones, opt for the ancient medieval look in their buildings (particularly the library). Such a setting suggests a sacred place (a cathedral of learning), a place filled with power, a strong and entrenched institution. The majestic architecture of Hogwarts (and of many law schools) metonymically represents the power and privilege of the place. Book 7 or Is There Life after Law School? The well-schooled Rawling begins the concluding book in her Harry Potter series with two epigraphs: a quote from Aeschylus' ancient and bloody Greek tragedy, The Libation Bearers, and a quote from the Quaker William Penn's More Fruits ofSolitude. This is the only book out of the seven in which Rawling includes any prefatory quotes, and it is worth while considering her selection in some depth, particularly for their insights into the rule of law. "Bless the children, give them triumph now:' the Chorus prays in the quote from The Libation Bearers and Electra and Orestes dutifully plot matricide in their vengeance-based society. The selection from William Penn, on the other hand, offers consolation in the face of death: "For they must needs be present, that love and live in that which is omnipresent." For Penn, love and friendship can never perish, being part of the divine. The two quotations, while dealing with death and love, could hardly be more apt for their resonances with the rule of law. The Libation Bearers is the second play in Aeschylus' Oresteia trilogy, the story of a blood feud that destroys the ill-fated family of the House of Atreus." 26. For an excellent version of the trilogy, see ROBERT FAGLES, THE ORESTEIA: AGAMEM(1984). NON, THE LIBATION BEARERS & THE EUMENIDES The trilogy is often taught in "Law & Literature" courses, and broadly features a movement from a revenge society to a rule oflaw society. It is (among many other things) a study in jurisprudence. In the first play, Queen Clytemnestra kills her husband, Agamemnon, as revenge for his killing of their daughter, Iphigenia. (Agamemnon has sacrificed Iphigenia in order to get fair winds for his war ships heading to Troy.) In the second play, The Libation Bearers, the remaining children plot the death of Queen Clytemnestra and her new husband. Electra urges her brother, Orestes, to avenge their father's death by killing their mother. Orestes kills his mother, but then he is tormented by the Furies for his crime of matricide. The third play is the trial of Orestes. Does Orestes deserve continued torment by the Furies for killing his mother, when it was his duty to avenge the death of his father? A jury of Athenians hears the case, presided over by Athena as judge. Apollo acts as Orestes' attorney and the Furies appear on behalf of the murdered Clytemnestra. The result is a hung jury, with Athena casting the deciding vote for mercy. The spiral of vengeance comes to an end. At first blush, there could hardly be a greater contrast than that between the violent, bloody story of the Oresteia and the gentle consolation of the William Penn excerpt. However, for students of legal history William Penn is far more than just the benevolent Quaker founder of Pennsylvania." Penn studied law at Lincoln's Inn and drafted the legal framework for the government of Pennsylvania. But perhaps most significantly, Penn was responsible for protecting the early right to trial by jury in England. Penn, a defender of Quakerism, was accused of preaching in public in violation of an Act to suppress religious dissent. At Penn's trial, the judge directed the jury to come to a verdict without hearing any defense. As an additional outrage, the government refused to present an official indictment (probably over concern that the Act itself might be overturned). Despite enormous pressure from the judge, the jury returned a verdict of "not guilty:' The judge then sent the jury to jail. Great political pressures were involved in the case; the Lord Mayor of London even became involved in trying to strong-arm the jury. However, the jury held fast and eventually won their freedom, protecting the right to trial by jury. Both opening excerpts resonate with the idea of a systemic change, a breathtakingly different world view. The blood vengeance of The Libation Bearers must give way to a legal system of reason tempered by mercy. The dark human fear that death is a final end gives way to the divine light of Penn's vision of undy- 27. For a good discussion of Penn's life and work, see HANS ApOSTLE OF DISSENT (1974). FANTEL, WILLIAM PENN: .. jOj 1 Y .r UUl;l \JUC:~ lU Ld.W ..Jl.llUUl ing love. (And for legal history fans, Penn's most famous trial created a sea-change by truly democratizing the British jury system, and evidencing the truth that pacifism is not for sissies.) So what do these two epigraphs have to do with Harry, Ron, and Hermione, or, for that matter, with law students? They are key to understanding the children's quest, and key to understanding the transformative goals as well as the limits of a formal law school education. A new world view, a transformation that comes from within, can change the very idea of "victory" for Harry as well as for young lawyers. "If the Deathly Hallows really existed, and Dumbledore knew about them, knew that the person who possessed all three of them would be master of Death-Harry, why wouldn't he have told you? Why?" He had his answer ready. "But you said it, Hermione! You've got to find out about them for yourself! It's a Quest!"28 There is a sea change at work in Book Seven. Of all seven books in the Harry Potter series, The Deathly Hallows is the only one not set at Hogwarts. The new setting itself marks a great seismic shift, presaging the coming transformation of world view. Harry, Ron, and Hermione have dropped out of school to fight against Voldemor!. Like the children in The Libation Bearers, their goal is a death: essentially, they are on a mission to kill Voldemort. No longer for them are the familiar school-year rituals of the Hogwarts Express, school robes, Quidditch matches, House rivalries and final exams. All that is familiar and comforting, including Hogwarts itself (a place Harry views as home), is now dangerous and perverse. At Hogwarts, students practice torture skills on other students. (They use the Cruciatus Curse on those who've earned detention.") Only pure blood witches and wizards are entitled to education. Death Eaters are teachers now. Education is literally upside down (consider the opening scene to the book, where the professor of Muggle Studies is hung upside down and tormented and killed by Voldemort). We are in Big Brother land, Nazi Germany, the place of our living nightmares. The perversion of education is that it can become indoctrination. Harry as questing hero will himself be transformed by his journey, but only after great suffering. On his quest, Harry finds that one by one he is being stripped of his all sources of power and comfort. His wand is broken, his best 28. The Deathly Hallows 433. 29. Deathly Hallows 573. friend Ron deserts him, and Harry's core belief in Dumbledore is severely shaken. Why couldn't Dumbledore have told him what to do? Why doesn't Harry just have a magical list of instructions to follow? Has his Hogwarts education failed him? Harry comes to understand that in order to make the greatest paradigm shift of all, the move from childhood to adulthood, "you've got to find out ... for yourselfl" Thinking for yourself, like "thinking like a lawyer:' is a leap into a new world, a transformation into a newer self. "Why doesn't my law professor just give us the answers?" is a frequent complaint of first year law students. We want students to think for themselves, to be ready to face new factual situations. And sometimes, like Dumbledore, we don't have the answers-all we have is a good hunch concerning what we think the courts might Harry has learned his lessons at Hogwarts, but Hogwarts cannot teach him everything. His most difficult lesson comes when he decides not to act. In not racing Voldemart to the Elder Wand,'o Harry does something that is out of character for him - he sits still. As a Seeker in Quidditch, and as a very active hero in the first six books, Harry has been in near-constant motion. But outward physical activity is not always the right decision. Harry suffers through his own sea change when he makes the conscious decision to do nothing about retrieving the Elder Wand. Law students as well may come to the point where they reach the limits of wisdom from formal legal education. Often such moments are ethical dilemmas which arise during summer clerkships or first year jobs. At such points, the young lawyer's decisions shape the type of person, both professionally and personally, she becomes. She is not without powerher legal education will serve her in good stead. But the answer to a quest is not something to be learned in school, but rather something to be found within. Dumbledore makes it clear that with great power comes great responsibility. When he talks to the young Tom Riddle for the first time, Dumbledore says that at Hogwarts, "[W]e teach you not only to use magic, but to control it. ... All new wizards must accept that, in entering our world, they abide by our laws."31 One of the dangers of acquiring power is starting to believe you are better than those without power. This is Valdemart's mistake, but it also is a common mistake for anyone entering a specialized profession, including the 31. HalJ.Blood Prince 273. law. Hermione, speaking of elf rights and wizard prejudices, tells Lupin, "It all stems from this horrible thing wizards have of thinking they're superior to other creatures....JI)2 Coming to terms with power, whether you are a lawyer or a wizard, means finding the right balance between pride in expertise and humility in good service. How you come to define "good" should be an integral part of the individual lifelong educational journey. Of course, there is not just one ur-story of legal education, or of a magical education, for that matter. Feminists and Critical Race scholars, among others, have long noted that the structure of legal education still serves to reinforce a power and privilege that all too often is white, male, and not working class." This is one of the reasons I so enjoy Hermione as a character (and why I secretly wish Rawling had made her the main character, despite Harry's charms). Perhaps Rawling will give us further adventures at Hogwarts, featuring Ron and Hermione's daughter, or other diverse wizard students. At the end of The Half-Blood Prince, Harry determines not to return to Hogwarts. (He has to set out on a quest to find and destroy first the Horcruxes, and then Lord Voldemort himself.) After all, one can't stay in school forever (sad as that thought will be to Rowling's fans.) Harry leaves Hogwarts ready for this last quest because Hogwarts has taught Harry to "think like a wizard" the way that law schools teach students to "think like lawyers." This type of thinking means not simply memorizing rules (magical words of power), but also knowing how to apply old rules to new cases, and perhaps even envisioning a re-shaping of the law (or a re-shaping of the rules of magic) as it affects the material conditions of our lives. "There was a lot more to magic, as Harry quickly found out, than waving your wand and saying a rew funny words."34 32. Order of ,he Phoenix 171. 33. See, e.g., Lani Guinier et aI., Becoming Gentlewomen: Women's Experience at One Ivy League Law School, 143 U. PA. 1. REV. I (1994). For an example of some of the limits of trying to universalize the law student story. see Brian Owsley, Black Ivy: An African-American Perspeetiveon Law School, 28 COLUM. HUM. RTS. L. REV. 501 (1997). 34. Sorcerer's Stone 133. r The Warrio Teacher’s Pet Publications Wand-erful: half-term fun for all the family at S R Sample pecialis C T a m p u s i m e s Gender attitudes in Harry Potter SLJ’s Problem A. Lights Against Dudely Description Abandoned Children in Literature: The Orphans in J.K. Rowling’s GCC Journey Class Book Summary: Harry Potter The Nameless World of Harry Potter A Resource Guide to use with Harry Potter and the Sorcerer’s Stone Harry Potter and the Sorcerer’s Stone ---------- LOCATION: Privet Drive - night DARK THEY WERE AND GOLDEN-EYED BY RAY BRADBURY Movies with Gifted Characters Harry Potter H/D FANFICTION QUOTES &amp; Thursday 19 December 2013 Dear Parent/Carer, The first few pages are patterns new in 2014. The... Diagonal Plaid Patricia Ritter 2014 The GEORGE BURNS and GRACIE ALLEN Show Income Tax Problems
cc/2021-04/en_middle_0086.json.gz/line10419
__label__cc
0.639939
0.360061
Tag: Operation Kamala Mayoral Polls on Jan. 18: Operation Kamala forces JD(S) to move Corporators to Resort Mysuru: Apprehensive that the BJP may resort to ‘Operation Kamala’ at the last minute ahead of the Jan.18 Mayoral polls, the JD(S) is all set to move its Corporators to a resort this evening. The JD(S), which is going to get the Mayor’s post this time as per an understanding reached with its coalition partner… Elections 2018, News Operation Kamala Fear: JD(S)-Congress Legislators made to stay in hotels Bengaluru: Though B.S. Yeddyurappa failed to prove majority yesterday, the fear of ‘Operation Kamala’ is still haunting the JD(S)-Congress. In a bid to save the party MLAs from being poached by the BJP, the leaders of both JD(S) and the Congress have made their MLAs to stay in hotels till they prove their strength and… Operation Kamala: Cong. MLAs from Gujarat land in Bengaluru Bengaluru: The Congress High Command, worried over the defection of six party MLAs in Gujarat to the BJP in the past couple of days, has shipped 46 of its MLAs to Bengaluru, fearing Operation Kamala. They are expected to stay here till the crucial Rajya Sabha elections on Aug.8. With the re-election of Ahmed Patel,…
cc/2021-04/en_middle_0086.json.gz/line10422
__label__wiki
0.515248
0.515248
Category Archives: Stoke-on-Trent England, Experiences Abroad, London, My articles / researches, Steffi Says, Stoke-on-Trent The Best Geek Locations in England March 23, 2016 SteffiGrimm Leave a comment A lot of people in England want to realize their nerdy dreams overseas. This is because a lot of what we love comes from other countries. We want to visit Hollywood to see the museums and filming locations of our favourite movies. We want to visit Japan because it gave birth to anime. It’s easy to forget that there are plenty of perfect geeky or nerdy locations right here in England. And when I use those words, I mean what we usually mean. I’m talking about fans of films, books, comics, theme parks and technology! Here’s a quick, but by no means exhaustive, guide to some of the best examples! There are plenty of comic conventions in London. The most famous example would be the MCM Comic-Con. Contrary to popular opinion, this isn’t officially the British version of the San Diego Comic-Con. But this is closest we’ll get, and it’s amazing in its own right! When the MCM Comic-Con is on, you’ll know about it wherever you go in London. Geeks from all over the country flock here in their best cosplay outfits. Celebrities attend the event and meet fans. Comic stands are everywhere. And beware, those of you who think selfies have replaced the autograph! Celebrity autographs are still alive, kicking and very much available at the MCM Comic-Con! The next MCM Comic-Con takes place in late May. The celebrity guests will include Warwick Davis and Meg Turney, the Internet’s favourite cosplayer. Remember, though, that there’s more than one comic convention in England! There’s also the London Super Comic Convention, which takes place earlier in the year. For less mainstream tastes, there’s also the brilliant East London Comic and Arts Festival. You can find out more at http://www.elcaf.co.uk. Theme parks are a great way to pretend we’re in a loud, colourful fantasy land. For geeks with courage, there’s not much better than a roller coaster! For many of us, it’s the closest we’ll get to the thrilling action and speed we see in our favourite movies. There are a lot of theme parks in England, but you may as well visit one with the best roller coasters. The names Thorpe Park and Alton Towers often come to mind. But if you’re going to experience roller coasters, you may as well do it properly. Blackpool Pleasure Beach is consistently ranked as the best theme park in England and one of the best in Europe. (Remember that it has to compete with Disneyland Paris when the whole of Europe is invited to the competition!) It has more roller coasters than any other theme park in Europe. Its attractions are also world-renowned record breakers. When it launched in the mid-nineties, the Big One was the tallest and the fastest roller coaster in the entire world. It’s still the tallest in the United Kingdom! There’s also Valhalla, the longest indoor roller coaster in the world. (It was also the most expensive to build!) You can find out more at https://www.blackpoolpleasurebeach.com. Not too far away from Blackpool is the Laurel and Hardy Museum. It’s the only such museum in the world. It has a 1920s style theatre that shows classic comedy. It’s a must for movie buffs! Literature hotspots England has an amazing history of literature! For any book geek, it’s one of the best countries in the world. The first place you may think of is Baker Street, where Sherlock Holmes lived in Conan Doyle’s novels. In these stories, Holmes and Watson lived at 221b Baker Street. Back then, though, there were no property numbers beyond 100 on Baker Street! These days, 221b Baker Street does exist. It’s the Sherlock Holmes Museum! Any fans of the stories or the BBC show must see this museum. You can read more about it at http://www.sherlock-holmes.co.uk. The real homes of many authors can be visited by the public. The Brontë Parsonage Museum preserves the residence of the literary sisters as it was when they wrote their classics. The home of legendary poet John Keats can also be found in Hampstead. The hangouts of some of the great writers are also easily accessible. A trip to Oxford isn’t complete without a visit to The Eagle and Child. This is the pub where the fantasy writers C.S. Lewis and J.R.R. Tolkien used to drink and chat with each other. Cornwall also houses the Jamaica Inn. The name isn’t a reference to the Daphne du Maurier’s classic horror novel. The novel was named after the inn! du Maurier stayed there on a particularly foggy and scary evening. The inspiration for her novel hit her there. Show some Love, share this: actionalton towersarticleartsarts festivalbaker streetBest Geek LocationsBest Geeky LocationsBest Nerd LocationsBest Nerdy Locationsblackpoolbritishbronte parsonage museumcelebritycomiccomic and arts festivalcomic conventioncomic-concomiconcommissionconventioncosplaycosplay outfitscosplayercostumescreativityCS LewisDaphne du Maurierdeadpooldisneyland pariseast londonenglandfestivalfilmsgeekgeekygreat britainhampsteadhollywoodhotspotsindoor roller coasterinternetjohn keatsJRR Tolkienlaurel and hardy museumliteraturelocationslondonmcm comiconmeg turneymoviesmuseumnernerdsnerdypaid articleroller coastersan diegosherlock holmesSteffiSaysStoke-on-Trenttheme parkthorpe parkthrillTolkienUKvalhallawarwick davis Crazy Outbursts, England, Experiences Abroad, My Life, Steffi Says, Stoke-on-Trent Thoughts and Dreams April 22, 2015 SteffiGrimm Leave a comment Last night I was going through my stuff and I came across the leaving card my ex colleagues in England gave me. I reread all the messages and it made think on what could have my life been like if I never left. I am still in love with all things British and sometimes I fear I have made a bad decision. I love being close to my family and friends but I miss the green, the nature, the events, the sense of peace and calm in my life that only that country seems to give me. With all things going in my life.. especially the house and the cats it should totally feel like I’ve settled down. But truth be told, I wish I could be in two places at once. Or perhaps I can live some of my life here and some there. But for that to happen I need to be rich or be in a situation were I can work from anywhere in the world and actually afford such comfort. Now that I have put this on paper I hope that I can put this thought to rest; At least until two months time when I will be travelling to South Wales, London and possibly Kent. God I miss you! abroadcalmcardcardiffcasltescastlecatscolleaguescomfortcountrycountry sidedecisiondecision makingdesperationdoctor whodreamsenglandeventeventsex colleaguesforestforestsgreengreeneryhomehousekentlaughleavinglifelivelondonlovemessagemissmissingmountainmountainsmuseummuseumsparkparkspeaceregretseasidesettle downsettled downsettling downsight seeingsolitudesolutionstuffthoughtstreeswales
cc/2021-04/en_middle_0086.json.gz/line10425
__label__wiki
0.591199
0.591199
Going Virtual In Real Estate Mentorship Program Emerge as the "go-to" agent in your area because of how well you're using video, social media and virtual tours Enroll in Course for R15,200 Are you an estate agent? Are you concerned about how social distancing is impacting your business? Have you thought about what it’s going to take for you in the months ahead to emerge as the go-to agent in your area BECAUSE of how well you are using technology, video, social media and virtual property tours? Watch this now An introduction to the "Going Virtual In Real Estate" mentorship program "I have personally known and worked with Steven Johnstone for many years. He has proven over the years his ability to effectively coach some of the best estate agents in the country. I believe this program will help us all conclude more deals in what is a new era in real estate." - Jonathan Acutt, Managing Director - Acutts Real Estate "I have really benefitted from my interaction with Steve - there are so many options out there for "going virtual," but Steve has researched the various types of media platforms available, and how best to put them to use. This program is going to save us time & money!" - Jonathan Bronkhorst, Principal - Heads Residential Property Paddy Judd - What the Going Virtual program has done for me Here's a short video testimonial from one of the members Steven Johnstone Steven is recognised as one of the top real estate trainers in the world today. After building South Africa's largest real estate training & one-on-one coaching company, he spent 8 years in the non-profit and ministry worlds. He now brings his legendary referral system to a new era of real estate agents open to the world of online learning! See www.stevenjohnstone.com for more. How to tune into the coaching session webinars (2:01) Webinar #1 - Introduction and strategy overview (94:54) Webinar #2 - Community Groups (61:13) Webinar #3 - Organising Your Database (94:05) Special Webinar - PropCon CRM demo (with Leandre van Rooyen) (96:50) Webinar #4 - Priming Your Advocates (73:09) Webinar #5 - Priming (continued...) (58:02) Webinar #6 - The post-primer public video (46:06) Webinar #7 - The finishing touches on your referral system (71:48) Webinar #8 - Setting up a regular video routine (54:41) Webinar #9 - Starting to think about bulk email (64:12) Webinar #10 - Sending high-value bulk emails (60:24) Webinar #11 - First steps towards a drip campaign (59:11) Webinar #12 - Setting up your drip campaign (in Mailchimp) (68:47) "How To..." videos How to add bookmarks on Google Chrome (2:46) How to get free music for your videos (5:05) How to get the best audio when using your webcam (1:17) How to access the list of Community Group leaders (2:06) How to produce a video tour from a Matterport space (3:34) How to open a Facebook Business Page (9:19) How to open a YouTube channel (4:47) How to open an Instagram account (1:05) How to send a personal friend request on Facebook (1:27) How to invite Facebook friends to LIKE your business page (1:34) How to overlay one clip above another when editing video (1:12) How to broadcast LIVE using Ecamm Live (with a screenshare + webcam combination) (9:12) How to create a HYPER-LOCAL online presence (11:20) How to access high quality Value Items (4:43) How to get the link to a Facebook video (to WhatsApp / email to others) (2:05) How to self-syndicate your videos (7:00) How to create awesome images for your videos (4:23) An Introduction to Mailchimp (9:09) How to create, store and access all your videos easily in an online "library" (4:25) How to put hyperlinks in an email (or bulk email) (12:41) How to create simple GIF's for your emails (5:10) How to shoot a video version of your Value Items (6:07) How to send a bulk email using Mailchimp (with a bunch of cool stuff!) (15:39) How to create and assign TAGS on Mailchimp (for Drip Campaigns) (9:13) How to create a drip campaign on Mailchimp (Part A) (16:09) How to create a drip campaign on Mailchimp (Part B - Landing Pages) (12:46) Community Group Leaders' Webinar Replays Community Group Leaders' Webinar #1 (50:42) Courses Included with Purchase The Successful Real Estate Agent e-course Everything you need to know as a real estate agent to make more money, in fewer hours, with better quality clients. The Intensive Launch Tracking Tool An "Excel spreadsheet on steroids" designed to track the launch of your Trusted Advisor Program A done-for-you library of high quality pdf articles to be sent to your Advocates every 6 weeks Original Price: R12,350 Going Virtual FULL PRICE Coupon Discount FULL PRICE (R15200) © stevenjohnstone.com 2021
cc/2021-04/en_middle_0086.json.gz/line10427